Analysis
-
max time kernel
183s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe
Resource
win10v2004-20221111-en
General
-
Target
704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe
-
Size
320KB
-
MD5
e3ac19cdbcc42b240148d8b91594244a
-
SHA1
1249ee516c74cc71771e27ac1e3f02d722fb1112
-
SHA256
704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a
-
SHA512
b2cf2461fb8b323aefdfec609888277d8a92a75837abf641ed4f7725d5e09157bc6ec24268d202753a9949176b7720bbf53630a10a06f33cc2aac56380497da2
-
SSDEEP
6144:rTwEo1IV3puaibGKFHi0mofhaH05kipz016580bHFMdkhq86JQPDHDdx/QtqR:fCgvmzFHi0mo5aH0qMzd5807F7qPJQPx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yhnobgs.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yhnobgs.exe -
Adds policy Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\axrghaaooehmkzuryxolf.exe" yhnobgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "xpeokytcxiggzjzr.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exnyvkgqmyxysdunq.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "axrghaaooehmkzuryxolf.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhaoogfsrgimjxrntrhd.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "nhykiyvgdqqsnzrlpl.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\axrghaaooehmkzuryxolf.exe" yhnobgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "axrghaaooehmkzuryxolf.exe" yhnobgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "lhaoogfsrgimjxrntrhd.exe" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xpeokytcxiggzjzr.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhykiyvgdqqsnzrlpl.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "ytlyxomywklokxqlqnc.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhykiyvgdqqsnzrlpl.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "nhykiyvgdqqsnzrlpl.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ytlyxomywklokxqlqnc.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exnyvkgqmyxysdunq.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "exnyvkgqmyxysdunq.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\axrghaaooehmkzuryxolf.exe" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "ytlyxomywklokxqlqnc.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhaoogfsrgimjxrntrhd.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "exnyvkgqmyxysdunq.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xpeokytcxiggzjzr.exe" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ytlyxomywklokxqlqnc.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pfsaugzgziectb = "xpeokytcxiggzjzr.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sfpulukoekd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xpeokytcxiggzjzr.exe" yhnobgs.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhnobgs.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhnobgs.exe -
Executes dropped EXE 2 IoCs
pid Process 1776 yhnobgs.exe 3024 yhnobgs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xpeokytcxiggzjzr = "exnyvkgqmyxysdunq.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xpeokytcxiggzjzr.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sjxgboiqkurqirg = "exnyvkgqmyxysdunq.exe" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\exnyvkgqmyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhykiyvgdqqsnzrlpl.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xpeokytcxiggzjzr = "xpeokytcxiggzjzr.exe ." yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "ytlyxomywklokxqlqnc.exe" yhnobgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "nhykiyvgdqqsnzrlpl.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "xpeokytcxiggzjzr.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exnyvkgqmyxysdunq.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "exnyvkgqmyxysdunq.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xpeokytcxiggzjzr.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "exnyvkgqmyxysdunq.exe ." yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "nhykiyvgdqqsnzrlpl.exe ." yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\exnyvkgqmyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhaoogfsrgimjxrntrhd.exe ." yhnobgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\exnyvkgqmyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhaoogfsrgimjxrntrhd.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\axrghaaooehmkzuryxolf.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhaoogfsrgimjxrntrhd.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhykiyvgdqqsnzrlpl.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\axrghaaooehmkzuryxolf.exe" yhnobgs.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sjxgboiqkurqirg = "xpeokytcxiggzjzr.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhaoogfsrgimjxrntrhd.exe" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xpeokytcxiggzjzr.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhaoogfsrgimjxrntrhd.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhykiyvgdqqsnzrlpl.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sjxgboiqkurqirg = "lhaoogfsrgimjxrntrhd.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "lhaoogfsrgimjxrntrhd.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "ytlyxomywklokxqlqnc.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sjxgboiqkurqirg = "lhaoogfsrgimjxrntrhd.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "nhykiyvgdqqsnzrlpl.exe" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nhykiyvgdqqsnzrlpl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\axrghaaooehmkzuryxolf.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nhykiyvgdqqsnzrlpl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exnyvkgqmyxysdunq.exe" yhnobgs.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\exnyvkgqmyxysdunq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xpeokytcxiggzjzr.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sjxgboiqkurqirg = "exnyvkgqmyxysdunq.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nhykiyvgdqqsnzrlpl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhykiyvgdqqsnzrlpl.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\axrghaaooehmkzuryxolf.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "ytlyxomywklokxqlqnc.exe ." yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "axrghaaooehmkzuryxolf.exe ." yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nhykiyvgdqqsnzrlpl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ytlyxomywklokxqlqnc.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nhykiyvgdqqsnzrlpl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xpeokytcxiggzjzr.exe" yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nhykiyvgdqqsnzrlpl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\axrghaaooehmkzuryxolf.exe" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exnyvkgqmyxysdunq.exe ." yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nhykiyvgdqqsnzrlpl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exnyvkgqmyxysdunq.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xpeokytcxiggzjzr = "ytlyxomywklokxqlqnc.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xpeokytcxiggzjzr = "exnyvkgqmyxysdunq.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xpeokytcxiggzjzr.exe ." yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nhykiyvgdqqsnzrlpl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ytlyxomywklokxqlqnc.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lhaoogfsrgimjxrntrhd.exe ." yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "nhykiyvgdqqsnzrlpl.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xpeokytcxiggzjzr = "lhaoogfsrgimjxrntrhd.exe ." yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sjxgboiqkurqirg = "axrghaaooehmkzuryxolf.exe" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sjxgboiqkurqirg = "ytlyxomywklokxqlqnc.exe" yhnobgs.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xpeokytcxiggzjzr = "ytlyxomywklokxqlqnc.exe ." 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nhykiyvgdqqsnzrlpl.exe ." 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ytlyxomywklokxqlqnc.exe" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pdoumwnsjqkg = "xpeokytcxiggzjzr.exe" yhnobgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\xpeokytcxiggzjzr = "nhykiyvgdqqsnzrlpl.exe ." yhnobgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\odpwpasyqytqg = "exnyvkgqmyxysdunq.exe ." 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhnobgs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhnobgs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 www.showmyipaddress.com 52 whatismyip.everdot.org 56 whatismyip.everdot.org 57 whatismyipaddress.com 73 whatismyip.everdot.org -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rxayiktqzykyfdhndllruscenk.ses yhnobgs.exe File created C:\Windows\SysWOW64\rxayiktqzykyfdhndllruscenk.ses yhnobgs.exe File opened for modification C:\Windows\SysWOW64\sjxgboiqkurqirgxyrcthqlysauebasbqhibm.rav yhnobgs.exe File created C:\Windows\SysWOW64\sjxgboiqkurqirgxyrcthqlysauebasbqhibm.rav yhnobgs.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\rxayiktqzykyfdhndllruscenk.ses yhnobgs.exe File created C:\Program Files (x86)\rxayiktqzykyfdhndllruscenk.ses yhnobgs.exe File opened for modification C:\Program Files (x86)\sjxgboiqkurqirgxyrcthqlysauebasbqhibm.rav yhnobgs.exe File created C:\Program Files (x86)\sjxgboiqkurqirgxyrcthqlysauebasbqhibm.rav yhnobgs.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\sjxgboiqkurqirgxyrcthqlysauebasbqhibm.rav yhnobgs.exe File opened for modification C:\Windows\rxayiktqzykyfdhndllruscenk.ses yhnobgs.exe File created C:\Windows\rxayiktqzykyfdhndllruscenk.ses yhnobgs.exe File opened for modification C:\Windows\sjxgboiqkurqirgxyrcthqlysauebasbqhibm.rav yhnobgs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings yhnobgs.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings yhnobgs.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe 1776 yhnobgs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 yhnobgs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1776 yhnobgs.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1776 4692 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe 80 PID 4692 wrote to memory of 1776 4692 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe 80 PID 4692 wrote to memory of 1776 4692 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe 80 PID 4692 wrote to memory of 3024 4692 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe 81 PID 4692 wrote to memory of 3024 4692 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe 81 PID 4692 wrote to memory of 3024 4692 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe 81 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yhnobgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yhnobgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yhnobgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yhnobgs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" 704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhnobgs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yhnobgs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe"C:\Users\Admin\AppData\Local\Temp\704ed81fef1e76466aefc2345793d7ee7123411c5b51b702a9e5ffb582595c6a.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\yhnobgs.exe"C:\Users\Admin\AppData\Local\Temp\yhnobgs.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\yhnobgs.exe"C:\Users\Admin\AppData\Local\Temp\yhnobgs.exe" "-"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:3024
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD583e5be53e87b131a2bf3ad0af436db23
SHA1fd680d0e458902fb9078c736c9b8d65fc2d65729
SHA2562d05773673bddd6b53e1cef4869cffbe0c64c45c75154876e53c8290b722f7a6
SHA5126b8557f989cbd9cdfaae1f32c35f0321913a97903ae267d5c0f81a8572580fb4d93267183a515d24f59ffa70e4c2604f5f93d6811329699c4ba2ccd24cf60ade
-
Filesize
724KB
MD583e5be53e87b131a2bf3ad0af436db23
SHA1fd680d0e458902fb9078c736c9b8d65fc2d65729
SHA2562d05773673bddd6b53e1cef4869cffbe0c64c45c75154876e53c8290b722f7a6
SHA5126b8557f989cbd9cdfaae1f32c35f0321913a97903ae267d5c0f81a8572580fb4d93267183a515d24f59ffa70e4c2604f5f93d6811329699c4ba2ccd24cf60ade
-
Filesize
724KB
MD583e5be53e87b131a2bf3ad0af436db23
SHA1fd680d0e458902fb9078c736c9b8d65fc2d65729
SHA2562d05773673bddd6b53e1cef4869cffbe0c64c45c75154876e53c8290b722f7a6
SHA5126b8557f989cbd9cdfaae1f32c35f0321913a97903ae267d5c0f81a8572580fb4d93267183a515d24f59ffa70e4c2604f5f93d6811329699c4ba2ccd24cf60ade