Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
5905dc411bf712fc10533d5cd28c8f91.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5905dc411bf712fc10533d5cd28c8f91.exe
Resource
win10v2004-20231215-en
General
-
Target
5905dc411bf712fc10533d5cd28c8f91.exe
-
Size
80KB
-
MD5
5905dc411bf712fc10533d5cd28c8f91
-
SHA1
2ae1d5245f719a442c37e56e10e221eb2b451c48
-
SHA256
b5c42bf68946de94cb58bb9e74baa78c5e10f9b3e39545bac75f4ed0ff4fd081
-
SHA512
52f1fde1f4730caf1cba81e116360ef2585952dca433427ef6ce149adbfec4994c03843d919244263561b99d8d7ea7c8e78a1c0d33e02af1f8159ccf664d4db0
-
SSDEEP
1536:sdBwRl7XqChS8Kr8Pypmr1zvaRhdsRJp7:sdGRJfHKA6pKDajip7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 2436 userinit.exe 2844 system.exe 2836 system.exe 2276 system.exe 2592 system.exe 2292 system.exe 2952 system.exe 3036 system.exe 2804 system.exe 2196 system.exe 2908 system.exe 2996 system.exe 1468 system.exe 480 system.exe 2552 system.exe 2128 system.exe 1708 system.exe 1488 system.exe 2372 system.exe 1796 system.exe 1832 system.exe 1224 system.exe 1588 system.exe 1460 system.exe 1756 system.exe 1968 system.exe 2368 system.exe 2860 system.exe 2716 system.exe 1532 system.exe 3032 system.exe 1132 system.exe 2656 system.exe 2236 system.exe 2816 system.exe 3040 system.exe 2620 system.exe 2792 system.exe 2908 system.exe 2948 system.exe 280 system.exe 1400 system.exe 1480 system.exe 2080 system.exe 2176 system.exe 2128 system.exe 1772 system.exe 2400 system.exe 1244 system.exe 2028 system.exe 1992 system.exe 1392 system.exe 1224 system.exe 1588 system.exe 2456 system.exe 1752 system.exe 2520 system.exe 2428 system.exe 1052 system.exe 2708 system.exe 2700 system.exe 3032 system.exe 2516 system.exe 2592 system.exe -
Loads dropped DLL 64 IoCs
pid Process 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe 2436 userinit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\userinit.exe 5905dc411bf712fc10533d5cd28c8f91.exe File opened for modification C:\Windows\userinit.exe 5905dc411bf712fc10533d5cd28c8f91.exe File created C:\Windows\kdcoms.dll userinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1964 5905dc411bf712fc10533d5cd28c8f91.exe 2436 userinit.exe 2436 userinit.exe 2844 system.exe 2436 userinit.exe 2836 system.exe 2436 userinit.exe 2276 system.exe 2436 userinit.exe 2592 system.exe 2436 userinit.exe 2292 system.exe 2436 userinit.exe 2952 system.exe 2436 userinit.exe 3036 system.exe 2436 userinit.exe 2804 system.exe 2436 userinit.exe 2196 system.exe 2436 userinit.exe 2908 system.exe 2436 userinit.exe 2996 system.exe 2436 userinit.exe 1468 system.exe 2436 userinit.exe 480 system.exe 2436 userinit.exe 2552 system.exe 2436 userinit.exe 2128 system.exe 2436 userinit.exe 1708 system.exe 2436 userinit.exe 1488 system.exe 2436 userinit.exe 2372 system.exe 2436 userinit.exe 1796 system.exe 2436 userinit.exe 1832 system.exe 2436 userinit.exe 1224 system.exe 2436 userinit.exe 1588 system.exe 2436 userinit.exe 1460 system.exe 2436 userinit.exe 1756 system.exe 2436 userinit.exe 2436 userinit.exe 2368 system.exe 2436 userinit.exe 2860 system.exe 2436 userinit.exe 2716 system.exe 2436 userinit.exe 1532 system.exe 2436 userinit.exe 3032 system.exe 2436 userinit.exe 1132 system.exe 2436 userinit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2436 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1964 5905dc411bf712fc10533d5cd28c8f91.exe 1964 5905dc411bf712fc10533d5cd28c8f91.exe 2436 userinit.exe 2436 userinit.exe 2844 system.exe 2844 system.exe 2836 system.exe 2836 system.exe 2276 system.exe 2276 system.exe 2592 system.exe 2592 system.exe 2292 system.exe 2292 system.exe 2952 system.exe 2952 system.exe 3036 system.exe 3036 system.exe 2804 system.exe 2804 system.exe 2196 system.exe 2196 system.exe 2908 system.exe 2908 system.exe 2996 system.exe 2996 system.exe 1468 system.exe 1468 system.exe 480 system.exe 480 system.exe 2552 system.exe 2552 system.exe 2128 system.exe 2128 system.exe 1708 system.exe 1708 system.exe 1488 system.exe 1488 system.exe 2372 system.exe 2372 system.exe 1796 system.exe 1796 system.exe 1832 system.exe 1832 system.exe 1224 system.exe 1224 system.exe 1588 system.exe 1588 system.exe 1460 system.exe 1460 system.exe 1756 system.exe 1756 system.exe 2368 system.exe 2368 system.exe 2860 system.exe 2860 system.exe 2716 system.exe 2716 system.exe 1532 system.exe 1532 system.exe 3032 system.exe 3032 system.exe 1132 system.exe 1132 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2436 1964 5905dc411bf712fc10533d5cd28c8f91.exe 28 PID 1964 wrote to memory of 2436 1964 5905dc411bf712fc10533d5cd28c8f91.exe 28 PID 1964 wrote to memory of 2436 1964 5905dc411bf712fc10533d5cd28c8f91.exe 28 PID 1964 wrote to memory of 2436 1964 5905dc411bf712fc10533d5cd28c8f91.exe 28 PID 2436 wrote to memory of 2844 2436 userinit.exe 29 PID 2436 wrote to memory of 2844 2436 userinit.exe 29 PID 2436 wrote to memory of 2844 2436 userinit.exe 29 PID 2436 wrote to memory of 2844 2436 userinit.exe 29 PID 2436 wrote to memory of 2836 2436 userinit.exe 30 PID 2436 wrote to memory of 2836 2436 userinit.exe 30 PID 2436 wrote to memory of 2836 2436 userinit.exe 30 PID 2436 wrote to memory of 2836 2436 userinit.exe 30 PID 2436 wrote to memory of 2276 2436 userinit.exe 31 PID 2436 wrote to memory of 2276 2436 userinit.exe 31 PID 2436 wrote to memory of 2276 2436 userinit.exe 31 PID 2436 wrote to memory of 2276 2436 userinit.exe 31 PID 2436 wrote to memory of 2592 2436 userinit.exe 32 PID 2436 wrote to memory of 2592 2436 userinit.exe 32 PID 2436 wrote to memory of 2592 2436 userinit.exe 32 PID 2436 wrote to memory of 2592 2436 userinit.exe 32 PID 2436 wrote to memory of 2292 2436 userinit.exe 33 PID 2436 wrote to memory of 2292 2436 userinit.exe 33 PID 2436 wrote to memory of 2292 2436 userinit.exe 33 PID 2436 wrote to memory of 2292 2436 userinit.exe 33 PID 2436 wrote to memory of 2952 2436 userinit.exe 34 PID 2436 wrote to memory of 2952 2436 userinit.exe 34 PID 2436 wrote to memory of 2952 2436 userinit.exe 34 PID 2436 wrote to memory of 2952 2436 userinit.exe 34 PID 2436 wrote to memory of 3036 2436 userinit.exe 35 PID 2436 wrote to memory of 3036 2436 userinit.exe 35 PID 2436 wrote to memory of 3036 2436 userinit.exe 35 PID 2436 wrote to memory of 3036 2436 userinit.exe 35 PID 2436 wrote to memory of 2804 2436 userinit.exe 36 PID 2436 wrote to memory of 2804 2436 userinit.exe 36 PID 2436 wrote to memory of 2804 2436 userinit.exe 36 PID 2436 wrote to memory of 2804 2436 userinit.exe 36 PID 2436 wrote to memory of 2196 2436 userinit.exe 37 PID 2436 wrote to memory of 2196 2436 userinit.exe 37 PID 2436 wrote to memory of 2196 2436 userinit.exe 37 PID 2436 wrote to memory of 2196 2436 userinit.exe 37 PID 2436 wrote to memory of 2908 2436 userinit.exe 38 PID 2436 wrote to memory of 2908 2436 userinit.exe 38 PID 2436 wrote to memory of 2908 2436 userinit.exe 38 PID 2436 wrote to memory of 2908 2436 userinit.exe 38 PID 2436 wrote to memory of 2996 2436 userinit.exe 39 PID 2436 wrote to memory of 2996 2436 userinit.exe 39 PID 2436 wrote to memory of 2996 2436 userinit.exe 39 PID 2436 wrote to memory of 2996 2436 userinit.exe 39 PID 2436 wrote to memory of 1468 2436 userinit.exe 40 PID 2436 wrote to memory of 1468 2436 userinit.exe 40 PID 2436 wrote to memory of 1468 2436 userinit.exe 40 PID 2436 wrote to memory of 1468 2436 userinit.exe 40 PID 2436 wrote to memory of 480 2436 userinit.exe 41 PID 2436 wrote to memory of 480 2436 userinit.exe 41 PID 2436 wrote to memory of 480 2436 userinit.exe 41 PID 2436 wrote to memory of 480 2436 userinit.exe 41 PID 2436 wrote to memory of 2552 2436 userinit.exe 42 PID 2436 wrote to memory of 2552 2436 userinit.exe 42 PID 2436 wrote to memory of 2552 2436 userinit.exe 42 PID 2436 wrote to memory of 2552 2436 userinit.exe 42 PID 2436 wrote to memory of 2128 2436 userinit.exe 43 PID 2436 wrote to memory of 2128 2436 userinit.exe 43 PID 2436 wrote to memory of 2128 2436 userinit.exe 43 PID 2436 wrote to memory of 2128 2436 userinit.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\5905dc411bf712fc10533d5cd28c8f91.exe"C:\Users\Admin\AppData\Local\Temp\5905dc411bf712fc10533d5cd28c8f91.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2276
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2196
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:480
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1224
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1968
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2656
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2236
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2816
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2792
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2908
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2948
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:280
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1480
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2080
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2176
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1772
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1244
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2028
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1992
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1392
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1224
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1588
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2456
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1752
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2520
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2428
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1052
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2708
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3032
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2516
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2592
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2784
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3016
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3048
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2340
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3068
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:668
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:696
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2980
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1380
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2320
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1692
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2416
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1488
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:692
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2012
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:604
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1716
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:836
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2524
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1920
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2404
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2840
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2148
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2880
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2736
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2752
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2836
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2152
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2564
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2992
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3004
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3052
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2340
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2792
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2908
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:764
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1940
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1768
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1724
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1656
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1692
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2356
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1908
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2500
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1500
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1268
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1244
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2012
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1952
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1716
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2540
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1696
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2676
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1000
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:364
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1052
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2716
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2580
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2576
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2296
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2592
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2144
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2828
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1944
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55905dc411bf712fc10533d5cd28c8f91
SHA12ae1d5245f719a442c37e56e10e221eb2b451c48
SHA256b5c42bf68946de94cb58bb9e74baa78c5e10f9b3e39545bac75f4ed0ff4fd081
SHA51252f1fde1f4730caf1cba81e116360ef2585952dca433427ef6ce149adbfec4994c03843d919244263561b99d8d7ea7c8e78a1c0d33e02af1f8159ccf664d4db0