Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 12:02
Static task
static1
Behavioral task
behavioral1
Sample
7a31dc882ea1b0e7a8ffebcd21059cd5.exe
Resource
win7-20231129-en
General
-
Target
7a31dc882ea1b0e7a8ffebcd21059cd5.exe
-
Size
1.9MB
-
MD5
7a31dc882ea1b0e7a8ffebcd21059cd5
-
SHA1
38ebd858eb6e5e540b5900c97e77a9f3ff92e421
-
SHA256
28a96de1e3a6ac6f0105145b7155ebc1eafb9d1885d09c84b65ffd60e9b8951f
-
SHA512
eca9ee232b660e3e8244a61e8a7b8e6e63499849cc3ab2a07941e032142ef89d46a4c7a219b32c811b36245ebb0ddda5313b475590e6f478df6ee2f7571bde6a
-
SSDEEP
49152:xcBmEwJ84vLRaBtIl9mVzZxa8jQtrpR7Js2Q7D85Qvr5S:xECvLUBsg+8UttFJ9zQVS
Malware Config
Extracted
nullmixer
http://marisana.xyz/
Extracted
smokeloader
pub6
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/364-92-0x0000000000BB0000-0x0000000000C4D000-memory.dmp family_vidar behavioral2/memory/364-93-0x0000000000AB0000-0x0000000000BB0000-memory.dmp family_vidar behavioral2/memory/364-94-0x0000000000400000-0x0000000000958000-memory.dmp family_vidar behavioral2/memory/364-112-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/364-113-0x0000000000BB0000-0x0000000000C4D000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x0006000000023227-21.dat aspack_v212_v242 behavioral2/files/0x0007000000023223-27.dat aspack_v212_v242 behavioral2/files/0x0006000000023229-29.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 7a31dc882ea1b0e7a8ffebcd21059cd5.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 2f9772a9fa1a504.exe -
Executes dropped EXE 9 IoCs
pid Process 2632 setup_install.exe 3992 62b647d434837.exe 3264 2f9772a9fa1a504.exe 3628 743bcecceb1.exe 5040 c6e27365696.exe 5080 f2b619b03.exe 3940 3aeaaa7282b14785.exe 364 9a1258ee22.exe 3196 2f9772a9fa1a504.exe -
Loads dropped DLL 6 IoCs
pid Process 2632 setup_install.exe 2632 setup_install.exe 2632 setup_install.exe 2632 setup_install.exe 2632 setup_install.exe 2632 setup_install.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 19 iplogger.org 12 iplogger.org 13 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 436 2632 WerFault.exe 88 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 743bcecceb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 743bcecceb1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 743bcecceb1.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 62 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\ExternalFeatureOverrides\officeclicktorun OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "2" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\FirstSession\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages\en-US = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\all\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun\ConfigContextData OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\officeclicktorun\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentEcs\Overrides OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\TrustCenter\Experimentation OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\officeclicktorun OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" OfficeClickToRun.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3628 743bcecceb1.exe 3628 743bcecceb1.exe 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3628 743bcecceb1.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 5040 c6e27365696.exe Token: SeDebugPrivilege 3992 62b647d434837.exe Token: SeCreateGlobalPrivilege 4284 dwm.exe Token: SeChangeNotifyPrivilege 4284 dwm.exe Token: 33 4284 dwm.exe Token: SeIncBasePriorityPrivilege 4284 dwm.exe Token: SeCreateGlobalPrivilege 1004 dwm.exe Token: SeChangeNotifyPrivilege 1004 dwm.exe Token: 33 1004 dwm.exe Token: SeIncBasePriorityPrivilege 1004 dwm.exe Token: SeShutdownPrivilege 3424 Process not Found Token: SeCreatePagefilePrivilege 3424 Process not Found Token: SeShutdownPrivilege 3424 Process not Found Token: SeCreatePagefilePrivilege 3424 Process not Found Token: SeShutdownPrivilege 3424 Process not Found Token: SeCreatePagefilePrivilege 3424 Process not Found Token: SeShutdownPrivilege 3424 Process not Found Token: SeCreatePagefilePrivilege 3424 Process not Found -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1356 OfficeClickToRun.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3424 Process not Found -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4524 wrote to memory of 2632 4524 7a31dc882ea1b0e7a8ffebcd21059cd5.exe 88 PID 4524 wrote to memory of 2632 4524 7a31dc882ea1b0e7a8ffebcd21059cd5.exe 88 PID 4524 wrote to memory of 2632 4524 7a31dc882ea1b0e7a8ffebcd21059cd5.exe 88 PID 2632 wrote to memory of 1588 2632 setup_install.exe 92 PID 2632 wrote to memory of 1588 2632 setup_install.exe 92 PID 2632 wrote to memory of 1588 2632 setup_install.exe 92 PID 2632 wrote to memory of 544 2632 setup_install.exe 98 PID 2632 wrote to memory of 544 2632 setup_install.exe 98 PID 2632 wrote to memory of 544 2632 setup_install.exe 98 PID 2632 wrote to memory of 3652 2632 setup_install.exe 97 PID 2632 wrote to memory of 3652 2632 setup_install.exe 97 PID 2632 wrote to memory of 3652 2632 setup_install.exe 97 PID 2632 wrote to memory of 2332 2632 setup_install.exe 96 PID 2632 wrote to memory of 2332 2632 setup_install.exe 96 PID 2632 wrote to memory of 2332 2632 setup_install.exe 96 PID 2632 wrote to memory of 2800 2632 setup_install.exe 95 PID 2632 wrote to memory of 2800 2632 setup_install.exe 95 PID 2632 wrote to memory of 2800 2632 setup_install.exe 95 PID 2632 wrote to memory of 3812 2632 setup_install.exe 94 PID 2632 wrote to memory of 3812 2632 setup_install.exe 94 PID 2632 wrote to memory of 3812 2632 setup_install.exe 94 PID 2632 wrote to memory of 2996 2632 setup_install.exe 93 PID 2632 wrote to memory of 2996 2632 setup_install.exe 93 PID 2632 wrote to memory of 2996 2632 setup_install.exe 93 PID 3812 wrote to memory of 3992 3812 cmd.exe 110 PID 3812 wrote to memory of 3992 3812 cmd.exe 110 PID 3652 wrote to memory of 3264 3652 cmd.exe 109 PID 3652 wrote to memory of 3264 3652 cmd.exe 109 PID 3652 wrote to memory of 3264 3652 cmd.exe 109 PID 1588 wrote to memory of 3628 1588 cmd.exe 108 PID 1588 wrote to memory of 3628 1588 cmd.exe 108 PID 1588 wrote to memory of 3628 1588 cmd.exe 108 PID 544 wrote to memory of 364 544 cmd.exe 102 PID 544 wrote to memory of 364 544 cmd.exe 102 PID 544 wrote to memory of 364 544 cmd.exe 102 PID 2996 wrote to memory of 5040 2996 cmd.exe 107 PID 2996 wrote to memory of 5040 2996 cmd.exe 107 PID 2800 wrote to memory of 3940 2800 cmd.exe 103 PID 2800 wrote to memory of 3940 2800 cmd.exe 103 PID 2800 wrote to memory of 3940 2800 cmd.exe 103 PID 2332 wrote to memory of 5080 2332 cmd.exe 99 PID 2332 wrote to memory of 5080 2332 cmd.exe 99 PID 3264 wrote to memory of 3196 3264 2f9772a9fa1a504.exe 106 PID 3264 wrote to memory of 3196 3264 2f9772a9fa1a504.exe 106 PID 3264 wrote to memory of 3196 3264 2f9772a9fa1a504.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a31dc882ea1b0e7a8ffebcd21059cd5.exe"C:\Users\Admin\AppData\Local\Temp\7a31dc882ea1b0e7a8ffebcd21059cd5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 743bcecceb1.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\743bcecceb1.exe743bcecceb1.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c6e27365696.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\c6e27365696.exec6e27365696.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 62b647d434837.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\62b647d434837.exe62b647d434837.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 3aeaaa7282b14785.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\3aeaaa7282b14785.exe3aeaaa7282b14785.exe4⤵
- Executes dropped EXE
PID:3940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c f2b619b03.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\f2b619b03.exef2b619b03.exe4⤵
- Executes dropped EXE
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2f9772a9fa1a504.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\2f9772a9fa1a504.exe2f9772a9fa1a504.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 9a1258ee22.exe3⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\9a1258ee22.exe9a1258ee22.exe4⤵
- Executes dropped EXE
PID:364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 5443⤵
- Program crash
PID:436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2632 -ip 26321⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\2f9772a9fa1a504.exe"C:\Users\Admin\AppData\Local\Temp\7zSCA16C577\2f9772a9fa1a504.exe" -a1⤵
- Executes dropped EXE
PID:3196
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3628 -ip 36281⤵PID:508
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1356
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD53263859df4866bf393d46f06f331a08f
SHA15b4665de13c9727a502f4d11afb800b075929d6c
SHA2569dcacda3913e30cafd92c909648b5bffde14b8e39e6adbfb15628006c0d4d3c2
SHA51258205110a017f5d73dd131fefb1e3bbbcc670ed0c645aeefebe5281579c7b1dceffa56671cd7b186554bdb81710e21018ed0d7088a27517dfc5e48d6d3578cf6
-
Filesize
631KB
MD5a6b572db00b94224d6637341961654cb
SHA19f0dbcce0496fede379ce4ecbfc2aa2afbb8ee8c
SHA25691ef165ad61d09dfda345f827b8ff78a18a3e40d8e12454cdb494d1555af7656
SHA51239ad03d8645a3a90b770b4fe05c43c2dadfc8b80277688ec01597bc0cda6b3fafe9e158f72ebc7db4ce98605f44fe3eacda6573f9e32e01bda0ad66efc17274c
-
Filesize
165KB
MD55f6f8e5a5e6ba53f8f785b575573451d
SHA197b99adefc3ecca6be60c882b563853091f586ef
SHA2566f8a7657b62f79b148d6b930641ef70eb0d8bc909377439819a0db601ca1c0d8
SHA512ff6491641fc985bd03421e8565b36322017da9a647015bcc399b3ca73c675749d3e22eee5e437283b22b6a05240f6bd1bf8eddc0ef3be233fd8c40fe82fead05
-
Filesize
312KB
MD5ca31229dcd5ab0f1447ce772677f5f3e
SHA1656eb7349db31d657d96978e5e3a358f8a055016
SHA256865a53db7342b0ddd8e0762acab2906e9cb2695eae0eb3035b58e8af5fdb248d
SHA512245439c54f167b757fa9737c863ef3f99e93bf6d107d63a029d866b736f73228c69d67bcb99690b9906dc06beb08f33b36aacc483c3b61cb2f6090c806e86691
-
Filesize
649KB
MD576ad7237cb514008311358f5bbc92b6b
SHA1370aee74f6713913db081f88bfef33f8ea437410
SHA256942878ae21bf55029e648ed216f40ecfd4b61e6b581cd1a2f82fdcd20feb3a10
SHA5120f89a59f59c4a8d153442a90f2e4f0eb7ac153af9f65c585259729425deb73e2859c1c9d48e5505ecb7f5686136aa0171e689227fa0b940236bc1c775621602e
-
Filesize
8KB
MD5bf78562d81291113d7664f8b10b38019
SHA17c1e6b7a9abcf1f96eb79ffdc7ea1831ad7f7889
SHA256aa18f5ee23ba9686522956203b349217aebdc2c921471db1a89d4bc16d699251
SHA512c94ac906daf9ca91983c58d353984b1b84334d7fa57581b32fd029b0db582ca00ef67f5ef0a1fc0fd624aa30d220503e5f1b70617a303712b2f5886ab5672f36
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
4.2MB
MD5a002887520541f37f1b182856dd6ab7d
SHA1e352c82608132fd5c09a3b33cb3386d06bc702a0
SHA256b5f59efe6b0a0f207940166d338da8c9cc701b90680fda614f4d83aba011c6b8
SHA5124a8d2a0010a7b8b74662227ed679aab5bca07d6fbf47895408d010d45e20fa04d1cee1d41d53179a694750a7988356fb26dd3a92279d4533756dbba80126871e
-
Filesize
3.6MB
MD594ab6caeb3850d8002f4b6247ceaf210
SHA18d0c59a45ff3fc221d33ff83e667810d713e2f21
SHA256ce799c10e408c5f5a9c90a84d804c3f4d5d64b324676a6933132827d59894163
SHA512425cb2d1985174773a8f71b7dc8481b05c15f2b424ad775ef95cf75fd922b6c43b4eb10ab5cd36b70946493daad4c0625b97e5f357ed1eb9189b01655f230e4b
-
Filesize
2.3MB
MD53cb7629310fadac11fa446285bd9cc53
SHA1a7e3d4528bbce3dde330bfdacddb02a1027f7c59
SHA256dea06db418eef8b2a2dbb01457b8ff8c2962ca4ef29e06d0d75c2fb65ed7ad69
SHA512f600e2aff4572c6a6afdee33b44a550d5f1a8160bfe15f5c0be5e627720a73dd1b7d267f53c594d941f63edb975ca48aac475830b7a3bcf32d046ec6864c31b3