Analysis
-
max time kernel
152s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe
Resource
win7-20220901-en
General
-
Target
8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe
-
Size
472KB
-
MD5
90bb128ec246bfaa7d2802a0e8665c98
-
SHA1
5c3061dd171ed870e3048665ad7374c2127918ad
-
SHA256
8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
-
SHA512
ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
SSDEEP
6144:Z5cAKFkSTQz3PSBA9pmMgKb6WL8q0bFTU+HgNdnpfJcifTQnJ4UB8q2Yj9:Z5crZ8z3PCpw6tdAvbnXTQnyU8DY
Malware Config
Extracted
cybergate
2.6
vítima
berkturkmen.zapto.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
system32
-
install_file
win32.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\win32.exe" win32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\system32\\win32.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\system32\\win32.exe" 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\system32\\win32.exe" 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\system32\\win32.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\SysWOW64\\system32\\win32.exe" win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\win32.exe" win32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\SysWOW64\\system32\\win32.exe" win32.exe -
Executes dropped EXE 12 IoCs
pid Process 1356 win32.exe 1980 win32.exe 2044 win32.exe 1192 win32.exe 1696 win32.exe 1768 win32.exe 1564 win32.exe 1660 win32.exe 1228 win32.exe 1824 win32.exe 964 win32.exe 976 win32.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK}\StubPath = "C:\\Windows\\system32\\system32\\win32.exe Restart" 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK} win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\win32.exe Restart" win32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK}\StubPath = "C:\\Windows\\system32\\system32\\win32.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK} win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK}\StubPath = "C:\\Windows\\SysWOW64\\system32\\win32.exe Restart" win32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK} 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe -
resource yara_rule behavioral1/memory/1596-57-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1596-60-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1596-62-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1596-67-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1596-68-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1596-69-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1596-71-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/1596-80-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1944-85-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1944-88-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1596-93-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1980-109-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1980-110-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1980-111-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1980-121-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1696-147-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1696-150-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1696-154-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1768-155-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1768-165-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/1768-171-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1660-183-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/1696-218-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1564-220-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/976-222-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/964-221-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/964-229-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/976-230-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1660-231-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/1564-232-0x0000000024010000-0x0000000024072000-memory.dmp upx -
Loads dropped DLL 13 IoCs
pid Process 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 1944 explorer.exe 1944 explorer.exe 1980 win32.exe 1980 win32.exe 1944 explorer.exe 1944 explorer.exe 1488 WerFault.exe 1488 WerFault.exe 1488 WerFault.exe 1488 WerFault.exe 1488 WerFault.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\system32\\win32.exe" 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\system32\\win32.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\win32.exe" win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\system32\\win32.exe" win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\system32\\win32.exe" win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\system32\\win32.exe" 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\system32\\win32.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run win32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run win32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\win32.exe" win32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system32\win32.exe 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe File created C:\Windows\SysWOW64\system32\win32.exe win32.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe File created C:\Windows\SysWOW64\system32\win32.exe win32.exe File created C:\Windows\SysWOW64\system32\win32.exe 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1604 set thread context of 1596 1604 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 27 PID 1356 set thread context of 1980 1356 win32.exe 30 PID 2044 set thread context of 1696 2044 win32.exe 33 PID 1192 set thread context of 1768 1192 win32.exe 34 PID 1824 set thread context of 964 1824 win32.exe 39 PID 1228 set thread context of 976 1228 win32.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1488 1564 WerFault.exe 35 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 1980 win32.exe 1696 win32.exe 1768 win32.exe 976 win32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1660 win32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1660 win32.exe Token: SeDebugPrivilege 1660 win32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 1980 win32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1604 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 1356 win32.exe 2044 win32.exe 1192 win32.exe 1824 win32.exe 1228 win32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1596 1604 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 27 PID 1604 wrote to memory of 1596 1604 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 27 PID 1604 wrote to memory of 1596 1604 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 27 PID 1604 wrote to memory of 1596 1604 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 27 PID 1604 wrote to memory of 1596 1604 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 27 PID 1604 wrote to memory of 1596 1604 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 27 PID 1604 wrote to memory of 1596 1604 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 27 PID 1604 wrote to memory of 1596 1604 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 27 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15 PID 1596 wrote to memory of 1232 1596 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe"C:\Users\Admin\AppData\Local\Temp\8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exeC:\Users\Admin\AppData\Local\Temp\8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
PID:1944 -
C:\Windows\SysWOW64\system32\win32.exe"C:\Windows\system32\system32\win32.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Windows\SysWOW64\system32\win32.exeC:\Windows\SysWOW64\system32\win32.exe6⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\system32\win32.exe"C:\Windows\SysWOW64\system32\win32.exe"7⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 4848⤵
- Loads dropped DLL
- Program crash
PID:1488
-
-
-
-
-
C:\Windows\SysWOW64\system32\win32.exe"C:\Windows\system32\system32\win32.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1228 -
C:\Windows\SysWOW64\system32\win32.exeC:\Windows\SysWOW64\system32\win32.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
-
-
C:\Windows\SysWOW64\system32\win32.exe"C:\Windows\system32\system32\win32.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\Windows\SysWOW64\system32\win32.exeC:\Windows\SysWOW64\system32\win32.exe5⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1980 -
C:\Users\Admin\AppData\Roaming\system32\win32.exe"C:\Users\Admin\AppData\Roaming\system32\win32.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1192 -
C:\Users\Admin\AppData\Roaming\system32\win32.exeC:\Users\Admin\AppData\Roaming\system32\win32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Users\Admin\AppData\Roaming\system32\win32.exe"C:\Users\Admin\AppData\Roaming\system32\win32.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1660 -
C:\Users\Admin\AppData\Roaming\system32\win32.exe"C:\Users\Admin\AppData\Roaming\system32\win32.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Users\Admin\AppData\Roaming\system32\win32.exeC:\Users\Admin\AppData\Roaming\system32\win32.exe10⤵
- Executes dropped EXE
PID:964
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD52ef5c3c573781e3e5ed7a4f36ca2c199
SHA1b1b65a4bc9ee24defef45eb329bc61ccdd714e67
SHA256594877718ebcda252df3af88dc3d5c9c02d7bf583fefe8b50ecb42f922676ff0
SHA51211ecc4536d4ea4cd558e395dab5da755496f745d38c6d2094f4692939cd74f42c46afcfbac201db0ef893bb5f1956e4d90a92ef999287d4a7e5d12ac77ff4819
-
Filesize
229KB
MD52ef5c3c573781e3e5ed7a4f36ca2c199
SHA1b1b65a4bc9ee24defef45eb329bc61ccdd714e67
SHA256594877718ebcda252df3af88dc3d5c9c02d7bf583fefe8b50ecb42f922676ff0
SHA51211ecc4536d4ea4cd558e395dab5da755496f745d38c6d2094f4692939cd74f42c46afcfbac201db0ef893bb5f1956e4d90a92ef999287d4a7e5d12ac77ff4819
-
Filesize
229KB
MD56d39e0ecac0b4983b03055eac30007c7
SHA169c041bd286cd83118d70d4000e6d343f16933d2
SHA256580ce1da5ed1d9140179d7e50035e1fcb4bb52f9a2651b7015a2bbf31a1b3a79
SHA512ed731bad8e5c6340b6dc91a1e338614eca6d99a3a276aa1d1b200fff52a30fbe94a9bb214ab7488ce8546db98ef7ac2b46c3622fe2d58ec3fac0e504043651dd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4063495947-34355257-727531523-1000\88603cb2913a7df3fbd16b5f958e6447_8e28fefd-2db0-4dd4-85d7-665f2cf2c74b
Filesize51B
MD55fc2ac2a310f49c14d195230b91a8885
SHA190855cc11136ba31758fe33b5cf9571f9a104879
SHA256374e0e2897a7a82e0e44794cad89df0f3cdd7703886239c1fe06d625efd48092
SHA512ab46554df9174b9fe9beba50a640f67534c3812f64d96a1fb8adfdc136dfe730ca2370825cd45b7f87a544d6a58dd868cb5a3a7f42e2789f6d679dbc0fdd52c3
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850