Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
ca15de24c3fa60e90b343b7376808d1c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca15de24c3fa60e90b343b7376808d1c.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
setup_installer.exe
Resource
win10v2004-20231215-en
General
-
Target
setup_installer.exe
-
Size
4.2MB
-
MD5
baf330c66dc494f59980816acd04c9da
-
SHA1
7f394f6664318aae1e8b351ee8f6952957bd957c
-
SHA256
8ba4bd3b729779ced975109d4c7c427baf7ab6b011bf9ac1c0ea0419c102bb60
-
SHA512
1dccc6560b5b5a2a921501a3fe115fa7338bc7d354bce2292f2326d02fa7fcbf85c01d6143d1d857920f3573de4d8fe375fc5afd4bdefcd2c26224109c0d667e
-
SSDEEP
98304:xcCvLUBsgrye6P8kqRj0FZp4zwkVyEXnXOb+6V:xBLUCgry5P8zRwFZez7BubP
Malware Config
Extracted
redline
pab3
185.215.113.15:61506
Extracted
nullmixer
http://watira.xyz/
Extracted
smokeloader
pub5
Extracted
vidar
40
706
https://lenak513.tumblr.com/
-
profile_id
706
Extracted
smokeloader
2020
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Signatures
-
CryptBot payload 3 IoCs
resource yara_rule behavioral4/memory/4564-212-0x0000000004780000-0x0000000004823000-memory.dmp family_cryptbot behavioral4/memory/4564-213-0x0000000004780000-0x0000000004823000-memory.dmp family_cryptbot behavioral4/memory/4564-214-0x0000000004780000-0x0000000004823000-memory.dmp family_cryptbot -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral4/memory/4456-96-0x0000000004A60000-0x0000000004A82000-memory.dmp family_redline behavioral4/memory/4456-123-0x0000000004B00000-0x0000000004B20000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral4/memory/4456-96-0x0000000004A60000-0x0000000004A82000-memory.dmp family_sectoprat behavioral4/memory/4456-123-0x0000000004B00000-0x0000000004B20000-memory.dmp family_sectoprat behavioral4/memory/4456-192-0x0000000007440000-0x0000000007450000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral4/memory/3292-145-0x0000000002F80000-0x000000000301D000-memory.dmp family_vidar behavioral4/memory/3292-149-0x0000000000400000-0x0000000002D1A000-memory.dmp family_vidar -
resource yara_rule behavioral4/files/0x000700000002321d-49.dat aspack_v212_v242 behavioral4/files/0x0007000000023219-44.dat aspack_v212_v242 behavioral4/files/0x0007000000023218-43.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation Mon206987d94f0ed4.exe -
Executes dropped EXE 13 IoCs
pid Process 4212 setup_install.exe 4520 Mon206987d94f0ed4.exe 5076 Mon20dfbf5709ab4.exe 2452 Mon2010d77a08c41abda.exe 3292 Mon20ea2d1a99fe5.exe 4456 Mon207fb86dc43e314.exe 4836 Mon20f645bba5.exe 4668 Mon204f125a31b.exe 3756 Mon200e0fb06f0e4eb.exe 1184 Mon20261d41513882.exe 4532 Mon206987d94f0ed4.exe 2708 Talune.exe.com 4564 Talune.exe.com -
Loads dropped DLL 6 IoCs
pid Process 4212 setup_install.exe 4212 setup_install.exe 4212 setup_install.exe 4212 setup_install.exe 4212 setup_install.exe 4212 setup_install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Mon200e0fb06f0e4eb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 15 iplogger.org 17 iplogger.org 19 iplogger.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
pid pid_target Process procid_target 1900 4212 WerFault.exe 85 412 3292 WerFault.exe 102 4568 3292 WerFault.exe 102 4216 3292 WerFault.exe 102 2388 3292 WerFault.exe 102 2592 3292 WerFault.exe 102 4732 3292 WerFault.exe 102 4160 3292 WerFault.exe 102 3696 3292 WerFault.exe 102 4272 3292 WerFault.exe 102 956 2452 WerFault.exe 97 2076 3292 WerFault.exe 102 4896 3292 WerFault.exe 102 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon2010d77a08c41abda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon2010d77a08c41abda.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon2010d77a08c41abda.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4312 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3732 powershell.exe 3732 powershell.exe 3732 powershell.exe 2452 Mon2010d77a08c41abda.exe 2452 Mon2010d77a08c41abda.exe 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2452 Mon2010d77a08c41abda.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 4668 Mon204f125a31b.exe Token: SeDebugPrivilege 3732 powershell.exe Token: SeDebugPrivilege 1184 Mon20261d41513882.exe Token: SeDebugPrivilege 4456 Mon207fb86dc43e314.exe Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeCreateGlobalPrivilege 1184 dwm.exe Token: SeChangeNotifyPrivilege 1184 dwm.exe Token: 33 1184 dwm.exe Token: SeIncBasePriorityPrivilege 1184 dwm.exe Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeShutdownPrivilege 3480 Process not Found Token: SeCreatePagefilePrivilege 3480 Process not Found Token: SeShutdownPrivilege 1184 dwm.exe Token: SeCreatePagefilePrivilege 1184 dwm.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2708 Talune.exe.com 2708 Talune.exe.com 2708 Talune.exe.com 4564 Talune.exe.com 4564 Talune.exe.com 4564 Talune.exe.com 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 2708 Talune.exe.com 2708 Talune.exe.com 2708 Talune.exe.com 4564 Talune.exe.com 4564 Talune.exe.com 4564 Talune.exe.com 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found 3480 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3480 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 956 wrote to memory of 4212 956 setup_installer.exe 85 PID 956 wrote to memory of 4212 956 setup_installer.exe 85 PID 956 wrote to memory of 4212 956 setup_installer.exe 85 PID 4212 wrote to memory of 2076 4212 setup_install.exe 145 PID 4212 wrote to memory of 2076 4212 setup_install.exe 145 PID 4212 wrote to memory of 2076 4212 setup_install.exe 145 PID 4212 wrote to memory of 732 4212 setup_install.exe 137 PID 4212 wrote to memory of 732 4212 setup_install.exe 137 PID 4212 wrote to memory of 732 4212 setup_install.exe 137 PID 4212 wrote to memory of 2980 4212 setup_install.exe 90 PID 4212 wrote to memory of 2980 4212 setup_install.exe 90 PID 4212 wrote to memory of 2980 4212 setup_install.exe 90 PID 4212 wrote to memory of 3952 4212 setup_install.exe 91 PID 4212 wrote to memory of 3952 4212 setup_install.exe 91 PID 4212 wrote to memory of 3952 4212 setup_install.exe 91 PID 4212 wrote to memory of 4808 4212 setup_install.exe 92 PID 4212 wrote to memory of 4808 4212 setup_install.exe 92 PID 4212 wrote to memory of 4808 4212 setup_install.exe 92 PID 4212 wrote to memory of 4352 4212 setup_install.exe 93 PID 4212 wrote to memory of 4352 4212 setup_install.exe 93 PID 4212 wrote to memory of 4352 4212 setup_install.exe 93 PID 4212 wrote to memory of 3532 4212 setup_install.exe 94 PID 4212 wrote to memory of 3532 4212 setup_install.exe 94 PID 4212 wrote to memory of 3532 4212 setup_install.exe 94 PID 2076 wrote to memory of 3732 2076 cmd.exe 95 PID 2076 wrote to memory of 3732 2076 cmd.exe 95 PID 2076 wrote to memory of 3732 2076 cmd.exe 95 PID 732 wrote to memory of 4520 732 cmd.exe 96 PID 732 wrote to memory of 4520 732 cmd.exe 96 PID 732 wrote to memory of 4520 732 cmd.exe 96 PID 4212 wrote to memory of 4512 4212 setup_install.exe 98 PID 4212 wrote to memory of 4512 4212 setup_install.exe 98 PID 4212 wrote to memory of 4512 4212 setup_install.exe 98 PID 4212 wrote to memory of 4712 4212 setup_install.exe 100 PID 4212 wrote to memory of 4712 4212 setup_install.exe 100 PID 4212 wrote to memory of 4712 4212 setup_install.exe 100 PID 4212 wrote to memory of 2128 4212 setup_install.exe 101 PID 4212 wrote to memory of 2128 4212 setup_install.exe 101 PID 4212 wrote to memory of 2128 4212 setup_install.exe 101 PID 3952 wrote to memory of 5076 3952 cmd.exe 99 PID 3952 wrote to memory of 5076 3952 cmd.exe 99 PID 2980 wrote to memory of 2452 2980 cmd.exe 97 PID 2980 wrote to memory of 2452 2980 cmd.exe 97 PID 2980 wrote to memory of 2452 2980 cmd.exe 97 PID 4808 wrote to memory of 3292 4808 cmd.exe 102 PID 4808 wrote to memory of 3292 4808 cmd.exe 102 PID 4808 wrote to memory of 3292 4808 cmd.exe 102 PID 4352 wrote to memory of 4456 4352 cmd.exe 103 PID 4352 wrote to memory of 4456 4352 cmd.exe 103 PID 4352 wrote to memory of 4456 4352 cmd.exe 103 PID 3532 wrote to memory of 4836 3532 cmd.exe 104 PID 3532 wrote to memory of 4836 3532 cmd.exe 104 PID 3532 wrote to memory of 4836 3532 cmd.exe 104 PID 2128 wrote to memory of 4668 2128 cmd.exe 106 PID 2128 wrote to memory of 4668 2128 cmd.exe 106 PID 4512 wrote to memory of 1184 4512 cmd.exe 142 PID 4512 wrote to memory of 1184 4512 cmd.exe 142 PID 4712 wrote to memory of 3756 4712 cmd.exe 108 PID 4712 wrote to memory of 3756 4712 cmd.exe 108 PID 4712 wrote to memory of 3756 4712 cmd.exe 108 PID 4520 wrote to memory of 4532 4520 Mon206987d94f0ed4.exe 111 PID 4520 wrote to memory of 4532 4520 Mon206987d94f0ed4.exe 111 PID 4520 wrote to memory of 4532 4520 Mon206987d94f0ed4.exe 111 PID 3756 wrote to memory of 4748 3756 Mon200e0fb06f0e4eb.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon206987d94f0ed4.exe3⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon206987d94f0ed4.exeMon206987d94f0ed4.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon206987d94f0ed4.exe"C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon206987d94f0ed4.exe" -a5⤵
- Executes dropped EXE
PID:4532
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon2010d77a08c41abda.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon2010d77a08c41abda.exeMon2010d77a08c41abda.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 3765⤵
- Program crash
PID:956
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20dfbf5709ab4.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon20dfbf5709ab4.exeMon20dfbf5709ab4.exe4⤵
- Executes dropped EXE
PID:5076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20ea2d1a99fe5.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon20ea2d1a99fe5.exeMon20ea2d1a99fe5.exe4⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8245⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8325⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8325⤵
- Program crash
PID:4216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8805⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 10045⤵
- Program crash
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 10765⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 10845⤵
- Program crash
PID:4160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 15085⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 16085⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 15085⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 10485⤵
- Program crash
PID:4896
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon207fb86dc43e314.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon207fb86dc43e314.exeMon207fb86dc43e314.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20f645bba5.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon20f645bba5.exeMon20f645bba5.exe4⤵
- Executes dropped EXE
PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon20261d41513882.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon20261d41513882.exeMon20261d41513882.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon200e0fb06f0e4eb.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon200e0fb06f0e4eb.exeMon200e0fb06f0e4eb.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe5⤵PID:4748
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Conservava.xlam5⤵PID:4368
-
C:\Windows\SysWOW64\cmd.execmd6⤵PID:4556
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^aXXPLdOdpKvHEwwcALYIInWmgGDtBFsVVodqfjpjFmFfheNjFpLslXxTwbAyMJPDzALcKwugCMepSGkjSsms$" Suoi.xlam7⤵PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.comTalune.exe.com K7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Talune.exe.com K8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4564
-
-
-
C:\Windows\SysWOW64\PING.EXEping GAWKBMOT -n 307⤵
- Runs ping.exe
PID:4312
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon204f125a31b.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\7zSCB3C7277\Mon204f125a31b.exeMon204f125a31b.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 5723⤵
- Program crash
PID:1900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4212 -ip 42121⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3292 -ip 32921⤵PID:1908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3292 -ip 32921⤵PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3292 -ip 32921⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3292 -ip 32921⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3292 -ip 32921⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3292 -ip 32921⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3292 -ip 32921⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3292 -ip 32921⤵PID:2092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3292 -ip 32921⤵PID:732
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3292 -ip 32921⤵PID:1352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3292 -ip 32921⤵PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5f3d679a13d543153a37d9d95a6118ffd
SHA18064e6f869049bf3682b802b2ffeafbc60383288
SHA256164e93724abba0dd0d6ef012b48eaffea77c983a7a7828f2663b1ab8c26d348f
SHA5126942757c458000b27427fc2a2e607ede781382618febb1f0909a240a3d55d7af3bc3664d6363ca536469cc3f44e34bdaece3ec801c92d288e79758785eaf2c1e
-
Filesize
5KB
MD5a307b7a2f1ecad2e8cd832bb6e33f583
SHA108ea22b49c2e2e1a9a7795d60663a25d4b1797d4
SHA256bde8fc75ec8c1744fa3b07b1d18da771c52b40c453226379364935f10836d65c
SHA5125385286db4ecd30b8f537e00c5b63f0f5e406707805295741478863ba83dd167606d857f8d637be4182f4b1109a1931fd5c7614c56058e73804b1e2aa66ef9c4
-
Filesize
189KB
MD5e09173820ea91934d092118108068292
SHA18ef425cbcf02688a4a2f4dfac37cc255b1368eec
SHA2568dbea84a69cd6ddeaef50739f8f520f0cdd0258baecd517b1832d154fb18b958
SHA51227dda3e88b73c8b0761d5a3a0d311ac3063661002e92a5ce88ceac2f958119d6b46e3466c6c0e282bc4789fad314746e34e1ad55ecbd5da7f8f46e435d091117
-
Filesize
121KB
MD5e5b616672f1330a71f7b32b7ca81480a
SHA1ea053fb53f2162c4d47113673d822165289f09cb
SHA256f71479eca4d5d976aaba365a6f999729d579c538c10c39808b6490ba770cd472
SHA512d840a1a66e6ec89a69a9a99e6477ce2afd1a7d1d4800357a84b1a82e8d2d856ed3c02e62eeae002a6ee7eb932593b5dd8b122da2e17ac6a7915f4603292e3318
-
Filesize
14KB
MD54f50ceb1fc8e7164bfcbfade6b62160e
SHA1b3e1ec2c50259077634b9ad5e5e1c3524283ea71
SHA2568c3f3b49a7a66ce47f90408a07af64c5c6d2f21f69cebc866c3cef2b28bf2215
SHA5122b4411c0438d52c275b00d5d7f9781569c448de54563382493672615270c41a9d69c6f5480181a9b813a20f0af6c676f5b47ba48120f3ba269aec480c6ca7422
-
Filesize
8KB
MD5ce3a49b916b81a7d349c0f8c9f283d34
SHA1a04ea42670fcf09fffbf7f4d4ac9c8e3edfc8cf4
SHA2569a1f1a9f448d94c8954b8004a4ff3e8405f8b18139f95d04f8d9b40c483e1b40
SHA512e7e0150f3c79300c4e11ca391de9553440846c4b9594b49d8854769a347deb4ba10d5f7d3e7684e3a942ff15b61484910adc12014495adef68eaeb98f887ed80
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
279KB
MD5af23965c3e2673940b70f436bb45f766
SHA1ccc8b03ea8c568f1b333458cff3f156898fc29f7
SHA256e6271d738fc78602abc8916fb4742638b2b4c4205882f6db24eb361694c67503
SHA512f0202e3ed32b9e69785bb50551b5143fe69298dead3c9a3d539cc6c6768f70f8263f074f912d1de5decb122bc365b7645428c0d10040f6f15a41f3a5ac0a4611
-
Filesize
241KB
MD55866ab1fae31526ed81bfbdf95220190
SHA175a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f
SHA2569e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e
SHA5128d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5
-
Filesize
557KB
MD5e8dd2c2b42ddc701b1e2c34cc1fe99b1
SHA1c3751581986d6cada60747843792d286fd671657
SHA256835443a1038ad5e0a4dde2451baa95b529f049362955d57daf0b5921729a4f17
SHA512e179b3b4c2f24d089566630c6ee0421418fe17aa4195dc9b04f471665094ce3a4b3ed29da7b6829b7484fa3e785abd343a1cf7abc556f6f5b5403a92b16a970d
-
Filesize
631KB
MD564be7ccaa252abfd99ecf77bc8cce4d5
SHA19a9633c3cd6b394d149982021e008da3ceb64be0
SHA256d9e8d0bdac5bc0b2a4958536474496fcaaf964d135cd1fe49d1e566b6640199c
SHA512392782e14a78c1c157ee2935990805b13e0db39cd7629be7c880fe05c078c36a5807fb36e70320e6997399be88e85b8c51272fa51a48863bf2ea99c669e32de2
-
Filesize
605KB
MD550aef5d612c57cb2a68c3720ddba06d3
SHA1948c046a676c73f603364cae9990db07096e1617
SHA25691fcf523857efeb67d606ca99b04cb51bcb1272093295522fd6be0ed8027cd71
SHA5124f4966a37b480806bc0b61ce61d2046d547e0806d3309e9dfb824ae45a06dc4daeeee6eb91494bd7c911d92e403e2a57678e770bcdda0c08605f081e41db2b0f
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD554e1a0e5aef038ef6007bb47bef17859
SHA1b2a12edd940f2ce9989f7ac8cbb70f09eeca7747
SHA256a9a27d84c511522e7ed72004fb36f3dd438dfab82ae8768e45d21ad6f438a4b9
SHA512b037817387fe0676b370001972a4abe71282f22373774f10a2a3ca039016fe434b7f18663b941bf17d265f8253f25dbe97b5a7336976a4a8de6e6cc555729b7a
-
Filesize
474KB
MD5f4770921654fdbeb37faf0a7d419079a
SHA19b07a59e50615fb33d9f3aa40bce931b3f8cc95b
SHA2566b40ebab1ff4b2c9edfc2d243f564ec2828f5e2dcc9e9deb5e2161cd1c37cb45
SHA512b9abd064348d5f13961782e3e4d5e20e33b1e4fc2c152b0a510d52f5a27b885e4fcafe1744351518a59984d6e501592922f856d90ed55106af86a2fe1dc4ac82
-
Filesize
439B
MD567db09870ad0361cb90cfcceffe5c87c
SHA13d5071241bc942beab03782aabd90e2618fac1df
SHA256455e2f47d0fbeee0f9e5b5ea7b51ce923d85fb98ba46572ccf6740814fa524a0
SHA5121f0d712bf99001a38d3c7af42ca0a6ab226660b18f422963305aef35e33064ad43949eb9b516f3c3efdf8bf4b7bd5e5f8d02baebd3762f79fbdf3850ffc879cb
-
Filesize
287KB
MD53c7f81f28d842e8696c9296cc54c8739
SHA17555c333659a4630a935df23ce5faeaea2cc6ea7
SHA2564ad3433e2b086c295edda8d8add75adb33e00b64cd07dbfdd72e599c20406485
SHA51284239b38b078964e2f26d2fbd05eeb190eecee23463237b63e9361b73953c0011724ff8c97df4ab5322c61d72b9187318bc9f8861ee4d67af0e12362a32d59d3
-
Filesize
69KB
MD592d09de2035d31b7bf87550cb9915ff3
SHA13e118edecf5de44a43ccc3a862ad60e586e25713
SHA256ebe9905c946cf0d43bd67e9e00ed580d95e6b87dd9409818ff223697e9435c52
SHA5125a5e435dac1004bacf403b866a0b76c502aa725c28cf751fd584398a0cb3535cc098f32b9a8c762912883e0be94dca8830b40947003793b3ff239a9afa9e0fa0
-
Filesize
265KB
MD51c6c6f626835581d39ed0615a92fcb3c
SHA163e9961eb8baf53185c2ce9ccbff5c104bba8f45
SHA2567182fdbb3917d1aa1db4375d9d4d432ac1e8bcefe8c469d13a3cc818493975a2
SHA51227fd0dec9e61757e40d7c29a0151e43abea069658daaa5cbca5f1c9f0a3ab19686feb4df667deea7fd243c21a6f62ccf431cec7e94f49215d66a4e273eb1e553
-
Filesize
426KB
MD5b2b060a740d21f9904d0aecd391f3bec
SHA1c678a12b2a838029e2c9c012891a63b38cafd719
SHA25686114550ae3afdd7bc2192be57f8d581abe8d3702c23aa2474a603bd10cdd6e6
SHA512adb19283dbd39c745068c38efd7f7dd66d32cb4977826f5570072ace67c8cd3486856911439cb21ef89181577720373a117942c06be45b0a4e48d328b7357497
-
Filesize
263KB
MD5a3b669eee15b904bfc517926e311ce0c
SHA17e5f938f16ed05cb1c50721b2371ec152c5a83ac
SHA2562bcd4bb266fd3cec36a4a179f67f116211a7404706f2fa34a29281d451f82ed9
SHA5128b284451305fcd3ab1577d0aaeec3d68dfbeaaa6fa654e87cf47342a6221702b4924200555d2e723955347238da6ce3aad9355b9e893be7e20980abfa52f9a4a
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82