Analysis
-
max time kernel
30s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe
Resource
win10v2004-20240226-en
General
-
Target
d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe
-
Size
365KB
-
MD5
f562386d1f4e671ce46e91bc4dc14f5f
-
SHA1
124aca41c4f964ae7d238f9acd43bbe77d6b23a4
-
SHA256
d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62
-
SHA512
cec50876d60ae29de348f5a674c124dee8b34cdd36a794a89b5cc8ec26d32a5fc41fad91aa8da82f9ac1a6c2695a4a5fdf4223e2d069135460fbd5e5c04ad6ef
-
SSDEEP
6144:9rTfUHeeSKOS9ccFKk3Y9t9YmlTVQ8zTz9zzLzzfA5WHTIMIKA:9n8yN0Mr8m9VQ8zTz9zzLzzomA
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/files/0x00080000000231d0-2.dat UPX behavioral2/memory/5088-4-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3204-5-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1288-10-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/5088-9-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1288-12-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3108-13-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3108-15-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4016-19-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1204-18-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3204-23-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4956-24-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4016-22-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4956-26-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4616-27-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4616-30-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1216-33-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/5072-32-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1216-36-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/2492-37-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3104-40-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/2492-39-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3104-43-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4868-44-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4868-46-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/464-50-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/2804-53-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4516-56-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/2052-58-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3312-61-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3312-64-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1864-67-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/2028-71-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1560-72-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1560-73-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3244-75-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1020-80-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4472-83-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/2612-86-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3204-87-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1008-90-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4396-93-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1044-97-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/2524-100-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/2264-104-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/432-107-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1744-111-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4960-114-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4172-117-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1592-118-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3928-124-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3204-127-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1884-129-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/992-136-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/944-138-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1224-141-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/4424-144-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3440-146-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/2204-154-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3636-156-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1892-159-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/3412-162-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/5056-166-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral2/memory/1644-169-0x0000000000400000-0x00000000016A8000-memory.dmp UPX -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe -
Executes dropped EXE 1 IoCs
pid Process 3204 Isass.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5088 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 5088 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 3204 Isass.exe 3204 Isass.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5088 wrote to memory of 3204 5088 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 85 PID 5088 wrote to memory of 3204 5088 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 85 PID 5088 wrote to memory of 3204 5088 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 85 PID 5088 wrote to memory of 1288 5088 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 141 PID 5088 wrote to memory of 1288 5088 d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe2⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"3⤵PID:3108
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe4⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"5⤵PID:4016
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe6⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"7⤵PID:4616
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe8⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"9⤵PID:1216
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe10⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"11⤵PID:3104
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe12⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"13⤵PID:464
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe14⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"15⤵PID:4516
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe16⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"17⤵PID:3312
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe18⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"19⤵PID:2028
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe20⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"21⤵PID:3244
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe22⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"23⤵PID:4472
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe24⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"25⤵PID:1008
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe26⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"27⤵PID:1044
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe28⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"29⤵PID:2264
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe30⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"31⤵PID:1744
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe32⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"33⤵PID:4172
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe34⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"35⤵PID:3928
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe36⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"37⤵PID:992
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe38⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"39⤵PID:1224
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe40⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"41⤵PID:3440
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe42⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"43⤵PID:2204
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe44⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"45⤵PID:1892
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe46⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"47⤵PID:5056
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe48⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"49⤵PID:4452
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe50⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"51⤵PID:3644
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe52⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"53⤵PID:548
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe54⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"55⤵PID:3484
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe56⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"57⤵PID:1640
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe58⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"59⤵PID:3544
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe60⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"61⤵PID:4292
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe62⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"63⤵PID:4328
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe64⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"C:\Users\Admin\AppData\Local\Temp\d2de034b2f4394ac788fde84d560b096798b8541b67434259774b973e1e39e62.exe"65⤵PID:1372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5316c3aac279387566ebbb8710973b794
SHA1c35f10e34d5a828135081fa9de77486381a04ac3
SHA256a42a5704fa9ee36ac3fdba04ba78bf4a453d25d6b9bbbd0791cf2cc5f2dfb7c4
SHA512c8c7a2614a0d9e9b35898849f54a78955cb875f35202a82bfd444a31aa19ddece4211fa68a75afe904ba76d2543d3d7315d50a8ec5d8fe6a9b6b33a6a37ef9aa
-
Filesize
85KB
MD51689e726d3508739bbb925848ebb966c
SHA13c2d925e803b3559c126a5b92d48fa8c3c9cf419
SHA2565a529b9d596c28e59ed12b11ba92b560771dff7d13b50a6b4752f4d056fc7271
SHA512bac66abd7aed4724cdec36cf1635d149c57ace0e184d41b464bfa921ee0650717e113cc7967a4a534a2ce88acb85adb92044bdc322af37b4990d907b5e84d2a3