Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
systemutilities.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
systemutilities.msi
Resource
win10v2004-20240226-en
General
-
Target
systemutilities.msi
-
Size
9.9MB
-
MD5
41eda719c231e212e02b2683d36edfa4
-
SHA1
7257a3350b7b856c16b146ff063f002b42903543
-
SHA256
1c6191ddeb164efff30358f7de88022577b6bfe0dfbe0a29ab0f3a2b25637bd2
-
SHA512
1d7382b75d1b12a690d2caeead05c74c3fe83f7888be1bee1bbcfec31d0675967473393b39af87d97ad10c91d2ad6420ad0be8ac58b45d88779ec8e9c4403e77
-
SSDEEP
196608:mkBx8XfML5Nf7QJ91JUREHYtDBkXfML5D9qdSK:mw8XfMvy91JUgyDOXfM1I
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
MsiExec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DiagnosticDriver = "C:\\Users\\Admin\\AppData\\Local\\DiagnosticDriver\\DiagnosticDriver.exe" MsiExec.exe -
Blocklisted process makes network request 3 IoCs
Processes:
msiexec.exemsiexec.exeMsiExec.exeflow pid process 3 2876 msiexec.exe 4 1652 msiexec.exe 8 1724 MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 22 IoCs
Processes:
msiexec.exeMsiExec.exedescription ioc process File created C:\Program Files (x86)\System Utilities\Downloader.exe msiexec.exe File created C:\Program Files (x86)\System Utilities\Newtonsoft.Json.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\Microsoft.WindowsAPICodePack.Shell.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\autorun.bat msiexec.exe File created C:\Program Files (x86)\System Utilities\Installer.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\x86\SQLite.Interop.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\SystemUtilities.exe msiexec.exe File created C:\Program Files (x86)\System Utilities\System.Net.Http.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\x64\SQLite.Interop.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\Downloader.exe.config msiexec.exe File created C:\Program Files (x86)\System Utilities\autorun.exe msiexec.exe File created C:\Program Files (x86)\System Utilities\autorun.exe.config msiexec.exe File created C:\Program Files (x86)\System Utilities\DotNetZip.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\DotNetProjects.DataVisualization.Toolkit.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\System.Data.SQLite.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\Microsoft.WindowsAPICodePack.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\de\SystemUtilities.resources.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\es\SystemUtilities.resources.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\System.Drawing.Common.dll msiexec.exe File created C:\Program Files (x86)\System Utilities\SystemUtilities.pdb msiexec.exe File created C:\Program Files (x86)\System Utilities\SystemUtilities.exe.config msiexec.exe File created C:\Program Files (x86)\System Utilities\Installer.InstallState MsiExec.exe -
Drops file in Windows directory 16 IoCs
Processes:
DrvInst.exemsiexec.exeSystemUtilities.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI61E8.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI64B9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7BD2.tmp msiexec.exe File opened for modification C:\Windows\Installer\f765d3e.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\Installer\f765d3d.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI61A9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI62C4.tmp msiexec.exe File created C:\Windows\Installer\f765d40.msi msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe SystemUtilities.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f765d3d.msi msiexec.exe File created C:\Windows\Installer\f765d3e.ipi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\DisplayIcon.ico SystemUtilities.exe -
Executes dropped EXE 3 IoCs
Processes:
DiagnosticDriver.exeautorun.exeSystemUtilities.exepid process 896 DiagnosticDriver.exe 2960 autorun.exe 2204 SystemUtilities.exe -
Loads dropped DLL 9 IoCs
Processes:
MsiExec.exeMsiExec.exeautorun.exepid process 2352 MsiExec.exe 2352 MsiExec.exe 1724 MsiExec.exe 1724 MsiExec.exe 1724 MsiExec.exe 1724 MsiExec.exe 1724 MsiExec.exe 1724 MsiExec.exe 2960 autorun.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 2876 msiexec.exe Token: SeIncreaseQuotaPrivilege 2876 msiexec.exe Token: SeRestorePrivilege 1652 msiexec.exe Token: SeTakeOwnershipPrivilege 1652 msiexec.exe Token: SeSecurityPrivilege 1652 msiexec.exe Token: SeCreateTokenPrivilege 2876 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2876 msiexec.exe Token: SeLockMemoryPrivilege 2876 msiexec.exe Token: SeIncreaseQuotaPrivilege 2876 msiexec.exe Token: SeMachineAccountPrivilege 2876 msiexec.exe Token: SeTcbPrivilege 2876 msiexec.exe Token: SeSecurityPrivilege 2876 msiexec.exe Token: SeTakeOwnershipPrivilege 2876 msiexec.exe Token: SeLoadDriverPrivilege 2876 msiexec.exe Token: SeSystemProfilePrivilege 2876 msiexec.exe Token: SeSystemtimePrivilege 2876 msiexec.exe Token: SeProfSingleProcessPrivilege 2876 msiexec.exe Token: SeIncBasePriorityPrivilege 2876 msiexec.exe Token: SeCreatePagefilePrivilege 2876 msiexec.exe Token: SeCreatePermanentPrivilege 2876 msiexec.exe Token: SeBackupPrivilege 2876 msiexec.exe Token: SeRestorePrivilege 2876 msiexec.exe Token: SeShutdownPrivilege 2876 msiexec.exe Token: SeDebugPrivilege 2876 msiexec.exe Token: SeAuditPrivilege 2876 msiexec.exe Token: SeSystemEnvironmentPrivilege 2876 msiexec.exe Token: SeChangeNotifyPrivilege 2876 msiexec.exe Token: SeRemoteShutdownPrivilege 2876 msiexec.exe Token: SeUndockPrivilege 2876 msiexec.exe Token: SeSyncAgentPrivilege 2876 msiexec.exe Token: SeEnableDelegationPrivilege 2876 msiexec.exe Token: SeManageVolumePrivilege 2876 msiexec.exe Token: SeImpersonatePrivilege 2876 msiexec.exe Token: SeCreateGlobalPrivilege 2876 msiexec.exe Token: SeCreateTokenPrivilege 2876 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2876 msiexec.exe Token: SeLockMemoryPrivilege 2876 msiexec.exe Token: SeIncreaseQuotaPrivilege 2876 msiexec.exe Token: SeMachineAccountPrivilege 2876 msiexec.exe Token: SeTcbPrivilege 2876 msiexec.exe Token: SeSecurityPrivilege 2876 msiexec.exe Token: SeTakeOwnershipPrivilege 2876 msiexec.exe Token: SeLoadDriverPrivilege 2876 msiexec.exe Token: SeSystemProfilePrivilege 2876 msiexec.exe Token: SeSystemtimePrivilege 2876 msiexec.exe Token: SeProfSingleProcessPrivilege 2876 msiexec.exe Token: SeIncBasePriorityPrivilege 2876 msiexec.exe Token: SeCreatePagefilePrivilege 2876 msiexec.exe Token: SeCreatePermanentPrivilege 2876 msiexec.exe Token: SeBackupPrivilege 2876 msiexec.exe Token: SeRestorePrivilege 2876 msiexec.exe Token: SeShutdownPrivilege 2876 msiexec.exe Token: SeDebugPrivilege 2876 msiexec.exe Token: SeAuditPrivilege 2876 msiexec.exe Token: SeSystemEnvironmentPrivilege 2876 msiexec.exe Token: SeChangeNotifyPrivilege 2876 msiexec.exe Token: SeRemoteShutdownPrivilege 2876 msiexec.exe Token: SeUndockPrivilege 2876 msiexec.exe Token: SeSyncAgentPrivilege 2876 msiexec.exe Token: SeEnableDelegationPrivilege 2876 msiexec.exe Token: SeManageVolumePrivilege 2876 msiexec.exe Token: SeImpersonatePrivilege 2876 msiexec.exe Token: SeCreateGlobalPrivilege 2876 msiexec.exe Token: SeCreateTokenPrivilege 2876 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 2876 msiexec.exe 2876 msiexec.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
msiexec.exemsiexec.exeautorun.exedescription pid process target process PID 1652 wrote to memory of 2352 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 2352 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 2352 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 2352 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 2352 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 2352 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 2352 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 1724 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 1724 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 1724 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 1724 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 1724 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 1724 1652 msiexec.exe MsiExec.exe PID 1652 wrote to memory of 1724 1652 msiexec.exe MsiExec.exe PID 2876 wrote to memory of 896 2876 msiexec.exe DiagnosticDriver.exe PID 2876 wrote to memory of 896 2876 msiexec.exe DiagnosticDriver.exe PID 2876 wrote to memory of 896 2876 msiexec.exe DiagnosticDriver.exe PID 2876 wrote to memory of 2960 2876 msiexec.exe autorun.exe PID 2876 wrote to memory of 2960 2876 msiexec.exe autorun.exe PID 2876 wrote to memory of 2960 2876 msiexec.exe autorun.exe PID 2876 wrote to memory of 2960 2876 msiexec.exe autorun.exe PID 2876 wrote to memory of 2960 2876 msiexec.exe autorun.exe PID 2876 wrote to memory of 2960 2876 msiexec.exe autorun.exe PID 2876 wrote to memory of 2960 2876 msiexec.exe autorun.exe PID 2960 wrote to memory of 2204 2960 autorun.exe SystemUtilities.exe PID 2960 wrote to memory of 2204 2960 autorun.exe SystemUtilities.exe PID 2960 wrote to memory of 2204 2960 autorun.exe SystemUtilities.exe PID 2960 wrote to memory of 2204 2960 autorun.exe SystemUtilities.exe PID 2960 wrote to memory of 2204 2960 autorun.exe SystemUtilities.exe PID 2960 wrote to memory of 2204 2960 autorun.exe SystemUtilities.exe PID 2960 wrote to memory of 2204 2960 autorun.exe SystemUtilities.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\systemutilities.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\System Utilities\autorun.exe"C:\Program Files (x86)\System Utilities\autorun.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\System Utilities\SystemUtilities.exe"C:\Program Files (x86)\System Utilities\SystemUtilities.exe"3⤵
- Drops file in Windows directory
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\DiagnosticDriver\DiagnosticDriver.exe"C:\Users\Admin\AppData\Local\DiagnosticDriver\DiagnosticDriver.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 24A00E9142F85A1722F4C0D0DB89A37D C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A58ED05C7115A1965EB2EBAE05F6D0862⤵
- Adds Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
- Loads dropped DLL
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003D8" "000000000000058C"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\f765d3f.rbsFilesize
130KB
MD57b1b73c71e16edf0eda1d7eb467e88e8
SHA1a10e6febc9b57fc5eca0a011b94380d5a3793421
SHA2562efa3edd6580ed362dd13c2a8e7afa974afec050cbf80743055b6a37e23fb6e3
SHA51299f4cee8462f0dc8f329eb537574a7d4ac75c14c230f088c72145a1c2def2a38d30e14e6c74c483de99a1116d608e6f1ec36ce70a9493a646ee1354269cc9577
-
C:\Program Files (x86)\System Utilities\Installer.dllFilesize
104KB
MD510e3b8cdb5ea0edccc1e0b530aa86728
SHA11130df082a5c4e76996a9cd5f592dab241d1d5b9
SHA25617e36de345871c2af2575ddcbbd0a8f30da15ae2dedeca5a094fb57bd9e0d71a
SHA5125b34f3f7c10b8266f8773c5771f9fa5e1aab8799a8bf0db0fb23e54c047417005a8cf97169e7e7eb825983c59125d4fa07e3157a693d32b15a4de1234bbc11ff
-
C:\Program Files (x86)\System Utilities\SystemUtilities.exeFilesize
1.9MB
MD5cb597b9b40c93cfe74cd8a0775905a38
SHA11111ab2f4dccfd9f333cb234fae8063167d0c9ad
SHA25631934a61620f3a9bf2de6f67fda177991abd1ec78b8cc37f0ce31e263290285e
SHA512eeb19899f0bcdf3256c8e8d4bfa16e0acefa0802c06b4fce64fee1d74c9409571697affa4dce2259433f00fe0a7abf9a77799667bfe86a3f07307db76125b10e
-
C:\Program Files (x86)\System Utilities\SystemUtilities.exe.configFilesize
176B
MD521fa0b1d75c0cc7369f1e735fe90c7a9
SHA1e2d01a1b6aa66e5d3ed575aca79560b014bbfefe
SHA256ad8267122c40d37dcd9d99e1412d763187a1825732f378db8867f3ecf675cf70
SHA51260f6704cd1b3035a1a3403ee3870c7cbc13d6e601172745336ebbffa2ee3dc21785702470ab006c69dbbde0d5525625bb25ade5c641c80c8165fbc46fdad2ad0
-
C:\Program Files (x86)\System Utilities\autorun.exeFilesize
17KB
MD5f0c37252c88c7030cbf9cf30e5fb6048
SHA15ae57e47270aed2ea22dc1c28914442a99f59fc6
SHA25615fa6afa5d20085b42c84ba131abf7553fa538efeaa53d7b7c866ff9e3458bb7
SHA51293a102954dafe1fa883f77ed4b1b6a049f0ef641f97d5b18e739d58b652d2eba20ec85a6123b565cd8954cefca41175a5038fdc00791fd6d81794c58e73c2c1c
-
C:\Program Files (x86)\System Utilities\autorun.exe.configFilesize
189B
MD59dbad5517b46f41dbb0d8780b20ab87e
SHA1ef6aef0b1ea5d01b6e088a8bf2f429773c04ba5e
SHA25647e5a0f101af4151d7f13d2d6bfa9b847d5b5e4a98d1f4674b7c015772746cdf
SHA51243825f5c26c54e1fc5bffcce30caad1449a28c0c9a9432e9ce17d255f8bf6057c1a1002d9471e5b654ab1de08fb6eabf96302cdb3e0fb4b63ba0ff186e903be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59216db24080d1ba77e75eb7f917d59b4
SHA1daef94b8020656275782291658fb06a1574aef66
SHA256e84f34d1dab1270e58d8561c0bf6425de6857fa51c319d2afaa713b67cf38437
SHA512e607736e2f3e6d84e2e0bbb5338faeb810b4d1fda87a907e088ee1594644ab08eda6d53b7cfd47b6b59f9e69cc850e7a3c7f7ca0774282672a31da6549fec950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ecd1469457c534191545d300e8736db7
SHA1e8ab8802d090304afb24f08ffa7269cec1cb66b5
SHA256bae3eeb8d57f2a668cff23b0b7e4b5b05ca5b1f7067d17dfa167e85031c13481
SHA512e3ca5a0c82db91cbd4fc4b453f47890963b04c639496dbdfcb880e2980eb4f1ec2a5a3e8fecf5c30639dcf76eab636f5820c11dda7b3f8ab18b65d5e363bb850
-
C:\Users\Admin\AppData\Local\DiagnosticDriver\Config.txtFilesize
296B
MD523bc669aa82b3cf8c4e8243eae7be74f
SHA1ed4e56a75682046e2d8dc867952b6485435bf800
SHA256984d1ce3ffcc988d27b739f6f41dfd959c617e51c459ed72e08b81c1243004fe
SHA51288f57a851f88a966339ffe565770e310ed804b51c3b0af3261d4729c1a5f3c0f6703a3591eed0104bce5e2be58a42f37b9129d8dfe2f5199417f4aaca4d3da15
-
C:\Users\Admin\AppData\Local\DiagnosticDriver\DiagnosticDriver.exeFilesize
160KB
MD5ab4441a5f23e443a4c1ab843930c586c
SHA1b03227d6915e33bb123548a257951a131f022191
SHA2562670ec42a59de4be83ddb4593fa3ae740864323dcf5e2bd31e341835c00a6446
SHA51272442465a0cca56b6cfc8156ee5625ab6e551a5e2319ecfea7df85b68a531dc1f96830830e0eece24d98e22f2597a339d7a41d016998b0a91a326d547ab41b30
-
C:\Users\Admin\AppData\Local\SystemUtilities\SourcesFilesize
64B
MD5d655a9d947b6a782a09a29614510ab26
SHA11cb8a73db6fb02d89d00870685363c6595382832
SHA2569103a3bf0c3a98076b030e6528714c92306dc27938b18a337c5fbcbeb9cc0e77
SHA51223b7a6171bfb95368c915c0b45d02bd2567cb2fa5b0be1b36f4dc455f6ae5defa91548718d1595dc4352e51e46e665e855e32160b2a7fd488443cb5ef9abb2f0
-
C:\Users\Admin\AppData\Local\Temp\CFG61BF.tmpFilesize
152B
MD568675e0d405c8c76102802fa624eb895
SHA1f8cf5e4a678b4574365057ff91019adeb2f9d4a0
SHA256b839cdd1c3f55651cd4d0e54a679bce5ac60ed7618a7b74bfc8ef8ca311e53ed
SHA512c712c1bc97c9b7282262622367f399c18dd73156acd09c80d151a92c78d4119af9101bf902678b3fe767e9cc9fff95b6aafb858d179c7ff7d2721d1e9171cc3d
-
C:\Users\Admin\AppData\Local\Temp\Cab24E1.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\MSI28BE.tmpFilesize
285KB
MD5b77a2a2768b9cc78a71bbffb9812b978
SHA1b70e27eb446fe1c3bc8ea03dabbee2739a782e04
SHA256f74c97b1a53541b059d3bfafe41a79005ce5065f8210d7de9f1b600dc4e28aa0
SHA512a8b16bc60f8559c78c64ca9e85cd7fd704bba1f55b362465b7accef1bb853d1c9616995a35f972256c57fbe877ce880398ba1fbceaa658604883aa12dcbc4f57
-
C:\Users\Admin\AppData\Local\Temp\Tar2503.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
C:\Users\Admin\AppData\Local\Temp\Tar2674.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Windows\Installer\MSI64B9.tmpFilesize
106KB
MD577c9fc2bca8737f2de4d1d31ac0e385d
SHA14eb76332e4cfb9d217cd42b7a0a31fc1b092be98
SHA256f9f945ef8cf84de18a4c2a5fabf14f425bec19225f99164684ef3f65e9eeadbd
SHA512867b2d0b59c54b909076120f7a92bb7d1d3e86e098dfb0284d50592cf9ed6a03b5c9d24e6bba7d424c67a4b9c0564095a28f744af393fa276053073a7cdbb45f
-
C:\Windows\Installer\f765d3d.msiFilesize
9.9MB
MD541eda719c231e212e02b2683d36edfa4
SHA17257a3350b7b856c16b146ff063f002b42903543
SHA2561c6191ddeb164efff30358f7de88022577b6bfe0dfbe0a29ab0f3a2b25637bd2
SHA5121d7382b75d1b12a690d2caeead05c74c3fe83f7888be1bee1bbcfec31d0675967473393b39af87d97ad10c91d2ad6420ad0be8ac58b45d88779ec8e9c4403e77
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/896-480-0x00000000002A0000-0x00000000002AA000-memory.dmpFilesize
40KB
-
memory/896-577-0x000007FEF4C90000-0x000007FEF567C000-memory.dmpFilesize
9.9MB
-
memory/896-474-0x00000000000B0000-0x00000000000DC000-memory.dmpFilesize
176KB
-
memory/896-477-0x000007FEF4C90000-0x000007FEF567C000-memory.dmpFilesize
9.9MB
-
memory/896-479-0x000000001B1C0000-0x000000001B240000-memory.dmpFilesize
512KB
-
memory/896-481-0x00000000002A0000-0x00000000002AA000-memory.dmpFilesize
40KB
-
memory/1724-439-0x00000000004C0000-0x00000000004DE000-memory.dmpFilesize
120KB
-
memory/2204-659-0x0000000000880000-0x000000000088A000-memory.dmpFilesize
40KB
-
memory/2204-478-0x0000000005070000-0x00000000050B0000-memory.dmpFilesize
256KB
-
memory/2204-476-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/2204-472-0x0000000000E30000-0x0000000001014000-memory.dmpFilesize
1.9MB
-
memory/2204-660-0x0000000000880000-0x000000000088A000-memory.dmpFilesize
40KB
-
memory/2204-663-0x0000000005070000-0x00000000050B0000-memory.dmpFilesize
256KB
-
memory/2204-662-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/2204-664-0x0000000005070000-0x00000000050B0000-memory.dmpFilesize
256KB
-
memory/2204-665-0x0000000000880000-0x000000000088A000-memory.dmpFilesize
40KB
-
memory/2204-666-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/2960-467-0x0000000000A10000-0x0000000000A18000-memory.dmpFilesize
32KB
-
memory/2960-473-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB
-
memory/2960-661-0x0000000074560000-0x0000000074C4E000-memory.dmpFilesize
6.9MB