Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2022, 17:22
Static task
static1
General
-
Target
2fe88d1a45fb7bd836dc1f0887521ace9cfb1be19b58581e6f8b62e50f933926.exe
-
Size
211KB
-
MD5
8675e28b0766f02949b6794b8710e332
-
SHA1
364a453055fc729e5a82bc409d008e6dc4dc15b7
-
SHA256
2fe88d1a45fb7bd836dc1f0887521ace9cfb1be19b58581e6f8b62e50f933926
-
SHA512
fe52d49c255c4379c953e800756ae69398c7ff7401c89846e150c07729ac0fbca076d29c4cebeecd702efda2502e2ef18e2f30d54b806cc7cb12d2cb56534123
-
SSDEEP
3072:ZZhZm5Tx9WsEsLiOuh6Dzj5OIxIzQs5TiA9j+FoxfN3x:ZZhIhDWsVL7uhpbz/5TiC+FoxV
Malware Config
Extracted
systembc
89.248.165.79:443
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/2140-133-0x0000000000610000-0x0000000000619000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 2608 EDDF.exe 1500 28F5.exe 2264 dedxkh.exe 3084 9C51.exe 2584 A57A.exe 1460 ickjbog.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2608 set thread context of 4944 2608 EDDF.exe 93 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\dedxkh.job 28F5.exe File opened for modification C:\Windows\Tasks\dedxkh.job 28F5.exe File created C:\Windows\Tasks\ickjbog.job A57A.exe File opened for modification C:\Windows\Tasks\ickjbog.job A57A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2388 2608 WerFault.exe 87 1008 2608 WerFault.exe 87 4884 2608 WerFault.exe 87 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2fe88d1a45fb7bd836dc1f0887521ace9cfb1be19b58581e6f8b62e50f933926.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2fe88d1a45fb7bd836dc1f0887521ace9cfb1be19b58581e6f8b62e50f933926.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2fe88d1a45fb7bd836dc1f0887521ace9cfb1be19b58581e6f8b62e50f933926.exe -
Checks processor information in registry 2 TTPs 49 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 EDDF.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision EDDF.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor EDDF.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier EDDF.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 EDDF.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status EDDF.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor EDDF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information EDDF.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EDDF.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Process not Found Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Process not Found -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3008 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2140 2fe88d1a45fb7bd836dc1f0887521ace9cfb1be19b58581e6f8b62e50f933926.exe 2140 2fe88d1a45fb7bd836dc1f0887521ace9cfb1be19b58581e6f8b62e50f933926.exe 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2140 2fe88d1a45fb7bd836dc1f0887521ace9cfb1be19b58581e6f8b62e50f933926.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeDebugPrivilege 4944 rundll32.exe Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4944 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3008 Process not Found 3008 Process not Found -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2608 3008 Process not Found 87 PID 3008 wrote to memory of 2608 3008 Process not Found 87 PID 3008 wrote to memory of 2608 3008 Process not Found 87 PID 2608 wrote to memory of 4944 2608 EDDF.exe 93 PID 2608 wrote to memory of 4944 2608 EDDF.exe 93 PID 2608 wrote to memory of 4944 2608 EDDF.exe 93 PID 2608 wrote to memory of 4944 2608 EDDF.exe 93 PID 3008 wrote to memory of 1500 3008 Process not Found 95 PID 3008 wrote to memory of 1500 3008 Process not Found 95 PID 3008 wrote to memory of 1500 3008 Process not Found 95 PID 3008 wrote to memory of 3084 3008 Process not Found 97 PID 3008 wrote to memory of 3084 3008 Process not Found 97 PID 3008 wrote to memory of 3084 3008 Process not Found 97 PID 3008 wrote to memory of 2584 3008 Process not Found 98 PID 3008 wrote to memory of 2584 3008 Process not Found 98 PID 3008 wrote to memory of 2584 3008 Process not Found 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fe88d1a45fb7bd836dc1f0887521ace9cfb1be19b58581e6f8b62e50f933926.exe"C:\Users\Admin\AppData\Local\Temp\2fe88d1a45fb7bd836dc1f0887521ace9cfb1be19b58581e6f8b62e50f933926.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2140
-
C:\Users\Admin\AppData\Local\Temp\EDDF.exeC:\Users\Admin\AppData\Local\Temp\EDDF.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 8282⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 8282⤵
- Program crash
PID:1008
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 9562⤵
- Program crash
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2608 -ip 26081⤵PID:720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2608 -ip 26081⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2608 -ip 26081⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\28F5.exeC:\Users\Admin\AppData\Local\Temp\28F5.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1500
-
C:\ProgramData\fqptswm\dedxkh.exeC:\ProgramData\fqptswm\dedxkh.exe start1⤵
- Executes dropped EXE
PID:2264
-
C:\Users\Admin\AppData\Local\Temp\9C51.exeC:\Users\Admin\AppData\Local\Temp\9C51.exe1⤵
- Executes dropped EXE
PID:3084
-
C:\Users\Admin\AppData\Local\Temp\A57A.exeC:\Users\Admin\AppData\Local\Temp\A57A.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2584
-
C:\ProgramData\fnsx\ickjbog.exeC:\ProgramData\fnsx\ickjbog.exe start1⤵
- Executes dropped EXE
PID:1460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5cb5376549056d659a798cb9dd7464ffc
SHA112e8955e0e155c2e57d78955ad0924917b37ccba
SHA256ab4707313627a925d7a67ee8acb04981d558f1ce2a110dea9ba8f02d15f8bc0a
SHA51212130446a1f3a6edd8c68c26a83f0dcb5414aa629ed9f14ccdd99ace33202a79d958484aac12abe70d5810895e31365fbd7ce829d34c8a48e22ebd037a955be7
-
Filesize
209KB
MD5cb5376549056d659a798cb9dd7464ffc
SHA112e8955e0e155c2e57d78955ad0924917b37ccba
SHA256ab4707313627a925d7a67ee8acb04981d558f1ce2a110dea9ba8f02d15f8bc0a
SHA51212130446a1f3a6edd8c68c26a83f0dcb5414aa629ed9f14ccdd99ace33202a79d958484aac12abe70d5810895e31365fbd7ce829d34c8a48e22ebd037a955be7
-
Filesize
209KB
MD5cb5376549056d659a798cb9dd7464ffc
SHA112e8955e0e155c2e57d78955ad0924917b37ccba
SHA256ab4707313627a925d7a67ee8acb04981d558f1ce2a110dea9ba8f02d15f8bc0a
SHA51212130446a1f3a6edd8c68c26a83f0dcb5414aa629ed9f14ccdd99ace33202a79d958484aac12abe70d5810895e31365fbd7ce829d34c8a48e22ebd037a955be7
-
Filesize
209KB
MD5cb5376549056d659a798cb9dd7464ffc
SHA112e8955e0e155c2e57d78955ad0924917b37ccba
SHA256ab4707313627a925d7a67ee8acb04981d558f1ce2a110dea9ba8f02d15f8bc0a
SHA51212130446a1f3a6edd8c68c26a83f0dcb5414aa629ed9f14ccdd99ace33202a79d958484aac12abe70d5810895e31365fbd7ce829d34c8a48e22ebd037a955be7
-
Filesize
22KB
MD599e972f6d63ded5a9f3d6a06ff481bec
SHA1b3c98ed6975c649454bce3d88806ad1883e22327
SHA256d6f11c606729d553e9c9b3d0db9e5d51567ea969bedd98008cce7b9415a17490
SHA512ecc322a906b25ea835fdfcb528fb0bc11ade80112b9d0783f0c02100a83368b718c45ca5bdbe38c106e3559db7723dc2fdf38e2bf473fb461ddade999d02f416
-
Filesize
209KB
MD5cb5376549056d659a798cb9dd7464ffc
SHA112e8955e0e155c2e57d78955ad0924917b37ccba
SHA256ab4707313627a925d7a67ee8acb04981d558f1ce2a110dea9ba8f02d15f8bc0a
SHA51212130446a1f3a6edd8c68c26a83f0dcb5414aa629ed9f14ccdd99ace33202a79d958484aac12abe70d5810895e31365fbd7ce829d34c8a48e22ebd037a955be7
-
Filesize
209KB
MD5cb5376549056d659a798cb9dd7464ffc
SHA112e8955e0e155c2e57d78955ad0924917b37ccba
SHA256ab4707313627a925d7a67ee8acb04981d558f1ce2a110dea9ba8f02d15f8bc0a
SHA51212130446a1f3a6edd8c68c26a83f0dcb5414aa629ed9f14ccdd99ace33202a79d958484aac12abe70d5810895e31365fbd7ce829d34c8a48e22ebd037a955be7
-
Filesize
25KB
MD59f670566b87be47f09e3871cd67ed6d9
SHA18b49dd7fb4bf06df0a16cfc03a42832b78bdfabd
SHA256d7089602fa181dfd161165dc1bb34271e7481f88ee2ca06230da2a2269a68c80
SHA5126e53a2d3c4329114f7e562d84bcb6345176ce4d7006c9d699d6dab9886d5aa277b5b8fe5cfb9e574a49e0c1de6414efa913cf9b3ffecd95e9fafa28370fc2456
-
Filesize
23KB
MD57cd73270bd735f9fe77bc9278f9f2b8b
SHA1b27a898970297c750fb7e4d70ad8f87c1e6c1739
SHA256ee80340a02c0f96a3f9d01e635857d38d7b92444d6102ee29804f559f2eaa7f4
SHA5121fe70455d4d8c0fbab9ef20cf85d0de55fea9f18499c653af5d234462aa5c45eaacceadab39e9be62dc548af4f710362dd34970e1d8a666bf09fe4101bf32077
-
Filesize
209KB
MD5cb5376549056d659a798cb9dd7464ffc
SHA112e8955e0e155c2e57d78955ad0924917b37ccba
SHA256ab4707313627a925d7a67ee8acb04981d558f1ce2a110dea9ba8f02d15f8bc0a
SHA51212130446a1f3a6edd8c68c26a83f0dcb5414aa629ed9f14ccdd99ace33202a79d958484aac12abe70d5810895e31365fbd7ce829d34c8a48e22ebd037a955be7
-
Filesize
209KB
MD5cb5376549056d659a798cb9dd7464ffc
SHA112e8955e0e155c2e57d78955ad0924917b37ccba
SHA256ab4707313627a925d7a67ee8acb04981d558f1ce2a110dea9ba8f02d15f8bc0a
SHA51212130446a1f3a6edd8c68c26a83f0dcb5414aa629ed9f14ccdd99ace33202a79d958484aac12abe70d5810895e31365fbd7ce829d34c8a48e22ebd037a955be7
-
Filesize
209KB
MD5cb5376549056d659a798cb9dd7464ffc
SHA112e8955e0e155c2e57d78955ad0924917b37ccba
SHA256ab4707313627a925d7a67ee8acb04981d558f1ce2a110dea9ba8f02d15f8bc0a
SHA51212130446a1f3a6edd8c68c26a83f0dcb5414aa629ed9f14ccdd99ace33202a79d958484aac12abe70d5810895e31365fbd7ce829d34c8a48e22ebd037a955be7
-
Filesize
209KB
MD5cb5376549056d659a798cb9dd7464ffc
SHA112e8955e0e155c2e57d78955ad0924917b37ccba
SHA256ab4707313627a925d7a67ee8acb04981d558f1ce2a110dea9ba8f02d15f8bc0a
SHA51212130446a1f3a6edd8c68c26a83f0dcb5414aa629ed9f14ccdd99ace33202a79d958484aac12abe70d5810895e31365fbd7ce829d34c8a48e22ebd037a955be7
-
Filesize
1KB
MD507bd5d79e18651bb0758a150cca252da
SHA1bafab651d3a8c900041b7460c4b3d0db6a362e52
SHA25657c21ab757836c1979c5ea959cf760f7d2f88771ba6edfee4848f9f9bff6868a
SHA512ba627fbde74d1b18fc4644df86c6a4832910464c110a8fa29fa24818b630040799113ea73dd8af24644f5de19ec49dc97bbda557e1cbce6278974f0ef4c461b8
-
Filesize
4.8MB
MD5a21893776d4acf7921ca29637a232db1
SHA1a5d85fbb4781f7b8944eb20e60c62c55ed90cc14
SHA256134914aa5bdf7d226c01ebd6ef1be24ccf4d6bb203dad2a5a247901ee8d90f79
SHA512e598c3f789cda36d87d2e2d157eece5ae54c60564b4087f21a9bea47c22258c718141ad4f47d25b08680130d6b21bc08e9ae668378c862eade4cb5a4b959653c
-
Filesize
4.8MB
MD5a21893776d4acf7921ca29637a232db1
SHA1a5d85fbb4781f7b8944eb20e60c62c55ed90cc14
SHA256134914aa5bdf7d226c01ebd6ef1be24ccf4d6bb203dad2a5a247901ee8d90f79
SHA512e598c3f789cda36d87d2e2d157eece5ae54c60564b4087f21a9bea47c22258c718141ad4f47d25b08680130d6b21bc08e9ae668378c862eade4cb5a4b959653c
-
Filesize
60KB
MD51cf46c46969b3da7c921f538e1052d75
SHA155b4f1bf8834de7fcec5b964d4e207ab787d453a
SHA2568c1d6e5d024f1fa3f60323e3d7b2d76c4090f73aab9aca557b74edf58cb68a19
SHA51278de5976109b5351e68c28069cd543e667a6361ca9fe7e5b141b1979f94ec46e26389d2e1e871cd8259890ade477f90f29ca4a091968333bd8a4fbd8d820b2fc
-
Filesize
3.5MB
MD5c597ca48af580cb2755914474a787ddf
SHA1427cdbd19eadb94f1f89b51a7c3647a3ff7d3925
SHA2568c67a70fe070595fda6ec977af7da0085d40df299f04cdd5669156752fee3f31
SHA512c41ab851b712c484184934b2dab7015d329ec485b454b645411f69a97ef4a46351fe892f86522abf19c08cf1b7b6a5212954053b8218046cdfab24ef734e47ab
-
Filesize
470B
MD5557f0a02b3501eb4e60e5fba315b99ee
SHA14f259e938512bda39d0701ee46d06823fa654e15
SHA25613adbffe25952b222854ce31a71f71f5ffd885f91abcf912d3a9129be553a381
SHA512def43befeed26be88a4997a649192cffabe428b58f99d0d833b74c40ab1e409bd2c42633d6f7acb83b8939413becb1e4f8d01291d4a9333c383c48a407f9e90f
-
Filesize
1KB
MD5f42f2a2ee390bc203d1984162fd57a8f
SHA14cfad4d5561b33d6afcaf06a374ba8cc5b7da289
SHA25690d944e4a4aa77a6d376114db46b8b3b47fb7e46e7769d34c978c93ec27b0cd1
SHA512387f2b06a71bd2680b851c69812e9b3af4a41f15d0731d316b258f5453bfb24579dbee389573fbed9d1b775072daec16255ad541e8956608b2e7574de45d27f9
-
Filesize
427KB
MD57cb368867b63387e87ac8c43fda56652
SHA18337144cc4b0ac41f1c46fb822686d6c042988b4
SHA256e1c789a635b5037c07d3653d00e1bd4fc421a8142a9def49cd35e17bc3ba3472
SHA5122ed4333d01fe1b377c4131c7175d3547f677aa63f515b829d271d628ddde7c6172a50b9cf4032b2549f83f5e71e7434ab55c80a2fedd2df467c8a1778c1c5023
-
Filesize
13B
MD5b2a4bc176e9f29b0c439ef9a53a62a1a
SHA11ae520cbbf7e14af867232784194366b3d1c3f34
SHA2567b4f72a40bd21934680f085afe8a30bf85acff1a8365af43102025c4ccf52b73
SHA512e04b85d8d45d43479abbbe34f57265b64d1d325753ec3d2ecadb5f83fa5822b1d999b39571801ca39fa32e4a0a7caab073ccd003007e5b86dac7b1c892a5de3f
-
Filesize
62KB
MD57185e716980842db27c3b3a88e1fe804
SHA1e4615379cd4797629b4cc3da157f4d4a5412fb2b
SHA256094754a618b102b7ad0800dd4c9c02c882cf2d1e7996ba864f422fa4312427e1
SHA512dea331907f5f1de407ca07e24be7ad808fa43a0eef2d1b5009721f937ab2a8f77832e332d5ac3d9662e5b02ecaabbec0f4228af279fa6562be4dccb6c829246c
-
Filesize
697B
MD5bdcd60d0f8f1a5c5541b99599702de47
SHA1e18d6ad9df2a91c55f90c725fb0a5885cef369bc
SHA256c4975a51f52c7e43048be7ca33fca70869ad84845a489967ab7c93d4be28cf3c
SHA512c98abf7754f78d171e18e5ca3ba8fb25f4793b02bc1f3f43ecf626c1c4f80f28f9ebec95b2ff4548235db7dbe4f15338623b3259ca73feade3bca6ff76bf3e76