Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 18:17
Behavioral task
behavioral1
Sample
f958acf0f0faeae4236693f1970ee4d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f958acf0f0faeae4236693f1970ee4d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f958acf0f0faeae4236693f1970ee4d0N.exe
-
Size
435KB
-
MD5
f958acf0f0faeae4236693f1970ee4d0
-
SHA1
ae8c6f54ca37cea7041a14f459652fb11e107eaf
-
SHA256
43556d3374df88ae5f196f72d26a55aa86e8efbb1d66d581a1d55a8e5f5ff8a5
-
SHA512
e626293fa1dc0a3d5462779990245331748e99d27f2394ab39f6c6c5f22f5d708ba86b4ecf02cb4368c6312003e65cfb23c6f01f6bad58ab9e04f76918e3bb5e
-
SSDEEP
3072:Kae7OubpGGErCbuZM4EQrjo7vgHJJPPIgR4ZvyezcduPgzKy8sT:KacxGfTMfQrjoziJJHIjKezcdwgnT
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 5000 f958acf0f0faeae4236693f1970ee4d0n_3202.exe 3112 f958acf0f0faeae4236693f1970ee4d0n_3202a.exe 3936 f958acf0f0faeae4236693f1970ee4d0n_3202b.exe 2452 f958acf0f0faeae4236693f1970ee4d0n_3202c.exe 3892 f958acf0f0faeae4236693f1970ee4d0n_3202d.exe 3640 f958acf0f0faeae4236693f1970ee4d0n_3202e.exe 2572 f958acf0f0faeae4236693f1970ee4d0n_3202f.exe 1180 f958acf0f0faeae4236693f1970ee4d0n_3202g.exe 1300 f958acf0f0faeae4236693f1970ee4d0n_3202h.exe 2424 f958acf0f0faeae4236693f1970ee4d0n_3202i.exe 2044 f958acf0f0faeae4236693f1970ee4d0n_3202j.exe 5080 f958acf0f0faeae4236693f1970ee4d0n_3202k.exe 4396 f958acf0f0faeae4236693f1970ee4d0n_3202l.exe 3704 f958acf0f0faeae4236693f1970ee4d0n_3202m.exe 2660 f958acf0f0faeae4236693f1970ee4d0n_3202n.exe 3468 f958acf0f0faeae4236693f1970ee4d0n_3202o.exe 2148 f958acf0f0faeae4236693f1970ee4d0n_3202p.exe 772 f958acf0f0faeae4236693f1970ee4d0n_3202q.exe 3724 f958acf0f0faeae4236693f1970ee4d0n_3202r.exe 4172 f958acf0f0faeae4236693f1970ee4d0n_3202s.exe 4380 f958acf0f0faeae4236693f1970ee4d0n_3202t.exe 4452 f958acf0f0faeae4236693f1970ee4d0n_3202u.exe 3396 f958acf0f0faeae4236693f1970ee4d0n_3202v.exe 2836 f958acf0f0faeae4236693f1970ee4d0n_3202w.exe 4588 f958acf0f0faeae4236693f1970ee4d0n_3202x.exe 2236 f958acf0f0faeae4236693f1970ee4d0n_3202y.exe -
resource yara_rule behavioral2/memory/2748-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0008000000023497-5.dat upx behavioral2/memory/2748-9-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000800000002349d-17.dat upx behavioral2/memory/5000-19-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000700000002349e-27.dat upx behavioral2/memory/3112-29-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000700000002349f-37.dat upx behavioral2/memory/3936-39-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234a0-47.dat upx behavioral2/memory/3892-56-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2452-51-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/3892-61-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234a1-59.dat upx behavioral2/files/0x00070000000234a2-68.dat upx behavioral2/memory/3640-70-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234a3-78.dat upx behavioral2/memory/2572-80-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234a5-88.dat upx behavioral2/memory/1180-90-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234a6-99.dat upx behavioral2/memory/2424-102-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/1300-101-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234a7-110.dat upx behavioral2/memory/2424-112-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000800000002349b-119.dat upx behavioral2/memory/2044-121-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234a8-129.dat upx behavioral2/memory/5080-131-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4396-141-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234aa-142.dat upx behavioral2/memory/3704-151-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234ab-149.dat upx behavioral2/files/0x00070000000234ac-159.dat upx behavioral2/files/0x00070000000234ad-171.dat upx behavioral2/memory/3468-170-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234ae-179.dat upx behavioral2/memory/772-188-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2148-182-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2660-162-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/772-199-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/3724-194-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234af-191.dat upx behavioral2/files/0x00070000000234b0-202.dat upx behavioral2/memory/3724-204-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234b1-211.dat upx behavioral2/memory/4380-220-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4172-213-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234b2-222.dat upx behavioral2/memory/4380-225-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/3396-236-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/4452-235-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x00070000000234b3-233.dat upx behavioral2/files/0x00030000000230ad-244.dat upx behavioral2/memory/3396-252-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2836-250-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2836-256-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000300000002327a-257.dat upx behavioral2/files/0x000a0000000233dc-264.dat upx behavioral2/memory/4588-266-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/memory/2236-269-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202j.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202r.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202q.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202v.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202f.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202h.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202m.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202w.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202v.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202b.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202l.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202p.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202o.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202u.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202t.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202e.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202n.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202t.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202k.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202s.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202g.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202q.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202x.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202w.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202i.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202h.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202o.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202n.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202c.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202d.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202.exe\"" f958acf0f0faeae4236693f1970ee4d0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202a.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\f958acf0f0faeae4236693f1970ee4d0n_3202y.exe\"" f958acf0f0faeae4236693f1970ee4d0n_3202x.exe -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202v.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202w.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202k.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202o.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f958acf0f0faeae4236693f1970ee4d0n_3202b.exe -
Modifies registry class 54 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202k.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202q.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202h.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202v.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202m.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202o.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202j.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202p.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202w.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202a.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202s.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202l.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202h.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202i.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202j.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202r.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202n.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = ed9d2dfac8aa8a5a f958acf0f0faeae4236693f1970ee4d0n_3202b.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\WOW6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} f958acf0f0faeae4236693f1970ee4d0n_3202s.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 5000 2748 f958acf0f0faeae4236693f1970ee4d0N.exe 84 PID 2748 wrote to memory of 5000 2748 f958acf0f0faeae4236693f1970ee4d0N.exe 84 PID 2748 wrote to memory of 5000 2748 f958acf0f0faeae4236693f1970ee4d0N.exe 84 PID 5000 wrote to memory of 3112 5000 f958acf0f0faeae4236693f1970ee4d0n_3202.exe 85 PID 5000 wrote to memory of 3112 5000 f958acf0f0faeae4236693f1970ee4d0n_3202.exe 85 PID 5000 wrote to memory of 3112 5000 f958acf0f0faeae4236693f1970ee4d0n_3202.exe 85 PID 3112 wrote to memory of 3936 3112 f958acf0f0faeae4236693f1970ee4d0n_3202a.exe 86 PID 3112 wrote to memory of 3936 3112 f958acf0f0faeae4236693f1970ee4d0n_3202a.exe 86 PID 3112 wrote to memory of 3936 3112 f958acf0f0faeae4236693f1970ee4d0n_3202a.exe 86 PID 3936 wrote to memory of 2452 3936 f958acf0f0faeae4236693f1970ee4d0n_3202b.exe 87 PID 3936 wrote to memory of 2452 3936 f958acf0f0faeae4236693f1970ee4d0n_3202b.exe 87 PID 3936 wrote to memory of 2452 3936 f958acf0f0faeae4236693f1970ee4d0n_3202b.exe 87 PID 2452 wrote to memory of 3892 2452 f958acf0f0faeae4236693f1970ee4d0n_3202c.exe 88 PID 2452 wrote to memory of 3892 2452 f958acf0f0faeae4236693f1970ee4d0n_3202c.exe 88 PID 2452 wrote to memory of 3892 2452 f958acf0f0faeae4236693f1970ee4d0n_3202c.exe 88 PID 3892 wrote to memory of 3640 3892 f958acf0f0faeae4236693f1970ee4d0n_3202d.exe 89 PID 3892 wrote to memory of 3640 3892 f958acf0f0faeae4236693f1970ee4d0n_3202d.exe 89 PID 3892 wrote to memory of 3640 3892 f958acf0f0faeae4236693f1970ee4d0n_3202d.exe 89 PID 3640 wrote to memory of 2572 3640 f958acf0f0faeae4236693f1970ee4d0n_3202e.exe 92 PID 3640 wrote to memory of 2572 3640 f958acf0f0faeae4236693f1970ee4d0n_3202e.exe 92 PID 3640 wrote to memory of 2572 3640 f958acf0f0faeae4236693f1970ee4d0n_3202e.exe 92 PID 2572 wrote to memory of 1180 2572 f958acf0f0faeae4236693f1970ee4d0n_3202f.exe 93 PID 2572 wrote to memory of 1180 2572 f958acf0f0faeae4236693f1970ee4d0n_3202f.exe 93 PID 2572 wrote to memory of 1180 2572 f958acf0f0faeae4236693f1970ee4d0n_3202f.exe 93 PID 1180 wrote to memory of 1300 1180 f958acf0f0faeae4236693f1970ee4d0n_3202g.exe 94 PID 1180 wrote to memory of 1300 1180 f958acf0f0faeae4236693f1970ee4d0n_3202g.exe 94 PID 1180 wrote to memory of 1300 1180 f958acf0f0faeae4236693f1970ee4d0n_3202g.exe 94 PID 1300 wrote to memory of 2424 1300 f958acf0f0faeae4236693f1970ee4d0n_3202h.exe 95 PID 1300 wrote to memory of 2424 1300 f958acf0f0faeae4236693f1970ee4d0n_3202h.exe 95 PID 1300 wrote to memory of 2424 1300 f958acf0f0faeae4236693f1970ee4d0n_3202h.exe 95 PID 2424 wrote to memory of 2044 2424 f958acf0f0faeae4236693f1970ee4d0n_3202i.exe 97 PID 2424 wrote to memory of 2044 2424 f958acf0f0faeae4236693f1970ee4d0n_3202i.exe 97 PID 2424 wrote to memory of 2044 2424 f958acf0f0faeae4236693f1970ee4d0n_3202i.exe 97 PID 2044 wrote to memory of 5080 2044 f958acf0f0faeae4236693f1970ee4d0n_3202j.exe 98 PID 2044 wrote to memory of 5080 2044 f958acf0f0faeae4236693f1970ee4d0n_3202j.exe 98 PID 2044 wrote to memory of 5080 2044 f958acf0f0faeae4236693f1970ee4d0n_3202j.exe 98 PID 5080 wrote to memory of 4396 5080 f958acf0f0faeae4236693f1970ee4d0n_3202k.exe 99 PID 5080 wrote to memory of 4396 5080 f958acf0f0faeae4236693f1970ee4d0n_3202k.exe 99 PID 5080 wrote to memory of 4396 5080 f958acf0f0faeae4236693f1970ee4d0n_3202k.exe 99 PID 4396 wrote to memory of 3704 4396 f958acf0f0faeae4236693f1970ee4d0n_3202l.exe 100 PID 4396 wrote to memory of 3704 4396 f958acf0f0faeae4236693f1970ee4d0n_3202l.exe 100 PID 4396 wrote to memory of 3704 4396 f958acf0f0faeae4236693f1970ee4d0n_3202l.exe 100 PID 3704 wrote to memory of 2660 3704 f958acf0f0faeae4236693f1970ee4d0n_3202m.exe 101 PID 3704 wrote to memory of 2660 3704 f958acf0f0faeae4236693f1970ee4d0n_3202m.exe 101 PID 3704 wrote to memory of 2660 3704 f958acf0f0faeae4236693f1970ee4d0n_3202m.exe 101 PID 2660 wrote to memory of 3468 2660 f958acf0f0faeae4236693f1970ee4d0n_3202n.exe 102 PID 2660 wrote to memory of 3468 2660 f958acf0f0faeae4236693f1970ee4d0n_3202n.exe 102 PID 2660 wrote to memory of 3468 2660 f958acf0f0faeae4236693f1970ee4d0n_3202n.exe 102 PID 3468 wrote to memory of 2148 3468 f958acf0f0faeae4236693f1970ee4d0n_3202o.exe 103 PID 3468 wrote to memory of 2148 3468 f958acf0f0faeae4236693f1970ee4d0n_3202o.exe 103 PID 3468 wrote to memory of 2148 3468 f958acf0f0faeae4236693f1970ee4d0n_3202o.exe 103 PID 2148 wrote to memory of 772 2148 f958acf0f0faeae4236693f1970ee4d0n_3202p.exe 104 PID 2148 wrote to memory of 772 2148 f958acf0f0faeae4236693f1970ee4d0n_3202p.exe 104 PID 2148 wrote to memory of 772 2148 f958acf0f0faeae4236693f1970ee4d0n_3202p.exe 104 PID 772 wrote to memory of 3724 772 f958acf0f0faeae4236693f1970ee4d0n_3202q.exe 105 PID 772 wrote to memory of 3724 772 f958acf0f0faeae4236693f1970ee4d0n_3202q.exe 105 PID 772 wrote to memory of 3724 772 f958acf0f0faeae4236693f1970ee4d0n_3202q.exe 105 PID 3724 wrote to memory of 4172 3724 f958acf0f0faeae4236693f1970ee4d0n_3202r.exe 106 PID 3724 wrote to memory of 4172 3724 f958acf0f0faeae4236693f1970ee4d0n_3202r.exe 106 PID 3724 wrote to memory of 4172 3724 f958acf0f0faeae4236693f1970ee4d0n_3202r.exe 106 PID 4172 wrote to memory of 4380 4172 f958acf0f0faeae4236693f1970ee4d0n_3202s.exe 107 PID 4172 wrote to memory of 4380 4172 f958acf0f0faeae4236693f1970ee4d0n_3202s.exe 107 PID 4172 wrote to memory of 4380 4172 f958acf0f0faeae4236693f1970ee4d0n_3202s.exe 107 PID 4380 wrote to memory of 4452 4380 f958acf0f0faeae4236693f1970ee4d0n_3202t.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\f958acf0f0faeae4236693f1970ee4d0N.exe"C:\Users\Admin\AppData\Local\Temp\f958acf0f0faeae4236693f1970ee4d0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5000 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202a.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202a.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3112 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202b.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202b.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202c.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202c.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202d.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202d.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3892 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202e.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202e.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3640 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202f.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202f.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202g.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202g.exe9⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1180 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202h.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202h.exe10⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1300 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202i.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202i.exe11⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202j.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202j.exe12⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202k.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202k.exe13⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202l.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202l.exe14⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202m.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202m.exe15⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3704 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202n.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202n.exe16⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202o.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202o.exe17⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3468 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202p.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202p.exe18⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202q.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202q.exe19⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202r.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202r.exe20⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3724 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202s.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202s.exe21⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202t.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202t.exe22⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4380 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202u.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202u.exe23⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4452 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202v.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202v.exe24⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3396 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202w.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202w.exe25⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2836 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202x.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202x.exe26⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4588 -
\??\c:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202y.exec:\users\admin\appdata\local\temp\f958acf0f0faeae4236693f1970ee4d0n_3202y.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2236
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD5b6a73d240ddabf934c2e214cc47bc50a
SHA1ac743cdcc95880f356720f770fca7b4bcc74f096
SHA256d3ff517b3919c35ba00dadd66dcfa030021a6027f21a69ec47a3e516a702f52a
SHA512684f84e2f9df4480790d33dfe4a4b540cf52556dc6d3e49b22435e4a31db6209005c990238d5e9d0db513d0fa7b0453292bc7a6422d75dc913470f48b15cbcf0
-
Filesize
436KB
MD51cc32fa2cc87eec2603a87122f5089d8
SHA1353e81f472a3a55e309aaa3520f971a6f8e6b8aa
SHA256689516ddf0721fe404fd7d6780a8646c98f22d3f2cff03865fe36cc7e4f9fe00
SHA5126fd8189a2586f8f94e784276f71e8aa3fd956e97bd5fe524d9ee901a9700c03e66495e2fae2e88799ac86b4735587c28e6a3a47bce2d8f3c92f357d1e7a6e7f4
-
Filesize
436KB
MD5859539f1513965987184f0ded3d257e3
SHA17c10b99e052cfb5028f34ea937e509d55b203d1d
SHA256e3c616330c5958cedf6d837c5cb05dfed2e71c5f94b5e6b7673f7fb56820b047
SHA5124bc9a558ccd37acb5cda5cf2dff2d48f7371e092174b04618f28c24cbfddf1eecd2301a8a132a2f937069bf7cf7acff6cec3a042f6abb469e8153fac2652776e
-
Filesize
436KB
MD5a4b4fb9c59b8f0738e790c44925897e7
SHA18d7d7d9858598d6c2e49b8c0c81ea51d679d33e8
SHA25601ecac2ae1a28e5f969716bc91509281e6f22a8f637fb2edd8f97866132337f3
SHA5126669fb5d21b2f492e326d2f6c86a9d3708c104b3a3475b0066ad4385024c761adf8c62e2fe220b5066d09d3576613307416a9067ba787adeddc04b2c2487c70b
-
Filesize
436KB
MD555a94820cf36ca8afbc554dff321a385
SHA1bf16eeefc595308198788bc46017c957cd0bf7ed
SHA256b97479977d4c3f3c068e1b35753eeaf31234846f5cd48246eca31b5e1924cab8
SHA512f1425867080743206657a497256a7157376ea10f52322110294406bec9c4ebcd2cfed8c15cea50bb9eb008c51c43a288a9b3b2b1b06cde2b75a0c60abb21705d
-
Filesize
437KB
MD57cfe8afb846a4efa34d3d5b936245b09
SHA1408ea8bdf850699feff5ce9725705dfce7e04465
SHA256fad1f67db9ef46c637091688ba41d9f6a8de69f556b95f9038e151babc58d27b
SHA51227c435d23656e8059a4d743d1b39110f81df6b750f56550d9fea1442761e2a8111a1a6d651449ea9fed7d06e43b01c278369b7fa2f34359d5268429d1a57caec
-
Filesize
437KB
MD5937b0332db8e79683161e985db8ed4d5
SHA1a36eef17a3deff74a83ae006d1be44b69b2d37b0
SHA256496f68b72172587d55aa63f98483068d9affa71449eb8d666ca257e4d90b4843
SHA512bf4e73149e9607772189eb0c6805a7b55e1e152848988b002a0d6661fa78a176d914ab79b0916a09af6f2f37fd111b3910984cee1db174a3db38f84dc72b991e
-
Filesize
437KB
MD55ecc9f72d140e587835e89a3cf46e0b7
SHA1a001cee195c1d77fedfabfc5938e8d6d1dd543e1
SHA25666b49974fb83b7734f7fd99300d22d82a1446e136bcfdf5ecff360a4941997fc
SHA512ea5382d18c8e92bb154652ec3fe579cef684e5722c1f76f62fcc3362257fcde1ff74c1a25f1289366196f8fd8693c0e02169e4eae1d2e04fbd252044ddc74ceb
-
Filesize
438KB
MD5e3b2274b3122c6fd7bb2eac88b7c0891
SHA1873fdcecf202621247ff692ee64f366c2223e434
SHA256d784148bff6cfb3016a4e37fab6f57e41cc7685070cf837d13078e912d511422
SHA512c47aa52b24467244f3349d18e117762cd33d495c24adea4547780445f124ca5f75f45a3f5400ef67c1686ee3bdd9622246c23e1f0a2ae4d399b2539fcdf5b217
-
Filesize
438KB
MD556d80a29235b3b0fc1002bc2db43aab2
SHA1589e09c8d8b14407839b501da64c1431eccff69f
SHA256d35723963a442b34506190a52fd7ff47cdd869bf0aecfb02bdb187ba02991321
SHA5125ba2045d5702b8900d8ab69136f493e7b6a31095b5b573f651ba014fbaad6a2496989574657711ead081fac100a3d2bde9e4d148a584e60c9bbe138f355094e7
-
Filesize
439KB
MD5a623fa052f4945d958e3cd10de58c008
SHA1e74fe08ba877b72cc919ec9d94bc4d4588a39e74
SHA256dfbfa805d2d392ceae6374e4d3c1dd4cb9f7bc6096c56d6f192b9e546cca56c4
SHA51218d56075d9e571ce3f65a4fb970582ed7bb629e928a7660c6e0b665b1c37cc24e43809da7fc332bbce3b18bf1c2aea9e00b93cee78f97d9d5c9afe8db92b02bb
-
Filesize
439KB
MD5d2d794e06cded1341d091aa904fd1faf
SHA1cbcf145ddbaeff2a5cc87046a08ec45832585bdd
SHA2562387528485b7b7298d4a92bc5b62ec14825435fedff02a248cd8378e4cd40560
SHA512ea13daaa272226a944095a2f9705a7149b0edd5336770e9d9f84051fef4f3cc67b0643ac9004591f43dd9f3e6373c3c25ef7a8cc6e5e658d4e32f74dc4e88f75
-
Filesize
439KB
MD5034b8982bdfbc54d9eb7bcef744d01dd
SHA17456ff8f0abaa4633d0828a3fa34001416d913ab
SHA256f22d3564b3474c99d4981c07e29eab9c29e95b52cc1b55c4aaf74bfb4abbf519
SHA512f5cc3c82c8e905e994ead3dadf2447fa4000a4ec3e98feccbd64129e81c86ef3b9021bd41424b1201900cb56f78d9dae0088b6709035c05813c915e0267c3029
-
Filesize
440KB
MD5d65292471efe2b47eec9a4639c1a8382
SHA14b481c29052464ebf5813a0c0926c51563260bb6
SHA256d959047a700cdc32eec56697abfeedfc9fbab336616854899f99b4a314878f03
SHA5121f05b21714ca5e6066d63562aa5b63a8c3d5003d132ae13e93053db18e0b0ebe373b059961a5bc6e191db962718472f1b9f45c8bec0a210dc1c35eb854b7b4a7
-
Filesize
440KB
MD5535505007600a84885943e3cf4aaf1b5
SHA14666a05af51cb289a505b22bcffc39c7e0234b72
SHA25643a294e8301d93f07637331d4344b2e639d7926ed925762567ac9a0e767466b6
SHA512cae9011d2f83ea1a9f6d3c744dbcb6a11490de76da65c15dc53aba653eae17dd999100de71087b801b4604fae3d99433eb9144849f997f563e4b319e103bcce2
-
Filesize
440KB
MD569072363064841cf9942816ae50208ec
SHA187b27c9262b27b8b6f226203d9d44c8acc6be0d6
SHA2569bfe951a3059c58574b91585883a23ba37e7056bbbc6e7f6c366954f77a5ca2c
SHA5122c5073029e92444d7055403713745025be8857c44bcbfe2bc0560b3453eaf93512c97401dfc0745b32ef6eaf9c4288892355ccd52a1741c7df8b86e513072d85
-
Filesize
441KB
MD5e9f5bee28bc4908159c0f9b54e1cb9fc
SHA17781fcb5c078cb4ccdd168c803ff9950096adbb0
SHA25614dc33b33961151fc92680ab01e560f40bcf943bdc881ba8849d33bf9cb3652b
SHA5129209fbdf4f3b9af7b6a131857799a99eb1b4ac5196f1f7e31bb5b94f7d0824ceda98f9efc2e48d53b967e8aaa81276fb34b8d75d917759fbab515cc4661f58c8
-
Filesize
437KB
MD571dd474c0082e0e0b4eff97d6025d2ca
SHA1b6a7dba2e42cfac7c4d764e510e2e7bbd2b7e360
SHA256acfc9593bd98862b06a274f8b7c8e1f92ca482ac911a80138910077763e9ed1a
SHA51287cab3ae9ebd8d070ca2a1db806366c3f890dde4ca830e6999cd0a4472ab09f92d3c1d2492d3a3eccc6004e8e732abdc4ffb97686a670ec3336760503d1ea090
-
Filesize
438KB
MD58119d96e707a32413493337a73ea4bb1
SHA1b517875174aeedc64e33b8a0f78fabe440f1473e
SHA25611cf261bc846a231026847fd84a18775c5c5eb969e000781ea7fd0bdbc9f9542
SHA5125ba23069f83448f28b2415d3bbf04c8604a16a7a0c6b642aa524e2ae627cee927602d1f2611cb852a58a94198b062f5adccd8a354393f24eccdadf1457bef7ef
-
Filesize
438KB
MD515f935a1739e6f1cc3ad2b9c3bffa3e5
SHA1475262fa99511a4e87278fbdf87a4a12984f5c35
SHA25640963b48603b60b01c29fdfd46f0010c53699fce5daa61e1a9510ebadc286931
SHA512d978505198180b56facdebdb16b1e599a3ab55039b877fb2e92892970aac48e27083003df09b67af3c2a7af68e3a55b29022346e806ed013854eb03dda869b36
-
Filesize
439KB
MD5a4cf3a7d6d58b9ce2458d9b1b88954c4
SHA12167932e894872594a8f9f3ef29fb726ba2e9e87
SHA256e8d62969e7e4aac424dc3117f54f4dcd049a5616f33f4e096b490dfc9406f565
SHA512811bf6aed0117e89c4359246dee81869225615f9d221128977424eabe9e82b8dfb2bc130cccb6e71e8da908e509750bf311469c0f59eb1324ffbf95ccb539a79
-
Filesize
440KB
MD5d6e19a9f15fc66a8bee168999454ec8c
SHA199b383b0518ad78762e9a27c1740d05e285bf2fa
SHA256c457e6d063cdc5f85b04b64f7fa1e06437d04790fcec2bd717bf0f7ea5e7f267
SHA5122d1a91194258013379263f1ecc635c4c3bf06c0e7a674d75e7e0bc3cffc7f0498ec43c686ecaade186e6538be771719d3bb09f6fe3aaabdf7d2f62fd9ecec44c
-
Filesize
440KB
MD5536b8da7968574bc9a8cf45aded5cdf3
SHA1310726e5cbf05ae9d40ffa2c6ad9327121d666ab
SHA25641a21c39da60ee73ccf0829dcd9de7cb165a9d250b2d005b72798808ae7585aa
SHA5128a28c81de01f7439a49ec870914f57bfc1b54a039119eacf0d9aae66793ade8c003db3d169429c4b9458084cedc301928e8f44f68d865140cbc807149623362e
-
Filesize
441KB
MD5d49e8bac62dd56d6981c54f66b0ddaa7
SHA1ab4ad9448eee7489f88d8245b124daa4c5c4b194
SHA256884dec002cab4943958c30ac5f4144f992f737e49e0a137853a9f9b8e7e95844
SHA5129121f875488008b1fcd7213e72f714fb8e5eabece6063cec3513a38990c2d85a22f1711e82f62391f745d8ddae5de50378fd3ea643d51fe445e6300a110e3ff5
-
Filesize
441KB
MD5cfec3054592b2672870795a91e76e9b5
SHA17e8dba2e61769d5ce20d2842d7b3d5d8237f2f3e
SHA2562d956f2864fbbb7aa0e8ecaf9619099c4a27f7e2efe8c1d5ce33baa42f19474e
SHA512f48a689de20f1d638d08030f35db5c0e733a7eab47ed910ce33d7931597891c46372612c58f5ffeab96f6e9163243fc473a43d8de7029a01202997d0088efeb9
-
Filesize
441KB
MD5e26cc51d50cfa3d1d073f56c1b41eed4
SHA15d282644945c9f9f01f6e83cfbb3f27ece027ad3
SHA2566f854f1c5bdae1074257a78fdd4bc46a73f18cd6c91a537aac11220355f14964
SHA512263c7a1607ada5f2316044c61489ea4eefda18e082afc600b757197706697aae30d478441e6abe0dc323fa9042a31eaa46441426a723fd8213a6650f943a4b18