Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 11:27
Static task
static1
Behavioral task
behavioral1
Sample
9b8d5ba0a10d8b3bd572418807d19864.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b8d5ba0a10d8b3bd572418807d19864.exe
Resource
win10v2004-20231215-en
General
-
Target
9b8d5ba0a10d8b3bd572418807d19864.exe
-
Size
263KB
-
MD5
9b8d5ba0a10d8b3bd572418807d19864
-
SHA1
89ee465e828dafcad9fedb62b0a342b54efbfcb9
-
SHA256
e82a99c46a51eca5bf30af769e8026e3b3077ac90f0925ebd6717eb63508b9e3
-
SHA512
b5cfbc41982a042831af8dda184cf58e58dff2f5836071ed55365ca096c7a1cc0f255d4adc3c88dc9870ccd82f8dbb91dc951b7794a56884697c84ca794b6ee3
-
SSDEEP
3072:ZYUb5QoJ4g+Ri+Zj6Iz1ZdW4SrO7FSVpucl:ZY7xh6SZI4z7FSVpucl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2792 wwusna.exe 2284 wyt.exe 1612 wich.exe 872 wjyol.exe 2076 wjuxgk.exe 1528 wufoc.exe 1092 wuj.exe 800 wass.exe 2696 wtavgx.exe 1968 wykq.exe 1256 wgpbtxt.exe 1148 wqealvxsp.exe 2860 wijecbdr.exe 856 wvlocp.exe 1404 wwc.exe 1528 wxfrks.exe 2536 wwjnkg.exe 1980 wgym.exe 1672 wkfmk.exe 756 wfd.exe 2636 wonuhsfd.exe 2408 wcs.exe 2444 wohkia.exe 2456 wxdkk.exe 1688 wxjpflpdf.exe 2976 wxavl.exe 2776 wpmnjh.exe 2740 wcaiqwhim.exe 2248 wpyne.exe 2412 wytohimor.exe 1368 wrohrmgaq.exe 2556 wjbyqs.exe 1776 wya.exe 1816 wnygipj.exe 2492 wymcpf.exe 1528 wbjvdvvtc.exe 2700 whbdlvd.exe 2548 wvsr.exe 2016 wbhuknrtk.exe 1968 wvdrhlr.exe 2024 wpajcslos.exe 1612 wxnhrqpl.exe 1624 wydnyfmd.exe 1760 waommqhp.exe 2980 wlnra.exe 3016 wybmhwjb.exe 1440 wrnffcuco.exe 2052 wnmdacv.exe 2792 warjcqx.exe 1496 wcrxiah.exe 2328 wfyytjan.exe 832 wljhfja.exe 2072 wngbsa.exe 2352 wrbfednhh.exe 1752 wvqhdk.exe 3028 wsrardtys.exe 1160 wlpbwk.exe 2236 wltwxadql.exe 532 wyafyl.exe 2668 wdkadqec.exe 1192 whsanxva.exe 2568 wodusb.exe 2336 wnkxn.exe 3064 wakeaj.exe -
Loads dropped DLL 64 IoCs
pid Process 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 2792 wwusna.exe 2792 wwusna.exe 2792 wwusna.exe 2792 wwusna.exe 2284 wyt.exe 2284 wyt.exe 2284 wyt.exe 2284 wyt.exe 1612 wich.exe 1612 wich.exe 1612 wich.exe 1612 wich.exe 872 wjyol.exe 872 wjyol.exe 872 wjyol.exe 872 wjyol.exe 2076 wjuxgk.exe 2076 wjuxgk.exe 2076 wjuxgk.exe 2076 wjuxgk.exe 1528 wufoc.exe 1528 wufoc.exe 1528 wufoc.exe 1528 wufoc.exe 1092 wuj.exe 1092 wuj.exe 1092 wuj.exe 1092 wuj.exe 800 wass.exe 800 wass.exe 800 wass.exe 800 wass.exe 2696 wtavgx.exe 2696 wtavgx.exe 2696 wtavgx.exe 2696 wtavgx.exe 1968 wykq.exe 1968 wykq.exe 1968 wykq.exe 1968 wykq.exe 1256 wgpbtxt.exe 1256 wgpbtxt.exe 1256 wgpbtxt.exe 1256 wgpbtxt.exe 1148 wqealvxsp.exe 1148 wqealvxsp.exe 1148 wqealvxsp.exe 1148 wqealvxsp.exe 2860 wijecbdr.exe 2860 wijecbdr.exe 2860 wijecbdr.exe 2860 wijecbdr.exe 856 wvlocp.exe 856 wvlocp.exe 856 wvlocp.exe 856 wvlocp.exe 1404 wwc.exe 1404 wwc.exe 1404 wwc.exe 1404 wwc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wwjnkg.exe wxfrks.exe File created C:\Windows\SysWOW64\wfd.exe wkfmk.exe File opened for modification C:\Windows\SysWOW64\wonuhsfd.exe wfd.exe File created C:\Windows\SysWOW64\wohkia.exe wcs.exe File opened for modification C:\Windows\SysWOW64\wljhfja.exe wfyytjan.exe File opened for modification C:\Windows\SysWOW64\wvqhdk.exe wrbfednhh.exe File created C:\Windows\SysWOW64\wich.exe wyt.exe File opened for modification C:\Windows\SysWOW64\wqealvxsp.exe wgpbtxt.exe File opened for modification C:\Windows\SysWOW64\wyafyl.exe wltwxadql.exe File created C:\Windows\SysWOW64\wxavl.exe wxjpflpdf.exe File created C:\Windows\SysWOW64\wnmdacv.exe wrnffcuco.exe File opened for modification C:\Windows\SysWOW64\wass.exe wuj.exe File created C:\Windows\SysWOW64\wykq.exe wtavgx.exe File created C:\Windows\SysWOW64\wyt.exe wwusna.exe File created C:\Windows\SysWOW64\wrohrmgaq.exe wytohimor.exe File opened for modification C:\Windows\SysWOW64\wgpbtxt.exe wykq.exe File opened for modification C:\Windows\SysWOW64\wohkia.exe wcs.exe File created C:\Windows\SysWOW64\wpyne.exe wcaiqwhim.exe File created C:\Windows\SysWOW64\wrbfednhh.exe wngbsa.exe File opened for modification C:\Windows\SysWOW64\wvxyrb.exe wrcug.exe File created C:\Windows\SysWOW64\wjuxgk.exe wjyol.exe File opened for modification C:\Windows\SysWOW64\wufoc.exe wjuxgk.exe File opened for modification C:\Windows\SysWOW64\wnygipj.exe wya.exe File opened for modification C:\Windows\SysWOW64\wlnra.exe waommqhp.exe File opened for modification C:\Windows\SysWOW64\wpajcslos.exe wvdrhlr.exe File opened for modification C:\Windows\SysWOW64\wxnhrqpl.exe wpajcslos.exe File created C:\Windows\SysWOW64\wpajcslos.exe wvdrhlr.exe File created C:\Windows\SysWOW64\woplpu.exe wvduspd.exe File opened for modification C:\Windows\SysWOW64\wich.exe wyt.exe File created C:\Windows\SysWOW64\wxdkk.exe wohkia.exe File opened for modification C:\Windows\SysWOW64\wvdrhlr.exe wbhuknrtk.exe File created C:\Windows\SysWOW64\wljhfja.exe wfyytjan.exe File opened for modification C:\Windows\SysWOW64\wxdkk.exe wohkia.exe File created C:\Windows\SysWOW64\wya.exe wjbyqs.exe File opened for modification C:\Windows\SysWOW64\wjuxgk.exe wjyol.exe File created C:\Windows\SysWOW64\warjcqx.exe wnmdacv.exe File opened for modification C:\Windows\SysWOW64\wvduspd.exe wvxyrb.exe File created C:\Windows\SysWOW64\wvsr.exe whbdlvd.exe File created C:\Windows\SysWOW64\wvxyrb.exe wrcug.exe File created C:\Windows\SysWOW64\wvdrhlr.exe wbhuknrtk.exe File created C:\Windows\SysWOW64\wmutuno.exe wixdqgh.exe File opened for modification C:\Windows\SysWOW64\wyt.exe wwusna.exe File created C:\Windows\SysWOW64\wuj.exe wufoc.exe File opened for modification C:\Windows\SysWOW64\wcaiqwhim.exe wpmnjh.exe File opened for modification C:\Windows\SysWOW64\wrohrmgaq.exe wytohimor.exe File opened for modification C:\Windows\SysWOW64\wvlocp.exe wijecbdr.exe File created C:\Windows\SysWOW64\wkfmk.exe wgym.exe File opened for modification C:\Windows\SysWOW64\wxavl.exe wxjpflpdf.exe File opened for modification C:\Windows\SysWOW64\wymcpf.exe wnygipj.exe File created C:\Windows\SysWOW64\wlnra.exe waommqhp.exe File opened for modification C:\Windows\SysWOW64\wrcug.exe wmutuno.exe File created C:\Windows\SysWOW64\wass.exe wuj.exe File created C:\Windows\SysWOW64\wvlocp.exe wijecbdr.exe File opened for modification C:\Windows\SysWOW64\wrnffcuco.exe wybmhwjb.exe File opened for modification C:\Windows\SysWOW64\wjyol.exe wich.exe File created C:\Windows\SysWOW64\wxjpflpdf.exe wxdkk.exe File opened for modification C:\Windows\SysWOW64\warjcqx.exe wnmdacv.exe File created C:\Windows\SysWOW64\wdkadqec.exe wyafyl.exe File created C:\Windows\SysWOW64\wnygipj.exe wya.exe File created C:\Windows\SysWOW64\wngbsa.exe wljhfja.exe File created C:\Windows\SysWOW64\wwc.exe wvlocp.exe File created C:\Windows\SysWOW64\wjbyqs.exe wrohrmgaq.exe File opened for modification C:\Windows\SysWOW64\wxjpflpdf.exe wxdkk.exe File opened for modification C:\Windows\SysWOW64\wpmnjh.exe wxavl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2792 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 28 PID 2060 wrote to memory of 2792 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 28 PID 2060 wrote to memory of 2792 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 28 PID 2060 wrote to memory of 2792 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 28 PID 2060 wrote to memory of 2804 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 29 PID 2060 wrote to memory of 2804 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 29 PID 2060 wrote to memory of 2804 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 29 PID 2060 wrote to memory of 2804 2060 9b8d5ba0a10d8b3bd572418807d19864.exe 29 PID 2792 wrote to memory of 2284 2792 wwusna.exe 32 PID 2792 wrote to memory of 2284 2792 wwusna.exe 32 PID 2792 wrote to memory of 2284 2792 wwusna.exe 32 PID 2792 wrote to memory of 2284 2792 wwusna.exe 32 PID 2792 wrote to memory of 2668 2792 wwusna.exe 34 PID 2792 wrote to memory of 2668 2792 wwusna.exe 34 PID 2792 wrote to memory of 2668 2792 wwusna.exe 34 PID 2792 wrote to memory of 2668 2792 wwusna.exe 34 PID 2284 wrote to memory of 1612 2284 wyt.exe 35 PID 2284 wrote to memory of 1612 2284 wyt.exe 35 PID 2284 wrote to memory of 1612 2284 wyt.exe 35 PID 2284 wrote to memory of 1612 2284 wyt.exe 35 PID 2284 wrote to memory of 2152 2284 wyt.exe 36 PID 2284 wrote to memory of 2152 2284 wyt.exe 36 PID 2284 wrote to memory of 2152 2284 wyt.exe 36 PID 2284 wrote to memory of 2152 2284 wyt.exe 36 PID 1612 wrote to memory of 872 1612 wich.exe 38 PID 1612 wrote to memory of 872 1612 wich.exe 38 PID 1612 wrote to memory of 872 1612 wich.exe 38 PID 1612 wrote to memory of 872 1612 wich.exe 38 PID 1612 wrote to memory of 2860 1612 wich.exe 40 PID 1612 wrote to memory of 2860 1612 wich.exe 40 PID 1612 wrote to memory of 2860 1612 wich.exe 40 PID 1612 wrote to memory of 2860 1612 wich.exe 40 PID 872 wrote to memory of 2076 872 wjyol.exe 41 PID 872 wrote to memory of 2076 872 wjyol.exe 41 PID 872 wrote to memory of 2076 872 wjyol.exe 41 PID 872 wrote to memory of 2076 872 wjyol.exe 41 PID 872 wrote to memory of 2276 872 wjyol.exe 43 PID 872 wrote to memory of 2276 872 wjyol.exe 43 PID 872 wrote to memory of 2276 872 wjyol.exe 43 PID 872 wrote to memory of 2276 872 wjyol.exe 43 PID 2076 wrote to memory of 1528 2076 wjuxgk.exe 44 PID 2076 wrote to memory of 1528 2076 wjuxgk.exe 44 PID 2076 wrote to memory of 1528 2076 wjuxgk.exe 44 PID 2076 wrote to memory of 1528 2076 wjuxgk.exe 44 PID 2076 wrote to memory of 2464 2076 wjuxgk.exe 45 PID 2076 wrote to memory of 2464 2076 wjuxgk.exe 45 PID 2076 wrote to memory of 2464 2076 wjuxgk.exe 45 PID 2076 wrote to memory of 2464 2076 wjuxgk.exe 45 PID 1528 wrote to memory of 1092 1528 wufoc.exe 47 PID 1528 wrote to memory of 1092 1528 wufoc.exe 47 PID 1528 wrote to memory of 1092 1528 wufoc.exe 47 PID 1528 wrote to memory of 1092 1528 wufoc.exe 47 PID 1528 wrote to memory of 684 1528 wufoc.exe 49 PID 1528 wrote to memory of 684 1528 wufoc.exe 49 PID 1528 wrote to memory of 684 1528 wufoc.exe 49 PID 1528 wrote to memory of 684 1528 wufoc.exe 49 PID 1092 wrote to memory of 800 1092 wuj.exe 50 PID 1092 wrote to memory of 800 1092 wuj.exe 50 PID 1092 wrote to memory of 800 1092 wuj.exe 50 PID 1092 wrote to memory of 800 1092 wuj.exe 50 PID 1092 wrote to memory of 1732 1092 wuj.exe 51 PID 1092 wrote to memory of 1732 1092 wuj.exe 51 PID 1092 wrote to memory of 1732 1092 wuj.exe 51 PID 1092 wrote to memory of 1732 1092 wuj.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b8d5ba0a10d8b3bd572418807d19864.exe"C:\Users\Admin\AppData\Local\Temp\9b8d5ba0a10d8b3bd572418807d19864.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\wwusna.exe"C:\Windows\system32\wwusna.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\wyt.exe"C:\Windows\system32\wyt.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\wich.exe"C:\Windows\system32\wich.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\wjyol.exe"C:\Windows\system32\wjyol.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\wjuxgk.exe"C:\Windows\system32\wjuxgk.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\wufoc.exe"C:\Windows\system32\wufoc.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\wuj.exe"C:\Windows\system32\wuj.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\wass.exe"C:\Windows\system32\wass.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:800 -
C:\Windows\SysWOW64\wtavgx.exe"C:\Windows\system32\wtavgx.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2696 -
C:\Windows\SysWOW64\wykq.exe"C:\Windows\system32\wykq.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\wgpbtxt.exe"C:\Windows\system32\wgpbtxt.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1256 -
C:\Windows\SysWOW64\wqealvxsp.exe"C:\Windows\system32\wqealvxsp.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1148 -
C:\Windows\SysWOW64\wijecbdr.exe"C:\Windows\system32\wijecbdr.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2860 -
C:\Windows\SysWOW64\wvlocp.exe"C:\Windows\system32\wvlocp.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:856 -
C:\Windows\SysWOW64\wwc.exe"C:\Windows\system32\wwc.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1404 -
C:\Windows\SysWOW64\wxfrks.exe"C:\Windows\system32\wxfrks.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1528 -
C:\Windows\SysWOW64\wwjnkg.exe"C:\Windows\system32\wwjnkg.exe"18⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\wgym.exe"C:\Windows\system32\wgym.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1980 -
C:\Windows\SysWOW64\wkfmk.exe"C:\Windows\system32\wkfmk.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1672 -
C:\Windows\SysWOW64\wfd.exe"C:\Windows\system32\wfd.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:756 -
C:\Windows\SysWOW64\wonuhsfd.exe"C:\Windows\system32\wonuhsfd.exe"22⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\wcs.exe"C:\Windows\system32\wcs.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2408 -
C:\Windows\SysWOW64\wohkia.exe"C:\Windows\system32\wohkia.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\wxdkk.exe"C:\Windows\system32\wxdkk.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2456 -
C:\Windows\SysWOW64\wxjpflpdf.exe"C:\Windows\system32\wxjpflpdf.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\wxavl.exe"C:\Windows\system32\wxavl.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2976 -
C:\Windows\SysWOW64\wpmnjh.exe"C:\Windows\system32\wpmnjh.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2776 -
C:\Windows\SysWOW64\wcaiqwhim.exe"C:\Windows\system32\wcaiqwhim.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2740 -
C:\Windows\SysWOW64\wpyne.exe"C:\Windows\system32\wpyne.exe"30⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\wytohimor.exe"C:\Windows\system32\wytohimor.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2412 -
C:\Windows\SysWOW64\wrohrmgaq.exe"C:\Windows\system32\wrohrmgaq.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1368 -
C:\Windows\SysWOW64\wjbyqs.exe"C:\Windows\system32\wjbyqs.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2556 -
C:\Windows\SysWOW64\wya.exe"C:\Windows\system32\wya.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1776 -
C:\Windows\SysWOW64\wnygipj.exe"C:\Windows\system32\wnygipj.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1816 -
C:\Windows\SysWOW64\wymcpf.exe"C:\Windows\system32\wymcpf.exe"36⤵
- Executes dropped EXE
PID:2492 -
C:\Windows\SysWOW64\wbjvdvvtc.exe"C:\Windows\system32\wbjvdvvtc.exe"37⤵
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\whbdlvd.exe"C:\Windows\system32\whbdlvd.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2700 -
C:\Windows\SysWOW64\wvsr.exe"C:\Windows\system32\wvsr.exe"39⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\wbhuknrtk.exe"C:\Windows\system32\wbhuknrtk.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2016 -
C:\Windows\SysWOW64\wvdrhlr.exe"C:\Windows\system32\wvdrhlr.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\wpajcslos.exe"C:\Windows\system32\wpajcslos.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2024 -
C:\Windows\SysWOW64\wxnhrqpl.exe"C:\Windows\system32\wxnhrqpl.exe"43⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\wydnyfmd.exe"C:\Windows\system32\wydnyfmd.exe"44⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\waommqhp.exe"C:\Windows\system32\waommqhp.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1760 -
C:\Windows\SysWOW64\wlnra.exe"C:\Windows\system32\wlnra.exe"46⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\wybmhwjb.exe"C:\Windows\system32\wybmhwjb.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3016 -
C:\Windows\SysWOW64\wrnffcuco.exe"C:\Windows\system32\wrnffcuco.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1440 -
C:\Windows\SysWOW64\wnmdacv.exe"C:\Windows\system32\wnmdacv.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2052 -
C:\Windows\SysWOW64\warjcqx.exe"C:\Windows\system32\warjcqx.exe"50⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\wcrxiah.exe"C:\Windows\system32\wcrxiah.exe"51⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\SysWOW64\wfyytjan.exe"C:\Windows\system32\wfyytjan.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2328 -
C:\Windows\SysWOW64\wljhfja.exe"C:\Windows\system32\wljhfja.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:832 -
C:\Windows\SysWOW64\wngbsa.exe"C:\Windows\system32\wngbsa.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2072 -
C:\Windows\SysWOW64\wrbfednhh.exe"C:\Windows\system32\wrbfednhh.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2352 -
C:\Windows\SysWOW64\wvqhdk.exe"C:\Windows\system32\wvqhdk.exe"56⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\wsrardtys.exe"C:\Windows\system32\wsrardtys.exe"57⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\wlpbwk.exe"C:\Windows\system32\wlpbwk.exe"58⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\wltwxadql.exe"C:\Windows\system32\wltwxadql.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2236 -
C:\Windows\SysWOW64\wyafyl.exe"C:\Windows\system32\wyafyl.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:532 -
C:\Windows\SysWOW64\wdkadqec.exe"C:\Windows\system32\wdkadqec.exe"61⤵
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\whsanxva.exe"C:\Windows\system32\whsanxva.exe"62⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\SysWOW64\wodusb.exe"C:\Windows\system32\wodusb.exe"63⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\wnkxn.exe"C:\Windows\system32\wnkxn.exe"64⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\wakeaj.exe"C:\Windows\system32\wakeaj.exe"65⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\wixdqgh.exe"C:\Windows\system32\wixdqgh.exe"66⤵
- Drops file in System32 directory
PID:1008 -
C:\Windows\SysWOW64\wmutuno.exe"C:\Windows\system32\wmutuno.exe"67⤵
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\wrcug.exe"C:\Windows\system32\wrcug.exe"68⤵
- Drops file in System32 directory
PID:2692 -
C:\Windows\SysWOW64\wvxyrb.exe"C:\Windows\system32\wvxyrb.exe"69⤵
- Drops file in System32 directory
PID:956 -
C:\Windows\SysWOW64\wvduspd.exe"C:\Windows\system32\wvduspd.exe"70⤵
- Drops file in System32 directory
PID:2952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wvxyrb.exe"70⤵PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrcug.exe"69⤵PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wmutuno.exe"68⤵PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wixdqgh.exe"67⤵PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wakeaj.exe"66⤵PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wnkxn.exe"65⤵PID:856
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wodusb.exe"64⤵PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\whsanxva.exe"63⤵PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wdkadqec.exe"62⤵PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wyafyl.exe"61⤵PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wltwxadql.exe"60⤵PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wlpbwk.exe"59⤵PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wsrardtys.exe"58⤵PID:1528
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wvqhdk.exe"57⤵PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrbfednhh.exe"56⤵PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wngbsa.exe"55⤵PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wljhfja.exe"54⤵PID:1316
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wfyytjan.exe"53⤵PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wcrxiah.exe"52⤵PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\warjcqx.exe"51⤵PID:672
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wnmdacv.exe"50⤵PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrnffcuco.exe"49⤵PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wybmhwjb.exe"48⤵PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wlnra.exe"47⤵PID:1436
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\waommqhp.exe"46⤵PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wydnyfmd.exe"45⤵PID:3040
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wxnhrqpl.exe"44⤵PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wpajcslos.exe"43⤵PID:2480
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wvdrhlr.exe"42⤵PID:240
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wbhuknrtk.exe"41⤵PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wvsr.exe"40⤵PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\whbdlvd.exe"39⤵PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wbjvdvvtc.exe"38⤵PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wymcpf.exe"37⤵PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wnygipj.exe"36⤵PID:2400
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wya.exe"35⤵PID:1212
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wjbyqs.exe"34⤵PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrohrmgaq.exe"33⤵PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wytohimor.exe"32⤵PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wpyne.exe"31⤵PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wcaiqwhim.exe"30⤵PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wpmnjh.exe"29⤵PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wxavl.exe"28⤵PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wxjpflpdf.exe"27⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wxdkk.exe"26⤵PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wohkia.exe"25⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wcs.exe"24⤵PID:2420
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wonuhsfd.exe"23⤵PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wfd.exe"22⤵PID:744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wkfmk.exe"21⤵PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wgym.exe"20⤵PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wwjnkg.exe"19⤵PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wxfrks.exe"18⤵PID:1252
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wwc.exe"17⤵PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wvlocp.exe"16⤵PID:1168
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wijecbdr.exe"15⤵PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wqealvxsp.exe"14⤵PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wgpbtxt.exe"13⤵PID:1888
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wykq.exe"12⤵PID:1704
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wtavgx.exe"11⤵PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wass.exe"10⤵PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wuj.exe"9⤵PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wufoc.exe"8⤵PID:684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wjuxgk.exe"7⤵PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wjyol.exe"6⤵PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wich.exe"5⤵PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wyt.exe"4⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wwusna.exe"3⤵PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\9b8d5ba0a10d8b3bd572418807d19864.exe"2⤵
- Deletes itself
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99B
MD5121d58bda928ee46a656800e378df39e
SHA1e067cf4a454c7a5b0bc32c60e16a1c7c1d5b847b
SHA25608f2eb1d0505163665de298f129be1108172f84454801951b2242acf42d74cf1
SHA5128074afe214b421d639d37855428fc7437361e6fa67f78621075eab0343505d89be7118bfc3d7937fd2c5da07c0f5799e868e9f8d5cdac4ea991a68219e4a5307
-
Filesize
263KB
MD501f812fd2eae2780e87b35193acc20d8
SHA1d4d70c0b897995a1ab861c58b8dd730fe7e4ee2a
SHA25631997e7ed1285142f27a54157143931f8993cb67b984aa1a503933ffdca7e6b2
SHA5125e05cc4a6727ef22708c45957edeba5627734d23b60b869aa2031350a70229652ce921dc5a71f0ca8f19a9caa077ad1d75c28061127cb5a629f5656b3e8aac15
-
Filesize
263KB
MD50ee7e1200049fe771a3c19f219949fec
SHA1d9d0f0fb3aa466bbeebc39f552ba2c37095c2b52
SHA25630520e68b7cb8b23453d806aa8e508f14ecfb2db771f91fa9b6a9cb17905fb3f
SHA512e19a56d745d09d14e6d90090178bd872be1b22a83680d5a35dc8202cb5e1e1c0a30f855874f7c4575a631987cea67835483dda1b5cb9706cad6e5fb9f4825ee7
-
Filesize
263KB
MD5d94b71ca4581a7b61404a213f6a81f72
SHA1b1f7e4c2868cd91f0cc59ac2f851772407fcf56d
SHA2568f3917ec6ca9517321f399f564a81ba9154c44a535e342101de2d8bb3edf7c0d
SHA5129f175762a8cb3961d60af0839aa9c3a926b6c3f3adf9f54d1a515a6929a8d407779ba42e59947ec60c8963a9a7b34d19cfab6f71948af5d04bb9bfa7ec91f538
-
Filesize
263KB
MD555aaec5d5df71783f69487444b4d506b
SHA1af82c911c67c235a4cabd11bc700640131ea9554
SHA256bcbc9f80c19e511e28b327b2145b622108d267320bc1a7ae20419bc1c4a05b5f
SHA51287809990840a9e1004af52fc9b78266b29d9740cf3bdb24770d7ff2e208a1939df65fdd85aecbdae40a43a5e50a6e0704a16b0311bf790380e85b22cfd457c80
-
Filesize
263KB
MD537948f0d7a48ab70e0314a0cd9b06579
SHA1e2bfc5cd34327566e1030511e49e81abb3895845
SHA2560c3772d6ebcdb7380329e1583e9bdb9de0172e65f68a29456ab963bf616a7380
SHA512277c5ea0ebfab446fdfe23be745fa6c173913772b78c3e463c2f73fa82b67a6ba1da5d1091464b32c2687aec5c33b98060e9ad1de5d7db469245ad270f43f705
-
Filesize
256KB
MD5b3955bb04116c283b206d27b6921bfa1
SHA13d49eb0c57ed410832285361c964a0e98c7ec4a8
SHA25631d5feb3d34ad038e680880c558bf01e3c6f9678de01879d40a4af5eb318236c
SHA512ec435945f2a276c083c5bd42d187cde6526f9b5a617b75c3758a5489f0fa8bc2103c699a9f4c47dc3a673851080836903480aed339df4f826d78f14e19fa51b9
-
Filesize
128KB
MD50310f87a5149944f301da86525f523f2
SHA18cb1cd3d35760a937996c162db1f9a3f67cc90ca
SHA256091ae5384ee28c66497e1dd7946cd88012ee69de26a20c53bf948ca30c998fcc
SHA51222df4e084d8e653ef02c7108c73481d6008a59ac8fe6b5e533fde855f0ada1fa5a86d0fc5aa1bd7ad9bdb15b640fb8e012e17d4516f5455216ed0e55bdd1b401
-
Filesize
263KB
MD5363f85a67f459b29d580221dbeec955a
SHA1dc2b334e2c1d718f3e59d5688eb4a20b38f89ba0
SHA256d8c069f8c3e17883ffdc644836c6d9d4fda20cdb49505dc9ab0572f03fca6d4a
SHA5126981e1e048d0adbcdea3f9e6156399bb7d38c93a8b677b9c936ce477e4b27d1e150ef04dfae1310363bb227292525c1ddf6e96ef00bba879ae4c22791fd0a61d
-
Filesize
263KB
MD5e15bc7dfbbe7c1ba663c7d9d4a225ca6
SHA15131bbfc95c854f3d9bd2032ca0779f5a407d06e
SHA2568a172c1d34e1d6b3dc74a782d11d9c862f1855969d9a2ba22e7e34cedd2604a4
SHA512248c2cf71faf6c1dd6fee9084ee572dbdb4663348addabb3aac23d723ff4b9b0afccc4387537e6d0e23d02b772a73d2b778f7f1418014755c7dacf2302f6ecd5
-
Filesize
263KB
MD5cccdc17c052632bdc2c67d0188306f8a
SHA171c8f0dcea921df3852969ebedf3860d7760ee4d
SHA256281967122776d52019d24b341b3af076ddbf01f74b4aaad58e3b5bd93afd3598
SHA512e6b57b3ae7dfd3848b5f880401d687c5701017581a4184e3a54b45f4676a8ce3faac5409536c69cb7af2209234166cc225a2dc3d0d5ea745aa16d524138b8c24
-
Filesize
263KB
MD52569fab71dff63af17d8c37816937c6c
SHA1dcd7bd57b4edb42317cd08296564bb092427deaa
SHA256a7c91d7842147a089c0efc9b29b566a7516f2c4be7495653d62c480f1633fabe
SHA512c0b506c8d1d9c25f4324e2ee210e7ea2510522a4ba8ba29a261d2308d1bbfdad11c628ec6a3fb54aa779e7c62928696efad2e0dbfa3e96fd71b5fc8b3302832e
-
Filesize
263KB
MD5ab8ce08a132a85c22dd209c5f307c448
SHA110377252108db700f0f5d96f37580935bad2f177
SHA256a553ad6ae8a5858c0582c5c578a3075bcb2dd4ad4c71c549d97c7d9b0a3b1d2c
SHA5126980488e023d5152d2d99d0fd46c35c701212a10b05f315591f0050683f25dad0cef4c40fdc41a6f8a734e6947e488dae805de1ac46fcecf0631b634196e722c
-
Filesize
263KB
MD54fae1b77c5c9c8c6a765d4fa819a2ac9
SHA16d3ed65de94f84f164614aa9484bc96a55a7bccd
SHA256fecb8fcfc8aa309022c24b69a53d71624fde09f4cc1eb5fc29cf51fb427fd24c
SHA5120a66c07063909ea1e671e6341b67bd08d931b5f152d28f912271edf255f3cb838dd660e99156db143734b3ec069b8b5d760a31aec7aa439368c22f8b4e812a52