Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/07/2024, 04:41
Behavioral task
behavioral1
Sample
cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe
Resource
win11-20240709-en
General
-
Target
cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe
-
Size
849KB
-
MD5
528d0fa7beea751d34448775846f21f1
-
SHA1
318aeca81bd46029ad098353e5517bed3ca74139
-
SHA256
cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da
-
SHA512
6bf9eea839e7fb0379d435060598710b15be8ebc541183274cbac4220c76ed49a59f985e20c8b5e5ab01b5819e0908256d8c55649790cda1ea4dd776e190a917
-
SSDEEP
24576:f+F0sIE9JqsC6mVFyCsffzMS6pcsP9Qtce0TBs/lPsoCyEbDb7Br5oANn90x5MO6:TbjnSU
Malware Config
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral2/memory/2472-0-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/files/0x0007000000027867-13.dat family_neshta behavioral2/memory/2472-119-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta behavioral2/memory/2472-122-0x0000000000400000-0x000000000042B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DOYBUhaHlsyZSrlwldpMikdWxheGr\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\DOYBUhaHlsyZSrlwldpMikdWxheGr" cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe -
Executes dropped EXE 1 IoCs
pid Process 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateSetup.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\cookie_exporter.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\BHO\ie_to_edge_stub.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\Installer\setup.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedgewebview2.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\msedge.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeComRegisterShellARM64.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\identity_helper.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_proxy.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_pwa_launcher.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateBroker.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\notification_helper.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\pwahelper.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateCore.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 1992 2472 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 81 PID 2472 wrote to memory of 1992 2472 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 81 PID 1992 wrote to memory of 4740 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 83 PID 1992 wrote to memory of 4740 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 83 PID 1992 wrote to memory of 548 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 85 PID 1992 wrote to memory of 548 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 85 PID 1992 wrote to memory of 4416 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 88 PID 1992 wrote to memory of 4416 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 88 PID 1992 wrote to memory of 2392 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 89 PID 1992 wrote to memory of 2392 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 89 PID 1992 wrote to memory of 3580 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 90 PID 1992 wrote to memory of 3580 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 90 PID 1992 wrote to memory of 4092 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 91 PID 1992 wrote to memory of 4092 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 91 PID 1992 wrote to memory of 5040 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 92 PID 1992 wrote to memory of 5040 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 92 PID 1992 wrote to memory of 736 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 96 PID 1992 wrote to memory of 736 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 96 PID 1992 wrote to memory of 4636 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 97 PID 1992 wrote to memory of 4636 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 97 PID 1992 wrote to memory of 2576 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 98 PID 1992 wrote to memory of 2576 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 98 PID 1992 wrote to memory of 2556 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 99 PID 1992 wrote to memory of 2556 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 99 PID 1992 wrote to memory of 3392 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 100 PID 1992 wrote to memory of 3392 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 100 PID 1992 wrote to memory of 3308 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 101 PID 1992 wrote to memory of 3308 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 101 PID 1992 wrote to memory of 4188 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 102 PID 1992 wrote to memory of 4188 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 102 PID 1992 wrote to memory of 1404 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 103 PID 1992 wrote to memory of 1404 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 103 PID 1992 wrote to memory of 3468 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 104 PID 1992 wrote to memory of 3468 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 104 PID 1992 wrote to memory of 3416 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 105 PID 1992 wrote to memory of 3416 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 105 PID 1992 wrote to memory of 4312 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 106 PID 1992 wrote to memory of 4312 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 106 PID 1992 wrote to memory of 1200 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 107 PID 1992 wrote to memory of 1200 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 107 PID 1992 wrote to memory of 128 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 108 PID 1992 wrote to memory of 128 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 108 PID 1992 wrote to memory of 5072 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 109 PID 1992 wrote to memory of 5072 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 109 PID 1992 wrote to memory of 5084 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 110 PID 1992 wrote to memory of 5084 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 110 PID 1992 wrote to memory of 4784 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 111 PID 1992 wrote to memory of 4784 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 111 PID 1992 wrote to memory of 3228 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 113 PID 1992 wrote to memory of 3228 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 113 PID 1992 wrote to memory of 4316 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 114 PID 1992 wrote to memory of 4316 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 114 PID 1992 wrote to memory of 4164 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 115 PID 1992 wrote to memory of 4164 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 115 PID 1992 wrote to memory of 5024 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 116 PID 1992 wrote to memory of 5024 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 116 PID 1992 wrote to memory of 4804 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 117 PID 1992 wrote to memory of 4804 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 117 PID 1992 wrote to memory of 2884 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 118 PID 1992 wrote to memory of 2884 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 118 PID 1992 wrote to memory of 3996 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 119 PID 1992 wrote to memory of 3996 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 119 PID 1992 wrote to memory of 4564 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 120 PID 1992 wrote to memory of 4564 1992 cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe"C:\Users\Admin\AppData\Local\Temp\cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe"2⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:5040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:5072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:5084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:5024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2140
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1380
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:5036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:5048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4192
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4612
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5a40427e3788637e741fb69ea8d76cd52
SHA1f8c8c7ec493e32a7573d90ce400fccd79fc98f31
SHA25618dcc8fae245869d02b7db0edbe22ec57a30bdd51a64090452118a79ba194052
SHA512e6b688d4ad0506c74db323b50a2588472f45e66da2a3456450aea96d93882b13662f8b3bbed7773180f5bec851a31d2e45262ecb9283b425c60c8caa06d56ca2
-
C:\Users\Admin\AppData\Local\Temp\3582-490\cea71a299ebe23ee56705c7b80d1b24751dc45fdbd8762618cfa5c99eccac3da.exe
Filesize808KB
MD54ac882ebdbc1431cdd3ab45e1712ada1
SHA1b871304fd060b700fd66ce0c87014ec955d12979
SHA256b13f23643fddce3f41b6908a00051b6688788668c81d698994c140bf6290c2d6
SHA512f3ff8d00849289436b723bc48c14113e51b583955d7f69870458d7b7d72ba214ad531d601a950b247f43325a610fd15cd6584008fd842a29c1dd0804ee2e6f98