Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2023, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
A1DB2JVWGG.CNT.exe
Resource
win7-20230220-en
General
-
Target
A1DB2JVWGG.CNT.exe
-
Size
2.1MB
-
MD5
a7817732eded62797b0c5e9da109edd7
-
SHA1
e7e868e8a529cdd6bd32b4fa3711eff0c9029dbb
-
SHA256
95969e3e0c1793e6177d5c5d20c9a667c9f28bb64907ad489682c41668efc29d
-
SHA512
3664953e0e5c601e8d8123c0b9f3f43d727bf6f48f81a93fed051d6f0d275728ceda92ecef201e4cdceac29c17ce66b46820a43a6dac9fd4b77b6d54f226db01
-
SSDEEP
24576:tA74/4qimDN0nixgBQcZ+WtGsK0i+CqBRCJcbpaa4S7qeL7pjhlyIy6Vs6wGpYUa:tA74/t6FQcZ+WRs+BRL4ShjTyIF
Malware Config
Extracted
darkcomet
JUNE 2023
timmy08.ddns.net:39399
DC_MUTEX-75NC51J
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
l2V3BCJaaFmA
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
chrome
Extracted
nanocore
1.2.2.0
timmy08.ddns.net:28289
timmy06.ddns.net:28289
29684d78-e3d5-43d3-a123-9a499c3134c7
-
activate_away_mode
true
-
backup_connection_host
timmy06.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-03-13T20:49:24.260578036Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
28289
-
default_group
JUNE 2023
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
29684d78-e3d5-43d3-a123-9a499c3134c7
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
timmy08.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" A1DB2JVWGG.CNT.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1864 attrib.exe 3532 attrib.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation A1DB2JVWGG.CNT.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation A1DB2JVWGG.CNT.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation msdcsc.exe -
Executes dropped EXE 4 IoCs
pid Process 4408 JUNE STUB.EXE 3248 msdcsc.exe 4884 msdcsc.exe 2024 JUNE STUB.EXE -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" A1DB2JVWGG.CNT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Host = "C:\\Program Files (x86)\\DPI Host\\dpihost.exe" JUNE STUB.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chrome = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JUNE STUB.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5068 set thread context of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 3248 set thread context of 4884 3248 msdcsc.exe 113 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DPI Host\dpihost.exe JUNE STUB.EXE File opened for modification C:\Program Files (x86)\DPI Host\dpihost.exe JUNE STUB.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4764 schtasks.exe 2332 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ A1DB2JVWGG.CNT.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 5068 A1DB2JVWGG.CNT.exe 5068 A1DB2JVWGG.CNT.exe 5068 A1DB2JVWGG.CNT.exe 5068 A1DB2JVWGG.CNT.exe 5068 A1DB2JVWGG.CNT.exe 5068 A1DB2JVWGG.CNT.exe 5068 A1DB2JVWGG.CNT.exe 5068 A1DB2JVWGG.CNT.exe 5068 A1DB2JVWGG.CNT.exe 4344 powershell.exe 1344 powershell.exe 1344 powershell.exe 5068 A1DB2JVWGG.CNT.exe 4344 powershell.exe 4408 JUNE STUB.EXE 4408 JUNE STUB.EXE 4408 JUNE STUB.EXE 4408 JUNE STUB.EXE 4408 JUNE STUB.EXE 4408 JUNE STUB.EXE 3248 msdcsc.exe 3248 msdcsc.exe 3248 msdcsc.exe 3248 msdcsc.exe 3248 msdcsc.exe 3248 msdcsc.exe 3248 msdcsc.exe 3248 msdcsc.exe 336 powershell.exe 1324 powershell.exe 3248 msdcsc.exe 3248 msdcsc.exe 336 powershell.exe 1324 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4408 JUNE STUB.EXE -
Suspicious use of AdjustPrivilegeToken 55 IoCs
description pid Process Token: SeDebugPrivilege 5068 A1DB2JVWGG.CNT.exe Token: SeDebugPrivilege 1344 powershell.exe Token: SeDebugPrivilege 4344 powershell.exe Token: SeIncreaseQuotaPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeSecurityPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeTakeOwnershipPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeLoadDriverPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeSystemProfilePrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeSystemtimePrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeProfSingleProcessPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeIncBasePriorityPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeCreatePagefilePrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeBackupPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeRestorePrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeShutdownPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeDebugPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeSystemEnvironmentPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeChangeNotifyPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeRemoteShutdownPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeUndockPrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeManageVolumePrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeImpersonatePrivilege 4180 A1DB2JVWGG.CNT.exe Token: SeCreateGlobalPrivilege 4180 A1DB2JVWGG.CNT.exe Token: 33 4180 A1DB2JVWGG.CNT.exe Token: 34 4180 A1DB2JVWGG.CNT.exe Token: 35 4180 A1DB2JVWGG.CNT.exe Token: 36 4180 A1DB2JVWGG.CNT.exe Token: SeDebugPrivilege 4408 JUNE STUB.EXE Token: SeDebugPrivilege 3248 msdcsc.exe Token: SeDebugPrivilege 336 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeIncreaseQuotaPrivilege 4884 msdcsc.exe Token: SeSecurityPrivilege 4884 msdcsc.exe Token: SeTakeOwnershipPrivilege 4884 msdcsc.exe Token: SeLoadDriverPrivilege 4884 msdcsc.exe Token: SeSystemProfilePrivilege 4884 msdcsc.exe Token: SeSystemtimePrivilege 4884 msdcsc.exe Token: SeProfSingleProcessPrivilege 4884 msdcsc.exe Token: SeIncBasePriorityPrivilege 4884 msdcsc.exe Token: SeCreatePagefilePrivilege 4884 msdcsc.exe Token: SeBackupPrivilege 4884 msdcsc.exe Token: SeRestorePrivilege 4884 msdcsc.exe Token: SeShutdownPrivilege 4884 msdcsc.exe Token: SeDebugPrivilege 4884 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4884 msdcsc.exe Token: SeChangeNotifyPrivilege 4884 msdcsc.exe Token: SeRemoteShutdownPrivilege 4884 msdcsc.exe Token: SeUndockPrivilege 4884 msdcsc.exe Token: SeManageVolumePrivilege 4884 msdcsc.exe Token: SeImpersonatePrivilege 4884 msdcsc.exe Token: SeCreateGlobalPrivilege 4884 msdcsc.exe Token: 33 4884 msdcsc.exe Token: 34 4884 msdcsc.exe Token: 35 4884 msdcsc.exe Token: 36 4884 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4884 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 4344 5068 A1DB2JVWGG.CNT.exe 91 PID 5068 wrote to memory of 4344 5068 A1DB2JVWGG.CNT.exe 91 PID 5068 wrote to memory of 4344 5068 A1DB2JVWGG.CNT.exe 91 PID 5068 wrote to memory of 1344 5068 A1DB2JVWGG.CNT.exe 93 PID 5068 wrote to memory of 1344 5068 A1DB2JVWGG.CNT.exe 93 PID 5068 wrote to memory of 1344 5068 A1DB2JVWGG.CNT.exe 93 PID 5068 wrote to memory of 4764 5068 A1DB2JVWGG.CNT.exe 95 PID 5068 wrote to memory of 4764 5068 A1DB2JVWGG.CNT.exe 95 PID 5068 wrote to memory of 4764 5068 A1DB2JVWGG.CNT.exe 95 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 5068 wrote to memory of 4180 5068 A1DB2JVWGG.CNT.exe 97 PID 4180 wrote to memory of 2340 4180 A1DB2JVWGG.CNT.exe 98 PID 4180 wrote to memory of 2340 4180 A1DB2JVWGG.CNT.exe 98 PID 4180 wrote to memory of 2340 4180 A1DB2JVWGG.CNT.exe 98 PID 4180 wrote to memory of 4412 4180 A1DB2JVWGG.CNT.exe 100 PID 4180 wrote to memory of 4412 4180 A1DB2JVWGG.CNT.exe 100 PID 4180 wrote to memory of 4412 4180 A1DB2JVWGG.CNT.exe 100 PID 4180 wrote to memory of 4408 4180 A1DB2JVWGG.CNT.exe 102 PID 4180 wrote to memory of 4408 4180 A1DB2JVWGG.CNT.exe 102 PID 4180 wrote to memory of 4408 4180 A1DB2JVWGG.CNT.exe 102 PID 4412 wrote to memory of 1864 4412 cmd.exe 103 PID 4412 wrote to memory of 1864 4412 cmd.exe 103 PID 4412 wrote to memory of 1864 4412 cmd.exe 103 PID 2340 wrote to memory of 3532 2340 cmd.exe 104 PID 2340 wrote to memory of 3532 2340 cmd.exe 104 PID 2340 wrote to memory of 3532 2340 cmd.exe 104 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 1592 4180 A1DB2JVWGG.CNT.exe 105 PID 4180 wrote to memory of 3248 4180 A1DB2JVWGG.CNT.exe 106 PID 4180 wrote to memory of 3248 4180 A1DB2JVWGG.CNT.exe 106 PID 4180 wrote to memory of 3248 4180 A1DB2JVWGG.CNT.exe 106 PID 3248 wrote to memory of 1324 3248 msdcsc.exe 107 PID 3248 wrote to memory of 1324 3248 msdcsc.exe 107 PID 3248 wrote to memory of 1324 3248 msdcsc.exe 107 PID 3248 wrote to memory of 336 3248 msdcsc.exe 109 PID 3248 wrote to memory of 336 3248 msdcsc.exe 109 PID 3248 wrote to memory of 336 3248 msdcsc.exe 109 PID 3248 wrote to memory of 2332 3248 msdcsc.exe 111 PID 3248 wrote to memory of 2332 3248 msdcsc.exe 111 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1864 attrib.exe 3532 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\A1DB2JVWGG.CNT.exe"C:\Users\Admin\AppData\Local\Temp\A1DB2JVWGG.CNT.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\A1DB2JVWGG.CNT.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JXayEzy.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp61A8.tmp"2⤵
- Creates scheduled task(s)
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\A1DB2JVWGG.CNT.exe"C:\Users\Admin\AppData\Local\Temp\A1DB2JVWGG.CNT.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\A1DB2JVWGG.CNT.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\A1DB2JVWGG.CNT.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1864
-
-
-
C:\Users\Admin\AppData\Local\Temp\JUNE STUB.EXE"C:\Users\Admin\AppData\Local\Temp\JUNE STUB.EXE"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:1592
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JXayEzy.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JXayEzy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4764.tmp"4⤵
- Creates scheduled task(s)
PID:2332
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\JUNE STUB.EXE"C:\Users\Admin\AppData\Local\Temp\JUNE STUB.EXE"5⤵
- Executes dropped EXE
PID:2024
-
-
C:\Windows\SysWOW64\notepad.exenotepad5⤵PID:3416
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5fccbcc1137c73ba4515d02550a946064
SHA16524dd758f36d93905a69c43b677a25b1710e95e
SHA25633b2d9067a7277bc0daec4ab6ea4e5bc9e6462256277e0a387801b5a21213924
SHA512ad13d9a863d1cadb1269a929f9d975704fa51fba7842533619f00a7d0fa2f860f3e663dd5d21c4ef64c705a26f20af6a9bd282d503df57dc1484dabe5f2bd2a3
-
Filesize
18KB
MD5fccbcc1137c73ba4515d02550a946064
SHA16524dd758f36d93905a69c43b677a25b1710e95e
SHA25633b2d9067a7277bc0daec4ab6ea4e5bc9e6462256277e0a387801b5a21213924
SHA512ad13d9a863d1cadb1269a929f9d975704fa51fba7842533619f00a7d0fa2f860f3e663dd5d21c4ef64c705a26f20af6a9bd282d503df57dc1484dabe5f2bd2a3
-
Filesize
202KB
MD54d9ac7d6e684cd3874b662971b6bc536
SHA1726cd96b680082910ebc451d7741a2d6934ed339
SHA25648987956556721dfb5f988683693bebc094b5965f6bd58eeff928fd7c6ba9330
SHA51227ddc60b921ed3b6b9223321ea310fa6ce9a3f4d0cb1b96899fc8fb08556d73f92fb3ec7da93a60de046105129b1b128828d5ab57869160749a5f7f2a7a8ab71
-
Filesize
202KB
MD54d9ac7d6e684cd3874b662971b6bc536
SHA1726cd96b680082910ebc451d7741a2d6934ed339
SHA25648987956556721dfb5f988683693bebc094b5965f6bd58eeff928fd7c6ba9330
SHA51227ddc60b921ed3b6b9223321ea310fa6ce9a3f4d0cb1b96899fc8fb08556d73f92fb3ec7da93a60de046105129b1b128828d5ab57869160749a5f7f2a7a8ab71
-
Filesize
202KB
MD54d9ac7d6e684cd3874b662971b6bc536
SHA1726cd96b680082910ebc451d7741a2d6934ed339
SHA25648987956556721dfb5f988683693bebc094b5965f6bd58eeff928fd7c6ba9330
SHA51227ddc60b921ed3b6b9223321ea310fa6ce9a3f4d0cb1b96899fc8fb08556d73f92fb3ec7da93a60de046105129b1b128828d5ab57869160749a5f7f2a7a8ab71
-
Filesize
202KB
MD54d9ac7d6e684cd3874b662971b6bc536
SHA1726cd96b680082910ebc451d7741a2d6934ed339
SHA25648987956556721dfb5f988683693bebc094b5965f6bd58eeff928fd7c6ba9330
SHA51227ddc60b921ed3b6b9223321ea310fa6ce9a3f4d0cb1b96899fc8fb08556d73f92fb3ec7da93a60de046105129b1b128828d5ab57869160749a5f7f2a7a8ab71
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5fdfa0793e93886eb64f2d5ea6561113e
SHA1f90008549c3329af1a5420d67eee2a29d22bf6a9
SHA256b66b192d7565cf280ab8e61eec9b427a7f184a5ebf5094fb6612a7a1503060a8
SHA5122a91ee70ba1ff6f67c1cd55581efd3437a8ce827c04d1b07fc5d3057f5b33c94fb35112008fe3b1958547b9af99c8aadbb5cd9ae23d1aba16968e5079547b106
-
Filesize
1KB
MD5fdfa0793e93886eb64f2d5ea6561113e
SHA1f90008549c3329af1a5420d67eee2a29d22bf6a9
SHA256b66b192d7565cf280ab8e61eec9b427a7f184a5ebf5094fb6612a7a1503060a8
SHA5122a91ee70ba1ff6f67c1cd55581efd3437a8ce827c04d1b07fc5d3057f5b33c94fb35112008fe3b1958547b9af99c8aadbb5cd9ae23d1aba16968e5079547b106
-
Filesize
2.1MB
MD5a7817732eded62797b0c5e9da109edd7
SHA1e7e868e8a529cdd6bd32b4fa3711eff0c9029dbb
SHA25695969e3e0c1793e6177d5c5d20c9a667c9f28bb64907ad489682c41668efc29d
SHA5123664953e0e5c601e8d8123c0b9f3f43d727bf6f48f81a93fed051d6f0d275728ceda92ecef201e4cdceac29c17ce66b46820a43a6dac9fd4b77b6d54f226db01
-
Filesize
2.1MB
MD5a7817732eded62797b0c5e9da109edd7
SHA1e7e868e8a529cdd6bd32b4fa3711eff0c9029dbb
SHA25695969e3e0c1793e6177d5c5d20c9a667c9f28bb64907ad489682c41668efc29d
SHA5123664953e0e5c601e8d8123c0b9f3f43d727bf6f48f81a93fed051d6f0d275728ceda92ecef201e4cdceac29c17ce66b46820a43a6dac9fd4b77b6d54f226db01
-
Filesize
2.1MB
MD5a7817732eded62797b0c5e9da109edd7
SHA1e7e868e8a529cdd6bd32b4fa3711eff0c9029dbb
SHA25695969e3e0c1793e6177d5c5d20c9a667c9f28bb64907ad489682c41668efc29d
SHA5123664953e0e5c601e8d8123c0b9f3f43d727bf6f48f81a93fed051d6f0d275728ceda92ecef201e4cdceac29c17ce66b46820a43a6dac9fd4b77b6d54f226db01
-
Filesize
2.1MB
MD5a7817732eded62797b0c5e9da109edd7
SHA1e7e868e8a529cdd6bd32b4fa3711eff0c9029dbb
SHA25695969e3e0c1793e6177d5c5d20c9a667c9f28bb64907ad489682c41668efc29d
SHA5123664953e0e5c601e8d8123c0b9f3f43d727bf6f48f81a93fed051d6f0d275728ceda92ecef201e4cdceac29c17ce66b46820a43a6dac9fd4b77b6d54f226db01