Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 18:16

General

  • Target

    33d8b78a224a7c7c928a8c58f23aa960.exe

  • Size

    361KB

  • MD5

    33d8b78a224a7c7c928a8c58f23aa960

  • SHA1

    4f88d079b757b57f64bf6053dc9bf589e7ac9789

  • SHA256

    2c8a962969174aced4dae8eac738722552d9cfcf2d9fe1da227db7abcba32b6e

  • SHA512

    2ad68e43e134b4fa4998c73cbdd67c76a592c3acb9d31d71edd1c50f825be1a05f1d795903df217e7820dc569e04af0ad0fe4b00212d050fe99380e0efd8a657

  • SSDEEP

    6144:aflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:aflfAsiVGjSGecvX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Gathers network information 2 TTPs 19 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33d8b78a224a7c7c928a8c58f23aa960.exe
    "C:\Users\Admin\AppData\Local\Temp\33d8b78a224a7c7c928a8c58f23aa960.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3468
    • C:\Temp\hbztrmjecwrojhbz.exe
      C:\Temp\hbztrmjecwrojhbz.exe run
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3996
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\omgezwrpjh.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:4956
        • C:\Temp\omgezwrpjh.exe
          C:\Temp\omgezwrpjh.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:4616
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:4576
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_omgezwrpjh.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:1732
        • C:\Temp\i_omgezwrpjh.exe
          C:\Temp\i_omgezwrpjh.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3412
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\wtolgeywqo.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:2112
        • C:\Temp\wtolgeywqo.exe
          C:\Temp\wtolgeywqo.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4680
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:4520
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:4688
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_wtolgeywqo.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:4016
        • C:\Temp\i_wtolgeywqo.exe
          C:\Temp\i_wtolgeywqo.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1532
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\oigbytqljd.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1444
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_oigbytqljd.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:4592
        • C:\Temp\i_oigbytqljd.exe
          C:\Temp\i_oigbytqljd.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4960
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\nigaysqlid.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:2388
        • C:\Temp\nigaysqlid.exe
          C:\Temp\nigaysqlid.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3908
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:5032
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:1724
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_nigaysqlid.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:2412
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\nhfaxsqkic.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1480
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_nhfaxsqkic.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:2636
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\qkicausnkf.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:3304
        • C:\Temp\qkicausnkf.exe
          C:\Temp\qkicausnkf.exe ups_run
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4960
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:3248
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:3912
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_qkicausnkf.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:2140
        • C:\Temp\i_qkicausnkf.exe
          C:\Temp\i_qkicausnkf.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1040
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\khcausmkec.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:2764
        • C:\Temp\khcausmkec.exe
          C:\Temp\khcausmkec.exe ups_run
          4⤵
          • Executes dropped EXE
          PID:1520
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:2112
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:4788
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_khcausmkec.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:4156
        • C:\Temp\i_khcausmkec.exe
          C:\Temp\i_khcausmkec.exe ups_ins
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3404
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\ezxrpjhbzu.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:3348
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_ezxrpjhbzu.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:3016
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\mhezpjhbzt.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1628
        • C:\Temp\mhezpjhbzt.exe
          C:\Temp\mhezpjhbzt.exe ups_run
          4⤵
          • Executes dropped EXE
          PID:1444
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:4664
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:3184
            • C:\temp\CreateProcess.exe
              C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
              6⤵
                PID:3868
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\i_mhezpjhbzt.exe ups_ins
          3⤵
          • Executes dropped EXE
          PID:4908
          • C:\Temp\i_mhezpjhbzt.exe
            C:\Temp\i_mhezpjhbzt.exe ups_ins
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3768
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\hbwtomgeyw.exe ups_run
          3⤵
          • Executes dropped EXE
          PID:2988
          • C:\Temp\hbwtomgeyw.exe
            C:\Temp\hbwtomgeyw.exe ups_run
            4⤵
            • Executes dropped EXE
            PID:4984
            • C:\temp\CreateProcess.exe
              C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
              5⤵
              • Executes dropped EXE
              PID:964
              • C:\windows\system32\ipconfig.exe
                C:\windows\system32\ipconfig.exe /release
                6⤵
                • Gathers network information
                PID:4868
                • C:\temp\CreateProcess.exe
                  C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                  7⤵
                  • Executes dropped EXE
                  PID:1416
                  • C:\windows\system32\ipconfig.exe
                    C:\windows\system32\ipconfig.exe /release
                    8⤵
                    • Gathers network information
                    PID:4100
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\i_hbwtomgeyw.exe ups_ins
          3⤵
          • Executes dropped EXE
          PID:2228
          • C:\Temp\i_hbwtomgeyw.exe
            C:\Temp\i_hbwtomgeyw.exe ups_ins
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4180
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\bvtolgeywq.exe ups_run
          3⤵
          • Executes dropped EXE
          PID:400
          • C:\Temp\bvtolgeywq.exe
            C:\Temp\bvtolgeywq.exe ups_run
            4⤵
            • Executes dropped EXE
            PID:1036
            • C:\temp\CreateProcess.exe
              C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
              5⤵
              • Executes dropped EXE
              PID:3220
              • C:\windows\system32\ipconfig.exe
                C:\windows\system32\ipconfig.exe /release
                6⤵
                • Gathers network information
                PID:4516
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\i_bvtolgeywq.exe ups_ins
          3⤵
          • Executes dropped EXE
          PID:856
          • C:\Temp\i_bvtolgeywq.exe
            C:\Temp\i_bvtolgeywq.exe ups_ins
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3968
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\bvqnigaysq.exe ups_run
          3⤵
          • Executes dropped EXE
          PID:320
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\i_bvqnigaysq.exe ups_ins
          3⤵
          • Executes dropped EXE
          PID:2320
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\dyvqoigays.exe ups_run
          3⤵
          • Executes dropped EXE
          PID:2056
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\i_dyvqoigays.exe ups_ins
          3⤵
            PID:3024
            • C:\Temp\i_dyvqoigays.exe
              C:\Temp\i_dyvqoigays.exe ups_ins
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3756
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\Temp\aysqkicavs.exe ups_run
            3⤵
              PID:2508
            • C:\temp\CreateProcess.exe
              C:\temp\CreateProcess.exe C:\Temp\i_aysqkicavs.exe ups_ins
              3⤵
                PID:5100
              • C:\temp\CreateProcess.exe
                C:\temp\CreateProcess.exe C:\Temp\xspkicausm.exe ups_run
                3⤵
                  PID:3132
                  • C:\Temp\xspkicausm.exe
                    C:\Temp\xspkicausm.exe ups_run
                    4⤵
                      PID:2136
                  • C:\temp\CreateProcess.exe
                    C:\temp\CreateProcess.exe C:\Temp\i_xspkicausm.exe ups_ins
                    3⤵
                      PID:2088
                    • C:\temp\CreateProcess.exe
                      C:\temp\CreateProcess.exe C:\Temp\upmhezxrpj.exe ups_run
                      3⤵
                        PID:4756
                      • C:\temp\CreateProcess.exe
                        C:\temp\CreateProcess.exe C:\Temp\i_upmhezxrpj.exe ups_ins
                        3⤵
                          PID:2108
                        • C:\temp\CreateProcess.exe
                          C:\temp\CreateProcess.exe C:\Temp\zxrpjhczur.exe ups_run
                          3⤵
                            PID:2180
                            • C:\Temp\zxrpjhczur.exe
                              C:\Temp\zxrpjhczur.exe ups_run
                              4⤵
                                PID:4664
                            • C:\temp\CreateProcess.exe
                              C:\temp\CreateProcess.exe C:\Temp\i_zxrpjhczur.exe ups_ins
                              3⤵
                                PID:2104
                              • C:\temp\CreateProcess.exe
                                C:\temp\CreateProcess.exe C:\Temp\cwuomgezwr.exe ups_run
                                3⤵
                                  PID:2376
                                  • C:\Temp\cwuomgezwr.exe
                                    C:\Temp\cwuomgezwr.exe ups_run
                                    4⤵
                                      PID:4032
                                  • C:\temp\CreateProcess.exe
                                    C:\temp\CreateProcess.exe C:\Temp\i_cwuomgezwr.exe ups_ins
                                    3⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3580
                                  • C:\temp\CreateProcess.exe
                                    C:\temp\CreateProcess.exe C:\Temp\ytrljdbwto.exe ups_run
                                    3⤵
                                      PID:3480
                                      • C:\Temp\ytrljdbwto.exe
                                        C:\Temp\ytrljdbwto.exe ups_run
                                        4⤵
                                          PID:5016
                                      • C:\temp\CreateProcess.exe
                                        C:\temp\CreateProcess.exe C:\Temp\i_ytrljdbwto.exe ups_ins
                                        3⤵
                                          PID:1144
                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                        "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
                                        2⤵
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:2624
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:17410 /prefetch:2
                                          3⤵
                                          • Modifies Internet Explorer settings
                                          • Suspicious use of SetWindowsHookEx
                                          PID:868
                                    • C:\Temp\oigbytqljd.exe
                                      C:\Temp\oigbytqljd.exe ups_run
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of WriteProcessMemory
                                      PID:2140
                                      • C:\temp\CreateProcess.exe
                                        C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                        2⤵
                                        • Executes dropped EXE
                                        PID:4760
                                        • C:\windows\system32\ipconfig.exe
                                          C:\windows\system32\ipconfig.exe /release
                                          3⤵
                                          • Gathers network information
                                          PID:4576
                                    • C:\Temp\i_nigaysqlid.exe
                                      C:\Temp\i_nigaysqlid.exe ups_ins
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4072
                                    • C:\windows\system32\ipconfig.exe
                                      C:\windows\system32\ipconfig.exe /release
                                      1⤵
                                      • Gathers network information
                                      PID:3756
                                    • C:\temp\CreateProcess.exe
                                      C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                      1⤵
                                      • Executes dropped EXE
                                      PID:2620
                                    • C:\Temp\nhfaxsqkic.exe
                                      C:\Temp\nhfaxsqkic.exe ups_run
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of WriteProcessMemory
                                      PID:224
                                    • C:\Temp\i_nhfaxsqkic.exe
                                      C:\Temp\i_nhfaxsqkic.exe ups_ins
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3520
                                    • C:\windows\system32\ipconfig.exe
                                      C:\windows\system32\ipconfig.exe /release
                                      1⤵
                                      • Gathers network information
                                      PID:2320
                                      • C:\Temp\i_bvqnigaysq.exe
                                        C:\Temp\i_bvqnigaysq.exe ups_ins
                                        2⤵
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4792
                                    • C:\temp\CreateProcess.exe
                                      C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                      1⤵
                                      • Executes dropped EXE
                                      PID:3768
                                    • C:\Temp\ezxrpjhbzu.exe
                                      C:\Temp\ezxrpjhbzu.exe ups_run
                                      1⤵
                                      • Executes dropped EXE
                                      PID:1764
                                    • C:\Temp\i_ezxrpjhbzu.exe
                                      C:\Temp\i_ezxrpjhbzu.exe ups_ins
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:376
                                    • C:\Temp\bvqnigaysq.exe
                                      C:\Temp\bvqnigaysq.exe ups_run
                                      1⤵
                                      • Executes dropped EXE
                                      PID:372
                                      • C:\temp\CreateProcess.exe
                                        C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                        2⤵
                                        • Executes dropped EXE
                                        PID:408
                                    • C:\windows\system32\ipconfig.exe
                                      C:\windows\system32\ipconfig.exe /release
                                      1⤵
                                      • Gathers network information
                                      PID:2756
                                    • C:\Temp\dyvqoigays.exe
                                      C:\Temp\dyvqoigays.exe ups_run
                                      1⤵
                                      • Executes dropped EXE
                                      PID:4868
                                    • C:\Temp\aysqkicavs.exe
                                      C:\Temp\aysqkicavs.exe ups_run
                                      1⤵
                                        PID:3696
                                        • C:\temp\CreateProcess.exe
                                          C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                          2⤵
                                            PID:4032
                                            • C:\temp\CreateProcess.exe
                                              C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                              3⤵
                                                PID:4700
                                          • C:\windows\system32\ipconfig.exe
                                            C:\windows\system32\ipconfig.exe /release
                                            1⤵
                                            • Gathers network information
                                            PID:2868
                                          • C:\Temp\i_aysqkicavs.exe
                                            C:\Temp\i_aysqkicavs.exe ups_ins
                                            1⤵
                                              PID:3580
                                              • C:\Temp\i_cwuomgezwr.exe
                                                C:\Temp\i_cwuomgezwr.exe ups_ins
                                                2⤵
                                                  PID:964
                                              • C:\windows\system32\ipconfig.exe
                                                C:\windows\system32\ipconfig.exe /release
                                                1⤵
                                                • Gathers network information
                                                PID:2300
                                              • C:\temp\CreateProcess.exe
                                                C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                                1⤵
                                                  PID:4552
                                                • C:\Temp\i_xspkicausm.exe
                                                  C:\Temp\i_xspkicausm.exe ups_ins
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1988
                                                • C:\Temp\upmhezxrpj.exe
                                                  C:\Temp\upmhezxrpj.exe ups_run
                                                  1⤵
                                                    PID:2272
                                                    • C:\temp\CreateProcess.exe
                                                      C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                                      2⤵
                                                        PID:4272
                                                    • C:\windows\system32\ipconfig.exe
                                                      C:\windows\system32\ipconfig.exe /release
                                                      1⤵
                                                      • Gathers network information
                                                      PID:1836
                                                    • C:\Temp\i_upmhezxrpj.exe
                                                      C:\Temp\i_upmhezxrpj.exe ups_ins
                                                      1⤵
                                                        PID:1132
                                                      • C:\windows\system32\ipconfig.exe
                                                        C:\windows\system32\ipconfig.exe /release
                                                        1⤵
                                                        • Gathers network information
                                                        PID:4392
                                                      • C:\Temp\i_zxrpjhczur.exe
                                                        C:\Temp\i_zxrpjhczur.exe ups_ins
                                                        1⤵
                                                          PID:832
                                                        • C:\windows\system32\ipconfig.exe
                                                          C:\windows\system32\ipconfig.exe /release
                                                          1⤵
                                                          • Gathers network information
                                                          PID:5100
                                                        • C:\windows\system32\ipconfig.exe
                                                          C:\windows\system32\ipconfig.exe /release
                                                          1⤵
                                                          • Gathers network information
                                                          PID:4720
                                                        • C:\temp\CreateProcess.exe
                                                          C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                                          1⤵
                                                            PID:4708
                                                          • C:\Temp\i_ytrljdbwto.exe
                                                            C:\Temp\i_ytrljdbwto.exe ups_ins
                                                            1⤵
                                                              PID:4148

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Temp\CreateProcess.exe

                                                              Filesize

                                                              3KB

                                                              MD5

                                                              334395fd06942e3761bc8696b6977afc

                                                              SHA1

                                                              419307e1a63f917ecf5ca1168a040f8d149ff512

                                                              SHA256

                                                              a843000b40f90bd186328bd16c3fddab566f0bf7c97d80dc451a0de65a2fd34b

                                                              SHA512

                                                              d8c73961301e79ef1653b70668356df9ee68ad09d9b363b43d0df2b1324c422595db1fbcee0a53890e8ad2bf4adcb9b26d99afc5dba972554d929aa77938ecd3

                                                            • C:\Temp\hbztrmjecwrojhbz.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              43879fb3039a887448c09b6431abf96f

                                                              SHA1

                                                              1a32c6f9cf1000049aaef3b437d3214b4f4eb622

                                                              SHA256

                                                              6f349c68901c8e9dcdc4aab4e34201140c8b4699a8834e500787c6437a0157e2

                                                              SHA512

                                                              320694b22cd27f8a4766b6f25a1e3f65a7b17fda97274add8c372975dd248299720752ffff92302b119641251eaeada0a92f7a033af31650491033dae16e497b

                                                            • C:\Temp\i_ezxrpjhbzu.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              b3839fccd53976c7b0f4b03701842232

                                                              SHA1

                                                              05555bf033506fd1de4007c97438ba24b171bcdd

                                                              SHA256

                                                              e9eaeecb7c46c2a39425ab532cfd1c5793a07740b3dc71ba049b68606eb2f6b4

                                                              SHA512

                                                              1db6243b1929ff75585f6adb976dfb2069dad08da4de77837ce8694aed1fc4980f2e4e089a688d9b605089012bf3c35e1ebf3a046047aeb11c8f71cde2038b73

                                                            • C:\Temp\i_khcausmkec.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              dd6cd04e4e62614f48b074a91e856a28

                                                              SHA1

                                                              c2b7db06e268d2376a026625a7d9ec6bc33fd7c4

                                                              SHA256

                                                              9d14605c78a8ec662a067ec2435d23a7174baaa3ec874d4dd1214916b393950b

                                                              SHA512

                                                              2bfb2c51836e8fcbc0a65ef363f779aa22a61c06b4dfa07575683772db703d3b3cad210cba7533aa8157d0a4c27ba0cfbf68cb68b97a237e2d7515e98f9b13c1

                                                            • C:\Temp\i_nhfaxsqkic.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              44e54e5d4cf7ed65217eef5da5df75ae

                                                              SHA1

                                                              7f2c9fe4508f84bb67348dafdce22f41db27a9ed

                                                              SHA256

                                                              8efb92dc05dcaa8740f1cd7d6b5395534877d5217c8ba8b4e358c9ff7c0fb681

                                                              SHA512

                                                              dfee74efb1169776833fbe868ad7a0b02a69e55f20b0cf39e781a25ac80752746fb21dbbd40343551989285a6c2f4dc0ad8e473ef451db044505db5a6ab63dd0

                                                            • C:\Temp\i_nigaysqlid.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              d7e764ede6f3b7e2648c4099107add6c

                                                              SHA1

                                                              3aae9c100cfad6b8d722d89b3bb47a84c90fe16c

                                                              SHA256

                                                              4e59c2f80ae0665fe7dde551264aabdf01242ea4c6d6cc1d5ff2420b9ce13e11

                                                              SHA512

                                                              5e310b6c84bcbbc3de471754ad7ce8a4a9b2219e6038ac90b184659fa10eff1da1eb7f93be89a3435863e25259d4ddc0467e4a1716cfe3a85504ef6af8121634

                                                            • C:\Temp\i_oigbytqljd.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              34f90c25c5dec4be512f77097be41915

                                                              SHA1

                                                              6990a5e72b3b8c6270509517cabf8adab717e638

                                                              SHA256

                                                              0945480304dde9347c88fb33d4f927fa70d1ea3f74674fe05c36a9a44acf2242

                                                              SHA512

                                                              563b300bf719f1c4ab1ae7eeddd019c16142ef69deb4e033dcfef1d709d4b8f350439c0db604369176de0715896fc7960603718e628336d8db867554c7a7d156

                                                            • C:\Temp\i_omgezwrpjh.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              fea41dab7d09d13073cf89aedc73d0fa

                                                              SHA1

                                                              824505e5df1fdb236aabe8444e69e6cac6ca3089

                                                              SHA256

                                                              df15a517af45ae57b2630d2e3219b736312361f1694594d2ca449934024f6e81

                                                              SHA512

                                                              c87f9df6bcea6b404cb0f4426c54986c6e7dedbe58ac4654cd10a66fd0f7f97d9bf0bfebc5bb70b47b241acf0ab46f084dc1aad68d202dc291aa655eee786837

                                                            • C:\Temp\i_qkicausnkf.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              8d4d3fe4d08add1a58cb64c78d87f2b8

                                                              SHA1

                                                              40e914d1d476ff46e317b20ce18e22333a0884c1

                                                              SHA256

                                                              a66774dbea56dc1cb658def32b6ce7b3d7ebe8d6a971970b6fd45919c1a24721

                                                              SHA512

                                                              6a4c56eb0b86463c0a6508346bccde4da83f1c707c134c516bfaad27d78657b8c991d078c4b54152c033f66d42479715215756119ee42246430f6b03a868ff25

                                                            • C:\Temp\i_wtolgeywqo.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              359f149d9289f7db99b0f7606c43f7a6

                                                              SHA1

                                                              1d579fdf9b0cb4afced33c8853b3a5be5b7df86b

                                                              SHA256

                                                              a97a4dea926f61d219dd52e00b7696678ba915261ad271a41e9c2c1fbef90069

                                                              SHA512

                                                              699e0354787b869e0c80abece744dcde159acb428f101047df73ff3964bf405f18c826e6eb08677827e983078576c620385fb06ed890ccbc3c35b72a0cbe32d2

                                                            • C:\Temp\khcausmkec.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              27c1963c15533730e04913d9792e33db

                                                              SHA1

                                                              0988ab0c32b815c3b6c9ca7b137e0496c12a6278

                                                              SHA256

                                                              d33c4f2ae9392b0f228968e4308ba8c9041eb09317efb6950b5d3ad0c659d659

                                                              SHA512

                                                              b93b11455f997c71a5263f9bd1b9511dc278c2dae43445fa6b8948e9ec31e1f4d1322f444c1a601f610464b94d1ef6f3e86538902c8b85f04d4ca20af922062d

                                                            • C:\Temp\mhezpjhbzt.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              3d45ce3e588078eb6a3dc87bb8840c07

                                                              SHA1

                                                              40e6627940450717b97afbafa59edd7453884fcb

                                                              SHA256

                                                              6888b135713dfa6d955d2a72f28ffdcf167862e34d4e3401843b263a5bbe18ae

                                                              SHA512

                                                              68daebe2a5d9ea2480f4644c98df1f4a97cb49a39cb409d672aaba86b71266417b2ea14d3449f2415075eadbec0f9e2ff2c3fdd9b9e43ee4c567f66703c31024

                                                            • C:\Temp\nhfaxsqkic.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              80487e811f30d1957f82375bd282b282

                                                              SHA1

                                                              ac4b15aeb0bfda90a6eb9e394823422ec702f84b

                                                              SHA256

                                                              ba9fe7bc16cee79ec79d64e72b452d58edb5aec6adf242ddf825d7f3422adc2d

                                                              SHA512

                                                              6f40f82382e46fcfb58e4a1333bac3292cb4cf92a5beba6acc4483e92b5b3c9f58e8dca886c14279e6c61b84d5837cff2bacaedb3f0f75da95ac2f893356ea2a

                                                            • C:\Temp\nigaysqlid.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              7a57b247a09b6da3d0d04dd0bc4756f7

                                                              SHA1

                                                              cc58a9eda9481162c3f846027f70a48028b12a57

                                                              SHA256

                                                              3c39c2351e5ddf0f395a21cdc847610ec94b97db6c4491be38b2ccbb68c67fde

                                                              SHA512

                                                              a386e9b10f3cbfebd43f8e34bcc075bbfe324ec45823c2b28d343ca2d0e1504b157077c7fd8409de7e9ded0cc1070fe200d4f41d952e72c81600281841bf3db3

                                                            • C:\Temp\oigbytqljd.exe

                                                              Filesize

                                                              81KB

                                                              MD5

                                                              fb8012ec1ad7f149e4bb631e0c16bf9a

                                                              SHA1

                                                              2c8979a8314e89652469c8daf849aa83f9db3813

                                                              SHA256

                                                              2e0a2db9268f7cc2a01d2c8f67138f5008c2d3c5ef971f579781df9696bbb9be

                                                              SHA512

                                                              089441bb8c950683e6417204473573e497eced5382ba563079cc67e5567b4c5dd9b5e06fde7fd052a1f94a0d892f19d945864530a9f277417bc31f2f4c36ecb6

                                                            • C:\Temp\oigbytqljd.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              6e060d72195b43455ec89efedd2f4c3b

                                                              SHA1

                                                              e1120db8ace5295b1eadc27da37fdfac5f7e176b

                                                              SHA256

                                                              47c93f0c4c92156177b01f8a78e6a1ec1dfe7e6192ce88cfdfc4c55221b17c55

                                                              SHA512

                                                              90c46eec7770ee9f5849885443d3c0d1e2290ec8ad72d152ae6728ec950627de348d41b9ef44cf2c770b5f47e520adcba483937631c0f409e553f30235f91347

                                                            • C:\Temp\omgezwrpjh.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              6e5b5389c2b708bc9c6bf02c97670e49

                                                              SHA1

                                                              72a76e409a80a8014b57383b4df571709d365fac

                                                              SHA256

                                                              1907f558cc04952a948a013932399b6d5b149f69f5bfddc9ed5adefe3b7ccfa3

                                                              SHA512

                                                              be7df30513cb290ce192dd84bba6161303b31291d276f190196f145ff6c9fb23f1154217b4d7eef46f2bcdebdb8a8ef8b802771d930888334a4c848a8c21597e

                                                            • C:\Temp\qkicausnkf.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              c06af811c6b5bd880903a355304fc7e7

                                                              SHA1

                                                              c1a8117a4cf6b7c066180ad6b9f8faa1c5b50626

                                                              SHA256

                                                              f4bf9205fc85f43b0986e5785061a917db4b179986c374cbd2fae3a8be1cb288

                                                              SHA512

                                                              b3e2779f27cad198da9c5ca81f2a76674aa3dd60a24f10be238a49cdda890fb7289e0d7889e769a550ce02d4f7013fd93488388cd4d375fa33c6adc853319d53

                                                            • C:\Temp\wtolgeywqo.exe

                                                              Filesize

                                                              361KB

                                                              MD5

                                                              72592ad8f0f6133016662c2045d26a35

                                                              SHA1

                                                              6fc70edc673fddebcfbe58adb4875b477e927808

                                                              SHA256

                                                              18d666c2d8fc795977db3efda242bd6101f48b90e62dfecaccec9db352bd00db

                                                              SHA512

                                                              92092230dbd668a441b08c6744638beef3692fbd6a28a7c5d69c18ae07fece1be3217827b39cd9297ba976c8a8929e43443e055e3c0898a8c3a4076af48d9703

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1

                                                              Filesize

                                                              17KB

                                                              MD5

                                                              5a34cb996293fde2cb7a4ac89587393a

                                                              SHA1

                                                              3c96c993500690d1a77873cd62bc639b3a10653f

                                                              SHA256

                                                              c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                              SHA512

                                                              e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee