Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
cb1ed66915bff236bd93218863d05dda.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb1ed66915bff236bd93218863d05dda.exe
Resource
win10v2004-20240226-en
General
-
Target
cb1ed66915bff236bd93218863d05dda.exe
-
Size
616KB
-
MD5
cb1ed66915bff236bd93218863d05dda
-
SHA1
203b5e01cd8e696971e817768bdbd0c4ea6dbebb
-
SHA256
d008c9e8f618b47e4808d729d9104dbbdd238351a58f4b6071eff47be8467323
-
SHA512
e6481682ce4cd185b6177516b80f78d2b1715eb79f33a37e724fad3ed6138e30f9fedbf6c33a25ddec4ec94e927aa6c368cfc05ba04fa1291841ce56bb987109
-
SSDEEP
12288:qso7xlyGjQVVHxAt8PySuBxoBvAdLGVSXh/O:qpxZ8kAvA6SRW
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1760 plog.exe 2596 plog.exe 2508 plog.exe 2600 plog.exe 2484 plog.exe 2532 plog.exe 2400 plog.exe 2984 plog.exe 2672 plog.exe 2680 plog.exe 2028 plog.exe 2308 plog.exe 1552 plog.exe 1072 plog.exe 568 plog.exe 2356 plog.exe 804 plog.exe 2668 plog.exe 2408 plog.exe 2692 plog.exe 1956 plog.exe 2972 plog.exe 2992 plog.exe 2748 plog.exe 2268 plog.exe 1400 plog.exe 1824 plog.exe 928 plog.exe 1524 plog.exe 944 plog.exe 1408 plog.exe 2848 plog.exe 1752 plog.exe 2312 plog.exe 1044 plog.exe 2864 plog.exe 1720 plog.exe 2136 plog.exe 2728 plog.exe 1760 plog.exe 2880 plog.exe 1904 plog.exe 2496 plog.exe 2580 plog.exe 2520 plog.exe 2588 plog.exe 2196 plog.exe 2528 plog.exe 2424 plog.exe 2388 plog.exe 2364 plog.exe 2416 plog.exe 2348 plog.exe 1596 plog.exe 1924 plog.exe 1864 plog.exe 1588 plog.exe 1448 plog.exe 2028 plog.exe 1716 plog.exe 1600 plog.exe 540 plog.exe 2656 plog.exe 1368 plog.exe -
Loads dropped DLL 64 IoCs
pid Process 1692 cb1ed66915bff236bd93218863d05dda.exe 1692 cb1ed66915bff236bd93218863d05dda.exe 1760 plog.exe 1760 plog.exe 2596 plog.exe 2596 plog.exe 2508 plog.exe 2508 plog.exe 2600 plog.exe 2600 plog.exe 2484 plog.exe 2484 plog.exe 2532 plog.exe 2532 plog.exe 2400 plog.exe 2400 plog.exe 2984 plog.exe 2984 plog.exe 2672 plog.exe 2672 plog.exe 2680 plog.exe 2680 plog.exe 2028 plog.exe 2028 plog.exe 2308 plog.exe 2308 plog.exe 1552 plog.exe 1552 plog.exe 1072 plog.exe 1072 plog.exe 568 plog.exe 568 plog.exe 2356 plog.exe 2356 plog.exe 804 plog.exe 804 plog.exe 2668 plog.exe 2668 plog.exe 2408 plog.exe 2408 plog.exe 2692 plog.exe 2692 plog.exe 1956 plog.exe 1956 plog.exe 2972 plog.exe 2972 plog.exe 2992 plog.exe 2992 plog.exe 2748 plog.exe 2748 plog.exe 2268 plog.exe 2268 plog.exe 1400 plog.exe 1400 plog.exe 1824 plog.exe 1824 plog.exe 928 plog.exe 928 plog.exe 1524 plog.exe 1524 plog.exe 944 plog.exe 944 plog.exe 1408 plog.exe 1408 plog.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1760 1692 cb1ed66915bff236bd93218863d05dda.exe 28 PID 1692 wrote to memory of 1760 1692 cb1ed66915bff236bd93218863d05dda.exe 28 PID 1692 wrote to memory of 1760 1692 cb1ed66915bff236bd93218863d05dda.exe 28 PID 1692 wrote to memory of 1760 1692 cb1ed66915bff236bd93218863d05dda.exe 28 PID 1760 wrote to memory of 2596 1760 plog.exe 29 PID 1760 wrote to memory of 2596 1760 plog.exe 29 PID 1760 wrote to memory of 2596 1760 plog.exe 29 PID 1760 wrote to memory of 2596 1760 plog.exe 29 PID 2596 wrote to memory of 2508 2596 plog.exe 30 PID 2596 wrote to memory of 2508 2596 plog.exe 30 PID 2596 wrote to memory of 2508 2596 plog.exe 30 PID 2596 wrote to memory of 2508 2596 plog.exe 30 PID 2508 wrote to memory of 2600 2508 plog.exe 31 PID 2508 wrote to memory of 2600 2508 plog.exe 31 PID 2508 wrote to memory of 2600 2508 plog.exe 31 PID 2508 wrote to memory of 2600 2508 plog.exe 31 PID 2600 wrote to memory of 2484 2600 plog.exe 32 PID 2600 wrote to memory of 2484 2600 plog.exe 32 PID 2600 wrote to memory of 2484 2600 plog.exe 32 PID 2600 wrote to memory of 2484 2600 plog.exe 32 PID 2484 wrote to memory of 2532 2484 plog.exe 33 PID 2484 wrote to memory of 2532 2484 plog.exe 33 PID 2484 wrote to memory of 2532 2484 plog.exe 33 PID 2484 wrote to memory of 2532 2484 plog.exe 33 PID 2532 wrote to memory of 2400 2532 plog.exe 34 PID 2532 wrote to memory of 2400 2532 plog.exe 34 PID 2532 wrote to memory of 2400 2532 plog.exe 34 PID 2532 wrote to memory of 2400 2532 plog.exe 34 PID 2400 wrote to memory of 2984 2400 plog.exe 35 PID 2400 wrote to memory of 2984 2400 plog.exe 35 PID 2400 wrote to memory of 2984 2400 plog.exe 35 PID 2400 wrote to memory of 2984 2400 plog.exe 35 PID 2984 wrote to memory of 2672 2984 plog.exe 36 PID 2984 wrote to memory of 2672 2984 plog.exe 36 PID 2984 wrote to memory of 2672 2984 plog.exe 36 PID 2984 wrote to memory of 2672 2984 plog.exe 36 PID 2672 wrote to memory of 2680 2672 plog.exe 37 PID 2672 wrote to memory of 2680 2672 plog.exe 37 PID 2672 wrote to memory of 2680 2672 plog.exe 37 PID 2672 wrote to memory of 2680 2672 plog.exe 37 PID 2680 wrote to memory of 2028 2680 plog.exe 38 PID 2680 wrote to memory of 2028 2680 plog.exe 38 PID 2680 wrote to memory of 2028 2680 plog.exe 38 PID 2680 wrote to memory of 2028 2680 plog.exe 38 PID 2028 wrote to memory of 2308 2028 plog.exe 39 PID 2028 wrote to memory of 2308 2028 plog.exe 39 PID 2028 wrote to memory of 2308 2028 plog.exe 39 PID 2028 wrote to memory of 2308 2028 plog.exe 39 PID 2308 wrote to memory of 1552 2308 plog.exe 40 PID 2308 wrote to memory of 1552 2308 plog.exe 40 PID 2308 wrote to memory of 1552 2308 plog.exe 40 PID 2308 wrote to memory of 1552 2308 plog.exe 40 PID 1552 wrote to memory of 1072 1552 plog.exe 41 PID 1552 wrote to memory of 1072 1552 plog.exe 41 PID 1552 wrote to memory of 1072 1552 plog.exe 41 PID 1552 wrote to memory of 1072 1552 plog.exe 41 PID 1072 wrote to memory of 568 1072 plog.exe 42 PID 1072 wrote to memory of 568 1072 plog.exe 42 PID 1072 wrote to memory of 568 1072 plog.exe 42 PID 1072 wrote to memory of 568 1072 plog.exe 42 PID 568 wrote to memory of 2356 568 plog.exe 43 PID 568 wrote to memory of 2356 568 plog.exe 43 PID 568 wrote to memory of 2356 568 plog.exe 43 PID 568 wrote to memory of 2356 568 plog.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb1ed66915bff236bd93218863d05dda.exe"C:\Users\Admin\AppData\Local\Temp\cb1ed66915bff236bd93218863d05dda.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2356 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:804 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:2668 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:2408 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2692 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:1956 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2972 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2992 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2748 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:2268 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:1400 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:1824 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:944 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
PID:1408 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe33⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2848 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1752 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2312 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1044 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe37⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe38⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2136 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2728 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1760 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2880 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1904 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2496 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2580 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2520 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2588 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2196 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2528 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2424 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2388 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe52⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2416 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2348 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1596 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1924 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1864 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1588 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1448 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2028 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1716 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1600 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe63⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2656 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1368 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe66⤵
- Drops file in Windows directory
PID:804 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe67⤵PID:2820
-
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe68⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:2408 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe69⤵
- Drops file in Windows directory
PID:2692 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe70⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1956 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe71⤵
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe72⤵PID:1084
-
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe73⤵
- Drops file in Windows directory
PID:2264 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe74⤵
- Drops file in System32 directory
PID:2456 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe75⤵PID:1788
-
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe76⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1668 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe77⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:2232 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe78⤵
- Drops file in Windows directory
PID:1748 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe79⤵
- Drops file in Windows directory
PID:768 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe80⤵
- Drops file in Windows directory
PID:552 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe81⤵
- Drops file in Windows directory
PID:1352 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe82⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:2320 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe83⤵PID:2828
-
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe84⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1512 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe85⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1680 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe86⤵PID:1044
-
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe87⤵PID:2920
-
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe88⤵
- Drops file in System32 directory
PID:1140 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe89⤵
- Drops file in Windows directory
PID:2152 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe90⤵
- Drops file in System32 directory
PID:2164 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe91⤵
- Drops file in Windows directory
PID:2592 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe92⤵PID:2980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49B
MD532ef43c0ff7c19c471f26f0adf79552f
SHA16b95614e9f517433b069514c30fe28c63b700704
SHA256aefd2987974a7604fcfd13fa48ad624a5c0f94b93c83d208f7c56785c0b68f00
SHA512dcf34d3b4def6ae2822f63493652adc57cb79a6a7430aae8438571e4425c1643818094aac3832d8d470b46783da984addc336c581bb4806cc56e3c909524aa09
-
Filesize
616KB
MD5cb1ed66915bff236bd93218863d05dda
SHA1203b5e01cd8e696971e817768bdbd0c4ea6dbebb
SHA256d008c9e8f618b47e4808d729d9104dbbdd238351a58f4b6071eff47be8467323
SHA512e6481682ce4cd185b6177516b80f78d2b1715eb79f33a37e724fad3ed6138e30f9fedbf6c33a25ddec4ec94e927aa6c368cfc05ba04fa1291841ce56bb987109
-
Filesize
539KB
MD5f634eb7912311cdfa5726bbbba893f41
SHA1b6edd96d85b5a31e9393e6dfba0f78651afc5c6e
SHA256d5b8add07dbe776f478b745e8eceafb65fb61c16faefe88b7229ed4a18641e60
SHA5127affba1bac448d176731f14e537a3bf7491d129ccaad19e67fb19cc34f2e70154e43f356010e92340d306f3dda145fbdc7eff8d97c039c7ae90fa5f331b6db29
-
Filesize
616KB
MD50a4971ac367c7baf0373662420df5f7d
SHA105d90654dabad979b3788e1db762301f5eaf6f64
SHA25683b887b536eb4bbc60355692350dbb5d963682c7d999009ee5a87763d17df0e4
SHA512453e599cdad99ef2edfb511e4bd3f01d306559305e4e249c5cec51bf55afb32d2e69b01e1a5a7580e17b76f44937d50b2f08ebfea1a4b654c45207bab3e5d882
-
Filesize
398KB
MD556c5d3dbf859c74e8305e01d575f12ed
SHA1faa1ab0fd8284f156bc7741750dd586303a69597
SHA2561138de9f8fdab6487e7c98c9d893a62c16164c5503556382e7d795a6e9a34cac
SHA512ab48934d3ee53e335361333b6e69563f710ecea195cd39d357f5d1791d711ace0d504c91adc72177893efaffb371db883b8eef1152b59abd773199638241105d
-
Filesize
616KB
MD58413da5160cf6afaec25fbba0704a713
SHA1a45651633338deda396fc8703eda9334de88d641
SHA2569cef63e1bc1658070f5ff3b81638c2968bef33cf3d028a4c10335d781d61db76
SHA512ec4c5ee7a4f82b15ed1ef28bd2cc4e06c38032e6c3da2264a78f1a8625b4ad79f30835bed9329fb4c58e70015078ac9cb3b8d9b5ee9ae1164b6b0cd837d65a80