Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 20:48
Behavioral task
behavioral1
Sample
475b7b0bd2bbbb6c3e767a0766aa6550N.exe
Resource
win7-20240705-en
General
-
Target
475b7b0bd2bbbb6c3e767a0766aa6550N.exe
-
Size
5.2MB
-
MD5
475b7b0bd2bbbb6c3e767a0766aa6550
-
SHA1
29f7e78d558d1ee28ead290ea1c73fa158f4dbaf
-
SHA256
58216b70fb72f78160c86be91667b8508f1c90c45fc35dd8bd8f3e92679c7d6e
-
SHA512
4707344f435b0014268b5587e22234285b6f4b968c15e8dec687e36a9c393f7db44d8b86151634487798169f8dd85a0658f4ab0f00972bc599cad5f748d75ec5
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lS:RWWBibf56utgpPFotBER/mQ32lU+
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral2/files/0x0008000000023436-6.dat cobalt_reflective_dll behavioral2/files/0x000700000002343a-10.dat cobalt_reflective_dll behavioral2/files/0x000700000002343b-11.dat cobalt_reflective_dll behavioral2/files/0x000700000002343c-23.dat cobalt_reflective_dll behavioral2/files/0x000700000002343e-31.dat cobalt_reflective_dll behavioral2/files/0x000700000002343f-36.dat cobalt_reflective_dll behavioral2/files/0x000700000002343d-39.dat cobalt_reflective_dll behavioral2/files/0x0007000000023440-40.dat cobalt_reflective_dll behavioral2/files/0x0007000000023443-65.dat cobalt_reflective_dll behavioral2/files/0x0007000000023447-95.dat cobalt_reflective_dll behavioral2/files/0x0007000000023446-113.dat cobalt_reflective_dll behavioral2/files/0x000700000002344c-125.dat cobalt_reflective_dll behavioral2/files/0x000700000002344b-121.dat cobalt_reflective_dll behavioral2/files/0x000700000002344a-118.dat cobalt_reflective_dll behavioral2/files/0x0007000000023449-116.dat cobalt_reflective_dll behavioral2/files/0x0007000000023448-111.dat cobalt_reflective_dll behavioral2/files/0x0007000000023445-85.dat cobalt_reflective_dll behavioral2/files/0x0007000000023444-83.dat cobalt_reflective_dll behavioral2/files/0x0008000000023437-81.dat cobalt_reflective_dll behavioral2/files/0x0007000000023442-59.dat cobalt_reflective_dll behavioral2/files/0x0007000000023441-56.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 45 IoCs
resource yara_rule behavioral2/memory/1504-79-0x00007FF69E900000-0x00007FF69EC51000-memory.dmp xmrig behavioral2/memory/4748-98-0x00007FF62FC90000-0x00007FF62FFE1000-memory.dmp xmrig behavioral2/memory/840-94-0x00007FF740DD0000-0x00007FF741121000-memory.dmp xmrig behavioral2/memory/3956-131-0x00007FF65F9B0000-0x00007FF65FD01000-memory.dmp xmrig behavioral2/memory/3404-135-0x00007FF654090000-0x00007FF6543E1000-memory.dmp xmrig behavioral2/memory/4608-136-0x00007FF7F06B0000-0x00007FF7F0A01000-memory.dmp xmrig behavioral2/memory/1780-138-0x00007FF7464D0000-0x00007FF746821000-memory.dmp xmrig behavioral2/memory/1016-137-0x00007FF7AC830000-0x00007FF7ACB81000-memory.dmp xmrig behavioral2/memory/2844-133-0x00007FF6328E0000-0x00007FF632C31000-memory.dmp xmrig behavioral2/memory/3940-132-0x00007FF707D00000-0x00007FF708051000-memory.dmp xmrig behavioral2/memory/4456-140-0x00007FF639BB0000-0x00007FF639F01000-memory.dmp xmrig behavioral2/memory/1396-141-0x00007FF7564D0000-0x00007FF756821000-memory.dmp xmrig behavioral2/memory/3764-139-0x00007FF6A2D80000-0x00007FF6A30D1000-memory.dmp xmrig behavioral2/memory/4464-134-0x00007FF67B2F0000-0x00007FF67B641000-memory.dmp xmrig behavioral2/memory/2272-130-0x00007FF696BC0000-0x00007FF696F11000-memory.dmp xmrig behavioral2/memory/1504-127-0x00007FF69E900000-0x00007FF69EC51000-memory.dmp xmrig behavioral2/memory/2460-146-0x00007FF613B70000-0x00007FF613EC1000-memory.dmp xmrig behavioral2/memory/2512-148-0x00007FF6C8A10000-0x00007FF6C8D61000-memory.dmp xmrig behavioral2/memory/2412-145-0x00007FF7AD080000-0x00007FF7AD3D1000-memory.dmp xmrig behavioral2/memory/4948-144-0x00007FF629910000-0x00007FF629C61000-memory.dmp xmrig behavioral2/memory/1876-143-0x00007FF604FD0000-0x00007FF605321000-memory.dmp xmrig behavioral2/memory/2708-142-0x00007FF787330000-0x00007FF787681000-memory.dmp xmrig behavioral2/memory/632-150-0x00007FF725A80000-0x00007FF725DD1000-memory.dmp xmrig behavioral2/memory/1504-153-0x00007FF69E900000-0x00007FF69EC51000-memory.dmp xmrig behavioral2/memory/840-203-0x00007FF740DD0000-0x00007FF741121000-memory.dmp xmrig behavioral2/memory/4748-208-0x00007FF62FC90000-0x00007FF62FFE1000-memory.dmp xmrig behavioral2/memory/2272-217-0x00007FF696BC0000-0x00007FF696F11000-memory.dmp xmrig behavioral2/memory/3956-219-0x00007FF65F9B0000-0x00007FF65FD01000-memory.dmp xmrig behavioral2/memory/2844-221-0x00007FF6328E0000-0x00007FF632C31000-memory.dmp xmrig behavioral2/memory/3940-223-0x00007FF707D00000-0x00007FF708051000-memory.dmp xmrig behavioral2/memory/1780-225-0x00007FF7464D0000-0x00007FF746821000-memory.dmp xmrig behavioral2/memory/3404-227-0x00007FF654090000-0x00007FF6543E1000-memory.dmp xmrig behavioral2/memory/1396-229-0x00007FF7564D0000-0x00007FF756821000-memory.dmp xmrig behavioral2/memory/4456-231-0x00007FF639BB0000-0x00007FF639F01000-memory.dmp xmrig behavioral2/memory/2708-242-0x00007FF787330000-0x00007FF787681000-memory.dmp xmrig behavioral2/memory/1876-246-0x00007FF604FD0000-0x00007FF605321000-memory.dmp xmrig behavioral2/memory/2412-241-0x00007FF7AD080000-0x00007FF7AD3D1000-memory.dmp xmrig behavioral2/memory/4948-245-0x00007FF629910000-0x00007FF629C61000-memory.dmp xmrig behavioral2/memory/4608-248-0x00007FF7F06B0000-0x00007FF7F0A01000-memory.dmp xmrig behavioral2/memory/2512-250-0x00007FF6C8A10000-0x00007FF6C8D61000-memory.dmp xmrig behavioral2/memory/2460-252-0x00007FF613B70000-0x00007FF613EC1000-memory.dmp xmrig behavioral2/memory/3764-257-0x00007FF6A2D80000-0x00007FF6A30D1000-memory.dmp xmrig behavioral2/memory/1016-259-0x00007FF7AC830000-0x00007FF7ACB81000-memory.dmp xmrig behavioral2/memory/4464-260-0x00007FF67B2F0000-0x00007FF67B641000-memory.dmp xmrig behavioral2/memory/632-255-0x00007FF725A80000-0x00007FF725DD1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 840 vdNBPwI.exe 4748 EPRFjIG.exe 2272 eGIOFjq.exe 3956 HPouVrT.exe 3940 FJsaxbq.exe 2844 ovtqgDz.exe 3404 vETfoZy.exe 1780 eMcwyiF.exe 4456 ODbnKOX.exe 1396 rgSTeOz.exe 2708 aSZGkSz.exe 1876 JKBMeyw.exe 4948 fBXkEdn.exe 2412 ZFLKtqc.exe 2460 VmEfwvF.exe 4608 sKKHVDS.exe 2512 VWPiHdK.exe 1016 BPEeeAY.exe 632 vwMyeTH.exe 4464 OiEzapZ.exe 3764 zEvLjMu.exe -
resource yara_rule behavioral2/memory/1504-0-0x00007FF69E900000-0x00007FF69EC51000-memory.dmp upx behavioral2/files/0x0008000000023436-6.dat upx behavioral2/files/0x000700000002343a-10.dat upx behavioral2/files/0x000700000002343b-11.dat upx behavioral2/files/0x000700000002343c-23.dat upx behavioral2/files/0x000700000002343e-31.dat upx behavioral2/files/0x000700000002343f-36.dat upx behavioral2/files/0x000700000002343d-39.dat upx behavioral2/files/0x0007000000023440-40.dat upx behavioral2/memory/3404-51-0x00007FF654090000-0x00007FF6543E1000-memory.dmp upx behavioral2/memory/1780-54-0x00007FF7464D0000-0x00007FF746821000-memory.dmp upx behavioral2/files/0x0007000000023443-65.dat upx behavioral2/memory/2708-73-0x00007FF787330000-0x00007FF787681000-memory.dmp upx behavioral2/memory/1504-79-0x00007FF69E900000-0x00007FF69EC51000-memory.dmp upx behavioral2/files/0x0007000000023447-95.dat upx behavioral2/memory/4748-98-0x00007FF62FC90000-0x00007FF62FFE1000-memory.dmp upx behavioral2/files/0x0007000000023446-113.dat upx behavioral2/files/0x000700000002344c-125.dat upx behavioral2/files/0x000700000002344b-121.dat upx behavioral2/memory/632-119-0x00007FF725A80000-0x00007FF725DD1000-memory.dmp upx behavioral2/files/0x000700000002344a-118.dat upx behavioral2/files/0x0007000000023449-116.dat upx behavioral2/files/0x0007000000023448-111.dat upx behavioral2/memory/2512-108-0x00007FF6C8A10000-0x00007FF6C8D61000-memory.dmp upx behavioral2/memory/2460-104-0x00007FF613B70000-0x00007FF613EC1000-memory.dmp upx behavioral2/memory/840-94-0x00007FF740DD0000-0x00007FF741121000-memory.dmp upx behavioral2/memory/2412-87-0x00007FF7AD080000-0x00007FF7AD3D1000-memory.dmp upx behavioral2/files/0x0007000000023445-85.dat upx behavioral2/files/0x0007000000023444-83.dat upx behavioral2/files/0x0008000000023437-81.dat upx behavioral2/memory/1876-80-0x00007FF604FD0000-0x00007FF605321000-memory.dmp upx behavioral2/memory/4948-78-0x00007FF629910000-0x00007FF629C61000-memory.dmp upx behavioral2/memory/1396-61-0x00007FF7564D0000-0x00007FF756821000-memory.dmp upx behavioral2/files/0x0007000000023442-59.dat upx behavioral2/memory/4456-58-0x00007FF639BB0000-0x00007FF639F01000-memory.dmp upx behavioral2/files/0x0007000000023441-56.dat upx behavioral2/memory/2844-44-0x00007FF6328E0000-0x00007FF632C31000-memory.dmp upx behavioral2/memory/3940-33-0x00007FF707D00000-0x00007FF708051000-memory.dmp upx behavioral2/memory/3956-26-0x00007FF65F9B0000-0x00007FF65FD01000-memory.dmp upx behavioral2/memory/2272-18-0x00007FF696BC0000-0x00007FF696F11000-memory.dmp upx behavioral2/memory/4748-15-0x00007FF62FC90000-0x00007FF62FFE1000-memory.dmp upx behavioral2/memory/840-8-0x00007FF740DD0000-0x00007FF741121000-memory.dmp upx behavioral2/memory/3956-131-0x00007FF65F9B0000-0x00007FF65FD01000-memory.dmp upx behavioral2/memory/3404-135-0x00007FF654090000-0x00007FF6543E1000-memory.dmp upx behavioral2/memory/4608-136-0x00007FF7F06B0000-0x00007FF7F0A01000-memory.dmp upx behavioral2/memory/1780-138-0x00007FF7464D0000-0x00007FF746821000-memory.dmp upx behavioral2/memory/1016-137-0x00007FF7AC830000-0x00007FF7ACB81000-memory.dmp upx behavioral2/memory/2844-133-0x00007FF6328E0000-0x00007FF632C31000-memory.dmp upx behavioral2/memory/3940-132-0x00007FF707D00000-0x00007FF708051000-memory.dmp upx behavioral2/memory/4456-140-0x00007FF639BB0000-0x00007FF639F01000-memory.dmp upx behavioral2/memory/1396-141-0x00007FF7564D0000-0x00007FF756821000-memory.dmp upx behavioral2/memory/3764-139-0x00007FF6A2D80000-0x00007FF6A30D1000-memory.dmp upx behavioral2/memory/4464-134-0x00007FF67B2F0000-0x00007FF67B641000-memory.dmp upx behavioral2/memory/2272-130-0x00007FF696BC0000-0x00007FF696F11000-memory.dmp upx behavioral2/memory/1504-127-0x00007FF69E900000-0x00007FF69EC51000-memory.dmp upx behavioral2/memory/2460-146-0x00007FF613B70000-0x00007FF613EC1000-memory.dmp upx behavioral2/memory/2512-148-0x00007FF6C8A10000-0x00007FF6C8D61000-memory.dmp upx behavioral2/memory/2412-145-0x00007FF7AD080000-0x00007FF7AD3D1000-memory.dmp upx behavioral2/memory/4948-144-0x00007FF629910000-0x00007FF629C61000-memory.dmp upx behavioral2/memory/1876-143-0x00007FF604FD0000-0x00007FF605321000-memory.dmp upx behavioral2/memory/2708-142-0x00007FF787330000-0x00007FF787681000-memory.dmp upx behavioral2/memory/632-150-0x00007FF725A80000-0x00007FF725DD1000-memory.dmp upx behavioral2/memory/1504-153-0x00007FF69E900000-0x00007FF69EC51000-memory.dmp upx behavioral2/memory/840-203-0x00007FF740DD0000-0x00007FF741121000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\VWPiHdK.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\vwMyeTH.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\EPRFjIG.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\eGIOFjq.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\vETfoZy.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\rgSTeOz.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\fBXkEdn.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\sKKHVDS.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\zEvLjMu.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\ovtqgDz.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\ODbnKOX.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\aSZGkSz.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\JKBMeyw.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\VmEfwvF.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\BPEeeAY.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\HPouVrT.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\FJsaxbq.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\eMcwyiF.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\vdNBPwI.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\ZFLKtqc.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe File created C:\Windows\System\OiEzapZ.exe 475b7b0bd2bbbb6c3e767a0766aa6550N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe Token: SeLockMemoryPrivilege 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1504 wrote to memory of 840 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 85 PID 1504 wrote to memory of 840 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 85 PID 1504 wrote to memory of 4748 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 86 PID 1504 wrote to memory of 4748 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 86 PID 1504 wrote to memory of 2272 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 87 PID 1504 wrote to memory of 2272 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 87 PID 1504 wrote to memory of 3956 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 88 PID 1504 wrote to memory of 3956 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 88 PID 1504 wrote to memory of 3940 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 89 PID 1504 wrote to memory of 3940 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 89 PID 1504 wrote to memory of 2844 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 90 PID 1504 wrote to memory of 2844 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 90 PID 1504 wrote to memory of 3404 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 91 PID 1504 wrote to memory of 3404 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 91 PID 1504 wrote to memory of 1780 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 92 PID 1504 wrote to memory of 1780 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 92 PID 1504 wrote to memory of 4456 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 93 PID 1504 wrote to memory of 4456 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 93 PID 1504 wrote to memory of 1396 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 94 PID 1504 wrote to memory of 1396 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 94 PID 1504 wrote to memory of 2708 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 95 PID 1504 wrote to memory of 2708 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 95 PID 1504 wrote to memory of 1876 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 96 PID 1504 wrote to memory of 1876 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 96 PID 1504 wrote to memory of 4948 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 97 PID 1504 wrote to memory of 4948 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 97 PID 1504 wrote to memory of 2412 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 98 PID 1504 wrote to memory of 2412 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 98 PID 1504 wrote to memory of 2460 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 99 PID 1504 wrote to memory of 2460 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 99 PID 1504 wrote to memory of 4608 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 100 PID 1504 wrote to memory of 4608 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 100 PID 1504 wrote to memory of 2512 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 101 PID 1504 wrote to memory of 2512 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 101 PID 1504 wrote to memory of 1016 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 102 PID 1504 wrote to memory of 1016 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 102 PID 1504 wrote to memory of 632 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 103 PID 1504 wrote to memory of 632 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 103 PID 1504 wrote to memory of 4464 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 104 PID 1504 wrote to memory of 4464 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 104 PID 1504 wrote to memory of 3764 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 105 PID 1504 wrote to memory of 3764 1504 475b7b0bd2bbbb6c3e767a0766aa6550N.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\475b7b0bd2bbbb6c3e767a0766aa6550N.exe"C:\Users\Admin\AppData\Local\Temp\475b7b0bd2bbbb6c3e767a0766aa6550N.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\System\vdNBPwI.exeC:\Windows\System\vdNBPwI.exe2⤵
- Executes dropped EXE
PID:840
-
-
C:\Windows\System\EPRFjIG.exeC:\Windows\System\EPRFjIG.exe2⤵
- Executes dropped EXE
PID:4748
-
-
C:\Windows\System\eGIOFjq.exeC:\Windows\System\eGIOFjq.exe2⤵
- Executes dropped EXE
PID:2272
-
-
C:\Windows\System\HPouVrT.exeC:\Windows\System\HPouVrT.exe2⤵
- Executes dropped EXE
PID:3956
-
-
C:\Windows\System\FJsaxbq.exeC:\Windows\System\FJsaxbq.exe2⤵
- Executes dropped EXE
PID:3940
-
-
C:\Windows\System\ovtqgDz.exeC:\Windows\System\ovtqgDz.exe2⤵
- Executes dropped EXE
PID:2844
-
-
C:\Windows\System\vETfoZy.exeC:\Windows\System\vETfoZy.exe2⤵
- Executes dropped EXE
PID:3404
-
-
C:\Windows\System\eMcwyiF.exeC:\Windows\System\eMcwyiF.exe2⤵
- Executes dropped EXE
PID:1780
-
-
C:\Windows\System\ODbnKOX.exeC:\Windows\System\ODbnKOX.exe2⤵
- Executes dropped EXE
PID:4456
-
-
C:\Windows\System\rgSTeOz.exeC:\Windows\System\rgSTeOz.exe2⤵
- Executes dropped EXE
PID:1396
-
-
C:\Windows\System\aSZGkSz.exeC:\Windows\System\aSZGkSz.exe2⤵
- Executes dropped EXE
PID:2708
-
-
C:\Windows\System\JKBMeyw.exeC:\Windows\System\JKBMeyw.exe2⤵
- Executes dropped EXE
PID:1876
-
-
C:\Windows\System\fBXkEdn.exeC:\Windows\System\fBXkEdn.exe2⤵
- Executes dropped EXE
PID:4948
-
-
C:\Windows\System\ZFLKtqc.exeC:\Windows\System\ZFLKtqc.exe2⤵
- Executes dropped EXE
PID:2412
-
-
C:\Windows\System\VmEfwvF.exeC:\Windows\System\VmEfwvF.exe2⤵
- Executes dropped EXE
PID:2460
-
-
C:\Windows\System\sKKHVDS.exeC:\Windows\System\sKKHVDS.exe2⤵
- Executes dropped EXE
PID:4608
-
-
C:\Windows\System\VWPiHdK.exeC:\Windows\System\VWPiHdK.exe2⤵
- Executes dropped EXE
PID:2512
-
-
C:\Windows\System\BPEeeAY.exeC:\Windows\System\BPEeeAY.exe2⤵
- Executes dropped EXE
PID:1016
-
-
C:\Windows\System\vwMyeTH.exeC:\Windows\System\vwMyeTH.exe2⤵
- Executes dropped EXE
PID:632
-
-
C:\Windows\System\OiEzapZ.exeC:\Windows\System\OiEzapZ.exe2⤵
- Executes dropped EXE
PID:4464
-
-
C:\Windows\System\zEvLjMu.exeC:\Windows\System\zEvLjMu.exe2⤵
- Executes dropped EXE
PID:3764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5b8f790fc443292904c8268d5f5640b84
SHA1279d6b4a73154d13d7dabe27ee4af5a0b50229c6
SHA2562c5c9de2063b546f806cedc241a1604642a023c948356d8ca1dcac856a2ee252
SHA5123ca487c92cd43c16a6e5a3f972a574cf41cfbac6fca14c27ee93647453d8442dcce2199facb4ba72b1868de973b69504b704d081aab4a9873a6884667d9ec976
-
Filesize
5.2MB
MD53203a7e252da4346b9fd76560bc9a952
SHA1f3a718b8d6ec697f604d65ddd441fe75b9854b27
SHA2566144b7737313e443794d9a42ba179b8ed3154725366229f74cd146f75269f6ba
SHA512f5eea6e2e212956bd20d5f7638eaf6d5021abc3c2807e3fd651d11fde6c60113f4155ef202d2d4c63c32e9dc78556defb9701997e5743073e080e248de6e7769
-
Filesize
5.2MB
MD5ef972e09d5d3288555ddb662602f9359
SHA1720d19f55ab848d8634f4c3168c3b20c10799791
SHA25644aac209fb786feddc285891f345bc5636d6de0cf7384368eaea9edec2a52309
SHA5129b0523ffb211a81f1b31e7e432df1157b4d7ef15fbeffb8c6c70a2f8fc6d4ae9eb35589a4ea800190ce140c337e979c749df9049106b4e5a15b9fc534b8f0936
-
Filesize
5.2MB
MD51d8b4f8fc6391dd43b4fcf8e4f4bf560
SHA117ea94dda0460fd5aa80b1d7cd48d6a2a1b0582a
SHA256cda5e99639c86b7ff735d3a43183890f5b53d79fbb1e80e4ee882930d056e1ab
SHA512871b7fff12acabcc5c31efa13d1d205db442c21a411fe7e8b8cab82abf56f0bf984ac31baaebd50e4917baaa40a7223580060b2590548f747c162cb7e9ab70f9
-
Filesize
5.2MB
MD5f2857e800ed2cbc79eae03c8af3662eb
SHA1ffc717ec627269b7d9accf0cf0b28b09f6a655ca
SHA256145b16d5d162caf34a241b9174f34a7368e99bb2e44f2ae82e318f31309a40fd
SHA512b3dae890206e08c68901ce261a70bcf83742a5a21b1c8f7842b0e3ec7a5edd30872de451b9a6df1d933306f5e62554573d6786c5a476c9176899666fac8da60d
-
Filesize
5.2MB
MD5bda3d8f919f184d588818680090b98c1
SHA1df10253eb7ce7ce9376f4beb0418d4ce922aa140
SHA25688b308daf29b555e728f589af199b97145a3cdebfd54a18645975a52ffba4c52
SHA51239466ab5b225afbc8ce7bb25cb3f162370c1c3c36599b14776b7b3fcd56dbdd02cf6a5752d6a6e1da5b58004920fea9d9090f82138078b5758cd616c8115d3af
-
Filesize
5.2MB
MD5058c660afaef04d2fbdb582f57128045
SHA1437347d359d330d7b02acaa4bd5ddfc5c8530ca6
SHA256f08e5559aa34f9d623d74b9c721099ab944f85987745a68d48cbc72f48859089
SHA512e43c65d5f934083a3967f72fd523be6757deb0cedfaf0b7d2169abbc97fd4d9576cf1f1d8b682fe67db07ba69d2e211c255033e83002e447ed55dd6a969f4f85
-
Filesize
5.2MB
MD55d09294873b64ec96823310bbd7f4b90
SHA17c289f0c6dccc8be196481ef73bc59c50cf4c577
SHA25689fae4221ea1998593ffa719d505f1eef5b61ece9ee4c9622532052315c89e31
SHA5127088f05e2bd452e323696ac3e691a952ea1f2c844be10e0e16370c7327a91ed3ce5aa67c5806b3d7dff90570115a25f18afee20cfcbbff0329eac88a57d8e708
-
Filesize
5.2MB
MD524c288f1cd5e3c5c3e9d6cbb6e1dd645
SHA1ec9f972f908be6f73d2985d569364ddbee181685
SHA256bc812ad8cc36afb87fc44d494c36fd2eb640a5b2e1b62c6aaf65c970ea8e5591
SHA512f72540705beded00bf906ca2250fe3bb213ba2d90a5eb0ec9bc99963363526ac9dbc72885aa361ad51afbd9da546d41a6516b2b944eb896b8c90e2785bc1ee65
-
Filesize
5.2MB
MD5b5b19593b756d2930831592d8a541ff0
SHA12143f78a829e02029f3a715fc548de161268ba8d
SHA25666f45acea19868e134ba0da925ebf7b4d87ffb5ea61a8bf8d90dcb4fb6743297
SHA512e816ad7c4083cb0c7b43814e6ffbad4dcaf0e5ecd9923ae860415e17da7e065674235f9fb079b6e628332da194642b333916e3e66dfca6c71cae3daaf6831f01
-
Filesize
5.2MB
MD57e2ca8e6b2ad124e06664c80913e83c7
SHA10daed785c1ee373f65c8e87eea56f7e2c0975081
SHA256c88ad5fe1d17ed2605513d5f50cfd0bf7b92ee4f04bbb7baa06dc895337c5186
SHA512eeb91fa5ca167a448b3f0b1c1bf2e580ad280edee1b2d79fa5f94ac0cfec0e3ee73dff5a855281a23c8c62735cbb818bde35275ffce17d8fb9d5f5f813c4ac4d
-
Filesize
5.2MB
MD5efdd507fc813310db0ddaf8424adeb6a
SHA191a6d3eda0d44e9a057be5228101e3c46eccf9f9
SHA2566850f50c353681596fd256effe366ec9b1d5bdca85cbdd9d6c7285a9aedfd578
SHA512c872abca400b0dac1f6e88af198b9e9764e8f23e3548052ac51d7a3c57edb0b81640839aafbdc0417f1f97877daab82b111fa5fa94a229394e03a2ab305c381f
-
Filesize
5.2MB
MD5a63e2832250ff5b576b9943e5c31f562
SHA1edd04cdaefdc871ddf395472626626f1794f437f
SHA2567655d11fbd3ed56197ecb0f3a00f7a4227196e372d4adee6ab90973138880c3c
SHA51229a76f004a4221e4d055dff3fe3926ce54511935b4bdb9affa654f4140f3bb3193cf112cbed966159032e0f085d8871c3fd0103a504e8e17045184e8ee4d90ac
-
Filesize
5.2MB
MD5af3f9045ad10f3977bb8ed594feec0f4
SHA1d3577fc54fbe6ffc6b981e1e13c304d39418f105
SHA256ae0100d040071e2aaebf5eb492bff2ce6794aea53feabac203ebcf4dbc583a03
SHA512ec3a6f37deb9aac614fd6a545ab3e27b4be96a6df1c42c63f7e6091c9e6a5ab39e1d726608f64ac1e19a3c7378e43ae139ae597a9affe45f935f895cf185ab35
-
Filesize
5.2MB
MD5058b7cf436eb04836d02182e69058d78
SHA165fe3201b2978e15a4b486b4e2ad626ad56c9c0f
SHA2567174894ad26df25e08752b9e65be37a25819e6042118cfc23a67d5ed53f4124a
SHA5124f5515b548b79ae79f8cd06256cd41bb1c902866b8c93ddc4f37b0a7b3b92e47579f5bc377fce26d6d0b60e64dd8699acd4d0681290b1ad234c4ff91d2addd32
-
Filesize
5.2MB
MD5f44cd041b169652ac3e89360a359791c
SHA16aea33841aabe91c894af3029af65e206e89fcff
SHA256e8b637f3e15e1d625de4dbd3d12d0dc54ef79d5b6a14446faaa9565a9e8af252
SHA512f35e14dc98fb352b5e5331ccf7b1c4b30ca1465d8fbcca540e3c95d56eea8b6340fb15c2326ddbf8e7e0feffeb5c48149c1ec8dfe8e7aeeac9c147583af65e0c
-
Filesize
5.2MB
MD5c005c1a11c78fcf003e5d38c80a1fb9e
SHA1abffbe2aa8a65729f09780ae9dd36cd7fa0df679
SHA256baaf60340236421ded24aa78aad852e0d53fc5bd546632b3bab9f915dafa8972
SHA512f9fe4b9e5cf8824e305f385e167b51a59b35586b415fb4f49f244bd7deb5f1f3608250be55c69d0d6919e6cda7ecd0cb158a35324135762397e003087313b69f
-
Filesize
5.2MB
MD5119ea093423b3fe2b5e9904e3cea100d
SHA1ec8f53b76f04c38c820a9caf6aa0b530095d2436
SHA256a8ad4fa136350effe39cd2ed7850313942f2c8c27dee0c378d6e0959b2ea3452
SHA5128f8800d2f4f2829ebf8453182d1383110a5be2288e11eb26b7a2a3aaaf2c0f626003d4083069ef7c6127d4b97cb3ec515f317b5790648c24f69c3adc6c5b91d0
-
Filesize
5.2MB
MD57e55e5fdc69dc1c7213dcff320342cd9
SHA1673e5edc2cdb41e23b95e0958a92c47fe51695f7
SHA2569771b1811cbc189416827cd2e04afa5e58348e8c75f21d33d537e20a64aedd3b
SHA5121422b498689aef4afd18cdc73356823f81b77e625bae724816d780ca174947da51b0a559b237d2718d2a9ddd9160f6a3a87910c08bf69e372175d9771d60fffd
-
Filesize
5.2MB
MD5cba31e2b3d8e3c85a4e8d5660dd9b3ba
SHA107b251f01a2726f0e989715f94604b1a1138c79d
SHA256e5227d59d56d66ef975275a824ead0fde75430c41c6ee45cd1653b2cce448930
SHA5122771bffea9519b1008e0668c0b2b757bd8049751f3f7912a2ce581eb84a0cb0589426b83f36c5d9dbf052ed25a37076e0468f4afe81b3e045b29a0041a736138
-
Filesize
5.2MB
MD562c2752b26322a140a81ac8fd6d261cd
SHA10f3ea955b543869fb98b87eab687ae37f189f524
SHA25640d87adb3cecb0ba9f79b0a5a8a5d03886ed263dd0ee4c3d1dde81fe43021540
SHA512899a713e86f4337785c9010a054041e68afdbb5426844a3bebadbbb1fba9d5a435fe47cf906f9bc55c16decb1574ff0ffcdc43b5ee9020b4370ff910e4a35db1