Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 22:50
Behavioral task
behavioral1
Sample
7b0c7181a30fa4f279793f52bcced9e9.exe
Resource
win7-20240903-en
General
-
Target
7b0c7181a30fa4f279793f52bcced9e9.exe
-
Size
5.9MB
-
MD5
7b0c7181a30fa4f279793f52bcced9e9
-
SHA1
c89cb50f11ce4aef52006673fa130ec7cdea53a3
-
SHA256
795c803aa4a43a84e540b2c7b2150ad50201aead34370a68b2a4f3a93e2d9770
-
SHA512
ce1040998ba236a2eff9510c81aa99267a52105ecee329785e269641d819a504b1b58d4ba8d89e818e7770045cdb48beb9c690cb09d19488a3166dce6f75ffaa
-
SSDEEP
98304:oemTLkNdfE0pZrt56utgpPFotBER/mQ32lUy:T+856utgpPF8u/7y
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x00080000000120ff-6.dat cobalt_reflective_dll behavioral1/files/0x00070000000192f0-8.dat cobalt_reflective_dll behavioral1/files/0x0006000000019384-38.dat cobalt_reflective_dll behavioral1/files/0x0005000000019625-118.dat cobalt_reflective_dll behavioral1/files/0x0005000000019aea-126.dat cobalt_reflective_dll behavioral1/files/0x00050000000197c1-122.dat cobalt_reflective_dll behavioral1/files/0x0005000000019624-115.dat cobalt_reflective_dll behavioral1/files/0x000500000001961f-110.dat cobalt_reflective_dll behavioral1/files/0x0008000000019228-106.dat cobalt_reflective_dll behavioral1/files/0x000500000001961b-102.dat cobalt_reflective_dll behavioral1/files/0x0005000000019589-93.dat cobalt_reflective_dll behavioral1/files/0x000500000001953a-91.dat cobalt_reflective_dll behavioral1/files/0x0005000000019503-90.dat cobalt_reflective_dll behavioral1/files/0x00060000000194f6-48.dat cobalt_reflective_dll behavioral1/files/0x000500000001957c-79.dat cobalt_reflective_dll behavioral1/files/0x0005000000019515-78.dat cobalt_reflective_dll behavioral1/files/0x0005000000019501-56.dat cobalt_reflective_dll behavioral1/files/0x00080000000193af-45.dat cobalt_reflective_dll behavioral1/files/0x000600000001933e-20.dat cobalt_reflective_dll behavioral1/files/0x0006000000019346-29.dat cobalt_reflective_dll behavioral1/files/0x000600000001932a-10.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 64 IoCs
resource yara_rule behavioral1/memory/2396-0-0x000000013F160000-0x000000013F4B4000-memory.dmp xmrig behavioral1/files/0x00080000000120ff-6.dat xmrig behavioral1/files/0x00070000000192f0-8.dat xmrig behavioral1/memory/2152-21-0x000000013F900000-0x000000013FC54000-memory.dmp xmrig behavioral1/memory/2688-35-0x000000013FFB0000-0x0000000140304000-memory.dmp xmrig behavioral1/files/0x0006000000019384-38.dat xmrig behavioral1/memory/3012-40-0x000000013F3A0000-0x000000013F6F4000-memory.dmp xmrig behavioral1/memory/2672-82-0x000000013F790000-0x000000013FAE4000-memory.dmp xmrig behavioral1/memory/2456-97-0x000000013F150000-0x000000013F4A4000-memory.dmp xmrig behavioral1/files/0x0005000000019625-118.dat xmrig behavioral1/files/0x0005000000019aea-126.dat xmrig behavioral1/files/0x00050000000197c1-122.dat xmrig behavioral1/files/0x0005000000019624-115.dat xmrig behavioral1/memory/2720-127-0x000000013FD30000-0x0000000140084000-memory.dmp xmrig behavioral1/files/0x000500000001961f-110.dat xmrig behavioral1/memory/2804-128-0x000000013FC30000-0x000000013FF84000-memory.dmp xmrig behavioral1/files/0x0008000000019228-106.dat xmrig behavioral1/files/0x000500000001961b-102.dat xmrig behavioral1/memory/3012-98-0x000000013F3A0000-0x000000013F6F4000-memory.dmp xmrig behavioral1/memory/2840-141-0x000000013F690000-0x000000013F9E4000-memory.dmp xmrig behavioral1/memory/2616-96-0x000000013F700000-0x000000013FA54000-memory.dmp xmrig behavioral1/memory/2644-95-0x000000013F990000-0x000000013FCE4000-memory.dmp xmrig behavioral1/memory/2688-94-0x000000013FFB0000-0x0000000140304000-memory.dmp xmrig behavioral1/files/0x0005000000019589-93.dat xmrig behavioral1/files/0x000500000001953a-91.dat xmrig behavioral1/files/0x0005000000019503-90.dat xmrig behavioral1/memory/2396-86-0x000000013F860000-0x000000013FBB4000-memory.dmp xmrig behavioral1/memory/2672-145-0x000000013F790000-0x000000013FAE4000-memory.dmp xmrig behavioral1/memory/2768-144-0x000000013F860000-0x000000013FBB4000-memory.dmp xmrig behavioral1/files/0x00060000000194f6-48.dat xmrig behavioral1/memory/2768-81-0x000000013F860000-0x000000013FBB4000-memory.dmp xmrig behavioral1/files/0x000500000001957c-79.dat xmrig behavioral1/files/0x0005000000019515-78.dat xmrig behavioral1/memory/2396-146-0x000000013F860000-0x000000013FBB4000-memory.dmp xmrig behavioral1/memory/2396-59-0x000000013F160000-0x000000013F4B4000-memory.dmp xmrig behavioral1/memory/2840-58-0x000000013F690000-0x000000013F9E4000-memory.dmp xmrig behavioral1/memory/2804-57-0x000000013FC30000-0x000000013FF84000-memory.dmp xmrig behavioral1/files/0x0005000000019501-56.dat xmrig behavioral1/memory/2720-47-0x000000013FD30000-0x0000000140084000-memory.dmp xmrig behavioral1/memory/2396-39-0x00000000023A0000-0x00000000026F4000-memory.dmp xmrig behavioral1/files/0x00080000000193af-45.dat xmrig behavioral1/files/0x000600000001933e-20.dat xmrig behavioral1/memory/2704-33-0x000000013F1A0000-0x000000013F4F4000-memory.dmp xmrig behavioral1/memory/2456-150-0x000000013F150000-0x000000013F4A4000-memory.dmp xmrig behavioral1/memory/2616-149-0x000000013F700000-0x000000013FA54000-memory.dmp xmrig behavioral1/memory/2644-148-0x000000013F990000-0x000000013FCE4000-memory.dmp xmrig behavioral1/files/0x0006000000019346-29.dat xmrig behavioral1/files/0x000600000001932a-10.dat xmrig behavioral1/memory/2352-28-0x000000013F1B0000-0x000000013F504000-memory.dmp xmrig behavioral1/memory/2548-27-0x000000013FB60000-0x000000013FEB4000-memory.dmp xmrig behavioral1/memory/2548-151-0x000000013FB60000-0x000000013FEB4000-memory.dmp xmrig behavioral1/memory/2152-152-0x000000013F900000-0x000000013FC54000-memory.dmp xmrig behavioral1/memory/2352-153-0x000000013F1B0000-0x000000013F504000-memory.dmp xmrig behavioral1/memory/2704-154-0x000000013F1A0000-0x000000013F4F4000-memory.dmp xmrig behavioral1/memory/2720-155-0x000000013FD30000-0x0000000140084000-memory.dmp xmrig behavioral1/memory/2688-156-0x000000013FFB0000-0x0000000140304000-memory.dmp xmrig behavioral1/memory/3012-157-0x000000013F3A0000-0x000000013F6F4000-memory.dmp xmrig behavioral1/memory/2840-158-0x000000013F690000-0x000000013F9E4000-memory.dmp xmrig behavioral1/memory/2804-159-0x000000013FC30000-0x000000013FF84000-memory.dmp xmrig behavioral1/memory/2768-161-0x000000013F860000-0x000000013FBB4000-memory.dmp xmrig behavioral1/memory/2672-160-0x000000013F790000-0x000000013FAE4000-memory.dmp xmrig behavioral1/memory/2456-164-0x000000013F150000-0x000000013F4A4000-memory.dmp xmrig behavioral1/memory/2616-163-0x000000013F700000-0x000000013FA54000-memory.dmp xmrig behavioral1/memory/2644-162-0x000000013F990000-0x000000013FCE4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2548 IwosqFL.exe 2352 mZwuRPV.exe 2152 lrKrpIU.exe 2704 hKeZTwV.exe 2688 ZlwmrAb.exe 3012 XOqgHuP.exe 2720 WpzgUSG.exe 2804 kCFnJew.exe 2840 diXHdJB.exe 2768 wePipOU.exe 2672 PjcuVmL.exe 2644 knnTIOL.exe 2616 AWPqPND.exe 2456 dOpYlKx.exe 1468 oTYcHta.exe 1480 tCHqzGO.exe 1972 AhebGCT.exe 1084 difRgjB.exe 552 NPihLvX.exe 2656 EfAJalK.exe 1784 klESovB.exe -
Loads dropped DLL 21 IoCs
pid Process 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 2396 7b0c7181a30fa4f279793f52bcced9e9.exe -
resource yara_rule behavioral1/memory/2396-0-0x000000013F160000-0x000000013F4B4000-memory.dmp upx behavioral1/files/0x00080000000120ff-6.dat upx behavioral1/files/0x00070000000192f0-8.dat upx behavioral1/memory/2152-21-0x000000013F900000-0x000000013FC54000-memory.dmp upx behavioral1/memory/2688-35-0x000000013FFB0000-0x0000000140304000-memory.dmp upx behavioral1/files/0x0006000000019384-38.dat upx behavioral1/memory/3012-40-0x000000013F3A0000-0x000000013F6F4000-memory.dmp upx behavioral1/memory/2672-82-0x000000013F790000-0x000000013FAE4000-memory.dmp upx behavioral1/memory/2456-97-0x000000013F150000-0x000000013F4A4000-memory.dmp upx behavioral1/files/0x0005000000019625-118.dat upx behavioral1/files/0x0005000000019aea-126.dat upx behavioral1/files/0x00050000000197c1-122.dat upx behavioral1/files/0x0005000000019624-115.dat upx behavioral1/memory/2720-127-0x000000013FD30000-0x0000000140084000-memory.dmp upx behavioral1/files/0x000500000001961f-110.dat upx behavioral1/memory/2804-128-0x000000013FC30000-0x000000013FF84000-memory.dmp upx behavioral1/files/0x0008000000019228-106.dat upx behavioral1/files/0x000500000001961b-102.dat upx behavioral1/memory/3012-98-0x000000013F3A0000-0x000000013F6F4000-memory.dmp upx behavioral1/memory/2840-141-0x000000013F690000-0x000000013F9E4000-memory.dmp upx behavioral1/memory/2616-96-0x000000013F700000-0x000000013FA54000-memory.dmp upx behavioral1/memory/2644-95-0x000000013F990000-0x000000013FCE4000-memory.dmp upx behavioral1/memory/2688-94-0x000000013FFB0000-0x0000000140304000-memory.dmp upx behavioral1/files/0x0005000000019589-93.dat upx behavioral1/files/0x000500000001953a-91.dat upx behavioral1/files/0x0005000000019503-90.dat upx behavioral1/memory/2672-145-0x000000013F790000-0x000000013FAE4000-memory.dmp upx behavioral1/memory/2768-144-0x000000013F860000-0x000000013FBB4000-memory.dmp upx behavioral1/files/0x00060000000194f6-48.dat upx behavioral1/memory/2768-81-0x000000013F860000-0x000000013FBB4000-memory.dmp upx behavioral1/files/0x000500000001957c-79.dat upx behavioral1/files/0x0005000000019515-78.dat upx behavioral1/memory/2396-59-0x000000013F160000-0x000000013F4B4000-memory.dmp upx behavioral1/memory/2840-58-0x000000013F690000-0x000000013F9E4000-memory.dmp upx behavioral1/memory/2804-57-0x000000013FC30000-0x000000013FF84000-memory.dmp upx behavioral1/files/0x0005000000019501-56.dat upx behavioral1/memory/2720-47-0x000000013FD30000-0x0000000140084000-memory.dmp upx behavioral1/files/0x00080000000193af-45.dat upx behavioral1/files/0x000600000001933e-20.dat upx behavioral1/memory/2704-33-0x000000013F1A0000-0x000000013F4F4000-memory.dmp upx behavioral1/memory/2456-150-0x000000013F150000-0x000000013F4A4000-memory.dmp upx behavioral1/memory/2616-149-0x000000013F700000-0x000000013FA54000-memory.dmp upx behavioral1/memory/2644-148-0x000000013F990000-0x000000013FCE4000-memory.dmp upx behavioral1/files/0x0006000000019346-29.dat upx behavioral1/files/0x000600000001932a-10.dat upx behavioral1/memory/2352-28-0x000000013F1B0000-0x000000013F504000-memory.dmp upx behavioral1/memory/2548-27-0x000000013FB60000-0x000000013FEB4000-memory.dmp upx behavioral1/memory/2548-151-0x000000013FB60000-0x000000013FEB4000-memory.dmp upx behavioral1/memory/2152-152-0x000000013F900000-0x000000013FC54000-memory.dmp upx behavioral1/memory/2352-153-0x000000013F1B0000-0x000000013F504000-memory.dmp upx behavioral1/memory/2704-154-0x000000013F1A0000-0x000000013F4F4000-memory.dmp upx behavioral1/memory/2720-155-0x000000013FD30000-0x0000000140084000-memory.dmp upx behavioral1/memory/2688-156-0x000000013FFB0000-0x0000000140304000-memory.dmp upx behavioral1/memory/3012-157-0x000000013F3A0000-0x000000013F6F4000-memory.dmp upx behavioral1/memory/2840-158-0x000000013F690000-0x000000013F9E4000-memory.dmp upx behavioral1/memory/2804-159-0x000000013FC30000-0x000000013FF84000-memory.dmp upx behavioral1/memory/2768-161-0x000000013F860000-0x000000013FBB4000-memory.dmp upx behavioral1/memory/2672-160-0x000000013F790000-0x000000013FAE4000-memory.dmp upx behavioral1/memory/2456-164-0x000000013F150000-0x000000013F4A4000-memory.dmp upx behavioral1/memory/2616-163-0x000000013F700000-0x000000013FA54000-memory.dmp upx behavioral1/memory/2644-162-0x000000013F990000-0x000000013FCE4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\IwosqFL.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\lrKrpIU.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\knnTIOL.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\wePipOU.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\dOpYlKx.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\oTYcHta.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\EfAJalK.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\PjcuVmL.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\tCHqzGO.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\AhebGCT.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\difRgjB.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\NPihLvX.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\klESovB.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\XOqgHuP.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\WpzgUSG.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\diXHdJB.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\mZwuRPV.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\ZlwmrAb.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\hKeZTwV.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\kCFnJew.exe 7b0c7181a30fa4f279793f52bcced9e9.exe File created C:\Windows\System\AWPqPND.exe 7b0c7181a30fa4f279793f52bcced9e9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2396 7b0c7181a30fa4f279793f52bcced9e9.exe Token: SeLockMemoryPrivilege 2396 7b0c7181a30fa4f279793f52bcced9e9.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2548 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 31 PID 2396 wrote to memory of 2548 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 31 PID 2396 wrote to memory of 2548 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 31 PID 2396 wrote to memory of 2352 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 32 PID 2396 wrote to memory of 2352 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 32 PID 2396 wrote to memory of 2352 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 32 PID 2396 wrote to memory of 2152 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 33 PID 2396 wrote to memory of 2152 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 33 PID 2396 wrote to memory of 2152 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 33 PID 2396 wrote to memory of 2688 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 34 PID 2396 wrote to memory of 2688 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 34 PID 2396 wrote to memory of 2688 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 34 PID 2396 wrote to memory of 2704 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 35 PID 2396 wrote to memory of 2704 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 35 PID 2396 wrote to memory of 2704 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 35 PID 2396 wrote to memory of 3012 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 36 PID 2396 wrote to memory of 3012 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 36 PID 2396 wrote to memory of 3012 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 36 PID 2396 wrote to memory of 2720 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 37 PID 2396 wrote to memory of 2720 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 37 PID 2396 wrote to memory of 2720 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 37 PID 2396 wrote to memory of 2804 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 38 PID 2396 wrote to memory of 2804 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 38 PID 2396 wrote to memory of 2804 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 38 PID 2396 wrote to memory of 2840 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 39 PID 2396 wrote to memory of 2840 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 39 PID 2396 wrote to memory of 2840 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 39 PID 2396 wrote to memory of 2644 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 40 PID 2396 wrote to memory of 2644 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 40 PID 2396 wrote to memory of 2644 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 40 PID 2396 wrote to memory of 2768 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 41 PID 2396 wrote to memory of 2768 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 41 PID 2396 wrote to memory of 2768 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 41 PID 2396 wrote to memory of 2616 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 42 PID 2396 wrote to memory of 2616 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 42 PID 2396 wrote to memory of 2616 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 42 PID 2396 wrote to memory of 2672 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 43 PID 2396 wrote to memory of 2672 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 43 PID 2396 wrote to memory of 2672 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 43 PID 2396 wrote to memory of 2456 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 44 PID 2396 wrote to memory of 2456 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 44 PID 2396 wrote to memory of 2456 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 44 PID 2396 wrote to memory of 1468 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 45 PID 2396 wrote to memory of 1468 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 45 PID 2396 wrote to memory of 1468 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 45 PID 2396 wrote to memory of 1480 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 46 PID 2396 wrote to memory of 1480 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 46 PID 2396 wrote to memory of 1480 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 46 PID 2396 wrote to memory of 1972 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 47 PID 2396 wrote to memory of 1972 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 47 PID 2396 wrote to memory of 1972 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 47 PID 2396 wrote to memory of 1084 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 48 PID 2396 wrote to memory of 1084 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 48 PID 2396 wrote to memory of 1084 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 48 PID 2396 wrote to memory of 552 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 49 PID 2396 wrote to memory of 552 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 49 PID 2396 wrote to memory of 552 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 49 PID 2396 wrote to memory of 2656 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 50 PID 2396 wrote to memory of 2656 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 50 PID 2396 wrote to memory of 2656 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 50 PID 2396 wrote to memory of 1784 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 51 PID 2396 wrote to memory of 1784 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 51 PID 2396 wrote to memory of 1784 2396 7b0c7181a30fa4f279793f52bcced9e9.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b0c7181a30fa4f279793f52bcced9e9.exe"C:\Users\Admin\AppData\Local\Temp\7b0c7181a30fa4f279793f52bcced9e9.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\System\IwosqFL.exeC:\Windows\System\IwosqFL.exe2⤵
- Executes dropped EXE
PID:2548
-
-
C:\Windows\System\mZwuRPV.exeC:\Windows\System\mZwuRPV.exe2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Windows\System\lrKrpIU.exeC:\Windows\System\lrKrpIU.exe2⤵
- Executes dropped EXE
PID:2152
-
-
C:\Windows\System\ZlwmrAb.exeC:\Windows\System\ZlwmrAb.exe2⤵
- Executes dropped EXE
PID:2688
-
-
C:\Windows\System\hKeZTwV.exeC:\Windows\System\hKeZTwV.exe2⤵
- Executes dropped EXE
PID:2704
-
-
C:\Windows\System\XOqgHuP.exeC:\Windows\System\XOqgHuP.exe2⤵
- Executes dropped EXE
PID:3012
-
-
C:\Windows\System\WpzgUSG.exeC:\Windows\System\WpzgUSG.exe2⤵
- Executes dropped EXE
PID:2720
-
-
C:\Windows\System\kCFnJew.exeC:\Windows\System\kCFnJew.exe2⤵
- Executes dropped EXE
PID:2804
-
-
C:\Windows\System\diXHdJB.exeC:\Windows\System\diXHdJB.exe2⤵
- Executes dropped EXE
PID:2840
-
-
C:\Windows\System\knnTIOL.exeC:\Windows\System\knnTIOL.exe2⤵
- Executes dropped EXE
PID:2644
-
-
C:\Windows\System\wePipOU.exeC:\Windows\System\wePipOU.exe2⤵
- Executes dropped EXE
PID:2768
-
-
C:\Windows\System\AWPqPND.exeC:\Windows\System\AWPqPND.exe2⤵
- Executes dropped EXE
PID:2616
-
-
C:\Windows\System\PjcuVmL.exeC:\Windows\System\PjcuVmL.exe2⤵
- Executes dropped EXE
PID:2672
-
-
C:\Windows\System\dOpYlKx.exeC:\Windows\System\dOpYlKx.exe2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Windows\System\oTYcHta.exeC:\Windows\System\oTYcHta.exe2⤵
- Executes dropped EXE
PID:1468
-
-
C:\Windows\System\tCHqzGO.exeC:\Windows\System\tCHqzGO.exe2⤵
- Executes dropped EXE
PID:1480
-
-
C:\Windows\System\AhebGCT.exeC:\Windows\System\AhebGCT.exe2⤵
- Executes dropped EXE
PID:1972
-
-
C:\Windows\System\difRgjB.exeC:\Windows\System\difRgjB.exe2⤵
- Executes dropped EXE
PID:1084
-
-
C:\Windows\System\NPihLvX.exeC:\Windows\System\NPihLvX.exe2⤵
- Executes dropped EXE
PID:552
-
-
C:\Windows\System\EfAJalK.exeC:\Windows\System\EfAJalK.exe2⤵
- Executes dropped EXE
PID:2656
-
-
C:\Windows\System\klESovB.exeC:\Windows\System\klESovB.exe2⤵
- Executes dropped EXE
PID:1784
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5df4241aefd4bd11965871f9d7b28f799
SHA1b85a4f4fa94133021db653869b5b7aaae5b18fc5
SHA25688010ae17c697498eb3ed5217761ba939362f3b8d793a652a55fd6d43cd39fd1
SHA512f207fc871d0ec75549f49df0f6a25e57eca68b0c60de6e4677a7f85a1faef4b3398568a7c5eb4211d3a8e449766b772857ca0e5284105fc6265a35f059d04ceb
-
Filesize
5.9MB
MD54e44cabcea9703daab39b6d46a08c967
SHA1c7bd5a39da5fa47e7aad60b3be37d7648f9bde5b
SHA256d0ba4e2c5912a3f664a31cf05f903d15bd6086aa4734fc393cfa5de8eeb4aaf8
SHA512f832bb0143e31d3c6767a10884fd0813968e9062ca1e22daa7d3f4006d235e1d3de92eedd751de03fce57fc15d6514f7a51fc27b7e56ec43b2608ce8b447ecf8
-
Filesize
5.9MB
MD58ed1d885344a3bd9de9cf0a3331fa2f5
SHA17c01c9571b1e1e9512f88c2ba164d6657b1a552a
SHA256b6fdc75ecd60ff9abbbd16761d2326591b75f297982787697fc83d7a3b9f8fb5
SHA512736429502ee109e0630d9ccde9870f838a167535df10f567efa244a18267d882637d7c3cc5aeca6682330864c16fbe079f5a60081cf1b10e31541773b5873a88
-
Filesize
5.9MB
MD5d2739d67ca610859b58ea951f886f79c
SHA1e02f3f830a131f322e4df7860dc826f3c14b4695
SHA256eb9d9171b6d018befd16c8caa98350e55906604e082d1c7409c261fd6d125b9a
SHA51293f15e0f459665db278fa1aa6ca5b314fbfaef148718b5b4e390811b6fa3b5e91e75ddb7e0994444c285c79d7f4645b50fbff9e33bea53b589914239be12feac
-
Filesize
5.9MB
MD58c1269fe0e91ab64550bb776258302fe
SHA187c5e1f09f88d07f0329483414315f7720994d87
SHA2567fb030a81a2ee42df199c5d20f65ac57ad99639267ef5adca64c28c453eeda88
SHA5120d8b5d5306b9053b88837e9f8fd5b71c7fae2142d4cdbc6df88b696b6c2b929416f15584b76a06696452b2c2139a96dd799ae0c1bdef56c36e3cc9a80b26477e
-
Filesize
5.9MB
MD5ff84b6495d2476a4856f684f93496e68
SHA1cdcead1710213524d3469c2c9b2ded09ecf55641
SHA256ab70196af10bfd724db81beacbf225ec24ed624549303ba1bd8d820c9f38cf2e
SHA512369d1d9f54d80153d6e90fb40b3e433786b30da2d7daa764de02d63f6603a61684fef882395d2995522850e656c9cecf1e92274b68fddbde87904e8c127c68be
-
Filesize
5.9MB
MD52c07630bf1de72aefb98d4f957adcaef
SHA12321c0bb0ab31a2635db06d01b991339cd6a805e
SHA256dba313dd8108b85ddd2a9777925d890a31f9e2519119f57e24150cab44a5828f
SHA512466894adf776c63d75f8763ac28bcdcdf23841c3fc83d941dd48fc135627e81fc181564bc1c62abbca1163861aa93b0f78b5d5c608052cd3100b043b3ac82087
-
Filesize
5.9MB
MD5fb1b23d7f64950d2349e5df6d17e563e
SHA1fe30f745405355a8bb9fc6d021d7ef186b1d5dea
SHA2564d03f10b6e8027686e3e246ad673e6f66c3db4b985ca6711e7a5ee91dd66f114
SHA51212638ef3ff4128c05d35729fb6bf96f45980a47a59c031673e746475bfaf73d914d42ef06f4c51eafbc9a9f603fb38b4cd944e194a93ce63fab2f98ae88fb608
-
Filesize
5.9MB
MD59dff0a77c02e6750ed04e9692363b35d
SHA19d932277715dd00b894d3a0bbd43322ede115e19
SHA256de278a6ee09d1ff2b7cb57a76421d39e867e54b591ec0da8dc6e88291c321772
SHA512453b1546a84fbfa7a16f42cf42f4f84cc12858191228ed76c6bc70cb42cc0b098238ceb16c17f15827ce670491308b449a7363e25063dc5b4d0b72de4a7ee34b
-
Filesize
5.9MB
MD5b9b2380d915319c12702b2215a85f11e
SHA168b237028041b5e45f79986bcf1dd6882e69550b
SHA256f0ee1a6c678f1a4706115f1be5321e3fe2f7e34c8552087ab20c0d6afd90b6ed
SHA5126ac48612288673e9edf29fb35ee00abd5fc51077169e3a2c16e3cfa73dbf3a59c6525b24eafa6bf3285aa0c89316b16669efff77093af6b7668011e5c91b1db8
-
Filesize
5.9MB
MD50b3473a4073ddf20f6b87e512c38d73f
SHA10a3854b6159bdd08feef448f3a31726c582248a5
SHA25671440d711d49f5ba390e380cb24356ca967a01642ccdb6cd87c15b4c20407770
SHA512d79bac6b7a5f21c19dc95d09a6999841695d91a2657e1d0152ad4e59e435b03922ccaef6a739e1e63c7ec1067557d165078f77885ba8318f8dc22e073d8fbcea
-
Filesize
5.9MB
MD59abac53b28cc9a818b2961d778cb3742
SHA1e7e89df60eaa27a691281351fe9529012112e29b
SHA256c7a3056f319d979f4563c70a8d4bf5b03ed4230cebfd621ee361e673a40dbd32
SHA512240a9b2349a392b26811aef13526c844a0b5ecafc3376b31755db53e1265b55ab987ed799198b7cfa169d3862c331b4323358f7b241417864b402884ae1f8a4f
-
Filesize
5.9MB
MD529201ee23afe9485f5f5219a9ad848d4
SHA1083d071ce0c08731874649a17e0edffc1b1fb6fa
SHA2563723a36b01c1b5273343534f45b48b8d618a4ce472e9d36991a6e3390ddf1bc8
SHA5127c6db20ea270cfc4807a708f14b892dbe66798a4ed67b101bff3154a3b3a8b0eb1a48e713dcd7635828326e0752f6750c95c224f0213b5ee37da06338ee354d7
-
Filesize
5.9MB
MD5ab1d11b77b70ab99c0e9e4be6b75dc52
SHA1b34ae5b506616109f07dbaac144a1d394131fbd7
SHA256ddab28ac2916fa0161289f7faa110d27961fa7e81f62ac7573a5325b5349e258
SHA512d0d283d5f274f537e5a635b728823b36e282f7ad1233a654fa4275387848f3d7990f990c80aed71a45a34bae7813de7d4b3224b17a94491030e39eca0f1f6199
-
Filesize
5.9MB
MD52c86eaaab7882aeb923089b2cd0a80dd
SHA12b0a1e9a8d852afa9801630b5ad2c2c66198af86
SHA256d503f744194c1af97db85d4b7b9d3f6b47059781ddad5673dbe7cfcc16f8dd23
SHA5125f6a9784435349846f0f06c5c79d37b78452eaab34a2c744c1fbdb5d842381c0d8cac485a10309046263ae62f14cb8c0f48f442f8cdc53e37f4bdd246a76f15b
-
Filesize
5.9MB
MD567cdf7f4dc9e018371c3df7c622aacbf
SHA1768d10aed0aeb80fa8fecb625fc5ad9c923e0cf7
SHA256422f55033d78f1e16893f299cd150a0fc17d39ff49e2a603cf887162dbcf90cd
SHA51245e43a58939017672020a4a3e8d4a2d560b54ee10fd0b4420d4659ddec6c85849f7e36027a6ac53ef8f3ff2fe71bceb8250aa0970abb4426eaddd32329ebdb26
-
Filesize
5.9MB
MD56f0b604ffc23aa4da2b812091accde66
SHA10be300cfcc16ec60346d01a0d325b779e3a8da9e
SHA2560f61d558fdfbdc0a6b1f7292a478beecc020cb4bd67b1d3d6aebde5d7ff17eab
SHA512adee5f2c0123be909478822cdf65fbf9f1bac847e4722fdb2e35048f465cc98d9c5e1036413b7f5a0e07140c84d92ad3b42f19acfa800eb97b8135a5a0868e13
-
Filesize
5.9MB
MD5446db1a40e77ba33d316a550bd61b46d
SHA1f1cbec7c08f8deacb5fed921824c6cacd2b0a60a
SHA256dd3cfaf6a826cb4abdd42e5ce65bac30def6c854efc04492e3cbe556a3393171
SHA512ce86c651af3ffe992f45c70952d35481201031b39e610720257c8f96237084adac937e03e2c0949ca32c05b236deeea652715f0a72a6d7adac098eff5f41c975
-
Filesize
5.9MB
MD51a9d52c0820e8f156f893222e345caf1
SHA18d4123a2769bdf5140fb04169edc418b363890be
SHA25671b895c021a10fe934c72c56ef911265f8099c5fc7afdef8274f4d243d580dd3
SHA512f12bc7dcfc155059f3a18b0df2aa9d830a22b84492287f1c82bd8aaa9a0068967e5ff27c385feac7462d1c80bd6795be7715fcb74f83443da8f6b9c65d8c3eda
-
Filesize
5.9MB
MD5b077396079b4abc86ab78108b8a57bbc
SHA14be0bba01fe988b85b573bfbca78be0c27f7e0e9
SHA2563863ea71dcbefab709e65c31e1d25194d17fc4098318c7688bcf569d0b7268b9
SHA51226bc07ff2e75415bb039b55ec97e39ed9d2b063e31e67f003d3781eb912b25c9819092912509a9f28ecae89a66cfbffd7f1840d50ab2d70b77eaa6d11fd1cf82
-
Filesize
5.9MB
MD5a68e0b9626549b64b5941b967d216409
SHA10b62a150b881fad0c19f122171ddc53e288325b3
SHA256537d7c7aeffb47a7c957aa7081d861aab0c595e029e3b2192049cadee172f47e
SHA5125979a255bf53f0cd254f6a50029529ea9970b6b50334a8431d0a7cf1366a5f6239f41cebcce2b7b06976c9576b8a704451035c243b66a75dfc4af53950c10581