Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 18:46
Behavioral task
behavioral1
Sample
5f1f671c8f2f23651a280c5939f02ff0N.exe
Resource
win7-20240708-en
General
-
Target
5f1f671c8f2f23651a280c5939f02ff0N.exe
-
Size
5.2MB
-
MD5
5f1f671c8f2f23651a280c5939f02ff0
-
SHA1
8d790608265418bfba4d0ce4e86919021d9777ab
-
SHA256
e0f643da174484869ac00435c3898f05493dd99942e9e5b0b36c4892d60eaaba
-
SHA512
2687d8c09857c5b982f70f7a8deda59435aaccb62b10fc44d27bbb130207ce09018ded95745f3a0669a8279d6ac76f1b2745d5cc69fd16879577f509d881c27a
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l/:RWWBibf56utgpPFotBER/mQ32lU7
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral2/files/0x00090000000233f1-5.dat cobalt_reflective_dll behavioral2/files/0x0007000000023455-14.dat cobalt_reflective_dll behavioral2/files/0x0007000000023456-9.dat cobalt_reflective_dll behavioral2/files/0x000700000002345a-35.dat cobalt_reflective_dll behavioral2/files/0x0007000000023459-44.dat cobalt_reflective_dll behavioral2/files/0x000700000002345b-49.dat cobalt_reflective_dll behavioral2/files/0x0007000000023458-37.dat cobalt_reflective_dll behavioral2/files/0x0007000000023457-26.dat cobalt_reflective_dll behavioral2/files/0x000700000002345c-54.dat cobalt_reflective_dll behavioral2/files/0x0008000000023452-59.dat cobalt_reflective_dll behavioral2/files/0x000700000002345d-68.dat cobalt_reflective_dll behavioral2/files/0x000700000002345e-72.dat cobalt_reflective_dll behavioral2/files/0x0007000000023461-83.dat cobalt_reflective_dll behavioral2/files/0x0007000000023466-110.dat cobalt_reflective_dll behavioral2/files/0x0007000000023467-113.dat cobalt_reflective_dll behavioral2/files/0x0007000000023462-117.dat cobalt_reflective_dll behavioral2/files/0x0007000000023463-126.dat cobalt_reflective_dll behavioral2/files/0x0007000000023465-119.dat cobalt_reflective_dll behavioral2/files/0x0007000000023464-115.dat cobalt_reflective_dll behavioral2/files/0x000700000002345f-92.dat cobalt_reflective_dll behavioral2/files/0x0007000000023460-88.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 46 IoCs
resource yara_rule behavioral2/memory/1988-55-0x00007FF670960000-0x00007FF670CB1000-memory.dmp xmrig behavioral2/memory/3940-129-0x00007FF724280000-0x00007FF7245D1000-memory.dmp xmrig behavioral2/memory/640-127-0x00007FF747100000-0x00007FF747451000-memory.dmp xmrig behavioral2/memory/2216-123-0x00007FF750EF0000-0x00007FF751241000-memory.dmp xmrig behavioral2/memory/4608-111-0x00007FF754FF0000-0x00007FF755341000-memory.dmp xmrig behavioral2/memory/2524-85-0x00007FF7E4030000-0x00007FF7E4381000-memory.dmp xmrig behavioral2/memory/3364-76-0x00007FF7BCE90000-0x00007FF7BD1E1000-memory.dmp xmrig behavioral2/memory/4800-69-0x00007FF765790000-0x00007FF765AE1000-memory.dmp xmrig behavioral2/memory/5032-60-0x00007FF6171A0000-0x00007FF6174F1000-memory.dmp xmrig behavioral2/memory/2036-133-0x00007FF780F00000-0x00007FF781251000-memory.dmp xmrig behavioral2/memory/3280-134-0x00007FF7D7500000-0x00007FF7D7851000-memory.dmp xmrig behavioral2/memory/5032-135-0x00007FF6171A0000-0x00007FF6174F1000-memory.dmp xmrig behavioral2/memory/2352-139-0x00007FF6B07C0000-0x00007FF6B0B11000-memory.dmp xmrig behavioral2/memory/716-146-0x00007FF749150000-0x00007FF7494A1000-memory.dmp xmrig behavioral2/memory/1988-145-0x00007FF670960000-0x00007FF670CB1000-memory.dmp xmrig behavioral2/memory/4440-147-0x00007FF6EB5A0000-0x00007FF6EB8F1000-memory.dmp xmrig behavioral2/memory/2136-151-0x00007FF62F240000-0x00007FF62F591000-memory.dmp xmrig behavioral2/memory/2172-150-0x00007FF625900000-0x00007FF625C51000-memory.dmp xmrig behavioral2/memory/3308-156-0x00007FF61A650000-0x00007FF61A9A1000-memory.dmp xmrig behavioral2/memory/4788-159-0x00007FF747D80000-0x00007FF7480D1000-memory.dmp xmrig behavioral2/memory/4028-160-0x00007FF6F2890000-0x00007FF6F2BE1000-memory.dmp xmrig behavioral2/memory/764-158-0x00007FF6A8610000-0x00007FF6A8961000-memory.dmp xmrig behavioral2/memory/404-155-0x00007FF778B70000-0x00007FF778EC1000-memory.dmp xmrig behavioral2/memory/2400-153-0x00007FF6D2470000-0x00007FF6D27C1000-memory.dmp xmrig behavioral2/memory/5032-161-0x00007FF6171A0000-0x00007FF6174F1000-memory.dmp xmrig behavioral2/memory/4800-216-0x00007FF765790000-0x00007FF765AE1000-memory.dmp xmrig behavioral2/memory/3364-218-0x00007FF7BCE90000-0x00007FF7BD1E1000-memory.dmp xmrig behavioral2/memory/640-220-0x00007FF747100000-0x00007FF747451000-memory.dmp xmrig behavioral2/memory/2524-222-0x00007FF7E4030000-0x00007FF7E4381000-memory.dmp xmrig behavioral2/memory/2036-224-0x00007FF780F00000-0x00007FF781251000-memory.dmp xmrig behavioral2/memory/2352-228-0x00007FF6B07C0000-0x00007FF6B0B11000-memory.dmp xmrig behavioral2/memory/716-227-0x00007FF749150000-0x00007FF7494A1000-memory.dmp xmrig behavioral2/memory/3280-230-0x00007FF7D7500000-0x00007FF7D7851000-memory.dmp xmrig behavioral2/memory/1988-244-0x00007FF670960000-0x00007FF670CB1000-memory.dmp xmrig behavioral2/memory/4440-246-0x00007FF6EB5A0000-0x00007FF6EB8F1000-memory.dmp xmrig behavioral2/memory/2136-248-0x00007FF62F240000-0x00007FF62F591000-memory.dmp xmrig behavioral2/memory/2400-250-0x00007FF6D2470000-0x00007FF6D27C1000-memory.dmp xmrig behavioral2/memory/2216-252-0x00007FF750EF0000-0x00007FF751241000-memory.dmp xmrig behavioral2/memory/4608-254-0x00007FF754FF0000-0x00007FF755341000-memory.dmp xmrig behavioral2/memory/404-261-0x00007FF778B70000-0x00007FF778EC1000-memory.dmp xmrig behavioral2/memory/3940-262-0x00007FF724280000-0x00007FF7245D1000-memory.dmp xmrig behavioral2/memory/4788-264-0x00007FF747D80000-0x00007FF7480D1000-memory.dmp xmrig behavioral2/memory/2172-257-0x00007FF625900000-0x00007FF625C51000-memory.dmp xmrig behavioral2/memory/764-259-0x00007FF6A8610000-0x00007FF6A8961000-memory.dmp xmrig behavioral2/memory/3308-266-0x00007FF61A650000-0x00007FF61A9A1000-memory.dmp xmrig behavioral2/memory/4028-268-0x00007FF6F2890000-0x00007FF6F2BE1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 4800 zipULjJ.exe 3364 sbamkjQ.exe 2524 YEKNRAZ.exe 640 grRDMok.exe 2036 YWnQLAz.exe 2352 QviHBAI.exe 3280 EIzIjth.exe 716 DrdyREt.exe 1988 jfpYrLq.exe 4440 mKdlbPT.exe 2136 najsULm.exe 2172 Ziubjgg.exe 2216 LLSFxdy.exe 2400 EaZdjan.exe 4608 Xounbvk.exe 3308 GrCdCmq.exe 3940 JvbEUre.exe 404 JYOibEJ.exe 764 cVynpMx.exe 4788 BvqpmGQ.exe 4028 xbeiOvh.exe -
resource yara_rule behavioral2/memory/5032-0-0x00007FF6171A0000-0x00007FF6174F1000-memory.dmp upx behavioral2/files/0x00090000000233f1-5.dat upx behavioral2/memory/4800-6-0x00007FF765790000-0x00007FF765AE1000-memory.dmp upx behavioral2/files/0x0007000000023455-14.dat upx behavioral2/files/0x0007000000023456-9.dat upx behavioral2/memory/2036-31-0x00007FF780F00000-0x00007FF781251000-memory.dmp upx behavioral2/files/0x000700000002345a-35.dat upx behavioral2/memory/3280-43-0x00007FF7D7500000-0x00007FF7D7851000-memory.dmp upx behavioral2/files/0x0007000000023459-44.dat upx behavioral2/memory/716-47-0x00007FF749150000-0x00007FF7494A1000-memory.dmp upx behavioral2/files/0x000700000002345b-49.dat upx behavioral2/memory/2352-41-0x00007FF6B07C0000-0x00007FF6B0B11000-memory.dmp upx behavioral2/files/0x0007000000023458-37.dat upx behavioral2/memory/640-30-0x00007FF747100000-0x00007FF747451000-memory.dmp upx behavioral2/files/0x0007000000023457-26.dat upx behavioral2/memory/2524-21-0x00007FF7E4030000-0x00007FF7E4381000-memory.dmp upx behavioral2/memory/3364-15-0x00007FF7BCE90000-0x00007FF7BD1E1000-memory.dmp upx behavioral2/files/0x000700000002345c-54.dat upx behavioral2/memory/1988-55-0x00007FF670960000-0x00007FF670CB1000-memory.dmp upx behavioral2/files/0x0008000000023452-59.dat upx behavioral2/memory/4440-65-0x00007FF6EB5A0000-0x00007FF6EB8F1000-memory.dmp upx behavioral2/files/0x000700000002345d-68.dat upx behavioral2/files/0x000700000002345e-72.dat upx behavioral2/files/0x0007000000023461-83.dat upx behavioral2/files/0x0007000000023466-110.dat upx behavioral2/files/0x0007000000023467-113.dat upx behavioral2/files/0x0007000000023462-117.dat upx behavioral2/memory/4028-130-0x00007FF6F2890000-0x00007FF6F2BE1000-memory.dmp upx behavioral2/memory/3940-129-0x00007FF724280000-0x00007FF7245D1000-memory.dmp upx behavioral2/memory/3308-128-0x00007FF61A650000-0x00007FF61A9A1000-memory.dmp upx behavioral2/memory/640-127-0x00007FF747100000-0x00007FF747451000-memory.dmp upx behavioral2/files/0x0007000000023463-126.dat upx behavioral2/memory/2216-123-0x00007FF750EF0000-0x00007FF751241000-memory.dmp upx behavioral2/memory/4788-121-0x00007FF747D80000-0x00007FF7480D1000-memory.dmp upx behavioral2/files/0x0007000000023465-119.dat upx behavioral2/files/0x0007000000023464-115.dat upx behavioral2/memory/764-114-0x00007FF6A8610000-0x00007FF6A8961000-memory.dmp upx behavioral2/memory/404-112-0x00007FF778B70000-0x00007FF778EC1000-memory.dmp upx behavioral2/memory/4608-111-0x00007FF754FF0000-0x00007FF755341000-memory.dmp upx behavioral2/memory/2400-103-0x00007FF6D2470000-0x00007FF6D27C1000-memory.dmp upx behavioral2/files/0x000700000002345f-92.dat upx behavioral2/memory/2172-89-0x00007FF625900000-0x00007FF625C51000-memory.dmp upx behavioral2/files/0x0007000000023460-88.dat upx behavioral2/memory/2524-85-0x00007FF7E4030000-0x00007FF7E4381000-memory.dmp upx behavioral2/memory/3364-76-0x00007FF7BCE90000-0x00007FF7BD1E1000-memory.dmp upx behavioral2/memory/2136-75-0x00007FF62F240000-0x00007FF62F591000-memory.dmp upx behavioral2/memory/4800-69-0x00007FF765790000-0x00007FF765AE1000-memory.dmp upx behavioral2/memory/5032-60-0x00007FF6171A0000-0x00007FF6174F1000-memory.dmp upx behavioral2/memory/2036-133-0x00007FF780F00000-0x00007FF781251000-memory.dmp upx behavioral2/memory/3280-134-0x00007FF7D7500000-0x00007FF7D7851000-memory.dmp upx behavioral2/memory/5032-135-0x00007FF6171A0000-0x00007FF6174F1000-memory.dmp upx behavioral2/memory/2352-139-0x00007FF6B07C0000-0x00007FF6B0B11000-memory.dmp upx behavioral2/memory/716-146-0x00007FF749150000-0x00007FF7494A1000-memory.dmp upx behavioral2/memory/1988-145-0x00007FF670960000-0x00007FF670CB1000-memory.dmp upx behavioral2/memory/4440-147-0x00007FF6EB5A0000-0x00007FF6EB8F1000-memory.dmp upx behavioral2/memory/2136-151-0x00007FF62F240000-0x00007FF62F591000-memory.dmp upx behavioral2/memory/2172-150-0x00007FF625900000-0x00007FF625C51000-memory.dmp upx behavioral2/memory/3308-156-0x00007FF61A650000-0x00007FF61A9A1000-memory.dmp upx behavioral2/memory/4788-159-0x00007FF747D80000-0x00007FF7480D1000-memory.dmp upx behavioral2/memory/4028-160-0x00007FF6F2890000-0x00007FF6F2BE1000-memory.dmp upx behavioral2/memory/764-158-0x00007FF6A8610000-0x00007FF6A8961000-memory.dmp upx behavioral2/memory/404-155-0x00007FF778B70000-0x00007FF778EC1000-memory.dmp upx behavioral2/memory/2400-153-0x00007FF6D2470000-0x00007FF6D27C1000-memory.dmp upx behavioral2/memory/5032-161-0x00007FF6171A0000-0x00007FF6174F1000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\grRDMok.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\QviHBAI.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\DrdyREt.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\jfpYrLq.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\JYOibEJ.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\GrCdCmq.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\EIzIjth.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\najsULm.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\Ziubjgg.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\EaZdjan.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\xbeiOvh.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\zipULjJ.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\YEKNRAZ.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\mKdlbPT.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\BvqpmGQ.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\sbamkjQ.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\YWnQLAz.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\LLSFxdy.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\Xounbvk.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\JvbEUre.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe File created C:\Windows\System\cVynpMx.exe 5f1f671c8f2f23651a280c5939f02ff0N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe Token: SeLockMemoryPrivilege 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4800 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 85 PID 5032 wrote to memory of 4800 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 85 PID 5032 wrote to memory of 3364 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 86 PID 5032 wrote to memory of 3364 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 86 PID 5032 wrote to memory of 2524 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 87 PID 5032 wrote to memory of 2524 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 87 PID 5032 wrote to memory of 640 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 88 PID 5032 wrote to memory of 640 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 88 PID 5032 wrote to memory of 2036 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 89 PID 5032 wrote to memory of 2036 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 89 PID 5032 wrote to memory of 2352 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 90 PID 5032 wrote to memory of 2352 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 90 PID 5032 wrote to memory of 3280 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 91 PID 5032 wrote to memory of 3280 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 91 PID 5032 wrote to memory of 716 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 92 PID 5032 wrote to memory of 716 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 92 PID 5032 wrote to memory of 1988 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 93 PID 5032 wrote to memory of 1988 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 93 PID 5032 wrote to memory of 4440 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 94 PID 5032 wrote to memory of 4440 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 94 PID 5032 wrote to memory of 2136 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 95 PID 5032 wrote to memory of 2136 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 95 PID 5032 wrote to memory of 2172 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 96 PID 5032 wrote to memory of 2172 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 96 PID 5032 wrote to memory of 2216 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 97 PID 5032 wrote to memory of 2216 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 97 PID 5032 wrote to memory of 2400 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 99 PID 5032 wrote to memory of 2400 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 99 PID 5032 wrote to memory of 4608 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 100 PID 5032 wrote to memory of 4608 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 100 PID 5032 wrote to memory of 404 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 101 PID 5032 wrote to memory of 404 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 101 PID 5032 wrote to memory of 3308 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 102 PID 5032 wrote to memory of 3308 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 102 PID 5032 wrote to memory of 3940 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 103 PID 5032 wrote to memory of 3940 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 103 PID 5032 wrote to memory of 764 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 104 PID 5032 wrote to memory of 764 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 104 PID 5032 wrote to memory of 4788 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 105 PID 5032 wrote to memory of 4788 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 105 PID 5032 wrote to memory of 4028 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 106 PID 5032 wrote to memory of 4028 5032 5f1f671c8f2f23651a280c5939f02ff0N.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f1f671c8f2f23651a280c5939f02ff0N.exe"C:\Users\Admin\AppData\Local\Temp\5f1f671c8f2f23651a280c5939f02ff0N.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\System\zipULjJ.exeC:\Windows\System\zipULjJ.exe2⤵
- Executes dropped EXE
PID:4800
-
-
C:\Windows\System\sbamkjQ.exeC:\Windows\System\sbamkjQ.exe2⤵
- Executes dropped EXE
PID:3364
-
-
C:\Windows\System\YEKNRAZ.exeC:\Windows\System\YEKNRAZ.exe2⤵
- Executes dropped EXE
PID:2524
-
-
C:\Windows\System\grRDMok.exeC:\Windows\System\grRDMok.exe2⤵
- Executes dropped EXE
PID:640
-
-
C:\Windows\System\YWnQLAz.exeC:\Windows\System\YWnQLAz.exe2⤵
- Executes dropped EXE
PID:2036
-
-
C:\Windows\System\QviHBAI.exeC:\Windows\System\QviHBAI.exe2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Windows\System\EIzIjth.exeC:\Windows\System\EIzIjth.exe2⤵
- Executes dropped EXE
PID:3280
-
-
C:\Windows\System\DrdyREt.exeC:\Windows\System\DrdyREt.exe2⤵
- Executes dropped EXE
PID:716
-
-
C:\Windows\System\jfpYrLq.exeC:\Windows\System\jfpYrLq.exe2⤵
- Executes dropped EXE
PID:1988
-
-
C:\Windows\System\mKdlbPT.exeC:\Windows\System\mKdlbPT.exe2⤵
- Executes dropped EXE
PID:4440
-
-
C:\Windows\System\najsULm.exeC:\Windows\System\najsULm.exe2⤵
- Executes dropped EXE
PID:2136
-
-
C:\Windows\System\Ziubjgg.exeC:\Windows\System\Ziubjgg.exe2⤵
- Executes dropped EXE
PID:2172
-
-
C:\Windows\System\LLSFxdy.exeC:\Windows\System\LLSFxdy.exe2⤵
- Executes dropped EXE
PID:2216
-
-
C:\Windows\System\EaZdjan.exeC:\Windows\System\EaZdjan.exe2⤵
- Executes dropped EXE
PID:2400
-
-
C:\Windows\System\Xounbvk.exeC:\Windows\System\Xounbvk.exe2⤵
- Executes dropped EXE
PID:4608
-
-
C:\Windows\System\JYOibEJ.exeC:\Windows\System\JYOibEJ.exe2⤵
- Executes dropped EXE
PID:404
-
-
C:\Windows\System\GrCdCmq.exeC:\Windows\System\GrCdCmq.exe2⤵
- Executes dropped EXE
PID:3308
-
-
C:\Windows\System\JvbEUre.exeC:\Windows\System\JvbEUre.exe2⤵
- Executes dropped EXE
PID:3940
-
-
C:\Windows\System\cVynpMx.exeC:\Windows\System\cVynpMx.exe2⤵
- Executes dropped EXE
PID:764
-
-
C:\Windows\System\BvqpmGQ.exeC:\Windows\System\BvqpmGQ.exe2⤵
- Executes dropped EXE
PID:4788
-
-
C:\Windows\System\xbeiOvh.exeC:\Windows\System\xbeiOvh.exe2⤵
- Executes dropped EXE
PID:4028
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5d6bf040ba55d7e62d096928d4bfc5657
SHA1046f97d246f0ae45f7fbfef16c66bc484d7b0759
SHA25619d7120269bec3a8694e4ff33555c5085e309691e760b101d91f4c7c332d5c49
SHA512f2c899e6074398d158673b4667df86bacc15ae2ebf89868f5d3582251d033a7ce6fe64a83ca0b15a118b5837d23fb2b22001fa6a397dc486e07fbe340385366a
-
Filesize
5.2MB
MD570b54fdf6d5c9cdd123276f9d6a939ac
SHA12b9890c1f161210ed2c99391daacf88c88cba9bd
SHA2563a3bb046c791fe04b78103087d51de9d6ede034dde69ac1ae87edb9a2c24ffe0
SHA5128799c2ca1d398a6c131d4eb1cb765871e551daab9484550b447ed8732768dfd2692d86fc04b7b82e06e5eac6817bea6a91577f185471d88b1b8eb7e92cfcef18
-
Filesize
5.2MB
MD552840c8fbbd05b914f22c5a7bfec23dd
SHA199247fcfab10d172f9a81d7aa3c0ea4fd7e96f92
SHA2564c9bc12ff110aadaa0aee95d5ae9d0720a554ae3bdc9d14ff83008b5b8aedd10
SHA51218b631ee0274f9ed26bcde300016377896a7b2faf1a35bfd28134fe12898dc5419dcf7b51db6c1c93994ed2c118476786ed914c984f36c13df262cc2ed482023
-
Filesize
5.2MB
MD5f2f8ce9da4e5ec9c3f8e39469bc4ea20
SHA1d94fd10b9229f3cddf93f557f4a45b6fb7039d63
SHA256705d6612257c9ef3ae40b129d29dd723be74914ed596fe8c62da3c921794729d
SHA5123aa0353bde9397be1d2b3dc051f78ce333a693ffec8bd105620f4dece46530285ae7a0911f90fe161e63f5fca8a6bb33b95b3e141d541a2f85c5b9a42ec540c5
-
Filesize
5.2MB
MD5b587afc50fc01170b5dbaeba5117f5d9
SHA1c518f6dfade36d099b2653eacf892592275d51ab
SHA25675ca6b57304494e24604ca72f40b0b4815e36f3dd4a88b5bf03e5b4631825bf0
SHA5126f6915d434450bb004f4c8b62376522c7a4411418e1aeb63e449f6d5b2e96a989a3422b051d38d334e33fa5958e3a9c9d2d5ae4470228bd5e8de039ad855e2df
-
Filesize
5.2MB
MD50af4f08fd8150582740b06f9e41fec39
SHA1914b7e53f75766db884b815f49e24cfd8d573649
SHA2569eddcccffcfbc563912492aca3bf3e5059f540034eb44e699f75e92c87d20e3a
SHA512aab6ca1d2d13223858d2c93897828fe9227f13eb0307a4564cf3dbaa427107e667f8f49f17097511d8488202f8686d0e38247f81ff06f57bea990e699c388238
-
Filesize
5.2MB
MD589b28f464c204daac9e1bb6a5eaa1b4a
SHA192e651a4a5a2b4d7a4124464ebd0d340ec64ad11
SHA25690601265e5985a4c3ce7671d6939f66907101df2fb57f7b66d37161890d1ae9e
SHA5129d1324e9c5aeb313324db9ec66a06a9dac076da1c575044c4195e60343782863a7dfb78e7577f185a1dffee568bc0755182c0430a79f3d9fd83c2ba0b5572746
-
Filesize
5.2MB
MD576c8ba7169d4a88798fdf1bf135bea9d
SHA1498553d33e711f729d7741600c83e786de890894
SHA2560e261c33e88e44107914b39ac45b480768a0b55e820b1d4f8ab6f8a82745296b
SHA5124bab45a62f5b6e956b72f398eec98c2e52b045fa6b588a75fefa98890fe65732281ac6e238ac597ba08d1de9e47ca9e6e222ce0fcf6c15efdf18513fe0452d7a
-
Filesize
5.2MB
MD567fb854ac87ea4c5b0122fe36c2bb54b
SHA176e21600f2ce7618aa58740d02f09b436bf3f5a7
SHA25664f753b9ade23e084d1595d5d3796c6ec599c146653eefac79103b939dd63ae2
SHA512774fd7f076b2d7c3ec747f7250722223c095693e03bfc5a7f76842afc0c272a61edd9d984c9d3ee60daf83d0f8ef25707200786603d1c850f80155313ac1dae3
-
Filesize
5.2MB
MD5f51d28956803d47d818adab4e668a39b
SHA132c80ed07b339e1229e458313ff104ccb379678b
SHA256a759acb4cbf3cf3dcf459bba802808cbb270b5f27cb5e1524636d528f8246ece
SHA512aad07d3ff2ddbe8e9886102c7911c8aa129d08dd2f961ff11888a36148b5c341ac8afbb7326e3bb4a451462ca53a04648e9ecc99b3c17de896d56298b0ac6c6d
-
Filesize
5.2MB
MD55d4f943376317938ee50511973dbfdd7
SHA17025b8c2e440435e207c51ce57302c8732b65d52
SHA2563c0cc22c2759d86d8b50463e12aefa9d34ae5a8cf435e90261ec850fb278bcc0
SHA51253a451927f645545f34ba7c820eb9f58f0433c9571d63f7529125b7b3d6b4d0d7c2d6a0ef0a5ee9ec44d1d79f059408efeebd680bfb9c6b8575904246a759b2c
-
Filesize
5.2MB
MD5a4797aaca12b109bcdc049572590318a
SHA14e8b75d7b0d0860b55beb481fd1f477c23a93347
SHA2564177c5530baa146ef67dc65fc484e892950308484c0247d82ff112f91c390d8e
SHA5123663e1f27ca74c2eece50bb0a0e4693def45fdc9b8432c35973dd75971748790d0a48f9ec678f7b1426b84c3ebef4919cd6e81b2b582eec322c106b8b57dc24c
-
Filesize
5.2MB
MD5318f4ac7469870caddf17ddb4bc3a585
SHA19afab6bb94dffca2ce37bf1d73276eb32b16c67e
SHA2568c23aeedd736c7b675f61ada64a9de98b19d3c8c64f0ded63a64ccbaa1fec209
SHA5128e57943c9e3bbe8773d6eadfaa2a3a984b6b1fcbc24bb0b65700faf6604e4a4a4a2f64c82a5ea238d186ee9e477efaf3a5d3854b7116c6a2aad93aba9f84160e
-
Filesize
5.2MB
MD5f13a5aa4d3f829e12bef973920219ff9
SHA112f42daed6944019883dece6a54be3ba182b8ffa
SHA2566c2dbf3cfb4a9a785d7ac24ce592fa3f3a9e696c599535d32985ddeed97be561
SHA512205a009181418b05a28a093732696662f5c519fec19e60e90368e087ad2cc5a9c609ad5c9633d38b6c5bcf3dbb4b3371ab1b330d99ac540a9f8d2b23dda91927
-
Filesize
5.2MB
MD5c9ef64bfff03c19adb499afae1c21373
SHA1711fc70231eb3997666c0de0fc7de2674c976199
SHA25684a14b7dde622751ea1d76260e8041ca3c23d2f990b88a370b04bab515520770
SHA51237b48ab5c36f1f5181fa2fc931721ab3a252357c87904ba6db1b3eb6092d3231f84355f6569e1d9e3fb6e98dd41c95d4c5ba93cd235600155c6ebb0ee51185e7
-
Filesize
5.2MB
MD52eeffc4c1197b45a26f3bce1c2fd219f
SHA19e95a69a4e1b54dd8038278e641b5ed1d5e63c79
SHA256bb532e7bb6dc8b48ec9f1994472dc8802fcdc19ae8aa0de90be997a11da07674
SHA512c47686af3aaf7779474602a2d8b64cc69a50996fcb3a280d8a4256ca47f6a67d205f680aa74d8b37f42a18e50aabd66204122534f1f29839bcb7d58575ffcfad
-
Filesize
5.2MB
MD5ef8a98c43eeb98e4f31f986bf052a9bc
SHA1618b87c8ac4ccf0a50de9646ed4daf6df9657fad
SHA2560b4964e2535e49ca6581362d354be5502f6fb42c2b63427bb1c8bbaf1480a734
SHA512b9fc2f6e711befe4a4f75e359ba49fba79cabb2f56c0dde5060b0f9567c9614e6dbf762796e638ad09f57d583f114efdbcfea2908d81f951466656bd2414002c
-
Filesize
5.2MB
MD569a27d4c7b413b6fb2f98ea5acac33e9
SHA13e9540e691632169674240db85737bbf124f8a41
SHA256390f0e25426e68a1f14b7f9b871779264cc75b1a536aeb059761375b4f0bcb0a
SHA512cd1ad7e34b4735ff5f2fb843b53df289a3ba545e8eb49a400a2c242b0ed87575da98c0761561d21e9827ec66de712b3488b1f3543fb325ca3ebd24b90c3eb0f8
-
Filesize
5.2MB
MD5df9fc8003333bdcedbe4cca23de08a9b
SHA19813cdccc390145944dc7a0ad86243491192f69e
SHA2566d0d68690d796621969b17ade770e7dc32905ef055b8aa4080710515a6bc3e43
SHA512edf406b4be57fd97d3315fbf987409e8cf9dbf9b051031c97e7de6db3efdf33fed78753202d598677f9bf73c3a4b752418b800e8cb3e51e31ada2b4fb4cb48d4
-
Filesize
5.2MB
MD5b76363890e09302ff9a45b0e700eed40
SHA1102c3eba05a5926376c436c88367e878b2512f81
SHA2561ce1c3ce6472e10215fadcd9ede002a99a6e1a0d1cd200fa0af7c72be661bb81
SHA51290e05b1f6e4b36647957007ca6349c48acd06f6591e819aa3ae76649a4b2b8758138179493e823a4aa7b5c2b11123a569b6ee64ab7e3590bd9a5017395fca42d
-
Filesize
5.2MB
MD51731ae7bddcdaaa0044e71777f1e0c8a
SHA13e88fb9fe925ff955c2add9ac7034eff144779c3
SHA256f495a19ecd3a797ee9aab7b8a0ba1fbf5c610f6604ec485dda46f30479856e9f
SHA51232bea0f2fde578dc01f63e843b7a7c171e03b93933b668f26b6d1cb777328449c7e9850176c90637f90a621cb495b9dbc8b258e3538cc78d6fb5b25cf7d2e313