Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 18:40
Behavioral task
behavioral1
Sample
59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe
Resource
win10v2004-20220812-en
General
-
Target
59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe
-
Size
19KB
-
MD5
0722fedbe04ab3eb54a2852a696d4e80
-
SHA1
609389df66fbd95fe8f7fcca3e68bdb00e61b414
-
SHA256
59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
-
SHA512
5aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
SSDEEP
384:4HKZfuH87GowDqGoMwevqxP6k6zIDwPVBSP+oV/5K7R:lZfuHUvwDKP6kMpi+e/+
Malware Config
Signatures
-
Detect XtremeRAT payload 17 IoCs
resource yara_rule behavioral1/memory/1672-55-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1672-60-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1932-63-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1932-67-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/992-69-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/992-72-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1372-75-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1372-78-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2032-80-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2032-83-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/944-86-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/944-89-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1576-91-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1576-95-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1344-97-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1344-100-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/904-102-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 8 IoCs
pid Process 1932 Server.exe 992 Server.exe 1372 Server.exe 2032 Server.exe 944 Server.exe 1576 Server.exe 1344 Server.exe 904 Server.exe -
Modifies Installed Components in the registry 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe -
resource yara_rule behavioral1/memory/1672-55-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/files/0x000700000001448d-56.dat upx behavioral1/files/0x000700000001448d-57.dat upx behavioral1/memory/1672-60-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/files/0x000700000001448d-59.dat upx behavioral1/memory/1932-63-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/files/0x000700000001448d-66.dat upx behavioral1/memory/1932-67-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/files/0x000700000001448d-64.dat upx behavioral1/memory/992-69-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/992-72-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/files/0x000700000001448d-71.dat upx behavioral1/memory/1372-75-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/files/0x000700000001448d-77.dat upx behavioral1/memory/1372-78-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2032-80-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/files/0x000700000001448d-84.dat upx behavioral1/memory/2032-83-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/944-86-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/files/0x000700000001448d-88.dat upx behavioral1/memory/944-89-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1576-91-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1576-95-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/files/0x000700000001448d-94.dat upx behavioral1/memory/1344-97-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1344-100-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/files/0x000700000001448d-99.dat upx behavioral1/memory/904-102-0x0000000000C80000-0x0000000000C95000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe -
Adds Run key to start application 2 TTPs 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe File created C:\Windows\InstallDir\Server.exe 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1540 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 27 PID 1672 wrote to memory of 1540 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 27 PID 1672 wrote to memory of 1540 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 27 PID 1672 wrote to memory of 1540 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 27 PID 1672 wrote to memory of 1540 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 27 PID 1672 wrote to memory of 1520 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 28 PID 1672 wrote to memory of 1520 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 28 PID 1672 wrote to memory of 1520 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 28 PID 1672 wrote to memory of 1520 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 28 PID 1672 wrote to memory of 1520 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 28 PID 1672 wrote to memory of 1028 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 29 PID 1672 wrote to memory of 1028 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 29 PID 1672 wrote to memory of 1028 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 29 PID 1672 wrote to memory of 1028 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 29 PID 1672 wrote to memory of 1028 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 29 PID 1672 wrote to memory of 552 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 30 PID 1672 wrote to memory of 552 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 30 PID 1672 wrote to memory of 552 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 30 PID 1672 wrote to memory of 552 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 30 PID 1672 wrote to memory of 552 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 30 PID 1672 wrote to memory of 768 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 31 PID 1672 wrote to memory of 768 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 31 PID 1672 wrote to memory of 768 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 31 PID 1672 wrote to memory of 768 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 31 PID 1672 wrote to memory of 768 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 31 PID 1672 wrote to memory of 628 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 32 PID 1672 wrote to memory of 628 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 32 PID 1672 wrote to memory of 628 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 32 PID 1672 wrote to memory of 628 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 32 PID 1672 wrote to memory of 628 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 32 PID 1672 wrote to memory of 1704 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 33 PID 1672 wrote to memory of 1704 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 33 PID 1672 wrote to memory of 1704 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 33 PID 1672 wrote to memory of 1704 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 33 PID 1672 wrote to memory of 1704 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 33 PID 1672 wrote to memory of 1696 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 34 PID 1672 wrote to memory of 1696 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 34 PID 1672 wrote to memory of 1696 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 34 PID 1672 wrote to memory of 1696 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 34 PID 1672 wrote to memory of 1932 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 35 PID 1672 wrote to memory of 1932 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 35 PID 1672 wrote to memory of 1932 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 35 PID 1672 wrote to memory of 1932 1672 59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe 35 PID 1932 wrote to memory of 1780 1932 Server.exe 36 PID 1932 wrote to memory of 1780 1932 Server.exe 36 PID 1932 wrote to memory of 1780 1932 Server.exe 36 PID 1932 wrote to memory of 1780 1932 Server.exe 36 PID 1932 wrote to memory of 1780 1932 Server.exe 36 PID 1932 wrote to memory of 748 1932 Server.exe 37 PID 1932 wrote to memory of 748 1932 Server.exe 37 PID 1932 wrote to memory of 748 1932 Server.exe 37 PID 1932 wrote to memory of 748 1932 Server.exe 37 PID 1932 wrote to memory of 748 1932 Server.exe 37 PID 1932 wrote to memory of 1232 1932 Server.exe 38 PID 1932 wrote to memory of 1232 1932 Server.exe 38 PID 1932 wrote to memory of 1232 1932 Server.exe 38 PID 1932 wrote to memory of 1232 1932 Server.exe 38 PID 1932 wrote to memory of 1232 1932 Server.exe 38 PID 1932 wrote to memory of 856 1932 Server.exe 39 PID 1932 wrote to memory of 856 1932 Server.exe 39 PID 1932 wrote to memory of 856 1932 Server.exe 39 PID 1932 wrote to memory of 856 1932 Server.exe 39 PID 1932 wrote to memory of 856 1932 Server.exe 39 PID 1932 wrote to memory of 1360 1932 Server.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe"C:\Users\Admin\AppData\Local\Temp\59c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd.exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1520
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1028
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:552
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:768
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:628
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1704
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1696
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"2⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1780
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:748
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1232
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:856
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1360
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1492
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:968
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:824
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:992 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1872
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1636
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1920
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1660
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1248
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1036
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1400
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1372 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1264
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1532
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:776
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:556
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:384
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1680
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:936
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1740
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:2032 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1056
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:392
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1252
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1880
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1944
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1020
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1788
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:952
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:944 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1720
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1600
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1592
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1700
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1724
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1524
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:516
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1752
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1576 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:1484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:1316
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:1612
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:1932
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2024
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:872
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2008
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"8⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1344 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:1296
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:1280
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:1384
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:752
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:432
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:684
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:956
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:2032
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"9⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:904 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:908
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1952
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1736
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1820
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1816
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:584
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:108
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ed4ba2f533365e75702788b3f4d84052
SHA1706905bdd44435d218b6a5f06f455382e0f55913
SHA256a200c1cf6beb87a64701eaa3c71aa3e99aea6e39f96ef51179d3ffe6ab88060a
SHA51233222560f58e279af00296f37d6e0daf47a7e38c82f7a756f2682c008f6cfdcc24c1aece0ee957ff88fc70edd0d8445c7c98e92243f1827036a498d3cfd52055
-
Filesize
1KB
MD5ed4ba2f533365e75702788b3f4d84052
SHA1706905bdd44435d218b6a5f06f455382e0f55913
SHA256a200c1cf6beb87a64701eaa3c71aa3e99aea6e39f96ef51179d3ffe6ab88060a
SHA51233222560f58e279af00296f37d6e0daf47a7e38c82f7a756f2682c008f6cfdcc24c1aece0ee957ff88fc70edd0d8445c7c98e92243f1827036a498d3cfd52055
-
Filesize
1KB
MD5ed4ba2f533365e75702788b3f4d84052
SHA1706905bdd44435d218b6a5f06f455382e0f55913
SHA256a200c1cf6beb87a64701eaa3c71aa3e99aea6e39f96ef51179d3ffe6ab88060a
SHA51233222560f58e279af00296f37d6e0daf47a7e38c82f7a756f2682c008f6cfdcc24c1aece0ee957ff88fc70edd0d8445c7c98e92243f1827036a498d3cfd52055
-
Filesize
1KB
MD5ed4ba2f533365e75702788b3f4d84052
SHA1706905bdd44435d218b6a5f06f455382e0f55913
SHA256a200c1cf6beb87a64701eaa3c71aa3e99aea6e39f96ef51179d3ffe6ab88060a
SHA51233222560f58e279af00296f37d6e0daf47a7e38c82f7a756f2682c008f6cfdcc24c1aece0ee957ff88fc70edd0d8445c7c98e92243f1827036a498d3cfd52055
-
Filesize
1KB
MD5ed4ba2f533365e75702788b3f4d84052
SHA1706905bdd44435d218b6a5f06f455382e0f55913
SHA256a200c1cf6beb87a64701eaa3c71aa3e99aea6e39f96ef51179d3ffe6ab88060a
SHA51233222560f58e279af00296f37d6e0daf47a7e38c82f7a756f2682c008f6cfdcc24c1aece0ee957ff88fc70edd0d8445c7c98e92243f1827036a498d3cfd52055
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8
-
Filesize
19KB
MD50722fedbe04ab3eb54a2852a696d4e80
SHA1609389df66fbd95fe8f7fcca3e68bdb00e61b414
SHA25659c76d8c853b8f3c319b0c31bbe8d432dc6a1a56c317acfa328774f133c26fbd
SHA5125aca56c2abf2094b63c54d06bcc90479b4f00684c2911ab72123e78c0501d2e73a26170f47fa58efd2530a8695a3b01163a2087e2862d0d92894428cc5d803d8