Analysis
-
max time kernel
234s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 13:40
Behavioral task
behavioral1
Sample
remcos_a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
remcos_a.exe
Resource
win10v2004-20240802-en
General
-
Target
remcos_a.exe
-
Size
469KB
-
MD5
722834785974c29b7422d7d06012ce78
-
SHA1
f1d099552614514b690a6eaa1db898601dd38ce0
-
SHA256
d819e34aab150310ecd4730140f3568bcc72531c9959e80353497e0f700fecb8
-
SHA512
2020af70096abef0623a792471eccf2e7cdb44393304d4f50e71dc16cf8e9a185328bc209a5bfc09b67c6dc7d76319b28b2fc249388c4341ab82be6c289e4af8
-
SSDEEP
12288:Imnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSjn9:4iLJbpI7I2WhQqZ7j9
Malware Config
Extracted
remcos
RemoteHost
firsyt205919-48538.portmap.host:48538
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%SystemDrive%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%WinDir%\System32
-
mouse_option
false
-
mutex
Rmc-MV66H0
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
Screenshots
-
screenshot_path
%Temp%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
true
-
take_screenshot_time
5
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation remcos_a.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 4040 remcos.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" remcos_a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" remcos_a.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\Remcos\\remcos.exe\"" remcos.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: iexplore.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\keyboard.inf_amd64_5938c699b80ebb8f\keyboard.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF dxdiag.exe File opened for modification C:\Windows\SysWOW64\remcos\logs.dat iexplore.exe File created C:\Windows\SysWOW64\remcos\logs.dat iexplore.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\input.inf_amd64_adeb6424513f60a2\input.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\machine.inf_amd64_b748590104fe1c15\machine.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF dxdiag.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4040 set thread context of 4388 4040 remcos.exe 91 PID 4388 set thread context of 3888 4388 iexplore.exe 92 PID 4388 set thread context of 1864 4388 iexplore.exe 109 PID 4388 set thread context of 4240 4388 iexplore.exe 110 PID 4388 set thread context of 2864 4388 iexplore.exe 111 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos_a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs dxdiag.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "58" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings remcos_a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\ = "DxDiagClassObject Class" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove\ = "Programmable" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\InprocServer32 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ = "C:\\Windows\\SysWOW64\\dxdiagn.dll" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7} dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\VersionIndependentProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID\ = "DxDiag.DxDiagClassObject" dxdiag.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{201FF0C1-A5D3-48A4-A56C-09BD53116801} dxdiag.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{5B1AA680-3FA0-47CF-9FFC-C5187FEE4B2E} dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\ProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ThreadingModel = "Apartment" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1 dxdiag.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4040 remcos.exe 4040 remcos.exe 2500 dxdiag.exe 2500 dxdiag.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4388 iexplore.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4040 remcos.exe 4388 iexplore.exe 4388 iexplore.exe 4388 iexplore.exe 4388 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 4268 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4268 AUDIODG.EXE Token: SeShutdownPrivilege 4388 iexplore.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4388 iexplore.exe 4388 iexplore.exe 4388 iexplore.exe 4388 iexplore.exe 4388 iexplore.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4388 iexplore.exe 2500 dxdiag.exe 2516 LogonUI.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4728 wrote to memory of 4708 4728 remcos_a.exe 85 PID 4728 wrote to memory of 4708 4728 remcos_a.exe 85 PID 4728 wrote to memory of 4708 4728 remcos_a.exe 85 PID 4708 wrote to memory of 1436 4708 WScript.exe 87 PID 4708 wrote to memory of 1436 4708 WScript.exe 87 PID 4708 wrote to memory of 1436 4708 WScript.exe 87 PID 1436 wrote to memory of 4040 1436 cmd.exe 90 PID 1436 wrote to memory of 4040 1436 cmd.exe 90 PID 1436 wrote to memory of 4040 1436 cmd.exe 90 PID 4040 wrote to memory of 4388 4040 remcos.exe 91 PID 4040 wrote to memory of 4388 4040 remcos.exe 91 PID 4040 wrote to memory of 4388 4040 remcos.exe 91 PID 4040 wrote to memory of 4388 4040 remcos.exe 91 PID 4388 wrote to memory of 3888 4388 iexplore.exe 92 PID 4388 wrote to memory of 3888 4388 iexplore.exe 92 PID 4388 wrote to memory of 3888 4388 iexplore.exe 92 PID 4388 wrote to memory of 3888 4388 iexplore.exe 92 PID 4388 wrote to memory of 2500 4388 iexplore.exe 102 PID 4388 wrote to memory of 2500 4388 iexplore.exe 102 PID 4388 wrote to memory of 2500 4388 iexplore.exe 102 PID 4388 wrote to memory of 1864 4388 iexplore.exe 109 PID 4388 wrote to memory of 1864 4388 iexplore.exe 109 PID 4388 wrote to memory of 1864 4388 iexplore.exe 109 PID 4388 wrote to memory of 1864 4388 iexplore.exe 109 PID 4388 wrote to memory of 4240 4388 iexplore.exe 110 PID 4388 wrote to memory of 4240 4388 iexplore.exe 110 PID 4388 wrote to memory of 4240 4388 iexplore.exe 110 PID 4388 wrote to memory of 4240 4388 iexplore.exe 110 PID 4388 wrote to memory of 2864 4388 iexplore.exe 111 PID 4388 wrote to memory of 2864 4388 iexplore.exe 111 PID 4388 wrote to memory of 2864 4388 iexplore.exe 111 PID 4388 wrote to memory of 2864 4388 iexplore.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\remcos_a.exe"C:\Users\Admin\AppData\Local\Temp\remcos_a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Remcos\remcos.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Remcos\remcos.exeC:\Remcos\remcos.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4040 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:3888
-
-
C:\Windows\SysWOW64\dxdiag.exe"C:\Windows\System32\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\sysinfo.txt6⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1864
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:4240
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2864
-
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x4dc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b3055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD5722834785974c29b7422d7d06012ce78
SHA1f1d099552614514b690a6eaa1db898601dd38ce0
SHA256d819e34aab150310ecd4730140f3568bcc72531c9959e80353497e0f700fecb8
SHA5122020af70096abef0623a792471eccf2e7cdb44393304d4f50e71dc16cf8e9a185328bc209a5bfc09b67c6dc7d76319b28b2fc249388c4341ab82be6c289e4af8
-
Filesize
362B
MD5bf073fea4f0dc0dd4396a28625365359
SHA1ade8ba17f8966408e913ed6fef7f8a74edba4c5f
SHA256051b2712be665237334d3ce6faa46eb64e7742587736385ea0162c4fa64ba59a
SHA512f76deba47027204bfce82d62c21b87ec51e1c2f97a4c1575ab7b64fe7de47659d4f1f8a5f228a3446789353d7bf359ddb257d98340c75974139bc3afc002d446
-
Filesize
84KB
MD5f566803d770871bd4b5746aeb68bb12e
SHA1f43313d2fdbe45cdd58a4ca51fbd4307a3ad8a02
SHA256c4ba6e5257449d6f155072e61ccd48e21614db82d46247ad68d63c1a7dc3f467
SHA512f651f4c16a7e17990b4ed8157bbf9937b8cc2b33c7baf64f2e12e6c4d36a30d71ed7c3168991aa8800d11b55390f1f572ccd198f920d90a12053caace8e0d47d
-
Filesize
270B
MD57321a71bc369a2abc6857af1f7441dd1
SHA183d40c65a2962c8290a9783a2ff0afa560b12720
SHA2565bf78b1a0d7794ee36e26e336376d3c76640bf727363074b0a710508d01cc40b
SHA512837f50adb1b5a17f83e56ef2e529d08aef1e006cc6d2b6b03400f6bfb88b7a7e0130f66849cf1d8ed236024d59becf5ba24eff8e1cfe81b0696f1f53c476fce6
-
Filesize
344B
MD5362943a23c2b384141026d5500a40ab1
SHA147d8b7028120faf1d7b05d5878d246a208ea7030
SHA25647e0abd34ae991059ce1adffc06f59cb90a1fab12d657a98f1ef2924fd5ef56c
SHA5120c4a34dbc3730fb49c0ba842bcd848e60c917cf3c0e6665c01fec43e1f6674b90c48d15401df05613edd3af7d61c1757a7a7419ff0c0a3b239b1b645929ccc70
-
Filesize
608B
MD5819fcb972ecc16ed70fc604b4db1aaad
SHA18743bc2dbf7f3eb7fd80cd878c9626b1d3518998
SHA2564e8d4ebf5d41e9b677136adf77ec58bb600625ec6da901a4dedaccd74f86dc29
SHA512f5ea5f903b54f2c0e43a8e86ea534ba0e883235b2a187f103f3311ad905b69e198c124b47cd18021b0f13bb367cd4109d6e30b6632761ee2c9e4dc36366f4e6a
-
Filesize
672B
MD5bd7a12fa74e854ed0648629728adff94
SHA14ea2e964c16e51a07ff5561bff7779f2f89b5d34
SHA2560416c1681a2fc671b2abdbf55e347f9d5de340150d01b509ce96c30019e5ed0c
SHA512b43390b0d647d0f5dc4586eb890901c3de609550303227394b4a36e746dfbd66ac8f2ecea88a205f812e0adc8bd3ae0005f6a9554421392b41897c3c575c8e92
-
Filesize
754B
MD5fb3a3deeecf2c31dd21414065cba73a3
SHA14ffd84fe639b2bbd08dddf9e2748a10214b128df
SHA256ee0c6027039267ee0d90fc4ff864155675ba66d44ce35ec67ff60cd1bf2b6785
SHA512d57bef0c4f79396e0073654d385dff8330e2d5e0fd1a4e2402476475ee753c9ec11f3e55e853f586d5d945d50a977ab1936b634838debe801c4e0339d8af8d3f
-
Filesize
1KB
MD57e5dac6a53b06004e9bf582259701b23
SHA159f046ed2944b08c6330a7dcf29790686f0009f1
SHA2564fd9fd0e4f485f2a8f5a7e2a4f520a34636c36c5c79a132081ab38d005b369c7
SHA512b2d82dd8b862b7bf8715b8cbded440cfd12ad2e53607b8be427b376742b57004bf5d0071224a1739051eafe4851a0440dfec4910cbe7b01304b4ae294823cca5
-
Filesize
184B
MD5b88dc8085ff52e20922fc006e5984489
SHA1122b7c6c5934c239562d539a880cc8fd1c53707b
SHA256af33cd746d697607a7e0fe64f38341dd3fcc4d04965eb2871c8e4600ce85a520
SHA512b46fe1725d707d249efadc1adef79ec79ab896e4043c7e247c7d6a1817902a72bc869516cec45bac26ed841b847292e103b04da2ba47b92c67e5d638f867d0f9