Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe
Resource
win10v2004-20240412-en
General
-
Target
611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe
-
Size
361KB
-
MD5
38c7735fb872cc5d4bade889f644688c
-
SHA1
93d9f99859e416e0f57873b301a0eb34e26840c5
-
SHA256
611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900
-
SHA512
e673afdfdb18ae0f559c1e6e00c37e4119a9ef89edcc4eaf43c141411765b148836e1d2c1f50d893aa526ebad1e920527bdefff0dcdc272776efaee1c8a1cfad
-
SSDEEP
6144:/rTfUHeeSKOS9ccFKk3Y9t9YZpSRZJYmJuAEaHFW2wt5f1r2:/n8yN0Mr8ZpSRZJDo9kFW2wt5f1r2
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 60 IoCs
resource yara_rule behavioral1/files/0x000a000000015cb1-7.dat UPX behavioral1/memory/1992-8-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1992-12-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2628-23-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2520-24-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2672-32-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2484-33-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2396-35-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-17-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2524-16-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1736-39-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2784-44-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2784-40-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1052-46-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1536-48-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1052-45-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1664-54-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1472-57-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1468-61-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1472-55-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2324-63-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/776-68-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1696-73-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2192-74-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-77-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2192-76-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/272-81-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2368-82-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1300-92-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2108-110-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/608-112-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1420-115-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1220-113-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2132-107-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2964-100-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2496-99-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1420-120-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1684-124-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2356-130-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2924-134-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1124-138-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2848-142-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2736-147-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2036-96-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2656-89-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/860-88-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1696-69-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-165-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-166-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-173-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-174-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-182-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-183-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-189-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-190-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-202-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-203-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-211-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-212-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2588-224-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX -
Executes dropped EXE 22 IoCs
pid Process 2588 Isass.exe 2524 Isass.exe 2520 Isass.exe 2484 Isass.exe 1736 Isass.exe 1052 Isass.exe 1664 Isass.exe 1468 Isass.exe 776 Isass.exe 2192 Isass.exe 2368 Isass.exe 2656 Isass.exe 2036 Isass.exe 2496 Isass.exe 2132 Isass.exe 608 Isass.exe 1684 Isass.exe 2924 Isass.exe 2848 Isass.exe 984 Isass.exe 924 Isass.exe 2276 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe -
Loads dropped DLL 28 IoCs
pid Process 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2628 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2628 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2672 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2672 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2396 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2784 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1536 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1472 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2324 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1696 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 272 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 860 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1300 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2964 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2108 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1220 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1420 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2356 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1124 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2736 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 300 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 924 Isass.exe 2024 Process not Found 2588 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2588 Isass.exe 2524 Isass.exe 2524 Isass.exe 2524 Isass.exe 2628 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2520 Isass.exe 2520 Isass.exe 2520 Isass.exe 2672 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2484 Isass.exe 2484 Isass.exe 2484 Isass.exe 2396 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1736 Isass.exe 1736 Isass.exe 1736 Isass.exe 2784 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1052 Isass.exe 1052 Isass.exe 1052 Isass.exe 1536 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1664 Isass.exe 1664 Isass.exe 1664 Isass.exe 1472 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1468 Isass.exe 1468 Isass.exe 1468 Isass.exe 2324 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 776 Isass.exe 776 Isass.exe 776 Isass.exe 1696 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2192 Isass.exe 2192 Isass.exe 2192 Isass.exe 272 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2368 Isass.exe 2368 Isass.exe 2368 Isass.exe 860 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2656 Isass.exe 2656 Isass.exe 2656 Isass.exe 1300 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2036 Isass.exe 2036 Isass.exe 2036 Isass.exe 2964 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2496 Isass.exe 2496 Isass.exe 2496 Isass.exe 2108 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 2132 Isass.exe 2132 Isass.exe 2132 Isass.exe 1220 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 608 Isass.exe 608 Isass.exe 608 Isass.exe 1420 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 1684 Isass.exe 1684 Isass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2588 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 28 PID 1992 wrote to memory of 2588 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 28 PID 1992 wrote to memory of 2588 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 28 PID 1992 wrote to memory of 2588 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 28 PID 1992 wrote to memory of 2524 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 29 PID 1992 wrote to memory of 2524 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 29 PID 1992 wrote to memory of 2524 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 29 PID 1992 wrote to memory of 2524 1992 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 29 PID 2524 wrote to memory of 2628 2524 Isass.exe 30 PID 2524 wrote to memory of 2628 2524 Isass.exe 30 PID 2524 wrote to memory of 2628 2524 Isass.exe 30 PID 2524 wrote to memory of 2628 2524 Isass.exe 30 PID 2628 wrote to memory of 2520 2628 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 31 PID 2628 wrote to memory of 2520 2628 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 31 PID 2628 wrote to memory of 2520 2628 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 31 PID 2628 wrote to memory of 2520 2628 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 31 PID 2520 wrote to memory of 2672 2520 Isass.exe 32 PID 2520 wrote to memory of 2672 2520 Isass.exe 32 PID 2520 wrote to memory of 2672 2520 Isass.exe 32 PID 2520 wrote to memory of 2672 2520 Isass.exe 32 PID 2672 wrote to memory of 2484 2672 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 33 PID 2672 wrote to memory of 2484 2672 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 33 PID 2672 wrote to memory of 2484 2672 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 33 PID 2672 wrote to memory of 2484 2672 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 33 PID 2484 wrote to memory of 2396 2484 Isass.exe 34 PID 2484 wrote to memory of 2396 2484 Isass.exe 34 PID 2484 wrote to memory of 2396 2484 Isass.exe 34 PID 2484 wrote to memory of 2396 2484 Isass.exe 34 PID 2396 wrote to memory of 1736 2396 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 35 PID 2396 wrote to memory of 1736 2396 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 35 PID 2396 wrote to memory of 1736 2396 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 35 PID 2396 wrote to memory of 1736 2396 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 35 PID 1736 wrote to memory of 2784 1736 Isass.exe 36 PID 1736 wrote to memory of 2784 1736 Isass.exe 36 PID 1736 wrote to memory of 2784 1736 Isass.exe 36 PID 1736 wrote to memory of 2784 1736 Isass.exe 36 PID 2784 wrote to memory of 1052 2784 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 37 PID 2784 wrote to memory of 1052 2784 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 37 PID 2784 wrote to memory of 1052 2784 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 37 PID 2784 wrote to memory of 1052 2784 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 37 PID 1052 wrote to memory of 1536 1052 Isass.exe 38 PID 1052 wrote to memory of 1536 1052 Isass.exe 38 PID 1052 wrote to memory of 1536 1052 Isass.exe 38 PID 1052 wrote to memory of 1536 1052 Isass.exe 38 PID 1536 wrote to memory of 1664 1536 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 39 PID 1536 wrote to memory of 1664 1536 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 39 PID 1536 wrote to memory of 1664 1536 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 39 PID 1536 wrote to memory of 1664 1536 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 39 PID 1664 wrote to memory of 1472 1664 Isass.exe 40 PID 1664 wrote to memory of 1472 1664 Isass.exe 40 PID 1664 wrote to memory of 1472 1664 Isass.exe 40 PID 1664 wrote to memory of 1472 1664 Isass.exe 40 PID 1472 wrote to memory of 1468 1472 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 41 PID 1472 wrote to memory of 1468 1472 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 41 PID 1472 wrote to memory of 1468 1472 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 41 PID 1472 wrote to memory of 1468 1472 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 41 PID 1468 wrote to memory of 2324 1468 Isass.exe 42 PID 1468 wrote to memory of 2324 1468 Isass.exe 42 PID 1468 wrote to memory of 2324 1468 Isass.exe 42 PID 1468 wrote to memory of 2324 1468 Isass.exe 42 PID 2324 wrote to memory of 776 2324 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 43 PID 2324 wrote to memory of 776 2324 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 43 PID 2324 wrote to memory of 776 2324 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 43 PID 2324 wrote to memory of 776 2324 611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"5⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"7⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"9⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"11⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"13⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"15⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"17⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"19⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:272 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"21⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"23⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"25⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"27⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"29⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe30⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:608 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"31⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1420 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe32⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"33⤵
- Loads dropped DLL
PID:2356 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe34⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"35⤵
- Loads dropped DLL
PID:1124 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe36⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"37⤵
- Loads dropped DLL
PID:2736 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe38⤵
- Executes dropped EXE
PID:984 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"39⤵
- Loads dropped DLL
PID:300 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924 -
C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"C:\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe"41⤵
- Executes dropped EXE
PID:2276
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD555da83a52a4c4ece692970df4dfa7077
SHA17e077a3618a8c3ccd0e3c1bc3fbbb5d66959360e
SHA25617d52f327790a9e3bca3082458e48e912dd7cc67fdfebba513343e5122b51a59
SHA512b1fe7758502c0e408201d397ee559d2112b520907e370e0e8036204bf9132479aaa2abf957fe0aa808aaa5138f4500a397d4c0ee7e3bc8a88c743a5a873d37f8
-
\Users\Admin\AppData\Local\Temp\611ec153c42610b3a25be04122b8c9ef1e660c93dddf8ddd3ad6e425432cb900.exe
Filesize99KB
MD5b7515e4664543b43461c2ecd7a5676dc
SHA1f6fbcfe5b093fe9691b740684607bc31a9159935
SHA256bf1b03022cadfc18049a7f0ecf1f3134c7676fcb6ff6c6941ae7f77e21285c73
SHA512ac4c7098878ccfd2cc76451c071bfd992eecc49e9e8502545eada32aed4c28515dee5096e6dc6e61147e619a5f16ce4f364ebb98c2a78c0ee4b44b9517a872d1