Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe
Resource
win7-20240221-en
General
-
Target
6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe
-
Size
5.6MB
-
MD5
bfbcff79e69c7fda280e45a8b14ba194
-
SHA1
e97290e5397ab33b3261f09af733bac866a478fd
-
SHA256
6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8
-
SHA512
3a5672235557c308721e16045ebeb91fbbb282b4ade47f5796fb1f509c14c58be1ad938c7a80f9861b6a2ca3a4c863be69acdb7c4a820584467d2fb7456f15eb
-
SSDEEP
98304:wrbc0dxOfbCIYflBduQn88xtfT9SN8Nvaf6JE1eMTYO05:wrbcQWb8flBdm81T9SqE6e1eso
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\G: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\U: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\J: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\L: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\P: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\T: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\S: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\V: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\W: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\E: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\K: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\N: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\O: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\Q: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\X: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\Y: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\Z: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\A: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\H: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\I: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\M: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe File opened (read-only) \??\R: 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: 33 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe Token: SeIncBasePriorityPrivilege 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe 2804 6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe"C:\Users\Admin\AppData\Local\Temp\6b887926cf1f4cdd704b57175980a3d37aa7569058e42d05f7046f171d710dc8.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD57bc18b5d04bbaa53af22bb288c5a810c
SHA16e3ba5d7c21a38076bcad960f51c8849928a0c9a
SHA256ce7c04f57eae835917279c44c64c790370d26a69311d8ca501d8ddd6670649b4
SHA512d6bca1619cc028a74e68d8188986e5d13749fd336c2ce9498dba8937142369ce6ca61d1d8df8e283b8f2f1b5e125a227a3a720950c7d3b585c24e5871cb99963