Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 18:23
Behavioral task
behavioral1
Sample
6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe
Resource
win10v2004-20221111-en
General
-
Target
6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe
-
Size
175KB
-
MD5
04507f09010f494cddd6e430d0f36df0
-
SHA1
32e1a730d3556e80e329107677a4b761fb21057a
-
SHA256
6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
-
SHA512
17e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
SSDEEP
3072:HUa4ujEO3O5dKr+mTN5wUyFVoEnsTtTkcagnaLnyE/ubLcPx2RyAPoDvhP4oB+Ra:Ku85Qrr4UA5cnswbgPxgyAPEvhPiRmwy
Malware Config
Signatures
-
Executes dropped EXE 19 IoCs
pid Process 548 oshell32.exe 2452 oshell32.exe 4848 oshell32.exe 2812 oshell32.exe 1560 oshell32.exe 2536 oshell32.exe 4880 oshell32.exe 2732 oshell32.exe 3552 oshell32.exe 3960 oshell32.exe 440 oshell32.exe 4536 oshell32.exe 456 oshell32.exe 2252 oshell32.exe 4348 oshell32.exe 4488 oshell32.exe 1468 oshell32.exe 1552 oshell32.exe 3028 oshell32.exe -
resource yara_rule behavioral2/memory/3092-132-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/3092-133-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-135.dat upx behavioral2/files/0x0007000000022e0f-136.dat upx behavioral2/memory/3092-137-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/548-138-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-140.dat upx behavioral2/memory/548-141-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/2452-142-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-144.dat upx behavioral2/memory/2452-145-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4848-146-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4848-147-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-149.dat upx behavioral2/memory/4848-150-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/2812-151-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-153.dat upx behavioral2/memory/2812-154-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/1560-155-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-157.dat upx behavioral2/memory/1560-158-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/2536-159-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-161.dat upx behavioral2/memory/2536-163-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4880-162-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-165.dat upx behavioral2/memory/4880-166-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/2732-167-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-169.dat upx behavioral2/memory/2732-170-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/3552-171-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-173.dat upx behavioral2/memory/3552-174-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/3960-175-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-177.dat upx behavioral2/memory/3960-178-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/440-179-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-181.dat upx behavioral2/memory/4536-182-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/440-183-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4536-184-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-186.dat upx behavioral2/memory/4536-187-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/456-188-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-190.dat upx behavioral2/memory/456-191-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/2252-192-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-194.dat upx behavioral2/memory/2252-195-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4348-196-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4348-199-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-198.dat upx behavioral2/memory/4488-200-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4488-201-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-203.dat upx behavioral2/memory/4488-204-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/1468-205-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-207.dat upx behavioral2/memory/1468-208-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/1552-209-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000022e0f-211.dat upx -
Checks computer location settings 2 TTPs 19 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation oshell32.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe 6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe 6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File created C:\Windows\SysWOW64\oshell32.exe oshell32.exe File opened for modification C:\Windows\SysWOW64\oshell32.exe oshell32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ oshell32.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 548 oshell32.exe 548 oshell32.exe 2452 oshell32.exe 2452 oshell32.exe 4848 oshell32.exe 4848 oshell32.exe 2812 oshell32.exe 2812 oshell32.exe 1560 oshell32.exe 1560 oshell32.exe 2536 oshell32.exe 2536 oshell32.exe 4880 oshell32.exe 4880 oshell32.exe 2732 oshell32.exe 2732 oshell32.exe 3552 oshell32.exe 3552 oshell32.exe 3960 oshell32.exe 3960 oshell32.exe 440 oshell32.exe 440 oshell32.exe 4536 oshell32.exe 4536 oshell32.exe 456 oshell32.exe 456 oshell32.exe 2252 oshell32.exe 2252 oshell32.exe 4348 oshell32.exe 4348 oshell32.exe 4488 oshell32.exe 4488 oshell32.exe 1468 oshell32.exe 1468 oshell32.exe 1552 oshell32.exe 1552 oshell32.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 3092 wrote to memory of 548 3092 6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe 83 PID 3092 wrote to memory of 548 3092 6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe 83 PID 3092 wrote to memory of 548 3092 6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe 83 PID 548 wrote to memory of 2452 548 oshell32.exe 84 PID 548 wrote to memory of 2452 548 oshell32.exe 84 PID 548 wrote to memory of 2452 548 oshell32.exe 84 PID 2452 wrote to memory of 4848 2452 oshell32.exe 87 PID 2452 wrote to memory of 4848 2452 oshell32.exe 87 PID 2452 wrote to memory of 4848 2452 oshell32.exe 87 PID 4848 wrote to memory of 2812 4848 oshell32.exe 88 PID 4848 wrote to memory of 2812 4848 oshell32.exe 88 PID 4848 wrote to memory of 2812 4848 oshell32.exe 88 PID 2812 wrote to memory of 1560 2812 oshell32.exe 89 PID 2812 wrote to memory of 1560 2812 oshell32.exe 89 PID 2812 wrote to memory of 1560 2812 oshell32.exe 89 PID 1560 wrote to memory of 2536 1560 oshell32.exe 90 PID 1560 wrote to memory of 2536 1560 oshell32.exe 90 PID 1560 wrote to memory of 2536 1560 oshell32.exe 90 PID 2536 wrote to memory of 4880 2536 oshell32.exe 91 PID 2536 wrote to memory of 4880 2536 oshell32.exe 91 PID 2536 wrote to memory of 4880 2536 oshell32.exe 91 PID 4880 wrote to memory of 2732 4880 oshell32.exe 92 PID 4880 wrote to memory of 2732 4880 oshell32.exe 92 PID 4880 wrote to memory of 2732 4880 oshell32.exe 92 PID 2732 wrote to memory of 3552 2732 oshell32.exe 94 PID 2732 wrote to memory of 3552 2732 oshell32.exe 94 PID 2732 wrote to memory of 3552 2732 oshell32.exe 94 PID 3552 wrote to memory of 3960 3552 oshell32.exe 95 PID 3552 wrote to memory of 3960 3552 oshell32.exe 95 PID 3552 wrote to memory of 3960 3552 oshell32.exe 95 PID 3960 wrote to memory of 440 3960 oshell32.exe 96 PID 3960 wrote to memory of 440 3960 oshell32.exe 96 PID 3960 wrote to memory of 440 3960 oshell32.exe 96 PID 440 wrote to memory of 4536 440 oshell32.exe 97 PID 440 wrote to memory of 4536 440 oshell32.exe 97 PID 440 wrote to memory of 4536 440 oshell32.exe 97 PID 4536 wrote to memory of 456 4536 oshell32.exe 98 PID 4536 wrote to memory of 456 4536 oshell32.exe 98 PID 4536 wrote to memory of 456 4536 oshell32.exe 98 PID 456 wrote to memory of 2252 456 oshell32.exe 99 PID 456 wrote to memory of 2252 456 oshell32.exe 99 PID 456 wrote to memory of 2252 456 oshell32.exe 99 PID 2252 wrote to memory of 4348 2252 oshell32.exe 102 PID 2252 wrote to memory of 4348 2252 oshell32.exe 102 PID 2252 wrote to memory of 4348 2252 oshell32.exe 102 PID 4348 wrote to memory of 4488 4348 oshell32.exe 107 PID 4348 wrote to memory of 4488 4348 oshell32.exe 107 PID 4348 wrote to memory of 4488 4348 oshell32.exe 107 PID 4488 wrote to memory of 1468 4488 oshell32.exe 108 PID 4488 wrote to memory of 1468 4488 oshell32.exe 108 PID 4488 wrote to memory of 1468 4488 oshell32.exe 108 PID 1468 wrote to memory of 1552 1468 oshell32.exe 111 PID 1468 wrote to memory of 1552 1468 oshell32.exe 111 PID 1468 wrote to memory of 1552 1468 oshell32.exe 111 PID 1552 wrote to memory of 3028 1552 oshell32.exe 113 PID 1552 wrote to memory of 3028 1552 oshell32.exe 113 PID 1552 wrote to memory of 3028 1552 oshell32.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe"C:\Users\Admin\AppData\Local\Temp\6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Users\Admin\AppData\Local\Temp\6b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"8⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"10⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"11⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"12⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"13⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"14⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"15⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"16⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"17⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"18⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"19⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\oshell32.exe"C:\Windows\system32\oshell32.exe" \erit "C:\Windows\SysWOW64\oshell32.exe"20⤵
- Executes dropped EXE
PID:3028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684
-
Filesize
175KB
MD504507f09010f494cddd6e430d0f36df0
SHA132e1a730d3556e80e329107677a4b761fb21057a
SHA2566b53f487e2301b39f155c1b4c081087c2990891453f68f2aa30af73f6713d8cd
SHA51217e21bf1e6ecb3909b042af120ae2de195851b55fb6c8179b1de7183bdc9e1ce50c3277548221808763ea2c22e356ea5cf7710403c659114a73858fa120cb684