Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240226-en
General
-
Target
tmp.exe
-
Size
50KB
-
MD5
c6f9d01d211a535eb819a7bb0057a77a
-
SHA1
595634222c6013ab6278d637c502f7cd062de37f
-
SHA256
3a7926816890498b4b28caeb0017fc5adea97a222c2c63f2e477e3dab269971a
-
SHA512
e8553c88fef22f1e315e38f71008a4ab034fbad7239f486d948e25c1d6d63c66d1fb176874d60429b45bb5aecd462529933a227b0cdc8245eb7b16e707f353eb
-
SSDEEP
1536:COlCGjrZRlV1eCE6cWzPLoZh4hb0qfWT5M4:DLrV1eCjx0Z2ewWT5r
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2056 nslfoo.exe 2044 nslfoo.exe 4996 nslfoo.exe 628 nslfoo.exe 3320 nslfoo.exe 1708 nslfoo.exe 768 nslfoo.exe 1564 nslfoo.exe 1544 nslfoo.exe 2944 nslfoo.exe 2008 hrlB71C.tmp 3568 nslfoo.exe 1008 nslfoo.exe 2984 nslfoo.exe 4364 nslfoo.exe 2800 nslfoo.exe 5044 nslfoo.exe 1388 nslfoo.exe 3100 nslfoo.exe 2724 nslfoo.exe 3304 nslfoo.exe 1988 nslfoo.exe 4340 nslfoo.exe 1376 nslfoo.exe 628 nslfoo.exe 4844 nslfoo.exe 1480 nslfoo.exe 2232 nslfoo.exe 1108 hrlE149.tmp 3796 nslfoo.exe 4680 nslfoo.exe 4948 nslfoo.exe 1608 nslfoo.exe 2944 nslfoo.exe 5020 nslfoo.exe 1212 nslfoo.exe 4812 nslfoo.exe 4872 nslfoo.exe 3068 nslfoo.exe 3236 nslfoo.exe 4860 nslfoo.exe 3928 nslfoo.exe 4176 nslfoo.exe 2620 nslfoo.exe 5040 nslfoo.exe 1988 nslfoo.exe 4792 nslfoo.exe 2492 nslfoo.exe 1800 hrlFBB.tmp 3320 nslfoo.exe 3768 hrl126B.tmp 808 nslfoo.exe 4660 nslfoo.exe 2488 nslfoo.exe 4472 nslfoo.exe 4988 nslfoo.exe 2156 nslfoo.exe 1236 nslfoo.exe 2116 nslfoo.exe 4260 nslfoo.exe 1248 nslfoo.exe 3172 nslfoo.exe 2800 nslfoo.exe 3068 nslfoo.exe -
Loads dropped DLL 64 IoCs
pid Process 2056 nslfoo.exe 2044 nslfoo.exe 4996 nslfoo.exe 628 nslfoo.exe 3320 nslfoo.exe 1708 nslfoo.exe 768 nslfoo.exe 1564 nslfoo.exe 1544 nslfoo.exe 2944 nslfoo.exe 3568 nslfoo.exe 1008 nslfoo.exe 2984 nslfoo.exe 4364 nslfoo.exe 2800 nslfoo.exe 5044 nslfoo.exe 1388 nslfoo.exe 3100 nslfoo.exe 2724 nslfoo.exe 3304 nslfoo.exe 1988 nslfoo.exe 4340 nslfoo.exe 1376 nslfoo.exe 628 nslfoo.exe 4844 nslfoo.exe 1480 nslfoo.exe 2232 nslfoo.exe 3796 nslfoo.exe 4680 nslfoo.exe 4948 nslfoo.exe 1608 nslfoo.exe 2944 nslfoo.exe 5020 nslfoo.exe 1212 nslfoo.exe 4812 nslfoo.exe 4872 nslfoo.exe 3068 nslfoo.exe 3236 nslfoo.exe 4860 nslfoo.exe 3928 nslfoo.exe 4176 nslfoo.exe 2620 nslfoo.exe 5040 nslfoo.exe 1988 nslfoo.exe 4792 nslfoo.exe 2492 nslfoo.exe 3320 nslfoo.exe 808 nslfoo.exe 4660 nslfoo.exe 2488 nslfoo.exe 4472 nslfoo.exe 4988 nslfoo.exe 2156 nslfoo.exe 1236 nslfoo.exe 2116 nslfoo.exe 4260 nslfoo.exe 1248 nslfoo.exe 3172 nslfoo.exe 2800 nslfoo.exe 3068 nslfoo.exe 1604 nslfoo.exe 2880 nslfoo.exe 1412 nslfoo.exe 1044 nslfoo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File created C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe File opened for modification C:\Windows\SysWOW64\hra8.dll nslfoo.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\nslfoo.exe tmp.exe File opened for modification C:\Windows\nslfoo.exe tmp.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nslfoo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nslfoo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nslfoo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nslfoo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nslfoo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nslfoo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nslfoo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nslfoo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nslfoo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nslfoo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nslfoo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nslfoo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nslfoo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nslfoo.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4756 tmp.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2008 2944 nslfoo.exe 100 PID 2944 wrote to memory of 2008 2944 nslfoo.exe 100 PID 2944 wrote to memory of 2008 2944 nslfoo.exe 100 PID 2232 wrote to memory of 1108 2232 nslfoo.exe 118 PID 2232 wrote to memory of 1108 2232 nslfoo.exe 118 PID 2232 wrote to memory of 1108 2232 nslfoo.exe 118 PID 2492 wrote to memory of 1800 2492 nslfoo.exe 139 PID 2492 wrote to memory of 1800 2492 nslfoo.exe 139 PID 2492 wrote to memory of 1800 2492 nslfoo.exe 139 PID 3320 wrote to memory of 3768 3320 nslfoo.exe 141 PID 3320 wrote to memory of 3768 3320 nslfoo.exe 141 PID 3320 wrote to memory of 3768 3320 nslfoo.exe 141 PID 2880 wrote to memory of 456 2880 nslfoo.exe 157 PID 2880 wrote to memory of 456 2880 nslfoo.exe 157 PID 2880 wrote to memory of 456 2880 nslfoo.exe 157 PID 2368 wrote to memory of 2224 2368 nslfoo.exe 189 PID 2368 wrote to memory of 2224 2368 nslfoo.exe 189 PID 2368 wrote to memory of 2224 2368 nslfoo.exe 189 PID 5016 wrote to memory of 4472 5016 nslfoo.exe 194 PID 5016 wrote to memory of 4472 5016 nslfoo.exe 194 PID 5016 wrote to memory of 4472 5016 nslfoo.exe 194 PID 4780 wrote to memory of 2116 4780 nslfoo.exe 198 PID 4780 wrote to memory of 2116 4780 nslfoo.exe 198 PID 4780 wrote to memory of 2116 4780 nslfoo.exe 198 PID 4232 wrote to memory of 3220 4232 nslfoo.exe 221 PID 4232 wrote to memory of 3220 4232 nslfoo.exe 221 PID 4232 wrote to memory of 3220 4232 nslfoo.exe 221 PID 2764 wrote to memory of 5084 2764 nslfoo.exe 226 PID 2764 wrote to memory of 5084 2764 nslfoo.exe 226 PID 2764 wrote to memory of 5084 2764 nslfoo.exe 226 PID 1212 wrote to memory of 3456 1212 nslfoo.exe 228 PID 1212 wrote to memory of 3456 1212 nslfoo.exe 228 PID 1212 wrote to memory of 3456 1212 nslfoo.exe 228 PID 5044 wrote to memory of 3100 5044 nslfoo.exe 236 PID 5044 wrote to memory of 3100 5044 nslfoo.exe 236 PID 5044 wrote to memory of 3100 5044 nslfoo.exe 236 PID 4904 wrote to memory of 1360 4904 nslfoo.exe 282 PID 4904 wrote to memory of 1360 4904 nslfoo.exe 282 PID 4904 wrote to memory of 1360 4904 nslfoo.exe 282 PID 2700 wrote to memory of 4160 2700 nslfoo.exe 299 PID 2700 wrote to memory of 4160 2700 nslfoo.exe 299 PID 2700 wrote to memory of 4160 2700 nslfoo.exe 299 PID 2620 wrote to memory of 1384 2620 nslfoo.exe 320 PID 2620 wrote to memory of 1384 2620 nslfoo.exe 320 PID 2620 wrote to memory of 1384 2620 nslfoo.exe 320
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
PID:4756
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2056
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4996
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:628
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3320
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1708
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:768
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1564
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\TEMP\hrlB71C.tmpC:\Windows\TEMP\hrlB71C.tmp2⤵
- Executes dropped EXE
PID:2008
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3568
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1008
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4364
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2800
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:5044
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1388
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3100
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2724
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3304
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4340
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1376
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:628
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4844
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1480
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\TEMP\hrlE149.tmpC:\Windows\TEMP\hrlE149.tmp2⤵
- Executes dropped EXE
PID:1108
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3796
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4680
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4948
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1608
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2944
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:5020
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4812
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4872
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3068
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3236
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4860
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3928
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4176
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2620
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5040
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4792
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\TEMP\hrlFBB.tmpC:\Windows\TEMP\hrlFBB.tmp2⤵
- Executes dropped EXE
PID:1800
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\TEMP\hrl126B.tmpC:\Windows\TEMP\hrl126B.tmp2⤵
- Executes dropped EXE
PID:3768
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:808
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4660
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4472
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4988
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2156
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1236
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2116
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4260
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1248
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3172
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2800
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Loads dropped DLL
PID:1604
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\TEMP\hrl3768.tmpC:\Windows\TEMP\hrl3768.tmp2⤵PID:456
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:1412
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Loads dropped DLL
PID:1044
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3420
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3520
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1636
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:628
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4032
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:768
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4384
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3664
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4028
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1864
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3200
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1624
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4896
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2992
-
C:\Windows\TEMP\hrl5E1A.tmpC:\Windows\TEMP\hrl5E1A.tmp2⤵PID:1252
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:528
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2624
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4900
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3228
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1340
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3744
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3100
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2812
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4676
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:4508
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1988
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4300
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1372
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\TEMP\hrl8096.tmpC:\Windows\TEMP\hrl8096.tmp2⤵PID:2224
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:5028
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3524
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1508
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\TEMP\hrl8D19.tmpC:\Windows\TEMP\hrl8D19.tmp2⤵PID:4472
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Checks processor information in registry
PID:4156
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Checks processor information in registry
PID:4516
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\TEMP\hrl9EFB.tmpC:\Windows\TEMP\hrl9EFB.tmp2⤵PID:2116
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4896
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Checks processor information in registry
PID:4612
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4024
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3848
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1736
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:2884
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1604
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2032
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:2260
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3004
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1384
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:4340
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1120
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3908
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2752
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4944
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2908
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2924
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2628
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:4660
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:700
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\TEMP\hrlD899.tmpC:\Windows\TEMP\hrlD899.tmp2⤵PID:3220
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1632
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3200
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1116
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\TEMP\hrlE29C.tmpC:\Windows\TEMP\hrlE29C.tmp2⤵PID:5084
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\TEMP\hrlEC31.tmpC:\Windows\TEMP\hrlEC31.tmp2⤵PID:3456
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1260
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2056
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Checks processor information in registry
PID:4572
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1380
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:5080
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1340
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\TEMP\hrl43D.tmpC:\Windows\TEMP\hrl43D.tmp2⤵PID:3100
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3420
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4676
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4424
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:380
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1772
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3732
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4832
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:2748
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:5000
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:8
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1544
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4524
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3980
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4232
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1896
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:5116
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:880
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2116
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2992
-
C:\Windows\TEMP\hrl31E5.tmpC:\Windows\TEMP\hrl31E5.tmp2⤵PID:3880
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1616
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1860
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4972
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2056
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:4572
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1380
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:760
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2084
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:5024
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3004
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4592
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2112
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:2252
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4912
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:2752
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4844
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3940
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2324
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:320
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1656
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1440
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3652
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4156
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1336
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\TEMP\hrl6E9F.tmpC:\Windows\TEMP\hrl6E9F.tmp2⤵PID:1360
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4456
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3064
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3172
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2428
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1908
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3868
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3748
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1964
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1604
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4144
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:4176
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3408
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3520
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1988
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1772
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\TEMP\hrl9590.tmpC:\Windows\TEMP\hrl9590.tmp2⤵PID:4160
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:4844
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3664
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4984
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1572
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2240
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:2372
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:384
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2336
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:4896
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1360
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4456
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:3064
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:688
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3560
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4448
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1968
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:2792
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1692
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:1412
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\TEMP\hrlC599.tmpC:\Windows\TEMP\hrlC599.tmp2⤵PID:1384
-
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵
- Drops file in System32 directory
PID:1164
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:4176
-
C:\Windows\nslfoo.exeC:\Windows\nslfoo.exe1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD564e3db659950fc15417e746ae5159018
SHA18e5e3f83f0ed47e4946e9bf06896c54cf62b10aa
SHA2560ff02f3bf6599c1a3903fed490586a8c05e29a09f117171f1046a67ae0ff77f8
SHA512f269999907182974b33956960918c4b5606bc7d09742fcbfbd355a5b13ea0640dffbb3f2c7e0028c0ead912ea39fc93f45484ae82428dbb004b7a8c5f50ab2bf
-
Filesize
12KB
MD5de61de242b5500304af17e4661100ea5
SHA1ed6c1fce0696ce100a93f2d3cea83a0475947e4f
SHA2563c373fde7222d1e3c5a13339d37f3b5752374210ae09974b4f17baa261c3b9a5
SHA512b393464bfd694bb314cf9c8f3d19ab6750cc65d9e3506c1b91a8658a227e9f8614b1f65b8eaa7b7e844d7308b450e690627e3eb1a8101ca80917c62233d1473f
-
Filesize
50KB
MD5c6f9d01d211a535eb819a7bb0057a77a
SHA1595634222c6013ab6278d637c502f7cd062de37f
SHA2563a7926816890498b4b28caeb0017fc5adea97a222c2c63f2e477e3dab269971a
SHA512e8553c88fef22f1e315e38f71008a4ab034fbad7239f486d948e25c1d6d63c66d1fb176874d60429b45bb5aecd462529933a227b0cdc8245eb7b16e707f353eb