Analysis

  • max time kernel
    77s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:39

General

  • Target

    05dfbda4be2aba9c4f6b53045d2a648d.exe

  • Size

    187KB

  • MD5

    05dfbda4be2aba9c4f6b53045d2a648d

  • SHA1

    6cc330340fe466b638d0f887e6ccb4b47eaebf43

  • SHA256

    e1dc5f270c3bd892ae9c005cf82949aab087c1cecf63330068c0f19bbfd8bc15

  • SHA512

    5e61483f288b49501190fd44c56c78b894633077f6e2cf73b14014134383b0a8f48d57ab05bfaed8093e327ab920e224586bb61a894e9b6255b5f093c8b62746

  • SSDEEP

    3072:I/na6WDmrZ5CnKlQf1kT3bQfxy36JfLRxSo2uVvCEbqyXbzkCnVVT8IkIRel:I/nuDm9tOBe8FBXPkCL4sel

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
    "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.lxtt.net/c/t.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2840
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:5518337 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2844
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:734214 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:572
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:668692 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1220
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:472090 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2352
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:1520657 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1624
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:1455126 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1584
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:2569239 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1020
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:603202 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3232
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:603234 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3532
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:3880009 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3124
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:3486783 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3096
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:865365 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4376
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:3617890 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        PID:4668
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:2438267 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        PID:5056
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:668848 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        PID:5176
    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
        "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
            "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:364
            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1580
              • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1528
                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1620
                  • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                    "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2120
                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                      10⤵
                        PID:2028
                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                          11⤵
                            PID:924
                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                              12⤵
                                PID:1532
                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                  13⤵
                                    PID:1088
                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                      14⤵
                                        PID:3168
                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                          15⤵
                                            PID:3396
                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                              16⤵
                                                PID:3488
                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                  17⤵
                                                    PID:3596
                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                      18⤵
                                                        PID:3964
                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                          19⤵
                                                            PID:4064
                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                              20⤵
                                                                PID:1900
                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                  21⤵
                                                                    PID:3716
                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                      22⤵
                                                                        PID:3960
                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                          23⤵
                                                                            PID:2516
                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                              24⤵
                                                                                PID:4164
                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                  25⤵
                                                                                    PID:4244
                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                      26⤵
                                                                                        PID:4348
                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                          27⤵
                                                                                            PID:4484
                                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                              28⤵
                                                                                                PID:4584
                                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                  29⤵
                                                                                                    PID:4736
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                      30⤵
                                                                                                        PID:4860
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                          31⤵
                                                                                                            PID:5016
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                              32⤵
                                                                                                                PID:1148
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                  33⤵
                                                                                                                    PID:4572
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                      34⤵
                                                                                                                        PID:4984
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                          35⤵
                                                                                                                            PID:4980
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                              36⤵
                                                                                                                                PID:5392
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                  37⤵
                                                                                                                                    PID:5484
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                      38⤵
                                                                                                                                        PID:5724
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                          39⤵
                                                                                                                                            PID:5800
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                              40⤵
                                                                                                                                                PID:6012
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                  41⤵
                                                                                                                                                    PID:6080
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                      42⤵
                                                                                                                                                        PID:5336
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                          43⤵
                                                                                                                                                            PID:5388
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                              44⤵
                                                                                                                                                                PID:5628
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                  45⤵
                                                                                                                                                                    PID:5684
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                      46⤵
                                                                                                                                                                        PID:5248
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                          47⤵
                                                                                                                                                                            PID:5652
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                              48⤵
                                                                                                                                                                                PID:5672
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                  49⤵
                                                                                                                                                                                    PID:1708
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                      50⤵
                                                                                                                                                                                        PID:5608
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                          51⤵
                                                                                                                                                                                            PID:1348
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                              52⤵
                                                                                                                                                                                                PID:888
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                  53⤵
                                                                                                                                                                                                    PID:6196
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                      54⤵
                                                                                                                                                                                                        PID:6280
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                          55⤵
                                                                                                                                                                                                            PID:6368
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                              56⤵
                                                                                                                                                                                                                PID:6476
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                  57⤵
                                                                                                                                                                                                                    PID:6568
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                      58⤵
                                                                                                                                                                                                                        PID:6796
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                          59⤵
                                                                                                                                                                                                                            PID:1640
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                              60⤵
                                                                                                                                                                                                                                PID:6312
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                                  61⤵
                                                                                                                                                                                                                                    PID:5972
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                                      62⤵
                                                                                                                                                                                                                                        PID:6984
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                                          63⤵
                                                                                                                                                                                                                                            PID:6920
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                                              64⤵
                                                                                                                                                                                                                                                PID:7084
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                                                  65⤵
                                                                                                                                                                                                                                                    PID:3868
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                                                      66⤵
                                                                                                                                                                                                                                                        PID:4384
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\05dfbda4be2aba9c4f6b53045d2a648d.exe"
                                                                                                                                                                                                                                                          67⤵
                                                                                                                                                                                                                                                            PID:1060

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                        Filesize

                                                                                                                        344B

                                                                                                                        MD5

                                                                                                                        f265364242fd29d47f94ba885866262d

                                                                                                                        SHA1

                                                                                                                        9d7380cfb3b2e63965d497037e7b97890094eacf

                                                                                                                        SHA256

                                                                                                                        a0319c39c11a2bfb20b33a8eebc28184672164acb903e7d783482c4cd108a3db

                                                                                                                        SHA512

                                                                                                                        0156f4e0a27473cf1dd40df05822a95d580970e95b09396354b2d967dfb7b6758b6572f04eec90713609bd7cc6e8e35d93f3c5e4a3cd18193ef791d73740649b

                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                        Filesize

                                                                                                                        344B

                                                                                                                        MD5

                                                                                                                        833455b8a153377d08a3e601d4d8d0cc

                                                                                                                        SHA1

                                                                                                                        643fdef3c8c96a8a340dbd1313db6abf7ef0f0e6

                                                                                                                        SHA256

                                                                                                                        7e08dab6829670ca96b794dcdb4c30c03d1ec679b18f4f31e8793e8f5c68211a

                                                                                                                        SHA512

                                                                                                                        ff59d272b9200653bdac2e501783096d9ca77dc8fa48afde56a768fa7d23278b38e411f739e55c3fad61fce61efbb64c40998b98d3674daac347371d6aa59a21

                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                        Filesize

                                                                                                                        344B

                                                                                                                        MD5

                                                                                                                        ec36db42db6618d8ce566c05fb245287

                                                                                                                        SHA1

                                                                                                                        1f90800a979895c126cb2d174210888d0c78c3de

                                                                                                                        SHA256

                                                                                                                        b9b076caf8c2a8047e1ad86fdb8c8c77e846b0f91be3cd01a25b10aca347bd9d

                                                                                                                        SHA512

                                                                                                                        503cf22051e715b908326ead5c563ac42e1107864570f7314ff5eceec907daa51f50ed13d545da7d4f0aadc4b16021d52b441f9033392f4c10ef715792661a11

                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                        Filesize

                                                                                                                        344B

                                                                                                                        MD5

                                                                                                                        8bd171efd89e93c2194d5b9cbcad46e0

                                                                                                                        SHA1

                                                                                                                        73eaac549d975be4cb3118bb7945e84db87297b2

                                                                                                                        SHA256

                                                                                                                        598884c2604f2be0fb1fd3e6d21bd64eee648ece6e7685eb8d6669719e6f723d

                                                                                                                        SHA512

                                                                                                                        29efa06d893000f56537dcecd1126a86a4220b031f3a6776aecbfff0558d07888e4d1209422083dcbea0b6979bd830cda9e220a12a8be0a2e4ddc734d2f8e42b

                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                        Filesize

                                                                                                                        344B

                                                                                                                        MD5

                                                                                                                        2fe04368ae09a68075affe350a0ac4e6

                                                                                                                        SHA1

                                                                                                                        c66f46eb993df203fb50c9ee307adc1a3774e88e

                                                                                                                        SHA256

                                                                                                                        1cdb1681b135ab6c1d94c609a727e76918d44b4abbeefc6b8f8a5673abd7d571

                                                                                                                        SHA512

                                                                                                                        2d5b2ddc7569660f6861e61e172e5e7a433284c7b1585023aaf752183203ac5d92b47de805440cf84e38cf8a7ef05eccad8c28d8a60d60a0c5ce7980c64d4740

                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                        Filesize

                                                                                                                        344B

                                                                                                                        MD5

                                                                                                                        18e8797065e4f9dd9515645fbe4dba1e

                                                                                                                        SHA1

                                                                                                                        d9a26bc84ce8d02560e1a3f93f8e8335048b8ea5

                                                                                                                        SHA256

                                                                                                                        5ec9ab340f9ac20877eae6d6093813381f9251f4f95f2998cb05d39bd3f66868

                                                                                                                        SHA512

                                                                                                                        6f04b8a1578021c455dcef04b76de89a63d227c1f6bd563d925706f566d6e59a0a0110a44b271aed7b5e37273aa9650d33a668c52d697077c48528879d733535

                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                        Filesize

                                                                                                                        344B

                                                                                                                        MD5

                                                                                                                        3d5721aaa59beea8cb1fb9d31f3e8a21

                                                                                                                        SHA1

                                                                                                                        d92d92e5e6b274535c978c0ec1e48a55dd1836c7

                                                                                                                        SHA256

                                                                                                                        2645ecaac89407151f624341193ea921841bc4bbefbe93f2cbfdaddd4b8b74cf

                                                                                                                        SHA512

                                                                                                                        bccedb93729c0b3b3f4e05122e70e3f93af767c39e40d0c86a81a7f9e4e06362fbaac97522a614160115846d69df1e1259619530ded726700f105f56bb70cfaf

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\53STNJLW\httpErrorPagesScripts[1]

                                                                                                                        Filesize

                                                                                                                        8KB

                                                                                                                        MD5

                                                                                                                        3f57b781cb3ef114dd0b665151571b7b

                                                                                                                        SHA1

                                                                                                                        ce6a63f996df3a1cccb81720e21204b825e0238c

                                                                                                                        SHA256

                                                                                                                        46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

                                                                                                                        SHA512

                                                                                                                        8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HJ0GGVIM\NewErrorPageTemplate[1]

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        cdf81e591d9cbfb47a7f97a2bcdb70b9

                                                                                                                        SHA1

                                                                                                                        8f12010dfaacdecad77b70a3e781c707cf328496

                                                                                                                        SHA256

                                                                                                                        204d95c6fb161368c795bb63e538fe0b11f9e406494bb5758b3b0d60c5f651bd

                                                                                                                        SHA512

                                                                                                                        977dcc2c6488acaf0e5970cef1a7a72c9f9dc6bb82da54f057e0853c8e939e4ab01b163eb7a5058e093a8bc44ecad9d06880fdc883e67e28ac67fee4d070a4cc

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\dnserror[1]

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        73c70b34b5f8f158d38a94b9d7766515

                                                                                                                        SHA1

                                                                                                                        e9eaa065bd6585a1b176e13615fd7e6ef96230a9

                                                                                                                        SHA256

                                                                                                                        3ebd34328a4386b4eba1f3d5f1252e7bd13744a6918720735020b4689c13fcf4

                                                                                                                        SHA512

                                                                                                                        927dcd4a8cfdeb0f970cb4ee3f059168b37e1e4e04733ed3356f77ca0448d2145e1abdd4f7ce1c6ca23c1e3676056894625b17987cc56c84c78e73f60e08fc0d

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\W79VKSP8\errorPageStrings[1]

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        e3e4a98353f119b80b323302f26b78fa

                                                                                                                        SHA1

                                                                                                                        20ee35a370cdd3a8a7d04b506410300fd0a6a864

                                                                                                                        SHA256

                                                                                                                        9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

                                                                                                                        SHA512

                                                                                                                        d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Cab9916.tmp

                                                                                                                        Filesize

                                                                                                                        65KB

                                                                                                                        MD5

                                                                                                                        ac05d27423a85adc1622c714f2cb6184

                                                                                                                        SHA1

                                                                                                                        b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                                                                                                        SHA256

                                                                                                                        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                                                                                                        SHA512

                                                                                                                        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Tar9938.tmp

                                                                                                                        Filesize

                                                                                                                        171KB

                                                                                                                        MD5

                                                                                                                        9c0c641c06238516f27941aa1166d427

                                                                                                                        SHA1

                                                                                                                        64cd549fb8cf014fcd9312aa7a5b023847b6c977

                                                                                                                        SHA256

                                                                                                                        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                                                                                                                        SHA512

                                                                                                                        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\k.exe

                                                                                                                        Filesize

                                                                                                                        110B

                                                                                                                        MD5

                                                                                                                        0c0d0e7d1ff282741e93063e8217a5de

                                                                                                                        SHA1

                                                                                                                        a9c22f8512353135adc61741c5023efc12031902

                                                                                                                        SHA256

                                                                                                                        a16d3daaea2a1840394c5a008b7c02a32ea8bdbba5d494882f1d4fb5db1aba9c

                                                                                                                        SHA512

                                                                                                                        373ff5d053def330dfd86b9620fd738e315ce87991d652145fd5dd69374bf3e65a7831c362905a4c66f35d62477b7f325b8a5ea593d76a86e09db7700c1e506e

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\~DF56DC36528BA568B8.TMP

                                                                                                                        Filesize

                                                                                                                        16KB

                                                                                                                        MD5

                                                                                                                        27f55ec0ed7ede820e19f293eea6f61b

                                                                                                                        SHA1

                                                                                                                        a7b2dd746f1935d1e704df29674e58d5a81f862b

                                                                                                                        SHA256

                                                                                                                        8521f30c11447da294f0428a89a1f21f2460d015b248ae9a95ec8a28c5b608ed

                                                                                                                        SHA512

                                                                                                                        f29356e6cf9711ff624921e764c12d1caadc7c42d20a57a41bdc2ff3b1b013070fac3e26f418024685108a3e9ddc8ffec19b99a4aeea6137ae6ce6b25e3fe8fb

                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        e9c72e4ee6d208cfe9a55a33a117bc84

                                                                                                                        SHA1

                                                                                                                        2f45b0a04cc7d4dc77b64138381c036f5a27970f

                                                                                                                        SHA256

                                                                                                                        530c996366940c586461001e73b65937c912ede6a0fe6472169a21753061a663

                                                                                                                        SHA512

                                                                                                                        7c26adce8925f8dffec4f45f1586c815b52a867470d7142eb90ffc10bf2e2aace45ce3f5b6a7b12b2512639d9ac1bd31b05aeeb87c727daa987c66da5e768a9d

                                                                                                                      • memory/364-82-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/924-93-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/1088-95-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/1528-84-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/1532-94-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/1580-83-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/1620-90-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/1900-202-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/1984-70-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/2028-92-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/2120-91-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/2188-72-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/2560-81-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/2708-71-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/3168-106-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/3396-121-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/3488-122-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/3596-123-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/3964-200-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB

                                                                                                                      • memory/4064-201-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        224KB