Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
13-12-2023 01:18
Static task
static1
Behavioral task
behavioral1
Sample
ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe
Resource
win10v2004-20231127-en
General
-
Target
ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe
-
Size
373KB
-
MD5
5e0108b8d42ce8169e28692e0f144b98
-
SHA1
292ece7e8e65348339bdd9c8fc1c2371f39a1b16
-
SHA256
ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf
-
SHA512
217c5f05f044cab4288d8acedcdb7b2d9afcea6b68c9bccf80baed983e66164abd0e51de2245459da8ec2435a229e7d6735435d452123c5a0e5422975b4d8603
-
SSDEEP
6144:utStuRpDW2mzTcE8YedXudHL/SEOAzqI3dKWP6IkR9fTIlVmJCf5/YJg+lEjqJE:uktuR9W2wTcE8/dedrSKl3ws65VElVEC
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
Kene123456789 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Run\pdf = "C:\\Users\\Admin\\AppData\\Roaming\\pdf.exe" ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exedescription pid process target process PID 2928 set thread context of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 2980 ipconfig.exe 1748 ipconfig.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e1e81ecbc95de49994f369c3e71718400000000020000000000106600000001000020000000ff88f2a9da0fc2b7d56f52e4346e851218ed23782484b21d7917059c812b6267000000000e8000000002000020000000d4455d544a976c04c7d5cac05305f147b2af6d73e29bd08d801ee681b84fef20200000000284b04fb3c163273c0a2413be8e9788c87698a93fac9e2549868a51b6ea1f38400000007083131b20611e8d0a96057544f328e72a80aba7f40cd2178eeb8870aa6e9159e8d4be767f8c40c5534cd7db97d7bce9d07f9638bd2888d022e126dcd4f83937 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "408592244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0bfba83622dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD069641-9955-11EE-B466-42BF89FD39DA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exepowershell.execa4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exepid process 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe 2736 powershell.exe 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe 1644 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe 1644 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exepowershell.execa4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exedescription pid process Token: SeDebugPrivilege 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 1644 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2492 iexplore.exe 2492 iexplore.exe 1812 IEXPLORE.EXE 1812 IEXPLORE.EXE 1812 IEXPLORE.EXE 1812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.execmd.execmd.exepowershell.exeiexplore.exedescription pid process target process PID 2928 wrote to memory of 1708 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe cmd.exe PID 2928 wrote to memory of 1708 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe cmd.exe PID 2928 wrote to memory of 1708 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe cmd.exe PID 2928 wrote to memory of 1708 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe cmd.exe PID 1708 wrote to memory of 1748 1708 cmd.exe ipconfig.exe PID 1708 wrote to memory of 1748 1708 cmd.exe ipconfig.exe PID 1708 wrote to memory of 1748 1708 cmd.exe ipconfig.exe PID 1708 wrote to memory of 1748 1708 cmd.exe ipconfig.exe PID 2928 wrote to memory of 2736 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe powershell.exe PID 2928 wrote to memory of 2736 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe powershell.exe PID 2928 wrote to memory of 2736 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe powershell.exe PID 2928 wrote to memory of 2736 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe powershell.exe PID 2928 wrote to memory of 2612 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe cmd.exe PID 2928 wrote to memory of 2612 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe cmd.exe PID 2928 wrote to memory of 2612 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe cmd.exe PID 2928 wrote to memory of 2612 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe cmd.exe PID 2612 wrote to memory of 2980 2612 cmd.exe ipconfig.exe PID 2612 wrote to memory of 2980 2612 cmd.exe ipconfig.exe PID 2612 wrote to memory of 2980 2612 cmd.exe ipconfig.exe PID 2612 wrote to memory of 2980 2612 cmd.exe ipconfig.exe PID 2736 wrote to memory of 2492 2736 powershell.exe iexplore.exe PID 2736 wrote to memory of 2492 2736 powershell.exe iexplore.exe PID 2736 wrote to memory of 2492 2736 powershell.exe iexplore.exe PID 2736 wrote to memory of 2492 2736 powershell.exe iexplore.exe PID 2492 wrote to memory of 1812 2492 iexplore.exe IEXPLORE.EXE PID 2492 wrote to memory of 1812 2492 iexplore.exe IEXPLORE.EXE PID 2492 wrote to memory of 1812 2492 iexplore.exe IEXPLORE.EXE PID 2492 wrote to memory of 1812 2492 iexplore.exe IEXPLORE.EXE PID 2928 wrote to memory of 2408 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 2408 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 2408 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 2408 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 2408 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 2408 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 2408 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe PID 2928 wrote to memory of 1644 2928 ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe"C:\Users\Admin\AppData\Local\Temp\ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:1748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACcAaAB0AHQAcABzADoALwAvAGcAbwBvAGcAbABlAC4AYwBvAG0AJwA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://google.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exeC:\Users\Admin\AppData\Local\Temp\ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe2⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exeC:\Users\Admin\AppData\Local\Temp\ca4f67cfea7c66c6a46c0a7ab0564260836aacd3bb50dde935672f1be920dbaf.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b2da3375e428cedae9b678adb1e93cf7
SHA17b6bf457323f7ff2dde30eb09cd5ea7cf330086b
SHA2560dfcfedffd7e1915468715cbca3de1c369fb7042553aaea76746cccd23704466
SHA5128046dda596837c1dbfac9901a95990030674aab0f9c3c66f62202f9594caaa0ec30d948df5715e85d763a0bd520d18b7aec6cc4848c129c59829da930193c69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58356019805b87e86898a47e4a140ca1f
SHA17e678f410fcb273ce0cf2c6c19db7b4123408f5b
SHA256699230cd754b784e1d7d46b16530621258a7e3144077dae7d5b7b3df77cafc63
SHA512c50922c6e1dd6c9b47443400bb995f5623a7278a8a8511e7dccc1eddf555cd82db92cb8394f8d6cde69bdbe6599c77113691e500fc7390344ddc0aac2e6cf31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d27d474750385ba32463461faa38da6
SHA1f103094b9059cc08ba8ed356fb596d6be621d898
SHA2562c96bfab2c47ec0be21f63b0eb3603b0c5d851bca85dbdfbe8316b0f12c55da1
SHA512e8fe04bd8e1f29fd9ecab69235fc12215d1119a81254021e75da692bd800c063230251475d37155d3111084ca756d439772900746e6f836706c09764c44c625c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc75be2e6d3d1ac7ccab8089bf86de61
SHA18d8cf43116ab2366997ef4efc62513cbedee7129
SHA2564a79f63c65bb366a55ab9309a3688e4b166c79152007ae9bc67a85d0c4804e71
SHA512db37b517fe983d21ed500347b88a1656569a6add24dc1f94478a1e466551dad9a6156fddfc800f081ecce5da80e2d5377013ca217d767c59560ca09f83297a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5019ee675e4ed9d3458259085decafcf4
SHA12ce33e1598372b22174c2a5738ee9662d2323bc2
SHA256e1fdd9a956f3de3a248829daaa62fc7a1c2628b28da5d5758107a06aa6e7ed77
SHA512e397c2ad84440ea147f7b4b04a197b495b4f57df12aff5ac0d4a788853a11fbb5a6fc4cbee85d410520931b74509d975f1bcb7deb0149ac57948b80d7c700097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558e6a5bc9b2c97e330b6f56a7b6737b0
SHA19f2fe1f712c84509ccf85086385732b3a8d51072
SHA256b48d3674c192bde3966d6a457d99e4da2d52d48f40f2560e3091e5a41dfacb7b
SHA5120c23e2efdadea9eb8c5828ae2e9a4c51699a71da90863112bde3aba90c2ee67d6606d8a598f287939507707d45928d1b33355959e4045d727d6e8de6b24216e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9738416f03b270fdd4da82572cb64e1
SHA1b516fcb4895030b982e04d31ab5d5e1bd69c46f6
SHA25610fe4e0dc53208f723426cb89dfaaec84e7f3ce77d0ce802044edce57557216c
SHA512b656be3049f13173aa4ec387ad894e9403bb4be06295fab3d58f0381f540d4c9a4703e9d63191a915987b85c15405ae68c3cdd48768fcea925f898fdfc561f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6ce5e7685a529b53e37826e30d71078
SHA1d980445db6237b39003541d9aee70da4fffd5eb6
SHA2567bae2b16adc588676947341c3f164a1f28b3187b68232d26798693a16d3d29bb
SHA5127e83549a8851a2a1bd7edb9a06dd6792c044325fee7f6396934f13c9a9535fdfcfc3eddcea7734e41a4ef91f3a4770ddb4d38346fdc4ae0129599159427fd43a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550c913c64ac082ba39f7eebe1f311b6c
SHA1eb03152d8fa7376131a7f8ad52a2d03cca920dae
SHA256b41e4326acef5d8e3f6a8bb8bcd57d6c47a019c4abfc9b56bec0917cf11d6641
SHA5122979eb8db9e3be1044b0792495609b11f236cc483ef88943d1a264a9d16a84565aedbbbc52ac8cafa704cb357b4e5bc81d7502065cfeaf826634bd366855acc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563f8c84a6237cccc77ed78044dfa4162
SHA17ac10ab31b05cc540bb83a8ee43931298cf3286b
SHA2566a38dab10470b3d483bbf516a391ccc36832f7d57fa9e8b51e0e3b6413a9d5c2
SHA51251009ed3bfede94b2524f5a5c271bbbf87f24e5a8bbe533d793ca471be0a1db7523934a6b6829a3f27580f77143464937b5f9e48a993a784c4ddecc0cc5ee0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bb1f94b04c09c40638f1199083c826b
SHA10c947444d358dac0dceca49d08bb3367212f8b3b
SHA256309c51bacab682ecad6aff3c464c8580c17c1941a494c3cbdd847627cd575516
SHA5124d037f6e401cebf9544c24ac69a6c8f846637739bec0876d6eeceabb460604dbf6faeadd2f2f2127ff9bde1aa583ab7418522449c1ff23c0c6f1aafb9bc7bbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c780d6ceb771fc7108873a57aef470c9
SHA1144ece05464f691977de3486ceacee6aeec2b310
SHA25665689b3027a02aac484919bf44a646adde3331337fd83b9714b2983624ce4f4c
SHA512ce6483c5eac376fa196c0533222ae5459b18400627ee75d922b10bec3eb22a60bd6773040d338901f3e62377c8353b4f90b21fb2e8e15a26b9534634569e788f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58964a1bcf266cbb4bed1ca8c90b961d5
SHA19321e123a66ad7a5793a8503b91d8898a841a7ef
SHA256c5ca2b0d8d03c58f9e87976f45a93fa8df7049b083583c2602783d8a079a0a48
SHA5128af16aa7f61a4d0746751292a0e46e5449842e014e6b37fd003fb52064b56e0b56a61f7d48b5b1c8072d2627aa55bc3897636998052641512a4c03be0c53992e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518d76a1fc370724ab881e7e0982b6008
SHA18e0a172d4e7fd3440160d28e324b647729e90637
SHA256cb7f7bf13e09b443b942135a53a0fe9afee414e8d1a08b635a9585319fdb7583
SHA512e0a60eb337dadab6268a9ce7e5988a5205e7e7a99e3e21ad62f7c3024333fe9826f90fe615825133dc8dc3db148402bba8359bbe7e2990613b3e4450505f4caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e8f473014e39ef19299454b5c7568f9
SHA108b52ea805aa6fc91d295d0a7706b5bb4534004c
SHA25634d22297e234756c9f725a4d0e2769ade1d41cd075b90cff9bbb6a25126815ef
SHA51240d2f172aa278a5dec827a357d3a22bbb5ac567900800ef0a42157f5321d694eebbf5b9112d758463bb2ed846df4b1e7e323774da5d4fc33cda25331651346d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57110294d073be848a1e7c96549437147
SHA1da0cb300ad34f0f47df0ab8444b40d728ec566d6
SHA2563cd747ad1c592735874d5bcc933f4702352b0f3dd32b3cbb0d1a6e725b56e133
SHA512856077d881c0ab2b3e605cfb567263bd005858742f78ecc120f69cbbde71944f57b9cebb5bb31feba08fd235610b5abb1a581203f1389a4c3311bfbef711bab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52813f78e35a4708e7f6d2c97805d05b3
SHA104be05158438152c43cf994b5a67d9bae851510e
SHA256dfafbbf4458f1983c925fc323bc3e00c8515aea1ed46e7ad2307544b47ca96ee
SHA5121efc565dcea211e2a5e0ec545d09d8782c1c5e29d8a01bb088786821a816db64f646e98e5b5d188c16995c4e462547c01a0320f3a8791dd0610ff64a93a46760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a59dde9fc21b9d8f521491be4f814cf8
SHA1d4b9c649e65c6216cb27019788726e137edf9dd6
SHA256847fbf0d722839e3a8f618329b1399204cbf6824dbd4f4c21c976b61b1c5dbfd
SHA5124fafba2051914bd6410926e806a8c12826dbe65baec4599be903541aea5a8cf01b5a1dfbfb175f51d9dd2171a9ec290de65a660a4973e1d7ce15f7d7659dcc60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5048a90d11719da9d8d87c9af5b3528b3
SHA1ba6df4bff5ee9ee56aba3277f3436608adc70a0c
SHA256d9322dafca33c719e66b3d44a647fe8b29c79179fd7877ddb8a87a9f954c5cc8
SHA512ea4efec5439db1aef54afa73e82317f5234912735c479394dad8630bed27f4275bfecfad2d714f5ba1d21bcb8f549238724090496937a41d575a366fe8355e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53709b81d4b298046ad4429694a95b7be
SHA193ce75d99c11be3e9c4a77a59c03441bca1717ac
SHA256a066d641932af2a05be726e2bba315d216b11047435930344db88fddc710b349
SHA5128c91fdff13a17de17f9b86ce4c4f905a35771e84dcc13cddde0ebcb32d3c68c7617f9e83c2c48be6123d7e6a3c266c6fe9ab3d8252fceed3e55968dfa2a9b16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54053c3e83b9351837de2cb21eba4f8fe
SHA122a23f33c96e1fc0de3247880d2276fcd46a255f
SHA256ba05ee3a697a0ad9c3c42bdaf235bedd142384776438230046cd9614b8181c02
SHA51224279291e7fcbbc932b8f7a2fefd8aa5b66bb59a521f346b67001aec4b30ff8af9e632614cd6966e97af4eab2d41f72208d4cb7c6be09815a8cbda654fde74cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b661ddc5f3b6ae7c098ff8ed0f60461
SHA1e30a3f70be9e62f1c2c734d7f16dd5615ee39618
SHA256d9e5b12e39cc17c5606e7d452ea59d82917b76c2507c4f965126a66ba184a865
SHA512b846258c0f0c77ed28031e8f8d0f995bdd34943cafe4be7839e2d575c7232717337cb018b78fc0da959cd3e63d2a5d36c00126f380df759dc1b722ccbcfe6aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579beb71c1be999710db7f3d5b0b57b89
SHA140e71a972e6d193fa9e953793739d9c855a97ed2
SHA2567c77272a164361b95ad04bb1a7e6651a78ca10ab0e07e30816f2559c6d5d5200
SHA51217f0e81c96677e7bf8b033175bd73f86c4e1a57ca469283f44ca1757a41ecb0a432c35b7255950444fbbf74afbc7bd1f319f77ca918e525ad232753b901300cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b880d010233a501be31feac588c7f8c
SHA174f276821742c9a59f960faf08f212b94b613112
SHA256a7c3bf8b31f76d1fb8f87fff611f26f8e94f84cc4113b1ae69cafef6c151281d
SHA5129446120787e98aaf313f5e8750f5c1615ec8c2c3f53299515e305cfdb8be18cc981caa9a2fe8e2ff6357f10bce16cbb2a2f8c328a41d4536a70b824febba58af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5270316784f89830b300442c977d3de01
SHA13155cd951d5ef88cee12469aa538907dad838bbc
SHA256c4427c8c8288cb21cfc61d0a54516195aba25a85c793908d75f8d8168f0fe3ba
SHA51281ea05bd52be35383c5d618195d073e23e9b97f9e8a8bc49c56dd869a00dc637ebe8a451e7cc2cf639c521d994447d15d3ca1e2cd8965f375060bd1502da46e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc7f12e6a9eb0857973ef356db206cb3
SHA1b1252c6805fb66552163584f3e4cac514aec46d1
SHA25662698f743147e222e6ccbb0296236cd71941a236f0c8a6c695fffa7a7174606a
SHA51228c0eac6af0a707bb9d4feb500592f6cb5e1dbd83708f0a087146e5d2ae753c3d3b82a481626e93ec54e7e2a0e90ac7160f1e7087593271a43105addb38b291d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5714d91964d76bbd8941c92c2055f1a60
SHA1b697cafd3e1bd08b19967851d5750511c7ca67f8
SHA2569209ca59ee7c6ebf8993ddcf26cf1b00805e3fbb3fc27ed1f4678ff2f95be0ea
SHA512bc9619860748ba1e2effed594b5d0ba27cdf11fee7c889263adb525295a4c5c997bdccbac9eb34c0719526271c748bd3ec4d823da86678475812e315ecc4cf8d
-
Filesize
5KB
MD5f5368cc514845728d8cb680c5240811d
SHA1fa1e17e899fe14f66af5fabb4586e4eefaedd90a
SHA256387dda2e565836661c577ae1b284874323210f4590492099afea367df65d17c8
SHA512054ace9838fe3c9c491b0d4245c04a34009e80ffc0f7f50b53a37e4874feded2c28b1f179d3a5703ac29c2df9767b733b2e4e7a9dfef2bc2289bfb8444537d6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7TVQOT0Y\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06