Analysis
-
max time kernel
205s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe
Resource
win10v2004-20240802-en
General
-
Target
f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe
-
Size
312KB
-
MD5
bfef91bacc33b5424ea2a40245fd9039
-
SHA1
a9c60eb8dabc24b04eaf99c3c613f6d5c1a19b41
-
SHA256
f2bae4d8912682525ecd787fb921c3b57d8672c44ea73eb23c0ab278cf1fb939
-
SHA512
19de586b1ec80cabd40d78e02e7cd8f5d868c9a907433dc9b6fb16747157d4a613d17cad43e249841cb841b0838bd33cf15eb413d8510f62975ef6c0b24ff2e3
-
SSDEEP
6144:kn9+9wPbNTK0Q/fvzKZ62jY/776KOWu/GduR9swnApRTv+:k9RTG/fvyLj472KOv/GduzsJpRq
Malware Config
Extracted
mylobot
eakalra.ru:1281
op17.ru:6006
ad21822.ru:8742
urtuifc.ru:1692
nmernrh.ru:4163
bjbhtsc.ru:6239
jmbfgpn.ru:1344
hoebfle.ru:9593
okllxlr.ru:8335
klqzrze.ru:6999
xwstyrt.ru:8627
qgfhmmm.ru:1886
ygdgryq.ru:5843
unsyisl.ru:7365
snzglco.ru:3268
fchbwme.ru:7533
iqaagar.ru:2919
flkpuod.ru:5796
zuenhrs.ru:9439
lqejyjg.ru:4627
rnpxxob.ru:6435
wfblfpf.ru:6213
rtimiek.ru:8829
wwlcwfm.ru:6925
enlnjjo.ru:9261
izqsopl.ru:5995
isunleo.ru:8898
pyxklqz.ru:1178
jgnagux.ru:1947
bmnjxrf.ru:3321
rdneunu.ru:8192
xeeqhzc.ru:3136
lzuotbw.ru:6897
nacsyza.ru:4728
ysypsgy.ru:9181
htlxcog.ru:5731
lmrmrhd.ru:7936
leukcji.ru:6142
hnqxekp.ru:8499
nqpcmec.ru:2261
kfjtgdi.ru:6667
ebrxjpn.ru:7391
frgshqb.ru:1235
jbbtebz.ru:6954
lptjyur.ru:5477
dcklmdq.ru:2132
gcmzkoj.ru:7157
nlusgem.ru:4994
lhxlmaa.ru:2467
qjxsxrp.ru:4791
eafpbwq.ru:9711
hytlhuo.ru:5351
uzukhxe.ru:6779
klyjris.ru:1676
zhwhiba.ru:8626
ehstyoa.ru:3634
jpinyex.ru:5897
hypbplf.ru:5382
kkqkuts.ru:8558
gjmgtxm.ru:1197
gpbfdsm.ru:2341
bigfydd.ru:6177
agrwedn.ru:9699
mbxhyhm.ru:8163
fsieoac.ru:7739
zxopbtb.ru:8932
mqcpqay.ru:3575
jwruxfb.ru:3394
ausywcu.ru:2344
omxmgjr.ru:4249
pguuuoz.ru:6175
isoxzzp.ru:2757
nexgjaw.ru:4866
daslxff.ru:4745
lpyxytj.ru:4341
cbnpocy.ru:8691
iikrikk.ru:7974
xwjktfk.ru:5587
kecnxuh.ru:7959
alqoulo.ru:8863
nghebtd.ru:4515
tgtssau.ru:1162
clzhfpj.ru:8956
nocsajf.ru:6815
yarppcz.ru:4466
wqaktzd.ru:9486
mgppfhr.ru:8894
tqiqblj.ru:7376
mjblqgq.ru:1614
thsjwdz.ru:1333
ztsmjim.ru:8954
deqtiwf.ru:4984
yjcghsq.ru:4768
xdkwiak.ru:4593
cwcizzr.ru:3449
hkwgsci.ru:2697
gfeyzkw.ru:3112
btxbgpn.ru:9541
xafywbk.ru:8723
lqcnqwt.ru:1298
koyejpl.ru:1488
celouwr.ru:2531
xlculao.ru:2339
pxrbmbx.ru:7936
aubmdkc.ru:5326
crmkxym.ru:8992
czplbkn.ru:2616
ufmixxl.ru:3477
oxdjjjt.ru:1992
cyexnif.ru:2875
eqzxnlb.ru:3245
ctndnhi.ru:4752
uleqcly.ru:6813
laytrjx.ru:2869
zkhzrxt.ru:8259
mqtdfkt.ru:7389
riyixpa.ru:4592
cwxnncm.ru:7397
gjektcp.ru:9557
ezqezht.ru:9746
sukmxqq.ru:6391
mkxzdbi.ru:9343
qwqxofl.ru:3437
pepxbwz.ru:4937
jgmnftf.ru:7133
hrlsqtr.ru:4154
tfjfznp.ru:3321
umbhbec.ru:7673
ocqjbpn.ru:4844
eznirek.ru:6377
xijfdxr.ru:6625
ongwqlh.ru:1428
tbytdez.ru:5382
fjmkjtc.ru:4358
otdbmfu.ru:3732
phgqsgh.ru:8944
hnnfexx.ru:2623
xixpihj.ru:6719
tnollzb.ru:5478
depjntc.ru:7221
gckbual.ru:4753
btbrhxs.ru:7285
fijkfsr.ru:6131
igsmbhs.ru:8444
bnjmsrn.ru:4796
rnoemeo.ru:8239
cskodtm.ru:7391
cxljfmk.ru:1345
ryfzsol.ru:7135
noyfceg.ru:9434
ylcybfk.ru:5111
eorafgn.ru:8275
uqywrnw.ru:2413
jleisys.ru:9418
chilnwg.ru:5739
turmxid.ru:5487
neczzpp.ru:7994
kdoxhst.ru:9264
mtendtd.ru:6737
uszpazd.ru:9757
obxbtjx.ru:9499
uwhuujl.ru:3688
huyzwcx.ru:8588
rmxmkfb.ru:8391
dxozjww.ru:7285
nwxincy.ru:7696
pbiuodk.ru:5938
tgabcac.ru:4974
glrbdjj.ru:8925
jdfdxiq.ru:9843
hqlpmuo.ru:4149
pisahhc.ru:6132
ecsyumr.ru:5538
thffmcz.ru:1856
segpykr.ru:2532
qyzayrq.ru:3782
izehxhc.ru:8597
lqbkoao.ru:9111
wtzbsfg.ru:3582
fotfuhu.ru:5493
lcombzd.ru:5494
dpisolc.ru:2456
ufsreyy.ru:1684
zuahbez.ru:1998
tlusgml.ru:1514
gpydnai.ru:9948
gffxboj.ru:6763
kgeijwr.ru:7883
gicayua.ru:7146
ybtctau.ru:4566
kxzlmgl.ru:2286
jqrwknz.ru:2343
aippdqp.ru:3548
nqgbwrc.ru:3514
eztjcdd.ru:9533
ngrewiy.ru:4741
laympng.ru:9255
jpdkyno.ru:8185
qbcukjo.ru:8727
wfgftmp.ru:1633
elownbr.ru:6667
lexepjx.ru:1136
ohhljkl.ru:4833
losoecd.ru:4759
fdtqatn.ru:3394
trmnscf.ru:8844
sbqkuta.ru:8233
ixpnjlc.ru:4278
dzrpljb.ru:6395
tzcctbh.ru:1792
ymazjhn.ru:5372
ktmexqc.ru:2845
jibidpo.ru:1299
kgbxdhz.ru:2735
xmlnmzq.ru:5219
ygsqqlm.ru:4976
dlxjliq.ru:1933
bwwcywe.ru:8326
bfzonye.ru:2424
hgkebgb.ru:5924
hgqpyqf.ru:1965
flwsrwg.ru:3369
fcemhac.ru:2413
ubsbzrc.ru:8419
eeerxss.ru:3399
umssjyr.ru:4245
rcdkopk.ru:8293
mdjjzhk.ru:9415
oqdmatb.ru:5918
lcojgwp.ru:7572
aqpbxyu.ru:4963
ywwhtmg.ru:5836
shshujg.ru:2565
akudehn.ru:5289
twpjueb.ru:2457
sokelcj.ru:3725
axinknm.ru:6115
bsoinab.ru:3973
uyjyepw.ru:7269
tlkimdc.ru:8139
jpoeejy.ru:8366
sdsbmwx.ru:3547
cgyspeu.ru:9911
adktspc.ru:6831
smxnsyw.ru:7555
kewgzwf.ru:2126
uckmlsh.ru:1297
rpizuhl.ru:3275
tupdfda.ru:6366
rdufuky.ru:1616
toxuciz.ru:2194
sjupxkf.ru:5252
irhhfgp.ru:2225
ysjxpds.ru:1472
jtekype.ru:1889
tsgqdua.ru:9371
qjozwdi.ru:4387
fkjrohi.ru:1816
hurzqfp.ru:4977
wcrofpm.ru:3649
gfnuycq.ru:7563
cgkmgry.ru:3782
qpcrbkf.ru:1831
fzczwkl.ru:2683
bkpfhco.ru:7915
atzmtfr.ru:5955
egglfrq.ru:6557
gprwsgp.ru:7428
filjlhy.ru:5878
dnycnth.ru:7994
ewfpnia.ru:3335
ucwzcaq.ru:5566
iqfquzk.ru:1262
jpedrgi.ru:5522
garmqyl.ru:3453
fzflwiz.ru:8174
ssnpaiw.ru:8114
rkgyidg.ru:1886
xztasbb.ru:1776
htbphkh.ru:4877
yidghhb.ru:6496
ehcopeg.ru:8577
rzlnkjz.ru:6989
apucekr.ru:9696
xrmchni.ru:6157
lqrgcwh.ru:6289
amciyfa.ru:6859
etwkdyh.ru:7385
krmdprs.ru:5389
kiczekw.ru:5816
jimnlmn.ru:1727
qwmcgcr.ru:6842
empsgqf.ru:8488
bhntons.ru:9551
fxqgeyb.ru:4494
knzjoko.ru:6545
occlgfi.ru:8676
matzdug.ru:1535
caooqkj.ru:2121
ppnoyse.ru:7619
ipgjzhr.ru:8414
dmuthgb.ru:3717
tuwelso.ru:9262
kksnuyw.ru:7495
uqpsxcj.ru:6322
utamuqk.ru:3146
nilgjtr.ru:5331
xhtmcco.ru:1356
mjmpmwb.ru:7433
hmnukfa.ru:3855
bzoqbhm.ru:4766
xumkkhk.ru:9598
jrgdlmo.ru:5683
lddkjxj.ru:9289
jrrnzmg.ru:9627
dutcimn.ru:5448
mqbphdd.ru:7878
pmygwwe.ru:9415
tseobjl.ru:1325
dksrzwm.ru:1357
yoixsnh.ru:9976
zebtkjx.ru:6333
qmznofx.ru:4431
srpgapd.ru:5989
xnzcgko.ru:4466
typycum.ru:8869
ykgonee.ru:8367
jpuyhfe.ru:9374
giuwubk.ru:8517
kxwjmaa.ru:7528
feelxyh.ru:4226
fewgcwu.ru:4311
ufbmdqk.ru:7491
pqecmgs.ru:7248
dwxosha.ru:9159
yfomalt.ru:9417
yakezat.ru:2231
fzcixup.ru:7481
cfythwr.ru:8725
trxdnkg.ru:2848
ceneekm.ru:8326
xgujowm.ru:2576
xbslkjr.ru:9623
auummzj.ru:4142
ejldgrm.ru:3881
ogteouk.ru:7187
klzkujx.ru:9653
ujgxebi.ru:2159
letyplj.ru:2692
uuzumuy.ru:2691
ddjscis.ru:4527
fxnclxg.ru:9466
bgabqaq.ru:9888
opujbny.ru:8752
ynaajbi.ru:3866
pouftfh.ru:9899
xplfnfd.ru:6119
cfdgnxy.ru:7647
tdtrshu.ru:4791
gmqmbgq.ru:7854
jacjaet.ru:4251
uzcrpik.ru:9115
fgemhwk.ru:9261
fnqosbx.ru:6213
yyhaqdh.ru:1692
ufxkukc.ru:6165
nbuciyi.ru:2651
ajgqyuo.ru:6943
ewzukgu.ru:1791
tkmdlth.ru:5949
kefnnkm.ru:7754
jnmlmxu.ru:4935
kbmljpz.ru:4125
pbztcze.ru:5646
qecoxsy.ru:1563
nfulmfp.ru:8754
wmwreax.ru:5393
pfakgnh.ru:3896
qqempnt.ru:5842
rjstupf.ru:3332
cdtrdue.ru:4669
yqnrtlk.ru:6654
cgrtbul.ru:5855
buoqcbf.ru:1778
zugkttn.ru:9168
zjahjuc.ru:3257
fhyywsj.ru:9531
sccazcj.ru:4969
ojabenz.ru:2762
ksjruzb.ru:2662
hzzajzm.ru:1795
lozjtpq.ru:9465
qruxwlo.ru:8599
utsctns.ru:5187
ahdyxto.ru:2293
nqzhmyh.ru:4558
ytpwmjg.ru:2531
hzmtaka.ru:9698
uobgicu.ru:4474
majhmwk.ru:1282
mdgjnqu.ru:9379
rfpjofm.ru:3962
zjsxasd.ru:1631
xqmorjp.ru:2619
hflayyz.ru:2268
dnptjeq.ru:9891
hjlntkd.ru:2243
mlsgekt.ru:4778
hdegrca.ru:3527
qngxzcq.ru:4766
bckxsrr.ru:9266
aosunxu.ru:7275
ptecbeg.ru:1866
llbfjfq.ru:5983
jsyxear.ru:1178
tunwidb.ru:3293
iahthwu.ru:9412
tzudgkj.ru:7488
pdjasbk.ru:9691
gohrlqa.ru:5878
errzrsy.ru:3711
shjxsge.ru:1136
tbqcjnh.ru:5942
tlshdap.ru:6623
ftqjead.ru:1837
msgwxxb.ru:9621
pzxukjn.ru:4856
zbwzkjk.ru:3668
abtmeuu.ru:9542
ibituqt.ru:5599
mmwzzuf.ru:3658
ojwclbm.ru:2354
gmxtogf.ru:3694
eiewwzd.ru:1816
ojkwebm.ru:1978
lssibsq.ru:7534
mgndypn.ru:4969
qufuscw.ru:4125
jpjckwm.ru:5197
ffhjdqi.ru:1972
xawgcpf.ru:9442
unbkwyy.ru:6489
sdjmgml.ru:8762
ziubash.ru:6935
bmjtahy.ru:7186
hawjdqc.ru:6592
igxnsrw.ru:6696
qrspfjm.ru:1416
gmezllo.ru:5772
wyksaap.ru:6527
jylrgtu.ru:8879
cxkdhkj.ru:5544
yruzyyj.ru:5342
mgyeetw.ru:4796
bhiyqrp.ru:3641
ewmioug.ru:8447
oktwtiy.ru:3823
afjmhze.ru:6675
gluyeib.ru:2988
zzkdsff.ru:3435
dlrxnpf.ru:5192
rzouzpx.ru:6167
tblhqpr.ru:9121
swhdiqb.ru:3842
fmexqmr.ru:8994
oucjjnx.ru:7136
zjojdsh.ru:9389
ubhqtci.ru:3312
qyclbpk.ru:6529
zlzbpfb.ru:8831
dznhldo.ru:7369
khxmrpy.ru:7439
irafpsb.ru:9595
hnibnwj.ru:8499
arabwpq.ru:9847
krqmeej.ru:7531
lbwadti.ru:1379
zoxusbk.ru:6992
zmflgfu.ru:1664
hkadsug.ru:1758
dplzhaa.ru:9459
yqmansh.ru:2987
acqgluu.ru:6745
zrlcwae.ru:2176
ywuofaj.ru:5786
siqkdla.ru:3851
txprjuh.ru:6787
zqkzjcc.ru:4865
roehicp.ru:4611
njfnwxs.ru:3211
hipwfjq.ru:6312
whrcboe.ru:6692
iummush.ru:1399
oqetipe.ru:6127
nlyqyot.ru:6318
pzuxllh.ru:3674
nicnuza.ru:9968
djpzwne.ru:6176
hawbsdi.ru:4325
plcgjrq.ru:7218
iirhfsa.ru:5165
ihwglat.ru:7186
lphnouk.ru:5612
zriyarg.ru:4239
tnirjrg.ru:7627
fsiaeez.ru:7276
gguauuw.ru:4927
bktydih.ru:1436
rnhnuab.ru:8994
ouawdrn.ru:5446
aemshiu.ru:7928
nesdodd.ru:6667
wmkpulm.ru:7369
wjxbhzt.ru:9426
coxsxzn.ru:8217
jejhsir.ru:3924
fxfrepq.ru:7993
zpzgoft.ru:2327
dxuwxqn.ru:7772
ryadnnw.ru:2248
xzjtjhw.ru:8793
gkbubbd.ru:7561
fwkzegw.ru:9811
rnygdsh.ru:1881
kgjirxp.ru:9466
umtksus.ru:8764
gykrnhk.ru:1257
hlagxyn.ru:1725
tcetzqc.ru:7572
ewgwlge.ru:8367
qnkikoc.ru:5955
gnfupad.ru:2486
auxlwnk.ru:5582
nsrwsss.ru:4689
uodjpam.ru:5477
dlzgaxy.ru:7816
sqgglfq.ru:4124
wemqmmn.ru:9518
ctopexm.ru:6628
itydlpt.ru:9196
qenrzcm.ru:6849
pstlcur.ru:2249
tbepsln.ru:1986
ofssdqy.ru:1783
qdzywso.ru:1527
liufgpd.ru:5245
kxkyxdc.ru:8361
phgjxiq.ru:3915
qutzzgq.ru:7965
hqaxkun.ru:3474
ykjfpqz.ru:2818
fxneume.ru:7343
xcojmfs.ru:6117
kimgwin.ru:8664
sttjksc.ru:7815
hxgtdbc.ru:7366
eisagqg.ru:2661
sfyybjy.ru:1181
csskjwz.ru:2612
ceamngd.ru:4633
xprlarc.ru:5285
cwwkxgy.ru:1319
krrlhnf.ru:3451
yorwnot.ru:4752
aaoerjh.ru:3988
ylzxzqa.ru:3376
nbgtrjq.ru:8825
jztlhxr.ru:3467
ezunseh.ru:8276
kymmrwp.ru:2191
hsnxooz.ru:2593
nxtuulf.ru:3632
zpmgwyq.ru:2519
ewqfnkk.ru:9611
fyrtnmz.ru:8829
tzmjthl.ru:7193
ggtwigw.ru:7639
poquuah.ru:9875
uabmjhj.ru:6925
tneumek.ru:2141
cxjlbdi.ru:3786
hkrhsxa.ru:4925
trlterr.ru:8213
qwnsuzu.ru:7951
ygrgaif.ru:1999
gdkysay.ru:7859
qjobwpr.ru:7589
jgwtldq.ru:2282
hrdpzhd.ru:2657
eauhfil.ru:9375
wetakzh.ru:1226
nenizfj.ru:9864
hmqqprf.ru:2536
hylblmg.ru:8646
bsrjcla.ru:4827
okpwnbd.ru:3878
pyrjbjb.ru:5164
kpcdrxa.ru:2949
igwxzac.ru:4496
lpdakbf.ru:6768
lcqccth.ru:3373
fuldoto.ru:4498
seirirn.ru:1646
pjbmimi.ru:5327
hsioefe.ru:4367
yzrkknm.ru:1342
zpgarur.ru:4363
ybyamsp.ru:6179
shbkurg.ru:9854
geemcty.ru:9132
jlutzjh.ru:3763
pdfbcdu.ru:1671
grbsjhl.ru:9922
deuaodf.ru:3531
tyewifc.ru:9171
ljhaxpn.ru:6678
mofmgoq.ru:3232
dqbbrsc.ru:8149
yjgqfuu.ru:9461
habhtqn.ru:4369
ijhstys.ru:1669
pjodcpe.ru:6525
aqhbxwl.ru:2724
lptxsgr.ru:4546
tcnkmjy.ru:4921
fokmxkq.ru:2846
flswitu.ru:5615
xpdfekk.ru:4283
brijmkr.ru:8699
isdymmi.ru:8788
uiceurm.ru:2788
lybsoji.ru:3451
iogqimb.ru:3737
nsqljdo.ru:7371
lrcnjeh.ru:6928
lonqgoo.ru:9617
fqiobmk.ru:9667
bkxaqaa.ru:2454
jzdookn.ru:6769
afmxcfg.ru:9229
npqqayr.ru:5533
jaiyobm.ru:8394
jjhzxjq.ru:3931
wankjre.ru:6326
tcbafmi.ru:4338
lsuhayk.ru:9972
uhqcaeb.ru:7814
gbonfub.ru:8731
nukilaj.ru:8831
hrtcinl.ru:4839
sfmqscp.ru:8151
glbganx.ru:8376
srcmwld.ru:3225
wjzrscj.ru:9157
slwhcdc.ru:5276
bumqymm.ru:2656
mqosets.ru:2937
hdkmntm.ru:7628
rglmaax.ru:7349
likfkre.ru:5129
iuudafx.ru:9368
qtajykx.ru:5394
dpxkrpx.ru:5722
qtbwwmu.ru:5917
aonwccz.ru:4383
siqjydm.ru:4588
siewjwl.ru:2744
olyqfou.ru:9316
buzqxyh.ru:7637
ewzofrh.ru:9717
jwkwott.ru:7381
ijgufri.ru:6357
pffqkej.ru:6316
wxlckif.ru:6364
eikzbib.ru:2422
wqidkmk.ru:9676
efryiia.ru:4516
mfbyese.ru:3795
kcwkibw.ru:2357
cuogrmg.ru:7244
mqbyrbz.ru:7512
ewintzk.ru:1328
jqlkild.ru:2366
fhemlsk.ru:2665
zfnqake.ru:2991
liqxblm.ru:4965
szdwode.ru:7834
shznprf.ru:7824
bcrsegk.ru:9756
axjcftx.ru:8555
mycqxsj.ru:5678
mmoakap.ru:8525
ncobbga.ru:6565
wdkeqmw.ru:1851
ciephnu.ru:1193
szcabsm.ru:7421
aefmxos.ru:3325
ehjcqna.ru:8768
xtmuoqx.ru:7379
ksewbpm.ru:9599
hyusqpl.ru:6676
nikidga.ru:2429
ofcohyc.ru:1776
jprufuw.ru:5599
gywmkxo.ru:3679
tpdydoc.ru:2515
hlmnbge.ru:2668
ugtjnha.ru:3384
ylnrwed.ru:6883
yeonfuh.ru:7967
qpnxmyd.ru:1919
eodlbiy.ru:6861
cnqoaje.ru:6165
dtudnyz.ru:5616
heswqth.ru:7296
zbstpng.ru:5631
httjhii.ru:1885
jaaheki.ru:2678
mrmbzpc.ru:4757
eqawnhi.ru:4985
ldlnulu.ru:1519
yznjict.ru:7212
rzdjjmh.ru:4422
enxsptj.ru:1144
mnfdmsb.ru:5954
yntrims.ru:9324
euucltb.ru:6276
nquhsae.ru:9195
iepghgd.ru:4421
hczujjr.ru:5856
mdhiyon.ru:2338
cpakaam.ru:6519
cbpiqje.ru:5463
yjmgmhb.ru:8294
gabtkjq.ru:3296
aeymhss.ru:3511
dlnjiwt.ru:7934
dsesyaz.ru:7893
lkifchk.ru:5742
rpddizx.ru:7298
jneahdb.ru:9812
boeghky.ru:6919
keobxha.ru:7914
bmpysoz.ru:4352
opkmiyu.ru:5141
oykswpc.ru:7267
bpiyzby.ru:7615
cwerhfe.ru:5268
xnelgkr.ru:5121
cqedcnz.ru:1246
dcipcxr.ru:1786
ktykhji.ru:4811
ehzikha.ru:9338
oohptqu.ru:8467
ogoomwo.ru:3668
hrpjumt.ru:3685
bnkxmtp.ru:5784
jdjyrbg.ru:7775
mjllcdz.ru:4929
gyhchaw.ru:4353
jdszptd.ru:6759
mfucmfr.ru:4772
fdhdane.ru:9295
mcjlldj.ru:5154
pkhlpuk.ru:3299
pwiuijq.ru:1555
ieeruhx.ru:6119
kjosjlb.ru:8649
jeskldn.ru:9539
aurwlkk.ru:4998
lkafbmg.ru:5735
hhpksqn.ru:4472
tjmfpfr.ru:2865
qwozpqk.ru:5965
ceopdhx.ru:7369
owuxaeg.ru:2199
lwcanyz.ru:2191
zrtijuj.ru:6557
mnoefhu.ru:7181
umuwngj.ru:2194
yygctpa.ru:7127
swehxgs.ru:6365
jozjxwd.ru:6129
pnpgeqt.ru:8258
yxegexd.ru:9321
nomfazn.ru:6952
nfszzmb.ru:3528
mrauaun.ru:8314
xqdhtcb.ru:5363
gngoktl.ru:9244
xltnkze.ru:9235
ihdixzj.ru:8939
ylfleau.ru:3638
garkbwd.ru:1139
xznsbpn.ru:7981
ktfyepe.ru:2197
ynyqphs.ru:9769
jcrgsxh.ru:3292
jrdzpes.ru:1774
ytsxelw.ru:5288
ngpwyar.ru:4612
mhdszxs.ru:7665
jfdrlby.ru:3915
bjnbwpa.ru:9767
hhmcdas.ru:2158
ardelnm.ru:1431
wzdoxms.ru:1324
tcduztt.ru:9283
tcfmizu.ru:7456
ujrdipf.ru:6747
lugzwmp.ru:5885
ikcrsjq.ru:8943
jpoefss.ru:4491
upqityf.ru:8999
psnpnwa.ru:1813
kcmzinf.ru:7328
aaoodtp.ru:6259
kzewawc.ru:2441
fyjadco.ru:1465
gdkxnny.ru:8467
qtlziii.ru:2712
erdygdr.ru:5888
tkgmqdt.ru:7177
ofnhlur.ru:4188
eghodcl.ru:5164
crnpksu.ru:7955
nlnjzuf.ru:3679
hzkuddj.ru:7796
bitzfal.ru:5826
pthmxes.ru:8593
qqpjzgn.ru:3776
gdcsfae.ru:1329
nrcxsde.ru:9383
tofcdad.ru:1525
iaqlmds.ru:8733
jrhuffw.ru:6617
atgyqcl.ru:6627
cicacac.ru:3654
lasfbcu.ru:5197
cxotkom.ru:5826
ytxhiur.ru:1516
odjmmmx.ru:8588
cbongtw.ru:2416
lqmpoii.ru:5151
epazgiz.ru:9946
lifkuxj.ru:6733
yccugsl.ru:2714
prlnqbh.ru:2388
amgmjrx.ru:2885
xmrfhnp.ru:9768
iwrzbhs.ru:3837
sbdiyru.ru:3743
wdoaqxb.ru:5273
gbrzamn.ru:3825
gqjtgdh.ru:2637
yidpsdu.ru:8276
smbeqmm.ru:7365
nlrorlh.ru:5216
htedifs.ru:1299
jnzwppc.ru:6347
uxdbixk.ru:9247
ealzzlz.ru:3466
addbgfz.ru:1173
jfwjtaf.ru:6565
qfowxjz.ru:2662
zwwshsm.ru:5599
pqzdazr.ru:6615
itdklze.ru:7463
wrcphsu.ru:7529
ejjhtxl.ru:2219
irtepsu.ru:8634
dymbzoj.ru:7541
shxtemc.ru:2543
wefxbkj.ru:1125
pheufeb.ru:9612
xanwydh.ru:1575
ednjcsk.ru:8291
iudlgij.ru:4964
bgrrnbt.ru:3927
huzguzp.ru:8281
aadhrpq.ru:5955
qwpfupw.ru:4637
tcgujwc.ru:1397
xintdim.ru:1119
yeuboxn.ru:5539
digkndw.ru:3485
dsmdwwp.ru:1588
tpfjfft.ru:7784
qxzfsyl.ru:8978
dhrjjea.ru:8715
lwtyiym.ru:3243
ucxxfby.ru:9915
appaiqf.ru:4329
ljkydwj.ru:6424
bfcmyef.ru:6448
nbrkyzb.ru:6637
qjgyfyl.ru:9322
ghiqeio.ru:5438
tludntx.ru:2412
tpnjrqn.ru:3197
tcloqxk.ru:2665
fttmxzd.ru:8318
poofsrw.ru:4373
xezlagl.ru:1971
jsqjglq.ru:9718
flxzyrk.ru:7977
jcznhuo.ru:4417
bxrpawx.ru:4323
bufwgbl.ru:7912
phlxhiq.ru:3372
iwfixru.ru:6698
wabxgow.ru:6644
kzqiaxs.ru:8472
jswyffk.ru:4167
ofajlne.ru:5613
oicrguy.ru:2794
fptfjhp.ru:1798
atynqiw.ru:9562
tcunesb.ru:4941
pymceyo.ru:8622
hxkogjd.ru:5361
lgjfnlc.ru:1625
myahwdw.ru:9736
jxglsrb.ru:8439
hfxmyuc.ru:7783
lrdfqmo.ru:5478
yayhsys.ru:2956
guzuocx.ru:4879
slyomey.ru:1496
xbeaeou.ru:4245
jgkrfug.ru:6944
jcxedce.ru:4724
njaqqmm.ru:9965
qywttuw.ru:6622
zchouql.ru:4156
pslgrxu.ru:3386
nzhozhf.ru:8149
gxkmjap.ru:8784
ynlfrxq.ru:7652
fjnyiua.ru:3259
mjigqfd.ru:3291
akbyewa.ru:8882
wmmcdfx.ru:4431
zagqgyq.ru:1329
cnyyadc.ru:9247
uqoootr.ru:6985
ajjfgch.ru:5843
heeosnm.ru:2295
ymdettz.ru:1694
pytfgcy.ru:6692
ggnfexi.ru:6983
ingpquh.ru:5281
mughaej.ru:8649
eewmtfn.ru:1995
czzqkyb.ru:9871
rubdixc.ru:1314
iptshrx.ru:3898
pkjhtfk.ru:3848
nswlmtn.ru:6711
iwkxhey.ru:8544
jpcbjya.ru:4523
dagccrl.ru:3616
gkituko.ru:1253
oppgjir.ru:9716
ufkkscz.ru:3172
msxxwbt.ru:1537
uwbohxm.ru:8919
ssayakm.ru:6854
eqnxozs.ru:5668
phamhog.ru:2958
aikdgon.ru:8777
jeqxqld.ru:4494
aaibqwf.ru:9858
sfojewl.ru:8526
gweoepp.ru:3516
psocwsu.ru:8366
gtumgew.ru:3325
szhmmdu.ru:3277
jddtkjw.ru:6154
irgshdc.ru:9381
gcrguxu.ru:6816
dxjeflu.ru:8954
iuquwuo.ru:4124
cqihocc.ru:3929
mscjuwg.ru:4193
ywnthta.ru:4733
yjggfpe.ru:6919
ejkjleh.ru:7819
ocilzid.ru:2928
xfpiuzb.ru:1794
kmagdlz.ru:7574
xpimmtl.ru:1415
oqwtmdj.ru:7427
gcoijep.ru:6831
iyndxyq.ru:1487
oggxinj.ru:1718
gnrtqcl.ru:9869
ghagndf.ru:8679
gkxauhi.ru:6216
bqgorhs.ru:7254
tgutgri.ru:5957
zlhbbxn.ru:1188
lpbkncg.ru:3749
hpqibie.ru:4463
cbthcma.ru:6639
ncmspdg.ru:1467
yrxqbmz.ru:9197
zfqfwgb.ru:4858
pjrijfh.ru:7762
zbqheot.ru:4546
gtmdfgy.ru:3444
xfxlyjh.ru:7171
famczxa.ru:7914
kbhonjn.ru:4831
jifdmng.ru:6523
iucwlqb.ru:5573
zkduggz.ru:3744
jzdsqxb.ru:3942
bbtabii.ru:6221
zunmtek.ru:4362
kfryzob.ru:5386
xggcbna.ru:2847
rpnfwis.ru:8556
hrqtlar.ru:1366
rhyfgdw.ru:1561
pbpjybc.ru:7612
semhnrd.ru:4914
kthhcbx.ru:1835
iowgprd.ru:2644
yhcbhjw.ru:7453
zkrufds.ru:2988
rbhogso.ru:6293
dafwdxh.ru:6382
baakqyg.ru:7772
hcbxqrx.ru:8479
ouebugr.ru:6114
dekmbio.ru:8227
tzydwkc.ru:3665
wrfnzxn.ru:7514
projtme.ru:1595
fyqasqy.ru:6884
ietohtg.ru:5354
hzbgqor.ru:7536
twnwzcc.ru:3875
ucqbewf.ru:6639
rgtlepj.ru:2587
kmchlsk.ru:3325
tpjiubk.ru:3998
xniswnw.ru:2514
hdoedsz.ru:6888
lmurlkl.ru:7569
dzmuftr.ru:2661
frexpcl.ru:6138
qbidymz.ru:3923
fhiexgb.ru:3528
eyrhbsz.ru:6622
lyutdmn.ru:3321
mqyygrn.ru:5994
qeapmcn.ru:3243
wnhnbjp.ru:9259
lweyfuy.ru:9142
dsuypdo.ru:7679
jkifkhs.ru:8997
ynstapg.ru:7213
oykqdkb.ru:3896
nlhbnae.ru:7692
rajglpg.ru:5443
nkytpbs.ru:7476
hjeqdkn.ru:3129
gbyighs.ru:9385
qrnqimb.ru:7227
hmajbca.ru:3319
otnxseg.ru:8799
qlyfbut.ru:8277
hzwwige.ru:9757
siubxlz.ru:7342
xnmxrqn.ru:2215
xqxhcyx.ru:3421
ewarhnh.ru:3896
iwohtjh.ru:9673
smeebdl.ru:4547
judeluu.ru:9581
lqduock.ru:3341
hknkcxx.ru:1482
drgsrgx.ru:5113
spsltmy.ru:1932
mwiftql.ru:2489
lgjdckp.ru:5765
ctoyjbo.ru:4141
ilozgwg.ru:5174
okgegpi.ru:9968
mpurzdh.ru:2317
zcajkfi.ru:5433
ycpjamq.ru:9616
kenwodz.ru:7514
mbtizlz.ru:9611
qttwghf.ru:5639
ghomqys.ru:5452
zenujfg.ru:6487
itpdhuu.ru:6848
wuckiog.ru:8853
izfwfik.ru:2423
slftqlx.ru:9135
cedkukj.ru:1392
mzrnpwd.ru:2682
xzregfo.ru:3586
hngkngf.ru:6947
ebhzopb.ru:6482
frnahwx.ru:7946
iymjkzy.ru:7851
afraqnq.ru:9682
ilrqhoz.ru:4293
klyhgqk.ru:6151
kliwwel.ru:4168
ldwsfty.ru:7825
agwlyrk.ru:2257
joohkhl.ru:7546
igdyazf.ru:4983
pphsaky.ru:3239
ktepddz.ru:3663
fxzfeyg.ru:3344
nzsnmsl.ru:9894
azwwxqx.ru:2998
ptmqtcg.ru:3932
clyrrjp.ru:8996
aerkbpn.ru:6442
wixlyrj.ru:8876
eodxcka.ru:4168
mdkbeum.ru:7779
ywmoowe.ru:9791
puixpwo.ru:7476
xxzpbub.ru:8888
ucixais.ru:3877
ywjreyn.ru:4441
zumxqlq.ru:2645
jkrcaie.ru:5126
hmgklyj.ru:3399
zqxrdut.ru:5122
ladfdnq.ru:3113
iapmeay.ru:8224
ljihaxw.ru:3218
xedpegq.ru:1454
yfrglar.ru:6276
jndtebs.ru:6575
cikhreo.ru:1431
giaoddm.ru:8837
zzomuss.ru:6797
qjswnlc.ru:4264
xzyyifa.ru:4929
cuzzcjk.ru:2582
lwzimzw.ru:3954
mscomsm.ru:6258
rakfrpe.ru:2927
nqwwayd.ru:7517
sjwiesm.ru:7245
jixgtij.ru:6461
yfpouqn.ru:3965
nfdsimz.ru:3421
yrafzig.ru:7554
ghanyhq.ru:9733
niyyrqu.ru:2827
lkzcjim.ru:8377
gubkywu.ru:7666
yktsiib.ru:4537
fyisaco.ru:4384
lesromu.ru:3229
bqmicrl.ru:8356
tzxlinh.ru:8124
ryxekzd.ru:9787
uksanye.ru:7329
aeshsdh.ru:4123
fzkjbdt.ru:8472
glrckzm.ru:2151
bthmkfk.ru:7442
oqpqpqz.ru:5393
ehzjyaw.ru:5639
nzdinwx.ru:5765
srftplj.ru:8194
stgankj.ru:1647
ffmnari.ru:5572
qugomrb.ru:9335
ekkpnzi.ru:8813
kbxbakz.ru:5371
mnpffpo.ru:8898
brykxtx.ru:8255
tsujkma.ru:5959
ptscnji.ru:9744
qhufnwc.ru:5769
obycbcr.ru:9463
dxqukzb.ru:5544
tyiledl.ru:9824
enfrzod.ru:4989
qosfkrg.ru:2134
qegdojn.ru:5955
rnidupn.ru:8327
wrusxzb.ru:3863
xlodmac.ru:1515
wtjgzgg.ru:5287
fwhqbzu.ru:2863
fznxhfs.ru:7681
stailto.ru:1561
lzpqtik.ru:6136
mmpnpbq.ru:8189
qfjjxre.ru:3593
bhnjkbt.ru:6541
tpdhigz.ru:4477
ggssktk.ru:3152
yeroxgq.ru:7292
swipwhn.ru:5776
rqhbdih.ru:5946
prfydgi.ru:4567
qyjgsza.ru:3119
njqrgiq.ru:7227
hpnqwze.ru:5838
popasdo.ru:1384
mssfgxq.ru:5386
aignsjf.ru:7898
wmpouto.ru:3649
qsggzel.ru:2965
fkwftzi.ru:9943
zuxbzof.ru:2483
dhupaxc.ru:8424
yyfwjnb.ru:7144
rtbekkx.ru:5134
dsuqwba.ru:9826
kdxziix.ru:9452
wufqhqd.ru:4996
zqzxtjq.ru:4555
rzstbbg.ru:1576
pyflxic.ru:9439
ljwsqmo.ru:4881
xlxfeik.ru:2895
zhqojnd.ru:4636
xbgetby.ru:8673
mtxmpjj.ru:6689
gufbqnj.ru:3761
hjzpjxc.ru:8659
nzpucog.ru:9848
awlhbck.ru:6476
brjzcfn.ru:2843
ggtloiu.ru:6725
bfzhdkf.ru:7768
rigraqa.ru:2335
ojtrkbq.ru:3469
gcigklp.ru:1239
tmcmnlh.ru:7629
uxnuwge.ru:1819
tddngig.ru:7491
uarcbre.ru:6194
fcqeupd.ru:1629
cmryfpx.ru:3264
mztsrcn.ru:5657
ytrqrry.ru:3834
fubuuzs.ru:5827
slxklqr.ru:1788
wphhepg.ru:8391
rmualhl.ru:2935
qjqxibx.ru:8514
xegheja.ru:2181
izbigkd.ru:7124
idqyrwr.ru:4452
sjyawuz.ru:9541
idaseeb.ru:2534
gswrzlk.ru:8366
hlnnbph.ru:9441
egpkxqx.ru:6353
tmzpheu.ru:4136
hksxqqd.ru:4335
fpgwzap.ru:1219
ilkpxin.ru:2484
lizlczs.ru:9795
eqpmlau.ru:2638
xhycqze.ru:4276
tjeimqy.ru:8935
cxnmids.ru:3369
jybmxwf.ru:2789
mtutgdj.ru:4768
hjqdfmk.ru:2132
llyesjt.ru:2642
anupqhy.ru:7466
cqjxnhu.ru:9455
mnmbpgt.ru:3164
gsrwrkn.ru:4147
raihrwr.ru:6231
fiproyi.ru:4524
sjluluw.ru:3641
ejphkci.ru:8133
zxjqdoq.ru:9588
iiacnbd.ru:9842
jsqksrs.ru:3254
cmgcxhk.ru:1444
sxzexbf.ru:7752
ixijxyp.ru:9959
wezhlrr.ru:4593
ceobdhz.ru:2715
eityowr.ru:3894
bbzwcst.ru:5665
kaagdag.ru:6272
gptcxqk.ru:7284
aiqhigq.ru:7828
cbtnksf.ru:8966
teexxqi.ru:4467
wnkndgo.ru:4229
gwonqmy.ru:3741
auaxwre.ru:8142
tybjqky.ru:1794
fdqjseq.ru:7648
itqemlf.ru:2522
tmogiha.ru:3123
hbnjmzo.ru:6633
qtdezow.ru:8712
dalirxe.ru:6811
tzynwyk.ru:6754
gtdfyhj.ru:2291
qrjqkee.ru:7459
xdjfjyj.ru:7198
miekmmn.ru:1221
lfxosyq.ru:6747
upjcnxi.ru:5261
qodisll.ru:4253
qnlsiks.ru:9941
maehgxh.ru:4277
tgnbmyl.ru:5963
ujqiome.ru:4697
ilxklpa.ru:8198
zxojjuj.ru:8174
qmfketl.ru:9958
oumapji.ru:2644
yraidtl.ru:3329
rszuxnt.ru:5659
aqlwgyi.ru:5792
gntpnqt.ru:5313
adcufdg.ru:3673
zqcjkmm.ru:9812
djufzin.ru:2796
niwucak.ru:1896
gmuexcp.ru:3873
dreopoo.ru:1746
mhpcsjx.ru:1999
kpacqcr.ru:8537
pniisni.ru:2762
mtxnasy.ru:9935
cjffhmd.ru:4133
gsgyjuo.ru:4478
kjruoul.ru:1567
errwaun.ru:4419
ycdpcon.ru:8185
xqqurho.ru:3298
jsarshi.ru:5427
tbetktn.ru:7891
acemdun.ru:5756
ssbujzf.ru:3261
lctuarc.ru:4555
cyxhcqi.ru:8591
pnutrwf.ru:9799
xzcrmax.ru:1593
qgrxoxk.ru:9558
rjsyfyk.ru:8213
pcnuaaz.ru:5564
wzoilpm.ru:8141
btiqrch.ru:8229
etijgya.ru:4756
joupwfw.ru:1734
srabjhu.ru:6842
amzgjdz.ru:9848
lsiqttc.ru:2967
ztcmneo.ru:8753
ohqnarq.ru:6787
utsihel.ru:7323
tghkxiy.ru:5285
pdtghgm.ru:9896
jxppedg.ru:3686
ipbcujr.ru:6637
jdpqkmd.ru:5679
ewfwmhy.ru:1226
wcwbmlt.ru:9221
seqldgl.ru:4557
wzrfoes.ru:6174
zhwyaig.ru:8115
ioceyyy.ru:2389
hwyxyee.ru:3737
ozqsgqg.ru:3147
psyrsyd.ru:9989
lrbadok.ru:1499
dyefqkf.ru:1133
ecskcii.ru:8193
hwdsxqr.ru:4159
fahaabq.ru:3238
qcddyqb.ru:4893
fyghrun.ru:9674
eeampxm.ru:8272
orwuhsg.ru:7871
zjfpdel.ru:6146
bifhrig.ru:1158
pauzyry.ru:1437
zcfsftp.ru:2756
adfaeib.ru:1911
mrswfen.ru:6843
prdmxdd.ru:9335
ccthkhf.ru:2671
cuytqcr.ru:7476
wemlmgy.ru:3688
kaydfli.ru:4286
usyzefa.ru:8211
gnremae.ru:1152
Signatures
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 3968 svchost.exe -
Executes dropped EXE 2 IoCs
Processes:
d7a8d09d.exed7a8d09d.exepid process 2432 d7a8d09d.exe 2892 d7a8d09d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{E6072832-284F-837E-B7D4-CD811475628E} = "c:\\programdata\\{7a170002-007f-1f6e-b7d4-cd811475628e}\\d7a8d09d.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{E6072832-284F-837E-B7D4-CD811475628E} = "c:\\programdata\\{7A170002-007F-1F6E-B7D4-CD811475628E}\\d7a8d09d.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
f7ba9baf-82b3-546b-222c-2f2551e2f1da.exed7a8d09d.exedescription pid process target process PID 3052 set thread context of 3624 3052 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 2432 set thread context of 2892 2432 d7a8d09d.exe d7a8d09d.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exef7ba9baf-82b3-546b-222c-2f2551e2f1da.exef7ba9baf-82b3-546b-222c-2f2551e2f1da.exesvchost.exenotepad.exed7a8d09d.exed7a8d09d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7a8d09d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7a8d09d.exe -
Checks SCSI registry key(s) 3 TTPs 10 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
d7a8d09d.exef7ba9baf-82b3-546b-222c-2f2551e2f1da.exetaskmgr.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName d7a8d09d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 d7a8d09d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Modifies registry class 6 IoCs
Processes:
svchost.exetaskmgr.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\CLSID\{7A170001-007C-1F6E-B7D4-CD811475628E}\ = "1725505760" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\CLSID\{203227FF-2782-454B-B7D4-CD811475628E} svchost.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\CLSID\{7A170001-007C-1F6E-B7D4-CD811475628E} svchost.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\CLSID\{203227FF-2782-454B-B7D4-CD811475628E} svchost.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\CLSID\{7A170001-007C-1F6E-B7D4-CD811475628E} svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f7ba9baf-82b3-546b-222c-2f2551e2f1da.exesvchost.exetaskmgr.exetaskmgr.exed7a8d09d.exesvchost.exepid process 3624 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe 3624 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe 3968 svchost.exe 3968 svchost.exe 3968 svchost.exe 3968 svchost.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2892 d7a8d09d.exe 2892 d7a8d09d.exe 1992 svchost.exe 1992 svchost.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 2360 taskmgr.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
f7ba9baf-82b3-546b-222c-2f2551e2f1da.exed7a8d09d.exepid process 3624 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe 2892 d7a8d09d.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
taskmgr.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 1756 taskmgr.exe Token: SeSystemProfilePrivilege 1756 taskmgr.exe Token: SeCreateGlobalPrivilege 1756 taskmgr.exe Token: 33 1756 taskmgr.exe Token: SeIncBasePriorityPrivilege 1756 taskmgr.exe Token: SeDebugPrivilege 2360 taskmgr.exe Token: SeSystemProfilePrivilege 2360 taskmgr.exe Token: SeCreateGlobalPrivilege 2360 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exetaskmgr.exepid process 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 1756 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe 2360 taskmgr.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
f7ba9baf-82b3-546b-222c-2f2551e2f1da.exef7ba9baf-82b3-546b-222c-2f2551e2f1da.exesvchost.exenotepad.exed7a8d09d.exed7a8d09d.exesvchost.exedescription pid process target process PID 3052 wrote to memory of 3624 3052 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3052 wrote to memory of 3624 3052 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3052 wrote to memory of 3624 3052 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3052 wrote to memory of 3624 3052 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3052 wrote to memory of 3624 3052 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3052 wrote to memory of 3624 3052 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3052 wrote to memory of 3624 3052 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3052 wrote to memory of 3624 3052 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3052 wrote to memory of 3624 3052 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3624 wrote to memory of 3968 3624 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe svchost.exe PID 3624 wrote to memory of 3968 3624 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe svchost.exe PID 3624 wrote to memory of 3968 3624 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe svchost.exe PID 3624 wrote to memory of 3968 3624 f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe svchost.exe PID 3968 wrote to memory of 3052 3968 svchost.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3968 wrote to memory of 3052 3968 svchost.exe f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe PID 3968 wrote to memory of 1488 3968 svchost.exe notepad.exe PID 3968 wrote to memory of 1488 3968 svchost.exe notepad.exe PID 3968 wrote to memory of 1488 3968 svchost.exe notepad.exe PID 3968 wrote to memory of 1488 3968 svchost.exe notepad.exe PID 3968 wrote to memory of 1488 3968 svchost.exe notepad.exe PID 1488 wrote to memory of 2432 1488 notepad.exe d7a8d09d.exe PID 1488 wrote to memory of 2432 1488 notepad.exe d7a8d09d.exe PID 1488 wrote to memory of 2432 1488 notepad.exe d7a8d09d.exe PID 2432 wrote to memory of 2892 2432 d7a8d09d.exe d7a8d09d.exe PID 2432 wrote to memory of 2892 2432 d7a8d09d.exe d7a8d09d.exe PID 2432 wrote to memory of 2892 2432 d7a8d09d.exe d7a8d09d.exe PID 2432 wrote to memory of 2892 2432 d7a8d09d.exe d7a8d09d.exe PID 2432 wrote to memory of 2892 2432 d7a8d09d.exe d7a8d09d.exe PID 2432 wrote to memory of 2892 2432 d7a8d09d.exe d7a8d09d.exe PID 2432 wrote to memory of 2892 2432 d7a8d09d.exe d7a8d09d.exe PID 2432 wrote to memory of 2892 2432 d7a8d09d.exe d7a8d09d.exe PID 2432 wrote to memory of 2892 2432 d7a8d09d.exe d7a8d09d.exe PID 2892 wrote to memory of 1992 2892 d7a8d09d.exe svchost.exe PID 2892 wrote to memory of 1992 2892 d7a8d09d.exe svchost.exe PID 2892 wrote to memory of 1992 2892 d7a8d09d.exe svchost.exe PID 2892 wrote to memory of 1992 2892 d7a8d09d.exe svchost.exe PID 1992 wrote to memory of 1488 1992 svchost.exe notepad.exe PID 1992 wrote to memory of 1488 1992 svchost.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe"C:\Users\Admin\AppData\Local\Temp\f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe"C:\Users\Admin\AppData\Local\Temp\f7ba9baf-82b3-546b-222c-2f2551e2f1da.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Deletes itself
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
\??\c:\programdata\{7A170002-007F-1F6E-B7D4-CD811475628E}\d7a8d09d.exec:\programdata\{7A170002-007F-1F6E-B7D4-CD811475628E}\d7a8d09d.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\programdata\{7A170002-007F-1F6E-B7D4-CD811475628E}\d7a8d09d.exec:\programdata\{7A170002-007F-1F6E-B7D4-CD811475628E}\d7a8d09d.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992
-
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1996
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1756
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5bfef91bacc33b5424ea2a40245fd9039
SHA1a9c60eb8dabc24b04eaf99c3c613f6d5c1a19b41
SHA256f2bae4d8912682525ecd787fb921c3b57d8672c44ea73eb23c0ab278cf1fb939
SHA51219de586b1ec80cabd40d78e02e7cd8f5d868c9a907433dc9b6fb16747157d4a613d17cad43e249841cb841b0838bd33cf15eb413d8510f62975ef6c0b24ff2e3
-
Filesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93