Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
General
-
Target
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe
-
Size
242KB
-
MD5
4e4bc21a1c1a34037e44db52a50086d5
-
SHA1
1419003d268ef43d3128c11f92e9533793b07320
-
SHA256
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4
-
SHA512
2ee099ce340f23a535726a4310d0e40fabd23e3e4ded625fe4fc18ea2cda3c6346d28a14f91c73f01161d572e30090de124ca32e05265ce387dc737869db27a0
-
SSDEEP
6144:jmGIhq8Q9AiAaK1Ga4my15stpehMPoCYRZ5oXuc81/L:qu8xpQm/abCMZcuc81T
Malware Config
Extracted
remcos
RemoteHost
194.147.140.205:4040
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-RJDWXW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 64 IoCs
Processes:
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exepid process 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Printerdiskettes = "C:\\Users\\Admin\\AppData\\Roaming\\Papillon\\Pindsvinets.exe" 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exepid process 4948 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exepid process 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 4948 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exedescription pid process target process PID 4180 set thread context of 4948 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe -
Drops file in Windows directory 1 IoCs
Processes:
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exedescription ioc process File opened for modification C:\Windows\Fonts\aandede\Nskeligeres.ini 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exepid process 4948 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exepid process 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exedescription pid process target process PID 4180 wrote to memory of 532 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 532 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 532 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4716 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4716 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4716 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2488 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2488 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2488 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 5080 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 5080 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 5080 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4552 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4552 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4552 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 3684 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 3684 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 3684 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4836 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4836 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4836 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 5052 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 5052 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 5052 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 1948 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 1948 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 1948 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 664 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 664 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 664 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 3296 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 3296 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 3296 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2428 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2428 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2428 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 64 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 64 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 64 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4712 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4712 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4712 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 216 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 216 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 216 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4052 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4052 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4052 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4296 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4296 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4296 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4336 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4336 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4336 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2024 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2024 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2024 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2804 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2804 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 2804 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4292 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4292 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4292 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe PID 4180 wrote to memory of 4740 4180 59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe"C:\Users\Admin\AppData\Local\Temp\59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x53^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x14^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x75^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x51^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x71^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x48^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x42^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x51^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x11^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4B^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x50^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x45^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x52^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x08^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x42^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x79^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x56^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x48^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4B^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x17^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x08^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x13^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x6D^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x63^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x74^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x68^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x63^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x6A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x14^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x70^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x52^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x53^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x47^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x67^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x45^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x63^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0B^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x17^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x14^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x17^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x14^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x10^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x56^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x08^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4B^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x50^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x45^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x52^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x79^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4D^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x13^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x11^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x17^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x08^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x11^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4B^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x50^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x45^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x52^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x08^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x42^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x79^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x47^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x42^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x13^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x14^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x17^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x14^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x53^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x14^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x65^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x47^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x71^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x48^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x42^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x51^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x76^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x45^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x67^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Users\Admin\AppData\Local\Temp\59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe"C:\Users\Admin\AppData\Local\Temp\59cfbef2d28f5f8df3c98d8525acf710bbad31e3bed87ccb6d8c3d9f5a9d8fe4.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nsh31FE.tmp\System.dllFilesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
C:\Users\Admin\AppData\Local\Temp\nsh31FE.tmp\nsExec.dllFilesize
6KB
MD5ec0504e6b8a11d5aad43b296beeb84b2
SHA191b5ce085130c8c7194d66b2439ec9e1c206497c
SHA2565d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962
SHA5123f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57
-
memory/4180-624-0x0000000004A60000-0x00000000060A1000-memory.dmpFilesize
22.3MB
-
memory/4180-618-0x0000000004A60000-0x00000000060A1000-memory.dmpFilesize
22.3MB
-
memory/4180-619-0x0000000077081000-0x00000000771A1000-memory.dmpFilesize
1.1MB
-
memory/4180-620-0x0000000073CD0000-0x0000000073CD7000-memory.dmpFilesize
28KB
-
memory/4948-642-0x00000000004A0000-0x0000000001AE1000-memory.dmpFilesize
22.3MB
-
memory/4948-645-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB
-
memory/4948-625-0x0000000077081000-0x00000000771A1000-memory.dmpFilesize
1.1MB
-
memory/4948-638-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB
-
memory/4948-621-0x00000000004A0000-0x0000000001AE1000-memory.dmpFilesize
22.3MB
-
memory/4948-643-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB
-
memory/4948-644-0x00000000004A0000-0x0000000001AE1000-memory.dmpFilesize
22.3MB
-
memory/4948-622-0x0000000077108000-0x0000000077109000-memory.dmpFilesize
4KB
-
memory/4948-646-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB
-
memory/4948-647-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB
-
memory/4948-648-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB
-
memory/4948-649-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB
-
memory/4948-650-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB
-
memory/4948-651-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB
-
memory/4948-652-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB
-
memory/4948-653-0x0000000072A70000-0x0000000073CC4000-memory.dmpFilesize
18.3MB