Overview
overview
10Static
static
100715240d1a...ce.exe
windows7-x64
907fec2205c...42.exe
windows7-x64
1010dc6e128c...c0.exe
windows7-x64
3133bf8be0c...de.exe
windows7-x64
10139a8bb2c5...c1.exe
windows7-x64
1019f7d53c4a...a0.exe
windows7-x64
102896b38ec3...9c.exe
windows7-x64
102d301697ff...f4.exe
windows7-x64
3337576503...d8.exe
windows7-x64
33e04fe9f42...f1.exe
windows7-x64
103e6fbc358e...45.exe
windows7-x64
103f7458e658...df.exe
windows7-x64
434ea9832e...27.exe
windows7-x64
1047792144c9...6f.exe
windows7-x64
105114aae6e8...8c.exe
windows7-x64
10537a2fd4d2...ba.exe
windows7-x64
355754358dd...1c.exe
windows7-x64
15b1caa9bec...c1.exe
windows7-x64
160c24a4c6b...21.exe
windows7-x64
963396a28b7...cc.exe
windows7-x64
978d4fce0c2...2e.exe
windows7-x64
37c27b9fef6...33.exe
windows7-x64
381689f1be9...ed.exe
windows7-x64
10995a91e668...55.exe
windows7-x64
109d90421b2e...56.exe
windows7-x64
10a597d34bc2...40.exe
windows7-x64
10a5e6df754a...d1.exe
windows7-x64
10add2850732...6b.exe
windows7-x64
10b098486c49...0d.exe
windows7-x64
10b923f1d2ec...ed.exe
windows7-x64
10bbdac308d2...4b.exe
windows7-x64
9c3fb821138...c1.exe
windows7-x64
9Analysis
-
max time kernel
1561s -
max time network
1562s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
0715240d1af82c1cea262cde2a286b8b400805dc1f35f49422c7ee39e00f93ce.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
07fec2205cbbf2900ede2f6a1d9a5c428ef314c1dda559c632833a9c1d121542.exe
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
10dc6e128c7e5e7088f487ba9b22c1a836f50a552bc93fcce748d7e1c8f76fc0.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
133bf8be0cf7003b83b03579970997d408a930e58ec2726715140520900c06de.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
139a8bb2c5537190e747d2f651b423147018fd9a9a21bb36281d4ce1c61727c1.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
19f7d53c4a9ba784fd4c64a06fc6a88caf5a4d9913341a625582d51b1c095ba0.exe
Resource
win7-20240704-en
Behavioral task
behavioral7
Sample
2896b38ec3f5f196a9d127dbda3f44c7c29c844f53ae5f209229d56fd6f2a59c.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
2d301697ff72986171c0b2ccc979ab8e93671d640de6abad57de7d4e146b70f4.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
3337576503c3e2d8876f50191ae8995b04a4536f816025c543d0e20250598fd8.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
3e6fbc358e0204cb67a41b05771fac74f1b49737c7ab7138e415c7e9628ef545.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
3f7458e658401c15b675db78a2e9871ca3eeff3c6e299c4545515e56b66466df.exe
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
434ea9832e6d11d614905e3eb31c333289429095b76573f1ceb38fd10608bc27.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
47792144c9b440b3d2fbd422f68a23a8a8dfc16466d2a7430fc283a9d382826f.exe
Resource
win7-20240704-en
Behavioral task
behavioral15
Sample
5114aae6e86c7eedfbf181110e4fddfad88fe296ec590390705e00272121e48c.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
537a2fd4d214a212df06fb73b19ba945672eaf18d64cc30d8e99ab6a0d7cb9ba.exe
Resource
win7-20240705-en
Behavioral task
behavioral17
Sample
55754358ddd26b3c56ca27780dcc408711f8a9fc42b1c9d305d1045146f40f1c.exe
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
5b1caa9bec8d7d7833b0e25f3e4256975c38a22c2901f8e4d99fb164dfde13c1.exe
Resource
win7-20240705-en
Behavioral task
behavioral19
Sample
60c24a4c6b54b1f4baeaee585e5e2486bbd3ab4733de36bb28da1fdb20596e21.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
63396a28b79a7eaa60c384bcb02699398cd3b2b0c14fe9cfaf52b2ffa57798cc.exe
Resource
win7-20240705-en
Behavioral task
behavioral21
Sample
78d4fce0c253356bf72cf72f260f27a3f0f3cf0a904a3618f3011cbe0b4e882e.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
7c27b9fef6e94e99092fb628716ae9114385d4d5753f72bff1221bad2eb54933.exe
Resource
win7-20240705-en
Behavioral task
behavioral23
Sample
81689f1be92c8fb7e94fe241441c7eb43cfb77c6d23592b0248566bd709ff2ed.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
995a91e668b85a992c8a71aed191fa0fafa3b1606bf205bef93a2457786de555.exe
Resource
win7-20240704-en
Behavioral task
behavioral25
Sample
9d90421b2e7afff3634a9b1590a165c07995d9e4f171e143c131d540147ec556.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
a597d34bc2464c3ace48ac04f6653f65ac4822ea8e4a5717ba9e4909b8c62240.exe
Resource
win7-20240705-en
Behavioral task
behavioral27
Sample
a5e6df754a4d3bb72f4d5c91d6b582e7e2c2f87ca838f5d976bc82384a5ad2d1.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
add2850732c42683ee92ba555bbffb88bf5a4eee7c51e24f15a898f2d5aff66b.exe
Resource
win7-20240708-en
Behavioral task
behavioral29
Sample
b098486c49a73591ca003f20276f1ca33605618a7167407d9f3f096bc7ec930d.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
b923f1d2ece074dabe58bb6a603ed5d49e8d62044a1293a37e8afbcac029dded.exe
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
bbdac308d2b15a4724de7919bf8e9ffa713dea60ae3a482417c44c60012a654b.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
c3fb821138d38ef9a2b0c77a4a3572ca38499b2dac3530c4a5faf2f789d57fc1.exe
Resource
win7-20240708-en
General
-
Target
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe
-
Size
153KB
-
MD5
35560fff8fc990948a9252bf20cfc8f5
-
SHA1
66163cb283c8792ac32c0e2361adc7143d8d319d
-
SHA256
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1
-
SHA512
9bf7b5aeec71b74012fa36d2af4dc4704e859a564cfbf3b35e44b1af8195a9885292c22a9297b691903c3245a6fae85746590988706e6a4d5dab29937ac13d77
-
SSDEEP
3072:j6glyuxE4GsUPnliByocWepvdHFdjFpZ/fgyVF0djk:j6gDBGpvEByocWetdHZ/fgKF0
Malware Config
Extracted
C:\cHpfiXA9s.README.txt
Signatures
-
Renames multiple (9361) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
Processes:
316C.tmppid process 2428 316C.tmp -
Executes dropped EXE 1 IoCs
Processes:
316C.tmppid process 2428 316C.tmp -
Loads dropped DLL 1 IoCs
Processes:
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exepid process 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 3 IoCs
Processes:
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\cHpfiXA9s.bmp" 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\cHpfiXA9s.bmp" 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe316C.tmppid process 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2428 316C.tmp -
Drops file in Program Files directory 64 IoCs
Processes:
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\common.luac 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Core.dll 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-ui_zh_CN.jar 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.model.workbench.nl_zh_4.4.0.v20140623020002.jar 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_classic_win7.css.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\cHpfiXA9s.README.txt 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7FR.LEX 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099154.JPG 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_pt-BR.dll 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\cHpfiXA9s.README.txt 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Vladivostok 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSTORE_COL.HXC 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00394_.WMF 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02094_.WMF.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\Vdk10.lng 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libwingdi_plugin.dll 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\CST6 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Mawson.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-core-kit_ja.jar.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\UrbanReport.Dotx.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD00141_.WMF 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\cHpfiXA9s.README.txt 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-api-visual.xml.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Tijuana.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIDEBARVERTBB.POC 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB2A.BDR.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341455.JPG 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\msolui100.rll 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Services.Client.dll 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Madeira.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs.xml 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaprsr.dll 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsColorChart.html.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0182689.JPG.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_Earthy.gif 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Microsoft Office\Office14\IEAWSDC.DLL.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18224_.WMF 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\cHpfiXA9s.README.txt 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CSS7DATA000A.DLL.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\SAVE.GIF.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21337_.GIF 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\RSSFeeds.html 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21306_.GIF 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-heapwalker.xml.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_Groove.gif 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14529_.GIF 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\cHpfiXA9s.README.txt 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libvmem_plugin.dll.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME10.CSS 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\cHpfiXA9s.README.txt 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\ED00184_.WMF 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FLAP.WMF.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309920.WMF.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File created C:\Program Files\Windows NT\Accessories\en-US\cHpfiXA9s.README.txt 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.json.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\SpiderSolitaire.exe.mui 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18234_.WMF 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Trek.eftx 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\AMERITECH.NET.XML.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\rings-dock.png 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\localizedStrings.js 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe -
Modifies Control Panel 2 IoCs
Processes:
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Control Panel\Desktop 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Control Panel\Desktop\WallpaperStyle = "10" 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe -
Modifies registry class 5 IoCs
Processes:
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cHpfiXA9s\DefaultIcon 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cHpfiXA9s\DefaultIcon\ = "C:\\ProgramData\\cHpfiXA9s.ico" 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cHpfiXA9s 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cHpfiXA9s\ = "cHpfiXA9s" 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exepid process 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe -
Suspicious behavior: RenamesItself 26 IoCs
Processes:
316C.tmppid process 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp 2428 316C.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exedescription pid process Token: SeAssignPrimaryTokenPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeDebugPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: 36 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeImpersonatePrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeIncBasePriorityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeIncreaseQuotaPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: 33 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeManageVolumePrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeProfSingleProcessPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeRestorePrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSystemProfilePrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeTakeOwnershipPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeShutdownPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeDebugPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeBackupPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe Token: SeSecurityPrivilege 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe316C.tmpdescription pid process target process PID 2064 wrote to memory of 2428 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 316C.tmp PID 2064 wrote to memory of 2428 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 316C.tmp PID 2064 wrote to memory of 2428 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 316C.tmp PID 2064 wrote to memory of 2428 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 316C.tmp PID 2064 wrote to memory of 2428 2064 3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe 316C.tmp PID 2428 wrote to memory of 2252 2428 316C.tmp cmd.exe PID 2428 wrote to memory of 2252 2428 316C.tmp cmd.exe PID 2428 wrote to memory of 2252 2428 316C.tmp cmd.exe PID 2428 wrote to memory of 2252 2428 316C.tmp cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe"C:\Users\Admin\AppData\Local\Temp\3e04fe9f427717ca17142603b46c5264fb42621048719721ffa4926c8e9bb6f1.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\ProgramData\316C.tmp"C:\ProgramData\316C.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\316C.tmp >> NUL3⤵PID:2252
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5e9d8659f707609498c5326b8960e9ef8
SHA1b4003b8d1d24a72c718cef2a1839bfec9433ccf4
SHA2564f09658e6ff6e7135309c78ce8a7c1c0a11d06011db3bd856772703eb9dffb12
SHA5122d8bd7fa78bb1241f23ce04c5e32e4f052f598b6c21368d1b34c22e377ad43c0145aaee8b010c76d1fb02497e6c6b5c00ec8a0ec5635869fe15af10b9b61cf14
-
Filesize
14KB
MD524a9eb90f460225a017475bfda1b7a91
SHA1a1e8d479d7d286d8b1137290afa53f61941ca365
SHA2568ff8322ec21c6f1fbf72277ecf16390b125074e4ec9c35140399517582d3400f
SHA512994ee866112c930d128e8860d537508c63365cbd8f0d254671bd60fd532b1ae697e79d01f6371c711cd208e1451ba7e3e67705de8082d946b54727bbe83a42a4
-
C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
Filesize153KB
MD506824e076455367f2925bf11385410e1
SHA18f6f0566eed13413963fa5a6eee49835632c1219
SHA256295632ec496541e31c66277d8e969378f8bcec7578c5ae1e0dab2b31a9f31fa2
SHA512ff972043860892cd2a9a735bc120f9f5e0ca961bcbc9999c54f31c318e87a718b45216bd3e50c1bd7364a8ba866b110ac29ea9c181a4c920a1757cf2834a4c19
-
Filesize
1KB
MD53605fdc69caa6b331eaf96ea07e4157d
SHA1fc6bce8fc36aa774fb5e02cc1b25df8b59c6fa44
SHA2560ec8c3830d53015c531dd0d8c540bc961f67888bb44731f87af6ba8be1268df3
SHA5128b3eddd76b231bf1cca7e26d83756d418fab432afb6c7fc46e3e1356c8a580b78e09f29ef3adbadf72a8258c29d4855dac9b4b5c4519535b93a982469519c226
-
Filesize
129B
MD542d9a8802a3ed460717702a1076b88dc
SHA1ebe7482323fb007a1d12590bd9081609f5fa8b3c
SHA256cc57911c31023c42bfdf8eefe63a2ec208fc7c09016d514fa026416f4b88411f
SHA51238673ed088550c3cda26b2972504bcc5188c7122af04a6682eb5c8a51d10c1e87277df3b12dbe01eea631428435aa040a655db8c7f0818092cfddded6a1ac8c4
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf