Analysis
-
max time kernel
178s -
max time network
206s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
236KB
-
MD5
45fb5d1964d47f1a5f75b4ed8789ebdd
-
SHA1
cbde7a1b61b962066fec66649ab1dc1b104584c5
-
SHA256
0ef76ecabac1c81d4e2ed32c6fd30d846214f385a51523b4b78f105d9eb406a3
-
SHA512
063f090aff0ace13e313c0adb96da7f8d2ad3b5815a9fb4dd37d3c9148f848d08f72479d5efc395a12596cfc1e0b5f58ff93877b1b19d444d0ecf1d2858fadb0
-
SSDEEP
3072:BvK7s00BoUQ9WpfHVOZIg3+CLHLO6QWf040Fg4exbM4577JA0Bi:kQ0koUQ0ptOZYC7qS5ygDB77S0
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
Extracted
djvu
http://zexeq.com/raud/get.php
-
extension
.mlrd
-
offline_id
FjtJkuhRHnUARRt9GnbbgUTa6ErhJq4ZM668xSt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-xN3VuzQl0a Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0805JOsie
Extracted
amadey
3.87
http://79.137.192.18/9bDc8sQ/index.php
-
install_dir
577f58beff
-
install_file
yiueea.exe
-
strings_key
a5085075a537f09dec81cc154ec0af4d
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
51.255.152.132:36011
Signatures
-
Detected Djvu ransomware 7 IoCs
resource yara_rule behavioral1/memory/2512-22-0x0000000001F30000-0x000000000204B000-memory.dmp family_djvu behavioral1/memory/2484-27-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2484-32-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2484-34-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2484-96-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2484-224-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2000-238-0x0000000004CE0000-0x00000000055CB000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Glupteba payload 6 IoCs
resource yara_rule behavioral1/memory/1276-63-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/1276-64-0x0000000004CE0000-0x00000000055CB000-memory.dmp family_glupteba behavioral1/memory/1276-97-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/1276-104-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/1276-204-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/1276-236-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2932-115-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/2932-116-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/2932-118-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/2932-157-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral1/memory/2932-159-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1368 Process not Found -
Executes dropped EXE 7 IoCs
pid Process 2512 3015.exe 2484 3015.exe 764 396A.exe 1276 482A.exe 1100 yiueea.exe 2180 6250.exe 636 8CBA.exe -
Loads dropped DLL 4 IoCs
pid Process 2512 3015.exe 2868 regsvr32.exe 764 396A.exe 1368 Process not Found -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2336 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\5d354780-2ea0-45f9-898d-054acb56b574\\3015.exe\" --AutoStart" 3015.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.2ip.ua 19 api.2ip.ua -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2512 set thread context of 2484 2512 3015.exe 30 PID 2180 set thread context of 2932 2180 6250.exe 50 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2156 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 yiueea.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 yiueea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 yiueea.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 yiueea.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 yiueea.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 yiueea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2724 file.exe 2724 file.exe 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1368 Process not Found -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2724 file.exe 1368 Process not Found 1368 Process not Found 1368 Process not Found 1368 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1368 Process not Found Token: SeShutdownPrivilege 1368 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2512 1368 Process not Found 29 PID 1368 wrote to memory of 2512 1368 Process not Found 29 PID 1368 wrote to memory of 2512 1368 Process not Found 29 PID 1368 wrote to memory of 2512 1368 Process not Found 29 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 2512 wrote to memory of 2484 2512 3015.exe 30 PID 1368 wrote to memory of 2560 1368 Process not Found 31 PID 1368 wrote to memory of 2560 1368 Process not Found 31 PID 1368 wrote to memory of 2560 1368 Process not Found 31 PID 1368 wrote to memory of 2560 1368 Process not Found 31 PID 1368 wrote to memory of 2560 1368 Process not Found 31 PID 2560 wrote to memory of 2868 2560 regsvr32.exe 32 PID 2560 wrote to memory of 2868 2560 regsvr32.exe 32 PID 2560 wrote to memory of 2868 2560 regsvr32.exe 32 PID 2560 wrote to memory of 2868 2560 regsvr32.exe 32 PID 2560 wrote to memory of 2868 2560 regsvr32.exe 32 PID 2560 wrote to memory of 2868 2560 regsvr32.exe 32 PID 2560 wrote to memory of 2868 2560 regsvr32.exe 32 PID 1368 wrote to memory of 764 1368 Process not Found 34 PID 1368 wrote to memory of 764 1368 Process not Found 34 PID 1368 wrote to memory of 764 1368 Process not Found 34 PID 1368 wrote to memory of 764 1368 Process not Found 34 PID 1368 wrote to memory of 1276 1368 Process not Found 36 PID 1368 wrote to memory of 1276 1368 Process not Found 36 PID 1368 wrote to memory of 1276 1368 Process not Found 36 PID 1368 wrote to memory of 1276 1368 Process not Found 36 PID 764 wrote to memory of 1100 764 396A.exe 37 PID 764 wrote to memory of 1100 764 396A.exe 37 PID 764 wrote to memory of 1100 764 396A.exe 37 PID 764 wrote to memory of 1100 764 396A.exe 37 PID 1368 wrote to memory of 2180 1368 Process not Found 38 PID 1368 wrote to memory of 2180 1368 Process not Found 38 PID 1368 wrote to memory of 2180 1368 Process not Found 38 PID 1368 wrote to memory of 2180 1368 Process not Found 38 PID 1100 wrote to memory of 2156 1100 yiueea.exe 40 PID 1100 wrote to memory of 2156 1100 yiueea.exe 40 PID 1100 wrote to memory of 2156 1100 yiueea.exe 40 PID 1100 wrote to memory of 2156 1100 yiueea.exe 40 PID 1100 wrote to memory of 1212 1100 yiueea.exe 42 PID 1100 wrote to memory of 1212 1100 yiueea.exe 42 PID 1100 wrote to memory of 1212 1100 yiueea.exe 42 PID 1100 wrote to memory of 1212 1100 yiueea.exe 42 PID 2484 wrote to memory of 2336 2484 3015.exe 47 PID 2484 wrote to memory of 2336 2484 3015.exe 47 PID 2484 wrote to memory of 2336 2484 3015.exe 47 PID 2484 wrote to memory of 2336 2484 3015.exe 47 PID 1212 wrote to memory of 2276 1212 cmd.exe 46 PID 1212 wrote to memory of 2276 1212 cmd.exe 46 PID 1212 wrote to memory of 2276 1212 cmd.exe 46 PID 1212 wrote to memory of 2276 1212 cmd.exe 46 PID 1212 wrote to memory of 2352 1212 cmd.exe 45 PID 1212 wrote to memory of 2352 1212 cmd.exe 45 PID 1212 wrote to memory of 2352 1212 cmd.exe 45 PID 1212 wrote to memory of 2352 1212 cmd.exe 45 PID 1212 wrote to memory of 2260 1212 cmd.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2724
-
C:\Users\Admin\AppData\Local\Temp\3015.exeC:\Users\Admin\AppData\Local\Temp\3015.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3015.exeC:\Users\Admin\AppData\Local\Temp\3015.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\5d354780-2ea0-45f9-898d-054acb56b574" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2336
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3573.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3573.dll2⤵
- Loads dropped DLL
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\396A.exeC:\Users\Admin\AppData\Local\Temp\396A.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F3⤵
- Creates scheduled task(s)
PID:2156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:R" /E4⤵PID:2260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "yiueea.exe" /P "Admin:N"4⤵PID:2352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\577f58beff" /P "Admin:N"4⤵PID:2772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\577f58beff" /P "Admin:R" /E4⤵PID:1116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\482A.exeC:\Users\Admin\AppData\Local\Temp\482A.exe1⤵
- Executes dropped EXE
PID:1276
-
C:\Users\Admin\AppData\Local\Temp\6250.exeC:\Users\Admin\AppData\Local\Temp\6250.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\8CBA.exeC:\Users\Admin\AppData\Local\Temp\8CBA.exe1⤵
- Executes dropped EXE
PID:636
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2000
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55752e76f4a0b2b31800e12054d63e4f2
SHA1f4bd4ebfa1cf5bb1cc2fb73bf8f9b9aebfa3a469
SHA256e1d7a2d85c698ba61dafc58bc9a1b864c6caf69f99583f03d4b858da88229b59
SHA51266c68f8a5b1630e18b3f025d1077bf18438b0d9e64c3464331a851ba541118caf7069bfa73263386a4f72deeee74e3738e3e030c21be9ddc8bbdb6287728b1e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5183c3e10f607382cfd65ae3a3f7a49a6
SHA1cb4c23a0cbecc5e3f9e208e1f5acebe7b38ccce7
SHA25630e2bca9abcea3b25541fa3cb152cf24e824d9c6068ae1dd37ec686d4e843500
SHA512f17f2f0bbc837de2e9aaf9d8262b83bd31fd8ee637b75f9a506f3ccad2cdbb6583d70cea5950d4452cacbe061f2633a52460ae3f42be89130e63dda6a0c3da33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a8bfe64b58e383b63e878ffa644da2cf
SHA11f7dcd2bd62d4afcd25e585185f693d5af596d8b
SHA256eadef1d392bfd82ccd1c9e5aa255fd09aa586a8973216cc4d89f185ebbcb2f2c
SHA512bb3e93548437a1b3683564f4b9fb19eb0301e1f358740d7865ebc70b5a497149dd3fa15acd5a1cf2e28e42daa575ffb3ce2def38af0166421483d31b128b8bda
-
Filesize
749KB
MD5c2ab34e22731eda5d7be4450c6d8360f
SHA1674696af77f6ac0125daf2b616f86ffc73270213
SHA256a37187c1b3fedca26b6416e10cdab4feae86e6a5f7140487f3f2d7f2fa088e40
SHA51285a98862b243e6b0397478a4d2d5395f9155dbf4f4d478ea965c4af7f0e8a554597971e63fb6b92c2e9690c4db0c074977a362971b4a580d97de300ce34380d7
-
Filesize
196B
MD562962daa1b19bbcc2db10b7bfd531ea6
SHA1d64bae91091eda6a7532ebec06aa70893b79e1f8
SHA25680c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880
SHA5129002a0475fdb38541e78048709006926655c726e93e823b84e2dbf5b53fd539a5342e7266447d23db0e5528e27a19961b115b180c94f2272ff124c7e5c8304e7
-
Filesize
749KB
MD5c2ab34e22731eda5d7be4450c6d8360f
SHA1674696af77f6ac0125daf2b616f86ffc73270213
SHA256a37187c1b3fedca26b6416e10cdab4feae86e6a5f7140487f3f2d7f2fa088e40
SHA51285a98862b243e6b0397478a4d2d5395f9155dbf4f4d478ea965c4af7f0e8a554597971e63fb6b92c2e9690c4db0c074977a362971b4a580d97de300ce34380d7
-
Filesize
749KB
MD5c2ab34e22731eda5d7be4450c6d8360f
SHA1674696af77f6ac0125daf2b616f86ffc73270213
SHA256a37187c1b3fedca26b6416e10cdab4feae86e6a5f7140487f3f2d7f2fa088e40
SHA51285a98862b243e6b0397478a4d2d5395f9155dbf4f4d478ea965c4af7f0e8a554597971e63fb6b92c2e9690c4db0c074977a362971b4a580d97de300ce34380d7
-
Filesize
749KB
MD5c2ab34e22731eda5d7be4450c6d8360f
SHA1674696af77f6ac0125daf2b616f86ffc73270213
SHA256a37187c1b3fedca26b6416e10cdab4feae86e6a5f7140487f3f2d7f2fa088e40
SHA51285a98862b243e6b0397478a4d2d5395f9155dbf4f4d478ea965c4af7f0e8a554597971e63fb6b92c2e9690c4db0c074977a362971b4a580d97de300ce34380d7
-
Filesize
749KB
MD5c2ab34e22731eda5d7be4450c6d8360f
SHA1674696af77f6ac0125daf2b616f86ffc73270213
SHA256a37187c1b3fedca26b6416e10cdab4feae86e6a5f7140487f3f2d7f2fa088e40
SHA51285a98862b243e6b0397478a4d2d5395f9155dbf4f4d478ea965c4af7f0e8a554597971e63fb6b92c2e9690c4db0c074977a362971b4a580d97de300ce34380d7
-
Filesize
2.3MB
MD59a5c196882cd03714b7dab68e9eb4068
SHA15d1f92d394aa78e5f6430575e6fe1fc858f6ff59
SHA2560e73c416fefed93971ae4f58892dce12e1ce7a4d39073fdc9efb0ba2330b0a0a
SHA51287a3af5ac7d02a3837c24ddae4b4d120a41a1c52e6c9bd297aa3fe53e59628d5adec23b17ba50019f6b3f539a0f872aa94281dddc6d10c98239c8490c39a417b
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
4.1MB
MD5bed38d1c2bc4ce17b6e5bd62bea91bfc
SHA152ec31bbb0de852b91e70c79c53109c3874b4e9a
SHA256c35e108252d29ffd8a9cced55dd110958c77324a6220b58a6a4d712fff5c2b9a
SHA5121709a270ef91d79bea55d49dd3dc9af5be611848ce2d3194ad62735189b5f5b3f675f7bcf5da588179d658443357080d65a095507296200e14a13403ad469552
-
Filesize
4.1MB
MD5bed38d1c2bc4ce17b6e5bd62bea91bfc
SHA152ec31bbb0de852b91e70c79c53109c3874b4e9a
SHA256c35e108252d29ffd8a9cced55dd110958c77324a6220b58a6a4d712fff5c2b9a
SHA5121709a270ef91d79bea55d49dd3dc9af5be611848ce2d3194ad62735189b5f5b3f675f7bcf5da588179d658443357080d65a095507296200e14a13403ad469552
-
Filesize
4.1MB
MD5bed38d1c2bc4ce17b6e5bd62bea91bfc
SHA152ec31bbb0de852b91e70c79c53109c3874b4e9a
SHA256c35e108252d29ffd8a9cced55dd110958c77324a6220b58a6a4d712fff5c2b9a
SHA5121709a270ef91d79bea55d49dd3dc9af5be611848ce2d3194ad62735189b5f5b3f675f7bcf5da588179d658443357080d65a095507296200e14a13403ad469552
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
1.2MB
MD55b293206e810d2871736e1ecbd9cc196
SHA147c0baadfba1876cb8ffdff6f057f16f2076197f
SHA256f31ce717ef107b5c0901a0c8581553b71ad7a09180e28a1575b0955905519628
SHA512110ae30f84747fb35cc75f6b2608aea5f90f25c3b2c49105deedc121d2ab8036949f58acc3d436b5d4584c9c1a7a30bac74f501b786f4e71d6414950d19fbb32
-
Filesize
1.2MB
MD55b293206e810d2871736e1ecbd9cc196
SHA147c0baadfba1876cb8ffdff6f057f16f2076197f
SHA256f31ce717ef107b5c0901a0c8581553b71ad7a09180e28a1575b0955905519628
SHA512110ae30f84747fb35cc75f6b2608aea5f90f25c3b2c49105deedc121d2ab8036949f58acc3d436b5d4584c9c1a7a30bac74f501b786f4e71d6414950d19fbb32
-
Filesize
7.8MB
MD55242541fd5af4d01bece6ef3492165e7
SHA1d8f9f496989ef2a545ab5986e36f304697567fdb
SHA256f69bf14646ae9fc6db31cdfe34bbf2d2b972584f6e1979845a4a54b28fb6ab97
SHA512ecb1a4b98d4a27e8628d945162d7d369c1cad74ea0955656c500f9a388e17b866fb9490273abcfb75090db8ca3280a15426f7b0dd40b2287545f1e9c713c6912
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
749KB
MD5c2ab34e22731eda5d7be4450c6d8360f
SHA1674696af77f6ac0125daf2b616f86ffc73270213
SHA256a37187c1b3fedca26b6416e10cdab4feae86e6a5f7140487f3f2d7f2fa088e40
SHA51285a98862b243e6b0397478a4d2d5395f9155dbf4f4d478ea965c4af7f0e8a554597971e63fb6b92c2e9690c4db0c074977a362971b4a580d97de300ce34380d7
-
Filesize
2.3MB
MD59a5c196882cd03714b7dab68e9eb4068
SHA15d1f92d394aa78e5f6430575e6fe1fc858f6ff59
SHA2560e73c416fefed93971ae4f58892dce12e1ce7a4d39073fdc9efb0ba2330b0a0a
SHA51287a3af5ac7d02a3837c24ddae4b4d120a41a1c52e6c9bd297aa3fe53e59628d5adec23b17ba50019f6b3f539a0f872aa94281dddc6d10c98239c8490c39a417b
-
Filesize
307KB
MD555f845c433e637594aaf872e41fda207
SHA11188348ca7e52f075e7d1d0031918c2cea93362e
SHA256f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA5125a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4
-
Filesize
7.8MB
MD55242541fd5af4d01bece6ef3492165e7
SHA1d8f9f496989ef2a545ab5986e36f304697567fdb
SHA256f69bf14646ae9fc6db31cdfe34bbf2d2b972584f6e1979845a4a54b28fb6ab97
SHA512ecb1a4b98d4a27e8628d945162d7d369c1cad74ea0955656c500f9a388e17b866fb9490273abcfb75090db8ca3280a15426f7b0dd40b2287545f1e9c713c6912