Analysis
-
max time kernel
160s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
cb1ed66915bff236bd93218863d05dda.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb1ed66915bff236bd93218863d05dda.exe
Resource
win10v2004-20240226-en
General
-
Target
cb1ed66915bff236bd93218863d05dda.exe
-
Size
616KB
-
MD5
cb1ed66915bff236bd93218863d05dda
-
SHA1
203b5e01cd8e696971e817768bdbd0c4ea6dbebb
-
SHA256
d008c9e8f618b47e4808d729d9104dbbdd238351a58f4b6071eff47be8467323
-
SHA512
e6481682ce4cd185b6177516b80f78d2b1715eb79f33a37e724fad3ed6138e30f9fedbf6c33a25ddec4ec94e927aa6c368cfc05ba04fa1291841ce56bb987109
-
SSDEEP
12288:qso7xlyGjQVVHxAt8PySuBxoBvAdLGVSXh/O:qpxZ8kAvA6SRW
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4688 plog.exe 4600 plog.exe 400 plog.exe 3560 plog.exe 1520 plog.exe 3920 plog.exe 2940 plog.exe 2764 plog.exe 2736 plog.exe 3044 plog.exe 1856 plog.exe 4968 plog.exe 1908 plog.exe 368 plog.exe 412 plog.exe 4708 plog.exe 4248 plog.exe 3376 plog.exe 512 plog.exe 4440 plog.exe 2936 plog.exe 468 plog.exe 640 plog.exe 668 plog.exe 2920 plog.exe 1216 plog.exe 4744 plog.exe 2932 plog.exe 432 plog.exe 1988 plog.exe 2568 plog.exe 1372 plog.exe 1288 plog.exe 3376 plog.exe 1752 plog.exe 4808 plog.exe 3044 plog.exe 4836 plog.exe 4876 plog.exe 3660 plog.exe 4548 plog.exe 3476 plog.exe 3044 plog.exe 1080 plog.exe 4864 plog.exe 4484 plog.exe 1908 plog.exe 2772 plog.exe 2912 plog.exe 1640 plog.exe 1876 plog.exe 116 plog.exe 4800 plog.exe 320 plog.exe 756 plog.exe 3632 plog.exe 1856 plog.exe 4672 plog.exe 4876 plog.exe 1192 plog.exe 672 plog.exe 4344 plog.exe 4932 plog.exe 3248 plog.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe cb1ed66915bff236bd93218863d05dda.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\swon4.exe plog.exe File created C:\Windows\SysWOW64\plog.exe plog.exe File opened for modification C:\Windows\SysWOW64\swon4.exe plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini plog.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe File opened for modification C:\Windows\sk.exe plog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 4688 1988 cb1ed66915bff236bd93218863d05dda.exe 97 PID 1988 wrote to memory of 4688 1988 cb1ed66915bff236bd93218863d05dda.exe 97 PID 1988 wrote to memory of 4688 1988 cb1ed66915bff236bd93218863d05dda.exe 97 PID 4688 wrote to memory of 4600 4688 plog.exe 98 PID 4688 wrote to memory of 4600 4688 plog.exe 98 PID 4688 wrote to memory of 4600 4688 plog.exe 98 PID 4600 wrote to memory of 400 4600 plog.exe 100 PID 4600 wrote to memory of 400 4600 plog.exe 100 PID 4600 wrote to memory of 400 4600 plog.exe 100 PID 400 wrote to memory of 3560 400 plog.exe 103 PID 400 wrote to memory of 3560 400 plog.exe 103 PID 400 wrote to memory of 3560 400 plog.exe 103 PID 3560 wrote to memory of 1520 3560 plog.exe 106 PID 3560 wrote to memory of 1520 3560 plog.exe 106 PID 3560 wrote to memory of 1520 3560 plog.exe 106 PID 1520 wrote to memory of 3920 1520 plog.exe 108 PID 1520 wrote to memory of 3920 1520 plog.exe 108 PID 1520 wrote to memory of 3920 1520 plog.exe 108 PID 3920 wrote to memory of 2940 3920 plog.exe 110 PID 3920 wrote to memory of 2940 3920 plog.exe 110 PID 3920 wrote to memory of 2940 3920 plog.exe 110 PID 2940 wrote to memory of 2764 2940 plog.exe 113 PID 2940 wrote to memory of 2764 2940 plog.exe 113 PID 2940 wrote to memory of 2764 2940 plog.exe 113 PID 2764 wrote to memory of 2736 2764 plog.exe 114 PID 2764 wrote to memory of 2736 2764 plog.exe 114 PID 2764 wrote to memory of 2736 2764 plog.exe 114 PID 2736 wrote to memory of 3044 2736 plog.exe 115 PID 2736 wrote to memory of 3044 2736 plog.exe 115 PID 2736 wrote to memory of 3044 2736 plog.exe 115 PID 3044 wrote to memory of 1856 3044 plog.exe 116 PID 3044 wrote to memory of 1856 3044 plog.exe 116 PID 3044 wrote to memory of 1856 3044 plog.exe 116 PID 1856 wrote to memory of 4968 1856 plog.exe 117 PID 1856 wrote to memory of 4968 1856 plog.exe 117 PID 1856 wrote to memory of 4968 1856 plog.exe 117 PID 4968 wrote to memory of 1908 4968 plog.exe 118 PID 4968 wrote to memory of 1908 4968 plog.exe 118 PID 4968 wrote to memory of 1908 4968 plog.exe 118 PID 1908 wrote to memory of 368 1908 plog.exe 119 PID 1908 wrote to memory of 368 1908 plog.exe 119 PID 1908 wrote to memory of 368 1908 plog.exe 119 PID 368 wrote to memory of 412 368 plog.exe 120 PID 368 wrote to memory of 412 368 plog.exe 120 PID 368 wrote to memory of 412 368 plog.exe 120 PID 412 wrote to memory of 4708 412 plog.exe 121 PID 412 wrote to memory of 4708 412 plog.exe 121 PID 412 wrote to memory of 4708 412 plog.exe 121 PID 4708 wrote to memory of 4248 4708 plog.exe 122 PID 4708 wrote to memory of 4248 4708 plog.exe 122 PID 4708 wrote to memory of 4248 4708 plog.exe 122 PID 4248 wrote to memory of 3376 4248 plog.exe 124 PID 4248 wrote to memory of 3376 4248 plog.exe 124 PID 4248 wrote to memory of 3376 4248 plog.exe 124 PID 3376 wrote to memory of 512 3376 plog.exe 125 PID 3376 wrote to memory of 512 3376 plog.exe 125 PID 3376 wrote to memory of 512 3376 plog.exe 125 PID 512 wrote to memory of 4440 512 plog.exe 126 PID 512 wrote to memory of 4440 512 plog.exe 126 PID 512 wrote to memory of 4440 512 plog.exe 126 PID 4440 wrote to memory of 2936 4440 plog.exe 127 PID 4440 wrote to memory of 2936 4440 plog.exe 127 PID 4440 wrote to memory of 2936 4440 plog.exe 127 PID 2936 wrote to memory of 468 2936 plog.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb1ed66915bff236bd93218863d05dda.exe"C:\Users\Admin\AppData\Local\Temp\cb1ed66915bff236bd93218863d05dda.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe14⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe20⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:468 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:640 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:668 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2920 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1216 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4744 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2932 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:432 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1988 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2568 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe33⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1372 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1288 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3376 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1752 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4808 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3044 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4836 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4876 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3660 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe42⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4548 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3476 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3044 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1080 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4864 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4484 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1908 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2772 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2912 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1640 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe52⤵
- Executes dropped EXE
PID:1876 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:116 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe54⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:320 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe56⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe57⤵
- Executes dropped EXE
PID:3632 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1856 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4672 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4876 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1192 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:672 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe63⤵
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4932 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3248 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe66⤵
- Drops file in Windows directory
PID:4720 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe67⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:3388 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe68⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:412 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe69⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1752 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe70⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:4440 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe71⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:4876 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe72⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:4364 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe73⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:2420 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe74⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:3964 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe75⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:3376 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe76⤵PID:4796
-
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe77⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:468 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe78⤵
- Drops file in Windows directory
PID:1688 -
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe79⤵PID:4008
-
C:\Windows\SysWOW64\plog.exeC:\Windows\system32\plog.exe80⤵PID:3648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3528 --field-trial-handle=2256,i,6057863739127169200,6895476048812676039,262144 --variations-seed-version /prefetch:81⤵PID:2312
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49B
MD532ef43c0ff7c19c471f26f0adf79552f
SHA16b95614e9f517433b069514c30fe28c63b700704
SHA256aefd2987974a7604fcfd13fa48ad624a5c0f94b93c83d208f7c56785c0b68f00
SHA512dcf34d3b4def6ae2822f63493652adc57cb79a6a7430aae8438571e4425c1643818094aac3832d8d470b46783da984addc336c581bb4806cc56e3c909524aa09
-
Filesize
616KB
MD5cb1ed66915bff236bd93218863d05dda
SHA1203b5e01cd8e696971e817768bdbd0c4ea6dbebb
SHA256d008c9e8f618b47e4808d729d9104dbbdd238351a58f4b6071eff47be8467323
SHA512e6481682ce4cd185b6177516b80f78d2b1715eb79f33a37e724fad3ed6138e30f9fedbf6c33a25ddec4ec94e927aa6c368cfc05ba04fa1291841ce56bb987109
-
Filesize
616KB
MD5c5b008946f3af6f66312ad2b10467d01
SHA1169390cb60e59afb97943d8d2290b12ba191dabd
SHA256d91d99478b237d7f8f1e7f8047fe22c85e33a8f5c9edf2208967695912acfc23
SHA5126156c3a2381169606782c87f17a1ebb1c1f7818fb494c017acdcdb5f0976a616ef1aa22d0834132d62b442ebeb990c9f497544448fa517366a2ba057a6565493
-
Filesize
79KB
MD538b3bb097c50727c84b2734a23afeda7
SHA1890d15e0d9f55485a27078c642d7b871e1c28e5f
SHA256f3b47f8e443f531e5e730e65736b309b261b297eed02e3a5622f02503191d485
SHA51226b0bad4cd0e6b12bd4f3e844a91464fb8f0c2101c4babdd60affc50e461e6368d1313a12319686f8d7c4e26608b423ee354578851c0fae2c91a4b89ba8feece