Analysis
-
max time kernel
216s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe
Resource
win10v2004-20220901-en
General
-
Target
72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe
-
Size
416KB
-
MD5
5b4f9b584c011a7ab9061f671151735e
-
SHA1
27b6c256a457a581f1b69473c471c0b648baacc0
-
SHA256
72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7
-
SHA512
c6f533d025b2f831e6e024d4d31fcbdc8858365d313c2f1a9400c931f96d3a2a38b0c5a5431c104a25c8ee48e7f2265f2b3160fbddd1505c5c14577ee3639470
-
SSDEEP
12288:gDLOhQiq/baOtDO5k+XWsJQrrUmhiK2thyHRU:gDuQiqjklWhiTyHRU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ynS4WJZ6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" duuis.exe -
Executes dropped EXE 6 IoCs
pid Process 524 ynS4WJZ6.exe 568 duuis.exe 1688 2aid.exe 1416 2aid.exe 1672 3aid.exe 1620 4aid.exe -
resource yara_rule behavioral1/memory/1416-83-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1416-85-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1416-86-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1416-90-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1416-91-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1416-92-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Loads dropped DLL 10 IoCs
pid Process 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 524 ynS4WJZ6.exe 524 ynS4WJZ6.exe 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /e" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /B" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /t" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /v" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /M" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /O" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /s" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /r" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /w" duuis.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ynS4WJZ6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /R" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /E" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /z" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /a" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /l" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /Z" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /I" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /S" ynS4WJZ6.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /j" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /T" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /g" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /u" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /Y" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /U" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /N" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /Q" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /H" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /V" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /k" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /S" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /L" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /p" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /P" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /n" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /C" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /X" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /D" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /i" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /J" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /f" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /q" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /o" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /W" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /F" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /y" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /d" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /A" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /m" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /h" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /K" duuis.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\duuis = "C:\\Users\\Admin\\duuis.exe /b" duuis.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1688 set thread context of 1416 1688 2aid.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 684 tasklist.exe 1976 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 524 ynS4WJZ6.exe 524 ynS4WJZ6.exe 1416 2aid.exe 568 duuis.exe 1416 2aid.exe 568 duuis.exe 568 duuis.exe 568 duuis.exe 1416 2aid.exe 1416 2aid.exe 1416 2aid.exe 568 duuis.exe 568 duuis.exe 568 duuis.exe 1416 2aid.exe 1416 2aid.exe 1416 2aid.exe 568 duuis.exe 568 duuis.exe 1416 2aid.exe 1416 2aid.exe 1416 2aid.exe 568 duuis.exe 1416 2aid.exe 1416 2aid.exe 568 duuis.exe 568 duuis.exe 1416 2aid.exe 1416 2aid.exe 1416 2aid.exe 568 duuis.exe 1416 2aid.exe 568 duuis.exe 1416 2aid.exe 1416 2aid.exe 568 duuis.exe 1416 2aid.exe 1416 2aid.exe 1416 2aid.exe 568 duuis.exe 1416 2aid.exe 568 duuis.exe 1416 2aid.exe 1416 2aid.exe 1416 2aid.exe 568 duuis.exe 1416 2aid.exe 568 duuis.exe 1416 2aid.exe 1416 2aid.exe 1416 2aid.exe 568 duuis.exe 1416 2aid.exe 1416 2aid.exe 1416 2aid.exe 1416 2aid.exe 568 duuis.exe 568 duuis.exe 1416 2aid.exe 1672 3aid.exe 1672 3aid.exe 1672 3aid.exe 1416 2aid.exe 1416 2aid.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1272 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 684 tasklist.exe Token: SeDebugPrivilege 1672 3aid.exe Token: SeDebugPrivilege 1672 3aid.exe Token: SeDebugPrivilege 1976 tasklist.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1272 Explorer.EXE 1272 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1272 Explorer.EXE 1272 Explorer.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 524 ynS4WJZ6.exe 568 duuis.exe 1688 2aid.exe 1620 4aid.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 892 wrote to memory of 524 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 28 PID 892 wrote to memory of 524 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 28 PID 892 wrote to memory of 524 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 28 PID 892 wrote to memory of 524 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 28 PID 524 wrote to memory of 568 524 ynS4WJZ6.exe 29 PID 524 wrote to memory of 568 524 ynS4WJZ6.exe 29 PID 524 wrote to memory of 568 524 ynS4WJZ6.exe 29 PID 524 wrote to memory of 568 524 ynS4WJZ6.exe 29 PID 524 wrote to memory of 1788 524 ynS4WJZ6.exe 30 PID 524 wrote to memory of 1788 524 ynS4WJZ6.exe 30 PID 524 wrote to memory of 1788 524 ynS4WJZ6.exe 30 PID 524 wrote to memory of 1788 524 ynS4WJZ6.exe 30 PID 1788 wrote to memory of 684 1788 cmd.exe 32 PID 1788 wrote to memory of 684 1788 cmd.exe 32 PID 1788 wrote to memory of 684 1788 cmd.exe 32 PID 1788 wrote to memory of 684 1788 cmd.exe 32 PID 892 wrote to memory of 1688 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 34 PID 892 wrote to memory of 1688 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 34 PID 892 wrote to memory of 1688 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 34 PID 892 wrote to memory of 1688 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 34 PID 1688 wrote to memory of 1416 1688 2aid.exe 35 PID 1688 wrote to memory of 1416 1688 2aid.exe 35 PID 1688 wrote to memory of 1416 1688 2aid.exe 35 PID 1688 wrote to memory of 1416 1688 2aid.exe 35 PID 1688 wrote to memory of 1416 1688 2aid.exe 35 PID 1688 wrote to memory of 1416 1688 2aid.exe 35 PID 1688 wrote to memory of 1416 1688 2aid.exe 35 PID 1688 wrote to memory of 1416 1688 2aid.exe 35 PID 892 wrote to memory of 1672 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 36 PID 892 wrote to memory of 1672 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 36 PID 892 wrote to memory of 1672 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 36 PID 892 wrote to memory of 1672 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 36 PID 1672 wrote to memory of 1272 1672 3aid.exe 15 PID 892 wrote to memory of 1620 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 37 PID 892 wrote to memory of 1620 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 37 PID 892 wrote to memory of 1620 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 37 PID 892 wrote to memory of 1620 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 37 PID 892 wrote to memory of 1220 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 38 PID 892 wrote to memory of 1220 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 38 PID 892 wrote to memory of 1220 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 38 PID 892 wrote to memory of 1220 892 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe 38 PID 1220 wrote to memory of 1976 1220 cmd.exe 40 PID 1220 wrote to memory of 1976 1220 cmd.exe 40 PID 1220 wrote to memory of 1976 1220 cmd.exe 40 PID 1220 wrote to memory of 1976 1220 cmd.exe 40
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe"C:\Users\Admin\AppData\Local\Temp\72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\ynS4WJZ6.exeC:\Users\Admin\ynS4WJZ6.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\duuis.exe"C:\Users\Admin\duuis.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del ynS4WJZ6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
-
-
C:\Users\Admin\2aid.exeC:\Users\Admin\2aid.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\2aid.exe"C:\Users\Admin\2aid.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
-
C:\Users\Admin\3aid.exeC:\Users\Admin\3aid.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672
-
-
C:\Users\Admin\4aid.exeC:\Users\Admin\4aid.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 72a107ff2e1a5090420e5ca0afee1dc92b465f9368549bdf613e1f39670011a7.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5bfd48191f79f45416e67efe6a8f25d5d
SHA1ae31da442af2fe6ef7f960c3a50a3250baeafd8e
SHA2568271c7ff81aeb4d60ddf9b7c6c5c7e9a391324b999184f79bac6fcd411f804f5
SHA5122b2ff2c152e6ddf98d5e1043b456f080178a61413aa37a12166759a32a7b8ae98e8adcd90c76d4601c7da1334589fe93e4691e51f90dac70d74e954d06a246b8
-
Filesize
72KB
MD5bfd48191f79f45416e67efe6a8f25d5d
SHA1ae31da442af2fe6ef7f960c3a50a3250baeafd8e
SHA2568271c7ff81aeb4d60ddf9b7c6c5c7e9a391324b999184f79bac6fcd411f804f5
SHA5122b2ff2c152e6ddf98d5e1043b456f080178a61413aa37a12166759a32a7b8ae98e8adcd90c76d4601c7da1334589fe93e4691e51f90dac70d74e954d06a246b8
-
Filesize
72KB
MD5bfd48191f79f45416e67efe6a8f25d5d
SHA1ae31da442af2fe6ef7f960c3a50a3250baeafd8e
SHA2568271c7ff81aeb4d60ddf9b7c6c5c7e9a391324b999184f79bac6fcd411f804f5
SHA5122b2ff2c152e6ddf98d5e1043b456f080178a61413aa37a12166759a32a7b8ae98e8adcd90c76d4601c7da1334589fe93e4691e51f90dac70d74e954d06a246b8
-
Filesize
208KB
MD5914c8e336d83ca18bde8ec3d6dd5d852
SHA185fd8a4c0114a421d05ca78be872def090b217b8
SHA2560061ffc16cd3615e7d30f22a69d65642cb13f55a357da9f379ebe904168bbe5e
SHA512578e6b94bf576359daf96cc097c5798c9a1b8f3a47ba3f4f0707503ce32f78fafb6f0540a95f2ba311223e14be8f192468a4f3c644fe9cff9198e8ead92c0673
-
Filesize
44KB
MD527ddac23e41b3aba1371229bc3114ebe
SHA170e7b60767a38a27d22b03415006c5a265fe5e93
SHA256afa5e7176ef811c85155cb18eed520d12c1bedc2c3e3e1775a197c8a687e3614
SHA512e18dc372eff827a6590c3ff9a83d428ce2fef6682b9a0ddf667489f5d148472b6f9f6239c4df68eae43c377a4c1f633c45221902044288cdbfdf20708cdd1ebd
-
Filesize
292KB
MD5026600a19748e6dd85e0b2131e8114a3
SHA115f84f9e18becfad8373def242e2d17c17025c57
SHA256b08c4492fc204b50c3f98ca0f27c356e3f6bd8d29631dde67d4eef12bc57bad4
SHA5120c182872ffc237e74125a1692a7d260c44d6a2b76e9ede331b93ec70078498ebb2b0560cab57a4fd1835f4ec6143a7cc8be1652ea85f066947a70cfe74d5f42b
-
Filesize
292KB
MD5026600a19748e6dd85e0b2131e8114a3
SHA115f84f9e18becfad8373def242e2d17c17025c57
SHA256b08c4492fc204b50c3f98ca0f27c356e3f6bd8d29631dde67d4eef12bc57bad4
SHA5120c182872ffc237e74125a1692a7d260c44d6a2b76e9ede331b93ec70078498ebb2b0560cab57a4fd1835f4ec6143a7cc8be1652ea85f066947a70cfe74d5f42b
-
Filesize
292KB
MD5b336ee551b4c80dde9f97aec73ea26bd
SHA1fb0be70476d28d89187b369bf73a98fb040d9c0b
SHA256a381f7f881ff01be2dda54067ea7e182044f130b7a69c339968262ec90180649
SHA5125348846868a3f257c692dda8dfd9b7ddb0a39053de8f2b521dce7964139dbd07f5a5108a2186c491a152d932da8355b98d39babeec712175d9caeb0633784a52
-
Filesize
292KB
MD5b336ee551b4c80dde9f97aec73ea26bd
SHA1fb0be70476d28d89187b369bf73a98fb040d9c0b
SHA256a381f7f881ff01be2dda54067ea7e182044f130b7a69c339968262ec90180649
SHA5125348846868a3f257c692dda8dfd9b7ddb0a39053de8f2b521dce7964139dbd07f5a5108a2186c491a152d932da8355b98d39babeec712175d9caeb0633784a52
-
Filesize
72KB
MD5bfd48191f79f45416e67efe6a8f25d5d
SHA1ae31da442af2fe6ef7f960c3a50a3250baeafd8e
SHA2568271c7ff81aeb4d60ddf9b7c6c5c7e9a391324b999184f79bac6fcd411f804f5
SHA5122b2ff2c152e6ddf98d5e1043b456f080178a61413aa37a12166759a32a7b8ae98e8adcd90c76d4601c7da1334589fe93e4691e51f90dac70d74e954d06a246b8
-
Filesize
72KB
MD5bfd48191f79f45416e67efe6a8f25d5d
SHA1ae31da442af2fe6ef7f960c3a50a3250baeafd8e
SHA2568271c7ff81aeb4d60ddf9b7c6c5c7e9a391324b999184f79bac6fcd411f804f5
SHA5122b2ff2c152e6ddf98d5e1043b456f080178a61413aa37a12166759a32a7b8ae98e8adcd90c76d4601c7da1334589fe93e4691e51f90dac70d74e954d06a246b8
-
Filesize
208KB
MD5914c8e336d83ca18bde8ec3d6dd5d852
SHA185fd8a4c0114a421d05ca78be872def090b217b8
SHA2560061ffc16cd3615e7d30f22a69d65642cb13f55a357da9f379ebe904168bbe5e
SHA512578e6b94bf576359daf96cc097c5798c9a1b8f3a47ba3f4f0707503ce32f78fafb6f0540a95f2ba311223e14be8f192468a4f3c644fe9cff9198e8ead92c0673
-
Filesize
208KB
MD5914c8e336d83ca18bde8ec3d6dd5d852
SHA185fd8a4c0114a421d05ca78be872def090b217b8
SHA2560061ffc16cd3615e7d30f22a69d65642cb13f55a357da9f379ebe904168bbe5e
SHA512578e6b94bf576359daf96cc097c5798c9a1b8f3a47ba3f4f0707503ce32f78fafb6f0540a95f2ba311223e14be8f192468a4f3c644fe9cff9198e8ead92c0673
-
Filesize
44KB
MD527ddac23e41b3aba1371229bc3114ebe
SHA170e7b60767a38a27d22b03415006c5a265fe5e93
SHA256afa5e7176ef811c85155cb18eed520d12c1bedc2c3e3e1775a197c8a687e3614
SHA512e18dc372eff827a6590c3ff9a83d428ce2fef6682b9a0ddf667489f5d148472b6f9f6239c4df68eae43c377a4c1f633c45221902044288cdbfdf20708cdd1ebd
-
Filesize
44KB
MD527ddac23e41b3aba1371229bc3114ebe
SHA170e7b60767a38a27d22b03415006c5a265fe5e93
SHA256afa5e7176ef811c85155cb18eed520d12c1bedc2c3e3e1775a197c8a687e3614
SHA512e18dc372eff827a6590c3ff9a83d428ce2fef6682b9a0ddf667489f5d148472b6f9f6239c4df68eae43c377a4c1f633c45221902044288cdbfdf20708cdd1ebd
-
Filesize
292KB
MD5026600a19748e6dd85e0b2131e8114a3
SHA115f84f9e18becfad8373def242e2d17c17025c57
SHA256b08c4492fc204b50c3f98ca0f27c356e3f6bd8d29631dde67d4eef12bc57bad4
SHA5120c182872ffc237e74125a1692a7d260c44d6a2b76e9ede331b93ec70078498ebb2b0560cab57a4fd1835f4ec6143a7cc8be1652ea85f066947a70cfe74d5f42b
-
Filesize
292KB
MD5026600a19748e6dd85e0b2131e8114a3
SHA115f84f9e18becfad8373def242e2d17c17025c57
SHA256b08c4492fc204b50c3f98ca0f27c356e3f6bd8d29631dde67d4eef12bc57bad4
SHA5120c182872ffc237e74125a1692a7d260c44d6a2b76e9ede331b93ec70078498ebb2b0560cab57a4fd1835f4ec6143a7cc8be1652ea85f066947a70cfe74d5f42b
-
Filesize
292KB
MD5b336ee551b4c80dde9f97aec73ea26bd
SHA1fb0be70476d28d89187b369bf73a98fb040d9c0b
SHA256a381f7f881ff01be2dda54067ea7e182044f130b7a69c339968262ec90180649
SHA5125348846868a3f257c692dda8dfd9b7ddb0a39053de8f2b521dce7964139dbd07f5a5108a2186c491a152d932da8355b98d39babeec712175d9caeb0633784a52
-
Filesize
292KB
MD5b336ee551b4c80dde9f97aec73ea26bd
SHA1fb0be70476d28d89187b369bf73a98fb040d9c0b
SHA256a381f7f881ff01be2dda54067ea7e182044f130b7a69c339968262ec90180649
SHA5125348846868a3f257c692dda8dfd9b7ddb0a39053de8f2b521dce7964139dbd07f5a5108a2186c491a152d932da8355b98d39babeec712175d9caeb0633784a52