Analysis
-
max time kernel
180s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 15:24
Static task
static1
Behavioral task
behavioral1
Sample
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe
Resource
win10v2004-20221111-en
General
-
Target
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe
-
Size
220KB
-
MD5
2ea298e3de674282287161deb27d936c
-
SHA1
067a80cc605cf9f7364577c8f0c89e233c4d60ff
-
SHA256
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f
-
SHA512
13bc03a2fcf52712b330a5ed76bc5e60a32253c06fe19c596b609784ebc3d07581be2f8269afae4ee888ea78172282e1d22c09eb52d129ec8ffa2eea9616cf8d
-
SSDEEP
3072:vgmUYGMmsKQO3Xkp6xphN2AvsBlOv5DsswJegdbcWo4xqeo6H4:vgrMXslvvv5D0QgLxqeo6
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/592-82-0x0000000040010000-0x000000004004C000-memory.dmp modiloader_stage2 behavioral1/memory/592-84-0x0000000040010000-0x000000004004C000-memory.dmp modiloader_stage2 behavioral1/memory/592-86-0x0000000040010000-0x000000004004C000-memory.dmp modiloader_stage2 -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components\{5ydrw6Md-Lv3B-RZaZ-btTU-4KvEQ7AsdPqN} 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components\{5ydrw6Md-Lv3B-RZaZ-btTU-4KvEQ7AsdPqN}\StubPath = "C:\\Windows\\system32\\msnglr32.exe" 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ydrw6Md-Lv3B-RZaZ-btTU-4KvEQ7AsdPqN} 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ydrw6Md-Lv3B-RZaZ-btTU-4KvEQ7AsdPqN}\StubPath = "C:\\Windows\\system32\\msnglr32.exe" 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe -
Processes:
resource yara_rule behavioral1/memory/1952-75-0x0000000040010000-0x000000004004C000-memory.dmp upx behavioral1/memory/592-82-0x0000000040010000-0x000000004004C000-memory.dmp upx behavioral1/memory/592-84-0x0000000040010000-0x000000004004C000-memory.dmp upx behavioral1/memory/592-86-0x0000000040010000-0x000000004004C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\4vh2mJ2Ru8 = "C:\\Windows\\system32\\msnglr32.exe" 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DI0bzpyTIbVdEMQ4Nbd = "C:\\Windows\\system32\\msnglr32.exe" 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe -
Drops file in System32 directory 3 IoCs
Processes:
cmd.exe4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exedescription ioc process File created C:\Windows\SysWOW64\msnglr32.exe cmd.exe File opened for modification C:\Windows\SysWOW64\msnglr32.exe cmd.exe File opened for modification C:\Windows\SysWOW64\msnglr32.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exedescription pid process target process PID 2016 set thread context of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe -
Drops file in Windows directory 1 IoCs
Processes:
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exedescription ioc process File opened for modification C:\Windows\lymmeledition_627C42E8\ServerLogs\Admin\27-11-2022 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exepid process 592 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exepid process 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exedescription pid process target process PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 2016 wrote to memory of 1952 2016 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe PID 1952 wrote to memory of 592 1952 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe 4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe"C:\Users\Admin\AppData\Local\Temp\4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exeC:\Users\Admin\AppData\Local\Temp\4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe"C:\Users\Admin\AppData\Local\Temp\4674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f.exe"3⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
PID:592 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RIryb.bat" "2⤵
- Drops file in System32 directory
PID:624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RIryb.batFilesize
195B
MD5db1ac1a3acb9f70fcc2b22b6ca6a82a2
SHA187e93e3c5f9722ed8bc606f175444953777a392c
SHA2563f39d93eaa37d5d02a528b8c6c705ee86151c3eaed33fa47566702b591b3e12f
SHA512b5fdd0390a4cd3cd88575cfe22d8aee7cfb5f6691c9e9256fd6036992b94a635503fe0ce1e65a27abee1277c2b4f3670df0f478bdea0bdfcef9a494b10ac95a9
-
C:\Windows\SysWOW64\msnglr32.exeFilesize
220KB
MD52ea298e3de674282287161deb27d936c
SHA1067a80cc605cf9f7364577c8f0c89e233c4d60ff
SHA2564674d9427c3cdd69013bdc0e654ce367378f475e7280f059408153fdd5e5218f
SHA51213bc03a2fcf52712b330a5ed76bc5e60a32253c06fe19c596b609784ebc3d07581be2f8269afae4ee888ea78172282e1d22c09eb52d129ec8ffa2eea9616cf8d
-
memory/592-72-0x0000000000000000-mapping.dmp
-
memory/592-86-0x0000000040010000-0x000000004004C000-memory.dmpFilesize
240KB
-
memory/592-84-0x0000000040010000-0x000000004004C000-memory.dmpFilesize
240KB
-
memory/592-79-0x0000000040010000-0x000000004004C000-memory.dmpFilesize
240KB
-
memory/592-82-0x0000000040010000-0x000000004004C000-memory.dmpFilesize
240KB
-
memory/624-76-0x0000000000000000-mapping.dmp
-
memory/1952-68-0x0000000076AE1000-0x0000000076AE3000-memory.dmpFilesize
8KB
-
memory/1952-81-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-56-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-69-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-66-0x0000000000406458-mapping.dmp
-
memory/1952-73-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-75-0x0000000040010000-0x000000004004C000-memory.dmpFilesize
240KB
-
memory/1952-67-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-65-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-63-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-62-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-61-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-60-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-59-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1952-57-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB