Analysis

  • max time kernel
    58s
  • max time network
    85s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-08-2024 19:29

General

  • Target

    SyncSpoofer.exe

  • Size

    276KB

  • MD5

    5a8afe7bfd11728c32066c4290eeddc7

  • SHA1

    f2064bbdec287d61722ef35e511b4090212cd1a8

  • SHA256

    92c799a2fd29060a44558a153d1ff5866e420e46b35bdd4546c782c17d4bb50f

  • SHA512

    e03994e666aa7ff84400e86e4cc3db5a77a5475e1961b553f16dbc293160f58f196b0ab6fb7be4ba34b1d030969f2f94ae80dc0c423f3ec015621bf987b796cb

  • SSDEEP

    1536:hJ99JW77A9oXFY+w67Vh7O9H/squacb3P12NETDLiaSKry3bgDBsvVeXBdZs4o7M:vSFHh69HEZJRTDLiaSKreumVeBs4o

Malware Config

Signatures

  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 1 IoCs
  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 19 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 18 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 48 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SyncSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\SyncSpoofer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\AppData\Roaming\sWsmPty.exe
      "C:\Users\Admin\AppData\Roaming\sWsmPty.exe"
      2⤵
      • Executes dropped EXE
      PID:1344
    • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe
      "C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4488
    • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe
      "C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: G39Z-J904
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5036
        • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
          C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: G39Z-J904
          4⤵
          • Executes dropped EXE
          PID:3484
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Disk.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1860
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:3332
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk drive*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:404
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "C:\"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:4264
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "D:\"
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:3220
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "E:\"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:4312
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "F:\"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:3924
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "G:\"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:64
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk"
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:4528
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "disk"
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:1196
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "Disk&*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:4972
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SWD\WPDBUSENUM*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:4092
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "USBSTOR*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:1884
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "SCSI\Disk*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:828
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "STORAGE*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1464
        • C:\ProgramData\Microsoft\Windows\DevManView.exe
          C:\\ProgramData\\Microsoft\\Windows\\DevManView.exe /uninstall "WAN Miniport*" /use_wildcard""
          4⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Maps connected drives based on registry
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:2260
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
        3⤵
          PID:4964
          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 15670HP-TRGT14593AB
            4⤵
              PID:4436
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
            3⤵
              PID:2888
              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 215674HP-TRGT25342RV
                4⤵
                  PID:3792
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                3⤵
                  PID:4496
                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 815674HP-TRGT25342SG
                    4⤵
                      PID:196
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                    3⤵
                      PID:3608
                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                        4⤵
                          PID:4236
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                        3⤵
                          PID:4060
                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 515674HP-TRGT25342SL
                            4⤵
                              PID:5100
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                            3⤵
                              PID:4448
                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 415674HP-TRGT25342FA
                                4⤵
                                  PID:1480
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                3⤵
                                  PID:3864
                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 615674HP-TRGT25342FU
                                    4⤵
                                      PID:4912
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                    3⤵
                                      PID:3780
                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 315674HP-TRGT25342DQ
                                        4⤵
                                          PID:1348
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                        3⤵
                                          PID:1512
                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 715674HP-TRGT25342MST
                                            4⤵
                                              PID:3060
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                            3⤵
                                              PID:4276
                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                4⤵
                                                  PID:2100
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                                                3⤵
                                                  PID:4904
                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 15693HP-TRGT24296AB
                                                    4⤵
                                                      PID:2740
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                                    3⤵
                                                      PID:2108
                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 215693HP-TRGT24296RV
                                                        4⤵
                                                          PID:4992
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                                        3⤵
                                                          PID:4988
                                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 815693HP-TRGT24296SG
                                                            4⤵
                                                              PID:1708
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                            3⤵
                                                              PID:2024
                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                                4⤵
                                                                  PID:4156
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                                                3⤵
                                                                  PID:3324
                                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 515693HP-TRGT24296SL
                                                                    4⤵
                                                                      PID:4492
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                                                    3⤵
                                                                      PID:5000
                                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 415693HP-TRGT24296FA
                                                                        4⤵
                                                                          PID:1296
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                                                        3⤵
                                                                          PID:2236
                                                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 615693HP-TRGT24296FU
                                                                            4⤵
                                                                              PID:780
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                                                            3⤵
                                                                              PID:4564
                                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 315693HP-TRGT24296DQ
                                                                                4⤵
                                                                                  PID:3480
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                                                                3⤵
                                                                                  PID:4940
                                                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 715693HP-TRGT24296MST
                                                                                    4⤵
                                                                                      PID:3496
                                                                                  • C:\Windows\System32\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                                    3⤵
                                                                                      PID:812
                                                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                                        4⤵
                                                                                          PID:792
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%HP-TRGT%RANDOM%AB
                                                                                        3⤵
                                                                                          PID:3928
                                                                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 15710HP-TRGT12502AB
                                                                                            4⤵
                                                                                              PID:3612
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%HP-TRGT%RANDOM%RV
                                                                                            3⤵
                                                                                              PID:3924
                                                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 215710HP-TRGT12502RV
                                                                                                4⤵
                                                                                                  PID:3980
                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%HP-TRGT%RANDOM%SG
                                                                                                3⤵
                                                                                                  PID:4972
                                                                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 815710HP-TRGT12502SG
                                                                                                    4⤵
                                                                                                      PID:1480
                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                                                                    3⤵
                                                                                                      PID:4092
                                                                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto
                                                                                                        4⤵
                                                                                                          PID:4536
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%HP-TRGT%RANDOM%SL
                                                                                                        3⤵
                                                                                                          PID:5012
                                                                                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 515710HP-TRGT12502SL
                                                                                                            4⤵
                                                                                                              PID:208
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%HP-TRGT%RANDOM%FA
                                                                                                            3⤵
                                                                                                              PID:2288
                                                                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 415710HP-TRGT12502FA
                                                                                                                4⤵
                                                                                                                  PID:4276
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%HP-TRGT%RANDOM%FU
                                                                                                                3⤵
                                                                                                                  PID:3852
                                                                                                                  • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                    C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 615710HP-TRGT12502FU
                                                                                                                    4⤵
                                                                                                                      PID:4480
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%HP-TRGT%RANDOM%DQ
                                                                                                                    3⤵
                                                                                                                      PID:4220
                                                                                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                        C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 315710HP-TRGT12502DQ
                                                                                                                        4⤵
                                                                                                                          PID:4240
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%HP-TRGT%RANDOM%MST
                                                                                                                        3⤵
                                                                                                                          PID:1920
                                                                                                                          • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                            C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 715710HP-TRGT12502MST
                                                                                                                            4⤵
                                                                                                                              PID:5056
                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                                                                            3⤵
                                                                                                                              PID:3236
                                                                                                                              • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe
                                                                                                                                C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM HOPESA-RSPPOF
                                                                                                                                4⤵
                                                                                                                                  PID:4192
                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: T031-MIAT
                                                                                                                                3⤵
                                                                                                                                  PID:1232
                                                                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe a: T031-MIAT
                                                                                                                                    4⤵
                                                                                                                                      PID:2800
                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: J882-44AP
                                                                                                                                    3⤵
                                                                                                                                      PID:2156
                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe b: J882-44AP
                                                                                                                                        4⤵
                                                                                                                                          PID:2948
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: CTNV-GTES
                                                                                                                                        3⤵
                                                                                                                                          PID:4152
                                                                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe c: CTNV-GTES
                                                                                                                                            4⤵
                                                                                                                                              PID:1692
                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: KV6C-MI7K
                                                                                                                                            3⤵
                                                                                                                                              PID:4844
                                                                                                                                              • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                C:\ProgramData\Microsoft\Windows\Volumeid64.exe d: KV6C-MI7K
                                                                                                                                                4⤵
                                                                                                                                                  PID:3136
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: 8IST-87AE
                                                                                                                                                3⤵
                                                                                                                                                  PID:1224
                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                    C:\ProgramData\Microsoft\Windows\Volumeid64.exe e: 8IST-87AE
                                                                                                                                                    4⤵
                                                                                                                                                      PID:1988
                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: 3EZU-9BRF
                                                                                                                                                    3⤵
                                                                                                                                                      PID:1660
                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                        C:\ProgramData\Microsoft\Windows\Volumeid64.exe f: 3EZU-9BRF
                                                                                                                                                        4⤵
                                                                                                                                                          PID:2148
                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /C C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: KLDK-9C5D
                                                                                                                                                        3⤵
                                                                                                                                                          PID:5060
                                                                                                                                                          • C:\ProgramData\Microsoft\Windows\Volumeid64.exe
                                                                                                                                                            C:\ProgramData\Microsoft\Windows\Volumeid64.exe g: KLDK-9C5D
                                                                                                                                                            4⤵
                                                                                                                                                              PID:4280

                                                                                                                                                      Network

                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                      Replay Monitor

                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                      Downloads

                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe

                                                                                                                                                        Filesize

                                                                                                                                                        452KB

                                                                                                                                                        MD5

                                                                                                                                                        c4d09d3b3516550ad2ded3b09e28c10c

                                                                                                                                                        SHA1

                                                                                                                                                        7a5e77bb9ba74cf57cb1d119325b0b7f64199824

                                                                                                                                                        SHA256

                                                                                                                                                        66433a06884f28fdabb85a73c682d1587767e1dfa116907559ec00ed8d0919d3

                                                                                                                                                        SHA512

                                                                                                                                                        2e7800aae592d38c4a6c854b11d0883de70f938b29d78e257ab47a8a2bbf09121145d0a9aea9b56c16e18cde31b693d31d7ebfcd0473b7c15df5d7ae6708bbd2

                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\DevManView.cfg

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        43b37d0f48bad1537a4de59ffda50ffe

                                                                                                                                                        SHA1

                                                                                                                                                        48ca09a0ed8533bf462a56c43b8db6e7b6c6ffa8

                                                                                                                                                        SHA256

                                                                                                                                                        fc258dfb3e49be04041ac24540ef544192c2e57300186f777f301d586f900288

                                                                                                                                                        SHA512

                                                                                                                                                        cfb1d98328aed36d2fe9df008a95c489192f01d4bb20de329e69e0386129aff4634e6fd63a8d49e14fc96da75c9b5ed3a218425846907d0122267d50fc8d7a82

                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\DevManView.exe

                                                                                                                                                        Filesize

                                                                                                                                                        162KB

                                                                                                                                                        MD5

                                                                                                                                                        33d7a84f8ef67fd005f37142232ae97e

                                                                                                                                                        SHA1

                                                                                                                                                        1f560717d8038221c9b161716affb7cd6b14056e

                                                                                                                                                        SHA256

                                                                                                                                                        a1be60039f125080560edf1eebee5b6d9e2d6039f5f5ac478e6273e05edadb4b

                                                                                                                                                        SHA512

                                                                                                                                                        c059db769b9d8a9f1726709c9ad71e565b8081a879b55d0f906d6927409166e1d5716c784146feba41114a2cf44ee90cf2e0891831245752238f20c41590b3f5

                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Disk.bat

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        250e75ba9aac6e2e9349bdebc5ef104e

                                                                                                                                                        SHA1

                                                                                                                                                        7efdaef5ec1752e7e29d8cc4641615d14ac1855f

                                                                                                                                                        SHA256

                                                                                                                                                        7d50c4fdcf6d8716c7d0d39517d479b3eeee02d2020ed635327405ae49c42516

                                                                                                                                                        SHA512

                                                                                                                                                        7f0d7d41c9eafcd65daa674b5182cf52e11aa0f6d6baaee74fe4c4ffc08a163277c4981cd123af0cb1857ae6fd223b5e8c676d9dc5c646a870fbd9bc4001c438

                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Volumeid64.exe

                                                                                                                                                        Filesize

                                                                                                                                                        165KB

                                                                                                                                                        MD5

                                                                                                                                                        81a45f1a91448313b76d2e6d5308aa7a

                                                                                                                                                        SHA1

                                                                                                                                                        0d615343d5de03da03bce52e11b233093b404083

                                                                                                                                                        SHA256

                                                                                                                                                        fb0d02ea26bb1e5df5a07147931caf1ae3d7d1d9b4d83f168b678e7f3a1c0ecd

                                                                                                                                                        SHA512

                                                                                                                                                        675662f84dfcbf33311f5830db70bff50b6e8a34a4a926de6369c446ea2b1cf8a63e9c94e5a5c2e1d226248f0361a1698448f82118ac4de5a92b64d8fdf8815d

                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\amifldrv64.sys

                                                                                                                                                        Filesize

                                                                                                                                                        18KB

                                                                                                                                                        MD5

                                                                                                                                                        785045f8b25cd2e937ddc6b09debe01a

                                                                                                                                                        SHA1

                                                                                                                                                        029c678674f482ababe8bbfdb93152392457109d

                                                                                                                                                        SHA256

                                                                                                                                                        37073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba

                                                                                                                                                        SHA512

                                                                                                                                                        40bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\HpsrSpoof.exe

                                                                                                                                                        Filesize

                                                                                                                                                        905KB

                                                                                                                                                        MD5

                                                                                                                                                        dd1313842898ffaf72d79df643637ded

                                                                                                                                                        SHA1

                                                                                                                                                        93a34cb05fdf76869769af09a22711deea44ed28

                                                                                                                                                        SHA256

                                                                                                                                                        81b27a565d2eb4701c404e03398a4bca48480e592460121bf8ec62c5f4b061df

                                                                                                                                                        SHA512

                                                                                                                                                        db8cdcbfca205e64f1838fc28ea98107c854a4f31f617914e45c25d37da731b876afc36f816a78839d7b48b3c2b90f81856c821818f27239a504ab4253fe28f9

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe

                                                                                                                                                        Filesize

                                                                                                                                                        2.6MB

                                                                                                                                                        MD5

                                                                                                                                                        dab13157795e19d8fe050f65ce49401d

                                                                                                                                                        SHA1

                                                                                                                                                        ecb6f0a864fd92fb7c423d882f9a6ea703096318

                                                                                                                                                        SHA256

                                                                                                                                                        d8b4ce77f87bfe0b958f01ea30f48cf53e6ff51b425a57abc4f83a71d47f58fc

                                                                                                                                                        SHA512

                                                                                                                                                        5cdb82bf347dbdae3c8e3f376ad18fb48509af3da91e8d18876ee7adb9db9fa9d2476060bf5de1294d44e86d477486db9efa045bd45a86a0e6739d6cfa9cca89

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\sWsmPty.exe

                                                                                                                                                        Filesize

                                                                                                                                                        13.2MB

                                                                                                                                                        MD5

                                                                                                                                                        f94352e1545f9b8820885dca9baafcb4

                                                                                                                                                        SHA1

                                                                                                                                                        710f642efb3e30e5e9a3abc7586997de1aac0852

                                                                                                                                                        SHA256

                                                                                                                                                        07d614e26f1ab51b36eba12ba11e5deae3415688c6d6989e9a41d387884df763

                                                                                                                                                        SHA512

                                                                                                                                                        d13ccb3b6ba61db1bc1a03438fda50e617ea531ea568aa86366909fecee01b8979e284552aac2441aa8bdeddf4c1634d1d5e82701697978986294f53196537ab

                                                                                                                                                      • memory/1344-14-0x00000000037F0000-0x00000000039F8000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.0MB

                                                                                                                                                      • memory/1344-13-0x0000000001160000-0x0000000001161000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                      • memory/1344-27-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-28-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-26-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-25-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-24-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-23-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-21-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-15-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-22-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-29-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-36-0x0000000001160000-0x0000000001161000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                      • memory/1344-38-0x00000000037F0000-0x00000000039F8000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.0MB

                                                                                                                                                      • memory/1344-37-0x0000000000400000-0x000000000114E000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        13.3MB

                                                                                                                                                      • memory/1344-134-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/1344-56-0x0000000140000000-0x0000000140273000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                      • memory/4488-44-0x0000000000A10000-0x000000000146D000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        10.4MB

                                                                                                                                                      • memory/4488-152-0x0000000000A10000-0x000000000146D000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        10.4MB

                                                                                                                                                      • memory/4488-132-0x0000000000A10000-0x000000000146D000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        10.4MB

                                                                                                                                                      • memory/4488-106-0x0000000000A10000-0x000000000146D000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        10.4MB

                                                                                                                                                      • memory/4488-107-0x0000000000A10000-0x000000000146D000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        10.4MB

                                                                                                                                                      • memory/5028-3-0x0000000002A50000-0x0000000002A5C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        48KB

                                                                                                                                                      • memory/5028-4-0x0000000005060000-0x000000000506A000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        40KB

                                                                                                                                                      • memory/5028-5-0x00000000730EE000-0x00000000730EF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                      • memory/5028-6-0x00000000730E0000-0x00000000737CE000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.9MB

                                                                                                                                                      • memory/5028-2-0x00000000730E0000-0x00000000737CE000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.9MB

                                                                                                                                                      • memory/5028-1-0x00000000008A0000-0x00000000008E6000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        280KB

                                                                                                                                                      • memory/5028-69-0x00000000730E0000-0x00000000737CE000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        6.9MB

                                                                                                                                                      • memory/5028-0-0x00000000730EE000-0x00000000730EF000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                      • memory/5028-7-0x0000000007BC0000-0x00000000080BE000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        5.0MB