Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe
Resource
win10v2004-20240226-en
General
-
Target
d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe
-
Size
365KB
-
MD5
f562386d1f4e671ce46e91bc4dc14f5f
-
SHA1
124aca41c4f964ae7d238f9acd43bbe77d6b23a4
-
SHA256
d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62
-
SHA512
cec50876d60ae29de348f5a674c124dee8b34cdd36a794a89b5cc8ec26d32a5fc41fad91aa8da82f9ac1a6c2695a4a5fdf4223e2d069135460fbd5e5c04ad6ef
-
SSDEEP
6144:9rTfUHeeSKOS9ccFKk3Y9t9YmlTVQ8zTz9zzLzzfA5WHTIMIKA:9n8yN0Mr8m9VQ8zTz9zzLzzomA
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 55 IoCs
resource yara_rule behavioral1/files/0x000b000000015d0f-1.dat UPX behavioral1/memory/1724-12-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1724-11-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-16-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2688-28-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2768-36-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2476-39-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2612-41-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2452-47-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2612-46-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2452-48-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2520-51-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2520-52-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2912-54-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2912-55-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2192-57-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2192-59-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2728-32-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/952-61-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1904-68-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1916-69-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/836-73-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2536-24-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-78-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/836-76-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1744-79-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1568-85-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1492-87-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1828-89-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1568-82-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1828-91-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2012-22-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2012-18-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1992-15-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1272-94-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2936-98-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2936-103-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2772-106-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2772-108-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2136-112-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-115-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1496-122-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-129-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-130-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-137-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-138-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-146-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-147-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-153-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-154-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-162-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-163-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-174-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-175-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/1880-187-0x0000000000400000-0x00000000016A8000-memory.dmp UPX -
Executes dropped EXE 15 IoCs
pid Process 1880 Isass.exe 1992 Isass.exe 2536 Isass.exe 2728 Isass.exe 2476 Isass.exe 2452 Isass.exe 2912 Isass.exe 952 Isass.exe 1916 Isass.exe 1744 Isass.exe 1492 Isass.exe 1272 Isass.exe 2772 Isass.exe 1496 Isass.exe 888 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe -
Loads dropped DLL 22 IoCs
pid Process 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2012 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2012 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2688 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2688 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2768 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2768 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2612 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2520 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2192 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1904 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 836 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1568 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1828 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2936 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2136 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1496 Isass.exe 1880 Isass.exe 1880 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1880 Isass.exe 1992 Isass.exe 1992 Isass.exe 1992 Isass.exe 2012 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2536 Isass.exe 2536 Isass.exe 2536 Isass.exe 2688 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2728 Isass.exe 2728 Isass.exe 2728 Isass.exe 2768 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2476 Isass.exe 2476 Isass.exe 2476 Isass.exe 2612 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2452 Isass.exe 2452 Isass.exe 2452 Isass.exe 2520 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2912 Isass.exe 2912 Isass.exe 2912 Isass.exe 2192 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 952 Isass.exe 952 Isass.exe 952 Isass.exe 1904 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1916 Isass.exe 1916 Isass.exe 1916 Isass.exe 836 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1744 Isass.exe 1744 Isass.exe 1744 Isass.exe 1568 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1492 Isass.exe 1492 Isass.exe 1492 Isass.exe 1828 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1272 Isass.exe 1272 Isass.exe 1272 Isass.exe 2936 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 2772 Isass.exe 2772 Isass.exe 2772 Isass.exe 2136 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 1496 Isass.exe 1496 Isass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1880 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 28 PID 1724 wrote to memory of 1880 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 28 PID 1724 wrote to memory of 1880 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 28 PID 1724 wrote to memory of 1880 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 28 PID 1724 wrote to memory of 1992 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 29 PID 1724 wrote to memory of 1992 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 29 PID 1724 wrote to memory of 1992 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 29 PID 1724 wrote to memory of 1992 1724 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 29 PID 1992 wrote to memory of 2012 1992 Isass.exe 30 PID 1992 wrote to memory of 2012 1992 Isass.exe 30 PID 1992 wrote to memory of 2012 1992 Isass.exe 30 PID 1992 wrote to memory of 2012 1992 Isass.exe 30 PID 2012 wrote to memory of 2536 2012 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 31 PID 2012 wrote to memory of 2536 2012 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 31 PID 2012 wrote to memory of 2536 2012 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 31 PID 2012 wrote to memory of 2536 2012 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 31 PID 2536 wrote to memory of 2688 2536 Isass.exe 32 PID 2536 wrote to memory of 2688 2536 Isass.exe 32 PID 2536 wrote to memory of 2688 2536 Isass.exe 32 PID 2536 wrote to memory of 2688 2536 Isass.exe 32 PID 2688 wrote to memory of 2728 2688 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 33 PID 2688 wrote to memory of 2728 2688 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 33 PID 2688 wrote to memory of 2728 2688 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 33 PID 2688 wrote to memory of 2728 2688 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 33 PID 2728 wrote to memory of 2768 2728 Isass.exe 34 PID 2728 wrote to memory of 2768 2728 Isass.exe 34 PID 2728 wrote to memory of 2768 2728 Isass.exe 34 PID 2728 wrote to memory of 2768 2728 Isass.exe 34 PID 2768 wrote to memory of 2476 2768 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 35 PID 2768 wrote to memory of 2476 2768 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 35 PID 2768 wrote to memory of 2476 2768 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 35 PID 2768 wrote to memory of 2476 2768 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 35 PID 2476 wrote to memory of 2612 2476 Isass.exe 36 PID 2476 wrote to memory of 2612 2476 Isass.exe 36 PID 2476 wrote to memory of 2612 2476 Isass.exe 36 PID 2476 wrote to memory of 2612 2476 Isass.exe 36 PID 2612 wrote to memory of 2452 2612 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 37 PID 2612 wrote to memory of 2452 2612 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 37 PID 2612 wrote to memory of 2452 2612 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 37 PID 2612 wrote to memory of 2452 2612 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 37 PID 2452 wrote to memory of 2520 2452 Isass.exe 38 PID 2452 wrote to memory of 2520 2452 Isass.exe 38 PID 2452 wrote to memory of 2520 2452 Isass.exe 38 PID 2452 wrote to memory of 2520 2452 Isass.exe 38 PID 2520 wrote to memory of 2912 2520 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 39 PID 2520 wrote to memory of 2912 2520 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 39 PID 2520 wrote to memory of 2912 2520 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 39 PID 2520 wrote to memory of 2912 2520 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 39 PID 2912 wrote to memory of 2192 2912 Isass.exe 40 PID 2912 wrote to memory of 2192 2912 Isass.exe 40 PID 2912 wrote to memory of 2192 2912 Isass.exe 40 PID 2912 wrote to memory of 2192 2912 Isass.exe 40 PID 2192 wrote to memory of 952 2192 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 41 PID 2192 wrote to memory of 952 2192 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 41 PID 2192 wrote to memory of 952 2192 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 41 PID 2192 wrote to memory of 952 2192 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 41 PID 952 wrote to memory of 1904 952 Isass.exe 42 PID 952 wrote to memory of 1904 952 Isass.exe 42 PID 952 wrote to memory of 1904 952 Isass.exe 42 PID 952 wrote to memory of 1904 952 Isass.exe 42 PID 1904 wrote to memory of 1916 1904 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 43 PID 1904 wrote to memory of 1916 1904 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 43 PID 1904 wrote to memory of 1916 1904 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 43 PID 1904 wrote to memory of 1916 1904 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"5⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"7⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"9⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"11⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"13⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"15⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"17⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"19⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"21⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1828 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"23⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"25⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"27⤵
- Executes dropped EXE
PID:888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe
Filesize143KB
MD5c1d5e48111f4984433e6318466ee1bce
SHA1d3379a99f504b38794f491e4fff6c77cfab53eac
SHA256dfdf187874d7368a92bbebb68c8cdc5c183af47d954b5b27ddaeca6774ae4822
SHA512dfce97a9dc92521c2d576b3d21071cb04df4a6d927676a2b95abc0093b67a044aab8d3f8612a4a70f9128cf2555d3a554a1c3f941647a64d30298ab28bba7441
-
Filesize
211KB
MD5316c3aac279387566ebbb8710973b794
SHA1c35f10e34d5a828135081fa9de77486381a04ac3
SHA256a42a5704fa9ee36ac3fdba04ba78bf4a453d25d6b9bbbd0791cf2cc5f2dfb7c4
SHA512c8c7a2614a0d9e9b35898849f54a78955cb875f35202a82bfd444a31aa19ddece4211fa68a75afe904ba76d2543d3d7315d50a8ec5d8fe6a9b6b33a6a37ef9aa