Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
S0laradD/S0larD.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
S0laradD/S0larD.exe
Resource
win10v2004-20240704-en
General
-
Target
S0laradD/S0larD.exe
-
Size
1.0MB
-
MD5
23070a36890ba9777456698061c77a25
-
SHA1
de00cec9241bc8c5a26691daf0b3fa9c11198c69
-
SHA256
35f2e98864bfdccc598cdb75e98d41b412da67d06ae8c49a8298d1cb50d49351
-
SHA512
d4a305e0edcec0665d6c7cc2d8277e2603f48fdba50514ff193463544c990e4af969b2d6433ee8fd58ab335476efd19302fd03a114d6766bfbaf654b1187c7e2
-
SSDEEP
24576:6hgeO08OxQO8XBQQfHuO4LW/bq8lDhdYjLr1ICqvWUPPzEWG:dLOb8R5Xljq8l9dIIffzEb
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 444 created 1240 444 Silver.pif 21 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 16 IoCs
pid Process 444 Silver.pif 2028 Silver.pif 1680 RegAsm.exe 884 RegAsm.exe 552 RegAsm.exe 1604 RegAsm.exe 2716 RegAsm.exe 2996 RegAsm.exe 2772 RegAsm.exe 1556 RegAsm.exe 1836 RegAsm.exe 2928 RegAsm.exe 1648 RegAsm.exe 2824 RegAsm.exe 1184 RegAsm.exe 2924 RegAsm.exe -
Loads dropped DLL 16 IoCs
pid Process 2644 cmd.exe 444 Silver.pif 1680 RegAsm.exe 884 RegAsm.exe 552 RegAsm.exe 1604 RegAsm.exe 2716 RegAsm.exe 2996 RegAsm.exe 2772 RegAsm.exe 1556 RegAsm.exe 1836 RegAsm.exe 2928 RegAsm.exe 1648 RegAsm.exe 2824 RegAsm.exe 1184 RegAsm.exe 2924 RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2600 tasklist.exe 1028 tasklist.exe -
Drops file in Windows directory 20 IoCs
description ioc Process File opened for modification C:\Windows\VisitsEdinburgh S0larD.exe File opened for modification C:\Windows\PersonalsLibrarian S0larD.exe File opened for modification C:\Windows\BassRelease S0larD.exe File opened for modification C:\Windows\SoughtCuisine S0larD.exe File opened for modification C:\Windows\MostPosters S0larD.exe File opened for modification C:\Windows\OutcomesPaperbacks S0larD.exe File opened for modification C:\Windows\UseFrom S0larD.exe File opened for modification C:\Windows\RestrictionsBurner S0larD.exe File opened for modification C:\Windows\MitchellGotten S0larD.exe File opened for modification C:\Windows\PlatinumTrainer S0larD.exe File opened for modification C:\Windows\CookbookJenny S0larD.exe File opened for modification C:\Windows\VolvoReservations S0larD.exe File opened for modification C:\Windows\FlightsChoir S0larD.exe File opened for modification C:\Windows\ReturnProject S0larD.exe File opened for modification C:\Windows\TacticsVictims S0larD.exe File opened for modification C:\Windows\LogicalDefining S0larD.exe File opened for modification C:\Windows\BicycleDaniel S0larD.exe File opened for modification C:\Windows\CanadaChemicals S0larD.exe File opened for modification C:\Windows\SellersWrong S0larD.exe File opened for modification C:\Windows\OrdersMiss S0larD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silver.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silver.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0larD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 768 timeout.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC} Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff Silver.pif Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\TV_TopViewVersion = "0" Silver.pif Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Sort = 000000000000000000000000000000000200000030f125b7ef471a10a5f102608c9eebac0a0000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Silver.pif Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "7" Silver.pif Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff Silver.pif Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Mode = "4" Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Silver.pif Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9} Silver.pif Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\IconSize = "16" Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg Silver.pif Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\LogicalViewMode = "1" Silver.pif Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1092616257" Silver.pif Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1" Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Silver.pif Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 Silver.pif Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" Silver.pif Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7 Silver.pif Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" Silver.pif Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Silver.pif Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 Silver.pif Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 Silver.pif -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 444 Silver.pif 444 Silver.pif 444 Silver.pif 444 Silver.pif 444 Silver.pif 1680 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1408 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2600 tasklist.exe Token: SeDebugPrivilege 1028 tasklist.exe Token: SeDebugPrivilege 1680 RegAsm.exe Token: SeBackupPrivilege 1680 RegAsm.exe Token: SeSecurityPrivilege 1680 RegAsm.exe Token: SeSecurityPrivilege 1680 RegAsm.exe Token: SeSecurityPrivilege 1680 RegAsm.exe Token: SeSecurityPrivilege 1680 RegAsm.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 444 Silver.pif 444 Silver.pif 444 Silver.pif 1728 NOTEPAD.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 444 Silver.pif 444 Silver.pif 444 Silver.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2028 Silver.pif -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2644 2196 S0larD.exe 31 PID 2196 wrote to memory of 2644 2196 S0larD.exe 31 PID 2196 wrote to memory of 2644 2196 S0larD.exe 31 PID 2196 wrote to memory of 2644 2196 S0larD.exe 31 PID 2644 wrote to memory of 2600 2644 cmd.exe 33 PID 2644 wrote to memory of 2600 2644 cmd.exe 33 PID 2644 wrote to memory of 2600 2644 cmd.exe 33 PID 2644 wrote to memory of 2600 2644 cmd.exe 33 PID 2644 wrote to memory of 2620 2644 cmd.exe 34 PID 2644 wrote to memory of 2620 2644 cmd.exe 34 PID 2644 wrote to memory of 2620 2644 cmd.exe 34 PID 2644 wrote to memory of 2620 2644 cmd.exe 34 PID 2644 wrote to memory of 1028 2644 cmd.exe 36 PID 2644 wrote to memory of 1028 2644 cmd.exe 36 PID 2644 wrote to memory of 1028 2644 cmd.exe 36 PID 2644 wrote to memory of 1028 2644 cmd.exe 36 PID 2644 wrote to memory of 1528 2644 cmd.exe 37 PID 2644 wrote to memory of 1528 2644 cmd.exe 37 PID 2644 wrote to memory of 1528 2644 cmd.exe 37 PID 2644 wrote to memory of 1528 2644 cmd.exe 37 PID 2644 wrote to memory of 1120 2644 cmd.exe 38 PID 2644 wrote to memory of 1120 2644 cmd.exe 38 PID 2644 wrote to memory of 1120 2644 cmd.exe 38 PID 2644 wrote to memory of 1120 2644 cmd.exe 38 PID 2644 wrote to memory of 644 2644 cmd.exe 39 PID 2644 wrote to memory of 644 2644 cmd.exe 39 PID 2644 wrote to memory of 644 2644 cmd.exe 39 PID 2644 wrote to memory of 644 2644 cmd.exe 39 PID 2644 wrote to memory of 2796 2644 cmd.exe 40 PID 2644 wrote to memory of 2796 2644 cmd.exe 40 PID 2644 wrote to memory of 2796 2644 cmd.exe 40 PID 2644 wrote to memory of 2796 2644 cmd.exe 40 PID 2644 wrote to memory of 444 2644 cmd.exe 41 PID 2644 wrote to memory of 444 2644 cmd.exe 41 PID 2644 wrote to memory of 444 2644 cmd.exe 41 PID 2644 wrote to memory of 444 2644 cmd.exe 41 PID 2644 wrote to memory of 768 2644 cmd.exe 42 PID 2644 wrote to memory of 768 2644 cmd.exe 42 PID 2644 wrote to memory of 768 2644 cmd.exe 42 PID 2644 wrote to memory of 768 2644 cmd.exe 42 PID 444 wrote to memory of 1680 444 Silver.pif 46 PID 444 wrote to memory of 1680 444 Silver.pif 46 PID 444 wrote to memory of 1680 444 Silver.pif 46 PID 444 wrote to memory of 1680 444 Silver.pif 46 PID 444 wrote to memory of 1680 444 Silver.pif 46 PID 444 wrote to memory of 1680 444 Silver.pif 46 PID 444 wrote to memory of 1680 444 Silver.pif 46 PID 444 wrote to memory of 1680 444 Silver.pif 46 PID 1408 wrote to memory of 1728 1408 rundll32.exe 47 PID 1408 wrote to memory of 1728 1408 rundll32.exe 47 PID 1408 wrote to memory of 1728 1408 rundll32.exe 47 PID 444 wrote to memory of 1680 444 Silver.pif 46
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\S0laradD\S0larD.exe"C:\Users\Admin\AppData\Local\Temp\S0laradD\S0larD.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Xxx Xxx.cmd & Xxx.cmd & exit3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3780624⤵
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "FacesStadiumMsgidSep" Greensboro4⤵
- System Location Discovery: System Language Discovery
PID:644
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Venezuela + Boob + Forget + Wonderful + Del 378062\E4⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\378062\Silver.pif378062\Silver.pif 378062\E4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:444
-
-
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\378062\Silver.pif"C:\Users\Admin\AppData\Local\Temp\378062\Silver.pif"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\378062\E2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\378062\E3⤵
- Suspicious use of FindShellTrayWindow
PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\378062\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD5ad05b149921338d1a6ed761e33a10a5b
SHA1572dbcd208a7e210ed532a694aaf11accf521f8c
SHA2569bb21f691b86926d3e3df93426b33f851b6337181c48e811e9a5be2df72a14de
SHA5122cdf1afbb5e114a42e05a5ba804e51f7312061b43bdd7ff6196489c9ac5f113336307eacc3c985af5d2808838f941357467e123eadaef9f2e6ab28fcb7711bf3
-
Filesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0
-
Filesize
53KB
MD56edb5580d1f954f78a42a8375f6c071e
SHA1e601fae12f56faea5ce53c889e2a013e53113fac
SHA256fa1add4904d91132bed6fa0c0c29a03a2c6a3b4bd5b0a4d9e8506bb1278382b7
SHA512656e4bc5e5e4e25680b75cdf83d66a18de89641e9ed448645c547f8ec4990010ec3d253f0afc0097554e54425f7acd4b7f4aaf2c497cd8736c6abf2c93e79674
-
Filesize
133KB
MD50cb4d834b59683847b67c4801cf20607
SHA1555b702bd510d2029b99f6cadcd4b8a48720aa00
SHA256b7d1ac9b14714534e75b2b2c74284bf7c5133235f8bae21f3652807cac86d5ed
SHA51222685aff93f9eaaebfe06da584e09554fbedad129db2360b3626b3a950c376c6f97c5e7d8aba15b40ce5c1d8f748c9b68357b1f16c35fa3610dc1fd130d57305
-
Filesize
33KB
MD542d56dd89a6506eee8689c0ae709b6a5
SHA1be28adf82424ecd49a685fd4a40c4fb59fc50345
SHA256142890a655aa53dbb50a78601e637a0a81db69387e039c0bebc0f209802932f2
SHA512713535fbc51307d3e02357a94d45e919fafe73d72ca227c3c9bc2aefa2292985796787d28a46541e86475a5c58f27477b853d7871300e31b03415c9077d6dea8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
22KB
MD5c78d46130b6374d5ad37dbf8e07edc9b
SHA14c3d6af371fb1131c2a557f5b0aa1eb5e90b7a2a
SHA2565796a77c51f65fca02dd3bef626f6ce6ce8ca0af7ca8a6309da5986553b3036d
SHA51214120678cb1bfad716defcc9c3ac27b91892375d55d963769cce7aae3de6b8047dad1064f65a9f7b2db9e14d04238610d3394fb50edd0f078872f4a408518a3f
-
Filesize
34KB
MD5fc9599352a01e1edc10e04ab40940a10
SHA1eb8b98e918c6b5871d2fc713da87d225618cd321
SHA25632f81373888af35373b1aca7ca2ba29fa5e79fb5f9d17ce40945860be6555787
SHA5120a0686501342805c0e1f6d3aa3bf4c69ceb08bef5bbcc2ef7d0c2cc12419f8fa3dc4f4a6ce4dd861e5731a0edfa57ada96b23c0c40677a04b8db1d4a3995786a
-
Filesize
19KB
MD55fee412c89853b699abd723c39277187
SHA1a0ffd2a32357bdd3bef55c4a9c6d1e7366fdfe9f
SHA256c37468f9d093f78626c304fd78071fbc32b5866c1bc768fd73497414dd1c1dce
SHA51247eab6eb05c196b483985358d972f667d0122663a2ce1c85e69c56173d953471acc8eba20e4fd8d724bd983c5c2eca782f4410c71e3951298fe95a6e526b86f7
-
Filesize
34KB
MD58dd4090956ce0b6ce216a26c20bc3543
SHA1de771fdc5c8e2bc78316cafc110d6a40e99d1768
SHA256619e235a78449b4f862d5c3bb41f19bb1c0d412eccb15d95fe864e0a27c6e987
SHA512aad471483d18e977f9e3ab7567e5051b723f7cd8a6c238c068b93470fac6aecd3484e67d2ae330bcb519e74994671712e836cf6d4a995cce173b2152323d47ba
-
Filesize
52KB
MD5722eff0b3c34bfe9a0d93778119c28a3
SHA16d72c625654559e0c830325b9f114be607490a8a
SHA256451c6712ef9c9b0c1c9b33f69d63cc2783b4a79b4e5b2d50796be2ad7b0fb3d7
SHA512e187591bd2b62207d8016e9ae369aeb7ef09afb8da801f29510f18ab8c0bc5288dbcf79b3081e3b89dd1c4f3e829580fadd7f9b6ca209027c8de36e531af7fa1
-
Filesize
119B
MD5420cea780ab3d71d599ba6fdf6c1b275
SHA1f6a9785ef5bb673760b532177c8172a9651bb5f9
SHA256127942a83242fda12a4fee627db6defd6b0d32ae6d9952ad2976a7521d7fd8e1
SHA5120b053b2bfe1f89a93dbaec72bf12bf551da8690b7cb97ed813bd0c9e20b4859cd34dad22ad2b44887846269e1b065f9b14bcd8e052a09764c803711884ce952a
-
Filesize
36KB
MD54595b596cdb3a556afe7133ead578e20
SHA1b132f6a0f96e98d05ae36c51040313cab6a633e5
SHA2567c6ecc4e3544e5e93a18db829be6bd677ea12a94d73e02a55ccd9cb01f7a7e34
SHA512c4dc4a8e42ba9d10f1f8d00237fdab7be9f1d31cef5cd1651571d6d71170c00d1f09ddabd4ac22a477198c1d2ff0c855ba34bf104fdb702071f84a8c41fc591a
-
Filesize
59KB
MD55636ad002cc7b72673e79ee69fa14abe
SHA1946e17496e2390c3b78480f20c84fffd78957a84
SHA256c632bfc8ba7d0926f08c0cb26a671d6200464cc05de116c01e46d9a16ee7482c
SHA51268a225594f2eb367062ea0be1a175c537af1b7acda88b1c7e79ed482efd2de0980488b2b55e60f2dd0d61f07bbeb31bf0989b68b86fff30e2dc89771d08db6c5
-
Filesize
48KB
MD5932f5d69f71cab70382e9b6404f1faca
SHA178f0224cb6b789cc7244c184292aafb9e25fdf32
SHA256d9b09d231accf6a919fd61281a4f356d1c590638a9d399a0a9d065e906bd1d1a
SHA5121e41516c552db7c1f1c54ede16485c302071a684b15d5ffde9a655842d493f7bd73ebe72272f8bb5d697e5a56994329fee21f92774b01cdb3867943feed8b27c
-
Filesize
67KB
MD5a2dea47d12a11da69402242b6661b9ab
SHA1941d582c0a778058fd928f23172116d1386fafc4
SHA256a087faba379170386ca4ae8cd6973109808fbf04cd6d31b4e1c84ade2729c753
SHA512cc0695055722e5de2f383ed3adcdd1d7154c970a39d659d46bacc0eb9dfd961c75dce35ef71e6d4a8fece620f41389a630ae2e8eb184ad49b94372b937beb24b
-
Filesize
11KB
MD502833122efd49c0727e678d92001472e
SHA13ce7beb0d92f84da9fb24c54024cb2aa2dfa5d43
SHA2568326334fbd60d2a4c3446a1d37afc6b82cb670915d080ca7715648ccb959c58e
SHA512808bd05c154eccf99b9bfe8ed5fc2c0e794cdfb984a1ba90bf4f8f8df9bfcbdf247869d327b3e3c41a8987108fa95fd8ccb41f2cfe9971ecab01dbc25582f28e
-
Filesize
48KB
MD578ec40f6b0208f4ce36d7f6c260f60da
SHA1cd8bea524d090deed6343bd8ab86829a6fc06705
SHA256980c44c0ebf7dd14f1ff1bc1f8eba9888e3a2a7946cf69c4730f8e0e1e6470d7
SHA512db80f7bd4583694f6e6b8441c07267e44b3179f43419310aa91e84b5c02831b6125e5f7f86af97123df2754e84863bdcf1f77d25dbe9855d0bc96b9c0be6cbc0
-
Filesize
37KB
MD57b97b28321c63d31a647190813bd107d
SHA1cdda7cae0342dd8b58e37b6b2b71177fa9d004eb
SHA2561199262ab319c30e258bd702290c6f6fddcd67ff5ca6c1380c45a612578b4b11
SHA512038c39eaf1818c9596d51f4b7ef30fcf60bf597a9024ace65684e0e94566b0675d6ab2f62ecf1836a8248083918c193ee8fe82418aa64a6d3a91401e4143530b
-
Filesize
9KB
MD5cbb9ade5809b047025c48a7ea4fbae79
SHA127e33bc874b8843e13b8e77a6b3560bbc6ec826d
SHA2563416caa1583ad2f19c217f228f45c4dff5ca361dffa69c182ed6c1deedd0e6f4
SHA512bd6518df027fc7c20fe85d7438f8bfdf6e68f27e754219e2ad273ad82470447710ead4535f632584b108042b853c73078146569803d4a970a997b026dc60844c
-
Filesize
16KB
MD5cc933bfcfc55669ad826b9cad28abf7a
SHA17a3b102add125c702cb24bc3f54c4ee508561013
SHA256a226683da0febba3a2fe8af30a4e83d8f02bde178ad205957cb5abf6fc1836dc
SHA512f41c647a02815f67ef5c7c8525a7d3e77bf88b1bfff4ae546f448a67b23979e4927098f350f14156e38608fa8d871f0a4bb18a909653974037842d8731d300ef
-
Filesize
35KB
MD57d27c6c14a9b860d73cb75539aa85f00
SHA1cb35a937c29b5cfeec7d13642bd341641655dc0e
SHA25600f4b893b7cc16689cde23c79413f059200a23eb0167ca4e7a30c27f785c8802
SHA5128d0b3fd59280b16a8fb2d0a888e1ec07915086a142e4629c9f2e218840948c7ed111f5e792dbf44e3f720253db646b83c698411dc7993c7a42ce0505ebd8e829
-
Filesize
52KB
MD556453b4e8e9dc6c733408cb2f1024dd6
SHA1a09c1f8ec8e19de03c3903e785c17451b1c66e13
SHA2561ac3595b4f2812ee24a2ca702c1fd85f5410980aa005f985f2d079ab970ceae5
SHA512d704f0f1e033fc651c08f957442aeb943735acdc28baeafbb3aba5a21a0701b904850576f1e8a08cd66eacac04f0dec4a7e7fa5eaa1e3fb6644b05c9f3bc674c
-
Filesize
22KB
MD5da11f48ae3c6cc067adb52f354df20a8
SHA169c61ae5326f5cf4b628866131a2501d2d3f3b3c
SHA25648b69954f217082055851572b24582084c6c29cbe0889ef639854e094fbd05af
SHA5129e35418a152f8286c136397a335dff4bea4ec49272a398908100ab9207dec6abcba583ce212b84f45ffc4803303a63740aa9361598bad6c3cd12242d8a60589b
-
Filesize
42KB
MD5daff855183851c412b9abc8f33b7335c
SHA1f2ffde7d4f29955c556cdb3279a046c3d133e749
SHA2568e01cbf168cc91c1d751a6d63411e0d3032c449d0375e025267618da26466653
SHA51290c9f94202758f9be486383838c7cf90b9918f67c950f81f92cc032bb2f7681ea6591f275838621986f544213236c94c867c8da51c00fff8434a0d0a8f3a1b56
-
Filesize
52KB
MD585f1b0b9d7d548a08d050198286fee5e
SHA10b43a57e849bfb51418d43e28fae477fc94c3d07
SHA2565b419854a5406ee5221bdc4f64d46e9f6881ecb4910d04af39259fdd3b1749d8
SHA512aa7b308a9ed9d8b98e8a6f2593eec61fc45479d654692455d3adc96dc9d43355bd91de6f9db9cd83829683db05701eb6e6cde9a6dc7d2a686534397d2819acda
-
Filesize
37KB
MD5b422cab79c55b155a73b8d99adc8f44b
SHA1229cb60d2e1b92fb2d585f28f7c7a38c0e80b873
SHA256dff54a6bcfc70e688f19b9c613be8b367bb286609c4ea0cc4128f55ea4db0ab5
SHA512e643dfe568a09d126a063dcedb6cabf30009679d56cc3a151453ed7e8051be5f7880c6cec6a0fbd4fcbcdb8c08064393da773ae99bbce759f2b41e22e35d5b95
-
Filesize
22KB
MD59da986c5d9f69b97485fa5d4410864aa
SHA103d79a84f10f9e6904f61fe6a73f31f3538bb088
SHA25625efcd3cc3ab77f26a3cbbff570fabe3b53d19fc2e716a7f6947d21fc0d1e5d4
SHA51254e15d44ef36e32c6b332e24458b830f33864967bd8fea60e76d7baa4e5eee3135a5978e7e7e70767cb9d8f9bf02c56ad8f1eaaba10776230bef06ffcbaa699a
-
Filesize
37KB
MD58cb9b5fbb0c1bdc59b0dc044e207edcc
SHA1ccf3c83baa837a29e6d9720e7a7ee5c93ceb18b7
SHA25633fc7cee1435f6895682d38c2b7e03e06fed914e112aa0ab6ea218ef6addacc4
SHA51288b7a031fbf4568b46d724a91d1939f4d8f2309c94d6858826f51bba84bb817d46465edef7525bed06285d126cc16085c1b7fb0739640355f365ca7d3432a81e
-
Filesize
182KB
MD586e58acc6f5df797d32d876853f37c72
SHA1b6440c1da59b278c7c4223aa3e23b1d181f46408
SHA256ee2c1bba5c7a10dddf477ca1367c749bc604bcf1c89538afe2630c9466b35e1c
SHA5125d2daa749950e7905e32a9bf967a15a045b66392772e75811a6a0bd448f429271862635905b8243e53e819ec8b74649bb7ceaf8e3d13d2bd7baa813431256a5d
-
Filesize
176KB
MD5ab744c9d745866d416f59570262d2621
SHA118d71eb569b2a5e53f48f700356bb0f4e158f72b
SHA2561a19ce5533ea88424e9fbe166c022bc66023b4da5f31f4d74f6f3fbba8acac24
SHA51291b5352e882e7afc28c5cc00b5cec2ae445e97448dc65f4ad443d30ab3e1f2c482cbc59cda6f9867cd7021360416bfe27c621d1fc60e212b106a264a7dd46b59
-
Filesize
9KB
MD5b6aa34666c3b7968f824c44ba9b62d11
SHA1ddd04fc5dd90c034acb9a467dcfbf44b67d6b6d8
SHA2568998a0953a8b9ff0ac69275f1131841d2ad001fa0485604874e562eef63bf1ed
SHA5125bc88eef182ab61ef64cd5d78f536d3c7f8eeda3f766d75e98efd5db16a0f3b6497de3392d561b6ce411b079d00ad768b708dcdeab87d2c84e51503e010985d6
-
Filesize
39KB
MD55e7515c6888bda2bb19f4471925e6a48
SHA1aad7b22dc74f1e52d491e20e628252b7f12823b0
SHA25648b1f34389c857ae9ee6676a035d7e9af9d225ce49ed0d6c09e84452e01c22a7
SHA512b4518934c8558c426ffa980e40ee47d22c9a910dd4f5a6bad976971dae9f896f8f917eac4ba7b6816fcb46e0f3422e78c548ca60fdd232614242a9b8ce306af9
-
Filesize
9KB
MD5f6c62690ddf69e66d42404d6ab720197
SHA1857d330f8007eaf4bbd2076c865335f446dccc24
SHA256c432465057dd22030487289f68e40f332c59e10e4cf2dea136118b5757e76c92
SHA5129dd8d778a285aa5762a39b84b991984c9c31cde27d4032624ade7671cf7347d297d503787247118d143fbef29e06609411f58c870cc187cbe91063f469ba784d
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab