Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 22:44
Behavioral task
behavioral1
Sample
669163c950d22460542d4cfce2489c4e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
669163c950d22460542d4cfce2489c4e.exe
Resource
win10v2004-20240226-en
General
-
Target
669163c950d22460542d4cfce2489c4e.exe
-
Size
244KB
-
MD5
669163c950d22460542d4cfce2489c4e
-
SHA1
75dd0ad534f687b1ac0a7e8b52022739d99a97b6
-
SHA256
0c873f499e3fe5d412d7dc61ebaa17fcacf71031ff1521c329b509adb2de236c
-
SHA512
6e233719db3dbeedc40ea0b025968c1758a89642c4847ada333411c3abe40359e324a00caa6d3be84785b0583bf232fb805b9a4c3a0afb34a25dacc7eb0847db
-
SSDEEP
6144:X42FMaP+6+tT/JBnjBE3XwfSZ4sXyzQI6F:IKbGlJBjBEnwxEI6
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 3372 669163c950d22460542d4cfce2489c4e_3202.exe 3104 669163c950d22460542d4cfce2489c4e_3202a.exe 1032 669163c950d22460542d4cfce2489c4e_3202b.exe 4504 669163c950d22460542d4cfce2489c4e_3202c.exe 2888 669163c950d22460542d4cfce2489c4e_3202d.exe 5080 669163c950d22460542d4cfce2489c4e_3202e.exe 4068 669163c950d22460542d4cfce2489c4e_3202f.exe 5048 669163c950d22460542d4cfce2489c4e_3202g.exe 696 669163c950d22460542d4cfce2489c4e_3202h.exe 764 669163c950d22460542d4cfce2489c4e_3202i.exe 3872 669163c950d22460542d4cfce2489c4e_3202j.exe 2972 669163c950d22460542d4cfce2489c4e_3202k.exe 3828 669163c950d22460542d4cfce2489c4e_3202l.exe 4112 669163c950d22460542d4cfce2489c4e_3202m.exe 5112 669163c950d22460542d4cfce2489c4e_3202n.exe 2492 669163c950d22460542d4cfce2489c4e_3202o.exe 2980 669163c950d22460542d4cfce2489c4e_3202p.exe 5008 669163c950d22460542d4cfce2489c4e_3202q.exe 948 669163c950d22460542d4cfce2489c4e_3202r.exe 2628 669163c950d22460542d4cfce2489c4e_3202s.exe 4984 669163c950d22460542d4cfce2489c4e_3202t.exe 3568 669163c950d22460542d4cfce2489c4e_3202u.exe 4032 669163c950d22460542d4cfce2489c4e_3202v.exe 3852 669163c950d22460542d4cfce2489c4e_3202w.exe 1908 669163c950d22460542d4cfce2489c4e_3202x.exe 1924 669163c950d22460542d4cfce2489c4e_3202y.exe -
resource yara_rule behavioral2/memory/4892-0-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/files/0x00080000000231f3-5.dat upx behavioral2/memory/4892-9-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/3104-19-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/3372-25-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1032-36-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2888-48-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/4504-39-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/3104-29-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/3372-15-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/4504-57-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/4068-73-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/5080-66-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2888-63-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/5048-85-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/696-92-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/files/0x0007000000023201-111.dat upx behavioral2/memory/3872-109-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/764-101-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2972-118-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2972-121-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/3828-130-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/4112-132-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/4112-142-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2492-157-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/5112-149-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2492-160-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2980-170-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2980-168-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/4068-167-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/5008-178-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/948-189-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2628-199-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/3872-206-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/4984-208-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/3568-217-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/4032-225-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/3852-238-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1908-244-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1924-248-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/4032-251-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1908-252-0x0000000000400000-0x000000000043C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202p.exe\"" 669163c950d22460542d4cfce2489c4e_3202o.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202d.exe\"" 669163c950d22460542d4cfce2489c4e_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202o.exe\"" 669163c950d22460542d4cfce2489c4e_3202n.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202a.exe\"" 669163c950d22460542d4cfce2489c4e_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202e.exe\"" 669163c950d22460542d4cfce2489c4e_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202v.exe\"" 669163c950d22460542d4cfce2489c4e_3202u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202x.exe\"" 669163c950d22460542d4cfce2489c4e_3202w.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202k.exe\"" 669163c950d22460542d4cfce2489c4e_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202l.exe\"" 669163c950d22460542d4cfce2489c4e_3202k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202w.exe\"" 669163c950d22460542d4cfce2489c4e_3202v.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202g.exe\"" 669163c950d22460542d4cfce2489c4e_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202m.exe\"" 669163c950d22460542d4cfce2489c4e_3202l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202r.exe\"" 669163c950d22460542d4cfce2489c4e_3202q.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202i.exe\"" 669163c950d22460542d4cfce2489c4e_3202h.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202n.exe\"" 669163c950d22460542d4cfce2489c4e_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202y.exe\"" 669163c950d22460542d4cfce2489c4e_3202x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202b.exe\"" 669163c950d22460542d4cfce2489c4e_3202a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202f.exe\"" 669163c950d22460542d4cfce2489c4e_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202h.exe\"" 669163c950d22460542d4cfce2489c4e_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202t.exe\"" 669163c950d22460542d4cfce2489c4e_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202.exe\"" 669163c950d22460542d4cfce2489c4e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202c.exe\"" 669163c950d22460542d4cfce2489c4e_3202b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202j.exe\"" 669163c950d22460542d4cfce2489c4e_3202i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202s.exe\"" 669163c950d22460542d4cfce2489c4e_3202r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202q.exe\"" 669163c950d22460542d4cfce2489c4e_3202p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\669163c950d22460542d4cfce2489c4e_3202u.exe\"" 669163c950d22460542d4cfce2489c4e_3202t.exe -
Modifies registry class 54 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202f.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202l.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202h.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202u.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202p.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202v.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202v.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202g.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202j.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202b.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202d.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202r.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202b.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202y.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202p.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 0c827b3f6e6ff052 669163c950d22460542d4cfce2489c4e_3202w.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 669163c950d22460542d4cfce2489c4e_3202y.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3372 4892 669163c950d22460542d4cfce2489c4e.exe 85 PID 4892 wrote to memory of 3372 4892 669163c950d22460542d4cfce2489c4e.exe 85 PID 4892 wrote to memory of 3372 4892 669163c950d22460542d4cfce2489c4e.exe 85 PID 3372 wrote to memory of 3104 3372 669163c950d22460542d4cfce2489c4e_3202.exe 86 PID 3372 wrote to memory of 3104 3372 669163c950d22460542d4cfce2489c4e_3202.exe 86 PID 3372 wrote to memory of 3104 3372 669163c950d22460542d4cfce2489c4e_3202.exe 86 PID 3104 wrote to memory of 1032 3104 669163c950d22460542d4cfce2489c4e_3202a.exe 87 PID 3104 wrote to memory of 1032 3104 669163c950d22460542d4cfce2489c4e_3202a.exe 87 PID 3104 wrote to memory of 1032 3104 669163c950d22460542d4cfce2489c4e_3202a.exe 87 PID 1032 wrote to memory of 4504 1032 669163c950d22460542d4cfce2489c4e_3202b.exe 88 PID 1032 wrote to memory of 4504 1032 669163c950d22460542d4cfce2489c4e_3202b.exe 88 PID 1032 wrote to memory of 4504 1032 669163c950d22460542d4cfce2489c4e_3202b.exe 88 PID 4504 wrote to memory of 2888 4504 669163c950d22460542d4cfce2489c4e_3202c.exe 90 PID 4504 wrote to memory of 2888 4504 669163c950d22460542d4cfce2489c4e_3202c.exe 90 PID 4504 wrote to memory of 2888 4504 669163c950d22460542d4cfce2489c4e_3202c.exe 90 PID 2888 wrote to memory of 5080 2888 669163c950d22460542d4cfce2489c4e_3202d.exe 91 PID 2888 wrote to memory of 5080 2888 669163c950d22460542d4cfce2489c4e_3202d.exe 91 PID 2888 wrote to memory of 5080 2888 669163c950d22460542d4cfce2489c4e_3202d.exe 91 PID 5080 wrote to memory of 4068 5080 669163c950d22460542d4cfce2489c4e_3202e.exe 92 PID 5080 wrote to memory of 4068 5080 669163c950d22460542d4cfce2489c4e_3202e.exe 92 PID 5080 wrote to memory of 4068 5080 669163c950d22460542d4cfce2489c4e_3202e.exe 92 PID 4068 wrote to memory of 5048 4068 669163c950d22460542d4cfce2489c4e_3202f.exe 93 PID 4068 wrote to memory of 5048 4068 669163c950d22460542d4cfce2489c4e_3202f.exe 93 PID 4068 wrote to memory of 5048 4068 669163c950d22460542d4cfce2489c4e_3202f.exe 93 PID 5048 wrote to memory of 696 5048 669163c950d22460542d4cfce2489c4e_3202g.exe 94 PID 5048 wrote to memory of 696 5048 669163c950d22460542d4cfce2489c4e_3202g.exe 94 PID 5048 wrote to memory of 696 5048 669163c950d22460542d4cfce2489c4e_3202g.exe 94 PID 696 wrote to memory of 764 696 669163c950d22460542d4cfce2489c4e_3202h.exe 95 PID 696 wrote to memory of 764 696 669163c950d22460542d4cfce2489c4e_3202h.exe 95 PID 696 wrote to memory of 764 696 669163c950d22460542d4cfce2489c4e_3202h.exe 95 PID 764 wrote to memory of 3872 764 669163c950d22460542d4cfce2489c4e_3202i.exe 97 PID 764 wrote to memory of 3872 764 669163c950d22460542d4cfce2489c4e_3202i.exe 97 PID 764 wrote to memory of 3872 764 669163c950d22460542d4cfce2489c4e_3202i.exe 97 PID 3872 wrote to memory of 2972 3872 669163c950d22460542d4cfce2489c4e_3202j.exe 98 PID 3872 wrote to memory of 2972 3872 669163c950d22460542d4cfce2489c4e_3202j.exe 98 PID 3872 wrote to memory of 2972 3872 669163c950d22460542d4cfce2489c4e_3202j.exe 98 PID 2972 wrote to memory of 3828 2972 669163c950d22460542d4cfce2489c4e_3202k.exe 99 PID 2972 wrote to memory of 3828 2972 669163c950d22460542d4cfce2489c4e_3202k.exe 99 PID 2972 wrote to memory of 3828 2972 669163c950d22460542d4cfce2489c4e_3202k.exe 99 PID 3828 wrote to memory of 4112 3828 669163c950d22460542d4cfce2489c4e_3202l.exe 100 PID 3828 wrote to memory of 4112 3828 669163c950d22460542d4cfce2489c4e_3202l.exe 100 PID 3828 wrote to memory of 4112 3828 669163c950d22460542d4cfce2489c4e_3202l.exe 100 PID 4112 wrote to memory of 5112 4112 669163c950d22460542d4cfce2489c4e_3202m.exe 101 PID 4112 wrote to memory of 5112 4112 669163c950d22460542d4cfce2489c4e_3202m.exe 101 PID 4112 wrote to memory of 5112 4112 669163c950d22460542d4cfce2489c4e_3202m.exe 101 PID 5112 wrote to memory of 2492 5112 669163c950d22460542d4cfce2489c4e_3202n.exe 102 PID 5112 wrote to memory of 2492 5112 669163c950d22460542d4cfce2489c4e_3202n.exe 102 PID 5112 wrote to memory of 2492 5112 669163c950d22460542d4cfce2489c4e_3202n.exe 102 PID 2492 wrote to memory of 2980 2492 669163c950d22460542d4cfce2489c4e_3202o.exe 103 PID 2492 wrote to memory of 2980 2492 669163c950d22460542d4cfce2489c4e_3202o.exe 103 PID 2492 wrote to memory of 2980 2492 669163c950d22460542d4cfce2489c4e_3202o.exe 103 PID 2980 wrote to memory of 5008 2980 669163c950d22460542d4cfce2489c4e_3202p.exe 104 PID 2980 wrote to memory of 5008 2980 669163c950d22460542d4cfce2489c4e_3202p.exe 104 PID 2980 wrote to memory of 5008 2980 669163c950d22460542d4cfce2489c4e_3202p.exe 104 PID 5008 wrote to memory of 948 5008 669163c950d22460542d4cfce2489c4e_3202q.exe 105 PID 5008 wrote to memory of 948 5008 669163c950d22460542d4cfce2489c4e_3202q.exe 105 PID 5008 wrote to memory of 948 5008 669163c950d22460542d4cfce2489c4e_3202q.exe 105 PID 948 wrote to memory of 2628 948 669163c950d22460542d4cfce2489c4e_3202r.exe 106 PID 948 wrote to memory of 2628 948 669163c950d22460542d4cfce2489c4e_3202r.exe 106 PID 948 wrote to memory of 2628 948 669163c950d22460542d4cfce2489c4e_3202r.exe 106 PID 2628 wrote to memory of 4984 2628 669163c950d22460542d4cfce2489c4e_3202s.exe 107 PID 2628 wrote to memory of 4984 2628 669163c950d22460542d4cfce2489c4e_3202s.exe 107 PID 2628 wrote to memory of 4984 2628 669163c950d22460542d4cfce2489c4e_3202s.exe 107 PID 4984 wrote to memory of 3568 4984 669163c950d22460542d4cfce2489c4e_3202t.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\669163c950d22460542d4cfce2489c4e.exe"C:\Users\Admin\AppData\Local\Temp\669163c950d22460542d4cfce2489c4e.exe"1⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3372 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202a.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202a.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3104 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202b.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202b.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1032 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202c.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202c.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202d.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202d.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202e.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202e.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202f.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202f.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4068 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202g.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202g.exe9⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5048 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202h.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202h.exe10⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:696 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202i.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202i.exe11⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202j.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202j.exe12⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3872 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202k.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202k.exe13⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202l.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202l.exe14⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3828 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202m.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202m.exe15⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4112 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202n.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202n.exe16⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5112 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202o.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202o.exe17⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202p.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202p.exe18⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202q.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202q.exe19⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5008 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202r.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202r.exe20⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:948 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202s.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202s.exe21⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202t.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202t.exe22⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202u.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202u.exe23⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:3568 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202v.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202v.exe24⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4032 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202w.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202w.exe25⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:3852 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202x.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202x.exe26⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:1908 -
\??\c:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202y.exec:\users\admin\appdata\local\temp\669163c950d22460542d4cfce2489c4e_3202y.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5b1f7a77025ec8bd77fdd81103b91f344
SHA1d96274a6fcc340bd85384a50914666cabd3b6f9d
SHA256876dfebd7f7cd4c622ce8d9bfb153764bf2e8299e6cb7d07842c328255fec2fc
SHA5124119a70cfb52f724a87f4255c500bbb49a50d8dc8a7b861a52847eb03d292a0f05c88ce1437156fea4e432d76ef7d29bca376e1b28e100f3d2c6a4aa6c97baf2
-
Filesize
244KB
MD53b09da6a70913c84b87abd7a7a7620d0
SHA163e66199bcf19883b3d4e9d7cd98817df4e01166
SHA2569f304741c912abfbae74e650f0efbee94ca1ccf9fa95b8ab0358c0275ce6a143
SHA512c7565d8508ea6dce323d5cae5ec961989ec35ce9f383131f9ba628ad229851f0e14db85bc20e199d4dfe227f6c732b56ff38a34675a69c8c4ab2a0ed31164ec4