Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 19:45
Behavioral task
behavioral1
Sample
c7114d9a37b6017f8f1b952b83b08b07.exe
Resource
win7-20240903-en
General
-
Target
c7114d9a37b6017f8f1b952b83b08b07.exe
-
Size
5.2MB
-
MD5
c7114d9a37b6017f8f1b952b83b08b07
-
SHA1
182ad3dc440a09ba62e1dbe917874b1f83be024c
-
SHA256
df91a9bfc3de3e17f4f0d7910a426a1b235ff7f825aeca78f183d764c2988f78
-
SHA512
a0c1932ebce3bb6d3f82b5836305bb7d929c12589e9b271ab42284f27c7f5de53f536952b5735398814eb71e2f09ca6213862de47abb1366b35462c987b07c75
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lr:RWWBibf56utgpPFotBER/mQ32lUP
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x00090000000120f9-3.dat cobalt_reflective_dll behavioral1/files/0x000a000000015d79-6.dat cobalt_reflective_dll behavioral1/files/0x0007000000015e48-18.dat cobalt_reflective_dll behavioral1/files/0x0007000000015ec9-12.dat cobalt_reflective_dll behavioral1/files/0x0007000000015f71-34.dat cobalt_reflective_dll behavioral1/files/0x0007000000015ff5-39.dat cobalt_reflective_dll behavioral1/files/0x0006000000016eb4-124.dat cobalt_reflective_dll behavioral1/files/0x0006000000016de0-91.dat cobalt_reflective_dll behavioral1/files/0x0006000000016d6d-85.dat cobalt_reflective_dll behavioral1/files/0x0006000000016d63-83.dat cobalt_reflective_dll behavioral1/files/0x0006000000016d72-81.dat cobalt_reflective_dll behavioral1/files/0x0006000000016d69-75.dat cobalt_reflective_dll behavioral1/files/0x0006000000016d4f-68.dat cobalt_reflective_dll behavioral1/files/0x0006000000016d3f-57.dat cobalt_reflective_dll behavioral1/files/0x0008000000016241-51.dat cobalt_reflective_dll behavioral1/files/0x0006000000017047-109.dat cobalt_reflective_dll behavioral1/files/0x0006000000016dea-107.dat cobalt_reflective_dll behavioral1/files/0x0006000000016dd9-106.dat cobalt_reflective_dll behavioral1/files/0x0006000000016d47-64.dat cobalt_reflective_dll behavioral1/files/0x0006000000016d36-63.dat cobalt_reflective_dll behavioral1/files/0x0008000000016101-45.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 38 IoCs
resource yara_rule behavioral1/memory/1516-28-0x000000013F1A0000-0x000000013F4F1000-memory.dmp xmrig behavioral1/memory/1524-30-0x000000013F320000-0x000000013F671000-memory.dmp xmrig behavioral1/memory/3064-95-0x0000000002280000-0x00000000025D1000-memory.dmp xmrig behavioral1/memory/2708-125-0x000000013FD70000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/3064-116-0x000000013FF50000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2860-114-0x000000013F080000-0x000000013F3D1000-memory.dmp xmrig behavioral1/memory/2156-112-0x000000013FF50000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2624-105-0x000000013FC40000-0x000000013FF91000-memory.dmp xmrig behavioral1/memory/2876-90-0x000000013F920000-0x000000013FC71000-memory.dmp xmrig behavioral1/memory/2100-74-0x000000013F140000-0x000000013F491000-memory.dmp xmrig behavioral1/memory/3064-67-0x000000013FB60000-0x000000013FEB1000-memory.dmp xmrig behavioral1/memory/2836-126-0x000000013F1D0000-0x000000013F521000-memory.dmp xmrig behavioral1/memory/2160-27-0x000000013FE40000-0x0000000140191000-memory.dmp xmrig behavioral1/memory/2752-127-0x000000013F050000-0x000000013F3A1000-memory.dmp xmrig behavioral1/memory/3064-135-0x000000013FB60000-0x000000013FEB1000-memory.dmp xmrig behavioral1/memory/2604-147-0x000000013FA20000-0x000000013FD71000-memory.dmp xmrig behavioral1/memory/2932-156-0x000000013F950000-0x000000013FCA1000-memory.dmp xmrig behavioral1/memory/3064-158-0x000000013FEF0000-0x0000000140241000-memory.dmp xmrig behavioral1/memory/2592-155-0x000000013F220000-0x000000013F571000-memory.dmp xmrig behavioral1/memory/1580-153-0x000000013FEF0000-0x0000000140241000-memory.dmp xmrig behavioral1/memory/2464-151-0x000000013F290000-0x000000013F5E1000-memory.dmp xmrig behavioral1/memory/2680-149-0x000000013FA60000-0x000000013FDB1000-memory.dmp xmrig behavioral1/memory/2632-145-0x000000013F980000-0x000000013FCD1000-memory.dmp xmrig behavioral1/memory/2868-143-0x000000013F850000-0x000000013FBA1000-memory.dmp xmrig behavioral1/memory/1948-154-0x000000013F0F0000-0x000000013F441000-memory.dmp xmrig behavioral1/memory/844-152-0x000000013F660000-0x000000013F9B1000-memory.dmp xmrig behavioral1/memory/3064-159-0x000000013FB60000-0x000000013FEB1000-memory.dmp xmrig behavioral1/memory/2100-227-0x000000013F140000-0x000000013F491000-memory.dmp xmrig behavioral1/memory/2160-229-0x000000013FE40000-0x0000000140191000-memory.dmp xmrig behavioral1/memory/1524-230-0x000000013F320000-0x000000013F671000-memory.dmp xmrig behavioral1/memory/1516-232-0x000000013F1A0000-0x000000013F4F1000-memory.dmp xmrig behavioral1/memory/2752-236-0x000000013F050000-0x000000013F3A1000-memory.dmp xmrig behavioral1/memory/2836-238-0x000000013F1D0000-0x000000013F521000-memory.dmp xmrig behavioral1/memory/2708-234-0x000000013FD70000-0x00000001400C1000-memory.dmp xmrig behavioral1/memory/2876-240-0x000000013F920000-0x000000013FC71000-memory.dmp xmrig behavioral1/memory/2860-242-0x000000013F080000-0x000000013F3D1000-memory.dmp xmrig behavioral1/memory/2156-244-0x000000013FF50000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2624-246-0x000000013FC40000-0x000000013FF91000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2100 CxIbCDQ.exe 1524 tyUBWmM.exe 2160 dwzEMlI.exe 1516 EGFaucJ.exe 2708 NOFfeEg.exe 2836 zGITuDG.exe 2752 VexZmWz.exe 2860 TeUlKPN.exe 2876 KvTeUtM.exe 2624 FOMWkpf.exe 2156 yzisUWI.exe 844 cGQwHfS.exe 1948 BbvvTwo.exe 2932 RhmvewR.exe 2868 jJvUgmD.exe 2632 hPzJdix.exe 2604 ileCjEp.exe 2680 NaiykTx.exe 2464 QkTbyYo.exe 1580 lIMiDWa.exe 2592 kxIMzZe.exe -
Loads dropped DLL 21 IoCs
pid Process 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 3064 c7114d9a37b6017f8f1b952b83b08b07.exe -
resource yara_rule behavioral1/memory/3064-0-0x000000013FB60000-0x000000013FEB1000-memory.dmp upx behavioral1/files/0x00090000000120f9-3.dat upx behavioral1/files/0x000a000000015d79-6.dat upx behavioral1/files/0x0007000000015e48-18.dat upx behavioral1/files/0x0007000000015ec9-12.dat upx behavioral1/memory/1516-28-0x000000013F1A0000-0x000000013F4F1000-memory.dmp upx behavioral1/memory/1524-30-0x000000013F320000-0x000000013F671000-memory.dmp upx behavioral1/files/0x0007000000015f71-34.dat upx behavioral1/memory/2708-36-0x000000013FD70000-0x00000001400C1000-memory.dmp upx behavioral1/files/0x0007000000015ff5-39.dat upx behavioral1/files/0x0006000000016eb4-124.dat upx behavioral1/files/0x0006000000016de0-91.dat upx behavioral1/files/0x0006000000016d6d-85.dat upx behavioral1/files/0x0006000000016d63-83.dat upx behavioral1/files/0x0006000000016d72-81.dat upx behavioral1/files/0x0006000000016d69-75.dat upx behavioral1/files/0x0006000000016d4f-68.dat upx behavioral1/memory/2708-125-0x000000013FD70000-0x00000001400C1000-memory.dmp upx behavioral1/files/0x0006000000016d3f-57.dat upx behavioral1/files/0x0008000000016241-51.dat upx behavioral1/memory/2860-114-0x000000013F080000-0x000000013F3D1000-memory.dmp upx behavioral1/memory/2156-112-0x000000013FF50000-0x00000001402A1000-memory.dmp upx behavioral1/files/0x0006000000017047-109.dat upx behavioral1/files/0x0006000000016dea-107.dat upx behavioral1/files/0x0006000000016dd9-106.dat upx behavioral1/memory/2624-105-0x000000013FC40000-0x000000013FF91000-memory.dmp upx behavioral1/memory/2876-90-0x000000013F920000-0x000000013FC71000-memory.dmp upx behavioral1/memory/2836-41-0x000000013F1D0000-0x000000013F521000-memory.dmp upx behavioral1/memory/2100-74-0x000000013F140000-0x000000013F491000-memory.dmp upx behavioral1/memory/3064-67-0x000000013FB60000-0x000000013FEB1000-memory.dmp upx behavioral1/files/0x0006000000016d47-64.dat upx behavioral1/files/0x0006000000016d36-63.dat upx behavioral1/memory/2836-126-0x000000013F1D0000-0x000000013F521000-memory.dmp upx behavioral1/memory/2752-50-0x000000013F050000-0x000000013F3A1000-memory.dmp upx behavioral1/files/0x0008000000016101-45.dat upx behavioral1/memory/2160-27-0x000000013FE40000-0x0000000140191000-memory.dmp upx behavioral1/memory/2100-23-0x000000013F140000-0x000000013F491000-memory.dmp upx behavioral1/memory/2752-127-0x000000013F050000-0x000000013F3A1000-memory.dmp upx behavioral1/memory/3064-135-0x000000013FB60000-0x000000013FEB1000-memory.dmp upx behavioral1/memory/2604-147-0x000000013FA20000-0x000000013FD71000-memory.dmp upx behavioral1/memory/2932-156-0x000000013F950000-0x000000013FCA1000-memory.dmp upx behavioral1/memory/2592-155-0x000000013F220000-0x000000013F571000-memory.dmp upx behavioral1/memory/1580-153-0x000000013FEF0000-0x0000000140241000-memory.dmp upx behavioral1/memory/2464-151-0x000000013F290000-0x000000013F5E1000-memory.dmp upx behavioral1/memory/2680-149-0x000000013FA60000-0x000000013FDB1000-memory.dmp upx behavioral1/memory/2632-145-0x000000013F980000-0x000000013FCD1000-memory.dmp upx behavioral1/memory/2868-143-0x000000013F850000-0x000000013FBA1000-memory.dmp upx behavioral1/memory/1948-154-0x000000013F0F0000-0x000000013F441000-memory.dmp upx behavioral1/memory/844-152-0x000000013F660000-0x000000013F9B1000-memory.dmp upx behavioral1/memory/3064-159-0x000000013FB60000-0x000000013FEB1000-memory.dmp upx behavioral1/memory/2100-227-0x000000013F140000-0x000000013F491000-memory.dmp upx behavioral1/memory/2160-229-0x000000013FE40000-0x0000000140191000-memory.dmp upx behavioral1/memory/1524-230-0x000000013F320000-0x000000013F671000-memory.dmp upx behavioral1/memory/1516-232-0x000000013F1A0000-0x000000013F4F1000-memory.dmp upx behavioral1/memory/2752-236-0x000000013F050000-0x000000013F3A1000-memory.dmp upx behavioral1/memory/2836-238-0x000000013F1D0000-0x000000013F521000-memory.dmp upx behavioral1/memory/2708-234-0x000000013FD70000-0x00000001400C1000-memory.dmp upx behavioral1/memory/2876-240-0x000000013F920000-0x000000013FC71000-memory.dmp upx behavioral1/memory/2860-242-0x000000013F080000-0x000000013F3D1000-memory.dmp upx behavioral1/memory/2156-244-0x000000013FF50000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2624-246-0x000000013FC40000-0x000000013FF91000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\RhmvewR.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\dwzEMlI.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\FOMWkpf.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\jJvUgmD.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\hPzJdix.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\NaiykTx.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\kxIMzZe.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\tyUBWmM.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\NOFfeEg.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\VexZmWz.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\TeUlKPN.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\ileCjEp.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\yzisUWI.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\cGQwHfS.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\lIMiDWa.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\EGFaucJ.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\zGITuDG.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\QkTbyYo.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\BbvvTwo.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\CxIbCDQ.exe c7114d9a37b6017f8f1b952b83b08b07.exe File created C:\Windows\System\KvTeUtM.exe c7114d9a37b6017f8f1b952b83b08b07.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 3064 c7114d9a37b6017f8f1b952b83b08b07.exe Token: SeLockMemoryPrivilege 3064 c7114d9a37b6017f8f1b952b83b08b07.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1524 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 31 PID 3064 wrote to memory of 1524 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 31 PID 3064 wrote to memory of 1524 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 31 PID 3064 wrote to memory of 2100 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 32 PID 3064 wrote to memory of 2100 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 32 PID 3064 wrote to memory of 2100 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 32 PID 3064 wrote to memory of 2160 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 33 PID 3064 wrote to memory of 2160 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 33 PID 3064 wrote to memory of 2160 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 33 PID 3064 wrote to memory of 1516 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 34 PID 3064 wrote to memory of 1516 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 34 PID 3064 wrote to memory of 1516 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 34 PID 3064 wrote to memory of 2708 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 35 PID 3064 wrote to memory of 2708 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 35 PID 3064 wrote to memory of 2708 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 35 PID 3064 wrote to memory of 2836 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 36 PID 3064 wrote to memory of 2836 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 36 PID 3064 wrote to memory of 2836 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 36 PID 3064 wrote to memory of 2752 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 37 PID 3064 wrote to memory of 2752 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 37 PID 3064 wrote to memory of 2752 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 37 PID 3064 wrote to memory of 2868 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 38 PID 3064 wrote to memory of 2868 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 38 PID 3064 wrote to memory of 2868 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 38 PID 3064 wrote to memory of 2860 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 39 PID 3064 wrote to memory of 2860 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 39 PID 3064 wrote to memory of 2860 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 39 PID 3064 wrote to memory of 2632 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 40 PID 3064 wrote to memory of 2632 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 40 PID 3064 wrote to memory of 2632 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 40 PID 3064 wrote to memory of 2876 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 41 PID 3064 wrote to memory of 2876 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 41 PID 3064 wrote to memory of 2876 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 41 PID 3064 wrote to memory of 2604 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 42 PID 3064 wrote to memory of 2604 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 42 PID 3064 wrote to memory of 2604 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 42 PID 3064 wrote to memory of 2624 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 43 PID 3064 wrote to memory of 2624 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 43 PID 3064 wrote to memory of 2624 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 43 PID 3064 wrote to memory of 2680 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 44 PID 3064 wrote to memory of 2680 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 44 PID 3064 wrote to memory of 2680 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 44 PID 3064 wrote to memory of 2156 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 45 PID 3064 wrote to memory of 2156 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 45 PID 3064 wrote to memory of 2156 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 45 PID 3064 wrote to memory of 2464 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 46 PID 3064 wrote to memory of 2464 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 46 PID 3064 wrote to memory of 2464 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 46 PID 3064 wrote to memory of 844 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 47 PID 3064 wrote to memory of 844 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 47 PID 3064 wrote to memory of 844 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 47 PID 3064 wrote to memory of 1580 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 48 PID 3064 wrote to memory of 1580 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 48 PID 3064 wrote to memory of 1580 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 48 PID 3064 wrote to memory of 1948 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 49 PID 3064 wrote to memory of 1948 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 49 PID 3064 wrote to memory of 1948 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 49 PID 3064 wrote to memory of 2592 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 50 PID 3064 wrote to memory of 2592 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 50 PID 3064 wrote to memory of 2592 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 50 PID 3064 wrote to memory of 2932 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 51 PID 3064 wrote to memory of 2932 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 51 PID 3064 wrote to memory of 2932 3064 c7114d9a37b6017f8f1b952b83b08b07.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7114d9a37b6017f8f1b952b83b08b07.exe"C:\Users\Admin\AppData\Local\Temp\c7114d9a37b6017f8f1b952b83b08b07.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\System\tyUBWmM.exeC:\Windows\System\tyUBWmM.exe2⤵
- Executes dropped EXE
PID:1524
-
-
C:\Windows\System\CxIbCDQ.exeC:\Windows\System\CxIbCDQ.exe2⤵
- Executes dropped EXE
PID:2100
-
-
C:\Windows\System\dwzEMlI.exeC:\Windows\System\dwzEMlI.exe2⤵
- Executes dropped EXE
PID:2160
-
-
C:\Windows\System\EGFaucJ.exeC:\Windows\System\EGFaucJ.exe2⤵
- Executes dropped EXE
PID:1516
-
-
C:\Windows\System\NOFfeEg.exeC:\Windows\System\NOFfeEg.exe2⤵
- Executes dropped EXE
PID:2708
-
-
C:\Windows\System\zGITuDG.exeC:\Windows\System\zGITuDG.exe2⤵
- Executes dropped EXE
PID:2836
-
-
C:\Windows\System\VexZmWz.exeC:\Windows\System\VexZmWz.exe2⤵
- Executes dropped EXE
PID:2752
-
-
C:\Windows\System\jJvUgmD.exeC:\Windows\System\jJvUgmD.exe2⤵
- Executes dropped EXE
PID:2868
-
-
C:\Windows\System\TeUlKPN.exeC:\Windows\System\TeUlKPN.exe2⤵
- Executes dropped EXE
PID:2860
-
-
C:\Windows\System\hPzJdix.exeC:\Windows\System\hPzJdix.exe2⤵
- Executes dropped EXE
PID:2632
-
-
C:\Windows\System\KvTeUtM.exeC:\Windows\System\KvTeUtM.exe2⤵
- Executes dropped EXE
PID:2876
-
-
C:\Windows\System\ileCjEp.exeC:\Windows\System\ileCjEp.exe2⤵
- Executes dropped EXE
PID:2604
-
-
C:\Windows\System\FOMWkpf.exeC:\Windows\System\FOMWkpf.exe2⤵
- Executes dropped EXE
PID:2624
-
-
C:\Windows\System\NaiykTx.exeC:\Windows\System\NaiykTx.exe2⤵
- Executes dropped EXE
PID:2680
-
-
C:\Windows\System\yzisUWI.exeC:\Windows\System\yzisUWI.exe2⤵
- Executes dropped EXE
PID:2156
-
-
C:\Windows\System\QkTbyYo.exeC:\Windows\System\QkTbyYo.exe2⤵
- Executes dropped EXE
PID:2464
-
-
C:\Windows\System\cGQwHfS.exeC:\Windows\System\cGQwHfS.exe2⤵
- Executes dropped EXE
PID:844
-
-
C:\Windows\System\lIMiDWa.exeC:\Windows\System\lIMiDWa.exe2⤵
- Executes dropped EXE
PID:1580
-
-
C:\Windows\System\BbvvTwo.exeC:\Windows\System\BbvvTwo.exe2⤵
- Executes dropped EXE
PID:1948
-
-
C:\Windows\System\kxIMzZe.exeC:\Windows\System\kxIMzZe.exe2⤵
- Executes dropped EXE
PID:2592
-
-
C:\Windows\System\RhmvewR.exeC:\Windows\System\RhmvewR.exe2⤵
- Executes dropped EXE
PID:2932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5b8a644f2da08f140b08a39e97988fb89
SHA1728581f6ccf0cfbb2c12a78cde1397204964409e
SHA25605a1342447aba76facd43e170dd5da9d86706501fe87c3343df8e103edd0c7d2
SHA51280b3438899c4c34c2c2c0d31fe6bf1f0aca2e5e7c542d28245a429ce8392ce9c8da0d8d755d5f0aa43b026eb34e80c2008b47fc5c03bf33b59f097105fdadbbe
-
Filesize
5.2MB
MD547376dc88e65b49ca55ee565f0fc672b
SHA1a55c4fa08fe06a8bec25b0282ca98182099cf219
SHA25645e4144edfb22649fd7b08aad34f415c30c1dbd48a0ce1ba1a6b330cbcb28354
SHA512b7c40342846be9513e395863b433cd5a7ed380c4650af9721b0e537f6436c770e0a401726493c1ffe63932e987f7edde32b8de64cc85a36a767a61540546c8ce
-
Filesize
5.2MB
MD50cc64cd46fd69dab1db089d355c394ae
SHA134cc17925bde918f0a84600e89bf2be51e60b36c
SHA256335b612725272d278762ba31794df1146a08a810ff60a9aabef261c111925b86
SHA51214dbd6d1dcfc2ac5c043623d09a1d17a0a9cd79d0755208a71639cf5dda22ea2691f14bb4eee886a34b7d15f6ae39fb7904a85f0131a8b89573957d77ce2f59d
-
Filesize
5.2MB
MD5bf53cd15cbbda9c574e95a52eb594816
SHA1564547ae93c7365aa0f33c3282ca384c5875e7bf
SHA256b2dd28c9d9b4ecb3cb9ca294ef9dacc8867d2a9cd1a8c6088fcccfbdc68b2a3d
SHA512465ee0178ee89c73834c50ee906a09e84a9a15cf37c9083eb9ae33e827a0c79e6643287f7818787d73021c59d4089f3802cd34a3bb5d668886ed61d7b208372c
-
Filesize
5.2MB
MD580ab3b1d79f32891cc485514c6adccc3
SHA1d9f9e9a92d876d0ea6ee33c593cc738493b85aa1
SHA256f4b55e01686dd2d21bb7cac2a23d44bc8de7bacf1fe8d2ba9b64f5e2dda25e92
SHA512ce2339a05ea6c26dd33d5ec6948087614879f3c3e13535eaa53c7525755ec1f5e9507fdfe0902f00892059ccea8d5aa8dde5e59136f06259495ebbb8188fcc17
-
Filesize
5.2MB
MD57b25512e3704a880ff4c5fba37efd4ce
SHA1ba0c87e33aab38bec184dd0e06c3ba5a3951c11b
SHA256f3b44ddb5595c0db2741e398c474e72e0825d32d2fb28ee19f0765dc4cf4440f
SHA512a46d88deb37b805b290b9d695281f6e60644dcb070b49182af05db33123117c26220488c7ab5f865c7223cde9c7c8d919f30c52449132b10a2a6d0bfdde2efcc
-
Filesize
5.2MB
MD5be1ca01a9b5790a0b1f7a63a9d957c64
SHA137e3f92715215f3b422d5ec55190592a03f3c2aa
SHA256c2fb1fb8dd947efdb8bfa7b8fc169ee160d645a4316f25de9925d80b42efb078
SHA512f168a60c46d254b5be280f7682e2f2fb9fa2923ceba56877c07136ded4b6d33e58380930b740ecc36c8e4192335f7da12ff3c8eafeb57cb057ec1e819d008038
-
Filesize
5.2MB
MD50f157675d89f39ae145b8b9dbe91ba09
SHA1be963c99be3dac5798de648d00b05c8dd64eb150
SHA2564027aa641e1ad1e97b74ee6e771e9e724b542aced63337a9e3e57fa34ec2ca69
SHA512fe042f1b86daa9dfaf99f1cc52c3e148f9879c886ee4df9a6d6c26cc338e7ef184de29e2d51a3e634a88601acc05c63172e267c3a7b0a6c6881bc425c4a72795
-
Filesize
5.2MB
MD5fdc42be797e3ed362a153a98315749d9
SHA19bd7bfa6f8ad65a9214c981a8d28228f38239a8c
SHA2569177dac4dd739d89b09130bc02a8ca60ab089f24f0400ac177cc7928b1ad6c0d
SHA51248d849664c1374d8c263ea8a01713ec670ace0b5fa12592678240514b2639c9789fcbe62d8b7a9b5ec8d348816b3f9b9168105c331dd9c2232dfb138c9cb6525
-
Filesize
5.2MB
MD54bc6b379334771b0c7d115217e73b877
SHA12d0378dad398915f96e88fe9cba0b071c3a2d120
SHA256cbcafe5bf7a9cd730f1a16ea80ef006d398126f7b7a63914867168a42d6ed160
SHA5125a59803e4d04202589e43acbb0c8b4362bb796a942f935f272c0d5016bbe4a752c6e01b87c0c160289b8a3501ab45ff1d4aa729ab66f714c22a9e556e1b47a1a
-
Filesize
5.2MB
MD56ca42b146eb185cb50311275e318b526
SHA1072aea7780435da7ca76572a73a4dc9ee03e6aca
SHA256127ed341aca24c05e9a8bd9a27c69fd42ed1321be0a893857670609979fc1582
SHA51251e84994cadc54519affb17b4bfc08e656096a6e0650bbbf727c8dd190043826a645bb83c77e9d4dc81ffb66b38ea3319bc397ff0e18df6ae1c19695f3c038b1
-
Filesize
5.2MB
MD5df14e2951a3b8c15a10eddfefcb9212f
SHA1a757faa9f9707626691c8eadea324f42d79c022a
SHA2563fccea7c4b621c31045e47a7b0ac5b51b4ec984da7397cb4508853437285535c
SHA5128d41f4469d9a23830f0f4db6a6dd19b55156ca10ca9dd79a7491152d99c0775b1f57038c9662ec9164621a54258d26b6642010dbf35aedfc9db64d12f21c8703
-
Filesize
5.2MB
MD57da7ac19703a7467bd86bc450bbad4b2
SHA1570bd4d0eed65f2c35ca0b073edc7a2d2ab936ec
SHA2566662159c67a1c3edcb0e893e031150d3d2b46429107d5248c4e61ca48704072c
SHA512090766ef186968e50199f1bc84fe75ee551cf3e8f5196903b2257d5a352917c3a9be8aacc5111664f29bd1dea364adb7a98d90f78dc69c6a04e7b181de339de5
-
Filesize
5.2MB
MD5f7e2dcb3834498765dbad195da80333f
SHA17241536c1e0eb7e31d2316f5e7a73e0ee6e32384
SHA256384d696efa7294b7ded147b2474718ff656eeaa7f879cdf4ab0a7e3b5d98b7a2
SHA512c32641815710ecc1e3de840befdda5e08fa8e9268ea575ca3c47fd341a8ab3cbd743af8b2c6cd4eaa51cf604ae3f54373bc5187818e77e641f82f3b9b27e9eb2
-
Filesize
5.2MB
MD5d9f4829c5c9c5cac654f40ae43bb153a
SHA12aba377cf5df9adfd25e73ecdb5505611be7c078
SHA256a90379ea4945f21470aa45c3247949bbca9c1f26a90f3a281adc10446da5f09f
SHA512c8a1c1f436cb6c9aa26bc18b208565e2ac552e55e51655685f70a73b243250077a606aa94d8dd4d7f36b9447ea263acc83204f3f26b5e9da3eb7e9f773f53648
-
Filesize
5.2MB
MD5ab6f74c28948314def0e36621a539fe7
SHA117f8801aa9eed14acb038769eeafbd0ad09d12cf
SHA256f8b81e3405e18a3bda1e8624445bdb7fa279bec6b7e7e9109d5624c046009eb7
SHA512549e6f1e74ee4e682ea29ca0134f0aa0fd40a0801967996601ebfcbf761d982d9f7b3f1090363da60ccb1f908d1b6f0b419c5e190ce8b4cd03669358e0449c9e
-
Filesize
5.2MB
MD5556166e60ddeef5a6fae8ba3053f2dbc
SHA158d02717df98f72b9be6fcd9ffccbaaa1e019314
SHA2561b017ec025a972d7c62620281c96f94975493f033022bfb366b67519d5381f7f
SHA51251f9a3fc88482d4528b8dc1dd1a9e901a14708352672b363da92ad11cccc9eb56d69b4c9bed39b31ac596c4f20e3587c625120d5fd977f1eebbc1706c8b7acec
-
Filesize
5.2MB
MD5d4e4bc82ab5718ca5280a30f35d2aad7
SHA1250855d9ba5d7c1fa3f8d3f77e28d5f1e2c69bb4
SHA256cc1fb9cab50000778a9dc2a923c9d21519eb31f8fe318089ad57bf9a4b79f8d9
SHA5127b2bf8189d93fc9d688e1141297d656aec51067f76e7e51690bc5751164eb6eda55ef9f4184ec833164d930648771169d40f4a42692e8c78a8615bad1d355890
-
Filesize
5.2MB
MD59035401f56d634eef6f44b38d774b00c
SHA10fe08dd7f82feba4ab0495b5c2c820792992d73d
SHA256f5d28028888ec4e80b82d4f5ce1f1925f675f30f7034666c6ddda0e93a6c0aab
SHA51234b1ce4e35fbd9eaeaaad5ab5df02b23db90bf7a112b86b282b1d7b0f88ab123a4941c635dda38c241e273c8a28c536d6953453b9eeeaa131def45e3599b4ca8
-
Filesize
5.2MB
MD56d12924d48bc4ebfd2ded80969532221
SHA187452e111718b5cc6738c3907259472308370cb3
SHA256445607ffc89bbbaae71679a59b4e676ebacc3cac33f43fa621cb7c56826fc57d
SHA5129615282db1773fb434ef03d54b863cafc2f2b2fd6d141bffdfcce06011ca31de0b43851dcd4fa29c507df7b4e59332458e59f4b7ebc02d6f1153dc5a1d94cdaa
-
Filesize
5.2MB
MD5ee8a445759404b2d9ff4fcb1545ddec0
SHA16a767e38d4a196246909ac1df61c3a8d9a544f03
SHA256066d0afe189e550b810b4e9775ecd10676a0cca10214d745439875e93c19e03c
SHA512c7f269becaa8ab62587fc12c1ece309fdac670e6420fe5b099d3dcdd27a47662bab4ce3aecdce95005f94e8f08f0fb6ad07bf6f85e5ab4aab398dad6482e909e