Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
ca15de24c3fa60e90b343b7376808d1c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca15de24c3fa60e90b343b7376808d1c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20231215-en
General
-
Target
ca15de24c3fa60e90b343b7376808d1c.exe
-
Size
4.2MB
-
MD5
ca15de24c3fa60e90b343b7376808d1c
-
SHA1
e8004170f53ff94665f2ff97a97fb7a78d3a0a74
-
SHA256
f7a805b251505433e34517da69eccb73955a424bb9d9061309091cf52c07a349
-
SHA512
8eb9e8f9ea7087aa5cbfb5babd60a5abf31d96d5b245a846420c218a8f40527ed0b1a541a777e23b79170c52db43ad1ba336a399157b2218c4d1784eea1c76d3
-
SSDEEP
98304:yIfOSOUrxz7b98tUs3nKN/r/i3AF6mwQApnC1VUc21ZBNcPflHM:yIfPOCxzHqB3t5NToVULBNc3a
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
redline
pab3
185.215.113.15:61506
Extracted
smokeloader
pub5
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/1804-106-0x00000000049E0000-0x0000000004A02000-memory.dmp family_redline behavioral2/memory/1804-120-0x0000000007240000-0x0000000007260000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral2/memory/1804-107-0x0000000002D00000-0x0000000002E00000-memory.dmp family_sectoprat behavioral2/memory/1804-106-0x00000000049E0000-0x0000000004A02000-memory.dmp family_sectoprat behavioral2/memory/1804-120-0x0000000007240000-0x0000000007260000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/3152-158-0x0000000002EC0000-0x0000000002F5D000-memory.dmp family_vidar behavioral2/memory/3152-163-0x0000000000400000-0x0000000002D1A000-memory.dmp family_vidar behavioral2/memory/3152-201-0x0000000000400000-0x0000000002D1A000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x00070000000231d3-62.dat aspack_v212_v242 behavioral2/files/0x00070000000231d3-60.dat aspack_v212_v242 behavioral2/files/0x000a000000023185-58.dat aspack_v212_v242 behavioral2/files/0x00070000000231d1-54.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation ca15de24c3fa60e90b343b7376808d1c.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Mon206987d94f0ed4.exe -
Executes dropped EXE 14 IoCs
pid Process 440 setup_installer.exe 4648 setup_install.exe 3152 Mon20ea2d1a99fe5.exe 1044 Mon204f125a31b.exe 1856 Mon20f645bba5.exe 1804 Mon207fb86dc43e314.exe 4212 Mon20dfbf5709ab4.exe 2036 Mon2010d77a08c41abda.exe 3080 Mon20261d41513882.exe 2952 Mon206987d94f0ed4.exe 400 Mon200e0fb06f0e4eb.exe 3964 Mon206987d94f0ed4.exe 1648 Talune.exe.com 1360 Talune.exe.com -
Loads dropped DLL 6 IoCs
pid Process 4648 setup_install.exe 4648 setup_install.exe 4648 setup_install.exe 4648 setup_install.exe 4648 setup_install.exe 4648 setup_install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Mon200e0fb06f0e4eb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 23 iplogger.org 24 iplogger.org 25 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 14 IoCs
pid pid_target Process procid_target 2140 4648 WerFault.exe 93 2696 3152 WerFault.exe 106 4628 3152 WerFault.exe 106 2284 3152 WerFault.exe 106 560 3152 WerFault.exe 106 2076 3152 WerFault.exe 106 1596 3152 WerFault.exe 106 2116 2036 WerFault.exe 113 4472 3152 WerFault.exe 106 2016 3152 WerFault.exe 106 3812 3152 WerFault.exe 106 2888 3152 WerFault.exe 106 4444 3152 WerFault.exe 106 2948 3152 WerFault.exe 106 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon2010d77a08c41abda.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon2010d77a08c41abda.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon2010d77a08c41abda.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 532 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2584 powershell.exe 2584 powershell.exe 2584 powershell.exe 2036 Mon2010d77a08c41abda.exe 2036 Mon2010d77a08c41abda.exe 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found 3580 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2036 Mon2010d77a08c41abda.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 1044 Mon204f125a31b.exe Token: SeDebugPrivilege 3080 Mon20261d41513882.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 1804 Mon207fb86dc43e314.exe Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found Token: SeShutdownPrivilege 3580 Process not Found Token: SeCreatePagefilePrivilege 3580 Process not Found -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1648 Talune.exe.com 1648 Talune.exe.com 1648 Talune.exe.com 1360 Talune.exe.com 1360 Talune.exe.com 1360 Talune.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1648 Talune.exe.com 1648 Talune.exe.com 1648 Talune.exe.com 1360 Talune.exe.com 1360 Talune.exe.com 1360 Talune.exe.com -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3580 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 440 2268 ca15de24c3fa60e90b343b7376808d1c.exe 92 PID 2268 wrote to memory of 440 2268 ca15de24c3fa60e90b343b7376808d1c.exe 92 PID 2268 wrote to memory of 440 2268 ca15de24c3fa60e90b343b7376808d1c.exe 92 PID 440 wrote to memory of 4648 440 setup_installer.exe 93 PID 440 wrote to memory of 4648 440 setup_installer.exe 93 PID 440 wrote to memory of 4648 440 setup_installer.exe 93 PID 4648 wrote to memory of 2148 4648 setup_install.exe 96 PID 4648 wrote to memory of 2148 4648 setup_install.exe 96 PID 4648 wrote to memory of 2148 4648 setup_install.exe 96 PID 4648 wrote to memory of 664 4648 setup_install.exe 131 PID 4648 wrote to memory of 664 4648 setup_install.exe 131 PID 4648 wrote to memory of 664 4648 setup_install.exe 131 PID 4648 wrote to memory of 5108 4648 setup_install.exe 98 PID 4648 wrote to memory of 5108 4648 setup_install.exe 98 PID 4648 wrote to memory of 5108 4648 setup_install.exe 98 PID 4648 wrote to memory of 4992 4648 setup_install.exe 99 PID 4648 wrote to memory of 4992 4648 setup_install.exe 99 PID 4648 wrote to memory of 4992 4648 setup_install.exe 99 PID 4648 wrote to memory of 4844 4648 setup_install.exe 100 PID 4648 wrote to memory of 4844 4648 setup_install.exe 100 PID 4648 wrote to memory of 4844 4648 setup_install.exe 100 PID 4648 wrote to memory of 3224 4648 setup_install.exe 101 PID 4648 wrote to memory of 3224 4648 setup_install.exe 101 PID 4648 wrote to memory of 3224 4648 setup_install.exe 101 PID 4648 wrote to memory of 1680 4648 setup_install.exe 102 PID 4648 wrote to memory of 1680 4648 setup_install.exe 102 PID 4648 wrote to memory of 1680 4648 setup_install.exe 102 PID 4648 wrote to memory of 648 4648 setup_install.exe 103 PID 4648 wrote to memory of 648 4648 setup_install.exe 103 PID 4648 wrote to memory of 648 4648 setup_install.exe 103 PID 4648 wrote to memory of 3740 4648 setup_install.exe 104 PID 4648 wrote to memory of 3740 4648 setup_install.exe 104 PID 4648 wrote to memory of 3740 4648 setup_install.exe 104 PID 4648 wrote to memory of 780 4648 setup_install.exe 105 PID 4648 wrote to memory of 780 4648 setup_install.exe 105 PID 4648 wrote to memory of 780 4648 setup_install.exe 105 PID 4844 wrote to memory of 3152 4844 cmd.exe 106 PID 4844 wrote to memory of 3152 4844 cmd.exe 106 PID 4844 wrote to memory of 3152 4844 cmd.exe 106 PID 780 wrote to memory of 1044 780 cmd.exe 107 PID 780 wrote to memory of 1044 780 cmd.exe 107 PID 1680 wrote to memory of 1856 1680 cmd.exe 108 PID 1680 wrote to memory of 1856 1680 cmd.exe 108 PID 1680 wrote to memory of 1856 1680 cmd.exe 108 PID 2148 wrote to memory of 2584 2148 cmd.exe 109 PID 2148 wrote to memory of 2584 2148 cmd.exe 109 PID 2148 wrote to memory of 2584 2148 cmd.exe 109 PID 3224 wrote to memory of 1804 3224 cmd.exe 110 PID 3224 wrote to memory of 1804 3224 cmd.exe 110 PID 3224 wrote to memory of 1804 3224 cmd.exe 110 PID 664 wrote to memory of 2952 664 cmd.exe 111 PID 664 wrote to memory of 2952 664 cmd.exe 111 PID 664 wrote to memory of 2952 664 cmd.exe 111 PID 5108 wrote to memory of 2036 5108 cmd.exe 113 PID 5108 wrote to memory of 2036 5108 cmd.exe 113 PID 5108 wrote to memory of 2036 5108 cmd.exe 113 PID 4992 wrote to memory of 4212 4992 cmd.exe 112 PID 4992 wrote to memory of 4212 4992 cmd.exe 112 PID 648 wrote to memory of 3080 648 cmd.exe 114 PID 648 wrote to memory of 3080 648 cmd.exe 114 PID 3740 wrote to memory of 400 3740 cmd.exe 116 PID 3740 wrote to memory of 400 3740 cmd.exe 116 PID 3740 wrote to memory of 400 3740 cmd.exe 116 PID 2952 wrote to memory of 3964 2952 Mon206987d94f0ed4.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca15de24c3fa60e90b343b7376808d1c.exe"C:\Users\Admin\AppData\Local\Temp\ca15de24c3fa60e90b343b7376808d1c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon206987d94f0ed4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon206987d94f0ed4.exeMon206987d94f0ed4.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon206987d94f0ed4.exe"C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon206987d94f0ed4.exe" -a6⤵
- Executes dropped EXE
PID:3964
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon2010d77a08c41abda.exe4⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon2010d77a08c41abda.exeMon2010d77a08c41abda.exe5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 3766⤵
- Program crash
PID:2116
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20dfbf5709ab4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon20dfbf5709ab4.exeMon20dfbf5709ab4.exe5⤵
- Executes dropped EXE
PID:4212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20ea2d1a99fe5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon20ea2d1a99fe5.exeMon20ea2d1a99fe5.exe5⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 8326⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 8406⤵
- Program crash
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 8406⤵
- Program crash
PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 8526⤵
- Program crash
PID:560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 9926⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 10806⤵
- Program crash
PID:1596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 15326⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 15406⤵
- Program crash
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 17806⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 15246⤵
- Program crash
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 16206⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 16166⤵
- Program crash
PID:2948
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon207fb86dc43e314.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon207fb86dc43e314.exeMon207fb86dc43e314.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20f645bba5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon20f645bba5.exeMon20f645bba5.exe5⤵
- Executes dropped EXE
PID:1856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20261d41513882.exe4⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon20261d41513882.exeMon20261d41513882.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon200e0fb06f0e4eb.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon200e0fb06f0e4eb.exeMon200e0fb06f0e4eb.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:400 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe6⤵PID:3092
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Conservava.xlam6⤵PID:3304
-
C:\Windows\SysWOW64\cmd.execmd7⤵PID:3468
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^aXXPLdOdpKvHEwwcALYIInWmgGDtBFsVVodqfjpjFmFfheNjFpLslXxTwbAyMJPDzALcKwugCMepSGkjSsms$" Suoi.xlam8⤵PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.comTalune.exe.com K8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.com K9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1360
-
-
-
C:\Windows\SysWOW64\PING.EXEping QMWIRSIY -n 308⤵
- Runs ping.exe
PID:532
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon204f125a31b.exe4⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\7zS8B10EC17\Mon204f125a31b.exeMon204f125a31b.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 5564⤵
- Program crash
PID:2140
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4648 -ip 46481⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3152 -ip 31521⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3152 -ip 31521⤵PID:664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3152 -ip 31521⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3152 -ip 31521⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3152 -ip 31521⤵PID:2888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3152 -ip 31521⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2036 -ip 20361⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3152 -ip 31521⤵PID:604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3152 -ip 31521⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3152 -ip 31521⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3152 -ip 31521⤵PID:560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3152 -ip 31521⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3152 -ip 31521⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD58a3f93b61970509d19396fe1bb34f223
SHA137431c1a042dd0752a691d28df6bbbf2b86996b5
SHA256a6868e7d3ea3b54ee0be47d65ff603b1277b752b4219bfba97df903ee9dc012f
SHA51241e043f70b346659492a027bd574ea919f2bcc8eea62a161e7b36c4c58b1b54c2715706b7aba010bf6dc3c000d10ef0cf9dd32c0365ed224cf0ec7ed9139bd74
-
Filesize
256KB
MD5b786f2d82e32731d5fd6bd55b5a9bcbe
SHA15635a68ae7ada2120226d5abcbcaa604f9de09b3
SHA256f43277ea33285f5fc48a0032b79e680e32f078155837e78a07d551ab6643dffa
SHA51239644583ca4482a8d34192194c055bc883656b14e3a0bd96fc5999f43f4c96601b1ecbd2c4c7a9390138438c53b7018c4b91a1323429f1f833f57fd631bfa96a
-
Filesize
189KB
MD5e09173820ea91934d092118108068292
SHA18ef425cbcf02688a4a2f4dfac37cc255b1368eec
SHA2568dbea84a69cd6ddeaef50739f8f520f0cdd0258baecd517b1832d154fb18b958
SHA51227dda3e88b73c8b0761d5a3a0d311ac3063661002e92a5ce88ceac2f958119d6b46e3466c6c0e282bc4789fad314746e34e1ad55ecbd5da7f8f46e435d091117
-
Filesize
121KB
MD5e5b616672f1330a71f7b32b7ca81480a
SHA1ea053fb53f2162c4d47113673d822165289f09cb
SHA256f71479eca4d5d976aaba365a6f999729d579c538c10c39808b6490ba770cd472
SHA512d840a1a66e6ec89a69a9a99e6477ce2afd1a7d1d4800357a84b1a82e8d2d856ed3c02e62eeae002a6ee7eb932593b5dd8b122da2e17ac6a7915f4603292e3318
-
Filesize
1KB
MD55eef4b395b30ff91d12723a5059dd743
SHA125193a5e033ca628b4ac2d5a818f3ce06e9c27d1
SHA2563ea127e2ccd9ffa5b19a9ffe40a17543939437ff5dc87b7ff2468b440d007b20
SHA51246c5063f66b91225245e2d817e79a4a267ffb063e9ac5f4d3189bb01cbb3f18e5cb1a7a393d8aea37a87f2bd65ba23d040752ba16e878bcd77a9684a15ac4b97
-
Filesize
8KB
MD5ce3a49b916b81a7d349c0f8c9f283d34
SHA1a04ea42670fcf09fffbf7f4d4ac9c8e3edfc8cf4
SHA2569a1f1a9f448d94c8954b8004a4ff3e8405f8b18139f95d04f8d9b40c483e1b40
SHA512e7e0150f3c79300c4e11ca391de9553440846c4b9594b49d8854769a347deb4ba10d5f7d3e7684e3a942ff15b61484910adc12014495adef68eaeb98f887ed80
-
Filesize
2KB
MD513d9b5b7ce1c94cd27a63b1e357a773a
SHA10ffeb70f5b5876e97f458ac89ce780270311871e
SHA2560acbad0959fb3eeb4d1cfda0e3db257167ea68838481bf0b3eeea2ac4dd67549
SHA5126a9516fcde7677b8bc0bcabe8683a767acf68fde6f530be9ce48f522d8c3f048ffb39b43dee4f7522b3d692f659a751daa2d269df2f488c59a47395f4a7bcd7b
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
279KB
MD5af23965c3e2673940b70f436bb45f766
SHA1ccc8b03ea8c568f1b333458cff3f156898fc29f7
SHA256e6271d738fc78602abc8916fb4742638b2b4c4205882f6db24eb361694c67503
SHA512f0202e3ed32b9e69785bb50551b5143fe69298dead3c9a3d539cc6c6768f70f8263f074f912d1de5decb122bc365b7645428c0d10040f6f15a41f3a5ac0a4611
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
557KB
MD5e8dd2c2b42ddc701b1e2c34cc1fe99b1
SHA1c3751581986d6cada60747843792d286fd671657
SHA256835443a1038ad5e0a4dde2451baa95b529f049362955d57daf0b5921729a4f17
SHA512e179b3b4c2f24d089566630c6ee0421418fe17aa4195dc9b04f471665094ce3a4b3ed29da7b6829b7484fa3e785abd343a1cf7abc556f6f5b5403a92b16a970d
-
Filesize
482KB
MD5d9542ef3141d2897a067623cd977cdd6
SHA1bfa926bcc1128db07dbd0f183420d9138161fd00
SHA2566bb792e3adc6e37286ec9dfaf2b7233328e4e36b555e457fd0fbd3276f4a89e6
SHA512b0b71367e6d8efa6f3a0c3c7bb80c2e74a975bdd2b2171e2b7b7c9190e6db3716c337da96ab336c839bb65a84a56da7bef6e9c6154525743a32e4d7cc4c8ecf4
-
Filesize
631KB
MD564be7ccaa252abfd99ecf77bc8cce4d5
SHA19a9633c3cd6b394d149982021e008da3ceb64be0
SHA256d9e8d0bdac5bc0b2a4958536474496fcaaf964d135cd1fe49d1e566b6640199c
SHA512392782e14a78c1c157ee2935990805b13e0db39cd7629be7c880fe05c078c36a5807fb36e70320e6997399be88e85b8c51272fa51a48863bf2ea99c669e32de2
-
Filesize
455KB
MD5462a676d646898b26d02516bd3009988
SHA1cf53586cddf0a5df49464e3f9c4aa3f485a5d136
SHA25607b659ad3a765eb2c1c693c9a950c53e6651534c9d5c86a89b8db9aed7907c7f
SHA5120e609481198015c98af4d9839cadbfc86c75b17880339693544d92b3413e43377a9191a0be4d3ec069651e30bd81372f55e221f87fadfdcc1164f3df687ba47f
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
257KB
MD550edd84bb33522e437d19e6553e5df47
SHA18a6034129d107130a856ed8c8cff2773ac6d543c
SHA256a218bb3e6b9a6c649704e8659ae36ce4edf7075501535328676e69765bba7d48
SHA512e2c22b77cc00230f744cd33e865b5ca3ed9a1ee718bcbfb95667df45bc59efd23d537c6c8fae0f7650823592bc80c97b438f262190c6b3cd0d1b141978fd9af0
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
942KB
MD570170c1470b931d8d5a686bdcfa5d081
SHA10d6b0a3c0e5ddadc04f4fd00b9a024f7eb231a59
SHA2560037e15c343bb20755afbb4c8d32274d693f41fa0367d1d11908aaebe90be71b
SHA512c6dd3da7cdaad550d3d9044f9bb931efe12adf2c37a077ea169ae8e8ea1c0ab41113d09b0233e4746e2cafad80977cce3da1a79d58aba53ed5bd92450f335354
-
Filesize
699KB
MD5c70e175d7d2a8cfc41c6ca11cce492a3
SHA1fa821f96766643e193ed714c153166ff0abe1568
SHA2568c7418fa295e78459bb400c61196da010fac60e4a8e2717c475c48eec72f19bd
SHA51211434063ff33e01fc74b3d95cc20a6173dc87fbd4c0dc9af2d1876fa8cc1f93c51e2ab5b00857316922a6105559f0677f2f0e96d3dbb9cb99b140896ac1c55a6
-
Filesize
529KB
MD59f70b7da10f2bc82ef17005a33570db2
SHA16b49a37998717964c040e7308a2dd47307a11b7e
SHA2564316d9e7f689de493c2846c1ae11cd335ac22e37753caa041dfc34fffbb10d37
SHA512726f26e406f099ae3bb9ca5664a179963579514877b0cfee8821e01738aec0c207574e603adc3fa45298293a8002d0f6ea1831ece9ace44f8446b6f4e9728b16
-
Filesize
429KB
MD559d2bab092c07888a9de289562a19fa4
SHA16eaaf45053787c9bb10545b755726996aeb17335
SHA256d8bcba3cced8e7f88c79a2690a742e911d87cca766b8ae89624e18e725ed96a5
SHA512e12bbe5d20e49d6c88ab7612deae7cf16d54bfe108ccbb1dab3cf67ccb2349fc0b34bd0f02034abf126ae9718d42362e57103075db167199414d374442d114a9
-
Filesize
439B
MD567db09870ad0361cb90cfcceffe5c87c
SHA13d5071241bc942beab03782aabd90e2618fac1df
SHA256455e2f47d0fbeee0f9e5b5ea7b51ce923d85fb98ba46572ccf6740814fa524a0
SHA5121f0d712bf99001a38d3c7af42ca0a6ab226660b18f422963305aef35e33064ad43949eb9b516f3c3efdf8bf4b7bd5e5f8d02baebd3762f79fbdf3850ffc879cb
-
Filesize
222KB
MD5afa33b01d0ef347d428cc68b25956b5d
SHA11e7660c9743a0d671dc7c62f3c29cc31b6b1f6db
SHA25637982bd7400433ed167d40d4dcb42de51f428416674bbf13be2f19f676c03e68
SHA512b09e5f002f0ec7f86e2eddee1db4583f4df09412fdf76c2920e0fbe5f9deeba61edadf8e26c4a6a350b7a4574bddffd0ca9485233f941baa8b4cd8e6fb07613a
-
Filesize
90KB
MD5ea80e9abbdc945030aff9d83aba9a823
SHA196240ddedb10ff81cd4f0b6a458d0c2c62cc7e86
SHA25611142b19824dc408fe0e48cfbf0f87d30f49af366b14176317efc305a73b82f2
SHA512f603655841efbde54b5214e1c2554de518f19bd35ee4d9c0dac421c9f9aeb4f208ab82135d0e113f14b6f855873f11034a8c57594838491081319f984d1cef70
-
Filesize
333KB
MD5ec5bec1340b55bc047e011016d4ee2c4
SHA132bd7da208768bab2346a6abf9e501a32d531563
SHA256b7099765af8a0c98e136baa6860be2a060fd99e0b11677d990a5715aec3a63f3
SHA512508036171b0cffa9eae7e333e225fdf39a1ac572b3fb47efb6ce4884ba84936f35e2fe7b1c11422b2035ad93c852d7387206ef78cbc8b20272aca8a7736d6f33
-
Filesize
368KB
MD58a0132d35664ba77c93096b852f48b99
SHA1b2ac8b157a1c952a3eeed99bdd2a4e48add66c91
SHA2567a9c27c1fc296c35dcd82385615f98f05db355c52c6c581297529f91e64e4253
SHA512ec53c3e3db17371c317761e55c1e5778f76c47b5b16a9e4eb91ed3a361f4ad9670948379e7a4843e4c1f706eb349f6ec048f3ac4a116cc5a28e9edd3ca25a044
-
Filesize
245KB
MD58f27f52d69f9312670b5bd09dfbd267e
SHA1b985139d0d40ef0ed096662685daff9cac0439e2
SHA256e1e3cf5a3bb672b9fb4d15db83cbfb2ffc69863cff1ba621f9fdb59c663c20b0
SHA512178c3b77abf2061e46134f76fb6bd1489494f389f85fbccd62f917faf06e5eaff71812a8c317dee8e7d116014a2a51d93b0fdcda3b0d6f0343936b61980ffae4
-
Filesize
349KB
MD5f751aeb77661c3937b76f40f3875324d
SHA175026b72dfcd12ba74d25af28b0a9665bb646b53
SHA2568e22646487e7171aed9d4e2f249173befe10bc58e67cc6edebc478532f2e65bc
SHA512f165c6f8b8089a9df77806d9ed443de15ecdb359fe990d1c454fcaa105985456892122177cb47c7d2021d754457cb87e7f20c84de7048d1d6aa431038a17a134
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.3MB
MD5222f7e9a8c616fbcdb7ad51350858cc4
SHA1f6f2af9d5891aee4ca1525d051be98d94e16f7bc
SHA2560b957e9dab56f7beb7ccdfc43e3fbc8b3d9d568cd8776341e301aa6da84f3b96
SHA51221c8e5796963d9268c9ff132f9520f1402e84873315e458da5fe554d6812674faa1e678d59e8edf9867422b4ffa6eff3703aca4203aee6d06cfce116a7f6607a
-
Filesize
2.3MB
MD5b2bcea360cfb48f94f7b502cf0ebe71a
SHA17c9c5f9ab679a7dceb9df964165c42998bfe8ca8
SHA256cbd0ebcd5df8ad1ac400b2946659edbde95fc92239a92a4a0fb87720a2226f83
SHA512a329f29dc8c5dde21cadc2a4568a20e6c0db60c539c5e450a68cf4faafed304226a4f11287b9d1ac4913d5f8a37eb8dd1410bc19cd7575a2a950b744bf46c03b
-
Filesize
4.2MB
MD5baf330c66dc494f59980816acd04c9da
SHA17f394f6664318aae1e8b351ee8f6952957bd957c
SHA2568ba4bd3b729779ced975109d4c7c427baf7ab6b011bf9ac1c0ea0419c102bb60
SHA5121dccc6560b5b5a2a921501a3fe115fa7338bc7d354bce2292f2326d02fa7fcbf85c01d6143d1d857920f3573de4d8fe375fc5afd4bdefcd2c26224109c0d667e