Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
df90957ba6f50984691db34c361ed270.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
df90957ba6f50984691db34c361ed270.exe
Resource
win10v2004-20240226-en
General
-
Target
df90957ba6f50984691db34c361ed270.exe
-
Size
268KB
-
MD5
df90957ba6f50984691db34c361ed270
-
SHA1
321cdf217c65310da42ba359b69c74335b26c752
-
SHA256
32747ca9866755b8012b5f1d808eb1448ae9546ecb9f02f649744d0c9d11a101
-
SHA512
de44ebe4afd2a756053c29b02e570fd76daf8827ba8f8a2a64a0d5a135926e19a62fa595b1d4cc23e184acb7e4f805ff6d0c390b1bcf8ee17bbb5074b9e506d6
-
SSDEEP
3072:ZYUb5QoJ4g+Ri+Zj6Iz1ZdW4SrO7FSVpuJOW:ZY7xh6SZI4z7FSVpuJh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2684 cmd.exe -
Executes dropped EXE 60 IoCs
pid Process 2648 wrv.exe 2784 wtkrlfm.exe 1220 wxpsfsa.exe 1604 wimq.exe 1040 wiirqe.exe 2916 waeojc.exe 2260 wcxxlsk.exe 1760 wrfd.exe 2556 wrvtump.exe 360 wrtmid.exe 1592 wad.exe 2768 wiuoe.exe 2732 wdefjbn.exe 1072 whuqkol.exe 1996 wtveclb.exe 1664 wemwkd.exe 1196 wbsgu.exe 2084 wnynwu.exe 1712 waaspg.exe 1976 wxvr.exe 2204 wcsfj.exe 1084 wrspq.exe 456 whajoc.exe 1256 wdhsb.exe 2892 wcrhxdh.exe 1780 wxxokg.exe 2340 wsgwmgale.exe 2304 wtinakp.exe 360 wodgk.exe 1452 wenbw.exe 2352 wnryjr.exe 2572 wbtlbpgqo.exe 1556 wvlfsswqh.exe 1884 wsroewd.exe 2984 wbnlrtn.exe 1760 wtvv.exe 2312 wwpfo.exe 1548 wnhryvo.exe 1840 wdwnk.exe 1088 wslplbwv.exe 1480 wodheenw.exe 2976 wfdsltim.exe 1668 wrsuuo.exe 1456 wwbgje.exe 2400 wrspyc.exe 2968 wbeo.exe 2440 wsal.exe 840 wqtjtysq.exe 2780 wpsnysve.exe 988 wehhpleuf.exe 2240 wemabbo.exe 1696 wlnra.exe 2924 wbuy.exe 2068 wralu.exe 1956 wvnkolan.exe 2104 wivbrgww.exe 352 wbbynm.exe 2428 wfqxu.exe 1888 wdytegpr.exe 2552 wgpfg.exe -
Loads dropped DLL 64 IoCs
pid Process 2088 df90957ba6f50984691db34c361ed270.exe 2088 df90957ba6f50984691db34c361ed270.exe 2088 df90957ba6f50984691db34c361ed270.exe 2088 df90957ba6f50984691db34c361ed270.exe 2648 wrv.exe 2648 wrv.exe 2648 wrv.exe 2648 wrv.exe 2784 wtkrlfm.exe 2784 wtkrlfm.exe 2784 wtkrlfm.exe 2784 wtkrlfm.exe 1220 wxpsfsa.exe 1220 wxpsfsa.exe 1220 wxpsfsa.exe 1220 wxpsfsa.exe 1604 wimq.exe 1604 wimq.exe 1604 wimq.exe 1604 wimq.exe 1040 wiirqe.exe 1040 wiirqe.exe 1040 wiirqe.exe 1040 wiirqe.exe 2916 waeojc.exe 2916 waeojc.exe 2916 waeojc.exe 2916 waeojc.exe 2260 wcxxlsk.exe 2260 wcxxlsk.exe 2260 wcxxlsk.exe 2260 wcxxlsk.exe 1760 wrfd.exe 1760 wrfd.exe 1760 wrfd.exe 1760 wrfd.exe 2556 wrvtump.exe 2556 wrvtump.exe 2556 wrvtump.exe 2556 wrvtump.exe 360 wrtmid.exe 360 wrtmid.exe 360 wrtmid.exe 360 wrtmid.exe 1592 wad.exe 1592 wad.exe 1592 wad.exe 1592 wad.exe 2768 wiuoe.exe 2768 wiuoe.exe 2768 wiuoe.exe 2768 wiuoe.exe 2732 wdefjbn.exe 2732 wdefjbn.exe 2732 wdefjbn.exe 2732 wdefjbn.exe 1072 whuqkol.exe 1072 whuqkol.exe 1072 whuqkol.exe 1072 whuqkol.exe 1996 wtveclb.exe 1996 wtveclb.exe 1996 wtveclb.exe 1996 wtveclb.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wrspq.exe wcsfj.exe File created C:\Windows\SysWOW64\whajoc.exe wrspq.exe File created C:\Windows\SysWOW64\wcxxlsk.exe waeojc.exe File created C:\Windows\SysWOW64\whuqkol.exe wdefjbn.exe File opened for modification C:\Windows\SysWOW64\wtveclb.exe whuqkol.exe File opened for modification C:\Windows\SysWOW64\waaspg.exe wnynwu.exe File created C:\Windows\SysWOW64\wnryjr.exe wenbw.exe File opened for modification C:\Windows\SysWOW64\wtvv.exe wbnlrtn.exe File created C:\Windows\SysWOW64\wqtjtysq.exe wsal.exe File opened for modification C:\Windows\SysWOW64\wxpsfsa.exe wtkrlfm.exe File created C:\Windows\SysWOW64\wad.exe wrtmid.exe File opened for modification C:\Windows\SysWOW64\wcrhxdh.exe wdhsb.exe File created C:\Windows\SysWOW64\wxxokg.exe wcrhxdh.exe File opened for modification C:\Windows\SysWOW64\wodgk.exe wtinakp.exe File opened for modification C:\Windows\SysWOW64\wenbw.exe wodgk.exe File created C:\Windows\SysWOW64\wralu.exe wbuy.exe File created C:\Windows\SysWOW64\wxpsfsa.exe wtkrlfm.exe File opened for modification C:\Windows\SysWOW64\wrtmid.exe wrvtump.exe File opened for modification C:\Windows\SysWOW64\wbnlrtn.exe wsroewd.exe File opened for modification C:\Windows\SysWOW64\wfqxu.exe wbbynm.exe File opened for modification C:\Windows\SysWOW64\wimq.exe wxpsfsa.exe File created C:\Windows\SysWOW64\waeojc.exe wiirqe.exe File opened for modification C:\Windows\SysWOW64\wrfd.exe wcxxlsk.exe File opened for modification C:\Windows\SysWOW64\wiuoe.exe wad.exe File created C:\Windows\SysWOW64\wrv.exe df90957ba6f50984691db34c361ed270.exe File opened for modification C:\Windows\SysWOW64\waeojc.exe wiirqe.exe File created C:\Windows\SysWOW64\wtveclb.exe whuqkol.exe File created C:\Windows\SysWOW64\wehhpleuf.exe wpsnysve.exe File opened for modification C:\Windows\SysWOW64\wemabbo.exe wehhpleuf.exe File opened for modification C:\Windows\SysWOW64\wbuy.exe wlnra.exe File opened for modification C:\Windows\SysWOW64\wralu.exe wbuy.exe File opened for modification C:\Windows\SysWOW64\whuqkol.exe wdefjbn.exe File opened for modification C:\Windows\SysWOW64\wdhsb.exe whajoc.exe File created C:\Windows\SysWOW64\wodgk.exe wtinakp.exe File opened for modification C:\Windows\SysWOW64\wnhryvo.exe wwpfo.exe File opened for modification C:\Windows\SysWOW64\wcxxlsk.exe waeojc.exe File opened for modification C:\Windows\SysWOW64\wnynwu.exe wbsgu.exe File created C:\Windows\SysWOW64\waaspg.exe wnynwu.exe File opened for modification C:\Windows\SysWOW64\wvlfsswqh.exe wbtlbpgqo.exe File created C:\Windows\SysWOW64\wcrhxdh.exe wdhsb.exe File opened for modification C:\Windows\SysWOW64\wlnra.exe wemabbo.exe File opened for modification C:\Windows\SysWOW64\wehhpleuf.exe wpsnysve.exe File created C:\Windows\SysWOW64\wbuy.exe wlnra.exe File created C:\Windows\SysWOW64\wemwkd.exe wtveclb.exe File created C:\Windows\SysWOW64\wsgwmgale.exe wxxokg.exe File created C:\Windows\SysWOW64\wenbw.exe wodgk.exe File created C:\Windows\SysWOW64\wvlfsswqh.exe wbtlbpgqo.exe File opened for modification C:\Windows\SysWOW64\wqtjtysq.exe wsal.exe File opened for modification C:\Windows\SysWOW64\wpsnysve.exe wqtjtysq.exe File opened for modification C:\Windows\SysWOW64\wtkrlfm.exe wrv.exe File opened for modification C:\Windows\SysWOW64\wrvtump.exe wrfd.exe File opened for modification C:\Windows\SysWOW64\wbsgu.exe wemwkd.exe File opened for modification C:\Windows\SysWOW64\wxxokg.exe wcrhxdh.exe File created C:\Windows\SysWOW64\wiirqe.exe wimq.exe File created C:\Windows\SysWOW64\wnhryvo.exe wwpfo.exe File opened for modification C:\Windows\SysWOW64\wrv.exe df90957ba6f50984691db34c361ed270.exe File created C:\Windows\SysWOW64\wtkrlfm.exe wrv.exe File created C:\Windows\SysWOW64\wimq.exe wxpsfsa.exe File created C:\Windows\SysWOW64\wdytegpr.exe wfqxu.exe File created C:\Windows\SysWOW64\wrtmid.exe wrvtump.exe File created C:\Windows\SysWOW64\wsroewd.exe wvlfsswqh.exe File created C:\Windows\SysWOW64\wodheenw.exe wslplbwv.exe File created C:\Windows\SysWOW64\wbsgu.exe wemwkd.exe File opened for modification C:\Windows\SysWOW64\wxvr.exe waaspg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 808 2340 WerFault.exe 116 2992 1480 WerFault.exe 160 1148 988 WerFault.exe 189 1952 2188 WerFault.exe 207 2776 2104 WerFault.exe 215 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2648 2088 df90957ba6f50984691db34c361ed270.exe 29 PID 2088 wrote to memory of 2648 2088 df90957ba6f50984691db34c361ed270.exe 29 PID 2088 wrote to memory of 2648 2088 df90957ba6f50984691db34c361ed270.exe 29 PID 2088 wrote to memory of 2648 2088 df90957ba6f50984691db34c361ed270.exe 29 PID 2088 wrote to memory of 2684 2088 df90957ba6f50984691db34c361ed270.exe 30 PID 2088 wrote to memory of 2684 2088 df90957ba6f50984691db34c361ed270.exe 30 PID 2088 wrote to memory of 2684 2088 df90957ba6f50984691db34c361ed270.exe 30 PID 2088 wrote to memory of 2684 2088 df90957ba6f50984691db34c361ed270.exe 30 PID 2648 wrote to memory of 2784 2648 wrv.exe 32 PID 2648 wrote to memory of 2784 2648 wrv.exe 32 PID 2648 wrote to memory of 2784 2648 wrv.exe 32 PID 2648 wrote to memory of 2784 2648 wrv.exe 32 PID 2648 wrote to memory of 360 2648 wrv.exe 33 PID 2648 wrote to memory of 360 2648 wrv.exe 33 PID 2648 wrote to memory of 360 2648 wrv.exe 33 PID 2648 wrote to memory of 360 2648 wrv.exe 33 PID 2784 wrote to memory of 1220 2784 wtkrlfm.exe 35 PID 2784 wrote to memory of 1220 2784 wtkrlfm.exe 35 PID 2784 wrote to memory of 1220 2784 wtkrlfm.exe 35 PID 2784 wrote to memory of 1220 2784 wtkrlfm.exe 35 PID 2784 wrote to memory of 1636 2784 wtkrlfm.exe 36 PID 2784 wrote to memory of 1636 2784 wtkrlfm.exe 36 PID 2784 wrote to memory of 1636 2784 wtkrlfm.exe 36 PID 2784 wrote to memory of 1636 2784 wtkrlfm.exe 36 PID 1220 wrote to memory of 1604 1220 wxpsfsa.exe 39 PID 1220 wrote to memory of 1604 1220 wxpsfsa.exe 39 PID 1220 wrote to memory of 1604 1220 wxpsfsa.exe 39 PID 1220 wrote to memory of 1604 1220 wxpsfsa.exe 39 PID 1220 wrote to memory of 3024 1220 wxpsfsa.exe 40 PID 1220 wrote to memory of 3024 1220 wxpsfsa.exe 40 PID 1220 wrote to memory of 3024 1220 wxpsfsa.exe 40 PID 1220 wrote to memory of 3024 1220 wxpsfsa.exe 40 PID 1604 wrote to memory of 1040 1604 wimq.exe 43 PID 1604 wrote to memory of 1040 1604 wimq.exe 43 PID 1604 wrote to memory of 1040 1604 wimq.exe 43 PID 1604 wrote to memory of 1040 1604 wimq.exe 43 PID 1604 wrote to memory of 1112 1604 wimq.exe 44 PID 1604 wrote to memory of 1112 1604 wimq.exe 44 PID 1604 wrote to memory of 1112 1604 wimq.exe 44 PID 1604 wrote to memory of 1112 1604 wimq.exe 44 PID 1040 wrote to memory of 2916 1040 wiirqe.exe 46 PID 1040 wrote to memory of 2916 1040 wiirqe.exe 46 PID 1040 wrote to memory of 2916 1040 wiirqe.exe 46 PID 1040 wrote to memory of 2916 1040 wiirqe.exe 46 PID 1040 wrote to memory of 1996 1040 wiirqe.exe 47 PID 1040 wrote to memory of 1996 1040 wiirqe.exe 47 PID 1040 wrote to memory of 1996 1040 wiirqe.exe 47 PID 1040 wrote to memory of 1996 1040 wiirqe.exe 47 PID 2916 wrote to memory of 2260 2916 waeojc.exe 50 PID 2916 wrote to memory of 2260 2916 waeojc.exe 50 PID 2916 wrote to memory of 2260 2916 waeojc.exe 50 PID 2916 wrote to memory of 2260 2916 waeojc.exe 50 PID 2916 wrote to memory of 2056 2916 waeojc.exe 51 PID 2916 wrote to memory of 2056 2916 waeojc.exe 51 PID 2916 wrote to memory of 2056 2916 waeojc.exe 51 PID 2916 wrote to memory of 2056 2916 waeojc.exe 51 PID 2260 wrote to memory of 1760 2260 wcxxlsk.exe 53 PID 2260 wrote to memory of 1760 2260 wcxxlsk.exe 53 PID 2260 wrote to memory of 1760 2260 wcxxlsk.exe 53 PID 2260 wrote to memory of 1760 2260 wcxxlsk.exe 53 PID 2260 wrote to memory of 2716 2260 wcxxlsk.exe 54 PID 2260 wrote to memory of 2716 2260 wcxxlsk.exe 54 PID 2260 wrote to memory of 2716 2260 wcxxlsk.exe 54 PID 2260 wrote to memory of 2716 2260 wcxxlsk.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\df90957ba6f50984691db34c361ed270.exe"C:\Users\Admin\AppData\Local\Temp\df90957ba6f50984691db34c361ed270.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\wrv.exe"C:\Windows\system32\wrv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\wtkrlfm.exe"C:\Windows\system32\wtkrlfm.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\wxpsfsa.exe"C:\Windows\system32\wxpsfsa.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\wimq.exe"C:\Windows\system32\wimq.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\wiirqe.exe"C:\Windows\system32\wiirqe.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\waeojc.exe"C:\Windows\system32\waeojc.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\wcxxlsk.exe"C:\Windows\system32\wcxxlsk.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\wrfd.exe"C:\Windows\system32\wrfd.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1760 -
C:\Windows\SysWOW64\wrvtump.exe"C:\Windows\system32\wrvtump.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2556 -
C:\Windows\SysWOW64\wrtmid.exe"C:\Windows\system32\wrtmid.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:360 -
C:\Windows\SysWOW64\wad.exe"C:\Windows\system32\wad.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\wiuoe.exe"C:\Windows\system32\wiuoe.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768 -
C:\Windows\SysWOW64\wdefjbn.exe"C:\Windows\system32\wdefjbn.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2732 -
C:\Windows\SysWOW64\whuqkol.exe"C:\Windows\system32\whuqkol.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1072 -
C:\Windows\SysWOW64\wtveclb.exe"C:\Windows\system32\wtveclb.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1996 -
C:\Windows\SysWOW64\wemwkd.exe"C:\Windows\system32\wemwkd.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1664 -
C:\Windows\SysWOW64\wbsgu.exe"C:\Windows\system32\wbsgu.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1196 -
C:\Windows\SysWOW64\wnynwu.exe"C:\Windows\system32\wnynwu.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\waaspg.exe"C:\Windows\system32\waaspg.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1712 -
C:\Windows\SysWOW64\wxvr.exe"C:\Windows\system32\wxvr.exe"21⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\wcsfj.exe"C:\Windows\system32\wcsfj.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2204 -
C:\Windows\SysWOW64\wrspq.exe"C:\Windows\system32\wrspq.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\whajoc.exe"C:\Windows\system32\whajoc.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:456 -
C:\Windows\SysWOW64\wdhsb.exe"C:\Windows\system32\wdhsb.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1256 -
C:\Windows\SysWOW64\wcrhxdh.exe"C:\Windows\system32\wcrhxdh.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\wxxokg.exe"C:\Windows\system32\wxxokg.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1780 -
C:\Windows\SysWOW64\wsgwmgale.exe"C:\Windows\system32\wsgwmgale.exe"28⤵
- Executes dropped EXE
PID:2340 -
C:\Windows\SysWOW64\wtinakp.exe"C:\Windows\system32\wtinakp.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2304 -
C:\Windows\SysWOW64\wodgk.exe"C:\Windows\system32\wodgk.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:360 -
C:\Windows\SysWOW64\wenbw.exe"C:\Windows\system32\wenbw.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1452 -
C:\Windows\SysWOW64\wnryjr.exe"C:\Windows\system32\wnryjr.exe"32⤵
- Executes dropped EXE
PID:2352 -
C:\Windows\SysWOW64\wbtlbpgqo.exe"C:\Windows\system32\wbtlbpgqo.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2572 -
C:\Windows\SysWOW64\wvlfsswqh.exe"C:\Windows\system32\wvlfsswqh.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\wsroewd.exe"C:\Windows\system32\wsroewd.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1884 -
C:\Windows\SysWOW64\wbnlrtn.exe"C:\Windows\system32\wbnlrtn.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2984 -
C:\Windows\SysWOW64\wtvv.exe"C:\Windows\system32\wtvv.exe"37⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\wwpfo.exe"C:\Windows\system32\wwpfo.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2312 -
C:\Windows\SysWOW64\wnhryvo.exe"C:\Windows\system32\wnhryvo.exe"39⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\wdwnk.exe"C:\Windows\system32\wdwnk.exe"40⤵
- Executes dropped EXE
PID:1840 -
C:\Windows\SysWOW64\wslplbwv.exe"C:\Windows\system32\wslplbwv.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1088 -
C:\Windows\SysWOW64\wodheenw.exe"C:\Windows\system32\wodheenw.exe"42⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\wfdsltim.exe"C:\Windows\system32\wfdsltim.exe"43⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\wrsuuo.exe"C:\Windows\system32\wrsuuo.exe"44⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\wwbgje.exe"C:\Windows\system32\wwbgje.exe"45⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\wrspyc.exe"C:\Windows\system32\wrspyc.exe"46⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\wbeo.exe"C:\Windows\system32\wbeo.exe"47⤵
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\wsal.exe"C:\Windows\system32\wsal.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\wqtjtysq.exe"C:\Windows\system32\wqtjtysq.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\wpsnysve.exe"C:\Windows\system32\wpsnysve.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\wehhpleuf.exe"C:\Windows\system32\wehhpleuf.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\wemabbo.exe"C:\Windows\system32\wemabbo.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2240 -
C:\Windows\SysWOW64\wlnra.exe"C:\Windows\system32\wlnra.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1696 -
C:\Windows\SysWOW64\wbuy.exe"C:\Windows\system32\wbuy.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2924 -
C:\Windows\SysWOW64\wralu.exe"C:\Windows\system32\wralu.exe"55⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\wmnsogmdr.exe"C:\Windows\system32\wmnsogmdr.exe"56⤵PID:2188
-
C:\Windows\SysWOW64\wvnkolan.exe"C:\Windows\system32\wvnkolan.exe"57⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\wivbrgww.exe"C:\Windows\system32\wivbrgww.exe"58⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\wbbynm.exe"C:\Windows\system32\wbbynm.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:352 -
C:\Windows\SysWOW64\wfqxu.exe"C:\Windows\system32\wfqxu.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2428 -
C:\Windows\SysWOW64\wdytegpr.exe"C:\Windows\system32\wdytegpr.exe"61⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\wgpfg.exe"C:\Windows\system32\wgpfg.exe"62⤵
- Executes dropped EXE
PID:2552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wdytegpr.exe"62⤵PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wfqxu.exe"61⤵PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wbbynm.exe"60⤵PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wivbrgww.exe"59⤵PID:836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 4859⤵
- Program crash
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wvnkolan.exe"58⤵PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wmnsogmdr.exe"57⤵PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 79657⤵
- Program crash
PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wralu.exe"56⤵PID:972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wbuy.exe"55⤵PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wlnra.exe"54⤵PID:992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wemabbo.exe"53⤵PID:1000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wehhpleuf.exe"52⤵PID:480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 63252⤵
- Program crash
PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wpsnysve.exe"51⤵PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wqtjtysq.exe"50⤵PID:1112
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wsal.exe"49⤵PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wbeo.exe"48⤵PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrspyc.exe"47⤵PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wwbgje.exe"46⤵PID:1432
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrsuuo.exe"45⤵PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wfdsltim.exe"44⤵PID:1812
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wodheenw.exe"43⤵PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 4843⤵
- Program crash
PID:2992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wslplbwv.exe"42⤵PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wdwnk.exe"41⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wnhryvo.exe"40⤵PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wwpfo.exe"39⤵PID:1012
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wtvv.exe"38⤵PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wbnlrtn.exe"37⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wsroewd.exe"36⤵PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wvlfsswqh.exe"35⤵PID:2916
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wbtlbpgqo.exe"34⤵PID:780
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wnryjr.exe"33⤵PID:664
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wenbw.exe"32⤵PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wodgk.exe"31⤵PID:2120
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wtinakp.exe"30⤵PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wsgwmgale.exe"29⤵PID:2812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 4829⤵
- Program crash
PID:808
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wxxokg.exe"28⤵PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wcrhxdh.exe"27⤵PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wdhsb.exe"26⤵PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\whajoc.exe"25⤵PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrspq.exe"24⤵PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wcsfj.exe"23⤵PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wxvr.exe"22⤵PID:1236
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\waaspg.exe"21⤵PID:972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wnynwu.exe"20⤵PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wbsgu.exe"19⤵PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wemwkd.exe"18⤵PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wtveclb.exe"17⤵PID:2360
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\whuqkol.exe"16⤵PID:772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wdefjbn.exe"15⤵PID:1792
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wiuoe.exe"14⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wad.exe"13⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrtmid.exe"12⤵PID:1464
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrvtump.exe"11⤵PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrfd.exe"10⤵PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wcxxlsk.exe"9⤵PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\waeojc.exe"8⤵PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wiirqe.exe"7⤵PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wimq.exe"6⤵PID:1112
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wxpsfsa.exe"5⤵PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wtkrlfm.exe"4⤵PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrv.exe"3⤵PID:360
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\df90957ba6f50984691db34c361ed270.exe"2⤵
- Deletes itself
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD54624ead032053216204897bc3aa0f4a1
SHA11df9e268ee8ffd87fac568a9d61b4f1f71e67c5f
SHA25623ba6954fabb098604b02742ab913ed2397fa499ccdcdc679498775c8cd38594
SHA512dad403817b124ed9a6d623fd4632bdbbb55fe11fc255855f31926d97f1a4a062261e2023a8ae3c7ce8992e135376a8d6c1c382981d606d3f21928da4b3b36074
-
Filesize
268KB
MD5aff1be9e3f74d954b4888ddcfb6126af
SHA11f83a9a63b393b0f37fd773056c433d94a15dffb
SHA256f245db4cf3b337820ebac08493621fa4cee916eb912f32ebd41a5b181e732fe4
SHA51292038a5a0a90fe1836922d65cf6c892ec3c45873a53c59e1e4449c3d35af07050de943cb09fa3a952e29bcea48adca14808ac16abb2154ff596f5184b91b3aa8
-
Filesize
268KB
MD5d478019c617120b71be6b00c2b150dda
SHA1dd3807ee64b0a62046aaab85cdbaaf0e845a6b4c
SHA256124fa097c0261dc694758a9046ac860628a57465d2b799e38bb759986f856c0f
SHA512d4c3936639296a268432f58542617cfc2363ef346ea0e8eba52c1e87e3ef8aa31940e4e3ccefaa6e6b02049245f90c8e9fc01fcacf0823873e3b73b6da990fbf
-
Filesize
268KB
MD507f61d729e4bdf2dcbf3fcdf366be5f5
SHA1f64cdfa58a767b6e4602c8363ec3ba94844f88a0
SHA256d33c2bd94270cdfd37d9ea162f020cabdf3d770644bb37c0f84cda674311533f
SHA51223389f14660ea91807fc339dfc1646d54abddef399cc8bb16c9186949a7acb46caebb0485a768e0b1c02c726959711017de47e58380c73a5ef0cf68921d8e050
-
Filesize
268KB
MD512897e01f5042ad3c1ff4dcc819fd81d
SHA13bd8cdb8dcd69d145531ffa48f2b6604a751e285
SHA256f78ceef78dabc5246c197f49461ba7f83aeb771ffc5c3c6fd6b820ce924fd399
SHA512a8f481dc9ed0e9771a1fd7cf4eb51b59530e447621ce9bb9b7eb1034b8a99312e243a9376fe88bda826889e9379dbdffabf0baf6b21d9fd8cae68b580201c3fc
-
Filesize
268KB
MD5a7cbf0ec6666c48ace4e1ba3518acab2
SHA1c984437d72945adba2c33b7d4d0f3d3ffcdf7cd2
SHA2565c1b8388a8ac653aeec13f0ccc8944e23836ac782b3925bd1d1a3d10a17789a5
SHA5126610f859b25f64bee61cbf3e534825dc9d19e5a3aa507d5d79eebd6427e9b64e4df0ec1827118090c47aa8aa8d3cbaae10242df0bb7b8d89f163d1456c4d0167
-
Filesize
268KB
MD55992eb458d6c614592e24a8b5c4db541
SHA1407031692dd845b66b9af894d3cab9eeb0325d6a
SHA256f2f96fdf37825b2234d893d0940c852c6ceff989c922d42576dfca58466b884a
SHA51295ce962c92090c417bccbf7815f1e9b604556f6b352a63f7beef19e5a7f431cbb9c7a4f8804ca500ef51af98cf59ffaf565f1b825a1f61e294c9a5a7bd0d41d0
-
Filesize
268KB
MD5492c1ecd076ef46675911d42ae2197ee
SHA19570985818294bc9b53b3d7036243713334b6cc0
SHA256f59a89aa6ff864a8ab3dafeb311a699d8de85264edffc256af6cd5dc5eeb36dd
SHA51296ca30855623216b4e6ec83f83972f75a02dcaca52fe2f7599484e0b182cacc4c5c7321ca3c98f8cd01adddc04780f31f1f1313e890237a3feabe6e2d5baeb0a
-
Filesize
268KB
MD5b128eaeb676671e4564918cabefcf0ce
SHA1be128ed8ff3c3727b090114441db80b59f5542a7
SHA256309aefef351cd3e9c4a0d96e8e2ac687aa0e56bf65856da446c0e96b02543d73
SHA512e0c1a281c3830773a181c854e827bb4a7448ad5e6f2445e9f432e975d64b8d20baddaaa18a607480334ed1024f83925b82376695dcdda1090f14fcfe10a74940
-
Filesize
268KB
MD5fb474cfd970e441300aa564dde573e74
SHA1058d887caeb228a06efca5e37d6ff2bf2805564d
SHA2561b2c7f75b04c0759278343724266cd5045e3e1b51238c8f356f3dc59e8dfabe6
SHA512cf44fb912c4e5c60ccf0d1bffacf09b4a2e6fb32bf4aedbf4ef23d964ac1d912f743fa11cd31aed30055a723521a1522f9ccb717ab84091973c6137e08b87093
-
Filesize
268KB
MD5adbf5e68b4b74cab704f3ba94162ca63
SHA12dad50ea5f820d44039c81132f6957365320b2d3
SHA2561923dabe8988dc0f3ccfd12360b32c2a427c5c78e907c42f29ed3d91a71c6536
SHA512d3a8a06eca45696348c1f3c9cef581d5cc8c80cf417c26a130227dedd99ea310f9c5eb0d713051a8de0f36821acea048a3333f7c202e76b76789619ebd06bd6d
-
Filesize
268KB
MD544ba73b3a33150f0c00798f3482f293c
SHA1e3fa9af8bf77b53019e204669f1402d710b8ade9
SHA256eb6daf3893c6700b400f0bc18d5501ac30db5dad1eb4e696462ab15bf91582e7
SHA512fc2926bd7d2dbb8593e9f84ca84d2be49d74b6e779c2be8863a33616e792bba6d08f6fc1c50b371b692ac5171fb29364d3e0ec1f09f46bf1cb10478da97a5a85