Resubmissions
14-09-2023 19:39
230914-yc1f9ahc54 1001-08-2023 16:43
230801-t8b2bahg29 301-08-2023 16:41
230801-t7h38shf98 1001-08-2023 16:39
230801-t51v9saf7y 1001-08-2023 16:38
230801-t5nkyahf84 1001-08-2023 16:38
230801-t5lfksaf6t 1001-08-2023 16:34
230801-t24srahf35 301-08-2023 16:33
230801-t2wgdaaf2t 1001-08-2023 16:09
230801-tl3whsad3w 10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2023 19:39
Static task
static1
Behavioral task
behavioral1
Sample
4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exe
Resource
win10v2004-20230831-en
General
-
Target
4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exe
-
Size
639KB
-
MD5
4b9a2c82dae5a6747c9b6a635874fe1b
-
SHA1
16849642f7562fb28a7c57493ede6dc14e71e423
-
SHA256
4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce
-
SHA512
3ef6541eb83fa9734b0277ba753b449f4c2f47d3f8e0b6e46cfcd0c706e0e4c91478f883b1698755351ada6dec7f463562f31f832aa23f7e84c904b3b8ff6a5d
-
SSDEEP
12288:iMrNy90KItLD9U6csc0Wlc5ao392/gTlYQbOH8t4MhxphtwML/:XyhAlpcw391pjOYFrjr
Malware Config
Extracted
amadey
3.86
http://77.91.68.61/rock/index.php
-
install_dir
925e7e99c5
-
install_file
pdates.exe
-
strings_key
ada76b8b0e1f6892ee93c20ab8946117
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
papik
77.91.124.156:19071
-
auth_value
325a615d8be5db8e2f7a4c2448fdac3a
Extracted
redline
0305
185.215.113.25:10195
-
auth_value
c86205ff1cc37b2da12f0190adfda52c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5298088.exe healer C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5298088.exe healer behavioral2/memory/1296-28-0x00000000002E0000-0x00000000002EA000-memory.dmp healer -
Processes:
a5298088.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5298088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5298088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5298088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5298088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5298088.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5298088.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b2824343.exepdates.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation b2824343.exe Key value queried \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation pdates.exe -
Executes dropped EXE 13 IoCs
Processes:
v1943436.exev7679029.exev9111658.exea5298088.exeb2824343.exepdates.exec3090472.exed9855588.exepdates.exeF836.exeFB63.exepdates.exepdates.exepid process 216 v1943436.exe 4768 v7679029.exe 3868 v9111658.exe 1296 a5298088.exe 4940 b2824343.exe 2288 pdates.exe 1972 c3090472.exe 1792 d9855588.exe 1132 pdates.exe 1936 F836.exe 2856 FB63.exe 3084 pdates.exe 4128 pdates.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 448 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a5298088.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5298088.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exev1943436.exev7679029.exev9111658.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1943436.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7679029.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9111658.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c3090472.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3090472.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3090472.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3090472.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Software\Microsoft\Internet Explorer\IESettingSync Set value (int) \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Key created \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Set value (str) \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000_Classes\Local Settings -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 2944 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a5298088.exec3090472.exepid process 1296 a5298088.exe 1296 a5298088.exe 1972 c3090472.exe 1972 c3090472.exe 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 3232 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
vlc.exepid process 3232 2944 vlc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
c3090472.exepid process 1972 c3090472.exe -
Suspicious use of AdjustPrivilegeToken 57 IoCs
Processes:
a5298088.exeF836.exeFB63.exedescription pid process Token: SeDebugPrivilege 1296 a5298088.exe Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeDebugPrivilege 1936 F836.exe Token: SeDebugPrivilege 2856 FB63.exe Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 Token: SeShutdownPrivilege 3232 Token: SeCreatePagefilePrivilege 3232 -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
b2824343.exevlc.exepid process 4940 b2824343.exe 3232 3232 2944 vlc.exe 3232 3232 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe 3232 3232 -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
vlc.exepid process 2944 vlc.exe 2944 vlc.exe 2944 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 2944 vlc.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exev1943436.exev7679029.exev9111658.exeb2824343.exepdates.execmd.exedescription pid process target process PID 1304 wrote to memory of 216 1304 4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exe v1943436.exe PID 1304 wrote to memory of 216 1304 4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exe v1943436.exe PID 1304 wrote to memory of 216 1304 4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exe v1943436.exe PID 216 wrote to memory of 4768 216 v1943436.exe v7679029.exe PID 216 wrote to memory of 4768 216 v1943436.exe v7679029.exe PID 216 wrote to memory of 4768 216 v1943436.exe v7679029.exe PID 4768 wrote to memory of 3868 4768 v7679029.exe v9111658.exe PID 4768 wrote to memory of 3868 4768 v7679029.exe v9111658.exe PID 4768 wrote to memory of 3868 4768 v7679029.exe v9111658.exe PID 3868 wrote to memory of 1296 3868 v9111658.exe a5298088.exe PID 3868 wrote to memory of 1296 3868 v9111658.exe a5298088.exe PID 3868 wrote to memory of 4940 3868 v9111658.exe b2824343.exe PID 3868 wrote to memory of 4940 3868 v9111658.exe b2824343.exe PID 3868 wrote to memory of 4940 3868 v9111658.exe b2824343.exe PID 4940 wrote to memory of 2288 4940 b2824343.exe pdates.exe PID 4940 wrote to memory of 2288 4940 b2824343.exe pdates.exe PID 4940 wrote to memory of 2288 4940 b2824343.exe pdates.exe PID 4768 wrote to memory of 1972 4768 v7679029.exe c3090472.exe PID 4768 wrote to memory of 1972 4768 v7679029.exe c3090472.exe PID 4768 wrote to memory of 1972 4768 v7679029.exe c3090472.exe PID 2288 wrote to memory of 3416 2288 pdates.exe schtasks.exe PID 2288 wrote to memory of 3416 2288 pdates.exe schtasks.exe PID 2288 wrote to memory of 3416 2288 pdates.exe schtasks.exe PID 2288 wrote to memory of 1096 2288 pdates.exe cmd.exe PID 2288 wrote to memory of 1096 2288 pdates.exe cmd.exe PID 2288 wrote to memory of 1096 2288 pdates.exe cmd.exe PID 1096 wrote to memory of 1412 1096 cmd.exe cmd.exe PID 1096 wrote to memory of 1412 1096 cmd.exe cmd.exe PID 1096 wrote to memory of 1412 1096 cmd.exe cmd.exe PID 1096 wrote to memory of 5092 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 5092 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 5092 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 1984 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 1984 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 1984 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 1556 1096 cmd.exe cmd.exe PID 1096 wrote to memory of 1556 1096 cmd.exe cmd.exe PID 1096 wrote to memory of 1556 1096 cmd.exe cmd.exe PID 1096 wrote to memory of 1584 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 1584 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 1584 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 3028 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 3028 1096 cmd.exe cacls.exe PID 1096 wrote to memory of 3028 1096 cmd.exe cacls.exe PID 216 wrote to memory of 1792 216 v1943436.exe d9855588.exe PID 216 wrote to memory of 1792 216 v1943436.exe d9855588.exe PID 216 wrote to memory of 1792 216 v1943436.exe d9855588.exe PID 3232 wrote to memory of 2944 3232 vlc.exe PID 3232 wrote to memory of 2944 3232 vlc.exe PID 2288 wrote to memory of 448 2288 pdates.exe rundll32.exe PID 2288 wrote to memory of 448 2288 pdates.exe rundll32.exe PID 2288 wrote to memory of 448 2288 pdates.exe rundll32.exe PID 3232 wrote to memory of 1936 3232 F836.exe PID 3232 wrote to memory of 1936 3232 F836.exe PID 3232 wrote to memory of 1936 3232 F836.exe PID 3232 wrote to memory of 2856 3232 FB63.exe PID 3232 wrote to memory of 2856 3232 FB63.exe PID 3232 wrote to memory of 2856 3232 FB63.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exe"C:\Users\Admin\AppData\Local\Temp\4ada782bf1a9a2fd7b1e5c351fd4ecaaafd19e9e07ae9a26847b65bf48c318ce.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1943436.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1943436.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7679029.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7679029.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9111658.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9111658.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5298088.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5298088.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2824343.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2824343.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN pdates.exe /TR "C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe" /F7⤵
- Creates scheduled task(s)
PID:3416
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "pdates.exe" /P "Admin:N"&&CACLS "pdates.exe" /P "Admin:R" /E&&echo Y|CACLS "..\925e7e99c5" /P "Admin:N"&&CACLS "..\925e7e99c5" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1412
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:N"8⤵PID:5092
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "pdates.exe" /P "Admin:R" /E8⤵PID:1984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1556
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:N"8⤵PID:1584
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\925e7e99c5" /P "Admin:R" /E8⤵PID:3028
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:448
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3090472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3090472.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9855588.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d9855588.exe3⤵
- Executes dropped EXE
PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:1132
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\GrantComplete.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2944
-
C:\Users\Admin\AppData\Local\Temp\F836.exeC:\Users\Admin\AppData\Local\Temp\F836.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
C:\Users\Admin\AppData\Local\Temp\FB63.exeC:\Users\Admin\AppData\Local\Temp\FB63.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:3084
-
C:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exeC:\Users\Admin\AppData\Local\Temp\925e7e99c5\pdates.exe1⤵
- Executes dropped EXE
PID:4128
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5816bae1c1895ce3277ecfad5577722b6
SHA1cf85d34a84f2f7931d1852314d4deaf34e4aefa4
SHA256d6037d67f4ecfb120a7654ef87d402f71f405473805adb49908aa2e2fc8bca0c
SHA512ce8769a5a551b43b9a7efc0ddc6c0c35025e81476cb274a28087f8fe48fbf7e77bbacc18ba35677d58c5d96b8156d8dd8ceb951c75c93c55da2274535e7f9994
-
Filesize
227KB
MD5816bae1c1895ce3277ecfad5577722b6
SHA1cf85d34a84f2f7931d1852314d4deaf34e4aefa4
SHA256d6037d67f4ecfb120a7654ef87d402f71f405473805adb49908aa2e2fc8bca0c
SHA512ce8769a5a551b43b9a7efc0ddc6c0c35025e81476cb274a28087f8fe48fbf7e77bbacc18ba35677d58c5d96b8156d8dd8ceb951c75c93c55da2274535e7f9994
-
Filesize
227KB
MD5816bae1c1895ce3277ecfad5577722b6
SHA1cf85d34a84f2f7931d1852314d4deaf34e4aefa4
SHA256d6037d67f4ecfb120a7654ef87d402f71f405473805adb49908aa2e2fc8bca0c
SHA512ce8769a5a551b43b9a7efc0ddc6c0c35025e81476cb274a28087f8fe48fbf7e77bbacc18ba35677d58c5d96b8156d8dd8ceb951c75c93c55da2274535e7f9994
-
Filesize
227KB
MD5816bae1c1895ce3277ecfad5577722b6
SHA1cf85d34a84f2f7931d1852314d4deaf34e4aefa4
SHA256d6037d67f4ecfb120a7654ef87d402f71f405473805adb49908aa2e2fc8bca0c
SHA512ce8769a5a551b43b9a7efc0ddc6c0c35025e81476cb274a28087f8fe48fbf7e77bbacc18ba35677d58c5d96b8156d8dd8ceb951c75c93c55da2274535e7f9994
-
Filesize
227KB
MD5816bae1c1895ce3277ecfad5577722b6
SHA1cf85d34a84f2f7931d1852314d4deaf34e4aefa4
SHA256d6037d67f4ecfb120a7654ef87d402f71f405473805adb49908aa2e2fc8bca0c
SHA512ce8769a5a551b43b9a7efc0ddc6c0c35025e81476cb274a28087f8fe48fbf7e77bbacc18ba35677d58c5d96b8156d8dd8ceb951c75c93c55da2274535e7f9994
-
Filesize
227KB
MD5816bae1c1895ce3277ecfad5577722b6
SHA1cf85d34a84f2f7931d1852314d4deaf34e4aefa4
SHA256d6037d67f4ecfb120a7654ef87d402f71f405473805adb49908aa2e2fc8bca0c
SHA512ce8769a5a551b43b9a7efc0ddc6c0c35025e81476cb274a28087f8fe48fbf7e77bbacc18ba35677d58c5d96b8156d8dd8ceb951c75c93c55da2274535e7f9994
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
341KB
MD58669fe397a7225ede807202f6a9d8390
SHA104a806a5c4218cb703cba85d3e636d0c8cbae043
SHA2561624a759791e49ce8f79dd249d3ac2aede589ffbe53db342e4c99e2fbbc1b90e
SHA51229cad49434172a910ba7635058ecc02aacf43f648ee98b2c47c561332403a96847b5da817358095f7638295b238de8874bf34fb393670096bbf3caeb388a9c45
-
Filesize
412KB
MD55200fbe07521eb001f145afb95d40283
SHA1df6cfdf15b58a0bb24255b3902886dc375f3346f
SHA25600c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812
SHA512c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75
-
Filesize
412KB
MD55200fbe07521eb001f145afb95d40283
SHA1df6cfdf15b58a0bb24255b3902886dc375f3346f
SHA25600c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812
SHA512c38359959ce1083f94d2206d1b4b317e8c5d493168013b4e8c406acb5a55fd4f85ec7ce4d5e400b9105fd82eae3d6301d52346f040a64c09981185c66f2cbf75
-
Filesize
514KB
MD54a9a8315e08ab3c5ebaec761ba363846
SHA1d78a4ae3f3736604145ae07a5318513152291156
SHA25664f9a22fea16d876f2b3128ae763e2803fddbfe3a97cd91be8e80114deead6eb
SHA51299b71bafd8bf1eaa9ceff84cec55735a74caad790539cc1d7235d4e6918baa240e7469aef2faa3f93bd34fb0933222ecdfc8afb1ff150f4b3d1d77a13276655a
-
Filesize
514KB
MD54a9a8315e08ab3c5ebaec761ba363846
SHA1d78a4ae3f3736604145ae07a5318513152291156
SHA25664f9a22fea16d876f2b3128ae763e2803fddbfe3a97cd91be8e80114deead6eb
SHA51299b71bafd8bf1eaa9ceff84cec55735a74caad790539cc1d7235d4e6918baa240e7469aef2faa3f93bd34fb0933222ecdfc8afb1ff150f4b3d1d77a13276655a
-
Filesize
173KB
MD543981693053923e1a57a9fb579c4f75a
SHA164a21e3e3ba5121d4a799e0fccd1f20af6f82e25
SHA256fac54a8c9f27428f3531d4cfa06c30743c51d112f5f49c564d58045b47a11fd6
SHA512cd73973def2f972af937f6a942911af6477bcfc5b508d55100857decdf5300bf7ec1581bd1fb969236885c8e849b6471d61a331bbdad4715e2c05f9c43b4057a
-
Filesize
173KB
MD543981693053923e1a57a9fb579c4f75a
SHA164a21e3e3ba5121d4a799e0fccd1f20af6f82e25
SHA256fac54a8c9f27428f3531d4cfa06c30743c51d112f5f49c564d58045b47a11fd6
SHA512cd73973def2f972af937f6a942911af6477bcfc5b508d55100857decdf5300bf7ec1581bd1fb969236885c8e849b6471d61a331bbdad4715e2c05f9c43b4057a
-
Filesize
359KB
MD5177599010642041a74679ae4de272585
SHA1363baef7ab1250dd1474f07c4f340e4fc5d677d2
SHA2565131c72cabec7a343fb00926054ea641c8b88f01dfea4afb59fa4904e5db4c8a
SHA5121159a011c64f210c0b5f587ed83f5533a288a53bc5924aad361b540098d236042e6faac52562c98482436101827eb0072672719ef16c3ec6b83a4d654af0937c
-
Filesize
359KB
MD5177599010642041a74679ae4de272585
SHA1363baef7ab1250dd1474f07c4f340e4fc5d677d2
SHA2565131c72cabec7a343fb00926054ea641c8b88f01dfea4afb59fa4904e5db4c8a
SHA5121159a011c64f210c0b5f587ed83f5533a288a53bc5924aad361b540098d236042e6faac52562c98482436101827eb0072672719ef16c3ec6b83a4d654af0937c
-
Filesize
37KB
MD507d1424642ef120d01a5f8ec3655620a
SHA1c97d7eabf451d934702e59c3bad535349d44073d
SHA256793efa0f022bf158c4b0d70f0119e787216b911f4141fbdca7d1888480f6e604
SHA51273081c42eb9f05ed6330a27dd35fdb4c3d526fb9abefc77337f23ab7c40e4137ae5ac99933fc9b927aaee1856addb6c1ffc311371ce7dac989c2bb6a40717d02
-
Filesize
37KB
MD507d1424642ef120d01a5f8ec3655620a
SHA1c97d7eabf451d934702e59c3bad535349d44073d
SHA256793efa0f022bf158c4b0d70f0119e787216b911f4141fbdca7d1888480f6e604
SHA51273081c42eb9f05ed6330a27dd35fdb4c3d526fb9abefc77337f23ab7c40e4137ae5ac99933fc9b927aaee1856addb6c1ffc311371ce7dac989c2bb6a40717d02
-
Filesize
234KB
MD5063c63685d99cd7886d779e6044043c5
SHA10bb9d6af814d1f07cc7b90202c5f00a3e50a42f9
SHA256e53e9b5cae6d5dbf5dc867efe8e384046195c78a97642e7f4077dfa269cb5607
SHA512ac180999f6f9aca3465b458bd6009eea1e803124c62fe01a2aa7a8848131e804dc657e734bdbf2c0cfd19dd66e3eec8efdcb1fa6aa62da14493a21d14e6f7d24
-
Filesize
234KB
MD5063c63685d99cd7886d779e6044043c5
SHA10bb9d6af814d1f07cc7b90202c5f00a3e50a42f9
SHA256e53e9b5cae6d5dbf5dc867efe8e384046195c78a97642e7f4077dfa269cb5607
SHA512ac180999f6f9aca3465b458bd6009eea1e803124c62fe01a2aa7a8848131e804dc657e734bdbf2c0cfd19dd66e3eec8efdcb1fa6aa62da14493a21d14e6f7d24
-
Filesize
11KB
MD5bbd440498315e029d0707a934d76cb98
SHA136503d21cccc67be0c8143f51d066f7c0d9ad3b0
SHA2565256ce16ffd51bb8705484957104fd08108954094c1a63e96af68624a4ec23a3
SHA5125d42afbcdcfa1ceab806af9a6547f9c1b880ba8ed8ef75d4abaa6c8523ca91018afc8d852ab6f4b63833db6d8edb2e48dae4bab12709140ddcd8fd3c978c3cd3
-
Filesize
11KB
MD5bbd440498315e029d0707a934d76cb98
SHA136503d21cccc67be0c8143f51d066f7c0d9ad3b0
SHA2565256ce16ffd51bb8705484957104fd08108954094c1a63e96af68624a4ec23a3
SHA5125d42afbcdcfa1ceab806af9a6547f9c1b880ba8ed8ef75d4abaa6c8523ca91018afc8d852ab6f4b63833db6d8edb2e48dae4bab12709140ddcd8fd3c978c3cd3
-
Filesize
227KB
MD5816bae1c1895ce3277ecfad5577722b6
SHA1cf85d34a84f2f7931d1852314d4deaf34e4aefa4
SHA256d6037d67f4ecfb120a7654ef87d402f71f405473805adb49908aa2e2fc8bca0c
SHA512ce8769a5a551b43b9a7efc0ddc6c0c35025e81476cb274a28087f8fe48fbf7e77bbacc18ba35677d58c5d96b8156d8dd8ceb951c75c93c55da2274535e7f9994
-
Filesize
227KB
MD5816bae1c1895ce3277ecfad5577722b6
SHA1cf85d34a84f2f7931d1852314d4deaf34e4aefa4
SHA256d6037d67f4ecfb120a7654ef87d402f71f405473805adb49908aa2e2fc8bca0c
SHA512ce8769a5a551b43b9a7efc0ddc6c0c35025e81476cb274a28087f8fe48fbf7e77bbacc18ba35677d58c5d96b8156d8dd8ceb951c75c93c55da2274535e7f9994
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
89KB
MD52392b231cf4a80739b5cb09bf808127d
SHA141b5cf81c50884954911d96444fe83cfd0da465b
SHA2562244b4dc9afc6cfab7ef1dea92420e2acd275bac7349b929a69f3c1ae25f5e2f
SHA51219ceba063fa1cc1d0116eb11b18d6301a0e1eeda1cb5b983e331e59e4f12e4d0e36d7b4a1d8259dff57a79c47fdcedf89de8e255d932452e441762e4d440ce34
-
Filesize
273B
MD59851b884bf4aadfade57d911a3f03332
SHA1aaadd1c1856c22844bb9fbb030cf4f586ed8866a
SHA25603afb988f3eec62c2da682af371625adcac5a0e69615298f83d99365ab07ac0f
SHA512a7de560f51bacd381d3e741f887c3c40ece88521ee93a22a4f7448297e8bda2131be866d9ae6438c528d9f40a277c18bae517deec16b6b723f67d4c308031327