Analysis
-
max time kernel
76s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 17:55
Static task
static1
Behavioral task
behavioral1
Sample
d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe
-
Size
484KB
-
MD5
13ffce8662080c941703c4cf419d6344
-
SHA1
61fc1a13276febbdfe8ec708ebcd25aea28d5a9f
-
SHA256
d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88
-
SHA512
445ececa5903c6f07d02997cb72db5d87ae828f5b03751a8112781d1f3ec3ce4c4d2de5a6bbba09ad86e24b5400c145bdb535892f07a148d097692f16b48eb9a
-
SSDEEP
12288:bMz65QZEomA/fOdveGWeMK2p/VEGbvdVCR8vfy7uv:ozyGP7fOZPWew/VEGZVC6R
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 1712 bcdedit.exe 1532 bcdedit.exe 1668 bcdedit.exe 1676 bcdedit.exe 964 bcdedit.exe 680 bcdedit.exe 1708 bcdedit.exe 384 bcdedit.exe 1252 bcdedit.exe 820 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
linip.exedescription ioc process File created C:\Windows\system32\drivers\6c406b.sys linip.exe -
Executes dropped EXE 2 IoCs
Processes:
linip.exelinip.exepid process 1100 linip.exe 1188 linip.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 324 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exelinip.exepid process 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe 1100 linip.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
linip.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run linip.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Linip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Hodovo\\linip.exe" linip.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exelinip.exedescription pid process target process PID 1672 set thread context of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 1100 set thread context of 1188 1100 linip.exe linip.exe -
Modifies registry class 32 IoCs
Processes:
linip.exed63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command linip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Hodovo\\linip.exe /pt \"%1\" \"%2\" \"%3\" \"%4\"" linip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D63A2B~1.EXE /pt \"%1\" \"%2\" \"%3\" \"%4\"" d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew linip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew\NullFile linip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\ = "Matrix Document" d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Hodovo\\linip.exe,0" linip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Hodovo\\linip.exe \"%1\"" linip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max linip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon linip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command linip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command linip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document linip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\ = "Matrix Document" linip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ = "Matrix.Document" linip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D63A2B~1.EXE \"%1\"" d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto\command d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ShellNew\NullFile d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D63A2B~1.EXE,0" d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\printto d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.max\ = "Matrix.Document" d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\open\command d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D63A2B~1.EXE /p \"%1\"" d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Matrix.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Hodovo\\linip.exe /p \"%1\"" linip.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exed63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exelinip.exelinip.exepid process 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe 1100 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe 1188 linip.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
linip.exedescription pid process Token: SeShutdownPrivilege 1188 linip.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exelinip.exepid process 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe 1100 linip.exe 1100 linip.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exed63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exelinip.exelinip.exedescription pid process target process PID 1672 wrote to memory of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 1672 wrote to memory of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 1672 wrote to memory of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 1672 wrote to memory of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 1672 wrote to memory of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 1672 wrote to memory of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 1672 wrote to memory of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 1672 wrote to memory of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 1672 wrote to memory of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 1672 wrote to memory of 2020 1672 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe PID 2020 wrote to memory of 1100 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe linip.exe PID 2020 wrote to memory of 1100 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe linip.exe PID 2020 wrote to memory of 1100 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe linip.exe PID 2020 wrote to memory of 1100 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe linip.exe PID 1100 wrote to memory of 1188 1100 linip.exe linip.exe PID 1100 wrote to memory of 1188 1100 linip.exe linip.exe PID 1100 wrote to memory of 1188 1100 linip.exe linip.exe PID 1100 wrote to memory of 1188 1100 linip.exe linip.exe PID 1100 wrote to memory of 1188 1100 linip.exe linip.exe PID 1100 wrote to memory of 1188 1100 linip.exe linip.exe PID 1100 wrote to memory of 1188 1100 linip.exe linip.exe PID 1100 wrote to memory of 1188 1100 linip.exe linip.exe PID 1100 wrote to memory of 1188 1100 linip.exe linip.exe PID 1100 wrote to memory of 1188 1100 linip.exe linip.exe PID 2020 wrote to memory of 324 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe cmd.exe PID 2020 wrote to memory of 324 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe cmd.exe PID 2020 wrote to memory of 324 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe cmd.exe PID 2020 wrote to memory of 324 2020 d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe cmd.exe PID 1188 wrote to memory of 820 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 820 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 820 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 820 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1252 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1252 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1252 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1252 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 384 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 384 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 384 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 384 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1708 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1708 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1708 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1708 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 680 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 680 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 680 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 680 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1712 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1712 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1712 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1712 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 964 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 964 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 964 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 964 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1676 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1676 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1676 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1676 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1668 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1668 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1668 1188 linip.exe bcdedit.exe PID 1188 wrote to memory of 1668 1188 linip.exe bcdedit.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe"C:\Users\Admin\AppData\Local\Temp\d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exeC:\Users\Admin\AppData\Local\Temp\d63a2b5d1008c22d7ad41dbb6f1e31b3447f720bc2740dd0ec4df9b41d023e88.exe3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Hodovo\linip.exe"C:\Users\Admin\AppData\Local\Temp\Hodovo\linip.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Hodovo\linip.exeC:\Users\Admin\AppData\Local\Temp\Hodovo\linip.exe5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1712 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1532 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1668 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1676 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:964 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:680 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1708 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:384 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:1252 -
C:\Windows\system32\bcdedit.exebcdedit.exe -set TESTSIGNING ON6⤵
- Modifies boot configuration data using bcdedit
PID:820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TJRDB22.bat"4⤵
- Deletes itself
PID:324
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1224
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1648
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5d5f52704e61c0afbc66bb79f2f70469b
SHA109353844c991423b6215d9d6b91c01713c619425
SHA256b882334ea7c9b42566e0316b5f337600432b7fd59b125eb0caae451c6b711054
SHA51267f13efe57b3fe335fd33c5bb27891c39239e029009ae560b002bfa7f1c44b9fa0d0a947d49ea81960761fe52e1f72dc2bd34a8017b22a3b8346bdad11a2fa68
-
Filesize
484KB
MD5d5f52704e61c0afbc66bb79f2f70469b
SHA109353844c991423b6215d9d6b91c01713c619425
SHA256b882334ea7c9b42566e0316b5f337600432b7fd59b125eb0caae451c6b711054
SHA51267f13efe57b3fe335fd33c5bb27891c39239e029009ae560b002bfa7f1c44b9fa0d0a947d49ea81960761fe52e1f72dc2bd34a8017b22a3b8346bdad11a2fa68
-
Filesize
484KB
MD5d5f52704e61c0afbc66bb79f2f70469b
SHA109353844c991423b6215d9d6b91c01713c619425
SHA256b882334ea7c9b42566e0316b5f337600432b7fd59b125eb0caae451c6b711054
SHA51267f13efe57b3fe335fd33c5bb27891c39239e029009ae560b002bfa7f1c44b9fa0d0a947d49ea81960761fe52e1f72dc2bd34a8017b22a3b8346bdad11a2fa68
-
Filesize
284B
MD5337ecc9efcdaabf98949c6f11759a847
SHA19f62a57a3042ffcccfd7639c8a68df65e8a03833
SHA2569ca75ea263ab8fd22a04a18cf4296104e3706c241e9021ac856433e3c14d6897
SHA51260b48317e715e1ea49cad7aab2f06a17d8365b9cfb842796de3099641d4f99ab82edde0a0deab538b715ede08ff781d77c4e2145f28e0544f156051d16b9cbb2
-
Filesize
484KB
MD5d5f52704e61c0afbc66bb79f2f70469b
SHA109353844c991423b6215d9d6b91c01713c619425
SHA256b882334ea7c9b42566e0316b5f337600432b7fd59b125eb0caae451c6b711054
SHA51267f13efe57b3fe335fd33c5bb27891c39239e029009ae560b002bfa7f1c44b9fa0d0a947d49ea81960761fe52e1f72dc2bd34a8017b22a3b8346bdad11a2fa68
-
Filesize
484KB
MD5d5f52704e61c0afbc66bb79f2f70469b
SHA109353844c991423b6215d9d6b91c01713c619425
SHA256b882334ea7c9b42566e0316b5f337600432b7fd59b125eb0caae451c6b711054
SHA51267f13efe57b3fe335fd33c5bb27891c39239e029009ae560b002bfa7f1c44b9fa0d0a947d49ea81960761fe52e1f72dc2bd34a8017b22a3b8346bdad11a2fa68
-
Filesize
484KB
MD5d5f52704e61c0afbc66bb79f2f70469b
SHA109353844c991423b6215d9d6b91c01713c619425
SHA256b882334ea7c9b42566e0316b5f337600432b7fd59b125eb0caae451c6b711054
SHA51267f13efe57b3fe335fd33c5bb27891c39239e029009ae560b002bfa7f1c44b9fa0d0a947d49ea81960761fe52e1f72dc2bd34a8017b22a3b8346bdad11a2fa68