Analysis
-
max time kernel
69s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
1d30329bea26a94c7533e6a15fd68f67.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d30329bea26a94c7533e6a15fd68f67.exe
Resource
win10v2004-20231215-en
General
-
Target
1d30329bea26a94c7533e6a15fd68f67.exe
-
Size
190KB
-
MD5
1d30329bea26a94c7533e6a15fd68f67
-
SHA1
72545848045ce62f372772e8f300c434617cc4f1
-
SHA256
8aea737cd72c75948220d629b4bcbb3a230df7f76e0d5faca2e7ee014e43260d
-
SHA512
b404290c5c8387477af7f19faeaa9df465b34e6fa367454a949e2aa89a028bd3085c5367e2058ca5e57f36161d53c13859fccac5e748addd2e23b3e66a0da622
-
SSDEEP
3072:r/na6WDmrZ5Cn79xvlr2xmOJ5wUuWXcfb0hw7IACb873684yVcx566/zn8VT8I2Z:r/nuDm9knmhJ4/sMLuO6/zuij9
Malware Config
Signatures
-
Drops file in Drivers directory 11 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 1d30329bea26a94c7533e6a15fd68f67.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1d30329bea26a94c7533e6a15fd68f67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\Param2 = "%ProgramFiles(x86)%\\Internet Explorer\\iexplore.exe" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\method = "ShellExecute" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\Param1 = "http://%77%77%77%2e%37%34%30%30%2e%6e%65%74" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\Param2 = "%ProgramFiles(x86)%\\Internet Explorer\\iexplore.exe" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\shellex\MayChangeDefaultMenu 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\command = "´ò¿ªÖ÷Ò³" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\Param2 = "%ProgramFiles(x86)%\\Internet Explorer\\iexplore.exe" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\InProcServer32\ThreadingModel = "Apartment" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\shellex\MayChangeDefaultMenu 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\shellex\MayChangeDefaultMenu\ 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\command = "´ò¿ªÖ÷Ò³" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\command = "´ò¿ªÖ÷Ò³" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\shellex\MayChangeDefaultMenu\ 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex\ContextMenuHandlers\ieframe 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers\ieframe 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\shellex\MayChangeDefaultMenu\ 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\shellex\MayChangeDefaultMenu 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\shellex\MayChangeDefaultMenu\ 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\InProcServer32 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\command = "´ò¿ªÖ÷Ò³" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\InProcServer32 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers\ieframe 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\ShellFolder 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\InProcServer32\ThreadingModel = "Apartment" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\Param2 = "%ProgramFiles(x86)%\\Internet Explorer\\iexplore.exe" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers\ieframe 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex\ContextMenuHandlers\ieframe 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\Param2 = "%ProgramFiles(x86)%\\Internet Explorer\\iexplore.exe" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 1d30329bea26a94c7533e6a15fd68f67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{63218229-6240-5437-6321-624072098731}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers\ieframe 1d30329bea26a94c7533e6a15fd68f67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\ShellFolder 1d30329bea26a94c7533e6a15fd68f67.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4232 wrote to memory of 3812 4232 1d30329bea26a94c7533e6a15fd68f67.exe 94 PID 4232 wrote to memory of 3812 4232 1d30329bea26a94c7533e6a15fd68f67.exe 94 PID 4232 wrote to memory of 3812 4232 1d30329bea26a94c7533e6a15fd68f67.exe 94 PID 3812 wrote to memory of 4512 3812 1d30329bea26a94c7533e6a15fd68f67.exe 101 PID 3812 wrote to memory of 4512 3812 1d30329bea26a94c7533e6a15fd68f67.exe 101 PID 3812 wrote to memory of 4512 3812 1d30329bea26a94c7533e6a15fd68f67.exe 101 PID 4512 wrote to memory of 2020 4512 1d30329bea26a94c7533e6a15fd68f67.exe 104 PID 4512 wrote to memory of 2020 4512 1d30329bea26a94c7533e6a15fd68f67.exe 104 PID 4512 wrote to memory of 2020 4512 1d30329bea26a94c7533e6a15fd68f67.exe 104 PID 2020 wrote to memory of 1416 2020 1d30329bea26a94c7533e6a15fd68f67.exe 105 PID 2020 wrote to memory of 1416 2020 1d30329bea26a94c7533e6a15fd68f67.exe 105 PID 2020 wrote to memory of 1416 2020 1d30329bea26a94c7533e6a15fd68f67.exe 105 PID 1416 wrote to memory of 5064 1416 1d30329bea26a94c7533e6a15fd68f67.exe 111 PID 1416 wrote to memory of 5064 1416 1d30329bea26a94c7533e6a15fd68f67.exe 111 PID 1416 wrote to memory of 5064 1416 1d30329bea26a94c7533e6a15fd68f67.exe 111 PID 5064 wrote to memory of 3652 5064 1d30329bea26a94c7533e6a15fd68f67.exe 113 PID 5064 wrote to memory of 3652 5064 1d30329bea26a94c7533e6a15fd68f67.exe 113 PID 5064 wrote to memory of 3652 5064 1d30329bea26a94c7533e6a15fd68f67.exe 113 PID 3652 wrote to memory of 4552 3652 1d30329bea26a94c7533e6a15fd68f67.exe 115 PID 3652 wrote to memory of 4552 3652 1d30329bea26a94c7533e6a15fd68f67.exe 115 PID 3652 wrote to memory of 4552 3652 1d30329bea26a94c7533e6a15fd68f67.exe 115 PID 4552 wrote to memory of 4692 4552 1d30329bea26a94c7533e6a15fd68f67.exe 117 PID 4552 wrote to memory of 4692 4552 1d30329bea26a94c7533e6a15fd68f67.exe 117 PID 4552 wrote to memory of 4692 4552 1d30329bea26a94c7533e6a15fd68f67.exe 117 PID 4692 wrote to memory of 4924 4692 1d30329bea26a94c7533e6a15fd68f67.exe 119 PID 4692 wrote to memory of 4924 4692 1d30329bea26a94c7533e6a15fd68f67.exe 119 PID 4692 wrote to memory of 4924 4692 1d30329bea26a94c7533e6a15fd68f67.exe 119 PID 4924 wrote to memory of 4064 4924 1d30329bea26a94c7533e6a15fd68f67.exe 122 PID 4924 wrote to memory of 4064 4924 1d30329bea26a94c7533e6a15fd68f67.exe 122 PID 4924 wrote to memory of 4064 4924 1d30329bea26a94c7533e6a15fd68f67.exe 122 PID 4064 wrote to memory of 4780 4064 1d30329bea26a94c7533e6a15fd68f67.exe 124 PID 4064 wrote to memory of 4780 4064 1d30329bea26a94c7533e6a15fd68f67.exe 124 PID 4064 wrote to memory of 4780 4064 1d30329bea26a94c7533e6a15fd68f67.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"3⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"4⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"5⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"6⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"7⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"8⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"9⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"10⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"11⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"12⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"13⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"14⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"15⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"16⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"17⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"18⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"19⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"C:\Users\Admin\AppData\Local\Temp\1d30329bea26a94c7533e6a15fd68f67.exe"20⤵PID:4852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542B
MD52c650faa042765b7087461041554f4c2
SHA1253a5503092295e66c2cdc56ec79dce4ff687686
SHA256bddf1032bf1b8be326adfb6ec42c89f4d4ccfc903a8b4c125df977e16a560ea0
SHA512d1705ddd9539c45a41fd434ae113c13ed743df927f82ac048db38a8efd7230e3591810d84dedc7a939bf59d5d87c22f04ee0efda8842ad3496f22789893ecad5
-
Filesize
110B
MD50c0d0e7d1ff282741e93063e8217a5de
SHA1a9c22f8512353135adc61741c5023efc12031902
SHA256a16d3daaea2a1840394c5a008b7c02a32ea8bdbba5d494882f1d4fb5db1aba9c
SHA512373ff5d053def330dfd86b9620fd738e315ce87991d652145fd5dd69374bf3e65a7831c362905a4c66f35d62477b7f325b8a5ea593d76a86e09db7700c1e506e
-
Filesize
172B
MD522b614a4ee841c2e05923729a6ffdada
SHA1c34f2381057f52b71e674ce64a82bd676e9d6960
SHA256a58fd8e4d1c42e5df1784933b00c37227ae12e3a1f20ba01067178f4fbc7b11c
SHA51286ed892aaea7f3759b9a73b0902e229ccaac754b45356ed1f710cc254d4c78dcc5468bc847a98f4079715e86a5dc709001765261bc897f80fac7a96dc687d444
-
Filesize
173B
MD5059f6443035003a725962466c7d7a13c
SHA1032bb625248c19eaca850c14840b6141415ecbda
SHA25656b428cb43ddeaafbc2fafbd502f91a182aed00bda2714fcb07bdff24d7a371d
SHA512ac22f2283abeb33716ff80afdff47a9a7244142953aa41a8cf86dffd2d53017c1c11cb9d607c5e79d0f84ff5e2819fdc774784a005dd1fe1141f49a2104ea824
-
Filesize
3KB
MD51c02de6fb74121aae4a7963d1da56629
SHA179669aba35056ff100dea8b7a3cf16a66f11ca9b
SHA25604aee5637a664256a4744b8144b14136356f7f5ab349acad127ffd4458ba0258
SHA512600f02e1a996ebedd2bb4af8377c8ab2600c87cf26cf1122d3156ec37a1c0a06b707128cb2a46370dcbe265d5fa917d0af8a0d08945c4e3516a0fe0fe351e6d0
-
Filesize
4KB
MD5d36ffc06b85061d59b754ae1916e8161
SHA1cf6e426d5ae08cad23a1e188ec9ffb4695604337
SHA256b0c6a7725ae033bea5db66d5cb7acc69394848accbbee20f03ec16ac985dceb2
SHA5129406e9e797d175f158bbd511f8670aeeb6951909b0963526f71b1ad5d8d0ba9e5998dcc95821a80490ee359b7f3fbfbf5c02f05702009281f5fc6f8027e95b5c
-
Filesize
5KB
MD5c6f3791fcb6c9eaa124a4b1103efd9ad
SHA176d3302deae23abdc390170b0e98f12f5b96a691
SHA256d2fabf7e8f870bda4557340c2670f710c17b5cf2611c043dc040eb6086a34e7d
SHA5122849240e92e172fdc182cfbe31e46bf4900df3e1e87282dc4f07da73e806f8ddbddb635c4bfa4338d3dc26896532af1d619dd68e1bfda72169760dc9f88d900c
-
Filesize
6KB
MD5de3ef479a53cd2c8997323686bc01c46
SHA1832176d47421800102f30053647b978ad674ed06
SHA256beb1da46d6dbc2a836fc24edfdf5a2fb843b0be85842260d84f279fd3f3f5e80
SHA51291d78abf1929bf0b3a099940c9d17c9dbb588dd1aaadc7aa8e9ef443e0fb65249aef6821f921dabe6fc8324d19b06e0b759f402d4deac632a65729ad88ffc1c1
-
Filesize
2KB
MD5ae16116e642f43f0b545d7e2deec0110
SHA1b063bcf11cee30894d641cad9a1fea6a52f5e3fc
SHA256ecc022c3540a0cf4d7023b7f97f52228d6325ea9a8082ba1e1a2dc4b033f3a84
SHA512c95b04fcceb2e15dcc326ed40d1595c1e9ba33ed3759bbabf14f72fddf52bdbddb396ba4adf39c308a7132e416de305fbe2a486624f750319dcb0e897202dfd2
-
Filesize
2KB
MD551bc574d1afd6f7000fb3bb034bc9318
SHA14a077056a052fde0a2c2f52110da3b5bd6c5e474
SHA256911bd6ab5ddf882411c5580c59833356c6aab2e83272899a3cf945ba3441f8c8
SHA5126876159829a1d8759219406eb4941c728942dc2e02bfa139ae89b2c4f7087d23f0b2bac0b112ab28b6da913fd83cf8916f3574ca362f2aec3926d0f98fc771de