Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
6f803ef93ff43f7ca1c58a4da0a93e0f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f803ef93ff43f7ca1c58a4da0a93e0f.exe
Resource
win10v2004-20231215-en
General
-
Target
6f803ef93ff43f7ca1c58a4da0a93e0f.exe
-
Size
5.2MB
-
MD5
6f803ef93ff43f7ca1c58a4da0a93e0f
-
SHA1
edfcb91cfc368a096541393cbea32fc42954336b
-
SHA256
bda2b27d917dc919d2df7f2768a5d20f4f554e6f0eeb687f5ac45b53aecbb2f3
-
SHA512
9a6b30821cb36ed1634bd9f962bf4c71a61ccff8ec67c317dab3655104faad9f62ec869a4a1c9032f218308d77e0b26c1a0f08c777109faad17e0037ef684235
-
SSDEEP
98304:yYgYhpOqywS4gcAXVaOjV3XdUsLATs6QlSnAg268nrzbYq5BKyKjc6I6uY0aeF:yYNdyoXAXVaO3muP9l8AgJmzkq5oyKPU
Malware Config
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
redline
pub1
viacetequn.site:80
Extracted
smokeloader
pub5
Extracted
nullmixer
http://hsiens.xyz/
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
CryptBot payload 3 IoCs
resource yara_rule behavioral2/memory/3688-235-0x0000000000690000-0x0000000000733000-memory.dmp family_cryptbot behavioral2/memory/3688-236-0x0000000000690000-0x0000000000733000-memory.dmp family_cryptbot behavioral2/memory/3688-237-0x0000000000690000-0x0000000000733000-memory.dmp family_cryptbot -
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023224-90.dat family_fabookie -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/1744-103-0x0000000004C40000-0x0000000004C62000-memory.dmp family_redline behavioral2/memory/1744-116-0x0000000007220000-0x0000000007240000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral2/memory/1744-103-0x0000000004C40000-0x0000000004C62000-memory.dmp family_sectoprat behavioral2/memory/3136-118-0x0000000002940000-0x0000000002950000-memory.dmp family_sectoprat behavioral2/memory/1744-116-0x0000000007220000-0x0000000007240000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/4404-141-0x0000000002910000-0x00000000029AD000-memory.dmp family_vidar behavioral2/memory/4404-160-0x0000000000400000-0x00000000023F9000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000c000000023134-53.dat aspack_v212_v242 behavioral2/files/0x0009000000023217-52.dat aspack_v212_v242 behavioral2/files/0x0006000000023222-59.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 6f803ef93ff43f7ca1c58a4da0a93e0f.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation Mon000d7b2b59b9.exe -
Executes dropped EXE 14 IoCs
pid Process 4656 setup_installer.exe 1424 setup_install.exe 4404 Mon00a4b905d6fcf0a9.exe 4528 Mon000d7b2b59b9.exe 1744 Mon00f61d292f523.exe 2752 Mon0015a1e17ea5.exe 4292 Mon001af0f6251.exe 2212 Mon00271bbb5e.exe 3056 Mon00b1849cf0bf91e9.exe 2444 Mon0001207aa1161f.exe 2416 Mon00e8b91b250904.exe 4324 Mon000d7b2b59b9.exe 2568 Amica.exe.com 3688 Amica.exe.com -
Loads dropped DLL 5 IoCs
pid Process 1424 setup_install.exe 1424 setup_install.exe 1424 setup_install.exe 1424 setup_install.exe 1424 setup_install.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Mon00b1849cf0bf91e9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3224 1424 WerFault.exe 88 1576 4404 WerFault.exe 111 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon001af0f6251.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon001af0f6251.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon001af0f6251.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Amica.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Amica.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4268 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4292 Mon001af0f6251.exe 4292 Mon001af0f6251.exe 3136 powershell.exe 3136 powershell.exe 3136 powershell.exe 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found 3516 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4292 Mon001af0f6251.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2752 Mon0015a1e17ea5.exe Token: SeDebugPrivilege 2416 Mon00e8b91b250904.exe Token: SeDebugPrivilege 3136 powershell.exe Token: SeDebugPrivilege 1744 Mon00f61d292f523.exe Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found Token: SeShutdownPrivilege 3516 Process not Found Token: SeCreatePagefilePrivilege 3516 Process not Found -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2568 Amica.exe.com 2568 Amica.exe.com 2568 Amica.exe.com 3688 Amica.exe.com 3688 Amica.exe.com 3688 Amica.exe.com 3688 Amica.exe.com 3688 Amica.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2568 Amica.exe.com 2568 Amica.exe.com 2568 Amica.exe.com 3688 Amica.exe.com 3688 Amica.exe.com 3688 Amica.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 4656 2728 6f803ef93ff43f7ca1c58a4da0a93e0f.exe 87 PID 2728 wrote to memory of 4656 2728 6f803ef93ff43f7ca1c58a4da0a93e0f.exe 87 PID 2728 wrote to memory of 4656 2728 6f803ef93ff43f7ca1c58a4da0a93e0f.exe 87 PID 4656 wrote to memory of 1424 4656 setup_installer.exe 88 PID 4656 wrote to memory of 1424 4656 setup_installer.exe 88 PID 4656 wrote to memory of 1424 4656 setup_installer.exe 88 PID 1424 wrote to memory of 1248 1424 setup_install.exe 119 PID 1424 wrote to memory of 1248 1424 setup_install.exe 119 PID 1424 wrote to memory of 1248 1424 setup_install.exe 119 PID 1424 wrote to memory of 3436 1424 setup_install.exe 118 PID 1424 wrote to memory of 3436 1424 setup_install.exe 118 PID 1424 wrote to memory of 3436 1424 setup_install.exe 118 PID 1424 wrote to memory of 4420 1424 setup_install.exe 117 PID 1424 wrote to memory of 4420 1424 setup_install.exe 117 PID 1424 wrote to memory of 4420 1424 setup_install.exe 117 PID 1424 wrote to memory of 1328 1424 setup_install.exe 92 PID 1424 wrote to memory of 1328 1424 setup_install.exe 92 PID 1424 wrote to memory of 1328 1424 setup_install.exe 92 PID 1424 wrote to memory of 4608 1424 setup_install.exe 91 PID 1424 wrote to memory of 4608 1424 setup_install.exe 91 PID 1424 wrote to memory of 4608 1424 setup_install.exe 91 PID 1424 wrote to memory of 2144 1424 setup_install.exe 116 PID 1424 wrote to memory of 2144 1424 setup_install.exe 116 PID 1424 wrote to memory of 2144 1424 setup_install.exe 116 PID 1424 wrote to memory of 1300 1424 setup_install.exe 115 PID 1424 wrote to memory of 1300 1424 setup_install.exe 115 PID 1424 wrote to memory of 1300 1424 setup_install.exe 115 PID 1424 wrote to memory of 3424 1424 setup_install.exe 114 PID 1424 wrote to memory of 3424 1424 setup_install.exe 114 PID 1424 wrote to memory of 3424 1424 setup_install.exe 114 PID 1424 wrote to memory of 3184 1424 setup_install.exe 113 PID 1424 wrote to memory of 3184 1424 setup_install.exe 113 PID 1424 wrote to memory of 3184 1424 setup_install.exe 113 PID 1424 wrote to memory of 3796 1424 setup_install.exe 112 PID 1424 wrote to memory of 3796 1424 setup_install.exe 112 PID 1424 wrote to memory of 3796 1424 setup_install.exe 112 PID 4608 wrote to memory of 4404 4608 cmd.exe 111 PID 4608 wrote to memory of 4404 4608 cmd.exe 111 PID 4608 wrote to memory of 4404 4608 cmd.exe 111 PID 3436 wrote to memory of 4528 3436 cmd.exe 110 PID 3436 wrote to memory of 4528 3436 cmd.exe 110 PID 3436 wrote to memory of 4528 3436 cmd.exe 110 PID 2144 wrote to memory of 1744 2144 cmd.exe 94 PID 2144 wrote to memory of 1744 2144 cmd.exe 94 PID 2144 wrote to memory of 1744 2144 cmd.exe 94 PID 3796 wrote to memory of 2752 3796 cmd.exe 109 PID 3796 wrote to memory of 2752 3796 cmd.exe 109 PID 4420 wrote to memory of 4292 4420 cmd.exe 93 PID 4420 wrote to memory of 4292 4420 cmd.exe 93 PID 4420 wrote to memory of 4292 4420 cmd.exe 93 PID 1300 wrote to memory of 2212 1300 cmd.exe 107 PID 1300 wrote to memory of 2212 1300 cmd.exe 107 PID 1300 wrote to memory of 2212 1300 cmd.exe 107 PID 3184 wrote to memory of 3056 3184 cmd.exe 106 PID 3184 wrote to memory of 3056 3184 cmd.exe 106 PID 3184 wrote to memory of 3056 3184 cmd.exe 106 PID 1328 wrote to memory of 2444 1328 cmd.exe 105 PID 1328 wrote to memory of 2444 1328 cmd.exe 105 PID 1248 wrote to memory of 3136 1248 cmd.exe 95 PID 1248 wrote to memory of 3136 1248 cmd.exe 95 PID 1248 wrote to memory of 3136 1248 cmd.exe 95 PID 3424 wrote to memory of 2416 3424 cmd.exe 98 PID 3424 wrote to memory of 2416 3424 cmd.exe 98 PID 3056 wrote to memory of 4832 3056 Mon00b1849cf0bf91e9.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f803ef93ff43f7ca1c58a4da0a93e0f.exe"C:\Users\Admin\AppData\Local\Temp\6f803ef93ff43f7ca1c58a4da0a93e0f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS032D7237\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00a4b905d6fcf0a9.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00a4b905d6fcf0a9.exeMon00a4b905d6fcf0a9.exe5⤵
- Executes dropped EXE
PID:4404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 18566⤵
- Program crash
PID:1576
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon0001207aa1161f.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon0001207aa1161f.exeMon0001207aa1161f.exe5⤵
- Executes dropped EXE
PID:2444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 5644⤵
- Program crash
PID:3224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon0015a1e17ea5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00b1849cf0bf91e9.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00e8b91b250904.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00271bbb5e.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00f61d292f523.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon001af0f6251.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon000d7b2b59b9.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:1248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon001af0f6251.exeMon001af0f6251.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4292
-
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00f61d292f523.exeMon00f61d292f523.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1424 -ip 14241⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00e8b91b250904.exeMon00e8b91b250904.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
C:\Windows\SysWOW64\dllhost.exedllhost.exe1⤵PID:4832
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Sfaldavano.xls1⤵PID:4212
-
C:\Windows\SysWOW64\cmd.execmd2⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comAmica.exe.com Y3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3688
-
-
-
C:\Windows\SysWOW64\PING.EXEping VFMDDVWB -n 303⤵
- Runs ping.exe
PID:4268
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^fARmmICHAETEVIAiewsqLILJhRoBwBFrurUNyycHHdHtUkLfezrMoLJHPojHmwGYYPnRONeXFJaxqGOwySnHnTVxzjYWSOiGKIutNTBfsuin$" Serravano.xls3⤵PID:2824
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon000d7b2b59b9.exe"C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon000d7b2b59b9.exe" -a1⤵
- Executes dropped EXE
PID:4324
-
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00b1849cf0bf91e9.exeMon00b1849cf0bf91e9.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3056
-
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon00271bbb5e.exeMon00271bbb5e.exe1⤵
- Executes dropped EXE
PID:2212
-
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon0015a1e17ea5.exeMon0015a1e17ea5.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
C:\Users\Admin\AppData\Local\Temp\7zS032D7237\Mon000d7b2b59b9.exeMon000d7b2b59b9.exe1⤵
- Checks computer location settings
- Executes dropped EXE
PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4404 -ip 44041⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD55b90cb10b77ab38849752f940e1c8024
SHA124ffd33e74bc16899b694688fafe3323831a3300
SHA2561fa1c92b73c90263161244e3c6f75270f6ad1a0a460317487c56ff448db3dde6
SHA512aede1ecb5cd4ef42846cc3e6442514d82a0e6c188e4d45d58542358a2eceaa6aea9d133b857ade532c6e8689b96bf4ef26814110724cb332bbf8361d259cda03
-
Filesize
4KB
MD589eb1d3b678be100766ab669bebb4c1e
SHA121973874746a3ada0ff4376ae8dc6f175a77abea
SHA2563d36c44f9851cba7e2775dfdb0c30430776f8f7dd2d87fa646f8578080eb18b1
SHA512c86a41781e278aae4f56b4f94302b0369994eebcba6e5d7219aff430ac437a266f461ddf566dbb72be714bdeb4874ade6b1bee13cf098759d72a86666b670634
-
Filesize
6KB
MD53c2e89923a43bc0288cbd4afc795983d
SHA105af8225df0c76acd39242b7ad333b1a310fbf9f
SHA2564cabb6bb863eaafb0898884d09a3246ae1753dd98c24775563136d0579095c8d
SHA5122b35106c61d1027e11e3abb64f73db93ca895b73922b7c5e4d6b0581e2cc2aaa5022bed1cf394dde62b3987924231d33eb453579c15d0d7d845367b74ba24049
-
Filesize
44KB
MD597b4eb46a856e6abcbfc0cb1103c5112
SHA11805f6ea329f8cfb70f100fa2c328ea6c363275e
SHA256b44c9be116344d0a4d72a8499c376340bf7105b73a3b88d859c5656d36fc60f2
SHA512646ac738f0a5c0445861a58f8e48d6bc24b34879bd2ddf4d2ab69e1237f7fe4aea9a8f154a5a99d56f5f9d807031f579b0642590cf884afbe6f46b38b5a0b137
-
Filesize
4KB
MD52ffc4caf5ec8117c00973056d7f349b2
SHA160b1f5602234c3ec553e81648f9132aaa8ffce14
SHA256cc69965ef5ac55c3056ead2c5f47374a8186944934fd1b1712c833c9142c4448
SHA512986f7585de4595a9b443fa1e791fbb1eaf39e957fef2a8593dcd1e2d4cbdab7ef6043b8e6ef913042e26863de5691365aa696587cc8c5dd3db08e39abdd22d8f
-
Filesize
1.3MB
MD557d883f2e96dccb2ca2867cb858151f8
SHA109e0fcd15cc69bcd6a9ef2928c4054d754b1aaa3
SHA256c1dc7829e850ff7189e993b6f2bd3b00d56f3ec062da364e8698fd39e79f0072
SHA5122235866e39dccc8cd524592f6f0b514878bf0c5ad13ee95bd01508766eb789528394bf329faee481d81e3fe389664fb5673d214d478cda58f4293bfe58ba4012
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
8KB
MD5408f2c9252ad66429a8d5401f1833db3
SHA13829d2d03a728ecd59b38cc189525220a60c05db
SHA256890db580fac738971bc7c714735ff6f1f2ee31edccd7881044da3e98452af664
SHA512d4c89dfd928023b9f4380808b27e032342d2a85963b95bbed3191cc03b455dbc6f5ffecf29828a53b1d9011b3881f1cda9d15d269a2cbcbd4be5c993bcd9643b
-
Filesize
236KB
MD57de877618ab2337aa32901030365b2ff
SHA1adb006662ec67e244d2d9c935460c656c3d47435
SHA256989079a8616a9e5c4f77c0e86b89d170dc7b8c4bf23768111f8e0d60e2c29da7
SHA512b7f9b402baad41e8e9df1db856b2273b64dd603b6c5bae147979fbff215af79b1d261cdd89f0eb050c7ef3db820bb0207decd58fbc7f9a8d4ffb179133a7c8ff
-
Filesize
1.5MB
MD5df80b76857b74ae1b2ada8efb2a730ee
SHA15653be57533c6eb058fed4963a25a676488ef832
SHA2565545c43eb14b0519ab997673efa379343f98d2b6b1578d9fdeb369234789f9dd
SHA512060b04536003ce4a91e5847d487701eed7e093408e427198be552f0af37aee498929586f3a0110c78173873a28d95c6c0a4cdd01c7218274f5849a4730f9efdd
-
Filesize
572KB
MD56dba60503ea60560826fe5a12dced3e9
SHA17bb04d508e970701dc2945ed42fe96dbb083ec33
SHA2568d49f82aaa8eb3dfa5c7d7dffd7efb9dd6b776ef08b8b8c5afc6cb8ab0743865
SHA512837c0f0dc70386ce1d143332e4d273750f64dd7f8be5b4ce79aa39628ceebf27d01e447ed0b9ec6064c6ba9dbaa13a64631c2e136ec99d27c0f4a25681053ff9
-
Filesize
1.5MB
MD55f0617b7287c5f217e89b9407284736e
SHA164db3f9ceedda486648db13b4ed87e868c9192ca
SHA256b0560993c8b7df45ede6031471dee138a335c428dd16454570ffa1b66175aa2a
SHA5126367d9f5749260b326328f2ca455cbb22fc4696f44e61fab7616e39471742afbce26b69ed3ffb27f4d9cad7b643a50b54aea5f33892f0422d331ca76b6ea05b9
-
Filesize
156KB
MD5cda12ae37191467d0a7d151664ed74aa
SHA12625b2e142c848092aa4a51584143ab7ed7d33d2
SHA2561e07bb767e9979d4afa4f8d69b68e33dd7c1a43f6863096a2b091047a10cdc2e
SHA51277c4429e22754e50828d9ec344cd63780acd31c350ef16ef69e2a396114df10e7c43d791440faee90e7f80be73e845ab579fd7b38efbd12f5de11bbc906f1c1d
-
Filesize
248KB
MD5d23c06e25b4bd295e821274472263572
SHA19ad295ec3853dc465ae77f9479f8c4f76e2748b8
SHA256f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c
SHA512122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD5f69dc484a152f3e9f551fb34fbf15604
SHA1414ff10cdf2642172c0ec9cd28612a41facb95a9
SHA256031461d720fc1807aaf0ddb8410fc9cc7b154aac6f585f28d73ebf77d8093e82
SHA512ebb6a154d3b95be2d956ef738640709ecc56a80280adc32efcc029c844cf6aa97ef223b4b7602701358bc36fcac7af49ba37962aa5068a70b70b002e4a33013e
-
Filesize
14KB
MD5c33dad8348217ffcfdefa352dc93e1de
SHA1795e9f77aa41a0485e7b5f3c23e5326bcc86dd8e
SHA2564f100280e559747a9eb8339d315e921f48f2ea51e4c01117e5eb36e846fc4303
SHA512395c3136e0255e348761c7a6c2d38ce439ddf15516ad48199093965665d822a2a3cb592bd9c5630a32e7b53c438ec4cb21f4cea7205320990b30fad952426213
-
Filesize
602KB
MD544f72d9c2fe5b601a078cb6acdc67fd4
SHA1308d501f27df34d4ac3ae7b187a61babec147a0b
SHA2565542d500b58c4fecb241d5a82393ca06badcf6215e01d3cee6512c543bab396f
SHA5127e5801e9619abbcd9d8cad1db3092a8ea1bf2f00bcb246a32b43ab85b15b9b1214d91327ac6a0e1ac61ed83bd48994054443705edacb3847a2ba0328e1fe90ba
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
104KB
MD53c6cee4070cb904d41443c7350a14697
SHA156920bfeb94f291549aebe3bf30ee8b78a4544e8
SHA256356990a014e848b22da6817ead39bc3be46eb417e156d2c7677e780db2831bc8
SHA512f29759ebd59c4daa4abc61fd9c06db808eea5c044c915472244997870d0d3fb45b2b1a98be5c98ebfe1648beb0117164598fffeb886c2ef4ab23401271ca807a
-
Filesize
137KB
MD5aa44cdf439e12f29c710ab824d0b231c
SHA166c324067da7d35e0bb89a0f3adb2cf61e556db2
SHA2564ebc5ad89666c566789b383322fe4dca4aa4f91235eac19d3cd75687da85ebc1
SHA512058b0a692dd36cdf2f2e3881ba8bbaee1dd03f1e0914d167af735cd0db855b80083fdc8a8c1b8b6a7fb2ca58118b2d38898944822d2ef5085623bed3bcdfb333
-
Filesize
526B
MD526ebbe10f1e4b7581ee0137b3263c744
SHA17f5b7949216744cbe8cde40f8b4762224cce8cc0
SHA256376c16f256225ebadc257dab804c5bfbc1dde251a7aea7b55239d30261098495
SHA51248014f2f9de728f0d5af3b072a11552e798e6de07f86ed2ff6448b7ac3dbacf582801ee128a175d17df2be9e0d7c27caf6dc455b4b4f5786868567aa41a4f8ed
-
Filesize
317KB
MD56a5cdee01b20ba4a69eb575f4a82d95e
SHA121de0abbcfd80a420f7ebf062b086f93078c8d41
SHA2562789946dcab07cd376d471191ba08fadccc6e4cbf2b0331ef4632055989aaf4a
SHA512edf9436851deef79415dc9c2dc80c9ee9fb2187bd5bf6112f91080cc5f46c898131f99a088889e3741de120b9736b02ed7d9a8e8af05accefbe54e4d740b7b17
-
Filesize
7KB
MD559c1a0e040bc2147708982117381c7b0
SHA1b7ab1ba81078292a77285ce1d965c07ba9710500
SHA2567879606f9e1273fb78348a444e43b7d783a2d56a06f0c8ea98f6d72b181a0e2e
SHA512522928999a1c84337b280402bfc75998c1082d37b8e167b069a557d479fb89d59c6d8fc8a4cbff0a54dffa84380611cf77d7952f578a95814bc8ea5aa46d0318
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.8MB
MD5a3b27ac1b878a79530e9701746d842d4
SHA147d544d03e00dd2b3e22e7e18566a354bbfc1d04
SHA2567e5e878be8ef8a06761f9a564a470a44d52871fe4b506e30c3141605eae1479f
SHA51275324f94f6b8175021c5189207190ff4f60fb90db4fa4182c69f35370c6f282c845086200ec29848f0ce8213dc3d276a3c85597e0cb3afcd7eee845e97f03c63
-
Filesize
5.2MB
MD571e2cf4709767eab8e0e6dcd8f19d37c
SHA10641acedc06c13a17d94968e3237c4d9533fc0b9
SHA256077ac4018bc25a85796c54e06872071d561df272188dde34daca7e5d01e950fd
SHA512686cae3db08ad1c7beaf13758a74cae4eb4084d152be49510c11a13010cbb27a1407657fab57d0d732648e91e21862c0604a9ad789e55bcac803fc7be6b4b675
-
Filesize
5.1MB
MD5125392396db5b5bf3c34b4dafd0010f6
SHA11d1e7bbebc70726d2accf837e9d878f00645d527
SHA2561f1c3a64dbdbb64843963e642b10599916177ab0b2e28e40a7fcb30c88945e01
SHA5123c062aa3d8f9455e72f3445aca362bd4a5200b118e5d6835d1a360d327916a33dc539addefdf4b9060d838ccc04a16ba62d0a8b1de0afc80c9c297f7877e580a