Analysis Overview
SHA256
90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0
Threat Level: Known bad
The file 90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0 was found to be: Known bad.
Malicious Activity Summary
Modifies visiblity of hidden/system files in Explorer
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Adds Run key to start application
Enumerates physical storage devices
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-07 23:22
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-07 23:22
Reported
2024-04-07 23:25
Platform
win7-20240221-en
Max time kernel
150s
Max time network
120s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\leaviu.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\leaviu.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /f" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /a" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /c" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /x" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /q" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /l" | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /w" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /v" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /h" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /e" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /g" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /y" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /r" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /j" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /l" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /k" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /d" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /p" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /n" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /z" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /m" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /u" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /t" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /i" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /o" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /b" | C:\Users\Admin\leaviu.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\leaviu = "C:\\Users\\Admin\\leaviu.exe /s" | C:\Users\Admin\leaviu.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | N/A |
| N/A | N/A | C:\Users\Admin\leaviu.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2012 wrote to memory of 1984 | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | C:\Users\Admin\leaviu.exe |
| PID 2012 wrote to memory of 1984 | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | C:\Users\Admin\leaviu.exe |
| PID 2012 wrote to memory of 1984 | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | C:\Users\Admin\leaviu.exe |
| PID 2012 wrote to memory of 1984 | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | C:\Users\Admin\leaviu.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe
"C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe"
C:\Users\Admin\leaviu.exe
"C:\Users\Admin\leaviu.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ns1.spansearcher.net | udp |
| US | 8.8.8.8:53 | ns1.spinsearcher.org | udp |
| US | 8.8.8.8:53 | ns1.player1352.net | udp |
| US | 8.8.8.8:53 | ns1.player1352.org | udp |
Files
C:\Users\Admin\leaviu.exe
| MD5 | d692988f7a88952636bb54b1a5e9aaef |
| SHA1 | 7bed4678c3afcf98f60fcea397f44f3d81ba770b |
| SHA256 | 59dd2fb43628a6c79e90ee115ebd922dec9fc34395bcafd28af6b69b5e503534 |
| SHA512 | 73ad1c6ec9d65b3045c2f7fa855cac01967fad98eda46d92e30ddcd455f7cfb076efe01e0847863303e76815b34eba5551b3e869be666a263800e83f3d7c7b65 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-07 23:22
Reported
2024-04-07 23:25
Platform
win10v2004-20240226-en
Max time kernel
149s
Max time network
131s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\hajur.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\hajur.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /m" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /d" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /c" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /s" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /p" | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /e" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /g" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /u" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /v" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /j" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /l" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /o" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /q" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /b" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /z" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /a" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /t" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /p" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /x" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /i" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /y" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /r" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /w" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /n" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /h" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /k" | C:\Users\Admin\hajur.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hajur = "C:\\Users\\Admin\\hajur.exe /f" | C:\Users\Admin\hajur.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | N/A |
| N/A | N/A | C:\Users\Admin\hajur.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2188 wrote to memory of 2124 | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | C:\Users\Admin\hajur.exe |
| PID 2188 wrote to memory of 2124 | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | C:\Users\Admin\hajur.exe |
| PID 2188 wrote to memory of 2124 | N/A | C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe | C:\Users\Admin\hajur.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe
"C:\Users\Admin\AppData\Local\Temp\90dfa1053e87c34c6f0348cfdf179c4830cd0cdcebbcb793f9759c7f80b701a0.exe"
C:\Users\Admin\hajur.exe
"C:\Users\Admin\hajur.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ns1.spansearcher.net | udp |
| US | 8.8.8.8:53 | ns1.spinsearcher.org | udp |
| US | 8.8.8.8:53 | ns1.player1352.net | udp |
| US | 8.8.8.8:53 | ns1.player1352.org | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 159.113.53.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 249.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
Files
C:\Users\Admin\hajur.exe
| MD5 | 32e6b441e0fa98c578a0f91e872a49ed |
| SHA1 | b03f9245bc6265326ba199f09b14268790fac420 |
| SHA256 | 16b32f283145a9eb16c8c4b04128efc47f8d75e1441353cb72eac3c4759d6c52 |
| SHA512 | e68145f32cdb26baa9d384f7f6226a95f89282950a522708cfd25658a42f4474ec0b552fd09f7049b206e3bf4ebfef454911501919ca49bd130301b4a4d204d4 |