Analysis
-
max time kernel
111s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 17:26
Behavioral task
behavioral1
Sample
a8906e6b789ed395a4bde3f0d7e06590N.exe
Resource
win7-20240704-en
General
-
Target
a8906e6b789ed395a4bde3f0d7e06590N.exe
-
Size
5.2MB
-
MD5
a8906e6b789ed395a4bde3f0d7e06590
-
SHA1
f0825df64b10e57a0d438deb170b186061d07e62
-
SHA256
dc4378994fa084346aed82ad5f75ae2ee8e1131d67daf86bf3b83d35a0c3b063
-
SHA512
81b77f7227b84aaca6084f2467500ee6821184fcaefa4659324d58905172339ac3832a263f788a3282b267ca1801dd7d6cc59f54e85993b1a1912df58d73c539
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lb:RWWBibf56utgpPFotBER/mQ32lUX
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x000c000000014132-6.dat cobalt_reflective_dll behavioral1/files/0x0008000000018b4d-12.dat cobalt_reflective_dll behavioral1/files/0x0006000000018b54-13.dat cobalt_reflective_dll behavioral1/files/0x0006000000018b62-27.dat cobalt_reflective_dll behavioral1/files/0x00300000000186bb-39.dat cobalt_reflective_dll behavioral1/files/0x0008000000018bac-55.dat cobalt_reflective_dll behavioral1/files/0x0006000000018f82-64.dat cobalt_reflective_dll behavioral1/files/0x00040000000194ec-131.dat cobalt_reflective_dll behavioral1/files/0x0005000000019571-135.dat cobalt_reflective_dll behavioral1/files/0x0004000000019485-126.dat cobalt_reflective_dll behavioral1/files/0x0004000000019461-121.dat cobalt_reflective_dll behavioral1/files/0x00040000000192a8-110.dat cobalt_reflective_dll behavioral1/files/0x0004000000019380-103.dat cobalt_reflective_dll behavioral1/files/0x0004000000019438-115.dat cobalt_reflective_dll behavioral1/files/0x0005000000019078-85.dat cobalt_reflective_dll behavioral1/files/0x00040000000192ad-101.dat cobalt_reflective_dll behavioral1/files/0x0004000000019206-91.dat cobalt_reflective_dll behavioral1/files/0x0005000000018fe4-71.dat cobalt_reflective_dll behavioral1/files/0x0007000000018bbf-62.dat cobalt_reflective_dll behavioral1/files/0x0006000000018b89-48.dat cobalt_reflective_dll behavioral1/files/0x0006000000018b6e-34.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 40 IoCs
resource yara_rule behavioral1/memory/2884-21-0x000000013F570000-0x000000013F8C1000-memory.dmp xmrig behavioral1/memory/2776-23-0x000000013F4B0000-0x000000013F801000-memory.dmp xmrig behavioral1/memory/2320-83-0x000000013F060000-0x000000013F3B1000-memory.dmp xmrig behavioral1/memory/2136-88-0x000000013F3F0000-0x000000013F741000-memory.dmp xmrig behavioral1/memory/2240-140-0x000000013FAE0000-0x000000013FE31000-memory.dmp xmrig behavioral1/memory/2388-141-0x000000013F060000-0x000000013F3B1000-memory.dmp xmrig behavioral1/memory/2664-87-0x000000013FF80000-0x00000001402D1000-memory.dmp xmrig behavioral1/memory/2796-82-0x000000013F1C0000-0x000000013F511000-memory.dmp xmrig behavioral1/memory/2388-158-0x000000013FCF0000-0x0000000140041000-memory.dmp xmrig behavioral1/memory/2976-157-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig behavioral1/memory/2904-156-0x000000013F830000-0x000000013FB81000-memory.dmp xmrig behavioral1/memory/3012-155-0x000000013FCF0000-0x0000000140041000-memory.dmp xmrig behavioral1/memory/1664-99-0x000000013FB40000-0x000000013FE91000-memory.dmp xmrig behavioral1/memory/2152-163-0x000000013FF20000-0x0000000140271000-memory.dmp xmrig behavioral1/memory/2468-162-0x000000013F2E0000-0x000000013F631000-memory.dmp xmrig behavioral1/memory/1084-161-0x000000013F860000-0x000000013FBB1000-memory.dmp xmrig behavioral1/memory/3016-160-0x000000013F8E0000-0x000000013FC31000-memory.dmp xmrig behavioral1/memory/2956-159-0x000000013F650000-0x000000013F9A1000-memory.dmp xmrig behavioral1/memory/2636-58-0x000000013F860000-0x000000013FBB1000-memory.dmp xmrig behavioral1/memory/2388-57-0x000000013F860000-0x000000013FBB1000-memory.dmp xmrig behavioral1/memory/2388-73-0x0000000002230000-0x0000000002581000-memory.dmp xmrig behavioral1/memory/2708-72-0x000000013F060000-0x000000013F3B1000-memory.dmp xmrig behavioral1/memory/2388-51-0x000000013F060000-0x000000013F3B1000-memory.dmp xmrig behavioral1/memory/2772-50-0x000000013F830000-0x000000013FB81000-memory.dmp xmrig behavioral1/memory/2760-30-0x000000013FCC0000-0x0000000140011000-memory.dmp xmrig behavioral1/memory/1632-22-0x000000013FB80000-0x000000013FED1000-memory.dmp xmrig behavioral1/memory/1632-217-0x000000013FB80000-0x000000013FED1000-memory.dmp xmrig behavioral1/memory/2776-221-0x000000013F4B0000-0x000000013F801000-memory.dmp xmrig behavioral1/memory/2884-220-0x000000013F570000-0x000000013F8C1000-memory.dmp xmrig behavioral1/memory/2760-223-0x000000013FCC0000-0x0000000140011000-memory.dmp xmrig behavioral1/memory/2796-234-0x000000013F1C0000-0x000000013F511000-memory.dmp xmrig behavioral1/memory/2664-233-0x000000013FF80000-0x00000001402D1000-memory.dmp xmrig behavioral1/memory/2772-231-0x000000013F830000-0x000000013FB81000-memory.dmp xmrig behavioral1/memory/2636-236-0x000000013F860000-0x000000013FBB1000-memory.dmp xmrig behavioral1/memory/2708-238-0x000000013F060000-0x000000013F3B1000-memory.dmp xmrig behavioral1/memory/2240-240-0x000000013FAE0000-0x000000013FE31000-memory.dmp xmrig behavioral1/memory/2320-244-0x000000013F060000-0x000000013F3B1000-memory.dmp xmrig behavioral1/memory/2136-243-0x000000013F3F0000-0x000000013F741000-memory.dmp xmrig behavioral1/memory/1664-252-0x000000013FB40000-0x000000013FE91000-memory.dmp xmrig behavioral1/memory/2904-254-0x000000013F830000-0x000000013FB81000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 1632 OaalqIM.exe 2776 cpfCDsU.exe 2884 qHiavdZ.exe 2760 gcwPYgo.exe 2796 uogKeAF.exe 2664 iQeTtkq.exe 2772 mZVRSqn.exe 2636 ucySHmt.exe 2708 uJeOtrQ.exe 2240 wUKOxao.exe 2320 QvsyxXv.exe 2136 RIpFrQl.exe 1664 DNGBLFi.exe 2904 vTqTBBd.exe 3012 iWBfJlI.exe 2956 pbCMKqO.exe 2976 RUekDMq.exe 3016 dxPWDen.exe 1084 UYDtZYA.exe 2468 zITIQyv.exe 2152 oIQdClQ.exe -
Loads dropped DLL 21 IoCs
pid Process 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe -
resource yara_rule behavioral1/memory/2388-0-0x000000013F060000-0x000000013F3B1000-memory.dmp upx behavioral1/files/0x000c000000014132-6.dat upx behavioral1/files/0x0008000000018b4d-12.dat upx behavioral1/files/0x0006000000018b54-13.dat upx behavioral1/memory/2884-21-0x000000013F570000-0x000000013F8C1000-memory.dmp upx behavioral1/memory/2776-23-0x000000013F4B0000-0x000000013F801000-memory.dmp upx behavioral1/files/0x0006000000018b62-27.dat upx behavioral1/files/0x00300000000186bb-39.dat upx behavioral1/files/0x0008000000018bac-55.dat upx behavioral1/files/0x0006000000018f82-64.dat upx behavioral1/memory/2320-83-0x000000013F060000-0x000000013F3B1000-memory.dmp upx behavioral1/memory/2136-88-0x000000013F3F0000-0x000000013F741000-memory.dmp upx behavioral1/files/0x00040000000194ec-131.dat upx behavioral1/files/0x0005000000019571-135.dat upx behavioral1/files/0x0004000000019485-126.dat upx behavioral1/files/0x0004000000019461-121.dat upx behavioral1/files/0x00040000000192a8-110.dat upx behavioral1/memory/2904-108-0x000000013F830000-0x000000013FB81000-memory.dmp upx behavioral1/memory/2240-140-0x000000013FAE0000-0x000000013FE31000-memory.dmp upx behavioral1/files/0x0004000000019380-103.dat upx behavioral1/files/0x0004000000019438-115.dat upx behavioral1/memory/2388-141-0x000000013F060000-0x000000013F3B1000-memory.dmp upx behavioral1/memory/2664-87-0x000000013FF80000-0x00000001402D1000-memory.dmp upx behavioral1/files/0x0005000000019078-85.dat upx behavioral1/memory/2796-82-0x000000013F1C0000-0x000000013F511000-memory.dmp upx behavioral1/files/0x00040000000192ad-101.dat upx behavioral1/memory/2976-157-0x000000013FC10000-0x000000013FF61000-memory.dmp upx behavioral1/memory/2904-156-0x000000013F830000-0x000000013FB81000-memory.dmp upx behavioral1/memory/3012-155-0x000000013FCF0000-0x0000000140041000-memory.dmp upx behavioral1/memory/1664-99-0x000000013FB40000-0x000000013FE91000-memory.dmp upx behavioral1/memory/2152-163-0x000000013FF20000-0x0000000140271000-memory.dmp upx behavioral1/memory/2468-162-0x000000013F2E0000-0x000000013F631000-memory.dmp upx behavioral1/memory/1084-161-0x000000013F860000-0x000000013FBB1000-memory.dmp upx behavioral1/memory/3016-160-0x000000013F8E0000-0x000000013FC31000-memory.dmp upx behavioral1/memory/2956-159-0x000000013F650000-0x000000013F9A1000-memory.dmp upx behavioral1/files/0x0004000000019206-91.dat upx behavioral1/memory/2240-75-0x000000013FAE0000-0x000000013FE31000-memory.dmp upx behavioral1/memory/2636-58-0x000000013F860000-0x000000013FBB1000-memory.dmp upx behavioral1/memory/2708-72-0x000000013F060000-0x000000013F3B1000-memory.dmp upx behavioral1/files/0x0005000000018fe4-71.dat upx behavioral1/files/0x0007000000018bbf-62.dat upx behavioral1/memory/2664-41-0x000000013FF80000-0x00000001402D1000-memory.dmp upx behavioral1/memory/2388-51-0x000000013F060000-0x000000013F3B1000-memory.dmp upx behavioral1/memory/2772-50-0x000000013F830000-0x000000013FB81000-memory.dmp upx behavioral1/files/0x0006000000018b89-48.dat upx behavioral1/memory/2796-36-0x000000013F1C0000-0x000000013F511000-memory.dmp upx behavioral1/memory/2760-30-0x000000013FCC0000-0x0000000140011000-memory.dmp upx behavioral1/files/0x0006000000018b6e-34.dat upx behavioral1/memory/1632-22-0x000000013FB80000-0x000000013FED1000-memory.dmp upx behavioral1/memory/1632-217-0x000000013FB80000-0x000000013FED1000-memory.dmp upx behavioral1/memory/2776-221-0x000000013F4B0000-0x000000013F801000-memory.dmp upx behavioral1/memory/2884-220-0x000000013F570000-0x000000013F8C1000-memory.dmp upx behavioral1/memory/2760-223-0x000000013FCC0000-0x0000000140011000-memory.dmp upx behavioral1/memory/2796-234-0x000000013F1C0000-0x000000013F511000-memory.dmp upx behavioral1/memory/2664-233-0x000000013FF80000-0x00000001402D1000-memory.dmp upx behavioral1/memory/2772-231-0x000000013F830000-0x000000013FB81000-memory.dmp upx behavioral1/memory/2636-236-0x000000013F860000-0x000000013FBB1000-memory.dmp upx behavioral1/memory/2708-238-0x000000013F060000-0x000000013F3B1000-memory.dmp upx behavioral1/memory/2240-240-0x000000013FAE0000-0x000000013FE31000-memory.dmp upx behavioral1/memory/2320-244-0x000000013F060000-0x000000013F3B1000-memory.dmp upx behavioral1/memory/2136-243-0x000000013F3F0000-0x000000013F741000-memory.dmp upx behavioral1/memory/1664-252-0x000000013FB40000-0x000000013FE91000-memory.dmp upx behavioral1/memory/2904-254-0x000000013F830000-0x000000013FB81000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\ucySHmt.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\RUekDMq.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\pbCMKqO.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\UYDtZYA.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\dxPWDen.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\zITIQyv.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\qHiavdZ.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\iQeTtkq.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\mZVRSqn.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\uJeOtrQ.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\QvsyxXv.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\vTqTBBd.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\oIQdClQ.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\cpfCDsU.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\iWBfJlI.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\OaalqIM.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\gcwPYgo.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\uogKeAF.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\wUKOxao.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\RIpFrQl.exe a8906e6b789ed395a4bde3f0d7e06590N.exe File created C:\Windows\System\DNGBLFi.exe a8906e6b789ed395a4bde3f0d7e06590N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe Token: SeLockMemoryPrivilege 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1632 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 30 PID 2388 wrote to memory of 1632 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 30 PID 2388 wrote to memory of 1632 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 30 PID 2388 wrote to memory of 2776 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 31 PID 2388 wrote to memory of 2776 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 31 PID 2388 wrote to memory of 2776 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 31 PID 2388 wrote to memory of 2884 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 32 PID 2388 wrote to memory of 2884 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 32 PID 2388 wrote to memory of 2884 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 32 PID 2388 wrote to memory of 2760 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 33 PID 2388 wrote to memory of 2760 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 33 PID 2388 wrote to memory of 2760 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 33 PID 2388 wrote to memory of 2796 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 34 PID 2388 wrote to memory of 2796 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 34 PID 2388 wrote to memory of 2796 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 34 PID 2388 wrote to memory of 2664 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 35 PID 2388 wrote to memory of 2664 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 35 PID 2388 wrote to memory of 2664 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 35 PID 2388 wrote to memory of 2772 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 36 PID 2388 wrote to memory of 2772 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 36 PID 2388 wrote to memory of 2772 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 36 PID 2388 wrote to memory of 2636 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 37 PID 2388 wrote to memory of 2636 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 37 PID 2388 wrote to memory of 2636 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 37 PID 2388 wrote to memory of 2708 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 38 PID 2388 wrote to memory of 2708 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 38 PID 2388 wrote to memory of 2708 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 38 PID 2388 wrote to memory of 2320 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 39 PID 2388 wrote to memory of 2320 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 39 PID 2388 wrote to memory of 2320 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 39 PID 2388 wrote to memory of 2240 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 40 PID 2388 wrote to memory of 2240 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 40 PID 2388 wrote to memory of 2240 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 40 PID 2388 wrote to memory of 2136 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 41 PID 2388 wrote to memory of 2136 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 41 PID 2388 wrote to memory of 2136 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 41 PID 2388 wrote to memory of 1664 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 42 PID 2388 wrote to memory of 1664 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 42 PID 2388 wrote to memory of 1664 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 42 PID 2388 wrote to memory of 3012 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 43 PID 2388 wrote to memory of 3012 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 43 PID 2388 wrote to memory of 3012 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 43 PID 2388 wrote to memory of 2904 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 44 PID 2388 wrote to memory of 2904 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 44 PID 2388 wrote to memory of 2904 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 44 PID 2388 wrote to memory of 2976 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 45 PID 2388 wrote to memory of 2976 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 45 PID 2388 wrote to memory of 2976 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 45 PID 2388 wrote to memory of 2956 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 46 PID 2388 wrote to memory of 2956 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 46 PID 2388 wrote to memory of 2956 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 46 PID 2388 wrote to memory of 3016 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 47 PID 2388 wrote to memory of 3016 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 47 PID 2388 wrote to memory of 3016 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 47 PID 2388 wrote to memory of 1084 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 48 PID 2388 wrote to memory of 1084 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 48 PID 2388 wrote to memory of 1084 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 48 PID 2388 wrote to memory of 2468 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 49 PID 2388 wrote to memory of 2468 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 49 PID 2388 wrote to memory of 2468 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 49 PID 2388 wrote to memory of 2152 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 50 PID 2388 wrote to memory of 2152 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 50 PID 2388 wrote to memory of 2152 2388 a8906e6b789ed395a4bde3f0d7e06590N.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8906e6b789ed395a4bde3f0d7e06590N.exe"C:\Users\Admin\AppData\Local\Temp\a8906e6b789ed395a4bde3f0d7e06590N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\System\OaalqIM.exeC:\Windows\System\OaalqIM.exe2⤵
- Executes dropped EXE
PID:1632
-
-
C:\Windows\System\cpfCDsU.exeC:\Windows\System\cpfCDsU.exe2⤵
- Executes dropped EXE
PID:2776
-
-
C:\Windows\System\qHiavdZ.exeC:\Windows\System\qHiavdZ.exe2⤵
- Executes dropped EXE
PID:2884
-
-
C:\Windows\System\gcwPYgo.exeC:\Windows\System\gcwPYgo.exe2⤵
- Executes dropped EXE
PID:2760
-
-
C:\Windows\System\uogKeAF.exeC:\Windows\System\uogKeAF.exe2⤵
- Executes dropped EXE
PID:2796
-
-
C:\Windows\System\iQeTtkq.exeC:\Windows\System\iQeTtkq.exe2⤵
- Executes dropped EXE
PID:2664
-
-
C:\Windows\System\mZVRSqn.exeC:\Windows\System\mZVRSqn.exe2⤵
- Executes dropped EXE
PID:2772
-
-
C:\Windows\System\ucySHmt.exeC:\Windows\System\ucySHmt.exe2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Windows\System\uJeOtrQ.exeC:\Windows\System\uJeOtrQ.exe2⤵
- Executes dropped EXE
PID:2708
-
-
C:\Windows\System\QvsyxXv.exeC:\Windows\System\QvsyxXv.exe2⤵
- Executes dropped EXE
PID:2320
-
-
C:\Windows\System\wUKOxao.exeC:\Windows\System\wUKOxao.exe2⤵
- Executes dropped EXE
PID:2240
-
-
C:\Windows\System\RIpFrQl.exeC:\Windows\System\RIpFrQl.exe2⤵
- Executes dropped EXE
PID:2136
-
-
C:\Windows\System\DNGBLFi.exeC:\Windows\System\DNGBLFi.exe2⤵
- Executes dropped EXE
PID:1664
-
-
C:\Windows\System\iWBfJlI.exeC:\Windows\System\iWBfJlI.exe2⤵
- Executes dropped EXE
PID:3012
-
-
C:\Windows\System\vTqTBBd.exeC:\Windows\System\vTqTBBd.exe2⤵
- Executes dropped EXE
PID:2904
-
-
C:\Windows\System\RUekDMq.exeC:\Windows\System\RUekDMq.exe2⤵
- Executes dropped EXE
PID:2976
-
-
C:\Windows\System\pbCMKqO.exeC:\Windows\System\pbCMKqO.exe2⤵
- Executes dropped EXE
PID:2956
-
-
C:\Windows\System\dxPWDen.exeC:\Windows\System\dxPWDen.exe2⤵
- Executes dropped EXE
PID:3016
-
-
C:\Windows\System\UYDtZYA.exeC:\Windows\System\UYDtZYA.exe2⤵
- Executes dropped EXE
PID:1084
-
-
C:\Windows\System\zITIQyv.exeC:\Windows\System\zITIQyv.exe2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Windows\System\oIQdClQ.exeC:\Windows\System\oIQdClQ.exe2⤵
- Executes dropped EXE
PID:2152
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD553ffdf197688196f7a6b59d12b60f20b
SHA167642e27e4f82571fa7c9fe68afe6c68b13772fd
SHA25680be7c3d98cfcec4f2881ee302387913d80e235367a791cea997d731162eaff1
SHA5126fa5d7083a5594d9456e4fc82164710105b366149a2fe99b0b30aa5a0feb58757c949ca4a0e1281ce4002b95b623cfc1521322879116280c6780c70e5216c0f5
-
Filesize
5.2MB
MD5e1041d95265bf07ea547e3d94deddb92
SHA1cda741ee993db03794aaee209494c2d6ffa49990
SHA256538ad253dccca42c32f24b922f0e8fd0d02741320995889d294e7f7553bd0497
SHA51243a42bb6d6c874db228243429d46db9031f5db2ef942ae5c40239414f392cb0b2d565901c97c4c5efb6cd1648480b2fdb8d68dac8bc4168e07817fea25b145a3
-
Filesize
5.2MB
MD5b3bb55d8acf35a6462744a90df4eb9e7
SHA1b0342b814f9dbdee09346a9afdf05f0e0b59cec5
SHA256067794fb2f78f556c4a2b41a3e2347935a58ff6ac2a79353ec2eaac08d7a391c
SHA512dcb3feade5e6f9eb4b6893e29d38309c18b826926a004bdddc9c871a023f54ad2d6c1e3c6ad461bde68e6133912ecd4e9596c736fd73b52dc2b35affe2742356
-
Filesize
5.2MB
MD57e3a88a2a8dfc08197a7cfbfd2109a4a
SHA165d2cfffc562e2bff7cfeca44b24523911f82f92
SHA25676701ab8f082143721bc40be19f27b4216a1b2d2f234c82b794100de9d4c162b
SHA5129e8fe495b23c4f71b55dd789d6cc502d245fd9682c0ebced645f841d42bffe935f2862fd690c3de6ec16fdd918632b0ef66b80b190a49cd17487a681ccb37e5e
-
Filesize
5.2MB
MD52bbdf5f5d19e0e434bd97824838f9db4
SHA1a98e656a0efcd05d4c0b3ee796e0ed9a9850ddbe
SHA256972d4e462ed1ac6dbc06c038a69419373df3bf476bd14f04b966786dc57791b6
SHA5125bab4808a3e9e3eb5a7afe5c03f6b62e0f16a025a640939d25a44eac4b2f04b59ca1f12632b34d9dd8b21e2e74f2a929b7aa53709f8980a0a6057317fed40524
-
Filesize
5.2MB
MD51991ddc0287d95f1b4e063d7dfa11cf3
SHA1346d7d7e1cf4436cca95c8c325edac04823c6cd0
SHA2566c908d339e64860355aade2e28fe940986e07a6bd72bf8c5f9726fd7a8e8f417
SHA512c60da8d6f97b33e5ff5717d78ecca6c92907557e4b96a195a3aeab03a642ca9864842c13cd45a2c6f5aa9579601fb8a6d1911a80b2c834ca996d00bcb33461b8
-
Filesize
5.2MB
MD5374f3f61d8ef9e7ed9eb34664c3fac1b
SHA162c1cbcb1c06bac04850f1ca76e0a781528a25d9
SHA256b3e469f69eaa7f7c84ef2e7f4478fe1568324a081c821c8172b4b22df2b20d53
SHA5128bf0c2509717b71dcc9d9fff489bb7c2fffac018a7913c03a9dd65d74eba20eea65c6d54098e665a3d555d0e9c1a4d69e44fbb2d7127c633351f8655ed844199
-
Filesize
5.2MB
MD5480208b21c2d8b01e18aff2c10bcf3d7
SHA1993f863d7be4de7866d3280d9ffa64c4b699a3d6
SHA256ce551c6c8c87f443740adaee1890216cdcb8d0387949da9d9c36045a889eeb22
SHA512e23a75481610763fdec4e871d8c550928f513f96c31b4beda8090686dc74a564b628c6a226b62066bbd1376b0f5ac499bf87b576b1ffc9222c8177164c22baae
-
Filesize
5.2MB
MD52cc7a2e9549333ae54714dbcb76469b2
SHA11329b3e0339654cd3ef042c4e65b887092ef01cf
SHA2564f637e7d3b7f63800f42fc6e1d48d422850f176832172a3a5d8ab74367a3557e
SHA51205413b483c4358b134ea2a3cc87896ab4324107f9320d8df5422c95b95a53055af7a2dec7e4e911d5431c5f9edaaaf5216aac4edd8eeb6291a70b29707af273c
-
Filesize
5.2MB
MD5dfcbcf2680f36aec07dd8535747c5e2e
SHA13c5bb9b8ef2fa82f7e68305783d57a6310257bd0
SHA25640c968fb7e9bbca3c239fa43770e01a54e84982de3e26e5b4de50f579092bfcf
SHA512add6ab999340d1fbaebbac1e51a6b08466e81fc80790d1dff8613647868c692fd8503f4bd1e88ce92f0015c8da04c3c2d771769e4c9fa0184f6eb755cf8a723e
-
Filesize
5.2MB
MD5d08122420ce17f7dfdb405680d0109a2
SHA1e2537bceee5ff80c425807149464e4b0f6faeaf5
SHA256a61a75ec1752874c3600b1ca58e9934ba1ec8f3b2c1aaf21aafd171f2ab01917
SHA512ad0f782e7cc5a7173e36f720d636b312989816297b770049bb95c13f17256063dd85158d607bc1cb19641a5e388a4b2f56d85486f64b8374f9456e0676f33ffd
-
Filesize
5.2MB
MD51caa745bd18a4088bb7ce5887ed0c3a7
SHA19215da426bba385abda481f3702142167310ab52
SHA2562c6e9ed6e2667afe2526fff64780b468a82eef63374af12b8b7434133ed42e1b
SHA512ab03727bdb9049d16b5ed72ccf6ba9e481a973e8ef05d4d1901de78e91a76c699d917fe585c0291743dd8722fb55d0cbf5f113b8646e619634532ecc2dc28fd6
-
Filesize
5.2MB
MD56a96a0f6bebcc7bcfac44990e47904d2
SHA10b39c6abf4b779b57f81f0d9e69c8107ba1ad973
SHA2566d8cacb01d9d92d60e32d23379d0ee0c70f0ba7ffb57d190e2b3f41971ae820a
SHA512e937507a4677fe461d6fe8d483766661d2c903ad2506fe1b89c783267679173743d3d7ac623c2392eef9d1b96491bb84fb89201a6c1c3043888e384bc5abf11f
-
Filesize
5.2MB
MD5e2c3bd916556ec1c3cdfc3bb03690918
SHA15a449e4892eea484359f2d225a9abbd8a662c59b
SHA256ab4701cb2d7b2ce5a172f0a1490461c481233b3ec36536f816ab1966e9058625
SHA5124580501c6f6e265c9251c32becc9d201a936b4e33d8b01447508ed3a93b6aa8b4b3a4fab1db3c68fdfc4ceb6ab06590012c9e6037bea4e0b4104a344dc13025d
-
Filesize
5.2MB
MD5a85de121e13e7eb48388772d6ee23580
SHA1eee38d144f3e7d5e0188c4d73d51b97ea3651fab
SHA2568eb58249ab90d60d87a55b007bd22d5811cf6e19c78dc39881bc9940b313dff2
SHA51204f25bcf8445e17d283813af3cdf75bb7da74d3044190a80f1ac01c1976476d12ff00663b8a63b43b5e72bff86ea96dcaee033a858fddfc7d7daaa564ffd21cb
-
Filesize
5.2MB
MD551fcf4c70acdabcebaaec71f6f7ef15c
SHA12745ccae0832df8f4e7b1a5d72b1000c9fa507c0
SHA25688a3b8e99b9157dbed2abe3357d7af912b857ea535f9ef93fd847f0f2a4a0a4d
SHA5122ff400ff411cd90ddbc9443b91a681906aacc567c914092ac80b18ae9bce56a6293f071da6efbc7ba9dc3df517d943888233f89bc39a9f98ebe8bcc630a5dfce
-
Filesize
5.2MB
MD5adbdd0e20a761475d3194c375e679289
SHA1e665d9188ab0b51950c3acfc2adefd09f286b8ff
SHA2561b54c904329195a9a13addb466abdf2cb5a2782f1f70ce7b58d12e6056fe44cc
SHA5127cac5e61af726732e6903b60f0b32d4f6525943526513060c3b564e73b99463c86650af0140d26a3563505fa6ad31c359dee149b86a65b80472ccf09712e899c
-
Filesize
5.2MB
MD5300ea8cad459e740b00878f07c415af2
SHA11e9adba5743e5cd74c690edf44b5a2f004df5853
SHA2568b3be062288aa551fc82fee4824f71021f6a2ba6068dcb69e94e144a5329f80c
SHA5123c7d5ddbf3f96e57a6c1106f381f7a9c8ff87a29dccb619825138de3c9eb129b095382cddad31a29f6b5e5f6221979c7d81a0e0f0f503593514908a39f152eac
-
Filesize
5.2MB
MD5c3e03381fac063ffeabb2557e1bc2169
SHA1d5ed0224ef98c3ef69750dabac4a32427255aaea
SHA2569182196e8751afa06e7214242813866bc3d4d13d728d17d40937b09689a313e1
SHA512e87e6d52db763639adcf13fb91ae0fe83d3400ad4f180de206fad3b2a4f2cd1393cae91957050ae32bea98e5c9790f3b79e3ab65fe44d6034d2cefbb346b4c90
-
Filesize
5.2MB
MD501530ae4f141981d6ff6c5209e069e04
SHA135434d18b491c744a8e68b54b353a65f0be88ca4
SHA256966e343465c3434d0153813f1c9ddc50570587e3be445a8eaf2b2db070043454
SHA51241399a567e9ef98b301f33398f828eb0e544757a3f23199615158be395ad0aae64828cd9e9ad6d9ab9810fccc0b4156b6d0fafbbc2960c1d8d38fe64de0fba11
-
Filesize
5.2MB
MD56d36bbde6fae9fa8d52e6eb421c9723d
SHA1e2b0ca0e9aad4c04103fcc83d5330e2aaaa6b0b2
SHA2567c72bd29b9a2b9e89313f56f232125b1a00cb6b67b6e960e85470d6aae91b6f5
SHA512ccbedfecaae2df327d7ca5f0a3143b80f288af1d42dfca476252135ba69552d621e0d69efee6e10c755d7d5253e7648a0f618fe596afa41005598441947c04b4