Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
a458c9dd995ecbd8c329fd9b4018a5f0N.exe
Resource
win7-20240903-en
General
-
Target
a458c9dd995ecbd8c329fd9b4018a5f0N.exe
-
Size
6.2MB
-
MD5
a458c9dd995ecbd8c329fd9b4018a5f0
-
SHA1
08a4b9c7238f14c11f896a6b99ad5bc6eadc4345
-
SHA256
0c7765593b0576f6aa16f676b786c4d59da82dbd9840fa2cd86972722208780b
-
SHA512
9c854fff02a9b8f5e1110a748f2cf5c3b8301fdc51570ebadad36b588d1c4625d14bcb2aa795fcaf963b1c34bdaa09e2227ef8f3e87f9e6c0366e36a3a93eadb
-
SSDEEP
196608:6WWjrx+kYfj+uwyzYRUlh+vzWnoHavRfuOzk:6Noi+z2UlQzWoHMduOQ
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1788 attrib.exe 444 attrib.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2920 Rar.exe 716 7z.exe 2944 Rar.exe 2704 7z.exe 2712 Rar.exe 1624 7z.exe 2316 Rar.exe 1656 7z.exe 1784 Rar.exe 1240 7z.exe 372 Rar.exe 2412 7z.exe 2804 Rar.exe 1080 7z.exe 2128 Rar.exe 824 7z.exe 2728 Rar.exe 1084 7z.exe 236 Rar.exe 2436 7z.exe 904 Rar.exe 3020 7z.exe 1004 Rar.exe 1884 7z.exe 1324 Rar.exe 1996 7z.exe 644 Rar.exe 2400 7z.exe 2332 Rar.exe 2784 7z.exe 2696 Rar.exe 1172 7z.exe 2532 Rar.exe 2756 7z.exe 592 Rar.exe 1376 7z.exe 820 Rar.exe 1016 7z.exe 1948 Rar.exe 2720 7z.exe 2560 Rar.exe 1096 7z.exe 2672 Rar.exe 2764 7z.exe 1976 Rar.exe 376 7z.exe 300 Rar.exe 2796 7z.exe 2908 Rar.exe 2152 7z.exe 2408 Rar.exe 2528 7z.exe 1556 Rar.exe 916 7z.exe 1644 Rar.exe 2436 7z.exe 2348 Rar.exe 2604 7z.exe 1716 Rar.exe 1884 7z.exe 1096 Rar.exe 2164 7z.exe 1204 Rar.exe 2400 7z.exe -
Loads dropped DLL 64 IoCs
pid Process 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 716 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 2704 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 1624 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 1656 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 1240 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 2412 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 1080 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 824 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 1084 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 2436 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 3020 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 1884 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 1996 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 2400 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 2784 7z.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 1172 7z.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000500000001a4bc-797.dat upx behavioral1/files/0x00350000000193be-862.dat upx behavioral1/memory/1860-871-0x0000000000400000-0x00000000004BB000-memory.dmp upx behavioral1/memory/1860-873-0x0000000000400000-0x00000000004BB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a458c9dd995ecbd8c329fd9b4018a5f0N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2572 2112 a458c9dd995ecbd8c329fd9b4018a5f0N.exe 30 PID 2112 wrote to memory of 2572 2112 a458c9dd995ecbd8c329fd9b4018a5f0N.exe 30 PID 2112 wrote to memory of 2572 2112 a458c9dd995ecbd8c329fd9b4018a5f0N.exe 30 PID 2112 wrote to memory of 2572 2112 a458c9dd995ecbd8c329fd9b4018a5f0N.exe 30 PID 2112 wrote to memory of 2572 2112 a458c9dd995ecbd8c329fd9b4018a5f0N.exe 30 PID 2112 wrote to memory of 2572 2112 a458c9dd995ecbd8c329fd9b4018a5f0N.exe 30 PID 2112 wrote to memory of 2572 2112 a458c9dd995ecbd8c329fd9b4018a5f0N.exe 30 PID 2572 wrote to memory of 2592 2572 WScript.exe 31 PID 2572 wrote to memory of 2592 2572 WScript.exe 31 PID 2572 wrote to memory of 2592 2572 WScript.exe 31 PID 2572 wrote to memory of 2592 2572 WScript.exe 31 PID 2572 wrote to memory of 2592 2572 WScript.exe 31 PID 2572 wrote to memory of 2592 2572 WScript.exe 31 PID 2572 wrote to memory of 2592 2572 WScript.exe 31 PID 2592 wrote to memory of 2920 2592 cmd.exe 33 PID 2592 wrote to memory of 2920 2592 cmd.exe 33 PID 2592 wrote to memory of 2920 2592 cmd.exe 33 PID 2592 wrote to memory of 2920 2592 cmd.exe 33 PID 2592 wrote to memory of 2920 2592 cmd.exe 33 PID 2592 wrote to memory of 2920 2592 cmd.exe 33 PID 2592 wrote to memory of 2920 2592 cmd.exe 33 PID 2592 wrote to memory of 716 2592 cmd.exe 34 PID 2592 wrote to memory of 716 2592 cmd.exe 34 PID 2592 wrote to memory of 716 2592 cmd.exe 34 PID 2592 wrote to memory of 716 2592 cmd.exe 34 PID 2592 wrote to memory of 716 2592 cmd.exe 34 PID 2592 wrote to memory of 716 2592 cmd.exe 34 PID 2592 wrote to memory of 716 2592 cmd.exe 34 PID 2592 wrote to memory of 2944 2592 cmd.exe 35 PID 2592 wrote to memory of 2944 2592 cmd.exe 35 PID 2592 wrote to memory of 2944 2592 cmd.exe 35 PID 2592 wrote to memory of 2944 2592 cmd.exe 35 PID 2592 wrote to memory of 2944 2592 cmd.exe 35 PID 2592 wrote to memory of 2944 2592 cmd.exe 35 PID 2592 wrote to memory of 2944 2592 cmd.exe 35 PID 2592 wrote to memory of 2704 2592 cmd.exe 36 PID 2592 wrote to memory of 2704 2592 cmd.exe 36 PID 2592 wrote to memory of 2704 2592 cmd.exe 36 PID 2592 wrote to memory of 2704 2592 cmd.exe 36 PID 2592 wrote to memory of 2704 2592 cmd.exe 36 PID 2592 wrote to memory of 2704 2592 cmd.exe 36 PID 2592 wrote to memory of 2704 2592 cmd.exe 36 PID 2592 wrote to memory of 2712 2592 cmd.exe 37 PID 2592 wrote to memory of 2712 2592 cmd.exe 37 PID 2592 wrote to memory of 2712 2592 cmd.exe 37 PID 2592 wrote to memory of 2712 2592 cmd.exe 37 PID 2592 wrote to memory of 2712 2592 cmd.exe 37 PID 2592 wrote to memory of 2712 2592 cmd.exe 37 PID 2592 wrote to memory of 2712 2592 cmd.exe 37 PID 2592 wrote to memory of 1624 2592 cmd.exe 38 PID 2592 wrote to memory of 1624 2592 cmd.exe 38 PID 2592 wrote to memory of 1624 2592 cmd.exe 38 PID 2592 wrote to memory of 1624 2592 cmd.exe 38 PID 2592 wrote to memory of 1624 2592 cmd.exe 38 PID 2592 wrote to memory of 1624 2592 cmd.exe 38 PID 2592 wrote to memory of 1624 2592 cmd.exe 38 PID 2592 wrote to memory of 2316 2592 cmd.exe 39 PID 2592 wrote to memory of 2316 2592 cmd.exe 39 PID 2592 wrote to memory of 2316 2592 cmd.exe 39 PID 2592 wrote to memory of 2316 2592 cmd.exe 39 PID 2592 wrote to memory of 2316 2592 cmd.exe 39 PID 2592 wrote to memory of 2316 2592 cmd.exe 39 PID 2592 wrote to memory of 2316 2592 cmd.exe 39 PID 2592 wrote to memory of 1656 2592 cmd.exe 40 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1788 attrib.exe 444 attrib.exe 2084 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a458c9dd995ecbd8c329fd9b4018a5f0N.exe"C:\Users\Admin\AppData\Local\Temp\a458c9dd995ecbd8c329fd9b4018a5f0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\run.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\installer.bat" "3⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "Common".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "Common".zip "Common".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "DissolveAnother".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "DissolveAnother".zip "DissolveAnother".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "DissolveNoise".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "DissolveNoise".zip "DissolveNoise".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "Filters".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "Filters".zip "Filters".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "Parity".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "Parity".zip "Parity".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMCCPHR".exe #\*4⤵
- Executes dropped EXE
PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMCCPHR".zip "IMCCPHR".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMEAPIS".exe #\*4⤵
- Executes dropped EXE
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMEAPIS".zip "IMEAPIS".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "imecfm".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "imecfm".zip "imecfm".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:824
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMEPADSM".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMEPADSM".zip "IMEPADSM".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMEPADSV".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:236
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMEPADSV".zip "IMEPADSV".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMETIP".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMETIP".zip "IMETIP".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "imever".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "imever".zip "imever".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMJKAPI".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMJKAPI".zip "IMJKAPI".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "MSCAND20".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "MSCAND20".zip "MSCAND20".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMCCPHR".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMCCPHR".zip "IMCCPHR".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMCCPHR".exe #\*4⤵
- Executes dropped EXE
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMCCPHR".zip "IMCCPHR".exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMEAPIS".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMEAPIS".zip "IMEAPIS".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMEAPIS".exe #\*4⤵
- Executes dropped EXE
PID:592
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMEAPIS".zip "IMEAPIS".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "imecfm".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "imecfm".zip "imecfm".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "imecfm".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "imecfm".zip "imecfm".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMEPADSM".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMEPADSM".zip "IMEPADSM".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMEPADSM".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMEPADSM".zip "IMEPADSM".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMEPADSV".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMEPADSV".zip "IMEPADSV".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:376
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMEPADSV".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:300
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMEPADSV".zip "IMEPADSV".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMETIP".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMETIP".zip "IMETIP".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMETIP".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMETIP".zip "IMETIP".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "imever".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "imever".zip "imever".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "imever".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "imever".zip "imever".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMJKAPI".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMJKAPI".zip "IMJKAPI".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "IMJKAPI".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "IMJKAPI".zip "IMJKAPI".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "MSCAND20".exe #\*4⤵
- Executes dropped EXE
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "MSCAND20".zip "MSCAND20".exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Rar.exerar a -r -sfx -m5 -ep1 -zsfx.conf "MSCAND20".exe #\*4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe7z a -tzip -mx=0 "MSCAND20".zip "MSCAND20".exe4⤵
- Executes dropped EXE
PID:2400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "4⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /L "5."4⤵PID:2732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" VER "4⤵PID:1712
-
-
C:\Windows\SysWOW64\findstr.exeFINDSTR /L "6."4⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\AppCache\x864⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1788
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\AppCache4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:444
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\AppCache\x86\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2084
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD5a5dd9c99e9c0260dccbe21c90310b287
SHA1c245bd97449a60fd92f9346af44188cbdea44203
SHA25625741bbe6ea759e37358a02b208f429aaa936c8b2ad687e2b93848ade37cb940
SHA512da3e46fa6ce01c4c4bdc11f79780f6c6333cd45e73db5904cab9ec0222517f31aae709750df90f81fb6c77f48b045b08e87d47b739e326c97bc7e8f628918410
-
Filesize
178KB
MD598bec71de2615edabc0c37848fa9717e
SHA147b2dabddcd029fc8e7cce3a2cf456c19b381f71
SHA2565a0aecb7209d6071543e1c19cd9456ba22080d2bb380f893cfedce8974363abc
SHA512812d329cbf4f12541283fb0b3fd2b2a6900708af73491c172425f14ad46daa5369df4cf94a5fa124c2446c4e769a37ee3cd40f32ec078c4dc35f01fde6b9fe2f
-
Filesize
160KB
MD5a51d90f2f9394f5ea0a3acae3bd2b219
SHA120fea1314dbed552d5fedee096e2050369172ee1
SHA256ac9674feb8f2fad20c1e046de67f899419276ae79a60e8cc021a4bf472ae044f
SHA512c11f981136db7d9bde01046b1953fd924ff29447d41257da09dd762451e27390cea9b69e43206a8fff825ebcd4ddec5a6247bb502aefbd6e8285622caa985bf6
-
Filesize
893KB
MD504ad4b80880b32c94be8d0886482c774
SHA1344faf61c3eb76f4a2fb6452e83ed16c9cce73e0
SHA256a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338
SHA5123e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb
-
Filesize
207KB
MD5b4001b514ed843ab0b52e129ffb54205
SHA1f4e038fecce8bf46654657648a96ee5a257cfe7c
SHA256d8ff4748434faf78ecab0b36763729afa770f2fa7347cee54438cf306c063b53
SHA512c413b342efd91885614727a787ff670975397bf020494c074dc9008b305c65d967adaa6aa5667607343a673914439b2ceb28748229115122abfb77fd0c14f477
-
Filesize
491KB
MD553a60793bf8a3f8c4335232bf98613b8
SHA1e4b6e2848db9efa43dc844cf0e1b4a35d4356435
SHA256936e44d41edeff6c009c53cf476c9d9f0fa4986817f912943cf47842f60ad878
SHA512b2017ba3f2cba5d50864fdd6eb91e1c177ebea21f32a243b66d936959bc741f1b3568a277139c83146fb919ed09464aaf53ac79d0fe30eac627d13f6a0024847
-
Filesize
46B
MD5707889e7678a187f86817cf34dccec0a
SHA17a9f57eb24d9702c54e542a25211afdf4f908ecd
SHA256950dbb768a6230af688907c22a147f6b01ad147002a3eb75f50649f6d2c4fffc
SHA512b702499e539e74b9b5faf1e4947ba6b797bf1fdaa27adb81041639c0ee024c2bf62adbb11ef370cc7b34baf169fdd5873d5f64bcec0f319d7067762a348b9117
-
Filesize
58KB
MD5596b9dcd1bcd23d29d1a83c194591119
SHA1b65d92538a01e235b976dd28c7f3d0824394124d
SHA256368792a61f159179269f1497a667c93ad3ca688feb5f02e0dc4bd52ec7e9ac8f
SHA5123ec75e08fcbd458e5e36c4ebee37a7085ad8fde71dea1b3a36faf862baac30b9b23c1e162855504495d3684ebf120466fc6e0c8f5607f7039b3bcbcdb057f618
-
Filesize
178KB
MD59470e3dd09e6635ac7b7f7ddfc93eeb4
SHA16b0089e07e78a61bfab54740c8fa2c383ff6e3b3
SHA256eb8a6aab2554a946e7e0d340c2f44e9b0e75a14a93e33a0dca754c9c037436bf
SHA512467305377a30d8fcff710474914686f61e8fd29d8245b1593d27bb4ef96256b0b57c7ab2efbfc2ea59d023e6ea1d4eeecb12bbb06a408383d2512435945843c0
-
Filesize
2.1MB
MD53d597678765359281e4bc1c66ac4002b
SHA1b8d93579269a9bdf6773d227861c753dbf0904cf
SHA256f6c23885384bf52a52ff48d718bf7a4825d1ff9708fbae35ff1a35c153aec1fc
SHA512606ca2f6776e47082b4299a6a72b8f570fe6692effd8151d15197081a29d60fb111218d07cb4b65d89ebeac8807b1fab9ec6b655f8f95324a9e04c93c486f47a
-
Filesize
83B
MD5ef29134d5abb8d5676b6e5ad42469fbd
SHA1c2705afa4180a812df522602e06836f2e04d60c9
SHA2564ba286a2580a2a2b7ee696b13b0a04b59f82b04d5441b50d715a1c5f860e5253
SHA512073989a74f1dd1b15e4298edd8b94c1733da8096997b8055c294789e671f11de07ade856fc15b66614f526975dc7b18994e151a37b9b257002046c43baf2f206
-
Filesize
3.0MB
MD5de575cee9140c865351b211827600e1f
SHA1095252d5671444ae500b784450f8a4c5f04ba253
SHA256b25151d12185d3a7944c379c8841ecc66820b881643a7e34848bbc998cc9be72
SHA512134aa49b22af125cd9ff90646aa0336989c77705d92ae673d0bfa417e3ef067cced7309a59d4103350481026ca1dd4702b860d44c7608627896092a5ae0056a3
-
Filesize
2.1MB
MD52fec44fc346fcd49f4840166dae75f8a
SHA1627641063e0b057ccdc35907b66de6c2f443fd57
SHA2569b3736349b0d39b8d004dd150b1ab3dd9b7c2c2f94497a72694d6e02687e0e1a
SHA512f67c05bbd47405929d97dda280f66f35157b8e77bf9c3bc1eb0b070c49c34d2e949b123a29dd84e6628ae3c51b6031f2c48f64032ae910590cee37aaa4396379
-
Filesize
6.2MB
MD5f350590090dac93cf20c189b92da0b94
SHA1f9c638161b2ed9e8defbaf8e952db079b0a710ac
SHA25602c939eddd0f3d4e3ac39678181fd8635772702b670065ba11728cbe205a78a1
SHA512b07dd0e855d59b1c7a2cdf47b9bfa64936cc7fd6eb239284aa92d9585d9a97b9598981745c2e3d7e8041ac86212b32741fe5b0dac9e78c744c6977f65e2d59ea
-
Filesize
6.2MB
MD593cdcd48b7c703d9c9c8d636424c76d3
SHA11f018afb43b6139e1998d912fb58bee03e071deb
SHA256a50c0172682ba221768b159598103290763db9f161cab4747567d5d106bc526e
SHA512ee8a4098c3c5da08210bd9c1793f963bf90ae7f832a447ff32611b9bfc235f2d40b03c25b6313be988c19eef8ca4f02fe477da7d8130a278f5ba9fd7ce8c90e4
-
Filesize
6.2MB
MD59f69a558d0fe79b46f0cb18a69087a7c
SHA14dbee39b5e198b9cc89896f880f1292f9ebf1d37
SHA2565bca85aa603e09238948aa2fbd8a0b62b702c3a969803fbba746f5d7794c0686
SHA5123ec330de3a8ea5bad0f122508ce28640af741c938ac741279d607c03238db754f90a0a20c61af65133d40901fdce19577aff56f22b52444643410c905716dd58
-
Filesize
6.2MB
MD5e011a083b5cd45e9381509b7f26eabfe
SHA16774f801eefe60345751e53608015e8080a4ba53
SHA256ec5a843129eaab0b84d8123d6f0039a590bc6689b33e6614b478e11cefda8e0e
SHA512ec6c79cd271d52b6a84611aeb715bc92c61031728b445f72841fc5e9285bba81f719b74624118c1d8ed56b643753d8904a59f5c26336466c0a350ff7012ec444
-
Filesize
6.2MB
MD5b9c433c73b19c5d400fc81896ab2c6f7
SHA1105409a80c2e4b64ea9cba56925a0ec672f7a275
SHA2566f9f6004ea2564fb2200a564a169866cf3190eccbbbd0aa78650c970b1167619
SHA5128ebd3510703318e554aea06e2d13171ddb3838736917c1df44c883343b0cd0e68aceceef81992ed8a0789e22b2a8dd58066410426b6d9494339cfb1b7804e031
-
Filesize
6.2MB
MD59ad2f76a9c5ae89d291de7ac20392f28
SHA12839ea879841a5805a6733dc772e22fd4d290020
SHA256168f496d53494de7a1f9497a1975b1bcb3918cc52dc2f367b2fc1c4a81c9a09e
SHA51264fb292dc84bb10a9d7f48a1dc4f6a3dd9ea643474ac47c4a7f6093a0bd1667d0f0cdfde228d3cdc998b976309615a19450512107eec43275980bbe45098378c
-
Filesize
133B
MD5d4ccfb17eb96faa61e610331702be48e
SHA16cd206ad95e1747797853790113697eaacabcd7a
SHA256aba97f7dfc9e9b7106d70d05bb385ebb1e6fcf111b290608fb54d2d18879f450
SHA512a2d650c0b920de3b054dae4502683d45b65e6482e79e3451b44185e144c2e027c21246245ae914d065a4bedb462efbe99a7a2a704bf13a3e6561d02a87bef310
-
Filesize
81B
MD59b0a98146b081c9359c91be85c61e6d0
SHA1a9bbdd5f048f35f83af31ffad76dfad444039706
SHA2566a6e408a620e9281d17967a4a5d34548d090831cbea463aabf0f66f68b623dd5
SHA5122dd70246f91d5d8254e10200342a1460f22731e8343ccdd1d807e39a51f191629bd1b8dce9b91c22f444a533624e81876437df10632d41d2762ad8e9f9854067