Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
35eb5f5748613dcfd3511c7dad954ff4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
35eb5f5748613dcfd3511c7dad954ff4.exe
Resource
win10v2004-20231215-en
General
-
Target
35eb5f5748613dcfd3511c7dad954ff4.exe
-
Size
130KB
-
MD5
35eb5f5748613dcfd3511c7dad954ff4
-
SHA1
9e30c1911c6f79629862fb9ba12d4127e389d97d
-
SHA256
4f995d48ca95db9bb7e6a93137b4ffe9bf760c0c381dfd2233ea15d192f3a879
-
SHA512
de1ccc259420fd8a436254a018fd2258341d51a86763e34510a602be7615b87ed8ae77cded9f8081f32ac2bb9e14914afb9cc288a195eba66643e8bb592eaf43
-
SSDEEP
768:zaCaB044YAHIiSkrzzx0iDTOtMxZI5C8w/f1zBmQjTGfm5yq6zU:WC0OMcamTaWf1zwQl5v6I
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 1560 userinit.exe 3652 system.exe 4220 system.exe 4664 system.exe 4744 system.exe 3508 system.exe 1276 system.exe 1660 system.exe 4868 system.exe 3068 system.exe 3220 system.exe 4328 system.exe 4116 system.exe 4272 system.exe 3188 system.exe 3152 system.exe 4304 system.exe 1144 system.exe 220 system.exe 4252 system.exe 4020 system.exe 1908 system.exe 4704 system.exe 4552 system.exe 2132 system.exe 428 system.exe 2796 system.exe 2456 system.exe 2212 system.exe 4724 system.exe 3264 system.exe 1740 system.exe 4136 system.exe 1892 system.exe 3608 system.exe 4200 system.exe 1708 system.exe 3188 system.exe 2812 system.exe 4300 system.exe 1996 system.exe 4776 system.exe 4704 system.exe 2184 system.exe 2120 system.exe 1900 system.exe 4372 system.exe 5020 system.exe 3004 system.exe 1780 system.exe 4856 system.exe 2076 system.exe 1008 system.exe 4864 system.exe 2628 system.exe 1700 system.exe 4228 system.exe 3116 system.exe 1924 system.exe 2548 system.exe 3412 system.exe 3188 system.exe 1464 system.exe 1060 system.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\userinit.exe 35eb5f5748613dcfd3511c7dad954ff4.exe File created C:\Windows\kdcoms.dll userinit.exe File created C:\Windows\userinit.exe 35eb5f5748613dcfd3511c7dad954ff4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3468 35eb5f5748613dcfd3511c7dad954ff4.exe 3468 35eb5f5748613dcfd3511c7dad954ff4.exe 1560 userinit.exe 1560 userinit.exe 1560 userinit.exe 1560 userinit.exe 3652 system.exe 3652 system.exe 1560 userinit.exe 1560 userinit.exe 4220 system.exe 4220 system.exe 1560 userinit.exe 1560 userinit.exe 4664 system.exe 4664 system.exe 1560 userinit.exe 1560 userinit.exe 4744 system.exe 4744 system.exe 1560 userinit.exe 1560 userinit.exe 3508 system.exe 3508 system.exe 1560 userinit.exe 1560 userinit.exe 1276 system.exe 1276 system.exe 1560 userinit.exe 1560 userinit.exe 1660 system.exe 1660 system.exe 1560 userinit.exe 1560 userinit.exe 4868 system.exe 4868 system.exe 1560 userinit.exe 1560 userinit.exe 3068 system.exe 3068 system.exe 1560 userinit.exe 1560 userinit.exe 3220 system.exe 3220 system.exe 1560 userinit.exe 1560 userinit.exe 4328 system.exe 4328 system.exe 1560 userinit.exe 1560 userinit.exe 4116 system.exe 4116 system.exe 1560 userinit.exe 1560 userinit.exe 4272 system.exe 4272 system.exe 1560 userinit.exe 1560 userinit.exe 3188 system.exe 3188 system.exe 1560 userinit.exe 1560 userinit.exe 3152 system.exe 3152 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1560 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3468 35eb5f5748613dcfd3511c7dad954ff4.exe 3468 35eb5f5748613dcfd3511c7dad954ff4.exe 1560 userinit.exe 1560 userinit.exe 3652 system.exe 3652 system.exe 4220 system.exe 4220 system.exe 4664 system.exe 4664 system.exe 4744 system.exe 4744 system.exe 3508 system.exe 3508 system.exe 1276 system.exe 1276 system.exe 1660 system.exe 1660 system.exe 4868 system.exe 4868 system.exe 3068 system.exe 3068 system.exe 3220 system.exe 3220 system.exe 4328 system.exe 4328 system.exe 4116 system.exe 4116 system.exe 4272 system.exe 4272 system.exe 3188 system.exe 3188 system.exe 3152 system.exe 3152 system.exe 4304 system.exe 4304 system.exe 1144 system.exe 1144 system.exe 220 system.exe 220 system.exe 4252 system.exe 4252 system.exe 4020 system.exe 4020 system.exe 1908 system.exe 1908 system.exe 4704 system.exe 4704 system.exe 4552 system.exe 4552 system.exe 2132 system.exe 2132 system.exe 428 system.exe 428 system.exe 2796 system.exe 2796 system.exe 2456 system.exe 2456 system.exe 2212 system.exe 2212 system.exe 4724 system.exe 4724 system.exe 3264 system.exe 3264 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3468 wrote to memory of 1560 3468 35eb5f5748613dcfd3511c7dad954ff4.exe 88 PID 3468 wrote to memory of 1560 3468 35eb5f5748613dcfd3511c7dad954ff4.exe 88 PID 3468 wrote to memory of 1560 3468 35eb5f5748613dcfd3511c7dad954ff4.exe 88 PID 1560 wrote to memory of 3652 1560 userinit.exe 92 PID 1560 wrote to memory of 3652 1560 userinit.exe 92 PID 1560 wrote to memory of 3652 1560 userinit.exe 92 PID 1560 wrote to memory of 4220 1560 userinit.exe 93 PID 1560 wrote to memory of 4220 1560 userinit.exe 93 PID 1560 wrote to memory of 4220 1560 userinit.exe 93 PID 1560 wrote to memory of 4664 1560 userinit.exe 94 PID 1560 wrote to memory of 4664 1560 userinit.exe 94 PID 1560 wrote to memory of 4664 1560 userinit.exe 94 PID 1560 wrote to memory of 4744 1560 userinit.exe 173 PID 1560 wrote to memory of 4744 1560 userinit.exe 173 PID 1560 wrote to memory of 4744 1560 userinit.exe 173 PID 1560 wrote to memory of 3508 1560 userinit.exe 96 PID 1560 wrote to memory of 3508 1560 userinit.exe 96 PID 1560 wrote to memory of 3508 1560 userinit.exe 96 PID 1560 wrote to memory of 1276 1560 userinit.exe 175 PID 1560 wrote to memory of 1276 1560 userinit.exe 175 PID 1560 wrote to memory of 1276 1560 userinit.exe 175 PID 1560 wrote to memory of 1660 1560 userinit.exe 98 PID 1560 wrote to memory of 1660 1560 userinit.exe 98 PID 1560 wrote to memory of 1660 1560 userinit.exe 98 PID 1560 wrote to memory of 4868 1560 userinit.exe 101 PID 1560 wrote to memory of 4868 1560 userinit.exe 101 PID 1560 wrote to memory of 4868 1560 userinit.exe 101 PID 1560 wrote to memory of 3068 1560 userinit.exe 103 PID 1560 wrote to memory of 3068 1560 userinit.exe 103 PID 1560 wrote to memory of 3068 1560 userinit.exe 103 PID 1560 wrote to memory of 3220 1560 userinit.exe 105 PID 1560 wrote to memory of 3220 1560 userinit.exe 105 PID 1560 wrote to memory of 3220 1560 userinit.exe 105 PID 1560 wrote to memory of 4328 1560 userinit.exe 106 PID 1560 wrote to memory of 4328 1560 userinit.exe 106 PID 1560 wrote to memory of 4328 1560 userinit.exe 106 PID 1560 wrote to memory of 4116 1560 userinit.exe 108 PID 1560 wrote to memory of 4116 1560 userinit.exe 108 PID 1560 wrote to memory of 4116 1560 userinit.exe 108 PID 1560 wrote to memory of 4272 1560 userinit.exe 109 PID 1560 wrote to memory of 4272 1560 userinit.exe 109 PID 1560 wrote to memory of 4272 1560 userinit.exe 109 PID 1560 wrote to memory of 3188 1560 userinit.exe 224 PID 1560 wrote to memory of 3188 1560 userinit.exe 224 PID 1560 wrote to memory of 3188 1560 userinit.exe 224 PID 1560 wrote to memory of 3152 1560 userinit.exe 112 PID 1560 wrote to memory of 3152 1560 userinit.exe 112 PID 1560 wrote to memory of 3152 1560 userinit.exe 112 PID 1560 wrote to memory of 4304 1560 userinit.exe 113 PID 1560 wrote to memory of 4304 1560 userinit.exe 113 PID 1560 wrote to memory of 4304 1560 userinit.exe 113 PID 1560 wrote to memory of 1144 1560 userinit.exe 114 PID 1560 wrote to memory of 1144 1560 userinit.exe 114 PID 1560 wrote to memory of 1144 1560 userinit.exe 114 PID 1560 wrote to memory of 220 1560 userinit.exe 116 PID 1560 wrote to memory of 220 1560 userinit.exe 116 PID 1560 wrote to memory of 220 1560 userinit.exe 116 PID 1560 wrote to memory of 4252 1560 userinit.exe 117 PID 1560 wrote to memory of 4252 1560 userinit.exe 117 PID 1560 wrote to memory of 4252 1560 userinit.exe 117 PID 1560 wrote to memory of 4020 1560 userinit.exe 118 PID 1560 wrote to memory of 4020 1560 userinit.exe 118 PID 1560 wrote to memory of 4020 1560 userinit.exe 118 PID 1560 wrote to memory of 1908 1560 userinit.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\35eb5f5748613dcfd3511c7dad954ff4.exe"C:\Users\Admin\AppData\Local\Temp\35eb5f5748613dcfd3511c7dad954ff4.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3652
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3508
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1276
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3068
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4272
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3188
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3152
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4304
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4252
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4704
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4552
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2132
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:428
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2212
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4724
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3264
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1740
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4136
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1892
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3608
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4200
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1708
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3188
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2812
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4300
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4776
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4704
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2184
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2120
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1900
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4372
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3004
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1780
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4856
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2076
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1008
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4864
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2628
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4228
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1924
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3412
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3188
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1464
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4576
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4404
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1056
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1276
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4372
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3004
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1252
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2188
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4708
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:968
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2292
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3476
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4956
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:824
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4376
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:392
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3712
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2540
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3188
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1464
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2896
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4384
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2500
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1028
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4824
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:828
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4940
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3616
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2288
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2076
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4496
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3596
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3204
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5028
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2652
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:752
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1572
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3188
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1464
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4276
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:928
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1056
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2272
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3524
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:920
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1036
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4284
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4552
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4208
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1800
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3584
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1900
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2056
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4724
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1492
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4868
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1240
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2072
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1832
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1436
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5028
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:228
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4900
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4200
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD547d02c07f4e1b1278848df9f196e0882
SHA1afc33d490e5ef4456d3000a1cd093642dd8b9618
SHA256497a49dc372704ae78d74dd89e0e2a0574b082d633a775913ede5fc84dccf6ca
SHA51201df7ab56c9e6ebc0645c4b26cb18dc118d78ce343026f0e32e3bf96589f5bb511d07db50a6b6f7c9454b16de38282a9b4206b683262127cd091921c83762b20
-
Filesize
92KB
MD5da5ca9cec95ab3948c02a1fbdf8837e3
SHA1d944aa308b9e471c279b4b7a5532634f38ebee9b
SHA25658716bac3b21e4bf00d90067c7ad66b8050b2c79eb66e0f168f98c70d6e16010
SHA51207acda9ed5438d3a3b92c593521839eb9b56693d114c57dca8eccf2247c492448d7bd441c978310aa2fb138267db062829cf9bd7e3595c99434651e9be1d7a1a
-
Filesize
95KB
MD53588a0874dd79e4d2bd7d9d8fe6c81c8
SHA1d37acc09e8436ec0384966b647c93a4564548e58
SHA256e4a91e0d1f781f12055a08ca1478c921ea254c83bcf2739c4a3838ecc98a91da
SHA51223d90cfa1d20bf1cf8095a72f31a2304648a505c449426530c56f5c582b7cc5e45d7cf708ac9030ed70e530d147560ae4b0159af2181e4fb3771cffbc21509a4
-
Filesize
93KB
MD5c9b84c3384059228077a959998fdb160
SHA1f09bc1a9838aace557ea26214453153360b84d02
SHA256b5cad730d42c6bbe1fc4e546534fe64598abccfcbb584487f255d74fe431f395
SHA5120c50c2e31680d841a23c15629c4cf43c3da3ca877c6611e1b32e18990daf074c33d5530f0ed644979adb2c55693852646bedcc7b90f6eeb239aca12d0f308cde
-
Filesize
130KB
MD535eb5f5748613dcfd3511c7dad954ff4
SHA19e30c1911c6f79629862fb9ba12d4127e389d97d
SHA2564f995d48ca95db9bb7e6a93137b4ffe9bf760c0c381dfd2233ea15d192f3a879
SHA512de1ccc259420fd8a436254a018fd2258341d51a86763e34510a602be7615b87ed8ae77cded9f8081f32ac2bb9e14914afb9cc288a195eba66643e8bb592eaf43