Analysis
-
max time kernel
186s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe
Resource
win10v2004-20230915-en
General
-
Target
f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe
-
Size
1.3MB
-
MD5
3c980fce67b5dc379aa4c3169c02a2eb
-
SHA1
68f70d8fcd519506d6fe1695f1f39d7804ef52ff
-
SHA256
f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75
-
SHA512
466a94b952d0100081af2ddf332465224240a85874d763f8253be57c4fcfcf6d0f805b689d7cd5a9d5a1224c5b0362e35838fc1569531bbed4f7ef57eee01b9d
-
SSDEEP
24576:siuBtZbTvdsmgJBMvsj8uJxvZSPJmGH+8bk+WUXJpQ2tSrqUheqbgr:7uBfvAz8k8uJnUbH3bk+NXJ22tShekgr
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/3776-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3776-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3776-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3776-49-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4876-40-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation t1452270.exe -
Executes dropped EXE 15 IoCs
pid Process 3472 z8391200.exe 1160 z6231519.exe 2844 z2060135.exe 4940 z1243249.exe 2176 q7076321.exe 3660 r7691440.exe 4944 s4179628.exe 4444 t1452270.exe 2916 2FBC.exe 4800 5640.exe 948 ea1ES6Vk.exe 1524 6824.exe 892 Tm7pX9mL.exe 2568 68E1.exe 3952 Bh7NH7Ri.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6231519.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2060135.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z1243249.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" 2FBC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ea1ES6Vk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP006.TMP\\\"" Tm7pX9mL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8391200.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5032 set thread context of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 2176 set thread context of 4876 2176 q7076321.exe 96 PID 3660 set thread context of 3776 3660 r7691440.exe 102 PID 4944 set thread context of 3200 4944 s4179628.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4864 3776 WerFault.exe 102 4208 3776 WerFault.exe 102 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3200 AppLaunch.exe 3200 AppLaunch.exe 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 4876 AppLaunch.exe 4876 AppLaunch.exe 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found 3156 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3156 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3200 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 4876 AppLaunch.exe Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found Token: SeShutdownPrivilege 3156 Process not Found Token: SeCreatePagefilePrivilege 3156 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 5032 wrote to memory of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 5032 wrote to memory of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 5032 wrote to memory of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 5032 wrote to memory of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 5032 wrote to memory of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 5032 wrote to memory of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 5032 wrote to memory of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 5032 wrote to memory of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 5032 wrote to memory of 4964 5032 f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe 88 PID 4964 wrote to memory of 3472 4964 AppLaunch.exe 90 PID 4964 wrote to memory of 3472 4964 AppLaunch.exe 90 PID 4964 wrote to memory of 3472 4964 AppLaunch.exe 90 PID 3472 wrote to memory of 1160 3472 z8391200.exe 91 PID 3472 wrote to memory of 1160 3472 z8391200.exe 91 PID 3472 wrote to memory of 1160 3472 z8391200.exe 91 PID 1160 wrote to memory of 2844 1160 z6231519.exe 92 PID 1160 wrote to memory of 2844 1160 z6231519.exe 92 PID 1160 wrote to memory of 2844 1160 z6231519.exe 92 PID 2844 wrote to memory of 4940 2844 z2060135.exe 93 PID 2844 wrote to memory of 4940 2844 z2060135.exe 93 PID 2844 wrote to memory of 4940 2844 z2060135.exe 93 PID 4940 wrote to memory of 2176 4940 z1243249.exe 94 PID 4940 wrote to memory of 2176 4940 z1243249.exe 94 PID 4940 wrote to memory of 2176 4940 z1243249.exe 94 PID 2176 wrote to memory of 4876 2176 q7076321.exe 96 PID 2176 wrote to memory of 4876 2176 q7076321.exe 96 PID 2176 wrote to memory of 4876 2176 q7076321.exe 96 PID 2176 wrote to memory of 4876 2176 q7076321.exe 96 PID 2176 wrote to memory of 4876 2176 q7076321.exe 96 PID 2176 wrote to memory of 4876 2176 q7076321.exe 96 PID 2176 wrote to memory of 4876 2176 q7076321.exe 96 PID 2176 wrote to memory of 4876 2176 q7076321.exe 96 PID 4940 wrote to memory of 3660 4940 z1243249.exe 97 PID 4940 wrote to memory of 3660 4940 z1243249.exe 97 PID 4940 wrote to memory of 3660 4940 z1243249.exe 97 PID 3660 wrote to memory of 3776 3660 r7691440.exe 102 PID 3660 wrote to memory of 3776 3660 r7691440.exe 102 PID 3660 wrote to memory of 3776 3660 r7691440.exe 102 PID 3660 wrote to memory of 3776 3660 r7691440.exe 102 PID 3660 wrote to memory of 3776 3660 r7691440.exe 102 PID 3660 wrote to memory of 3776 3660 r7691440.exe 102 PID 3660 wrote to memory of 3776 3660 r7691440.exe 102 PID 3660 wrote to memory of 3776 3660 r7691440.exe 102 PID 3660 wrote to memory of 3776 3660 r7691440.exe 102 PID 3660 wrote to memory of 3776 3660 r7691440.exe 102 PID 2844 wrote to memory of 4944 2844 z2060135.exe 103 PID 2844 wrote to memory of 4944 2844 z2060135.exe 103 PID 2844 wrote to memory of 4944 2844 z2060135.exe 103 PID 4944 wrote to memory of 4416 4944 s4179628.exe 106 PID 4944 wrote to memory of 4416 4944 s4179628.exe 106 PID 4944 wrote to memory of 4416 4944 s4179628.exe 106 PID 4944 wrote to memory of 3200 4944 s4179628.exe 107 PID 4944 wrote to memory of 3200 4944 s4179628.exe 107 PID 4944 wrote to memory of 3200 4944 s4179628.exe 107 PID 4944 wrote to memory of 3200 4944 s4179628.exe 107 PID 4944 wrote to memory of 3200 4944 s4179628.exe 107 PID 4944 wrote to memory of 3200 4944 s4179628.exe 107 PID 1160 wrote to memory of 4444 1160 z6231519.exe 108 PID 1160 wrote to memory of 4444 1160 z6231519.exe 108 PID 1160 wrote to memory of 4444 1160 z6231519.exe 108 PID 3776 wrote to memory of 4864 3776 AppLaunch.exe 113 PID 3776 wrote to memory of 4864 3776 AppLaunch.exe 113 PID 3776 wrote to memory of 4864 3776 AppLaunch.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe"C:\Users\Admin\AppData\Local\Temp\f053afdbbe9e2955df89085e0a95576cb32fc6cca1ba02e7872af942bd84ec75.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8391200.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8391200.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6231519.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6231519.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2060135.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2060135.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1243249.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1243249.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7076321.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7076321.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7691440.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7691440.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 2089⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 2089⤵
- Program crash
PID:4208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4179628.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4179628.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4416
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3200
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1452270.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1452270.exe5⤵
- Checks computer location settings
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"6⤵PID:5116
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3776 -ip 37761⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2FBC.exeC:\Users\Admin\AppData\Local\Temp\2FBC.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ea1ES6Vk.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ea1ES6Vk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:948 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\Tm7pX9mL.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\Tm7pX9mL.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:892 -
C:\Users\Admin\AppData\Local\Temp\IXP006.TMP\Bh7NH7Ri.exeC:\Users\Admin\AppData\Local\Temp\IXP006.TMP\Bh7NH7Ri.exe4⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\IXP007.TMP\hE4pi5op.exeC:\Users\Admin\AppData\Local\Temp\IXP007.TMP\hE4pi5op.exe5⤵PID:1100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5640.exeC:\Users\Admin\AppData\Local\Temp\5640.exe1⤵
- Executes dropped EXE
PID:4800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6535.bat" "1⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\6824.exeC:\Users\Admin\AppData\Local\Temp\6824.exe1⤵
- Executes dropped EXE
PID:1524
-
C:\Users\Admin\AppData\Local\Temp\68E1.exeC:\Users\Admin\AppData\Local\Temp\68E1.exe1⤵
- Executes dropped EXE
PID:2568
-
C:\Users\Admin\AppData\Local\Temp\7BAE.exeC:\Users\Admin\AppData\Local\Temp\7BAE.exe1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD578965c583b819e7536ce9ca4f05e1733
SHA1aba60e62e018819e3ff9fecc93561a1279d0c8cc
SHA2563bd31b1ea73d52711183f82293f3877af34804af68de349489dec7a2a5019f0d
SHA512f8e2aae663c754123ff8368cbb0c0a6aa13c0bf305045b7a9fb4055edeedbb243ec838938080e30fd3bcfaec9f66a4264b0feb65d8cb085aae819194426d3014
-
Filesize
1.1MB
MD578965c583b819e7536ce9ca4f05e1733
SHA1aba60e62e018819e3ff9fecc93561a1279d0c8cc
SHA2563bd31b1ea73d52711183f82293f3877af34804af68de349489dec7a2a5019f0d
SHA512f8e2aae663c754123ff8368cbb0c0a6aa13c0bf305045b7a9fb4055edeedbb243ec838938080e30fd3bcfaec9f66a4264b0feb65d8cb085aae819194426d3014
-
Filesize
298KB
MD59c9348e8972103b851fbea581449eca4
SHA1563cfe22df34dfea1a6bcfda5c76f7cf685a6c71
SHA25691fd02b1e1e7d6790317b2aad2ef4ab04630f6fb54c8fc1c2c63a8b1269dfcb7
SHA5121012ac67964f35242e64d19de4f4e25e4e356b52b4661b4106e1223b0fc23b91464157a35d69c0d3b970586c38c0649fb6a580644f313dfacbbf73c9359cae42
-
Filesize
298KB
MD59c9348e8972103b851fbea581449eca4
SHA1563cfe22df34dfea1a6bcfda5c76f7cf685a6c71
SHA25691fd02b1e1e7d6790317b2aad2ef4ab04630f6fb54c8fc1c2c63a8b1269dfcb7
SHA5121012ac67964f35242e64d19de4f4e25e4e356b52b4661b4106e1223b0fc23b91464157a35d69c0d3b970586c38c0649fb6a580644f313dfacbbf73c9359cae42
-
Filesize
79B
MD5403991c4d18ac84521ba17f264fa79f2
SHA1850cc068de0963854b0fe8f485d951072474fd45
SHA256ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576
-
Filesize
339KB
MD5987d7d599e7cf92c4129be1f6b619d3f
SHA11f1466cc009f5434c5436e1a9dc0d8ee6e39c88d
SHA256170b4dc32acf36d03caa0cbf31775069a02ecc98feca2d7bf98b879be1262fa3
SHA5129687b85327dc55b45081db44e2496f52acf8541f34b69cf7c24cd1551a808cc2f0da439f67dbbfa49aad811cc9b0a8eec2d25a3b9351b43f69d61bcf5ae2178f
-
Filesize
339KB
MD5987d7d599e7cf92c4129be1f6b619d3f
SHA11f1466cc009f5434c5436e1a9dc0d8ee6e39c88d
SHA256170b4dc32acf36d03caa0cbf31775069a02ecc98feca2d7bf98b879be1262fa3
SHA5129687b85327dc55b45081db44e2496f52acf8541f34b69cf7c24cd1551a808cc2f0da439f67dbbfa49aad811cc9b0a8eec2d25a3b9351b43f69d61bcf5ae2178f
-
Filesize
18KB
MD5699e4d50715035f880833637234303ce
SHA1a089fa24bed3ed880e352e8ac1c7b994dae50c88
SHA256e7289f6de239105fd2553dca6eb34fa6cd612e3aef81dd24f5a6ba9b494fd557
SHA5123ef5a7bec6d957c957b20d76878b2ffa52edd99c9f08a3032872849bf432ce4d4b40820043991ebe397e29747e23650af6e041912c3ebebb524de0765ab69735
-
Filesize
18KB
MD5699e4d50715035f880833637234303ce
SHA1a089fa24bed3ed880e352e8ac1c7b994dae50c88
SHA256e7289f6de239105fd2553dca6eb34fa6cd612e3aef81dd24f5a6ba9b494fd557
SHA5123ef5a7bec6d957c957b20d76878b2ffa52edd99c9f08a3032872849bf432ce4d4b40820043991ebe397e29747e23650af6e041912c3ebebb524de0765ab69735
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
229KB
MD578e5bc5b95cf1717fc889f1871f5daf6
SHA165169a87dd4a0121cd84c9094d58686be468a74a
SHA2567d2e2e4f369bcdbbe4a1d9acd299e230adc522d46e54f59e321622d80da02966
SHA512d97bc87809e5f52cd015ced62488f738ea24a16c31d1fb836091b72112b200e304f0d8fab3ef762411b662ed60df0ca5fc24d4e98adb22b79e5e74a9292c1500
-
Filesize
989KB
MD56e4f439e5166b453da899bf29dfbc8b3
SHA1b2c39ee71560e92fa738854a28627b12b63d57fa
SHA256c403454e97150a56f7e70abca0d5795ac56f4db90b83a38cc4c6cf5316de0485
SHA51222b3ec723884d74a959963b78acab0314afc72b5795f9f1a2cdbe2bf19c66129a1cc126ca6bf7343405020d052826225818d7ed069185d7882d83b68942cc9b0
-
Filesize
989KB
MD56e4f439e5166b453da899bf29dfbc8b3
SHA1b2c39ee71560e92fa738854a28627b12b63d57fa
SHA256c403454e97150a56f7e70abca0d5795ac56f4db90b83a38cc4c6cf5316de0485
SHA51222b3ec723884d74a959963b78acab0314afc72b5795f9f1a2cdbe2bf19c66129a1cc126ca6bf7343405020d052826225818d7ed069185d7882d83b68942cc9b0
-
Filesize
735KB
MD533a239033a2a49403751fb3dfff4f978
SHA10e6ec542c57d857b0d10e7cd388475e9ce7c9be4
SHA2561b915077ea3b60137447cd72ffb07a728c533fe54ded94d822a36a61e2d0c9b1
SHA512e4b0e142eb18c568a7885f95a465a4572a66470a9bb82d5d79a3435f485765041245da7a342222491baf7dd20fee03a92db861d5fc268e9a2c7c2774dd65595b
-
Filesize
735KB
MD533a239033a2a49403751fb3dfff4f978
SHA10e6ec542c57d857b0d10e7cd388475e9ce7c9be4
SHA2561b915077ea3b60137447cd72ffb07a728c533fe54ded94d822a36a61e2d0c9b1
SHA512e4b0e142eb18c568a7885f95a465a4572a66470a9bb82d5d79a3435f485765041245da7a342222491baf7dd20fee03a92db861d5fc268e9a2c7c2774dd65595b
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
552KB
MD5ed233e9a4848a5ed5dd3bf547b360a27
SHA1b95b45dda0eea884789a3238650bb6679aa0ca83
SHA256f6e9c9c8f62086d4bc10b70cbeac9d7ae5432a466c41ef187f61ddc787c07a7e
SHA5121dc0bc19668a3ca9e12978c330d128ffd7e15358e5278c81e3586da2327793187f07f2987b5be7fa77d45faadfb194e9973a1893a6f9850447cc66c47597e59f
-
Filesize
552KB
MD5ed233e9a4848a5ed5dd3bf547b360a27
SHA1b95b45dda0eea884789a3238650bb6679aa0ca83
SHA256f6e9c9c8f62086d4bc10b70cbeac9d7ae5432a466c41ef187f61ddc787c07a7e
SHA5121dc0bc19668a3ca9e12978c330d128ffd7e15358e5278c81e3586da2327793187f07f2987b5be7fa77d45faadfb194e9973a1893a6f9850447cc66c47597e59f
-
Filesize
1009KB
MD58cf89a22259388d25aebaeabc332da01
SHA11402207ef3f2f8c1ac10ab9919b0aded3e2b0960
SHA2567a99d052576035f87e071275587226a8c233efa83885435999144e5d994eb476
SHA512901d49e93330987287a369e3e74d594566cd9c1e2a0f64b1f2f86c85f68050457f806215c3abd4d5014455da40f6cc8f78bc4e4167c5152bd464bd8746057c54
-
Filesize
1009KB
MD58cf89a22259388d25aebaeabc332da01
SHA11402207ef3f2f8c1ac10ab9919b0aded3e2b0960
SHA2567a99d052576035f87e071275587226a8c233efa83885435999144e5d994eb476
SHA512901d49e93330987287a369e3e74d594566cd9c1e2a0f64b1f2f86c85f68050457f806215c3abd4d5014455da40f6cc8f78bc4e4167c5152bd464bd8746057c54
-
Filesize
232KB
MD5765aa4625b70c5fa5ec49bfec52aa822
SHA1b3ff4f5a9d951a959f69aa2ed22e9847ff95b498
SHA256bbe39345895cdaa196904e095fc9e5f7075db082d3e507cf5c1f55d4867c515a
SHA512d4d8d374667bc761994ec4552c7699e25f35c4ad996c67a08376d053997532c5d39bf4b50c4513274ee7a2c0122acd846e9e41d7f6bc9faf20c7164334d2dfea
-
Filesize
232KB
MD5765aa4625b70c5fa5ec49bfec52aa822
SHA1b3ff4f5a9d951a959f69aa2ed22e9847ff95b498
SHA256bbe39345895cdaa196904e095fc9e5f7075db082d3e507cf5c1f55d4867c515a
SHA512d4d8d374667bc761994ec4552c7699e25f35c4ad996c67a08376d053997532c5d39bf4b50c4513274ee7a2c0122acd846e9e41d7f6bc9faf20c7164334d2dfea
-
Filesize
328KB
MD5d8d716e75bc0c3dfa389ad4124791c60
SHA1845dfe6dab7b2a5f3889952f078779cc3d3cd71f
SHA256e9a14ce38fcd585815639de976d278ec45ded60cfd61792f933f78b4790b4c28
SHA512f6d2947db1f5352d5bf4b77a0c3b80b3e408227aa92d859a2b4498bdc358c3644766ed46033487d6270b321dc22cb857bc32b112cda40b5772421870dc73de54
-
Filesize
328KB
MD5d8d716e75bc0c3dfa389ad4124791c60
SHA1845dfe6dab7b2a5f3889952f078779cc3d3cd71f
SHA256e9a14ce38fcd585815639de976d278ec45ded60cfd61792f933f78b4790b4c28
SHA512f6d2947db1f5352d5bf4b77a0c3b80b3e408227aa92d859a2b4498bdc358c3644766ed46033487d6270b321dc22cb857bc32b112cda40b5772421870dc73de54
-
Filesize
213KB
MD5780f15cec9d6d7f5c5ca657d437f833f
SHA1e8d3c1b86257fd556d8a84aa9291824824eef68a
SHA25600e27da24c1d3de46521087cb1b74278605cada09f640c08e3ecf1c52d83b2ca
SHA5125179ea596658a71b97cbe1cde3944b6b1b286036b1921b8cb7c150d378f411e13595be7785ed77b98e822a8ca08a3e9779a4c62e1fbe48848031632d8102eadd
-
Filesize
213KB
MD5780f15cec9d6d7f5c5ca657d437f833f
SHA1e8d3c1b86257fd556d8a84aa9291824824eef68a
SHA25600e27da24c1d3de46521087cb1b74278605cada09f640c08e3ecf1c52d83b2ca
SHA5125179ea596658a71b97cbe1cde3944b6b1b286036b1921b8cb7c150d378f411e13595be7785ed77b98e822a8ca08a3e9779a4c62e1fbe48848031632d8102eadd
-
Filesize
342KB
MD51e74b0ee6fc0d3f7770d937c3062e12e
SHA10425d1182754bb233df02c5e54b77b1151c72ebe
SHA2562c5c5210f3056b3336e90ac0b5ccf043ed7124744af544dcc1ba36605899c561
SHA512ded9d59da437cf30fd84f539205e869e0bfa7cfac980848eacaefa65709ff5ccbcec5de5a09fdb20bb16e35973da58a188869a3b57e217054904d1d154e218e9
-
Filesize
342KB
MD51e74b0ee6fc0d3f7770d937c3062e12e
SHA10425d1182754bb233df02c5e54b77b1151c72ebe
SHA2562c5c5210f3056b3336e90ac0b5ccf043ed7124744af544dcc1ba36605899c561
SHA512ded9d59da437cf30fd84f539205e869e0bfa7cfac980848eacaefa65709ff5ccbcec5de5a09fdb20bb16e35973da58a188869a3b57e217054904d1d154e218e9
-
Filesize
819KB
MD5556b751bdddaff82e5618794bcc95081
SHA1c8a8e5cfbde5cf35df42c3b9c97ebdef5d042c53
SHA256fb9647b66a4bde6365104badeac5932f0684e09f310714ac9004afc14c9e5457
SHA51229fad8ac597dd08068e66b1d3cee1d28c07f4156f96850fe39b77872a230844f8befde27ffe09e80270c748f2be3bbc2159f85d822101bc59f00f0b872fb1fe3
-
Filesize
819KB
MD5556b751bdddaff82e5618794bcc95081
SHA1c8a8e5cfbde5cf35df42c3b9c97ebdef5d042c53
SHA256fb9647b66a4bde6365104badeac5932f0684e09f310714ac9004afc14c9e5457
SHA51229fad8ac597dd08068e66b1d3cee1d28c07f4156f96850fe39b77872a230844f8befde27ffe09e80270c748f2be3bbc2159f85d822101bc59f00f0b872fb1fe3
-
Filesize
584KB
MD5c6bb3fb8604c2da3e162199b8b813313
SHA1e357b9280ac1d81d864c680e459db398028119a3
SHA2565a0c543812ced9df094e7e82a4f97bebb8a446f2877b9fa0684fcc014aecf9dd
SHA5125d0369a467ac0b9b889d9c3f477f18645184f2c5f64d4e227b720f89c45c8813ca58326446aa2bdb10f407214330005b39aec971195b8d6704f895a33629ab2a
-
Filesize
584KB
MD5c6bb3fb8604c2da3e162199b8b813313
SHA1e357b9280ac1d81d864c680e459db398028119a3
SHA2565a0c543812ced9df094e7e82a4f97bebb8a446f2877b9fa0684fcc014aecf9dd
SHA5125d0369a467ac0b9b889d9c3f477f18645184f2c5f64d4e227b720f89c45c8813ca58326446aa2bdb10f407214330005b39aec971195b8d6704f895a33629ab2a
-
Filesize
383KB
MD52626d4e07c77280133f1fa0cfbe7825b
SHA12438dda6388f158716e3eddc2988e4a2da0024ae
SHA256a99e06741c9e6088618201ce69ef2830aaa8d550f3ec3636644ef6cc2cc8a6ce
SHA51244f903f11315c7703c1606724d3e8d908f506bb313d0c0d48219b664ed3d9cfe957c1397e2aad8a630055a3d5f0a4d2122cc27c76d7ebc336ca95b66e093cedf
-
Filesize
383KB
MD52626d4e07c77280133f1fa0cfbe7825b
SHA12438dda6388f158716e3eddc2988e4a2da0024ae
SHA256a99e06741c9e6088618201ce69ef2830aaa8d550f3ec3636644ef6cc2cc8a6ce
SHA51244f903f11315c7703c1606724d3e8d908f506bb313d0c0d48219b664ed3d9cfe957c1397e2aad8a630055a3d5f0a4d2122cc27c76d7ebc336ca95b66e093cedf
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a