Overview
overview
10Static
static
10Downloads/...07.exe
windows10-2004-x64
10Downloads/...5e.exe
windows10-2004-x64
10Downloads/...92.exe
windows10-2004-x64
10Downloads/...25.exe
windows10-2004-x64
10Downloads/...2e.exe
windows10-2004-x64
10Downloads/...8e.exe
windows10-2004-x64
10Downloads/...d4.exe
windows10-2004-x64
10Downloads/...98.exe
windows10-2004-x64
10Downloads/...b7.exe
windows10-2004-x64
10Downloads/Built.exe
windows10-2004-x64
8Downloads/...53.bat
windows10-2004-x64
10Downloads/DTLite.exe
windows10-2004-x64
10Downloads/...07.exe
windows10-2004-x64
10Downloads/PDF.exe
windows10-2004-x64
10Downloads/...SX.exe
windows10-2004-x64
10Downloads/...8a.exe
windows10-2004-x64
10Downloads/arwbjuh.exe
windows10-2004-x64
10Downloads/bjutbht.exe
windows10-2004-x64
10Downloads/black.bat
windows10-2004-x64
8Downloads/...mm.dll
windows10-2004-x64
10Downloads/...er.exe
windows10-2004-x64
1Downloads/...6d.exe
windows10-2004-x64
10Downloads/dwvhgtd.exe
windows10-2004-x64
10Downloads/file.exe
windows10-2004-x64
10Downloads/helper.bat
windows10-2004-x64
10Downloads/setup.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 08:50
Behavioral task
behavioral1
Sample
Downloads/1PDF.FaturaDetay_202407.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
Downloads/3e6642f7100bb72137d68b5aa34a2d1f1a75722ab7d2b15987bbdeb84bc3265e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Downloads/4c40337094cf0bb86fad86d2ea724ac6e6a499f0acd877839a69d35c354a7792.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Downloads/644d928a4a942f6ae4c90640103b595941f7a0b557ba49d122d137b1429c0325.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Downloads/64ec6562b96016699c6ae14166f4d31bde2b160eaa84d34a661fc2943017202e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
Downloads/7a0395c75ac633d66a7a9f2690cbdb9c90ac5b0fc4f9273b6e0cf16f70eedd8e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Downloads/901478668c0d5ecb3b5044dcb3e1744045f7b2a800a7c0c67020d9294470f3d4.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
Downloads/938b7e042bda75e416261e46d0d4873781fd5d53c2ce6c2748b92eeb8a826598.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Downloads/96d1bc7dec91a7a4e5fe653853a504e07d17e898fa437cf75e929fa909dd6bb7.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
Downloads/Built.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Downloads/DHL_PT563857935689275783656385FV-GDS3535353.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
Downloads/DTLite.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Downloads/PDF.FaturaDetay_202407.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
Downloads/PDF.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Downloads/SIP.03746.XSLSX.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
Downloads/a33245a27c02bbb72bf66f6bf1c960affefa8ed2a096dc1d6faa6699fe81c48a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Downloads/arwbjuh.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
Downloads/bjutbht.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Downloads/black.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
Downloads/borlndmm.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Downloads/ccleaner.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
Downloads/d87e2dcd2eb9763552645a34218696143fa99ac7b5173dcd04889ce9f5ddf96d.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Downloads/dwvhgtd.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
Downloads/file.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
Downloads/helper.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
Downloads/setup.exe
Resource
win10v2004-20240709-en
General
-
Target
Downloads/SIP.03746.XSLSX.exe
-
Size
321KB
-
MD5
a3e681364daaa68ce0177581573f483f
-
SHA1
eefb4725622f42019e475aa26439c0cf60dc7cc2
-
SHA256
a94869345f7f1f3a1bc6cca4aa94cc7bde30dcb0bb18198567ea58cc93ba2c15
-
SHA512
a071ae229d39674e53cf0051bde78b792041064a90580ab4ef51c4bec8dd4e7cc19934a3249e45df20cf3bc1aa76b28ba04f954eda9767acd2aa2092c606949b
-
SSDEEP
6144:RZABbWqsE/Ao+mv8Qv0LVmwq4FU0fNoy6oHGx1d0RjzV5Pnz63LLHBN+:PANwRo+mv8QD4+0V16oHblLPkLLhN+
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.ru - Port:
587 - Username:
[email protected] - Password:
9b0P96R6nBreNQrU3Cte
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2524 powershell.exe -
Checks computer location settings 2 TTPs 37 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation SIP.03746.XSLSX.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation RootDesign.exe -
Executes dropped EXE 37 IoCs
pid Process 2128 RootDesign.exe 3256 RootDesign.exe 4752 RootDesign.exe 1548 RootDesign.exe 4900 RootDesign.exe 1652 RootDesign.exe 2424 RootDesign.exe 3236 RootDesign.exe 3756 RootDesign.exe 3268 RootDesign.exe 3196 RootDesign.exe 4340 RootDesign.exe 4684 RootDesign.exe 5084 RootDesign.exe 5036 RootDesign.exe 632 RootDesign.exe 4548 RootDesign.exe 4076 RootDesign.exe 3304 RootDesign.exe 2216 RootDesign.exe 4972 RootDesign.exe 1344 RootDesign.exe 4904 RootDesign.exe 4148 RootDesign.exe 4308 RootDesign.exe 4716 RootDesign.exe 4596 RootDesign.exe 1528 RootDesign.exe 1664 RootDesign.exe 2108 RootDesign.exe 5108 RootDesign.exe 1968 RootDesign.exe 228 RootDesign.exe 3320 RootDesign.exe 3008 RootDesign.exe 5000 RootDesign.exe 1752 RootDesign.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsUqdates = "C:\\TheDream\\RootDesign.exe" RootDesign.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Window 1 TTPs 1 IoCs
Windows that would typically be displayed when an application carries out an operation can be hidden.
pid Process 3764 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2524 powershell.exe 2524 powershell.exe 3752 powershell.exe 3752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 2524 powershell.exe Token: SeDebugPrivilege 3752 powershell.exe Token: SeDebugPrivilege 3256 RootDesign.exe Token: SeDebugPrivilege 4752 RootDesign.exe Token: SeDebugPrivilege 1548 RootDesign.exe Token: SeDebugPrivilege 4900 RootDesign.exe Token: SeDebugPrivilege 1652 RootDesign.exe Token: SeDebugPrivilege 2424 RootDesign.exe Token: SeDebugPrivilege 3236 RootDesign.exe Token: SeDebugPrivilege 3756 RootDesign.exe Token: SeDebugPrivilege 3268 RootDesign.exe Token: SeDebugPrivilege 3196 RootDesign.exe Token: SeDebugPrivilege 4340 RootDesign.exe Token: SeDebugPrivilege 4684 RootDesign.exe Token: SeDebugPrivilege 5084 RootDesign.exe Token: SeDebugPrivilege 5036 RootDesign.exe Token: SeDebugPrivilege 632 RootDesign.exe Token: SeDebugPrivilege 4548 RootDesign.exe Token: SeDebugPrivilege 4076 RootDesign.exe Token: SeDebugPrivilege 3304 RootDesign.exe Token: SeDebugPrivilege 2216 RootDesign.exe Token: SeDebugPrivilege 4972 RootDesign.exe Token: SeDebugPrivilege 1344 RootDesign.exe Token: SeDebugPrivilege 4904 RootDesign.exe Token: SeDebugPrivilege 4148 RootDesign.exe Token: SeDebugPrivilege 4308 RootDesign.exe Token: SeDebugPrivilege 4716 RootDesign.exe Token: SeDebugPrivilege 4596 RootDesign.exe Token: SeDebugPrivilege 1528 RootDesign.exe Token: SeDebugPrivilege 1664 RootDesign.exe Token: SeDebugPrivilege 2108 RootDesign.exe Token: SeDebugPrivilege 5108 RootDesign.exe Token: SeDebugPrivilege 1968 RootDesign.exe Token: SeDebugPrivilege 228 RootDesign.exe Token: SeDebugPrivilege 3320 RootDesign.exe Token: SeDebugPrivilege 3008 RootDesign.exe Token: SeDebugPrivilege 5000 RootDesign.exe Token: SeDebugPrivilege 1752 RootDesign.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 3764 4760 SIP.03746.XSLSX.exe 84 PID 4760 wrote to memory of 3764 4760 SIP.03746.XSLSX.exe 84 PID 4760 wrote to memory of 3764 4760 SIP.03746.XSLSX.exe 84 PID 3764 wrote to memory of 2524 3764 cmd.exe 86 PID 3764 wrote to memory of 2524 3764 cmd.exe 86 PID 3764 wrote to memory of 2524 3764 cmd.exe 86 PID 2524 wrote to memory of 3752 2524 powershell.exe 87 PID 2524 wrote to memory of 3752 2524 powershell.exe 87 PID 2524 wrote to memory of 3752 2524 powershell.exe 87 PID 3752 wrote to memory of 2128 3752 powershell.exe 88 PID 3752 wrote to memory of 2128 3752 powershell.exe 88 PID 3752 wrote to memory of 2128 3752 powershell.exe 88 PID 2128 wrote to memory of 3256 2128 RootDesign.exe 91 PID 2128 wrote to memory of 3256 2128 RootDesign.exe 91 PID 2128 wrote to memory of 3256 2128 RootDesign.exe 91 PID 3256 wrote to memory of 4752 3256 RootDesign.exe 92 PID 3256 wrote to memory of 4752 3256 RootDesign.exe 92 PID 3256 wrote to memory of 4752 3256 RootDesign.exe 92 PID 4752 wrote to memory of 1548 4752 RootDesign.exe 93 PID 4752 wrote to memory of 1548 4752 RootDesign.exe 93 PID 4752 wrote to memory of 1548 4752 RootDesign.exe 93 PID 1548 wrote to memory of 4900 1548 RootDesign.exe 94 PID 1548 wrote to memory of 4900 1548 RootDesign.exe 94 PID 1548 wrote to memory of 4900 1548 RootDesign.exe 94 PID 4900 wrote to memory of 1652 4900 RootDesign.exe 95 PID 4900 wrote to memory of 1652 4900 RootDesign.exe 95 PID 4900 wrote to memory of 1652 4900 RootDesign.exe 95 PID 1652 wrote to memory of 2424 1652 RootDesign.exe 96 PID 1652 wrote to memory of 2424 1652 RootDesign.exe 96 PID 1652 wrote to memory of 2424 1652 RootDesign.exe 96 PID 2424 wrote to memory of 3236 2424 RootDesign.exe 99 PID 2424 wrote to memory of 3236 2424 RootDesign.exe 99 PID 2424 wrote to memory of 3236 2424 RootDesign.exe 99 PID 3236 wrote to memory of 3756 3236 RootDesign.exe 100 PID 3236 wrote to memory of 3756 3236 RootDesign.exe 100 PID 3236 wrote to memory of 3756 3236 RootDesign.exe 100 PID 3756 wrote to memory of 3268 3756 RootDesign.exe 103 PID 3756 wrote to memory of 3268 3756 RootDesign.exe 103 PID 3756 wrote to memory of 3268 3756 RootDesign.exe 103 PID 3268 wrote to memory of 3196 3268 RootDesign.exe 105 PID 3268 wrote to memory of 3196 3268 RootDesign.exe 105 PID 3268 wrote to memory of 3196 3268 RootDesign.exe 105 PID 3196 wrote to memory of 4340 3196 RootDesign.exe 106 PID 3196 wrote to memory of 4340 3196 RootDesign.exe 106 PID 3196 wrote to memory of 4340 3196 RootDesign.exe 106 PID 4340 wrote to memory of 4684 4340 RootDesign.exe 107 PID 4340 wrote to memory of 4684 4340 RootDesign.exe 107 PID 4340 wrote to memory of 4684 4340 RootDesign.exe 107 PID 4684 wrote to memory of 5084 4684 RootDesign.exe 108 PID 4684 wrote to memory of 5084 4684 RootDesign.exe 108 PID 4684 wrote to memory of 5084 4684 RootDesign.exe 108 PID 5084 wrote to memory of 5036 5084 RootDesign.exe 109 PID 5084 wrote to memory of 5036 5084 RootDesign.exe 109 PID 5084 wrote to memory of 5036 5084 RootDesign.exe 109 PID 5036 wrote to memory of 632 5036 RootDesign.exe 110 PID 5036 wrote to memory of 632 5036 RootDesign.exe 110 PID 5036 wrote to memory of 632 5036 RootDesign.exe 110 PID 632 wrote to memory of 4548 632 RootDesign.exe 111 PID 632 wrote to memory of 4548 632 RootDesign.exe 111 PID 632 wrote to memory of 4548 632 RootDesign.exe 111 PID 4548 wrote to memory of 4076 4548 RootDesign.exe 112 PID 4548 wrote to memory of 4076 4548 RootDesign.exe 112 PID 4548 wrote to memory of 4076 4548 RootDesign.exe 112 PID 4076 wrote to memory of 3304 4076 RootDesign.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\Downloads\SIP.03746.XSLSX.exe"C:\Users\Admin\AppData\Local\Temp\Downloads\SIP.03746.XSLSX.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c PowerShell.exe -windowstyle hidden powershell -c C:\TheDream\RootDesign.exe2⤵
- Hide Artifacts: Hidden Window
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -windowstyle hidden powershell -c C:\TheDream\RootDesign.exe3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -c C:\TheDream\RootDesign.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3304 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4972 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1344 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4904 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4148 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4308 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4716 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5108 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1968 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:228 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5000 -
C:\TheDream\RootDesign.exe"C:\TheDream\RootDesign.exe"41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD5e739795e2208eb8e10ee98b92b52a5ca
SHA10ac1bd3681544350158ff9d7c44d1732b5673178
SHA256bbda59896347af0b13c361b9fb97c42c1903e1cd1fad498c8192416c408139c5
SHA512ff39f09fc65d6bad6b6a5d555c453ee7a29fdb8d7e16dc4ef08cb9a3b2b0d14558dc379a87e5e170752fdac56192b1d677cbb447a880e6c0fca5f0110b63c062
-
Filesize
126B
MD59c788766645324a0544e77719ec74f3a
SHA1eb36e2b9af2f1de97a418296451264a6d09432be
SHA2569ad1ed6a02b72803f122eacbe8792e95203c8279ebf94de62efe73ed2de65cbb
SHA51205a3a842d35cee353673ef896e9c7b088177174b8a996a80239bfd1aa140596f6350a549908647c6a18f72e06906819d4fd168c71af61ef17c9ae2f8f3780f71
-
Filesize
141B
MD5118034be4e5e40b9ce26a21d9ad8ddab
SHA1dca2c9ab97dcbab2d136857390414008407d89b7
SHA256061b921670f8074f883322dbec91032cf1361478d3b591e6cadcbcbb1f904b2a
SHA5122d46565fc0fdbe19f8b803732be2615b1deceaf75b31291632100dee195ad5672abc2769d1118ea7e32c7ebb6233c94e0880d45c16143c2daa20ff9eea52d8e7
-
Filesize
156B
MD5d1a57c397a25bd33239a9e20bb372a15
SHA176f6838bda773ef6b1a2f2c1e7dee224ab640664
SHA2560a8e94f53a69120617d3822d5cd7204e05e49d3ac6916eaa64b470acc2b0086a
SHA512648dcad1420e2179f93f1d441616dc3982fa7a355d40c034189d74a912bb455240554163ade355c79d1c1854e0f80ab96c0e0ca3f3a6ec6e9d2232c0a9730a43
-
Filesize
171B
MD5c1f51041209cbfec0334e239bc1ad217
SHA18550018103fefafba93194991d78dc18dd1416ab
SHA2566fe037658176983359670a656fd6b7f4db37f7fe3416b820957b3a8e0d2bbcac
SHA512cfcd3809de7aa26976f5137b8db3c26e1c6893bec35674b0aabb04a40976bea2c64cbf6f4ca5c05c4815eca25149cd7e37f8ec6088c6e8f775652c67d6d0b607
-
Filesize
186B
MD54c00afd71023ba478000bebcedc18ce1
SHA148c2e96900a77ed12b9f018c0cb6c4bed9600540
SHA256db91a04852099fcb2eb6df76ffae528474d40059d1c4eb0733bf9306143bf59a
SHA512939e9d634cd61a3a62e3135764c5f8b0d623861d4a08d5c9e06fe3742bfd17cd170e609cf1b3e26e3044bc89171de7398d7d7bfe2447df7482f07c16216f9b1a
-
Filesize
201B
MD5d81260f1a679fa6fcf4c8698ecb58615
SHA197393533bdab3cf9ca777005534ab20310b676e6
SHA25660062ce5031928dfcba5f6be15e406d48aa80fc70bd733392cceaed28d35e5bf
SHA51251fd70e018793254cc14ca9b73dfa906febee8c14bedce65f319fd8ce0dc7fb5fdf53b212858b2cff166f01baaa70dd81412a4b67437587e7e7271a764d1d44e
-
Filesize
216B
MD53df1eb5853271b2381dbf8b3737b912f
SHA1edf414a969e2adb571a4308f9dc2e37bc2933bd3
SHA256de27b1700a5ed82ce7653add18b7b86bf5646f773bff58f7744b280caedeed1c
SHA512b4dee8e4cab792cef18bf75231a92e581068df199bdf6d1510ed85318fa2f1831d556d0568ec7030e6ccf44b3226d9a7a287c7515cedbf2f56a8b1891fa3e635
-
Filesize
231B
MD5282981667ba6bac6afd18a3ab776797e
SHA12db1b62a24453b83353dfe4dec0ee49ee050b45e
SHA256ba763d236358af8478d39c5b48382719a400440bdc2b62854bad81cccc463314
SHA5124ba8fb9ceb6f13811830ee8a17b0adb77b4caa44707b515bf098d931740d2c07e5718837baa81e733149f13d5f8f7098bd2dd96d0eb2750835bcb8901e9ddccb
-
Filesize
246B
MD587e4c360ebcfd08363003abf4aae7120
SHA18ab3eb0093eced092b5d11add3707d54f414e0cd
SHA2567b6527141909ead983b6dc0a49a4e49b312197c967c5156fd76c23529e091f7a
SHA512a33fe940fdac6ae355a74d490fcc9d087f4cb2cee32add14dffee2d360368f179ef151a47d994315b0d495c0b8de2aaf056741c3684f7eeab518e4cb72b3f07e
-
Filesize
261B
MD5878f98a12c0326ec4471e4798f780b35
SHA1859a9046fd75fe8dd052c566a668ec568be19f7a
SHA256b8c1538f66af5f7fcc417e3d681500551863fd890b820a5a6ef681cff8e5cd24
SHA5124762885eb474786475688853765fb7f8b2f6ae50f1260156eeccd29bcbdd9c144bbe7b391a2e53009ecd84b4c9065d7726b79b37fd54404da7c503d9fc118418
-
Filesize
276B
MD568cc39cecebe491143d050c3cc8d527e
SHA154c4fdbe25e6db85c79b4f3de906f61cdc0b9cdf
SHA256d242df5786f8bf5174a62bfee35247de102620c55ed84b5ab9fdbb45a22c8c64
SHA512503b6de37d8b3b230a078f9eb1e3edb3dce9f9d164d398f466a5b63a6e1612c1c96924d7e3ee63ae4dc141bc1ccff44c7203227d5991fdcb32fd0a627a5f5c04
-
Filesize
291B
MD5d1b784b17308c42aba9a311bce9c5935
SHA11e921cc869479d6b9866dac53f07d19b640d60ff
SHA256e1dcac57d7a601cb185354d2cc502bb08e8eee317bf0d598157fbb2cdc81c1c1
SHA512dca23fe42136b891cee53592ea4d9af889d3d1fbdac44e2240a7327524f7670451d2e9033f348249570783ba920676bbfe62e38de0afc8fb4391b86b337f47b4
-
Filesize
306B
MD5611d11e13c47eff2f31b1b55d334ad8c
SHA10451f32aa2acb08b702611f6829011af27a144da
SHA2566c7b8c9c3c78ef2e6d640794e1f7663ef3e68e9bb2bebeaac418f06acfa8af91
SHA51276b1f604c6ca8b2492ecdf59c6959257aa4519150f76917c7395879f245b71093dbfb09d656968d9a084e515daa28b5f76143c16df2c4a4a34bf360f4ea5874d
-
Filesize
21B
MD53c232254a15022c8bccc67a163f2ce5a
SHA1bd82a81e9048be79ae2b5513333d9bb9c6325999
SHA2562af33a3f0aba7bfc582cceab6baece188696c0ab08940acb8dbe086b48e6a589
SHA51267793fbb1dd2dde93a85bd830884ad02cac37dfd7bbb92ceb591dd866fc9e0663ab8941d8c43dc144134b661b0c7009f6f7bfbc8aa023c86d30fbe7f9bde6c18
-
Filesize
36B
MD5a5b0591b2f70456da9cd02ef7b388049
SHA1c4436deecb44292acdb1aaf6e594f81f87bbd59a
SHA2564dc16645122903c5a02cbc562d46e9b0167a4df03a7d4f331237ab299934f717
SHA51233226836f1f8546ca287138f647062c5d2cd9f3f735020e93941a786ebd1f381bad3b486624b52c57dd62957bccb36c1c4fb5256f9cd40981647d8f04750de4c
-
Filesize
51B
MD54bf48e46840fb716c7f67cb15aaf0640
SHA157871bd1a9084f3d16582e3a4b367e729d43f072
SHA25671ed11b127d1bde7c75ca3e5af17c70106e8b07c728f72eaa7a0fb7186621912
SHA512b94021a7acf4ff4190ad70823b2560952b8f683da580a1365e13a3157799b9cfb73f51bad43f2c91b78c6d34a75db84c032cef0cfd529f70a13b0005525d64de
-
Filesize
66B
MD501c596cbd77a920982c9cd4d4cca3d12
SHA1fb442b56ed6545dc6f7395ec46dacb56d084b141
SHA2569497780664233254a6b3785a48367c6cc9cbac3b7e712c0fcf6e239d7814d842
SHA5120e94b4b795b0f376ff5efe59f6bd1463b588a8c1154ed0b8956b0e988f93529455a69283ce1e55f2637c73fbf7dd5eaa23a45e97da4f430688c7f6eccdce29ff
-
Filesize
81B
MD54e0e0807884f3f21019a28701e2f33be
SHA1c7207484837fe1b7957a2c94a7b77fbf2e517189
SHA25680bda00796a2d7812ffb3106d337d8e86e4184f3b31ad33f4e2093109f890107
SHA5120e4e5547896849d969f38ebcd8041f7d427e017fb7581767763bd7ea1a36d96c8818ad1e2c06b14cfb557eaaff74de0fdd8393d4376539ac80fb4468751bc404
-
Filesize
96B
MD545c561fb2c15620a9640782fc40cd2b1
SHA11a1f745124bdb30331ea1c37ab53f8eca2412d07
SHA256312c7fabec8778052a0cc9d10157026edfd64aa240a94be5ff18fcb5432b384c
SHA512af461ada8910472c8df94e7036be02ffc3b781e0a443ee9b37cf2aaeaac8069c7e064151fe0140fe9ff6f5652f709102d0b5bbf99e572037707e1a7a14d55923
-
Filesize
111B
MD5332fea85597750aeddd99a600e4e4867
SHA1ccab3db9f1992a70b80bf6e2cf594bdb6e1ea908
SHA256371ba0e39642c50ce5a370eb59535c1f1fc1ecfbb7cd90855bc6d1ff64ab7650
SHA5123ff40fc03416165708bda4736f17e3fdfb8df8b5587bf773c7716175b35f07cdaa792af500b22318a5a3fe44d51e4edcde290adf15993f4c24a8607c0c389c06
-
Filesize
1KB
MD596cca7a6ce0df83a5eaacad47f26e6c0
SHA1a203126275c74e9974ba23a1269e8f5104b134b3
SHA256e29461f622da1d1f9e37466f5dc1f96bb10621454cffc5fd4dc73ae2f973d344
SHA51211dc5cfdf4ed957fc8ebc4894ff8e2cbbd64864032159625bd6b92daa16053cad12cb61c17416a55b76c3722174cf751bd108665402ea426225670589520cacb
-
Filesize
1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
Filesize
11KB
MD5544c4d751b526eb19fc4e87df77cb796
SHA1723189c99c53eae92d32d78389a3933f2f491375
SHA25621f45fa0c06040b4eeb56efbe5e6503f12af50bf53bff006e3e1b426c40385ec
SHA51231f251cff49ee50abbeb263f52c5cab37e12ec5f7139926d42ff3acc958a90de12fe49633e39f3a08d507e8599ef489358352d68ea244fcc9a365eafea9ce755
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5934c538703a8d75fc9452968bd4153e4
SHA1f85647d373dcafe1dc6c54d2fef2a6cb192a5172
SHA25604ead23fabb8ebae8d2e271624b5059a89300c6ae824469b671d26dc5d72208d
SHA5127112ac70c40ab61bfa68151ac78ff6ebee02ee8a61869ae0f083bd5fbc8d22ff585ecbb59156694cf17072363d4ffb4bf1bb51b9194e697e1bf1827f79ac0c05