Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe
Resource
win10v2004-20240226-en
General
-
Target
3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe
-
Size
240KB
-
MD5
5139088c1b90cb6ba77225b6c6395b09
-
SHA1
6d517d5218944fd6c869682d420fe472dcd3288b
-
SHA256
3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31
-
SHA512
16320b961469f9982e99e01fe00a32b3d5d3e92ac693f7c0ba068a8731ceae1128b3fc33c96e56a899a4b4f221773bc143824c31e320aef6310a119087afdfb2
-
SSDEEP
6144:9hbZ5hMTNFf8LAurlEzAX7o5hn8wVSZ2sXc:vtXMzqrllX7618w
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 1512 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exe 1472 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202a.exe 4576 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202b.exe 112 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202c.exe 4504 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202d.exe 620 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202e.exe 5004 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202f.exe 4004 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202g.exe 3068 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202h.exe 1948 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202i.exe 4256 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exe 1672 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202k.exe 5032 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202l.exe 3160 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202m.exe 856 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202n.exe 3092 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202o.exe 2044 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202p.exe 2024 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202q.exe 372 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202r.exe 4340 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202s.exe 3224 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202t.exe 772 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202u.exe 3864 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202v.exe 1112 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202w.exe 2396 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202x.exe 2516 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202y.exe -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202v.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202g.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202i.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202h.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202w.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202v.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202f.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202q.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202p.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202o.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202k.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202n.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202o.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202n.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202r.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202q.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202s.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202u.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202t.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202e.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202a.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202l.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202t.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202x.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202w.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202h.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202c.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202m.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202b.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202y.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202d.exe\"" 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202c.exe -
Modifies registry class 54 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202r.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202i.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202k.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202s.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202v.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202g.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202h.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202y.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202w.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202y.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 2592b4fb36ca8e43 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202a.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202u.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 1512 740 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe 88 PID 740 wrote to memory of 1512 740 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe 88 PID 740 wrote to memory of 1512 740 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe 88 PID 1512 wrote to memory of 1472 1512 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exe 89 PID 1512 wrote to memory of 1472 1512 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exe 89 PID 1512 wrote to memory of 1472 1512 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exe 89 PID 1472 wrote to memory of 4576 1472 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202a.exe 90 PID 1472 wrote to memory of 4576 1472 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202a.exe 90 PID 1472 wrote to memory of 4576 1472 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202a.exe 90 PID 4576 wrote to memory of 112 4576 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202b.exe 91 PID 4576 wrote to memory of 112 4576 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202b.exe 91 PID 4576 wrote to memory of 112 4576 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202b.exe 91 PID 112 wrote to memory of 4504 112 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202c.exe 92 PID 112 wrote to memory of 4504 112 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202c.exe 92 PID 112 wrote to memory of 4504 112 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202c.exe 92 PID 4504 wrote to memory of 620 4504 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202d.exe 93 PID 4504 wrote to memory of 620 4504 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202d.exe 93 PID 4504 wrote to memory of 620 4504 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202d.exe 93 PID 620 wrote to memory of 5004 620 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202e.exe 94 PID 620 wrote to memory of 5004 620 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202e.exe 94 PID 620 wrote to memory of 5004 620 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202e.exe 94 PID 5004 wrote to memory of 4004 5004 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202f.exe 95 PID 5004 wrote to memory of 4004 5004 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202f.exe 95 PID 5004 wrote to memory of 4004 5004 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202f.exe 95 PID 4004 wrote to memory of 3068 4004 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202g.exe 96 PID 4004 wrote to memory of 3068 4004 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202g.exe 96 PID 4004 wrote to memory of 3068 4004 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202g.exe 96 PID 3068 wrote to memory of 1948 3068 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202h.exe 97 PID 3068 wrote to memory of 1948 3068 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202h.exe 97 PID 3068 wrote to memory of 1948 3068 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202h.exe 97 PID 1948 wrote to memory of 4256 1948 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202i.exe 98 PID 1948 wrote to memory of 4256 1948 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202i.exe 98 PID 1948 wrote to memory of 4256 1948 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202i.exe 98 PID 4256 wrote to memory of 1672 4256 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exe 99 PID 4256 wrote to memory of 1672 4256 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exe 99 PID 4256 wrote to memory of 1672 4256 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exe 99 PID 1672 wrote to memory of 5032 1672 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202k.exe 100 PID 1672 wrote to memory of 5032 1672 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202k.exe 100 PID 1672 wrote to memory of 5032 1672 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202k.exe 100 PID 5032 wrote to memory of 3160 5032 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202l.exe 101 PID 5032 wrote to memory of 3160 5032 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202l.exe 101 PID 5032 wrote to memory of 3160 5032 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202l.exe 101 PID 3160 wrote to memory of 856 3160 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202m.exe 102 PID 3160 wrote to memory of 856 3160 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202m.exe 102 PID 3160 wrote to memory of 856 3160 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202m.exe 102 PID 856 wrote to memory of 3092 856 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202n.exe 103 PID 856 wrote to memory of 3092 856 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202n.exe 103 PID 856 wrote to memory of 3092 856 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202n.exe 103 PID 3092 wrote to memory of 2044 3092 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202o.exe 105 PID 3092 wrote to memory of 2044 3092 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202o.exe 105 PID 3092 wrote to memory of 2044 3092 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202o.exe 105 PID 2044 wrote to memory of 2024 2044 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202p.exe 106 PID 2044 wrote to memory of 2024 2044 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202p.exe 106 PID 2044 wrote to memory of 2024 2044 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202p.exe 106 PID 2024 wrote to memory of 372 2024 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202q.exe 107 PID 2024 wrote to memory of 372 2024 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202q.exe 107 PID 2024 wrote to memory of 372 2024 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202q.exe 107 PID 372 wrote to memory of 4340 372 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202r.exe 109 PID 372 wrote to memory of 4340 372 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202r.exe 109 PID 372 wrote to memory of 4340 372 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202r.exe 109 PID 4340 wrote to memory of 3224 4340 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202s.exe 110 PID 4340 wrote to memory of 3224 4340 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202s.exe 110 PID 4340 wrote to memory of 3224 4340 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202s.exe 110 PID 3224 wrote to memory of 772 3224 3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202t.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe"C:\Users\Admin\AppData\Local\Temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:740 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1512 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202a.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202a.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1472 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202b.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202b.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4576 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202c.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202c.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:112 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202d.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202d.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202e.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202e.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:620 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202f.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202f.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5004 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202g.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202g.exe9⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202h.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202h.exe10⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202i.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202i.exe11⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exe12⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4256 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202k.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202k.exe13⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202l.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202l.exe14⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202m.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202m.exe15⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3160 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202n.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202n.exe16⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202o.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202o.exe17⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3092 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202p.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202p.exe18⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202q.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202q.exe19⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202r.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202r.exe20⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:372 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202s.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202s.exe21⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4340 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202t.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202t.exe22⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3224 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202u.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202u.exe23⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:772 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202v.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202v.exe24⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:3864 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202w.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202w.exe25⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:1112 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202x.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202x.exe26⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2396 -
\??\c:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202y.exec:\users\admin\appdata\local\temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202y.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:2516
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202.exe
Filesize240KB
MD570e09031ece1109a8ac84c6d23e349bc
SHA1f353285241de331400e48a4e10475a88fe8e3482
SHA25667cba7bb0b2e38a2a6b8816482f3e5ff7fb7aacc8ce13ecef426a3c18294d87a
SHA512233bfd59f051cd63fe7c65fb1d942d572a5a150b2897ee788f6b3cf5cab7bfd26956c0f1af2a86591a41275fd3f227e4225bf48c255b69bf42fc34b5f216653d
-
C:\Users\Admin\AppData\Local\Temp\3a41926d18c1f4ea1f7a590554f4f9eecf011d4cfc52e336221236c804e30d31_3202j.exe
Filesize240KB
MD535e539fdb23bcafdff374081b4561603
SHA1e3f288f9d33b41f87c25a7219d412be3e961fcc2
SHA256f5a49ccfc6f0c34c0db30c080d265bac84c3fa3b42dfe58ab35c0247ffca519f
SHA512e027bb54aab61c59ff77164897d2ee43313513f9093608c6809a3d75447ef2860b84cb49d8bb81fbdd49c241068ce5f1e47ffdf2b0f155f17e7576fe31fc6c74