Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
53658afc24d69a9a085d418079d31970.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53658afc24d69a9a085d418079d31970.exe
Resource
win10v2004-20231215-en
General
-
Target
53658afc24d69a9a085d418079d31970.exe
-
Size
456KB
-
MD5
53658afc24d69a9a085d418079d31970
-
SHA1
3bce2497011499230e8099babc98aedcb6ae4a4a
-
SHA256
13c4a245c9dea93e5d4768ea69acf167f9e6302edfc44d30a36a7b7374ba7b41
-
SHA512
39e182c006d1f46447d6aee1d0bc97b2a288919a95beafc02fd39e40de0a16685975edd411518b4f2e3d5e58935fbe09f9b86d5aa97d5b14afad4051c9c44f94
-
SSDEEP
12288:w4ik34n1GxipPy4ZNj2mOb/DNlq41TzXe9Yv:w4ik34n15iN/5lq41Tzuq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" u8kSVi.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vuaeci.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation u8kSVi.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 53658afc24d69a9a085d418079d31970.exe -
Executes dropped EXE 6 IoCs
pid Process 3928 u8kSVi.exe 1940 alay.exe 2788 vuaeci.exe 468 alay.exe 2008 dlay.exe 4696 flay.exe -
resource yara_rule behavioral2/memory/468-44-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/468-53-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/468-50-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/468-54-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /g" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /x" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /P" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /Y" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /m" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /V" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /Z" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /E" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /D" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /T" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /z" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /t" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /d" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /A" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /s" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /k" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /L" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /i" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /R" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /v" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /e" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /f" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /E" u8kSVi.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /X" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /N" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /p" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /M" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /b" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /J" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /H" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /q" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /O" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /F" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /I" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /B" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /r" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /l" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /y" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /G" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /c" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /u" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /h" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /Q" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /n" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /o" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /S" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /W" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /C" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /a" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /K" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /w" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /j" vuaeci.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vuaeci = "C:\\Users\\Admin\\vuaeci.exe /U" vuaeci.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1940 set thread context of 468 1940 alay.exe 93 PID 4696 set thread context of 3756 4696 flay.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4944 tasklist.exe 4896 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3928 u8kSVi.exe 3928 u8kSVi.exe 3928 u8kSVi.exe 3928 u8kSVi.exe 468 alay.exe 468 alay.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 468 alay.exe 468 alay.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 468 alay.exe 468 alay.exe 468 alay.exe 468 alay.exe 468 alay.exe 468 alay.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 468 alay.exe 468 alay.exe 2788 vuaeci.exe 2788 vuaeci.exe 468 alay.exe 468 alay.exe 2788 vuaeci.exe 2788 vuaeci.exe 468 alay.exe 468 alay.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 468 alay.exe 468 alay.exe 2788 vuaeci.exe 2788 vuaeci.exe 468 alay.exe 468 alay.exe 2788 vuaeci.exe 2788 vuaeci.exe 468 alay.exe 468 alay.exe 468 alay.exe 468 alay.exe 468 alay.exe 468 alay.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe 2788 vuaeci.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4944 tasklist.exe Token: SeDebugPrivilege 4696 flay.exe Token: SeDebugPrivilege 4896 tasklist.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1136 53658afc24d69a9a085d418079d31970.exe 3928 u8kSVi.exe 1940 alay.exe 2788 vuaeci.exe 2008 dlay.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1136 wrote to memory of 3928 1136 53658afc24d69a9a085d418079d31970.exe 88 PID 1136 wrote to memory of 3928 1136 53658afc24d69a9a085d418079d31970.exe 88 PID 1136 wrote to memory of 3928 1136 53658afc24d69a9a085d418079d31970.exe 88 PID 1136 wrote to memory of 1940 1136 53658afc24d69a9a085d418079d31970.exe 91 PID 1136 wrote to memory of 1940 1136 53658afc24d69a9a085d418079d31970.exe 91 PID 1136 wrote to memory of 1940 1136 53658afc24d69a9a085d418079d31970.exe 91 PID 3928 wrote to memory of 2788 3928 u8kSVi.exe 92 PID 3928 wrote to memory of 2788 3928 u8kSVi.exe 92 PID 3928 wrote to memory of 2788 3928 u8kSVi.exe 92 PID 1940 wrote to memory of 468 1940 alay.exe 93 PID 1940 wrote to memory of 468 1940 alay.exe 93 PID 1940 wrote to memory of 468 1940 alay.exe 93 PID 1940 wrote to memory of 468 1940 alay.exe 93 PID 1940 wrote to memory of 468 1940 alay.exe 93 PID 1940 wrote to memory of 468 1940 alay.exe 93 PID 1940 wrote to memory of 468 1940 alay.exe 93 PID 1940 wrote to memory of 468 1940 alay.exe 93 PID 3928 wrote to memory of 452 3928 u8kSVi.exe 94 PID 3928 wrote to memory of 452 3928 u8kSVi.exe 94 PID 3928 wrote to memory of 452 3928 u8kSVi.exe 94 PID 452 wrote to memory of 4944 452 cmd.exe 96 PID 452 wrote to memory of 4944 452 cmd.exe 96 PID 452 wrote to memory of 4944 452 cmd.exe 96 PID 1136 wrote to memory of 2008 1136 53658afc24d69a9a085d418079d31970.exe 97 PID 1136 wrote to memory of 2008 1136 53658afc24d69a9a085d418079d31970.exe 97 PID 1136 wrote to memory of 2008 1136 53658afc24d69a9a085d418079d31970.exe 97 PID 1136 wrote to memory of 4696 1136 53658afc24d69a9a085d418079d31970.exe 108 PID 1136 wrote to memory of 4696 1136 53658afc24d69a9a085d418079d31970.exe 108 PID 1136 wrote to memory of 4696 1136 53658afc24d69a9a085d418079d31970.exe 108 PID 4696 wrote to memory of 3756 4696 flay.exe 110 PID 4696 wrote to memory of 3756 4696 flay.exe 110 PID 4696 wrote to memory of 3756 4696 flay.exe 110 PID 4696 wrote to memory of 3756 4696 flay.exe 110 PID 2788 wrote to memory of 3756 2788 vuaeci.exe 110 PID 2788 wrote to memory of 3756 2788 vuaeci.exe 110 PID 2788 wrote to memory of 3756 2788 vuaeci.exe 110 PID 2788 wrote to memory of 3756 2788 vuaeci.exe 110 PID 1136 wrote to memory of 2432 1136 53658afc24d69a9a085d418079d31970.exe 113 PID 1136 wrote to memory of 2432 1136 53658afc24d69a9a085d418079d31970.exe 113 PID 1136 wrote to memory of 2432 1136 53658afc24d69a9a085d418079d31970.exe 113 PID 2432 wrote to memory of 4896 2432 cmd.exe 115 PID 2432 wrote to memory of 4896 2432 cmd.exe 115 PID 2432 wrote to memory of 4896 2432 cmd.exe 115 PID 2788 wrote to memory of 2432 2788 vuaeci.exe 113 PID 2788 wrote to memory of 2432 2788 vuaeci.exe 113 PID 2788 wrote to memory of 4896 2788 vuaeci.exe 115 PID 2788 wrote to memory of 4896 2788 vuaeci.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\53658afc24d69a9a085d418079d31970.exe"C:\Users\Admin\AppData\Local\Temp\53658afc24d69a9a085d418079d31970.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\u8kSVi.exeC:\Users\Admin\u8kSVi.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\vuaeci.exe"C:\Users\Admin\vuaeci.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del u8kSVi.exe3⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
-
-
C:\Users\Admin\alay.exeC:\Users\Admin\alay.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\alay.exe"C:\Users\Admin\alay.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
-
C:\Users\Admin\dlay.exeC:\Users\Admin\dlay.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
C:\Users\Admin\flay.exeC:\Users\Admin\flay.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:3756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 53658afc24d69a9a085d418079d31970.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD51bf479c263ff9b58c1cc00c965f4c14a
SHA1494555c284279f4cb8b1ea9f91ce12c98e057fce
SHA2563b5a01e9c4a8fc9e2f6f33da669a8020b76751720d4c32a42e7ba49e955b1093
SHA51248134b823a6bd2877e200095c03521e75de79a2830d9e723138c00529e0c9436e4b368fb3bd37a5a67cfdbaa34405b8e3f9bd79a982adbf726d882e57823f161
-
Filesize
36KB
MD5ca22de79e6c6c38eb6dfef7fe1660b05
SHA1859243fbafb70d5631e96cf88fc3a4c917cecfca
SHA2568eff51c017894840eec5141933794e35a13de7baf085e20e697106bc4b2467b4
SHA512b136c8748cb46dabf6229477c3bd9b217562a7748c57c87f69c2874bd81e72cdda23ba7692602b7bc972e96716693af7ba0b33a9faf8ea25f4060a4c2dfff678
-
Filesize
264KB
MD59b3122a0ed7ec1eb344be414036da288
SHA1cf6a4651b24fc71db61e1870a360c3fa7d67c1ca
SHA256ca0ae1bd6a5328945c7805621a2efe10840b3023f70e180750ed0f9f87cc7df7
SHA512f57046121b54c8abd81bade8c2989530ac604e128c826397df63680fc7d8bc22715408613119bfa11920e736a7185950adf3d6c769df3f9b389d1020b22959e4
-
Filesize
248KB
MD576a6dee598367ca2ce4e90457622eb62
SHA1067b85364f34f26292739ea3c04706335c7a9ee4
SHA2562bae3eab43e8f1761f7aa29d259d9966bc8d8f19303a53f57b7d1d4e9b11929d
SHA5128125d4643b0cb63496eae85fae0907bb36c82100fd35af76dadb787b82af7d4014f071e63e2bf07021145786e11a64662693c0502cc2ba6df31a4be917c0474f
-
Filesize
248KB
MD5a894d115887478c29f0f179b7ffa0c56
SHA1d68840c5e052442acbd93c2f10415f4819934aa2
SHA256275d5e73222ef16a4cda9cebe356e097a6be03ee34f158b2d1da065b2174afb9
SHA512f34f5851bc8d76d841413cb4cad4d611d1e2097ec2739858e768dd708e6b037cfb8bf79f975e129d195cdaa0e07d8ab930306dc0eb1e5473dab7d435a06e9ede