Analysis
-
max time kernel
158s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe
Resource
win7-20220901-en
General
-
Target
8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe
-
Size
472KB
-
MD5
90bb128ec246bfaa7d2802a0e8665c98
-
SHA1
5c3061dd171ed870e3048665ad7374c2127918ad
-
SHA256
8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
-
SHA512
ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
SSDEEP
6144:Z5cAKFkSTQz3PSBA9pmMgKb6WL8q0bFTU+HgNdnpfJcifTQnJ4UB8q2Yj9:Z5crZ8z3PCpw6tdAvbnXTQnyU8DY
Malware Config
Extracted
cybergate
2.6
vítima
berkturkmen.zapto.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
system32
-
install_file
win32.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\system32\\win32.exe" 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\system32\\win32.exe" 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\SysWOW64\\system32\\win32.exe" win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\system32\\win32.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\system32\\win32.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\win32.exe" win32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\win32.exe" win32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\SysWOW64\\system32\\win32.exe" win32.exe -
Executes dropped EXE 9 IoCs
pid Process 1524 win32.exe 2928 win32.exe 316 win32.exe 1972 win32.exe 3676 win32.exe 60 win32.exe 1844 win32.exe 1956 win32.exe 1968 win32.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK} win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\win32.exe Restart" win32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK} win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK}\StubPath = "C:\\Windows\\SysWOW64\\system32\\win32.exe Restart" win32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK} 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK}\StubPath = "C:\\Windows\\system32\\system32\\win32.exe Restart" 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2M6524HK-08GG-1M4Y-H4QW-28EYB07SLTAK}\StubPath = "C:\\Windows\\system32\\system32\\win32.exe" explorer.exe -
resource yara_rule behavioral2/memory/2052-135-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2052-136-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2052-137-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2052-140-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2052-141-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2052-142-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2052-144-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/2052-149-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/4968-152-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/4968-155-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/2052-160-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/316-173-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/316-174-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/316-175-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1972-185-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/316-190-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1972-205-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/60-208-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/1972-209-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/60-216-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/1844-215-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1968-226-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/1968-227-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/60-228-0x0000000024010000-0x0000000024072000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation win32.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation win32.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\system32\\win32.exe" win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\system32\\win32.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\win32.exe" win32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\system32\\win32.exe" win32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run win32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\system32\\win32.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\system32\\win32.exe" 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\system32\\win32.exe" 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run win32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\system32\\win32.exe" win32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe File opened for modification C:\Windows\SysWOW64\system32\win32.exe win32.exe File created C:\Windows\SysWOW64\system32\win32.exe win32.exe File created C:\Windows\SysWOW64\system32\win32.exe win32.exe File created C:\Windows\SysWOW64\system32\win32.exe 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 5104 set thread context of 2052 5104 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 78 PID 1524 set thread context of 316 1524 win32.exe 82 PID 2928 set thread context of 1972 2928 win32.exe 83 PID 3676 set thread context of 1844 3676 win32.exe 86 PID 1956 set thread context of 1968 1956 win32.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 316 win32.exe 316 win32.exe 1972 win32.exe 1972 win32.exe 1844 win32.exe 1844 win32.exe 1968 win32.exe 1968 win32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 60 win32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 60 win32.exe Token: SeDebugPrivilege 60 win32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 316 win32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5104 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 1524 win32.exe 2928 win32.exe 3676 win32.exe 1956 win32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5104 wrote to memory of 2052 5104 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 78 PID 5104 wrote to memory of 2052 5104 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 78 PID 5104 wrote to memory of 2052 5104 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 78 PID 5104 wrote to memory of 2052 5104 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 78 PID 5104 wrote to memory of 2052 5104 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 78 PID 5104 wrote to memory of 2052 5104 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 78 PID 5104 wrote to memory of 2052 5104 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 78 PID 5104 wrote to memory of 2052 5104 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 78 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54 PID 2052 wrote to memory of 2824 2052 8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe"C:\Users\Admin\AppData\Local\Temp\8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exeC:\Users\Admin\AppData\Local\Temp\8425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:4968 -
C:\Windows\SysWOW64\system32\win32.exe"C:\Windows\system32\system32\win32.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Windows\SysWOW64\system32\win32.exeC:\Windows\SysWOW64\system32\win32.exe6⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1972 -
C:\Windows\SysWOW64\system32\win32.exe"C:\Windows\SysWOW64\system32\win32.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:60 -
C:\Windows\SysWOW64\system32\win32.exe"C:\Windows\SysWOW64\system32\win32.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Windows\SysWOW64\system32\win32.exeC:\Windows\SysWOW64\system32\win32.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
-
-
-
-
-
C:\Windows\SysWOW64\system32\win32.exe"C:\Windows\system32\system32\win32.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Windows\SysWOW64\system32\win32.exeC:\Windows\SysWOW64\system32\win32.exe5⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:316 -
C:\Users\Admin\AppData\Roaming\system32\win32.exe"C:\Users\Admin\AppData\Roaming\system32\win32.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3676 -
C:\Users\Admin\AppData\Roaming\system32\win32.exeC:\Users\Admin\AppData\Roaming\system32\win32.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD56d39e0ecac0b4983b03055eac30007c7
SHA169c041bd286cd83118d70d4000e6d343f16933d2
SHA256580ce1da5ed1d9140179d7e50035e1fcb4bb52f9a2651b7015a2bbf31a1b3a79
SHA512ed731bad8e5c6340b6dc91a1e338614eca6d99a3a276aa1d1b200fff52a30fbe94a9bb214ab7488ce8546db98ef7ac2b46c3622fe2d58ec3fac0e504043651dd
-
Filesize
229KB
MD50b2ca1f4e89a368f244afe45780cec69
SHA1909da69b95090aa2950f39bd0dc3b945eee5d960
SHA256e7edeff9a687bac8acfa119a0927e02340df15eeec0ef314b0f0154b03a6c026
SHA512d7ab8f3467393c077fa66c0f67b88b2e09239f4a85de90d0d4fd96d59ea02a4d3adbfaff8fd921a1e03c0db89e774eec53a40aa0bad215b807c04c9593af01fe
-
Filesize
229KB
MD50b2ca1f4e89a368f244afe45780cec69
SHA1909da69b95090aa2950f39bd0dc3b945eee5d960
SHA256e7edeff9a687bac8acfa119a0927e02340df15eeec0ef314b0f0154b03a6c026
SHA512d7ab8f3467393c077fa66c0f67b88b2e09239f4a85de90d0d4fd96d59ea02a4d3adbfaff8fd921a1e03c0db89e774eec53a40aa0bad215b807c04c9593af01fe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2891029575-1462575-1165213807-1000\88603cb2913a7df3fbd16b5f958e6447_9be0bf4d-f8db-4af4-be85-dc38433c9501
Filesize51B
MD55fc2ac2a310f49c14d195230b91a8885
SHA190855cc11136ba31758fe33b5cf9571f9a104879
SHA256374e0e2897a7a82e0e44794cad89df0f3cdd7703886239c1fe06d625efd48092
SHA512ab46554df9174b9fe9beba50a640f67534c3812f64d96a1fb8adfdc136dfe730ca2370825cd45b7f87a544d6a58dd868cb5a3a7f42e2789f6d679dbc0fdd52c3
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850
-
Filesize
472KB
MD590bb128ec246bfaa7d2802a0e8665c98
SHA15c3061dd171ed870e3048665ad7374c2127918ad
SHA2568425989fe24cde0df99787cd6606b2b267bc462884fae517fa03a7db93b6d41b
SHA512ee6415e0bddc0ae0f11f2e38cdc4a6e349400530c0d41eeeacfeefa3acf13e3295d7bb9e67e5721a1a61ae1607f020d98c4dc55ea96fb69fc28e943f71bce850