Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8.exe
Resource
win10v2004-20231215-en
General
-
Target
694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8.exe
-
Size
10.9MB
-
MD5
93291ec290b98858c2c6d2e9d360b277
-
SHA1
c31d52d232fa01507b9ce973c3c6603b6084a707
-
SHA256
694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8
-
SHA512
78265580f7c2a0241a9d0a537ef16eebfb1fa11ea59b89f2476b2422a4baf0af7cab9a9ede6109f8f963104b47c15b40656f85136d5c66a2883f94d834656389
-
SSDEEP
49152:6nZQEWHqvKD2ij5MbU8B+GI66G9AcgmOohDdyfif1yfGV3GPxXSDM98BRUKo6uDx:86je1muOvoTE
Malware Config
Signatures
-
Enumerates VirtualBox DLL files 2 TTPs 4 IoCs
description ioc Process File opened (read-only) C:\windows\System32\vboxoglpassthroughspu.dll SecureSysTem.exe File opened (read-only) C:\windows\System32\vboxdisp.dll SecureSysTem.exe File opened (read-only) C:\windows\System32\vboxhook.dll SecureSysTem.exe File opened (read-only) C:\windows\System32\vboxoglerrorspu.dll SecureSysTem.exe -
Looks for VirtualBox drivers on disk 2 TTPs 4 IoCs
description ioc Process File opened (read-only) C:\windows\System32\Drivers\VBoxMouse.sys SecureSysTem.exe File opened (read-only) C:\windows\System32\Drivers\VBoxGuest.sys SecureSysTem.exe File opened (read-only) C:\windows\System32\Drivers\VBoxSF.sys SecureSysTem.exe File opened (read-only) C:\windows\System32\Drivers\VBoxVideo.sys SecureSysTem.exe -
Looks for VirtualBox executables on disk 2 TTPs 3 IoCs
description ioc Process File opened (read-only) C:\windows\System32\vboxservice.exe SecureSysTem.exe File opened (read-only) C:\windows\System32\vboxtray.exe SecureSysTem.exe File opened (read-only) C:\windows\System32\VBoxControl.exe SecureSysTem.exe -
Looks for VMWare drivers on disk 2 TTPs 1 IoCs
description ioc Process File opened (read-only) C:\windows\System32\Drivers\Vmmouse.sys SecureSysTem.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3928 SecureSysTem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5048 694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1836 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe 1836 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2960 5048 694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8.exe 91 PID 5048 wrote to memory of 2960 5048 694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8.exe 91 PID 5048 wrote to memory of 3928 5048 694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8.exe 93 PID 5048 wrote to memory of 3928 5048 694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8.exe 93 PID 2960 wrote to memory of 1836 2960 cmd.exe 94 PID 2960 wrote to memory of 1836 2960 cmd.exe 94 PID 2960 wrote to memory of 1836 2960 cmd.exe 94 PID 1836 wrote to memory of 1364 1836 AcroRd32.exe 101 PID 1836 wrote to memory of 1364 1836 AcroRd32.exe 101 PID 1836 wrote to memory of 1364 1836 AcroRd32.exe 101 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 4920 1364 RdrCEF.exe 103 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104 PID 1364 wrote to memory of 2780 1364 RdrCEF.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8.exe"C:\Users\Admin\AppData\Local\Temp\694faa28668a3325821aa25aa67ed37b5d320b41781f807b4ec9bcd675d607a8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe " /c " C:\Users\Admin\AppData\Local\Temp\冯帆个人简历2023.pdf2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\冯帆个人简历2023.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CC76F5096CF484EFAD494164EC1A658A --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:4920
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F118F3961A92F66E7D6579848E785125 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F118F3961A92F66E7D6579848E785125 --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:15⤵PID:2780
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=33387BE3D8D57D0966CF55942B439C29 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=33387BE3D8D57D0966CF55942B439C29 --renderer-client-id=4 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job /prefetch:15⤵PID:3920
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=08144EBA66AAFCFD2522A0F32A5986BF --mojo-platform-channel-handle=1864 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:1056
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D42BB7737437492AB791A12A00C7AADD --mojo-platform-channel-handle=2580 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2864
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=95CE8356530FCFC628D95187A6A0AC80 --mojo-platform-channel-handle=2824 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2292
-
-
-
-
-
C:\ProgramData\SecureSysTem.exeC:\ProgramData\SecureSysTem.exe2⤵
- Enumerates VirtualBox DLL files
- Looks for VirtualBox drivers on disk
- Looks for VirtualBox executables on disk
- Looks for VMWare drivers on disk
- Executes dropped EXE
PID:3928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD53327391b01a87d5184572952ee851845
SHA1f60f2391b462b2efe0af475c452157725a0e38a6
SHA256c1dd61e0f2c6255d38c968e60bcc19ad239bdef4b3cdf2ebc2b9ff725b91db0f
SHA512040c43047b3cefb3e0fa423d59e27fb8d36e6a94550bd96bcd2517452cb60bdd73d27c6728c07198b34a23ae09aee1903a15f5e41982ce7a810dd0b2b839ef88
-
Filesize
3.5MB
MD5d9b5d6a663e0de209b71f200e615ecda
SHA1449740a4b942dcf54014b53c8ae453669c01f9a0
SHA256458bd85acae6f7a6ff7bf41afe368a552d1e97fcb2155079e7399e1a742e6299
SHA5121edd3e220e604b9b1fd6b2da881b60ad63787243a666590df5e70f1e07d49846a061bee59fae9c025056ad92d7897440986a3050e4f271255871e949cd30684f
-
Filesize
64KB
MD5489a44cf3563f02104ea5dc0a6006b7f
SHA14b47c1504ce56c4e45e7c450cfd06ef1bb25c86c
SHA256f23f7b9cc43d153e715d62642e94958d7c7dd3caca0eb54f00b4df9c07f30049
SHA51200ad4dc0687bb1bb7bfa503034484d9756267033c86f1068017d8dcebd633f63f9ca1a949e390b1911ffcdac2421c8500f58b9f091ef128f8588f941adcb76ff
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
204KB
MD5e7d2cc8ec9254862385fda501e4cc175
SHA1ed5ac4b6e564bd572701a97798c08e7eddc0d881
SHA2560c2350db258f37135795e29b5b32dc3277c3443a37d7013c1e1e601bec18a1b3
SHA5129daa9771edcb05cefd4f4feadb1a04dd65248eb4dbe4f8ca850a1d074658d79bd6aab9da643c8a9fe72653906c40086b662412552860adf07e41fe422fb61929