Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
b54032fc01363b6a3dc2378196c4bc4c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b54032fc01363b6a3dc2378196c4bc4c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20240226-en
General
-
Target
setup_installer.exe
-
Size
4.8MB
-
MD5
8e88e9762c2c7020225ef6c369f2ef0e
-
SHA1
15eb5c3f205e19471d3e60322efbddc2e8b2792e
-
SHA256
e847b7593382c56f6443caea1929e4657e8706a0e55deda227ab98231bde7667
-
SHA512
3bdeebd9e7f0e1895eebd6d749e9195903fa5e9dfab620e2e50fa719878680106c1f03925cf3fdb4bebbe98b72b6350ccedba6405c03f367591a8741bf8e53da
-
SSDEEP
98304:xRCvLUBsggNYhWYlw2Cs5llZA9PYJKmt6jFeQXhkYN3g0bM/1Tfe:x6LUCggNSlPllZAZI9t6sQ2fe
Malware Config
Extracted
privateloader
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
Extracted
redline
pub1
viacetequn.site:80
Extracted
smokeloader
pub6
Extracted
nullmixer
http://sornx.xyz/
Extracted
vidar
40.1
706
https://eduarroma.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral4/memory/1136-91-0x0000000004BA0000-0x0000000004BC2000-memory.dmp family_redline behavioral4/memory/1136-105-0x0000000004C40000-0x0000000004C60000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral4/memory/1136-91-0x0000000004BA0000-0x0000000004BC2000-memory.dmp family_sectoprat behavioral4/memory/1136-101-0x0000000002F90000-0x0000000003090000-memory.dmp family_sectoprat behavioral4/memory/1136-105-0x0000000004C40000-0x0000000004C60000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral4/memory/3676-133-0x0000000003F30000-0x0000000003FCD000-memory.dmp family_vidar behavioral4/memory/3676-145-0x0000000000400000-0x0000000002402000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x000700000002323d-41.dat aspack_v212_v242 behavioral4/files/0x0007000000023240-49.dat aspack_v212_v242 behavioral4/files/0x000700000002323e-43.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation Mon17a1622b32c19d79.exe -
Executes dropped EXE 13 IoCs
pid Process 3560 setup_install.exe 4068 Mon17a1622b32c19d79.exe 1136 Mon17fc3714aa3427.exe 3676 Mon1775222792.exe 4484 Mon179660fc887.exe 928 Mon17adba8184e.exe 4376 Mon1729d1f65d.exe 2968 Mon178e2a4bb3.exe 3520 Mon1739ea489bd.exe 3956 Mon176198e28ea2.exe 2076 Mon17a1622b32c19d79.exe 432 Prendero.exe.com 4472 Prendero.exe.com -
Loads dropped DLL 6 IoCs
pid Process 3560 setup_install.exe 3560 setup_install.exe 3560 setup_install.exe 3560 setup_install.exe 3560 setup_install.exe 3560 setup_install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Mon179660fc887.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 632 3560 WerFault.exe 93 1640 3676 WerFault.exe 110 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon1729d1f65d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon1729d1f65d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon1729d1f65d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2160 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1020 powershell.exe 1020 powershell.exe 4376 Mon1729d1f65d.exe 4376 Mon1729d1f65d.exe 1020 powershell.exe 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4376 Mon1729d1f65d.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 928 Mon17adba8184e.exe Token: SeDebugPrivilege 1020 powershell.exe Token: SeDebugPrivilege 3520 Mon1739ea489bd.exe Token: SeDebugPrivilege 1136 Mon17fc3714aa3427.exe Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeCreateGlobalPrivilege 1256 dwm.exe Token: SeChangeNotifyPrivilege 1256 dwm.exe Token: 33 1256 dwm.exe Token: SeIncBasePriorityPrivilege 1256 dwm.exe Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeCreateGlobalPrivilege 4276 dwm.exe Token: SeChangeNotifyPrivilege 4276 dwm.exe Token: 33 4276 dwm.exe Token: SeIncBasePriorityPrivilege 4276 dwm.exe Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found Token: SeShutdownPrivilege 3276 Process not Found Token: SeCreatePagefilePrivilege 3276 Process not Found -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 432 Prendero.exe.com 432 Prendero.exe.com 432 Prendero.exe.com 4472 Prendero.exe.com 4472 Prendero.exe.com 4472 Prendero.exe.com 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 432 Prendero.exe.com 432 Prendero.exe.com 432 Prendero.exe.com 4472 Prendero.exe.com 4472 Prendero.exe.com 4472 Prendero.exe.com 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found 3276 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3276 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3320 wrote to memory of 3560 3320 setup_installer.exe 93 PID 3320 wrote to memory of 3560 3320 setup_installer.exe 93 PID 3320 wrote to memory of 3560 3320 setup_installer.exe 93 PID 3560 wrote to memory of 2924 3560 setup_install.exe 96 PID 3560 wrote to memory of 2924 3560 setup_install.exe 96 PID 3560 wrote to memory of 2924 3560 setup_install.exe 96 PID 3560 wrote to memory of 808 3560 setup_install.exe 97 PID 3560 wrote to memory of 808 3560 setup_install.exe 97 PID 3560 wrote to memory of 808 3560 setup_install.exe 97 PID 3560 wrote to memory of 4840 3560 setup_install.exe 98 PID 3560 wrote to memory of 4840 3560 setup_install.exe 98 PID 3560 wrote to memory of 4840 3560 setup_install.exe 98 PID 3560 wrote to memory of 4852 3560 setup_install.exe 99 PID 3560 wrote to memory of 4852 3560 setup_install.exe 99 PID 3560 wrote to memory of 4852 3560 setup_install.exe 99 PID 3560 wrote to memory of 3620 3560 setup_install.exe 100 PID 3560 wrote to memory of 3620 3560 setup_install.exe 100 PID 3560 wrote to memory of 3620 3560 setup_install.exe 100 PID 3560 wrote to memory of 996 3560 setup_install.exe 101 PID 3560 wrote to memory of 996 3560 setup_install.exe 101 PID 3560 wrote to memory of 996 3560 setup_install.exe 101 PID 3560 wrote to memory of 4080 3560 setup_install.exe 102 PID 3560 wrote to memory of 4080 3560 setup_install.exe 102 PID 3560 wrote to memory of 4080 3560 setup_install.exe 102 PID 3560 wrote to memory of 4408 3560 setup_install.exe 103 PID 3560 wrote to memory of 4408 3560 setup_install.exe 103 PID 3560 wrote to memory of 4408 3560 setup_install.exe 103 PID 3560 wrote to memory of 3392 3560 setup_install.exe 104 PID 3560 wrote to memory of 3392 3560 setup_install.exe 104 PID 3560 wrote to memory of 3392 3560 setup_install.exe 104 PID 3560 wrote to memory of 3672 3560 setup_install.exe 105 PID 3560 wrote to memory of 3672 3560 setup_install.exe 105 PID 3560 wrote to memory of 3672 3560 setup_install.exe 105 PID 808 wrote to memory of 4068 808 cmd.exe 107 PID 808 wrote to memory of 4068 808 cmd.exe 107 PID 808 wrote to memory of 4068 808 cmd.exe 107 PID 996 wrote to memory of 1136 996 cmd.exe 109 PID 996 wrote to memory of 1136 996 cmd.exe 109 PID 996 wrote to memory of 1136 996 cmd.exe 109 PID 3620 wrote to memory of 3676 3620 cmd.exe 110 PID 3620 wrote to memory of 3676 3620 cmd.exe 110 PID 3620 wrote to memory of 3676 3620 cmd.exe 110 PID 4840 wrote to memory of 4376 4840 cmd.exe 111 PID 4840 wrote to memory of 4376 4840 cmd.exe 111 PID 4840 wrote to memory of 4376 4840 cmd.exe 111 PID 3392 wrote to memory of 4484 3392 cmd.exe 108 PID 3392 wrote to memory of 4484 3392 cmd.exe 108 PID 3392 wrote to memory of 4484 3392 cmd.exe 108 PID 3672 wrote to memory of 928 3672 cmd.exe 112 PID 3672 wrote to memory of 928 3672 cmd.exe 112 PID 4852 wrote to memory of 2968 4852 cmd.exe 113 PID 4852 wrote to memory of 2968 4852 cmd.exe 113 PID 2924 wrote to memory of 1020 2924 cmd.exe 106 PID 2924 wrote to memory of 1020 2924 cmd.exe 106 PID 2924 wrote to memory of 1020 2924 cmd.exe 106 PID 4408 wrote to memory of 3520 4408 cmd.exe 115 PID 4408 wrote to memory of 3520 4408 cmd.exe 115 PID 4080 wrote to memory of 3956 4080 cmd.exe 114 PID 4080 wrote to memory of 3956 4080 cmd.exe 114 PID 4080 wrote to memory of 3956 4080 cmd.exe 114 PID 4484 wrote to memory of 4328 4484 Mon179660fc887.exe 119 PID 4484 wrote to memory of 4328 4484 Mon179660fc887.exe 119 PID 4484 wrote to memory of 4328 4484 Mon179660fc887.exe 119 PID 4484 wrote to memory of 4672 4484 Mon179660fc887.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17a1622b32c19d79.exe3⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17a1622b32c19d79.exeMon17a1622b32c19d79.exe4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17a1622b32c19d79.exe"C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17a1622b32c19d79.exe" -a5⤵
- Executes dropped EXE
PID:2076
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1729d1f65d.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1729d1f65d.exeMon1729d1f65d.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178e2a4bb3.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon178e2a4bb3.exeMon178e2a4bb3.exe4⤵
- Executes dropped EXE
PID:2968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1775222792.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1775222792.exeMon1775222792.exe4⤵
- Executes dropped EXE
PID:3676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 15925⤵
- Program crash
PID:1640
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17fc3714aa3427.exe3⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17fc3714aa3427.exeMon17fc3714aa3427.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon176198e28ea2.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon176198e28ea2.exeMon176198e28ea2.exe4⤵
- Executes dropped EXE
PID:3956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1739ea489bd.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon1739ea489bd.exeMon1739ea489bd.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon179660fc887.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon179660fc887.exeMon179660fc887.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe5⤵PID:4328
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Mummia.wmz5⤵PID:4672
-
C:\Windows\SysWOW64\cmd.execmd6⤵PID:3652
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^utIhAQXzKFfZwKOfdWFWGYOHgvUbutPplngusOenUcoCKjfoSNGytadifqZtVmhGQyOCcHYBTuwlPjXeuMFabKtSouQdPYDxoCLEbNMlPtkXdusrrWXoUUouqWxgRHLUDGwhAaEzZcDzniBeO$" Pensavo.wmz7⤵PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.comPrendero.exe.com z7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Prendero.exe.com z8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4472
-
-
-
C:\Windows\SysWOW64\PING.EXEping UMLCWGSL -n 307⤵
- Runs ping.exe
PID:2160
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17adba8184e.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\7zS8FC7B0B7\Mon17adba8184e.exeMon17adba8184e.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 5003⤵
- Program crash
PID:632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3560 -ip 35601⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 3676 -ip 36761⤵PID:3548
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD53ef04768f662e3c02e9e8c8192d5afa1
SHA158371bb09f637e7d42c94f6365a434ca88b3874d
SHA256b3fb54d410655eba5e22d8aec4876060a668377e0cdb10e66265ee09ff72e132
SHA51207c0208061b2d03cecae2e0414bda700da07139bad62a078f9c873f0396c0ee005cf6f5eab4f299ecd48d2c90380f73a6565e419f42d95f4d968508858253ea7
-
Filesize
192KB
MD57e4509799411374cb2afd0869338f9f2
SHA18278d5d33ff3ee2511648d7ea31e369923b2dc22
SHA256c4c5d89f11f7cf93cd6e146a0572b556d3df1aadd36bed167fd02cbe4c91d07d
SHA5127c3804ef1818988a9be13045bd07557c1e6c7367d1d3b78f65548032da3a9673c0ac23e637804436867bf88be06368416e3490a54ce7e90d686e915aec149d22
-
Filesize
192KB
MD5ea5d2a70de26a3f2ce92d1b02b2f3052
SHA166045b40d6aebc6a2930c76c6d492fb5fc81426f
SHA2567abf7953b1532eec5dd50fb9098269a8cd7b65e9afc9d84031039ff9da63f909
SHA5121437877ea36bf59eb74eef0415f820507fa55bb07b17b59679454e02a99bf48884bfdd0706175a168a005ce9a672b0fbdc904da7a35242402567f06bf22d322b
-
Filesize
128KB
MD5c1c707b4f03cf6ef7dbdb22167898de1
SHA1dfade9a7a74fbe493c9766c5c38caaa1181ee321
SHA2569c8aa9285ce4feb54f7e5d3a6e4af48720003c2fe7099162aa743be878428726
SHA512aadcc707773e0aba187bc836609eb296881fe05fe867a05bcad070dfcfbfd4aaca264904d2b4d23d2f2672c876d58480c73c63b8b5319d67fa4520491e66dd2d
-
Filesize
1.5MB
MD5df80b76857b74ae1b2ada8efb2a730ee
SHA15653be57533c6eb058fed4963a25a676488ef832
SHA2565545c43eb14b0519ab997673efa379343f98d2b6b1578d9fdeb369234789f9dd
SHA512060b04536003ce4a91e5847d487701eed7e093408e427198be552f0af37aee498929586f3a0110c78173873a28d95c6c0a4cdd01c7218274f5849a4730f9efdd
-
Filesize
320KB
MD5b9e27f0c69611244890fd162db17d01b
SHA1c858fb11b0dfe531c048ea5b9e9484192e775f6f
SHA2560b245c7939f75076d2f2b1d28e8fb958bb060b9a9f8b04d8914836404c207172
SHA512224b5335e0219e40283677a0c35bcb8331870c8bcbdc18fb77eb181acb438a54009c1d4eb5470dc72a9de647badfc1221812d75f5e84c47c7a69e83dcaf9f8aa
-
Filesize
608KB
MD542b6c78fd88e0ce139615ca4a975bfc7
SHA15ec215ade32285be9a6b3e73031a9e351a5e4fdb
SHA25673da47aba40b72752b6562114348f823e70e33ef2a2eb5cb16c914e6feffe0d0
SHA512a7368df6e22f42c1ab60599ab4ecf2eba1fac8def2a8c411491173c881bbfafd014eb11a97067da6fbd3ded2c0daa3ae0574d259d8e13f210ecf40f16e06e6f3
-
Filesize
900KB
MD50a0d22f1c9179a67d04166de0db02dbb
SHA1106e55bd898b5574f9bd33dac9f3c0b95cecd90d
SHA256a59457fbfaf3d1b2e17463d0ffd50680313b1905aff69f13694cfc3fffd5a4ac
SHA5128abf8dc0da25c0fdbaa1ca39db057db80b9a135728fed9cd0f45b0f06d5652cee8d309b92e7cb953c0c4e8b38ffa2427c33f4865f1eb985a621316f9eb187b8b
-
Filesize
128KB
MD56d096c3596f28828dbfdd118312da435
SHA18cae01cfba1a7324ecbc72f18f22f79c2a7f271a
SHA256c41d284694769824bcceab95e23f0e8f7e6bd6be89ee3a4f5a93b68b9f61789a
SHA51243a77bdab2d15130328252fdc863d3507df7ab8b1d24b29b0bdf0bab8528d010d785d00ce3bd0a7c197c26669eded1115a1a6265943ffb73a206bbc4f5847bc3
-
Filesize
1.3MB
MD512b8842dded9134ad0cae031c4f06530
SHA1c0ecd0ac8cf3e4851661f62fe283ecec0e6ca25e
SHA256abd87ec324df8d74245e1671f21e832b563eb8dc3c13b1688a9e85a2f809fe17
SHA512967d70105549641beaa3283c42143aac22e016c911f99ab1c7ef5b4eff2577790fc679a74af6d2df14e87c278762e2c39c96bbdeabeaa1b62fb9072f0baa1825
-
Filesize
256KB
MD5e68b4db842f6c6b1a13602d76c03454a
SHA19894367c4710654d0005fa14c3d93c76e33395ed
SHA256772e4cda047da825a0091ffbcd4ee9614baf36df81739123680c57bc6f9757e4
SHA5129507b5d3dbc8d17fc4eeff74bd8f92cafb83f89a70c61e98e3e85b61527ec1b600ef7919547811465d7afc3f667c1b99bbdcffeafacad8cc3b7da3b74e8f4f57
-
Filesize
56KB
MD53263859df4866bf393d46f06f331a08f
SHA15b4665de13c9727a502f4d11afb800b075929d6c
SHA2569dcacda3913e30cafd92c909648b5bffde14b8e39e6adbfb15628006c0d4d3c2
SHA51258205110a017f5d73dd131fefb1e3bbbcc670ed0c645aeefebe5281579c7b1dceffa56671cd7b186554bdb81710e21018ed0d7088a27517dfc5e48d6d3578cf6
-
Filesize
8KB
MD54ffcfe89a6f218943793ff6ea9bb5e79
SHA18ff66c6fe276857ba0ce6f533d383813e5ce6943
SHA256710c8df4e791a0f4ac8a7351c0c718a6ddb685a3d57abfd2c064c398617bb9b1
SHA5128c62a4e43657a7477acc630708205db74ecad794569408b7b0a57ee1ff111f798917b48c929133e8c199312ad797929a61fc69505a636347307edcd2eef2a5cb
-
Filesize
248KB
MD5d23c06e25b4bd295e821274472263572
SHA19ad295ec3853dc465ae77f9479f8c4f76e2748b8
SHA256f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c
SHA512122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD5e063ed1ff826d9211d72dcd9b57c6db6
SHA173edb0e50951df71df4eee9bdf9ecc6b0101994a
SHA2567e594b7d01a8cbc819f8527f7d1459b02cff4bf97f1a8bc69daea608f4274108
SHA512a8e9d84d88254f2ba4f1e99cf624d4aff1738fb52044cce69500c32f45fbffd42d2d4578bb504dad9147845bf98f5080193eaeead9e84888e35dd9fa187139ee
-
Filesize
700KB
MD5042063eb8c427e1bfd233c7065936b65
SHA11b19f1d4bfc8a0435c7ab2c6e44bd88ecd79f833
SHA256e0e82dd09d0d680f0dfcd750623ae8b1df71300f11ee107e6564160a17e21d3d
SHA512178f47c4c5708a605ad0cc69197b4b52d8ef57d240fddff6b49451b3c3108df2d81b3958da249b151672b9e51d594fa7b19232dbde92b4f45c5594aafc81ce42
-
Filesize
576B
MD56f6fe96279c933c2170e75f49cf43718
SHA1bbe211eaebbeb120b9ca3cd204aacbbeef20cb7e
SHA256e6919da4e2658c82ebbcca670053d77e1231a5a600bf5aeaba71e5852e09022f
SHA51276160b79d3cbe2fca6d95b096043641a96b13007f287f8e55b94eab16cbb98691a8e8fa8d035da434e84f689bb8d36478f632976481b56c7170889553a629748
-
Filesize
773KB
MD5ac9aabe0641c8de39ddb03bf259bb3d9
SHA10f0b52aecbc35aa3348db3f55b556ce539528053
SHA256bb77739ba7a169c28248e11dcc0a947c959f66a20ccd5c443fbe7e7585529668
SHA5129ac0d5a2ac54917e7eea4b5ef3ac4e877e1dce3694c6b2c04dbbaea7487c1f3130e0ef208b50bd0145333fcad3fe9eb69d1c93675d7629bbeabfbf9b39341a65
-
Filesize
544KB
MD559b72032126c30718d4ecf2868ce8fcb
SHA13d9c171d764059325106bda6e2e1590ad31e9c76
SHA25668a312dc124c6ee7afb9bed793035409f869409647f08a4b548b664bad925605
SHA512299be91a62ac9d37f8ec211d1635610f73b7f9b7ffb14fa9d77eb8401a888ffb39fc4a95a102bdc96e0ecbed99ebc7b8d678504b7636ac8154c0deeacc1de4fa
-
Filesize
49KB
MD58c1da89be800bc9a463c81ee79b40a23
SHA1390d2e96e12afe8b4ca59810c60bb3b0b411446c
SHA256c41d3421ae24b3edb325091ff9de1d0b680c03ef44a36f2acbdfc3707f896b95
SHA512f030f72ae5d02f3884197f961256cb088483ae9553234e67a0d9e7b77da306b6a845934268f68aa83dce80776ecb428d06e480234daa1011f58a711ab62b6621
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
440KB
MD597d6533fd24943920a726c7bde030ff6
SHA12de84ec79f54c7ade1537a50cc1a7c3684f20849
SHA2567c38ce86368dc02b7df66b000be053609bd4e49d25995610ed99d2e942ff1b03
SHA512e7fd9b167959ab8da8a44ee549536456cd10af4084502ec667aef88514c0fb7285cd95a3e880590fc957fac332fd7298f85282acf134fc08c833cdfc4d545e93
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82