Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe
Resource
win7-20240508-en
General
-
Target
2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe
-
Size
153KB
-
MD5
7871fe1b8c1e347dc9cec091c5a7967d
-
SHA1
00784352ba070f9c0a894d5525feef72e5bd14f4
-
SHA256
2dae35b9d3507b019def494805d237a8077458225314208affac435406408498
-
SHA512
5d4537e6933800bb0d000f7a39101de8026449f00c94354de0c9d5ddba29a8cb238d5a438df6c43b0face9eed8d6c6652dfe2bdcd49ffa7e549a6e22b01338c6
-
SSDEEP
3072:HaQo03tPdZeVXq8xNR6tgR07WtU/Wbf8Slr/5IfygXUhVI:j0BXR0SUS8St/5NEUhK
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 7 IoCs
resource yara_rule behavioral1/memory/1732-6-0x0000000000400000-0x0000000000425000-memory.dmp UPX behavioral1/memory/1732-7-0x0000000000400000-0x0000000000425000-memory.dmp UPX behavioral1/memory/1732-5-0x0000000000400000-0x0000000000425000-memory.dmp UPX behavioral1/memory/1732-10-0x0000000000400000-0x0000000000425000-memory.dmp UPX behavioral1/memory/1732-4-0x0000000000400000-0x0000000000425000-memory.dmp UPX behavioral1/memory/1732-3-0x0000000000400000-0x0000000000425000-memory.dmp UPX behavioral1/memory/1732-21-0x0000000000400000-0x0000000000425000-memory.dmp UPX -
Loads dropped DLL 2 IoCs
pid Process 1732 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 1732 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1732-2-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1732-6-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1732-7-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1732-5-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1732-10-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1732-4-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1732-3-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1732-21-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\M: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\O: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\Q: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\U: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\Z: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\G: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\H: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\P: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\R: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\S: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\T: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\E: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\L: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\V: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\W: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\X: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\J: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\N: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\Y: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened (read-only) \??\K: 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Windows\SysWOW64\runouce.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\README.HTM 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\readme.eml 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\epl-v10.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\view.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsHomePage.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\readme.eml 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\license.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Green Bubbles.htm 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsPrintTemplateRTL.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsColorChart.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\CURRENCY.HTM 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsFormTemplate.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\RELEASE-NOTES.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm_export.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsFormTemplate.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\readme.eml 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXE 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\readme.eml 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\index.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsBlankPage.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUDGESCH.HTM 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\ReadMe.htm 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsVersion1Warning.htm 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\epl-v10.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\readme.eml 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsPreviewTemplate.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsPreviewTemplateRTL.html 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2636 1732 WerFault.exe 28 -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1732 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1732 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 28 PID 2064 wrote to memory of 1732 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 28 PID 2064 wrote to memory of 1732 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 28 PID 2064 wrote to memory of 1732 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 28 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21 PID 2064 wrote to memory of 1204 2064 2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe"C:\Users\Admin\AppData\Local\Temp\2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe"2⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe"C:\Users\Admin\AppData\Local\Temp\2dae35b9d3507b019def494805d237a8077458225314208affac435406408498.exe"3⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 1924⤵
- Program crash
PID:2636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\readme.eml
Filesize14KB
MD50a8c3e67fc0b9bc353379b222e66332c
SHA17fe9aa231e26168c0f5ded82c54458a7c533b786
SHA2569e4693159d27eb9d9849a926723d4c8a953801e275a338eee9ecd0cf2fe12f4d
SHA5127b5a9053d59fb8d8cd7c84d4da25c75e1c385b902dab958478a4d9379015d15b4de6285154e1679a243d2236c36b1c5bd2a8abaf31344fe808b69d49518d600a
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize12KB
MD58156706568e77846b7bfbcc091c6ffeb
SHA1792aa0db64f517520ee8f745bee71152532fe4d2
SHA2565e19cfbd6690649d3349e585472385186d99f56a94dc32d9073b83011cea85f8
SHA5128760f26069296f0fe09532f1244d93a57db4cafa8d06aaa9dc981bcaed4bde05366ef21e6f0c1aadad4478382b59a4e43d26c04185cf2ed965901321d05604b8
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize8KB
MD57757fe48a0974cb625e89012c92cc995
SHA1e4684021f14053c3f9526070dc687ff125251162
SHA256c0a8aa811a50c9b592c8f7987c016e178c732d7ebfd11aa985a8f0480539fa03
SHA512b3d4838b59f525078542e7ebbf77300d6f94e13b0bff1c9a2c5b44a66b89310a2593815703f9571565c18b0cdeb84e9e48432208aaa25dff9d2223722902d526
-
Filesize
451KB
MD57f822d6d134b07926fb26849c6049f9a
SHA1b775e7dc28373c02e538ad1264842ec619eaf834
SHA2565cb51fe402ac48c99118fd98061895fba7c9d2a8e2383bead86f50a4ed3206ed
SHA512609155a161975d26299f9b489bef5682fd3a800a842a8f0cffde4d5d12061319188dd8fec6df6a02640728b5870455e1a32cfaee3087a18feaecb590e453b19a
-
Filesize
640KB
MD587727840fcf81df46068640d7a85189a
SHA118540b08fbcb072ac3af3ad64a2b9ee1b03c9782
SHA256b6762d270201daa072b9b32058f7e227fc33a0874118391014f4f4ae79d7c547
SHA512fdd4d31bbcf86927476329b97e6dcddcda7e1aeb2add7bca886caf483af58af941cc2b72123b8152a625c00d3039046982ac902b7679f1b5c1729834955c41d0
-
Filesize
640KB
MD5b4c70c6aa73292570c54aa695730755f
SHA1a8b6be55686a2afcc7a23c4b3339e2b9d354cfb7
SHA2566b08989977df31bf90559e45745d8d000e80101be09432f006849daba3e05159
SHA5122db1fcd53c04b8569897437541bf278dfc26e3b1362a36e2101fd7ce0716b72b505280589676f7d654f8d3762ae7ee07b0e7508d30d67bc44de3876b546cb5d6
-
Filesize
461KB
MD5ee22532b4b8955b0ab7f604aef6191be
SHA1e605e3868948fca46a8bbeb280779c3e9afe4e6d
SHA256f711295abfe7bf9d42a0c36954b59b12aff022f8239ebe7c00a67c5bbd28bb31
SHA5127fb29a6d13be569fd1b189c876f4f6226da681c56e5c85437de0e3931477502e103c4d09a572a9e5cde3c0e002df17d2450ddb03e25979eb7f4ee3925485968d
-
Filesize
451KB
MD59e73542b50596feaee1a1aeb474171da
SHA17cce69bbdff41615a91b9e4e5ae98e4c55f2da6e
SHA256a4218026a48a9edd9bd818eedff44dbf78941e6d348305a04fad503400dbb999
SHA5120e63b765c19a6dd788fd72e412363a276b520f23ffac5b9018bce8f67f98d6e181cd8db8f917e547d4f3d097e86519678f68c7e95461ecc4520c9bbfd420c9ac
-
Filesize
461KB
MD54ba9a7a9e255164cdcc0f6ce378418c5
SHA16381f48aba8268e5c6eafe769bc7b972ea16df27
SHA256a942e81e1b85e4adf97cfaac3b742a29c0fa05aa346f549dc0d56878f74a7c01
SHA512e6daccb92e83c663493fd218c5a2055ef8938668989ab0cc271cc7c30000dee77a06451bde5a6b2b5d90329909ac1b728ac8f442f5c489c8fa8e15f6c91eeaa3
-
Filesize
152KB
MD5a2f5215b1a839d1c18344016d46e7ae3
SHA1ac6f5d1cabb52b1f1bad8bea1a92c3693bfa9505
SHA256c98b52aafca1eca83affdd643c80d187746b84348c5f01b3c47857d58888ee8b
SHA512237fe6d92141716eb56cfb66f8911765f3c37dfdecc1b140f2d90bd9331f92517b5198bf5fa5574faa16fae6756968254f87def2cd48ca03a275195cadcef6f1
-
Filesize
10KB
MD56a2fb92ab680909e723cd6cbe3916177
SHA10f943b937251065d5d173efb6d935cb223dd88d6
SHA256cd493e965f12063386eabc94c112680b0b176dc76f57b4e5de9f271ccf803af7
SHA5129dfff1cec9797c70ded70a2f319c31358dd71f19cc3780ac3bc3c59265aa64f13f1b22d2fb2670cbf3a237f87f966ee9f84735bad013638a1157d191f036afef
-
Filesize
81KB
MD51b4b9cc4ddb73b9284b794c0acfe55c2
SHA14579deb3052a4034c3477324c234c49c6314840d
SHA256e3cfda23c02af8c432418733ca810856cba5bf698475e22745a28f24d8be7301
SHA5125c7955b0a119e354da5c186c89411fb3b751eb1dab9bb6744906b984cea8834046045da0a990f8d478f6e67565666b3b9403237c0648d2fb19818a190b20c599
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94