Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2024 21:49

General

  • Target

    5079a73b97bf2544ef1789a7562becb50e2f01aeb2273779c44b8e8e44064a4c.exe

  • Size

    322KB

  • MD5

    e51b2c0f6c877c1a8b0ad4bc67458fef

  • SHA1

    d6af1ac5e6fb2753e6129871ca59ec11a6e740fa

  • SHA256

    5079a73b97bf2544ef1789a7562becb50e2f01aeb2273779c44b8e8e44064a4c

  • SHA512

    cf3d222a699f73a2a50c9e81c2eb4c6d9cb11066b578c83332fa64eeccb200e373bf6dc2d971db72df0d53cbe7b8c622dfb4741437c3e3475a772fbd8d0dbde6

  • SSDEEP

    6144:oEquZe4ftO2QL80PW+Pn7TepAtUrZD8jvlB4qRiLKF+0zTIC2o:E442QL88WqmpVrZD8BSIPICT

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

vítima

C2

yotshi.no-ip.biz:81

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    msnmsg

  • install_file

    server.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    texto da mensagem

  • message_box_title

    título da mensagem

  • password

    abcd1234

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Detects binaries and memory artifacts referencing sandbox product IDs 4 IoCs
  • UPX dump on OEP (original entry point) 12 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\fontdrvhost.exe
        "fontdrvhost.exe"
        2⤵
          PID:780
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          2⤵
            PID:64
        • C:\Windows\system32\lsass.exe
          C:\Windows\system32\lsass.exe
          1⤵
            PID:680
          • C:\Windows\system32\fontdrvhost.exe
            "fontdrvhost.exe"
            1⤵
              PID:788
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k DcomLaunch -p
              1⤵
                PID:800
                • C:\Windows\system32\wbem\unsecapp.exe
                  C:\Windows\system32\wbem\unsecapp.exe -Embedding
                  2⤵
                    PID:2976
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    2⤵
                      PID:3736
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      2⤵
                        PID:3836
                      • C:\Windows\System32\RuntimeBroker.exe
                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                        2⤵
                          PID:3896
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          2⤵
                            PID:3980
                          • C:\Windows\System32\RuntimeBroker.exe
                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                            2⤵
                              PID:4072
                            • C:\Windows\system32\SppExtComObj.exe
                              C:\Windows\system32\SppExtComObj.exe -Embedding
                              2⤵
                                PID:3664
                              • C:\Windows\system32\DllHost.exe
                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                2⤵
                                  PID:3524
                                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                                  2⤵
                                    PID:4892
                                  • C:\Windows\System32\RuntimeBroker.exe
                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                    2⤵
                                      PID:1616
                                    • C:\Windows\system32\backgroundTaskHost.exe
                                      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
                                      2⤵
                                        PID:1492
                                      • C:\Windows\system32\backgroundTaskHost.exe
                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                        2⤵
                                          PID:4288
                                        • C:\Windows\system32\BackgroundTaskHost.exe
                                          "C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider
                                          2⤵
                                            PID:5092
                                          • C:\Windows\System32\RuntimeBroker.exe
                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                            2⤵
                                              PID:3272
                                            • C:\Windows\System32\RuntimeBroker.exe
                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                              2⤵
                                                PID:796
                                              • C:\Windows\system32\BackgroundTransferHost.exe
                                                "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                2⤵
                                                  PID:4336
                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                  2⤵
                                                    PID:3800
                                                  • C:\Windows\system32\backgroundTaskHost.exe
                                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                    2⤵
                                                      PID:3392
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k RPCSS -p
                                                    1⤵
                                                      PID:904
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                      1⤵
                                                        PID:952
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                        1⤵
                                                          PID:392
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                          1⤵
                                                            PID:660
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                                                            1⤵
                                                              PID:440
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                              1⤵
                                                                PID:1060
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                                1⤵
                                                                  PID:1072
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                                  1⤵
                                                                    PID:1200
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                                    1⤵
                                                                      PID:1228
                                                                      • C:\Windows\system32\taskhostw.exe
                                                                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                                                                        2⤵
                                                                          PID:2876
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                                        1⤵
                                                                          PID:1292
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                                          1⤵
                                                                            PID:1348
                                                                          • C:\Windows\System32\svchost.exe
                                                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                                            1⤵
                                                                              PID:1360
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                                              1⤵
                                                                                PID:1392
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                                                1⤵
                                                                                  PID:1404
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                                  1⤵
                                                                                    PID:1540
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                                                    1⤵
                                                                                      PID:1548
                                                                                      • C:\Windows\system32\sihost.exe
                                                                                        sihost.exe
                                                                                        2⤵
                                                                                          PID:2944
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                                                        1⤵
                                                                                          PID:1588
                                                                                        • C:\Windows\System32\svchost.exe
                                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                                                          1⤵
                                                                                            PID:1656
                                                                                          • C:\Windows\System32\svchost.exe
                                                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                                                            1⤵
                                                                                              PID:1720
                                                                                            • C:\Windows\System32\svchost.exe
                                                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                                              1⤵
                                                                                                PID:1792
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                                                1⤵
                                                                                                  PID:1816
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                                                  1⤵
                                                                                                    PID:1924
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                                                                    1⤵
                                                                                                      PID:1984
                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                                                      1⤵
                                                                                                        PID:1996
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                                                        1⤵
                                                                                                          PID:1716
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                                                          1⤵
                                                                                                            PID:1836
                                                                                                          • C:\Windows\System32\spoolsv.exe
                                                                                                            C:\Windows\System32\spoolsv.exe
                                                                                                            1⤵
                                                                                                              PID:2136
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                                                                              1⤵
                                                                                                                PID:2172
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                                                                1⤵
                                                                                                                  PID:2224
                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                                                                  1⤵
                                                                                                                    PID:2340
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                                                                    1⤵
                                                                                                                      PID:2520
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                                                                      1⤵
                                                                                                                        PID:2528
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                                                        1⤵
                                                                                                                          PID:2724
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                                                          1⤵
                                                                                                                            PID:2764
                                                                                                                          • C:\Windows\sysmon.exe
                                                                                                                            C:\Windows\sysmon.exe
                                                                                                                            1⤵
                                                                                                                              PID:2780
                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                                                              1⤵
                                                                                                                                PID:2800
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                                                                1⤵
                                                                                                                                  PID:2808
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                                                                  1⤵
                                                                                                                                    PID:2900
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                                                                    1⤵
                                                                                                                                      PID:2200
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                                      1⤵
                                                                                                                                        PID:3316
                                                                                                                                      • C:\Windows\Explorer.EXE
                                                                                                                                        C:\Windows\Explorer.EXE
                                                                                                                                        1⤵
                                                                                                                                          PID:3436
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\5079a73b97bf2544ef1789a7562becb50e2f01aeb2273779c44b8e8e44064a4c.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\5079a73b97bf2544ef1789a7562becb50e2f01aeb2273779c44b8e8e44064a4c.exe"
                                                                                                                                            2⤵
                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                            PID:3492
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\5079a73b97bf2544ef1789a7562becb50e2f01aeb2273779c44b8e8e44064a4c.exe
                                                                                                                                              3⤵
                                                                                                                                              • Adds policy Run key to start application
                                                                                                                                              • Modifies Installed Components in the registry
                                                                                                                                              • Adds Run key to start application
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                              PID:336
                                                                                                                                              • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                explorer.exe
                                                                                                                                                4⤵
                                                                                                                                                • Modifies Installed Components in the registry
                                                                                                                                                PID:2884
                                                                                                                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:3116
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\5079a73b97bf2544ef1789a7562becb50e2f01aeb2273779c44b8e8e44064a4c.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\5079a73b97bf2544ef1789a7562becb50e2f01aeb2273779c44b8e8e44064a4c.exe"
                                                                                                                                                  4⤵
                                                                                                                                                  • Checks computer location settings
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:1160
                                                                                                                                                  • C:\Windows\SysWOW64\msnmsg\server.exe
                                                                                                                                                    "C:\Windows\system32\msnmsg\server.exe"
                                                                                                                                                    5⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:3076
                                                                                                                                                    • C:\Windows\SysWOW64\msnmsg\server.exe
                                                                                                                                                      6⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:1016
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 564
                                                                                                                                                        7⤵
                                                                                                                                                        • Program crash
                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                        • Enumerates system info in registry
                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                        PID:2396
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 772
                                                                                                                                                          8⤵
                                                                                                                                                          • Program crash
                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                          • Enumerates system info in registry
                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                          PID:1980
                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                            1⤵
                                                                                                                                              PID:3556
                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                              1⤵
                                                                                                                                                PID:544
                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                                1⤵
                                                                                                                                                  PID:2820
                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                  1⤵
                                                                                                                                                    PID:3420
                                                                                                                                                  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                    1⤵
                                                                                                                                                      PID:1136
                                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                      1⤵
                                                                                                                                                        PID:4188
                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                        1⤵
                                                                                                                                                          PID:1356
                                                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                                                          C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                          1⤵
                                                                                                                                                            PID:1600
                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1016 -ip 1016
                                                                                                                                                              2⤵
                                                                                                                                                                PID:3080
                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2396 -ip 2396
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:2856
                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2396 -ip 2396
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:1152

                                                                                                                                                                Network

                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                Replay Monitor

                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                Downloads

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

                                                                                                                                                                  Filesize

                                                                                                                                                                  240KB

                                                                                                                                                                  MD5

                                                                                                                                                                  51ad3268165a878e5a1dd0ca508005db

                                                                                                                                                                  SHA1

                                                                                                                                                                  a395ef00eb1b70fdf6bc7899e98a939caec835fb

                                                                                                                                                                  SHA256

                                                                                                                                                                  e5a18c91e4d7a602092ef02a665fb03a0e9e1cf6e904f7990bc41cab2dbe5c26

                                                                                                                                                                  SHA512

                                                                                                                                                                  1327c6193cfdec63a52e1f928d7c67c1e517330e9236b801163bb424eb60eedf2a3fba785be48b7c1f2554a0cf720ab686f94ffd2d833ae8ea002bd4cad074c3

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  e4df6adef918aa7af7cf302ecc891443

                                                                                                                                                                  SHA1

                                                                                                                                                                  88ebcc926bd8162ffed59ff17e6204defd6fb013

                                                                                                                                                                  SHA256

                                                                                                                                                                  bd1ea0878a9c64a224accbde95e1539263ad37256c0ae724376a6645a1f1f635

                                                                                                                                                                  SHA512

                                                                                                                                                                  65f351d1b0313a5582b66e9bf55f963c150229d256125c71c2875b15d60a38698205cca06e19f3cc27fc01f9eff2a76fb60926d9e2b902cd1c6ac4bf7b46d075

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  b43f9815d5930a713b49224633d4e499

                                                                                                                                                                  SHA1

                                                                                                                                                                  795ceae28929911ad9110c74e1f6a10aa7ca8b89

                                                                                                                                                                  SHA256

                                                                                                                                                                  6baa3b3763f868729f5036635f9b9f4f15b5780959381bea16e2f38ff295e0e0

                                                                                                                                                                  SHA512

                                                                                                                                                                  0fdc9d7500a400dd5700087e6c2e7183aae518ba770bb13549d7365d6d3799fc525f5988ad11eee724bf89cd5baae2b20c7883d25f18eebefeef8b1c18a232a5

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  fd74633456fb619ac9f73869cc61f817

                                                                                                                                                                  SHA1

                                                                                                                                                                  74fd5ea5ad0560e8c8e2c027c3056d2ba04afeaf

                                                                                                                                                                  SHA256

                                                                                                                                                                  bb31cb633697a41b6f00fcfdcafafb322e36186e14962d5fe02f98ba5b811fc6

                                                                                                                                                                  SHA512

                                                                                                                                                                  4ab666444326b477e3cabeda543cb0ef6255efc5a90d3b9a4386092c74fc898a2307d5841e102f009502d567a4806a091d983c3a72880f6c429965934f8a1675

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  cf91b9bd1ba6ec5c35ff297894348bc5

                                                                                                                                                                  SHA1

                                                                                                                                                                  cc7182c54c113e5f880dd3ac5d5731bac8da020c

                                                                                                                                                                  SHA256

                                                                                                                                                                  06261e3481daa80bc3645284804da052ac8e9dc5ca79e901f455f02a3ad0e29e

                                                                                                                                                                  SHA512

                                                                                                                                                                  c5bbb171c91c301de789214058d118965a88acbb33d39815182d5c0859d2c61abc0941aa6576c15d30c5f3f19ff4d89bc007d73369307fb9a01e58951981f52e

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  1de7e7775caefae2c1251edb5abadac7

                                                                                                                                                                  SHA1

                                                                                                                                                                  97efffc6bcabc3883078c03417aaff0ddd5b95ed

                                                                                                                                                                  SHA256

                                                                                                                                                                  1d5094727cbf2a133bae2412a8444a114995595d874fc49bee843114afaa36de

                                                                                                                                                                  SHA512

                                                                                                                                                                  aa94d49fbfe0a683b4fc1e9af283bf87f3e0d95ea71817c4ac3120c2ebbf1b547bc10caa1073af1d7f02c8391ba6752ffaf9a9e6d44f69144ec7704448b276c9

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  234656b339a4b4ffe46da3e2f0831e60

                                                                                                                                                                  SHA1

                                                                                                                                                                  b54345f354d131595a69e0305e34c32b88e2b3c6

                                                                                                                                                                  SHA256

                                                                                                                                                                  a9714cbd1b23cb842cbbf9d4bf518a128fa9778f93e6c145d81832576a628283

                                                                                                                                                                  SHA512

                                                                                                                                                                  cd9e07feb7837f1f8320d035a5815ceb6cc5a4c5cf7af9ce83eabebf127e180a371ae67325d19125efb887edeee8f2ce2ac98a4443e535b5af990b4624f83bea

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  0643322d1e182741bb0675daa0163974

                                                                                                                                                                  SHA1

                                                                                                                                                                  f28621d615541920e02ad9f6d0f4a21af606b17c

                                                                                                                                                                  SHA256

                                                                                                                                                                  a7b98271b87398d0a949146298b21c5a45a06d7b07369a02e2402837cdfe503d

                                                                                                                                                                  SHA512

                                                                                                                                                                  05a2209fd6473422f12076609cd506b6c44d30fd5e56923441f65261340df973a2fd85767417a1788d1ed679c43f593b0cbcec4c257e6c0c752477575535a7b3

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  7c8fa83f3f29341b43bde64a0bc806a5

                                                                                                                                                                  SHA1

                                                                                                                                                                  ffc5dc09e1c56a3817cdc058c56e214631eaaefb

                                                                                                                                                                  SHA256

                                                                                                                                                                  b96046b09a725ab2729b8cf807b1ad7458e16a0728c919f0410fd66c402588ba

                                                                                                                                                                  SHA512

                                                                                                                                                                  ae3161843178d0086f85d1e03d62de97a8c2324a7f718f0da6b609f38dfa5c6007fb2b762efc9c78a693c69349a90dd919179b77ae1a45544d2b97b927c55a19

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  ba92ab58a79a04bb22d7a191d80d5a45

                                                                                                                                                                  SHA1

                                                                                                                                                                  5e1d091fbdc9c7b6fff94f6b992da7d0a9afbcbf

                                                                                                                                                                  SHA256

                                                                                                                                                                  d151c21003326c451d6ab7077959c74b4c3db54f4b7af1ac4809fe6cf35be3ef

                                                                                                                                                                  SHA512

                                                                                                                                                                  c0724bddd489102633dc5e6b569f04457e8b0e7c0127b9ff3a71fafa424422a66ac0165d41ba7d48cd7665b76423e1c8fcc6782d1e616ffcbf8a4a8435fb5336

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  6cfcce9a3071ae55342bdd21f030f6e7

                                                                                                                                                                  SHA1

                                                                                                                                                                  f5313fac0ab9bedd6afdc55443684e71edc57f7d

                                                                                                                                                                  SHA256

                                                                                                                                                                  8675af2415b051ce886b7843b9ad29dbd6930e2092fcf18fe7f215609cdc8bb2

                                                                                                                                                                  SHA512

                                                                                                                                                                  57241068a613c7f1eb279f81ff742ba189c414a706b8480220cd6f94cef3ac4a0c5f4a8fcddfb4adba0b904099e87c2a9370de6532c9edb7cb126179b9547cdd

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  6d74ce4677d7bedadf3a3a714dc529f6

                                                                                                                                                                  SHA1

                                                                                                                                                                  ec07c02e3cee01bedcabecffc367d6439ce750c8

                                                                                                                                                                  SHA256

                                                                                                                                                                  fbb9ebf532472ea8bc2ebe31bcb52149019ea6fabac48601789ebf261bdbed5f

                                                                                                                                                                  SHA512

                                                                                                                                                                  b806d80706203f5878294f34478777c90e2774337d6b38a09855830601c93389ad1e64c34e25885e0eb9d2abd9bffc5dffc2d6e1274f815d3ea69f7469b6d22c

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  72718c3c34f57b8d3ff117b8eca3840b

                                                                                                                                                                  SHA1

                                                                                                                                                                  7d691b66532389a3be75a509d5e6ca5881ce1506

                                                                                                                                                                  SHA256

                                                                                                                                                                  f64885f3b22ec23b76cff323dc3bc257e1c4b2348d279f87b3256dfa945d8ac6

                                                                                                                                                                  SHA512

                                                                                                                                                                  2a0505adf73206358785eec28c716b22929a08637e7117c7aac634f5011bb852f51f66721a5ce8144e48296ab518c81921e458ef51c73cc87df605b0ac9643a0

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  f26d078dfca2d375498acb9ec2c4c0fe

                                                                                                                                                                  SHA1

                                                                                                                                                                  a060d962ad78695a961adbcbe4619df64c0f71af

                                                                                                                                                                  SHA256

                                                                                                                                                                  ae264655f46bd9d2071dea78b269f6bc8c2b92e7bdd6461a5c58064a76ce56d0

                                                                                                                                                                  SHA512

                                                                                                                                                                  58bea99b79c46cd6ec97ff1d03a748311cc715766605c0b570acd67d59d4b4bf3ffb067a8e30d33d5ff244df658317caa399b5a85bcce2ddf5d8aa8ca90c0eb1

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  13a9b52c6da2a017f7e5036ce3a863d2

                                                                                                                                                                  SHA1

                                                                                                                                                                  9b987213f5fbe19e6053efd94b8f3b0835bc15da

                                                                                                                                                                  SHA256

                                                                                                                                                                  1388203c279489ef9e538840edb0c5e68db7190c7a9e6d7a6586f410ec1680b8

                                                                                                                                                                  SHA512

                                                                                                                                                                  25a53dcea16ad4b8ff323db18d44142caef251e78d4b264d9fd4640b8037d97223ed9375e81bac3822498f02d412f0dd5142e6a51a7786eba81915ca5a57c2eb

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  00efc0f07a122fc377df4ca3b85f6e07

                                                                                                                                                                  SHA1

                                                                                                                                                                  a3feed882097fbc1234d8673d00400a837cc085b

                                                                                                                                                                  SHA256

                                                                                                                                                                  a52bc98eef2fdd46dbcf53319de53442181fe0c10861fa550ce9e77cac8eb610

                                                                                                                                                                  SHA512

                                                                                                                                                                  0f1cda6f33fc3020f97a0baf6bf14c76f8753d7c41b66d053da454a96ee2037994bb2d2dda373883cd221f9c04201832e538c464536a5806442bd5fe14e3ce24

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  f6f492e789bfb2a5b48a4bc47734f89c

                                                                                                                                                                  SHA1

                                                                                                                                                                  42cdd9f9605ff3e2b3e586876f020d7a73c29ea5

                                                                                                                                                                  SHA256

                                                                                                                                                                  f05fd198f980d3797361f0c4bcff306c82d707182d9e33a5b7522d80d17bbc5a

                                                                                                                                                                  SHA512

                                                                                                                                                                  76ac4ede0e25a39c67d6537f2ab0baff01d76a5475384986eda30cb8a13fe0ce3df5a589fabc4499727da6c256665d71d07554265fd03a33cb41c0d078731abc

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  366d37b8b2b7da3126e42584229491bf

                                                                                                                                                                  SHA1

                                                                                                                                                                  010b61616285095e8afa20e80f15e366faa37eb3

                                                                                                                                                                  SHA256

                                                                                                                                                                  6b326e3ec5ac1e48fcfcc9bf2c11bcc87f9d0a0ddb1c5408cae7d2c940007aa4

                                                                                                                                                                  SHA512

                                                                                                                                                                  0a44e755fe93f36b80d5d242a0147bb123fffa8ae5c32280f80ad962f32d7c390c1bb772ca92eeef1b46c4d3d5aaea466955b81dd8ee8bb4dab202ef61a24907

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  7453cebf0a70598f28093ae2726cc572

                                                                                                                                                                  SHA1

                                                                                                                                                                  6b1fa5cce3f4408dcc2094bbce4d11234d9e0ee8

                                                                                                                                                                  SHA256

                                                                                                                                                                  871183b4ce9ee1d13483cc7be699a07858d35c9b874699ed1994924bc8f263a5

                                                                                                                                                                  SHA512

                                                                                                                                                                  6806d2167fff32ee557ef406d2dc7f8e94d9b66af94e1a1e4095034d1778aba392abd8e99f16a77162c0ebacffac8e1188b8a1b770086e8cf3b2e7d41dd5cf7e

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                  Filesize

                                                                                                                                                                  8B

                                                                                                                                                                  MD5

                                                                                                                                                                  4f05619874b1319b313dd163a9c4ac00

                                                                                                                                                                  SHA1

                                                                                                                                                                  92db79ef30391bac470c0804973a281b02b7b283

                                                                                                                                                                  SHA256

                                                                                                                                                                  7164957bf4b87ada295daf74c31685bff29ae4a0a4b0579b19112c5934d81841

                                                                                                                                                                  SHA512

                                                                                                                                                                  cb4e2716069a0510b409334f8de228cf5dc38ee0a7dcd5eb3cdb63f449a903156f3fa6d0c9e2384af4a9a7aec190d4a7fe88a86397828695080f19109d6d9126

                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\logs.dat

                                                                                                                                                                  Filesize

                                                                                                                                                                  15B

                                                                                                                                                                  MD5

                                                                                                                                                                  e21bd9604efe8ee9b59dc7605b927a2a

                                                                                                                                                                  SHA1

                                                                                                                                                                  3240ecc5ee459214344a1baac5c2a74046491104

                                                                                                                                                                  SHA256

                                                                                                                                                                  51a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46

                                                                                                                                                                  SHA512

                                                                                                                                                                  42052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493

                                                                                                                                                                • C:\Windows\SysWOW64\msnmsg\server.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  322KB

                                                                                                                                                                  MD5

                                                                                                                                                                  e51b2c0f6c877c1a8b0ad4bc67458fef

                                                                                                                                                                  SHA1

                                                                                                                                                                  d6af1ac5e6fb2753e6129871ca59ec11a6e740fa

                                                                                                                                                                  SHA256

                                                                                                                                                                  5079a73b97bf2544ef1789a7562becb50e2f01aeb2273779c44b8e8e44064a4c

                                                                                                                                                                  SHA512

                                                                                                                                                                  cf3d222a699f73a2a50c9e81c2eb4c6d9cb11066b578c83332fa64eeccb200e373bf6dc2d971db72df0d53cbe7b8c622dfb4741437c3e3475a772fbd8d0dbde6

                                                                                                                                                                • memory/336-4-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  356KB

                                                                                                                                                                • memory/336-16-0x0000000024080000-0x00000000240E2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  392KB

                                                                                                                                                                • memory/336-7-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  356KB

                                                                                                                                                                • memory/336-12-0x0000000024010000-0x0000000024072000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  392KB

                                                                                                                                                                • memory/336-9-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  356KB

                                                                                                                                                                • memory/336-6-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  356KB

                                                                                                                                                                • memory/336-150-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  356KB

                                                                                                                                                                • memory/1016-619-0x0000000000400000-0x0000000000459000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  356KB

                                                                                                                                                                • memory/1160-88-0x0000000000400000-0x000000000040A001-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  40KB

                                                                                                                                                                • memory/1160-1521-0x0000000024160000-0x00000000241C2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  392KB

                                                                                                                                                                • memory/1160-151-0x0000000024160000-0x00000000241C2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  392KB

                                                                                                                                                                • memory/2884-18-0x0000000000420000-0x0000000000421000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4KB

                                                                                                                                                                • memory/2884-78-0x0000000024080000-0x00000000240E2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  392KB

                                                                                                                                                                • memory/2884-17-0x0000000000160000-0x0000000000161000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4KB

                                                                                                                                                                • memory/2884-842-0x0000000024080000-0x00000000240E2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  392KB

                                                                                                                                                                • memory/3076-448-0x0000000000400000-0x000000000040A001-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  40KB

                                                                                                                                                                • memory/3492-0-0x0000000000400000-0x000000000040A001-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  40KB

                                                                                                                                                                • memory/3492-8-0x0000000000400000-0x000000000040A001-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  40KB