Analysis
-
max time kernel
181s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe
Resource
win10v2004-20220812-en
General
-
Target
859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe
-
Size
534KB
-
MD5
cff7ae721a6fbe25f8dded7921beeae7
-
SHA1
fd2408113833f1ae10caba36cf48a276d22da489
-
SHA256
859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
-
SHA512
2479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
SSDEEP
12288:xo3AEtmcPPhtWHoTpS6glPTWZyeYOUgavBR+QSXdFT5HhQ:xQTscPptWHapSHlPyZyeYOUgavrStFdm
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 5016 win32i.exe 5032 win32i.exe 1436 win32i.exe 1380 win32i.exe 220 win32i.exe 1732 win32i.exe 5040 win32i.exe 4748 win32i.exe 5112 win32i.exe 2992 win32i.exe 5064 win32i.exe 388 win32i.exe 3680 win32i.exe -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} win32i.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} win32i.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} win32i.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} win32i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} win32i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} win32i.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN}\StubPath = "C:\\Windows\\system32\\Vhpjr.exe" 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components\{PekuAg1J-Kew8-c7mL-Ef8M-uvsuHB7PP7aN} 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation win32i.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation win32i.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation win32i.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation win32i.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation win32i.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MZlBYW6jUOXHR = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run win32i.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run win32i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MZlBYW6jUOXHR = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fU5 = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fU5 = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run win32i.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fU5 = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run win32i.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run win32i.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fU5 = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fU5 = "C:\\Windows\\system32\\Vhpjr.exe" 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fU5 = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MZlBYW6jUOXHR = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run win32i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MZlBYW6jUOXHR = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run win32i.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run win32i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MZlBYW6jUOXHR = "C:\\Windows\\system32\\Vhpjr.exe" win32i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MZlBYW6jUOXHR = "C:\\Windows\\system32\\Vhpjr.exe" 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe -
Maps connected drives based on registry 3 TTPs 16 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum win32i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum win32i.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 win32i.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 win32i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum win32i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum win32i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum win32i.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 win32i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum win32i.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 win32i.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 win32i.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 win32i.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 win32i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum win32i.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Vhpjr.exe 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe File created \??\c:\windows\SysWOW64\win32i.exe 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe File opened for modification \??\c:\windows\SysWOW64\win32i.exe 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe File created C:\Windows\SysWOW64\Vhpjr.exe cmd.exe File created \??\c:\windows\SysWOW64\win32i.exe win32i.exe File created C:\Windows\SysWOW64\Vhpjr.exe cmd.exe File opened for modification C:\Windows\SysWOW64\Vhpjr.exe win32i.exe File opened for modification C:\Windows\SysWOW64\Vhpjr.exe win32i.exe File created \??\c:\windows\SysWOW64\win32i.exe win32i.exe File created C:\Windows\SysWOW64\Vhpjr.exe cmd.exe File created C:\Windows\SysWOW64\Vhpjr.exe cmd.exe File opened for modification C:\Windows\SysWOW64\Vhpjr.exe win32i.exe File created \??\c:\windows\SysWOW64\win32i.exe win32i.exe File created \??\c:\windows\SysWOW64\win32i.exe win32i.exe File opened for modification C:\Windows\SysWOW64\Vhpjr.exe win32i.exe File created \??\c:\windows\SysWOW64\win32i.exe win32i.exe File opened for modification C:\Windows\SysWOW64\Vhpjr.exe cmd.exe File opened for modification C:\Windows\SysWOW64\Vhpjr.exe win32i.exe File created \??\c:\windows\SysWOW64\win32i.exe win32i.exe File created C:\Windows\SysWOW64\Vhpjr.exe cmd.exe File created C:\Windows\SysWOW64\Vhpjr.exe cmd.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 4928 set thread context of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 5016 set thread context of 5032 5016 win32i.exe 84 PID 1436 set thread context of 1380 1436 win32i.exe 88 PID 220 set thread context of 1732 220 win32i.exe 92 PID 5040 set thread context of 4748 5040 win32i.exe 96 PID 5112 set thread context of 2992 5112 win32i.exe 100 PID 5064 set thread context of 388 5064 win32i.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1408 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 1408 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 5032 win32i.exe 5032 win32i.exe 1380 win32i.exe 1380 win32i.exe 1732 win32i.exe 1732 win32i.exe 4748 win32i.exe 4748 win32i.exe 2992 win32i.exe 2992 win32i.exe 388 win32i.exe 388 win32i.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1408 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Token: SeDebugPrivilege 1408 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe Token: SeDebugPrivilege 5032 win32i.exe Token: SeDebugPrivilege 5032 win32i.exe Token: SeDebugPrivilege 1380 win32i.exe Token: SeDebugPrivilege 1380 win32i.exe Token: SeDebugPrivilege 1732 win32i.exe Token: SeDebugPrivilege 1732 win32i.exe Token: SeDebugPrivilege 4748 win32i.exe Token: SeDebugPrivilege 4748 win32i.exe Token: SeDebugPrivilege 2992 win32i.exe Token: SeDebugPrivilege 2992 win32i.exe Token: SeDebugPrivilege 388 win32i.exe Token: SeDebugPrivilege 388 win32i.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 5016 win32i.exe 1436 win32i.exe 220 win32i.exe 5040 win32i.exe 5112 win32i.exe 5064 win32i.exe 3680 win32i.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1408 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 80 PID 4928 wrote to memory of 1928 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 81 PID 4928 wrote to memory of 1928 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 81 PID 4928 wrote to memory of 1928 4928 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 81 PID 1408 wrote to memory of 5016 1408 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 83 PID 1408 wrote to memory of 5016 1408 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 83 PID 1408 wrote to memory of 5016 1408 859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe 83 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 5032 5016 win32i.exe 84 PID 5016 wrote to memory of 444 5016 win32i.exe 85 PID 5016 wrote to memory of 444 5016 win32i.exe 85 PID 5016 wrote to memory of 444 5016 win32i.exe 85 PID 5032 wrote to memory of 1436 5032 win32i.exe 87 PID 5032 wrote to memory of 1436 5032 win32i.exe 87 PID 5032 wrote to memory of 1436 5032 win32i.exe 87 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 1380 1436 win32i.exe 88 PID 1436 wrote to memory of 4548 1436 win32i.exe 89 PID 1436 wrote to memory of 4548 1436 win32i.exe 89 PID 1436 wrote to memory of 4548 1436 win32i.exe 89 PID 1380 wrote to memory of 220 1380 win32i.exe 91 PID 1380 wrote to memory of 220 1380 win32i.exe 91 PID 1380 wrote to memory of 220 1380 win32i.exe 91 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 1732 220 win32i.exe 92 PID 220 wrote to memory of 3624 220 win32i.exe 93 PID 220 wrote to memory of 3624 220 win32i.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe"C:\Users\Admin\AppData\Local\Temp\859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe"1⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exeC:\Users\Admin\AppData\Local\Temp\859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a.exe2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
\??\c:\windows\SysWOW64\win32i.exe"c:\windows\system32\win32i.exe"3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5016 -
\??\c:\windows\SysWOW64\win32i.exec:\windows\SysWOW64\win32i.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\windows\SysWOW64\win32i.exe"c:\windows\system32\win32i.exe"5⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
\??\c:\windows\SysWOW64\win32i.exec:\windows\SysWOW64\win32i.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
\??\c:\windows\SysWOW64\win32i.exe"c:\windows\system32\win32i.exe"7⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
\??\c:\windows\SysWOW64\win32i.exec:\windows\SysWOW64\win32i.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
\??\c:\windows\SysWOW64\win32i.exe"c:\windows\system32\win32i.exe"9⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5040 -
\??\c:\windows\SysWOW64\win32i.exec:\windows\SysWOW64\win32i.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748 -
\??\c:\windows\SysWOW64\win32i.exe"c:\windows\system32\win32i.exe"11⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5112 -
\??\c:\windows\SysWOW64\win32i.exec:\windows\SysWOW64\win32i.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992 -
\??\c:\windows\SysWOW64\win32i.exe"c:\windows\system32\win32i.exe"13⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5064 -
\??\c:\windows\SysWOW64\win32i.exec:\windows\SysWOW64\win32i.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:388 -
\??\c:\windows\SysWOW64\win32i.exe"c:\windows\system32\win32i.exe"15⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:3680
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bat.bat" "12⤵
- Drops file in System32 directory
PID:3220
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bat.bat" "10⤵
- Drops file in System32 directory
PID:5088
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bat.bat" "8⤵
- Drops file in System32 directory
PID:3624
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bat.bat" "6⤵
- Drops file in System32 directory
PID:4548
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bat.bat" "4⤵
- Drops file in System32 directory
PID:444
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bat.bat" "2⤵
- Drops file in System32 directory
PID:1928
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD52382012071e5f9127e0143a5638dae61
SHA1fc22bd0d62113480195fa5fa8accfd743b1d41f9
SHA25635258e85575117bd5e979cf876e20ad91be962ab6a46ae46779d9d9ec33fbf9c
SHA5121d296fbde47f92d58047126f42c629a0e87cb72a2bf31e5377bf654ec50acc4705a61b36a8bb6504159bd77f4d20818c0013f7498376d66ad791d649300b5843
-
Filesize
118B
MD52382012071e5f9127e0143a5638dae61
SHA1fc22bd0d62113480195fa5fa8accfd743b1d41f9
SHA25635258e85575117bd5e979cf876e20ad91be962ab6a46ae46779d9d9ec33fbf9c
SHA5121d296fbde47f92d58047126f42c629a0e87cb72a2bf31e5377bf654ec50acc4705a61b36a8bb6504159bd77f4d20818c0013f7498376d66ad791d649300b5843
-
Filesize
118B
MD52382012071e5f9127e0143a5638dae61
SHA1fc22bd0d62113480195fa5fa8accfd743b1d41f9
SHA25635258e85575117bd5e979cf876e20ad91be962ab6a46ae46779d9d9ec33fbf9c
SHA5121d296fbde47f92d58047126f42c629a0e87cb72a2bf31e5377bf654ec50acc4705a61b36a8bb6504159bd77f4d20818c0013f7498376d66ad791d649300b5843
-
Filesize
118B
MD52382012071e5f9127e0143a5638dae61
SHA1fc22bd0d62113480195fa5fa8accfd743b1d41f9
SHA25635258e85575117bd5e979cf876e20ad91be962ab6a46ae46779d9d9ec33fbf9c
SHA5121d296fbde47f92d58047126f42c629a0e87cb72a2bf31e5377bf654ec50acc4705a61b36a8bb6504159bd77f4d20818c0013f7498376d66ad791d649300b5843
-
Filesize
190B
MD585925b71aec43c4319c4903c0187c9ad
SHA183cc006d0c6725d7ccd8b0856264c21ab2c7e82d
SHA2567f2faffcbfc4a114d420a80259d498eb13c8373057d37c2112e7e594822d80d0
SHA512aad483cf0b4644d5ca4a9c7472d69fa0274af7e33590de98cf5bd91ea180fd89ffe208909e4539460a19d77029777e61e8cbeff2d3614cc7c7dff18ee3d5add8
-
Filesize
118B
MD52382012071e5f9127e0143a5638dae61
SHA1fc22bd0d62113480195fa5fa8accfd743b1d41f9
SHA25635258e85575117bd5e979cf876e20ad91be962ab6a46ae46779d9d9ec33fbf9c
SHA5121d296fbde47f92d58047126f42c629a0e87cb72a2bf31e5377bf654ec50acc4705a61b36a8bb6504159bd77f4d20818c0013f7498376d66ad791d649300b5843
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170
-
Filesize
534KB
MD5cff7ae721a6fbe25f8dded7921beeae7
SHA1fd2408113833f1ae10caba36cf48a276d22da489
SHA256859f2c2f335b7de5c079f06bebc040557d7b4564aa89c5c2c9c0d6a72dd2d32a
SHA5122479aaa204105b002cfde67f320b7cc0c3a392067845c4f44f482a34603820d4aeb8dfc7742751013bc22b231edfbb83b3c9784c60c7274d20c6d0422e7c6170