Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 03:34
Behavioral task
behavioral1
Sample
65318632a52b62f58d0ad6b6a7ac4cf0N.exe
Resource
win7-20240708-en
General
-
Target
65318632a52b62f58d0ad6b6a7ac4cf0N.exe
-
Size
5.2MB
-
MD5
65318632a52b62f58d0ad6b6a7ac4cf0
-
SHA1
0be0e172b4698c797ee0f5774ed652f5c838423f
-
SHA256
91c3933c4ab7349061f9a5ec536dc8debf30d4adcab86f13e4c5da8e5c3ec21e
-
SHA512
8c35d261b05d4a133bb7719776fcd9befad55a7f59239972158a28a4de21ff2ccdd6e57f05b802b2d2624d1d4539a8aab81e9fafec338e58bbf6f71ca277ab81
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l6:RWWBibf56utgpPFotBER/mQ32lU+
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x000a00000001202c-3.dat cobalt_reflective_dll behavioral1/files/0x00080000000175cc-8.dat cobalt_reflective_dll behavioral1/files/0x00080000000175d0-13.dat cobalt_reflective_dll behavioral1/files/0x000600000001871e-38.dat cobalt_reflective_dll behavioral1/files/0x00060000000186f7-35.dat cobalt_reflective_dll behavioral1/files/0x00080000000175f0-25.dat cobalt_reflective_dll behavioral1/files/0x000600000001872a-48.dat cobalt_reflective_dll behavioral1/files/0x00090000000171b9-57.dat cobalt_reflective_dll behavioral1/files/0x000800000001872e-68.dat cobalt_reflective_dll behavioral1/files/0x0007000000018736-73.dat cobalt_reflective_dll behavioral1/files/0x0005000000019456-80.dat cobalt_reflective_dll behavioral1/files/0x000500000001948a-89.dat cobalt_reflective_dll behavioral1/files/0x00050000000195c7-121.dat cobalt_reflective_dll behavioral1/files/0x000500000001958d-127.dat cobalt_reflective_dll behavioral1/files/0x00050000000194b9-111.dat cobalt_reflective_dll behavioral1/files/0x00050000000194e7-106.dat cobalt_reflective_dll behavioral1/files/0x00050000000194ab-98.dat cobalt_reflective_dll behavioral1/files/0x0005000000019568-122.dat cobalt_reflective_dll behavioral1/files/0x000500000001960f-142.dat cobalt_reflective_dll behavioral1/files/0x0005000000019611-146.dat cobalt_reflective_dll behavioral1/files/0x000500000001960d-141.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 41 IoCs
resource yara_rule behavioral1/memory/3012-30-0x000000013FFC0000-0x0000000140311000-memory.dmp xmrig behavioral1/memory/2308-42-0x000000013FCC0000-0x0000000140011000-memory.dmp xmrig behavioral1/memory/2076-46-0x000000013FF10000-0x0000000140261000-memory.dmp xmrig behavioral1/memory/2744-56-0x000000013F620000-0x000000013F971000-memory.dmp xmrig behavioral1/memory/2976-54-0x000000013F550000-0x000000013F8A1000-memory.dmp xmrig behavioral1/memory/2872-62-0x000000013F060000-0x000000013F3B1000-memory.dmp xmrig behavioral1/memory/2836-71-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2012-72-0x000000013F980000-0x000000013FCD1000-memory.dmp xmrig behavioral1/memory/3020-78-0x000000013F290000-0x000000013F5E1000-memory.dmp xmrig behavioral1/memory/2308-75-0x000000013F8F0000-0x000000013FC41000-memory.dmp xmrig behavioral1/memory/2536-88-0x000000013F2F0000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2308-86-0x000000013F620000-0x000000013F971000-memory.dmp xmrig behavioral1/memory/1560-123-0x000000013F790000-0x000000013FAE1000-memory.dmp xmrig behavioral1/memory/2828-99-0x000000013F810000-0x000000013FB61000-memory.dmp xmrig behavioral1/memory/2716-130-0x000000013F8F0000-0x000000013FC41000-memory.dmp xmrig behavioral1/memory/2536-149-0x000000013F2F0000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2308-150-0x000000013FCC0000-0x0000000140011000-memory.dmp xmrig behavioral1/memory/2352-158-0x000000013FD10000-0x0000000140061000-memory.dmp xmrig behavioral1/memory/2968-160-0x000000013F130000-0x000000013F481000-memory.dmp xmrig behavioral1/memory/1980-170-0x000000013FB40000-0x000000013FE91000-memory.dmp xmrig behavioral1/memory/2028-173-0x000000013FD90000-0x00000001400E1000-memory.dmp xmrig behavioral1/memory/1688-172-0x000000013FE80000-0x00000001401D1000-memory.dmp xmrig behavioral1/memory/1504-171-0x000000013F3E0000-0x000000013F731000-memory.dmp xmrig behavioral1/memory/1164-174-0x000000013F690000-0x000000013F9E1000-memory.dmp xmrig behavioral1/memory/2848-176-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/1940-175-0x000000013FB70000-0x000000013FEC1000-memory.dmp xmrig behavioral1/memory/2308-177-0x000000013FCC0000-0x0000000140011000-memory.dmp xmrig behavioral1/memory/2076-229-0x000000013FF10000-0x0000000140261000-memory.dmp xmrig behavioral1/memory/2976-231-0x000000013F550000-0x000000013F8A1000-memory.dmp xmrig behavioral1/memory/3012-234-0x000000013FFC0000-0x0000000140311000-memory.dmp xmrig behavioral1/memory/2872-235-0x000000013F060000-0x000000013F3B1000-memory.dmp xmrig behavioral1/memory/2012-237-0x000000013F980000-0x000000013FCD1000-memory.dmp xmrig behavioral1/memory/3020-239-0x000000013F290000-0x000000013F5E1000-memory.dmp xmrig behavioral1/memory/2744-243-0x000000013F620000-0x000000013F971000-memory.dmp xmrig behavioral1/memory/2828-245-0x000000013F810000-0x000000013FB61000-memory.dmp xmrig behavioral1/memory/2836-250-0x000000013FD30000-0x0000000140081000-memory.dmp xmrig behavioral1/memory/2716-252-0x000000013F8F0000-0x000000013FC41000-memory.dmp xmrig behavioral1/memory/2536-254-0x000000013F2F0000-0x000000013F641000-memory.dmp xmrig behavioral1/memory/2352-263-0x000000013FD10000-0x0000000140061000-memory.dmp xmrig behavioral1/memory/2968-265-0x000000013F130000-0x000000013F481000-memory.dmp xmrig behavioral1/memory/1560-267-0x000000013F790000-0x000000013FAE1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2076 wbyVsKo.exe 2976 oPiiqHF.exe 2872 CBYuVYm.exe 3012 iZcYmmc.exe 2012 HuRMXIY.exe 3020 LeryrtM.exe 2744 vZHPmgN.exe 2828 HdWynTY.exe 2836 BqALWfl.exe 2716 aNXZPJr.exe 2536 QiRABYQ.exe 2352 CbySCFJ.exe 2968 HJwVGJn.exe 1560 zZYzADW.exe 1504 KgBWxCP.exe 1980 dMZYxDm.exe 1688 mmzdfPQ.exe 2028 djuxhpd.exe 1164 SydESMF.exe 1940 eQVYzPm.exe 2848 HVWkLYc.exe -
Loads dropped DLL 21 IoCs
pid Process 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe -
resource yara_rule behavioral1/memory/2308-0-0x000000013FCC0000-0x0000000140011000-memory.dmp upx behavioral1/files/0x000a00000001202c-3.dat upx behavioral1/memory/2308-6-0x0000000002140000-0x0000000002491000-memory.dmp upx behavioral1/files/0x00080000000175cc-8.dat upx behavioral1/memory/2976-15-0x000000013F550000-0x000000013F8A1000-memory.dmp upx behavioral1/files/0x00080000000175d0-13.dat upx behavioral1/memory/3012-30-0x000000013FFC0000-0x0000000140311000-memory.dmp upx behavioral1/files/0x000600000001871e-38.dat upx behavioral1/memory/2308-42-0x000000013FCC0000-0x0000000140011000-memory.dmp upx behavioral1/memory/2012-36-0x000000013F980000-0x000000013FCD1000-memory.dmp upx behavioral1/files/0x00060000000186f7-35.dat upx behavioral1/memory/3020-43-0x000000013F290000-0x000000013F5E1000-memory.dmp upx behavioral1/memory/2872-29-0x000000013F060000-0x000000013F3B1000-memory.dmp upx behavioral1/files/0x00080000000175f0-25.dat upx behavioral1/memory/2076-9-0x000000013FF10000-0x0000000140261000-memory.dmp upx behavioral1/memory/2076-46-0x000000013FF10000-0x0000000140261000-memory.dmp upx behavioral1/files/0x000600000001872a-48.dat upx behavioral1/memory/2744-56-0x000000013F620000-0x000000013F971000-memory.dmp upx behavioral1/memory/2976-54-0x000000013F550000-0x000000013F8A1000-memory.dmp upx behavioral1/files/0x00090000000171b9-57.dat upx behavioral1/memory/2872-62-0x000000013F060000-0x000000013F3B1000-memory.dmp upx behavioral1/memory/2828-63-0x000000013F810000-0x000000013FB61000-memory.dmp upx behavioral1/files/0x000800000001872e-68.dat upx behavioral1/memory/2836-71-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/2012-72-0x000000013F980000-0x000000013FCD1000-memory.dmp upx behavioral1/files/0x0007000000018736-73.dat upx behavioral1/memory/3020-78-0x000000013F290000-0x000000013F5E1000-memory.dmp upx behavioral1/memory/2716-79-0x000000013F8F0000-0x000000013FC41000-memory.dmp upx behavioral1/files/0x0005000000019456-80.dat upx behavioral1/memory/2536-88-0x000000013F2F0000-0x000000013F641000-memory.dmp upx behavioral1/files/0x000500000001948a-89.dat upx behavioral1/memory/2352-94-0x000000013FD10000-0x0000000140061000-memory.dmp upx behavioral1/memory/2968-105-0x000000013F130000-0x000000013F481000-memory.dmp upx behavioral1/files/0x00050000000195c7-121.dat upx behavioral1/memory/1560-123-0x000000013F790000-0x000000013FAE1000-memory.dmp upx behavioral1/files/0x000500000001958d-127.dat upx behavioral1/files/0x00050000000194b9-111.dat upx behavioral1/files/0x00050000000194e7-106.dat upx behavioral1/memory/2828-99-0x000000013F810000-0x000000013FB61000-memory.dmp upx behavioral1/files/0x00050000000194ab-98.dat upx behavioral1/files/0x0005000000019568-122.dat upx behavioral1/memory/2716-130-0x000000013F8F0000-0x000000013FC41000-memory.dmp upx behavioral1/files/0x000500000001960f-142.dat upx behavioral1/files/0x0005000000019611-146.dat upx behavioral1/files/0x000500000001960d-141.dat upx behavioral1/memory/2536-149-0x000000013F2F0000-0x000000013F641000-memory.dmp upx behavioral1/memory/2308-150-0x000000013FCC0000-0x0000000140011000-memory.dmp upx behavioral1/memory/2352-158-0x000000013FD10000-0x0000000140061000-memory.dmp upx behavioral1/memory/2968-160-0x000000013F130000-0x000000013F481000-memory.dmp upx behavioral1/memory/1980-170-0x000000013FB40000-0x000000013FE91000-memory.dmp upx behavioral1/memory/2028-173-0x000000013FD90000-0x00000001400E1000-memory.dmp upx behavioral1/memory/1688-172-0x000000013FE80000-0x00000001401D1000-memory.dmp upx behavioral1/memory/1504-171-0x000000013F3E0000-0x000000013F731000-memory.dmp upx behavioral1/memory/1164-174-0x000000013F690000-0x000000013F9E1000-memory.dmp upx behavioral1/memory/2848-176-0x000000013FD30000-0x0000000140081000-memory.dmp upx behavioral1/memory/1940-175-0x000000013FB70000-0x000000013FEC1000-memory.dmp upx behavioral1/memory/2308-177-0x000000013FCC0000-0x0000000140011000-memory.dmp upx behavioral1/memory/2076-229-0x000000013FF10000-0x0000000140261000-memory.dmp upx behavioral1/memory/2976-231-0x000000013F550000-0x000000013F8A1000-memory.dmp upx behavioral1/memory/3012-234-0x000000013FFC0000-0x0000000140311000-memory.dmp upx behavioral1/memory/2872-235-0x000000013F060000-0x000000013F3B1000-memory.dmp upx behavioral1/memory/2012-237-0x000000013F980000-0x000000013FCD1000-memory.dmp upx behavioral1/memory/3020-239-0x000000013F290000-0x000000013F5E1000-memory.dmp upx behavioral1/memory/2744-243-0x000000013F620000-0x000000013F971000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\HJwVGJn.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\SydESMF.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\CbySCFJ.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\HdWynTY.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\aNXZPJr.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\QiRABYQ.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\mmzdfPQ.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\HVWkLYc.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\CBYuVYm.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\BqALWfl.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\dMZYxDm.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\eQVYzPm.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\vZHPmgN.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\oPiiqHF.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\iZcYmmc.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\HuRMXIY.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\LeryrtM.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\zZYzADW.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\KgBWxCP.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\djuxhpd.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe File created C:\Windows\System\wbyVsKo.exe 65318632a52b62f58d0ad6b6a7ac4cf0N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe Token: SeLockMemoryPrivilege 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2076 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 31 PID 2308 wrote to memory of 2076 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 31 PID 2308 wrote to memory of 2076 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 31 PID 2308 wrote to memory of 2976 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 32 PID 2308 wrote to memory of 2976 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 32 PID 2308 wrote to memory of 2976 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 32 PID 2308 wrote to memory of 2872 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 33 PID 2308 wrote to memory of 2872 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 33 PID 2308 wrote to memory of 2872 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 33 PID 2308 wrote to memory of 3012 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 34 PID 2308 wrote to memory of 3012 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 34 PID 2308 wrote to memory of 3012 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 34 PID 2308 wrote to memory of 2012 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 35 PID 2308 wrote to memory of 2012 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 35 PID 2308 wrote to memory of 2012 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 35 PID 2308 wrote to memory of 3020 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 36 PID 2308 wrote to memory of 3020 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 36 PID 2308 wrote to memory of 3020 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 36 PID 2308 wrote to memory of 2744 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 37 PID 2308 wrote to memory of 2744 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 37 PID 2308 wrote to memory of 2744 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 37 PID 2308 wrote to memory of 2828 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 38 PID 2308 wrote to memory of 2828 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 38 PID 2308 wrote to memory of 2828 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 38 PID 2308 wrote to memory of 2836 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 39 PID 2308 wrote to memory of 2836 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 39 PID 2308 wrote to memory of 2836 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 39 PID 2308 wrote to memory of 2716 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 40 PID 2308 wrote to memory of 2716 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 40 PID 2308 wrote to memory of 2716 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 40 PID 2308 wrote to memory of 2536 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 41 PID 2308 wrote to memory of 2536 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 41 PID 2308 wrote to memory of 2536 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 41 PID 2308 wrote to memory of 2352 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 42 PID 2308 wrote to memory of 2352 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 42 PID 2308 wrote to memory of 2352 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 42 PID 2308 wrote to memory of 2968 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 43 PID 2308 wrote to memory of 2968 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 43 PID 2308 wrote to memory of 2968 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 43 PID 2308 wrote to memory of 1560 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 44 PID 2308 wrote to memory of 1560 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 44 PID 2308 wrote to memory of 1560 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 44 PID 2308 wrote to memory of 1980 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 45 PID 2308 wrote to memory of 1980 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 45 PID 2308 wrote to memory of 1980 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 45 PID 2308 wrote to memory of 1504 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 46 PID 2308 wrote to memory of 1504 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 46 PID 2308 wrote to memory of 1504 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 46 PID 2308 wrote to memory of 1688 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 47 PID 2308 wrote to memory of 1688 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 47 PID 2308 wrote to memory of 1688 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 47 PID 2308 wrote to memory of 2028 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 48 PID 2308 wrote to memory of 2028 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 48 PID 2308 wrote to memory of 2028 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 48 PID 2308 wrote to memory of 1164 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 50 PID 2308 wrote to memory of 1164 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 50 PID 2308 wrote to memory of 1164 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 50 PID 2308 wrote to memory of 1940 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 51 PID 2308 wrote to memory of 1940 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 51 PID 2308 wrote to memory of 1940 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 51 PID 2308 wrote to memory of 2848 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 52 PID 2308 wrote to memory of 2848 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 52 PID 2308 wrote to memory of 2848 2308 65318632a52b62f58d0ad6b6a7ac4cf0N.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\65318632a52b62f58d0ad6b6a7ac4cf0N.exe"C:\Users\Admin\AppData\Local\Temp\65318632a52b62f58d0ad6b6a7ac4cf0N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\System\wbyVsKo.exeC:\Windows\System\wbyVsKo.exe2⤵
- Executes dropped EXE
PID:2076
-
-
C:\Windows\System\oPiiqHF.exeC:\Windows\System\oPiiqHF.exe2⤵
- Executes dropped EXE
PID:2976
-
-
C:\Windows\System\CBYuVYm.exeC:\Windows\System\CBYuVYm.exe2⤵
- Executes dropped EXE
PID:2872
-
-
C:\Windows\System\iZcYmmc.exeC:\Windows\System\iZcYmmc.exe2⤵
- Executes dropped EXE
PID:3012
-
-
C:\Windows\System\HuRMXIY.exeC:\Windows\System\HuRMXIY.exe2⤵
- Executes dropped EXE
PID:2012
-
-
C:\Windows\System\LeryrtM.exeC:\Windows\System\LeryrtM.exe2⤵
- Executes dropped EXE
PID:3020
-
-
C:\Windows\System\vZHPmgN.exeC:\Windows\System\vZHPmgN.exe2⤵
- Executes dropped EXE
PID:2744
-
-
C:\Windows\System\HdWynTY.exeC:\Windows\System\HdWynTY.exe2⤵
- Executes dropped EXE
PID:2828
-
-
C:\Windows\System\BqALWfl.exeC:\Windows\System\BqALWfl.exe2⤵
- Executes dropped EXE
PID:2836
-
-
C:\Windows\System\aNXZPJr.exeC:\Windows\System\aNXZPJr.exe2⤵
- Executes dropped EXE
PID:2716
-
-
C:\Windows\System\QiRABYQ.exeC:\Windows\System\QiRABYQ.exe2⤵
- Executes dropped EXE
PID:2536
-
-
C:\Windows\System\CbySCFJ.exeC:\Windows\System\CbySCFJ.exe2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Windows\System\HJwVGJn.exeC:\Windows\System\HJwVGJn.exe2⤵
- Executes dropped EXE
PID:2968
-
-
C:\Windows\System\zZYzADW.exeC:\Windows\System\zZYzADW.exe2⤵
- Executes dropped EXE
PID:1560
-
-
C:\Windows\System\dMZYxDm.exeC:\Windows\System\dMZYxDm.exe2⤵
- Executes dropped EXE
PID:1980
-
-
C:\Windows\System\KgBWxCP.exeC:\Windows\System\KgBWxCP.exe2⤵
- Executes dropped EXE
PID:1504
-
-
C:\Windows\System\mmzdfPQ.exeC:\Windows\System\mmzdfPQ.exe2⤵
- Executes dropped EXE
PID:1688
-
-
C:\Windows\System\djuxhpd.exeC:\Windows\System\djuxhpd.exe2⤵
- Executes dropped EXE
PID:2028
-
-
C:\Windows\System\SydESMF.exeC:\Windows\System\SydESMF.exe2⤵
- Executes dropped EXE
PID:1164
-
-
C:\Windows\System\eQVYzPm.exeC:\Windows\System\eQVYzPm.exe2⤵
- Executes dropped EXE
PID:1940
-
-
C:\Windows\System\HVWkLYc.exeC:\Windows\System\HVWkLYc.exe2⤵
- Executes dropped EXE
PID:2848
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD52a6e538e18c1545d77c7b7f9e08f205d
SHA19ba0ab8fdfaebb26eeee34421afe7ecd950ec1ee
SHA2569a902cf8873a49d02a792453d6905149a85a8a951f8cc0c965e5ece777481686
SHA512d6d07aef2af31122ccee83e4037ea1384f0ec64b5296e9010609a989361c0ffc5944d2d2144f3e18974e3d37d9a9f2ec5f846ba03589b97ec3203bc064133d3e
-
Filesize
5.2MB
MD5cc9ae793c38fe309b93c0bdf2aca3d18
SHA130605685245ce228f7cb15ba66d42ccb53c4b3c6
SHA25608ec1ccd14871aa1ec284f2b22a76fc544821c863f31d8f98645b2d98a98932a
SHA512e79c038323721cc9dd46f17e207f6e76f7c20b10453a87028ccbd44d1abff442f9fab72b40fa0b67000b0f6729471b8a820fd7e460d1375b2977940958a15f41
-
Filesize
5.2MB
MD5274f7d398cb104c81f1807007004ba75
SHA1281bca7958236ac6fdc9b05ae0d114245176b24c
SHA2566c389db03b14971cb26ec577125c69a85ee0eadac2b522058029a5f3b890213a
SHA5126a578ddaa8ba74055e7cc0d51f663c94e2a452689cb583e8b83e2c747f7a948d122fe094176b92866efb72015bde03d72620dc293beac1610bc36e06ef0493c0
-
Filesize
5.2MB
MD5a2e21b417a3f5f070712a95db1f16b30
SHA1471fc497fa3ec733b0ae3e6ced8dd34aa50c3568
SHA2562829fff300a373da0616496ff6dc2f200f116a6b72ed3614be9182e7f4364d6c
SHA5127c332f06507488ad9fa08331f3085d65de65edb489c32821584b51960b0a8b8228cb1b33efc4140703253f8fe86dd842880349342f44fdd3275b20324b623fb6
-
Filesize
5.2MB
MD56568902db11d2aa60c02ba203bb5714b
SHA179858f97e24d9323e3d6c93d6e754ba960eb1af0
SHA256eaac0c8d5381e7baec1dfb18a460eacff2f84677727ed6630bf19b7fe0a52d53
SHA512136d93ef0a20331f07f918b013e159934e3e1f68e9cfa8c9f7e98cc660a45e1cd565da7c36ff4d4c5504dc485768993ac34e62b84b8e31ec44de067568aab08e
-
Filesize
5.2MB
MD59e396640ec0fc9f93ca3c22182338d2d
SHA12b139af7d60b20f4a8c5f12ccb4002a54d44cb0e
SHA2568895ce4cfe7b4d10776b9838396c087dc6fab21797c3396f078aee5cf201b390
SHA51247ba8cd5a9ca63c41e2b37e9207c08a377350ea71eb7ef4476f1aa57fe864eb7b8552019c51dc3dbb523685c4625335551c97cede2c0ebe7a5be475af0c7454b
-
Filesize
5.2MB
MD59ff8a8a0f57764f2b383ce905487b3ed
SHA112499c8c46a70511fe5a283d6d9ab3790d05e993
SHA256ff5aa40b31a29dadf5af9ef93471131a96126ed00c490e20fc3a47d056d6442e
SHA51259630cbae1f7dc7bb491e8fc6c217d281ae6fa857674c6324721368df3793db18646a21ec0217451f7c5eed83266ec93551022f3f8c4cbd934977b7be955202e
-
Filesize
5.2MB
MD5b812a12189c68c37da3da9acec1cbe6f
SHA1da0c29c653adbfb46d5aba143aa9576417768410
SHA256e73816d7da101088de80741b046304616ef0efa011b79ea296661c97c4ce1172
SHA512c86354c9cb4392c7b2e1fd65a330b7780b77864b72e2254b0043da024353042e0340f0d952e306ba71cfc1de349334365d2b9ec0c554ba205ba068cbeaeaaab6
-
Filesize
5.2MB
MD5534ce6acb4cd4f91b40b6bbc02b72e27
SHA1b05f3a9ba8ea8ae6bfad7f5ccb703524ff63bb81
SHA256e38f8799b83c4ab2b073787de5091de98016676c9ff98af1301f1665c18bb1c3
SHA512b20dc6e680fa9c4c8f968d2b151af3d91a695334792c2921d2d9a70067497ae6243d8d4717b9ff74c8a9d3df321e59a7674cc486d5ce53736f21ade56b7bc761
-
Filesize
5.2MB
MD5cb259b8515cd7cb66cbd0eb0e00c79b8
SHA1a70d1d3bf0c20da32fbc639802f5fcc4db34a15e
SHA256825e4453364ce1eceeefd517e1041335b84b0376acf4ad811d1b44c92cbf3352
SHA51250e6cf989a062256366bb31b7833b27f2377b867cdf1912ac256039780e1682ce77f68877090bb82cb24de0f87d6776f339d2bbd13d8bc06712fee50e5f44ca7
-
Filesize
5.2MB
MD53f319dc17b2cf5d46bbfa3f7096c54e8
SHA14aa7740f4b717989b3fd633b49968c078cff3c49
SHA256a11d1327497fb2fcafdde17e7d16eb2ba8449afba0c6e28fdf85a5807baa11c2
SHA512781a403a90003c78ecbccbf47f965c0bb683a9807a5e51b7911c99c7c076564e6424c07b9916bcf85329cfac6bd6d62200f24ada57c5fae84a5086f0dac96d60
-
Filesize
5.2MB
MD59f548c4169415c6d8a929ed65f481c02
SHA173c6087ef5eee39c5bea7784db115db0f8425cb9
SHA256d42ccff119b5fea50077bf32b683137b861ee3c20f652396086b70214f339392
SHA5123b76be9522314de97397ddf87ec81dfe7b751d2575a9d385fc9395d9c6278e2bbed9a7299e5e09bea4f12f7e071875c40cf86ba07e5de72050b330db30119c84
-
Filesize
5.2MB
MD53fc7ac4aba2404c8be87c36a5db31bdf
SHA1c4c979aa71204e1e64bffdb5693335559ea1bba2
SHA2567431e5aa1849ff5eba9381359ab557fde62695f20e58a73a89e7f41f56600bd0
SHA512a5ec3a9229e12a9f5d93d06aa8abfb23ac2b6851a448bbeb3097dba3a2970e2ef1d1497bb04c4c165711008756a73e9be12254b91191374dd979c4fc990c7ea1
-
Filesize
5.2MB
MD50b2b2e4a8d27231ec7fb2e256eacb59d
SHA1262f9f802609e5632cf11a5764fc1710629b784d
SHA256cb61d1578a0ba499d7ef41faae49d0cef31d409fbe641459b7fc7f0f15487d91
SHA512d163346cbff0ce716f45d38d72f252319b2cf7ea0cd097fc61121726d9e9292e96b6dec8d4d4c1a666aaf215e1f80aacb2e9f4f78513f96594d04dcda00ed01c
-
Filesize
5.2MB
MD5755c1f0c93b71fc8f116de2aa56aa79c
SHA1d1d3baefa69157da1d1b4d2537a9e11df60a24a4
SHA2562d75f8f5f6d780bf6dec17713581b73a8ab79b5ccb9f287a7fe0d399bccba1ac
SHA512a2d5fa9e4f07363d6affa5c67fed1fa7fb1c86474f47b9442cd6f6a97068910393496f32a25c0586860e681c8a16572d4c2e99754b6f94d57e6aa8f0ce19f384
-
Filesize
5.2MB
MD53a301c87a6581a53a4791f7b7f5558e2
SHA1dd98cce90b2fab8071c6811155c8af944f43bba6
SHA256cd6689df382976c0701506b1df79cce06d0d4f435b44d553cfa839717d7f069b
SHA5120df9a84ede991c54b9992b4b3d03a8a3063636a9fe2ad613900daacdf0ff7c5c9acd7036eed6a79ea1663c84fa90667f60c1b8fe2d8ab5021a0ff1e1d7170d01
-
Filesize
5.2MB
MD5fd2a31fb4e53b6a17fbf2335da493b15
SHA1cd108be89e332c5843ab12ae7caaa7c5e0cae624
SHA256ea82be20b49c1bb16663a2f3dbf80f3ab71e02416bc94a9ae18fc7b728265acf
SHA51252e6e07e860e1307e423bf5ac6b5ec31d0f4943078c972b45ca7a24392b9eba8528cb1cb8513c58ea925ff5200ae287236d0ac3da1c0317b1befe79fd420a85e
-
Filesize
5.2MB
MD500a8985cd45743de8e31ea6e87e57e19
SHA1213a12f4b3e140a226f9bbc5abb3f50317f5962c
SHA256890f32d8965aa946d9b54f61d12e93b399726dae74d94ab9ce3913077532549d
SHA512db382e7c0facd349c6afda4c5513d8303219dcc0faf829c2ce89b128490220d8f24f88162a703d922e2e41dc41cc634c614e40730702be2ddace7af6f6eb757f
-
Filesize
5.2MB
MD5a1aaf95cf433fd445f3f9bdc9e49338a
SHA15c4ff72bcd3c57436b5e639ffd3e2828c711df88
SHA256a72be8a33986f594a72983980091e7006c79116df78aec578772c749a7a47f1b
SHA512bb07b846c39cf9ed0694d08a50aafdc87b1311ba9300da8999970f31fbb0b84be2e7a6a945ee3ac9a27e9a3f8cea5efa8b11b11f0bb327d6b43d694d01a50a05
-
Filesize
5.2MB
MD572b3e96a2489a7ff224af895e83f7066
SHA19f4d46581c69766b06386cf1e6874f8c5def28ae
SHA256ee604fe3f4884c32de84ba24dbafe2825231adf860bade7d5ecdb9bebf9e4102
SHA5121c3003940694eda079243d818266e8aa78fdef6cd9f90c8ecd0dfb49333f39d7103801a407272c45ff1bef867346672ccecd3e2ff77c1cbaff23f1b4fec591f8
-
Filesize
5.2MB
MD5bb23b267686076d210e4f0320916392d
SHA1e9469131c137b4510a770ceac6619eb70684acbb
SHA2561332504f1f9833ba9e597fbeb4e6869eb1b7460ca1ce0f62c075a5fca1676f81
SHA51260483263015fbba5710a2552e22112d7dc3529c820b4e1bfe66fd1f47e1738293a522c0069773f2e42255c9e73f08005955eaa9d82d7bae3b09918c692f1cf84