Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 00:51
Behavioral task
behavioral1
Sample
ejecutable.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ejecutable.exe
Resource
win10v2004-20240226-en
General
-
Target
ejecutable.exe
-
Size
9.8MB
-
MD5
fd8d4e6fc696f111119fd0bdb615005e
-
SHA1
2cee425a78c2c30db1db92ecab39a91afe1e0321
-
SHA256
9ce775734b47d214e97b659997419b6f08ed83988d3f6e853b8ee2f0306a0a4c
-
SHA512
91eed4cae6a2c14dbb70bf6e026d7789b534557e3141a7f6698f406fc0dde8be5235799fdc7618c630ae6c1cf84d8042ed0579ccb6fb969789df7a88eb245fe9
-
SSDEEP
98304:t5i+bn565ESeSgza8U1S9UpjXOfEQ502MSQeVlIonoOvv7NpF8K:t5/bnA5neSgzXU8+E50moOvv7Nr8K
Malware Config
Signatures
-
Contacts a large (40563) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/files/0x000b00000002322a-15.dat xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Loads dropped DLL 3 IoCs
pid Process 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2932 sc.exe 5112 sc.exe 2952 sc.exe 2760 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3336 NETSTAT.EXE -
Modifies registry class 42 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe 2864 ejecutable.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3336 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1920 OpenWith.exe 2264 OpenWith.exe 1248 OpenWith.exe 3596 OpenWith.exe 4016 OpenWith.exe 3856 OpenWith.exe 2260 OpenWith.exe 1168 OpenWith.exe 2892 OpenWith.exe 1044 OpenWith.exe 2156 OpenWith.exe 1516 OpenWith.exe 4828 OpenWith.exe 5092 OpenWith.exe 5024 OpenWith.exe 3764 OpenWith.exe 2348 OpenWith.exe 4044 OpenWith.exe 2476 OpenWith.exe 3144 OpenWith.exe 2488 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 1476 2864 ejecutable.exe 91 PID 2864 wrote to memory of 1476 2864 ejecutable.exe 91 PID 1476 wrote to memory of 2932 1476 cmd.exe 92 PID 1476 wrote to memory of 2932 1476 cmd.exe 92 PID 2864 wrote to memory of 1036 2864 ejecutable.exe 93 PID 2864 wrote to memory of 1036 2864 ejecutable.exe 93 PID 1036 wrote to memory of 5112 1036 cmd.exe 94 PID 1036 wrote to memory of 5112 1036 cmd.exe 94 PID 2864 wrote to memory of 4984 2864 ejecutable.exe 95 PID 2864 wrote to memory of 4984 2864 ejecutable.exe 95 PID 4984 wrote to memory of 2952 4984 cmd.exe 96 PID 4984 wrote to memory of 2952 4984 cmd.exe 96 PID 2864 wrote to memory of 4568 2864 ejecutable.exe 97 PID 2864 wrote to memory of 4568 2864 ejecutable.exe 97 PID 4568 wrote to memory of 2760 4568 cmd.exe 98 PID 4568 wrote to memory of 2760 4568 cmd.exe 98 PID 2864 wrote to memory of 1112 2864 ejecutable.exe 99 PID 2864 wrote to memory of 1112 2864 ejecutable.exe 99 PID 1112 wrote to memory of 3336 1112 cmd.exe 100 PID 1112 wrote to memory of 3336 1112 cmd.exe 100 PID 1112 wrote to memory of 4644 1112 cmd.exe 101 PID 1112 wrote to memory of 4644 1112 cmd.exe 101 PID 2864 wrote to memory of 4780 2864 ejecutable.exe 102 PID 2864 wrote to memory of 4780 2864 ejecutable.exe 102 PID 2864 wrote to memory of 4580 2864 ejecutable.exe 106 PID 2864 wrote to memory of 4580 2864 ejecutable.exe 106 PID 2864 wrote to memory of 944 2864 ejecutable.exe 110 PID 2864 wrote to memory of 944 2864 ejecutable.exe 110 PID 2864 wrote to memory of 3728 2864 ejecutable.exe 112 PID 2864 wrote to memory of 3728 2864 ejecutable.exe 112 PID 2864 wrote to memory of 432 2864 ejecutable.exe 115 PID 2864 wrote to memory of 432 2864 ejecutable.exe 115 PID 2864 wrote to memory of 2980 2864 ejecutable.exe 117 PID 2864 wrote to memory of 2980 2864 ejecutable.exe 117 PID 2864 wrote to memory of 1736 2864 ejecutable.exe 121 PID 2864 wrote to memory of 1736 2864 ejecutable.exe 121 PID 2864 wrote to memory of 856 2864 ejecutable.exe 123 PID 2864 wrote to memory of 856 2864 ejecutable.exe 123 PID 2864 wrote to memory of 4348 2864 ejecutable.exe 125 PID 2864 wrote to memory of 4348 2864 ejecutable.exe 125 PID 2864 wrote to memory of 2240 2864 ejecutable.exe 127 PID 2864 wrote to memory of 2240 2864 ejecutable.exe 127 PID 2864 wrote to memory of 4504 2864 ejecutable.exe 129 PID 2864 wrote to memory of 4504 2864 ejecutable.exe 129 PID 2864 wrote to memory of 5116 2864 ejecutable.exe 131 PID 2864 wrote to memory of 5116 2864 ejecutable.exe 131 PID 2864 wrote to memory of 1248 2864 ejecutable.exe 133 PID 2864 wrote to memory of 1248 2864 ejecutable.exe 133 PID 2864 wrote to memory of 4084 2864 ejecutable.exe 135 PID 2864 wrote to memory of 4084 2864 ejecutable.exe 135 PID 2864 wrote to memory of 3892 2864 ejecutable.exe 137 PID 2864 wrote to memory of 3892 2864 ejecutable.exe 137 PID 2864 wrote to memory of 4508 2864 ejecutable.exe 139 PID 2864 wrote to memory of 4508 2864 ejecutable.exe 139 PID 2864 wrote to memory of 4584 2864 ejecutable.exe 141 PID 2864 wrote to memory of 4584 2864 ejecutable.exe 141 PID 2864 wrote to memory of 3372 2864 ejecutable.exe 143 PID 2864 wrote to memory of 3372 2864 ejecutable.exe 143 PID 2864 wrote to memory of 2928 2864 ejecutable.exe 145 PID 2864 wrote to memory of 2928 2864 ejecutable.exe 145 PID 2864 wrote to memory of 1044 2864 ejecutable.exe 147 PID 2864 wrote to memory of 1044 2864 ejecutable.exe 147 PID 2864 wrote to memory of 344 2864 ejecutable.exe 149 PID 2864 wrote to memory of 344 2864 ejecutable.exe 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\ejecutable.exe"C:\Users\Admin\AppData\Local\Temp\ejecutable.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\cmd.execmd.exe /c "sc stop npf"2⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\sc.exesc stop npf3⤵
- Launches sc.exe
PID:2932
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "sc delete npf"2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\system32\sc.exesc delete npf3⤵
- Launches sc.exe
PID:5112
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "sc create npf type= kernel start= auto binpath= C:\Users\Admin\AppData\Local\Temp\npf.sys"2⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\system32\sc.exesc create npf type= kernel start= auto binpath= C:\Users\Admin\AppData\Local\Temp\npf.sys3⤵
- Launches sc.exe
PID:2952
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "sc start npf"2⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\system32\sc.exesc start npf3⤵
- Launches sc.exe
PID:2760
-
-
-
C:\Windows\system32\cmd.execmd.exe /c "netstat -ano | findstr TCP"2⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\NETSTAT.EXEnetstat -ano3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\system32\findstr.exefindstr TCP3⤵PID:4644
-
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:4780
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:4580
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:944
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:3728
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:432
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:2980
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:1736
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:856
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:4348
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:2240
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:4504
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:5116
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:1248
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:4084
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:3892
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:4508
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:4584
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:3372
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:2928
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:1044
-
-
C:\Windows\system32\cmd.execmd.exe /c start C:\Users\Admin\AppData\Local\Temp\m6nk9h\kthreaddk2⤵
- Modifies registry class
PID:344
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1920
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2264
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1248
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3596
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4016
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3856
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2260
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1168
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2892
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1044
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2156
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1516
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4828
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5092
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5024
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3764
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2348
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4044
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2476
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3144
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5899a5bf1669610cdb78d322ac8d9358b
SHA180a2e420b99ffe294a523c6c6d87ed09dfc8d82b
SHA256ab3cce674f5216895fd26a073771f82b05d4c8b214a89f0f288a59774a06b14b
SHA51241f2459793ac04e433d8471780e770417afac499dc3c5413877d4a4499656c9669c069d24e638d0aaf43af178a763acb656ffd34d710eb5e3c94682db1559056
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
1KB
MD58afbb1177ab70f9d24dacd22a6793ee4
SHA1b7ba0a4bd964868922143bedb93470202c0bfef4
SHA25654f0d371f9918c81e3ce7a557d6da1ac4639995c5a6e409822f0e496d3a1d290
SHA5122d05fb6e7e39b499b27aed4a7adf77fce1dcedc335d969be157dec91a78ed7b839ba50887d5a6de1b6f3635ae7d35dc6cd1ec064590ef76fe3ae8443fdaa5624
-
Filesize
2.0MB
MD5a7013a2c7fd3a6168a7c0d9eed825c32
SHA1a3b6cf6090a425466606125aa881fdf56c1c2a67
SHA256a2f3ecd329d2713855257bf922b8a092cbb1193327ba197351804275286df7dd
SHA512e2e6e447806adb5d27c77f8dc32772fc49ba5532e255e1a38e92a404efccbc8f3d820d4d674a51968e5c3c1079cb834253232bf13e6ff9d437c7d0e2551ba49d
-
Filesize
361KB
MD5a672f1cf00fa5ac3f4f59577f77d8c86
SHA1b68e64401d91c75cafa810086a35cd0838c61a4b
SHA25635aab6caaaf1720a4d888ae0de9e2a8e19604f3ea0e4dd882c3eeae4f39af117
SHA512a566e7571437be765279c915dd6e13f72203eff0dc3838a154fc137ed828e05644d650fd8432d1fb4c1e1d84ee00ef9bde90225c68c3ca8a5da349065e7ebfd6