Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
4bda91866fdc865f55bc666720670a10N.exe
Resource
win7-20240708-en
General
-
Target
4bda91866fdc865f55bc666720670a10N.exe
-
Size
5.4MB
-
MD5
4bda91866fdc865f55bc666720670a10
-
SHA1
fcf9bb62c36d50d7236dd60f64e35ca06000b34e
-
SHA256
e0f1adecf43850d7ab7bfadd32df4fdfd23d60e23918b2062eec81cd17ff5be7
-
SHA512
0887c4a1b5e52274a2eb3a267871f513dfcb15df3a68747aab1e199d76a1a2f99896a255ed9fd94b17d1c96bbbd4668a676d2681267b63bcfeb7bce1f4cd7e4c
-
SSDEEP
98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj
Malware Config
Signatures
-
XMRig Miner payload 11 IoCs
resource yara_rule behavioral2/memory/1300-61-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1300-62-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1300-65-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1300-67-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1300-66-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1300-64-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1300-68-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1300-69-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1300-71-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1300-73-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1300-72-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5068 powershell.exe 1240 powershell.exe -
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2448 fqwofdtexigy.exe -
resource yara_rule behavioral2/memory/1300-56-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-58-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-59-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-57-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-60-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-61-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-62-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-65-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-67-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-66-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-64-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-68-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-69-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-71-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-73-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1300-72-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5052 powercfg.exe 2616 powercfg.exe 404 powercfg.exe 3296 powercfg.exe 1204 powercfg.exe 4388 powercfg.exe 748 powercfg.exe 4452 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe fqwofdtexigy.exe File opened for modification C:\Windows\system32\MRT.exe 4bda91866fdc865f55bc666720670a10N.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2448 set thread context of 5060 2448 fqwofdtexigy.exe 149 PID 2448 set thread context of 1300 2448 fqwofdtexigy.exe 154 -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3344 sc.exe 1700 sc.exe 3416 sc.exe 1848 sc.exe 4132 sc.exe 1084 sc.exe 4420 sc.exe 4892 sc.exe 3328 sc.exe 4600 sc.exe 5028 sc.exe 2336 sc.exe 3612 sc.exe 4320 sc.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 348 4bda91866fdc865f55bc666720670a10N.exe 1240 powershell.exe 1240 powershell.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 348 4bda91866fdc865f55bc666720670a10N.exe 2448 fqwofdtexigy.exe 5068 powershell.exe 5068 powershell.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 2448 fqwofdtexigy.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe 1300 nslookup.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1240 powershell.exe Token: SeShutdownPrivilege 3296 powercfg.exe Token: SeCreatePagefilePrivilege 3296 powercfg.exe Token: SeShutdownPrivilege 748 powercfg.exe Token: SeCreatePagefilePrivilege 748 powercfg.exe Token: SeShutdownPrivilege 1204 powercfg.exe Token: SeCreatePagefilePrivilege 1204 powercfg.exe Token: SeShutdownPrivilege 4388 powercfg.exe Token: SeCreatePagefilePrivilege 4388 powercfg.exe Token: SeDebugPrivilege 5068 powershell.exe Token: SeShutdownPrivilege 4452 powercfg.exe Token: SeCreatePagefilePrivilege 4452 powercfg.exe Token: SeShutdownPrivilege 2616 powercfg.exe Token: SeCreatePagefilePrivilege 2616 powercfg.exe Token: SeShutdownPrivilege 404 powercfg.exe Token: SeCreatePagefilePrivilege 404 powercfg.exe Token: SeShutdownPrivilege 5052 powercfg.exe Token: SeCreatePagefilePrivilege 5052 powercfg.exe Token: SeLockMemoryPrivilege 1300 nslookup.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4824 wrote to memory of 1424 4824 cmd.exe 101 PID 4824 wrote to memory of 1424 4824 cmd.exe 101 PID 3028 wrote to memory of 2368 3028 cmd.exe 128 PID 3028 wrote to memory of 2368 3028 cmd.exe 128 PID 456 wrote to memory of 3760 456 cmd.exe 138 PID 456 wrote to memory of 3760 456 cmd.exe 138 PID 2448 wrote to memory of 5060 2448 fqwofdtexigy.exe 149 PID 2448 wrote to memory of 5060 2448 fqwofdtexigy.exe 149 PID 2448 wrote to memory of 5060 2448 fqwofdtexigy.exe 149 PID 2448 wrote to memory of 5060 2448 fqwofdtexigy.exe 149 PID 2448 wrote to memory of 5060 2448 fqwofdtexigy.exe 149 PID 2448 wrote to memory of 5060 2448 fqwofdtexigy.exe 149 PID 2448 wrote to memory of 5060 2448 fqwofdtexigy.exe 149 PID 2448 wrote to memory of 5060 2448 fqwofdtexigy.exe 149 PID 2448 wrote to memory of 5060 2448 fqwofdtexigy.exe 149 PID 2448 wrote to memory of 1300 2448 fqwofdtexigy.exe 154 PID 2448 wrote to memory of 1300 2448 fqwofdtexigy.exe 154 PID 2448 wrote to memory of 1300 2448 fqwofdtexigy.exe 154 PID 2448 wrote to memory of 1300 2448 fqwofdtexigy.exe 154 PID 2448 wrote to memory of 1300 2448 fqwofdtexigy.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bda91866fdc865f55bc666720670a10N.exe"C:\Users\Admin\AppData\Local\Temp\4bda91866fdc865f55bc666720670a10N.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:348 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1424
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4420
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5028
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:4892
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:3612
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:3344
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "JVNIRHNX"2⤵
- Launches sc.exe
PID:2336
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "JVNIRHNX" binpath= "C:\ProgramData\xhzmmmxzrrwn\fqwofdtexigy.exe" start= "auto"2⤵
- Launches sc.exe
PID:1700
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:4320
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "JVNIRHNX"2⤵
- Launches sc.exe
PID:3328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\4bda91866fdc865f55bc666720670a10N.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:2368
-
-
-
C:\ProgramData\xhzmmmxzrrwn\fqwofdtexigy.exeC:\ProgramData\xhzmmmxzrrwn\fqwofdtexigy.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:3760
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:3416
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4600
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:4132
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:1848
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:1084
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5060
-
-
C:\Windows\system32\nslookup.exenslookup.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD54bda91866fdc865f55bc666720670a10
SHA1fcf9bb62c36d50d7236dd60f64e35ca06000b34e
SHA256e0f1adecf43850d7ab7bfadd32df4fdfd23d60e23918b2062eec81cd17ff5be7
SHA5120887c4a1b5e52274a2eb3a267871f513dfcb15df3a68747aab1e199d76a1a2f99896a255ed9fd94b17d1c96bbbd4668a676d2681267b63bcfeb7bce1f4cd7e4c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82