Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25-08-2023 23:07
Static task
static1
Behavioral task
behavioral1
Sample
1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe
Resource
win10v2004-20230703-en
General
-
Target
1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe
-
Size
6.0MB
-
MD5
7fec4adeb1292faaaaff494513997304
-
SHA1
6250c8ba22ee6056ccb7993998ad55f568c1a003
-
SHA256
1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3
-
SHA512
748c5e7f2a7ddaaa08bf78e4b2575df2a0421f085b711618097ec7f9154457a191e45058896ba1d5af9a642bb93bdcb847ed31e77d13e85cebd9855a543996de
-
SSDEEP
98304:vXqOdSRDJBAUZLU1+j+Kv694dV1a5kh8cyDSzserJ9quNCnkAb0SUtPWRu:vfKJVQi+Kv69a85H1D0JQaIAJWRu
Malware Config
Signatures
-
Loads dropped DLL 11 IoCs
pid Process 864 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2748 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 1968 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 1744 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2636 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2280 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 976 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2076 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 964 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2648 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 1760 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe -
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winww = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe" 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe File opened for modification C:\Windows\System64 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe -
Runs ping.exe 1 TTPs 10 IoCs
pid Process 1168 PING.EXE 1108 PING.EXE 1092 PING.EXE 2960 PING.EXE 1496 PING.EXE 2116 PING.EXE 2004 PING.EXE 2060 PING.EXE 1788 PING.EXE 1272 PING.EXE -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 864 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 864 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2748 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2748 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 1968 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 1968 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 1744 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 1744 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2636 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2636 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2280 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2280 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 976 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 976 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2076 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2076 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 964 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 964 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2648 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 2648 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 1760 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 1760 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 864 wrote to memory of 2708 864 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 29 PID 864 wrote to memory of 2708 864 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 29 PID 864 wrote to memory of 2708 864 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 29 PID 864 wrote to memory of 2708 864 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 29 PID 2708 wrote to memory of 2116 2708 cmd.exe 31 PID 2708 wrote to memory of 2116 2708 cmd.exe 31 PID 2708 wrote to memory of 2116 2708 cmd.exe 31 PID 2708 wrote to memory of 2116 2708 cmd.exe 31 PID 2708 wrote to memory of 2748 2708 cmd.exe 32 PID 2708 wrote to memory of 2748 2708 cmd.exe 32 PID 2708 wrote to memory of 2748 2708 cmd.exe 32 PID 2708 wrote to memory of 2748 2708 cmd.exe 32 PID 2748 wrote to memory of 1460 2748 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 36 PID 2748 wrote to memory of 1460 2748 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 36 PID 2748 wrote to memory of 1460 2748 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 36 PID 2748 wrote to memory of 1460 2748 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 36 PID 1460 wrote to memory of 2004 1460 cmd.exe 38 PID 1460 wrote to memory of 2004 1460 cmd.exe 38 PID 1460 wrote to memory of 2004 1460 cmd.exe 38 PID 1460 wrote to memory of 2004 1460 cmd.exe 38 PID 1460 wrote to memory of 1968 1460 cmd.exe 39 PID 1460 wrote to memory of 1968 1460 cmd.exe 39 PID 1460 wrote to memory of 1968 1460 cmd.exe 39 PID 1460 wrote to memory of 1968 1460 cmd.exe 39 PID 1968 wrote to memory of 2052 1968 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 41 PID 1968 wrote to memory of 2052 1968 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 41 PID 1968 wrote to memory of 2052 1968 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 41 PID 1968 wrote to memory of 2052 1968 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 41 PID 2052 wrote to memory of 1788 2052 cmd.exe 43 PID 2052 wrote to memory of 1788 2052 cmd.exe 43 PID 2052 wrote to memory of 1788 2052 cmd.exe 43 PID 2052 wrote to memory of 1788 2052 cmd.exe 43 PID 2052 wrote to memory of 1744 2052 cmd.exe 44 PID 2052 wrote to memory of 1744 2052 cmd.exe 44 PID 2052 wrote to memory of 1744 2052 cmd.exe 44 PID 2052 wrote to memory of 1744 2052 cmd.exe 44 PID 1744 wrote to memory of 2632 1744 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 46 PID 1744 wrote to memory of 2632 1744 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 46 PID 1744 wrote to memory of 2632 1744 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 46 PID 1744 wrote to memory of 2632 1744 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 46 PID 2632 wrote to memory of 2060 2632 cmd.exe 48 PID 2632 wrote to memory of 2060 2632 cmd.exe 48 PID 2632 wrote to memory of 2060 2632 cmd.exe 48 PID 2632 wrote to memory of 2060 2632 cmd.exe 48 PID 2632 wrote to memory of 2636 2632 cmd.exe 49 PID 2632 wrote to memory of 2636 2632 cmd.exe 49 PID 2632 wrote to memory of 2636 2632 cmd.exe 49 PID 2632 wrote to memory of 2636 2632 cmd.exe 49 PID 2636 wrote to memory of 2752 2636 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 51 PID 2636 wrote to memory of 2752 2636 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 51 PID 2636 wrote to memory of 2752 2636 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 51 PID 2636 wrote to memory of 2752 2636 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 51 PID 2752 wrote to memory of 1168 2752 cmd.exe 53 PID 2752 wrote to memory of 1168 2752 cmd.exe 53 PID 2752 wrote to memory of 1168 2752 cmd.exe 53 PID 2752 wrote to memory of 1168 2752 cmd.exe 53 PID 2752 wrote to memory of 2280 2752 cmd.exe 54 PID 2752 wrote to memory of 2280 2752 cmd.exe 54 PID 2752 wrote to memory of 2280 2752 cmd.exe 54 PID 2752 wrote to memory of 2280 2752 cmd.exe 54 PID 2280 wrote to memory of 1756 2280 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 56 PID 2280 wrote to memory of 1756 2280 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 56 PID 2280 wrote to memory of 1756 2280 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 56 PID 2280 wrote to memory of 1756 2280 1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1A3546~1.EXE"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat4⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 25⤵
- Runs ping.exe
PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1A3546~1.EXE"5⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat6⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 27⤵
- Runs ping.exe
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1A3546~1.EXE"7⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat8⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 29⤵
- Runs ping.exe
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1A3546~1.EXE"9⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat10⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 211⤵
- Runs ping.exe
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1A3546~1.EXE"11⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat12⤵PID:1756
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 213⤵
- Runs ping.exe
PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1A3546~1.EXE"13⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat14⤵PID:588
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 215⤵
- Runs ping.exe
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1A3546~1.EXE"15⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat16⤵PID:540
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 217⤵
- Runs ping.exe
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1A3546~1.EXE"17⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:964 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat18⤵PID:1264
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 219⤵
- Runs ping.exe
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1A3546~1.EXE"19⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Restart.bat20⤵PID:1732
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 221⤵
- Runs ping.exe
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\1a3546d078c6135728572b74c04980aacfa5d0b3c666d8c7796503c5e35bc5e3.exe"C:\Users\Admin\AppData\Local\Temp\1A3546~1.EXE"21⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58a32b4766455cf0bd36dfaa7fc400209
SHA1e3f2492eaed5a74679949cb43e947e5ac525d379
SHA2568699fc0c1c07bdae098b1d9ebda98d8f7b5d09f894dc37ae045ad84f05c911b8
SHA512af43553c008e8f3094ca0605776f3c1461107a0bfb118dc9eb333f580f1ec908d6512e55321f71f2633bc111d6b0315a8e04d3591093b1746e2284a867ee19e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa263cd08862dab4acd5be504020f1c0
SHA1f039bef4b5668d1ea0b88642246d27dca4ede3f7
SHA2568e496ca90fe16a121d3e10db172d88806a3a1a28f435bc9f7a0de7cb75bfa6cb
SHA512b8a49822dca77d6a0b2b1f58235032fe52faac51e5c761483d67aeb83d5fc46bd8306c97c7c1d435b77a02e579373af996d56356401e487b69381bf16bde9225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e7657cd63a1ec35ef539131dd99b8ab3
SHA104cd6d20671eb297e245abca38d53c548b91f8fd
SHA2566230ccafd5bde9d7356d4a4f8ee658b6c69f295e470ad6b092c0563637820eb8
SHA51298d75819a00330b0dc39f4997035c21ac170d19dac3c6251c0a45200a23a7f4b31be4c671cb8bb367e9220cbe562cf744efcae16154af3805bb9b44af877798a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5125582284d294d8ec76ad72c067ad938
SHA123724438c25a36b6f464e2612adb352f56ed523f
SHA256f2f88ea73df707d7367f7e2ed2d9d2468c6e9b3679341e9f57cb92f7f703919c
SHA512a38f5ea6159ce615f1046099ed3300e5479d2c0db06c5f2b453edc210f7eac0a3dfdeb81016b8e43beb0d4e0bdd999740e7e7bbce684ec1495dfadaa4bad0c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD556a1a39b6b86f36147395181a22e331e
SHA18c8329ad6bbe44012e5d66ff7336501097ebc205
SHA25653024a44a3f7c6aba8caa5b2fc8a81171a0ae1df6e3b8c00fbed84692b24d384
SHA512f92653074877a0abc16ce69bda8ef3387db99ea029fc4e9d916a7a560cb7a847b4a5d12a8a449d818657193ad289906efed1bba72783f02a799484846535c49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d21721a9b013503be379bf5a319672e
SHA1c17637d82afd4b652a25d3440fa57df8825541e4
SHA25682558b1d9797976c0d196d0f7b72bae50b407f803a80d3961ec60289874b64b9
SHA51284af06a48919a35ed18b6b79b350b11fba71c522649540f54d6a76ceb9eeb1a20f27ba2aae189c87eb3f80e374f98a53656d0530a9f70cd8658a5f4958b2b1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5969fff2af4627c58d3a72db6465baeaf
SHA12ec358f4f66595bd886c6e7e606b5ab91cd43f79
SHA256e31290b371afbe80d00e5716e5406bbdde8239c7fee5bdeaf64cefb6d005d24f
SHA51273712a8100dbe37c9c10c365425d3f2a8e536a9761f120adc2056d298b384334846fc60685c1cc8277fba8eb850fa0d76baabec3d43f73e4b72b7d400570780d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59ccd7cc5d8e5c9af0ee80726baa8d053
SHA1bd34a2cf565b42f46fac1ca3a856dccae364af70
SHA256ac261479abf65a31a2a90b5ed4705f1abb4e31712045eb8748d9b22577215b11
SHA512191ac94ec5920b402713b93c47e694192c09ed7636799cb44f0185cdccf3c23252afce6068165fb8f70ce485c93d6df8d884e1a007c82010eb25d7c85bf5273a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58af6fd2cbd2f7855d30b9c6bd30f5cf8
SHA1b8ff17a0435e99f4aaed878f3d0790c8e4ed5f60
SHA2561e96bbe3b56a2acfb2f316494519f0e185de0811ba4f9d7ce85f480d34f503e9
SHA512eb66ce59de2129b68d1726b49ad3a43b1df9f602591d4349b4f639a4c7faed4be5e20a60292176caa64e0ee678ebe9a5e22224ec4229980496816c9373a1c9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bd775f50784abc2e6a9384891dff554
SHA143d422be3616c9163c65946650a4db91216962d6
SHA256090dd0178bb70b6e9c5b1ca62f70b18c60400d5e9417e5ac114f5cef571f94b5
SHA512df8ace9f055a6fb85d0469f3aae6ae7422464b7f61c3ea2673201b69bdc62741c1bc30b33738a95e5ad6c8b556d3d88521d4bed5d68313a860ba9dfbdab5541a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\64WRFCMO\read[1].htm
Filesize34KB
MD5fd8b122912f2dd4bb6e8ad24b31ef1d7
SHA1f0e06c964d0c8daecf78a21b19bc820e2eae1d2d
SHA2568d320d5a60c4dd9edca6e3260005660bfc37f9dc6b41e0419f225430826bb14a
SHA5120b1b327ebeae04e96f4cf43c351a3e744b399cdc09e1c439abd9cf164b171728917ff4356afc41628f4ca12becb8ec0ce465893513483b3dcc5ef9fe33325c3f
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
113B
MD5ed1694e5b1798a50396beefdd53bfe62
SHA1bb22aacd5601e3f72cae5b0c4f547585752ec57f
SHA256d43249c856572c368636422cd6f99aee90309f3f85d4264fced12cd74ff6de4d
SHA512bedcf9c308f35f16db27022de0369c9ad5c46934abd57cf712dcd11720c20f271ca3f9f5a19925547ab395edb479ef21bd52cd3346257d1dc4ef8dd1f7b4b596
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb
-
Filesize
10.7MB
MD5b7f9fba5ac9652dd1b709d96f6efb247
SHA17b966c4f7312c07b5cc7e6764f34f068d2c1273d
SHA256d02b10f7a7c7f5cda18ce7aa35e577adbfbbeecaf194fe5963a81ae07bac9597
SHA512d451cb784db56ba9c36727afa7be064d803beab782fcff51c4e11c58017cd8ad7464d73a43202b9b02a6e87f7d0f3c699d6533935c1543fdf774712404c7dadb