Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 20:05
Behavioral task
behavioral1
Sample
429f3ce549b9fb9f5b500e91db547ca1.exe
Resource
win7-20240729-en
General
-
Target
429f3ce549b9fb9f5b500e91db547ca1.exe
-
Size
5.2MB
-
MD5
429f3ce549b9fb9f5b500e91db547ca1
-
SHA1
05b2de1771e44a7272c6cc48c8a8ce8d89f9ab5a
-
SHA256
4a6703b522b16bfc3005ed3e873d4829629875ecf0a9fb6b0d70fb202ae943bb
-
SHA512
4e02aefdd4f8bbaf59e2aa8b1d47ea43dce50f098e3c2c635feb4ca4c36e275a9c85032f815757371277f36c80f40308861a1ca1fd77530c4f69e7da97aaef59
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l2:RWWBibf56utgpPFotBER/mQ32lU6
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral2/files/0x00090000000233d6-4.dat cobalt_reflective_dll behavioral2/files/0x000700000002342b-10.dat cobalt_reflective_dll behavioral2/files/0x000700000002342c-11.dat cobalt_reflective_dll behavioral2/files/0x0008000000023428-22.dat cobalt_reflective_dll behavioral2/files/0x000700000002342e-28.dat cobalt_reflective_dll behavioral2/files/0x000700000002342f-34.dat cobalt_reflective_dll behavioral2/files/0x0007000000023430-41.dat cobalt_reflective_dll behavioral2/files/0x0007000000023431-48.dat cobalt_reflective_dll behavioral2/files/0x0007000000023434-65.dat cobalt_reflective_dll behavioral2/files/0x0007000000023432-64.dat cobalt_reflective_dll behavioral2/files/0x0007000000023433-55.dat cobalt_reflective_dll behavioral2/files/0x0007000000023435-74.dat cobalt_reflective_dll behavioral2/files/0x0007000000023436-80.dat cobalt_reflective_dll behavioral2/files/0x0007000000023438-90.dat cobalt_reflective_dll behavioral2/files/0x0007000000023437-91.dat cobalt_reflective_dll behavioral2/files/0x0007000000023439-98.dat cobalt_reflective_dll behavioral2/files/0x000700000002343b-119.dat cobalt_reflective_dll behavioral2/files/0x000700000002343c-124.dat cobalt_reflective_dll behavioral2/files/0x000700000002343e-136.dat cobalt_reflective_dll behavioral2/files/0x000700000002343d-131.dat cobalt_reflective_dll behavioral2/files/0x000700000002343a-112.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 46 IoCs
resource yara_rule behavioral2/memory/216-14-0x00007FF621170000-0x00007FF6214C1000-memory.dmp xmrig behavioral2/memory/4100-26-0x00007FF6E21F0000-0x00007FF6E2541000-memory.dmp xmrig behavioral2/memory/1444-67-0x00007FF785750000-0x00007FF785AA1000-memory.dmp xmrig behavioral2/memory/492-63-0x00007FF7C48F0000-0x00007FF7C4C41000-memory.dmp xmrig behavioral2/memory/3620-54-0x00007FF6926A0000-0x00007FF6929F1000-memory.dmp xmrig behavioral2/memory/2784-77-0x00007FF6940B0000-0x00007FF694401000-memory.dmp xmrig behavioral2/memory/1468-75-0x00007FF66F9C0000-0x00007FF66FD11000-memory.dmp xmrig behavioral2/memory/2620-99-0x00007FF6890D0000-0x00007FF689421000-memory.dmp xmrig behavioral2/memory/3840-104-0x00007FF78CD70000-0x00007FF78D0C1000-memory.dmp xmrig behavioral2/memory/2432-113-0x00007FF7CF2A0000-0x00007FF7CF5F1000-memory.dmp xmrig behavioral2/memory/4532-122-0x00007FF69BDA0000-0x00007FF69C0F1000-memory.dmp xmrig behavioral2/memory/4912-121-0x00007FF64F820000-0x00007FF64FB71000-memory.dmp xmrig behavioral2/memory/2464-134-0x00007FF689420000-0x00007FF689771000-memory.dmp xmrig behavioral2/memory/4800-100-0x00007FF7C0490000-0x00007FF7C07E1000-memory.dmp xmrig behavioral2/memory/2352-92-0x00007FF60C840000-0x00007FF60CB91000-memory.dmp xmrig behavioral2/memory/4100-81-0x00007FF6E21F0000-0x00007FF6E2541000-memory.dmp xmrig behavioral2/memory/492-138-0x00007FF7C48F0000-0x00007FF7C4C41000-memory.dmp xmrig behavioral2/memory/2172-150-0x00007FF759BB0000-0x00007FF759F01000-memory.dmp xmrig behavioral2/memory/2468-151-0x00007FF74A7C0000-0x00007FF74AB11000-memory.dmp xmrig behavioral2/memory/3968-152-0x00007FF676E10000-0x00007FF677161000-memory.dmp xmrig behavioral2/memory/3996-161-0x00007FF6D56F0000-0x00007FF6D5A41000-memory.dmp xmrig behavioral2/memory/4612-162-0x00007FF790C10000-0x00007FF790F61000-memory.dmp xmrig behavioral2/memory/1044-160-0x00007FF66FCA0000-0x00007FF66FFF1000-memory.dmp xmrig behavioral2/memory/4444-163-0x00007FF6C5A30000-0x00007FF6C5D81000-memory.dmp xmrig behavioral2/memory/492-164-0x00007FF7C48F0000-0x00007FF7C4C41000-memory.dmp xmrig behavioral2/memory/1444-213-0x00007FF785750000-0x00007FF785AA1000-memory.dmp xmrig behavioral2/memory/216-215-0x00007FF621170000-0x00007FF6214C1000-memory.dmp xmrig behavioral2/memory/1468-225-0x00007FF66F9C0000-0x00007FF66FD11000-memory.dmp xmrig behavioral2/memory/4100-227-0x00007FF6E21F0000-0x00007FF6E2541000-memory.dmp xmrig behavioral2/memory/3840-231-0x00007FF78CD70000-0x00007FF78D0C1000-memory.dmp xmrig behavioral2/memory/2352-230-0x00007FF60C840000-0x00007FF60CB91000-memory.dmp xmrig behavioral2/memory/2432-233-0x00007FF7CF2A0000-0x00007FF7CF5F1000-memory.dmp xmrig behavioral2/memory/3620-235-0x00007FF6926A0000-0x00007FF6929F1000-memory.dmp xmrig behavioral2/memory/4912-237-0x00007FF64F820000-0x00007FF64FB71000-memory.dmp xmrig behavioral2/memory/4532-239-0x00007FF69BDA0000-0x00007FF69C0F1000-memory.dmp xmrig behavioral2/memory/2464-241-0x00007FF689420000-0x00007FF689771000-memory.dmp xmrig behavioral2/memory/2784-245-0x00007FF6940B0000-0x00007FF694401000-memory.dmp xmrig behavioral2/memory/2172-255-0x00007FF759BB0000-0x00007FF759F01000-memory.dmp xmrig behavioral2/memory/2620-257-0x00007FF6890D0000-0x00007FF689421000-memory.dmp xmrig behavioral2/memory/4800-259-0x00007FF7C0490000-0x00007FF7C07E1000-memory.dmp xmrig behavioral2/memory/2468-261-0x00007FF74A7C0000-0x00007FF74AB11000-memory.dmp xmrig behavioral2/memory/3968-263-0x00007FF676E10000-0x00007FF677161000-memory.dmp xmrig behavioral2/memory/1044-267-0x00007FF66FCA0000-0x00007FF66FFF1000-memory.dmp xmrig behavioral2/memory/4612-266-0x00007FF790C10000-0x00007FF790F61000-memory.dmp xmrig behavioral2/memory/3996-269-0x00007FF6D56F0000-0x00007FF6D5A41000-memory.dmp xmrig behavioral2/memory/4444-271-0x00007FF6C5A30000-0x00007FF6C5D81000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 1444 cVshfEM.exe 216 ZTYHYVJ.exe 1468 ZSlxOUp.exe 4100 wOfRyOu.exe 2352 qkzYGMB.exe 3840 izwwAgG.exe 2432 KNhnttH.exe 3620 xgrrZZw.exe 4912 fuoqlkL.exe 4532 YEljbHh.exe 2464 gCBbMKd.exe 2784 bgRjvjo.exe 2172 MyKVqVX.exe 2620 lCZxIth.exe 4800 FNccFOZ.exe 2468 stvDrtt.exe 3968 SJbCrOs.exe 4612 JSFqpGi.exe 1044 GBQwPGE.exe 3996 itJejXB.exe 4444 tsVyeSs.exe -
resource yara_rule behavioral2/memory/492-0-0x00007FF7C48F0000-0x00007FF7C4C41000-memory.dmp upx behavioral2/files/0x00090000000233d6-4.dat upx behavioral2/memory/1444-7-0x00007FF785750000-0x00007FF785AA1000-memory.dmp upx behavioral2/files/0x000700000002342b-10.dat upx behavioral2/files/0x000700000002342c-11.dat upx behavioral2/memory/216-14-0x00007FF621170000-0x00007FF6214C1000-memory.dmp upx behavioral2/memory/1468-20-0x00007FF66F9C0000-0x00007FF66FD11000-memory.dmp upx behavioral2/files/0x0008000000023428-22.dat upx behavioral2/memory/2352-30-0x00007FF60C840000-0x00007FF60CB91000-memory.dmp upx behavioral2/files/0x000700000002342e-28.dat upx behavioral2/memory/4100-26-0x00007FF6E21F0000-0x00007FF6E2541000-memory.dmp upx behavioral2/files/0x000700000002342f-34.dat upx behavioral2/files/0x0007000000023430-41.dat upx behavioral2/memory/2432-42-0x00007FF7CF2A0000-0x00007FF7CF5F1000-memory.dmp upx behavioral2/memory/3840-35-0x00007FF78CD70000-0x00007FF78D0C1000-memory.dmp upx behavioral2/files/0x0007000000023431-48.dat upx behavioral2/memory/4912-57-0x00007FF64F820000-0x00007FF64FB71000-memory.dmp upx behavioral2/memory/4532-62-0x00007FF69BDA0000-0x00007FF69C0F1000-memory.dmp upx behavioral2/files/0x0007000000023434-65.dat upx behavioral2/memory/2464-68-0x00007FF689420000-0x00007FF689771000-memory.dmp upx behavioral2/memory/1444-67-0x00007FF785750000-0x00007FF785AA1000-memory.dmp upx behavioral2/files/0x0007000000023432-64.dat upx behavioral2/memory/492-63-0x00007FF7C48F0000-0x00007FF7C4C41000-memory.dmp upx behavioral2/files/0x0007000000023433-55.dat upx behavioral2/memory/3620-54-0x00007FF6926A0000-0x00007FF6929F1000-memory.dmp upx behavioral2/files/0x0007000000023435-74.dat upx behavioral2/files/0x0007000000023436-80.dat upx behavioral2/memory/2784-77-0x00007FF6940B0000-0x00007FF694401000-memory.dmp upx behavioral2/memory/1468-75-0x00007FF66F9C0000-0x00007FF66FD11000-memory.dmp upx behavioral2/memory/2172-82-0x00007FF759BB0000-0x00007FF759F01000-memory.dmp upx behavioral2/files/0x0007000000023438-90.dat upx behavioral2/files/0x0007000000023437-91.dat upx behavioral2/files/0x0007000000023439-98.dat upx behavioral2/memory/2620-99-0x00007FF6890D0000-0x00007FF689421000-memory.dmp upx behavioral2/memory/3840-104-0x00007FF78CD70000-0x00007FF78D0C1000-memory.dmp upx behavioral2/memory/3968-106-0x00007FF676E10000-0x00007FF677161000-memory.dmp upx behavioral2/memory/2432-113-0x00007FF7CF2A0000-0x00007FF7CF5F1000-memory.dmp upx behavioral2/files/0x000700000002343b-119.dat upx behavioral2/memory/4532-122-0x00007FF69BDA0000-0x00007FF69C0F1000-memory.dmp upx behavioral2/files/0x000700000002343c-124.dat upx behavioral2/memory/1044-123-0x00007FF66FCA0000-0x00007FF66FFF1000-memory.dmp upx behavioral2/memory/4912-121-0x00007FF64F820000-0x00007FF64FB71000-memory.dmp upx behavioral2/memory/4612-117-0x00007FF790C10000-0x00007FF790F61000-memory.dmp upx behavioral2/memory/3996-129-0x00007FF6D56F0000-0x00007FF6D5A41000-memory.dmp upx behavioral2/files/0x000700000002343e-136.dat upx behavioral2/memory/4444-135-0x00007FF6C5A30000-0x00007FF6C5D81000-memory.dmp upx behavioral2/memory/2464-134-0x00007FF689420000-0x00007FF689771000-memory.dmp upx behavioral2/files/0x000700000002343d-131.dat upx behavioral2/files/0x000700000002343a-112.dat upx behavioral2/memory/2468-105-0x00007FF74A7C0000-0x00007FF74AB11000-memory.dmp upx behavioral2/memory/4800-100-0x00007FF7C0490000-0x00007FF7C07E1000-memory.dmp upx behavioral2/memory/2352-92-0x00007FF60C840000-0x00007FF60CB91000-memory.dmp upx behavioral2/memory/4100-81-0x00007FF6E21F0000-0x00007FF6E2541000-memory.dmp upx behavioral2/memory/492-138-0x00007FF7C48F0000-0x00007FF7C4C41000-memory.dmp upx behavioral2/memory/2172-150-0x00007FF759BB0000-0x00007FF759F01000-memory.dmp upx behavioral2/memory/2468-151-0x00007FF74A7C0000-0x00007FF74AB11000-memory.dmp upx behavioral2/memory/3968-152-0x00007FF676E10000-0x00007FF677161000-memory.dmp upx behavioral2/memory/3996-161-0x00007FF6D56F0000-0x00007FF6D5A41000-memory.dmp upx behavioral2/memory/4612-162-0x00007FF790C10000-0x00007FF790F61000-memory.dmp upx behavioral2/memory/1044-160-0x00007FF66FCA0000-0x00007FF66FFF1000-memory.dmp upx behavioral2/memory/4444-163-0x00007FF6C5A30000-0x00007FF6C5D81000-memory.dmp upx behavioral2/memory/492-164-0x00007FF7C48F0000-0x00007FF7C4C41000-memory.dmp upx behavioral2/memory/1444-213-0x00007FF785750000-0x00007FF785AA1000-memory.dmp upx behavioral2/memory/216-215-0x00007FF621170000-0x00007FF6214C1000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\fuoqlkL.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\gCBbMKd.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\bgRjvjo.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\lCZxIth.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\FNccFOZ.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\SJbCrOs.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\ZSlxOUp.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\KNhnttH.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\MyKVqVX.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\JSFqpGi.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\cVshfEM.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\wOfRyOu.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\izwwAgG.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\YEljbHh.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\ZTYHYVJ.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\qkzYGMB.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\GBQwPGE.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\itJejXB.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\tsVyeSs.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\xgrrZZw.exe 429f3ce549b9fb9f5b500e91db547ca1.exe File created C:\Windows\System\stvDrtt.exe 429f3ce549b9fb9f5b500e91db547ca1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 492 429f3ce549b9fb9f5b500e91db547ca1.exe Token: SeLockMemoryPrivilege 492 429f3ce549b9fb9f5b500e91db547ca1.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 492 wrote to memory of 1444 492 429f3ce549b9fb9f5b500e91db547ca1.exe 83 PID 492 wrote to memory of 1444 492 429f3ce549b9fb9f5b500e91db547ca1.exe 83 PID 492 wrote to memory of 216 492 429f3ce549b9fb9f5b500e91db547ca1.exe 84 PID 492 wrote to memory of 216 492 429f3ce549b9fb9f5b500e91db547ca1.exe 84 PID 492 wrote to memory of 1468 492 429f3ce549b9fb9f5b500e91db547ca1.exe 85 PID 492 wrote to memory of 1468 492 429f3ce549b9fb9f5b500e91db547ca1.exe 85 PID 492 wrote to memory of 4100 492 429f3ce549b9fb9f5b500e91db547ca1.exe 86 PID 492 wrote to memory of 4100 492 429f3ce549b9fb9f5b500e91db547ca1.exe 86 PID 492 wrote to memory of 2352 492 429f3ce549b9fb9f5b500e91db547ca1.exe 87 PID 492 wrote to memory of 2352 492 429f3ce549b9fb9f5b500e91db547ca1.exe 87 PID 492 wrote to memory of 3840 492 429f3ce549b9fb9f5b500e91db547ca1.exe 88 PID 492 wrote to memory of 3840 492 429f3ce549b9fb9f5b500e91db547ca1.exe 88 PID 492 wrote to memory of 2432 492 429f3ce549b9fb9f5b500e91db547ca1.exe 89 PID 492 wrote to memory of 2432 492 429f3ce549b9fb9f5b500e91db547ca1.exe 89 PID 492 wrote to memory of 3620 492 429f3ce549b9fb9f5b500e91db547ca1.exe 90 PID 492 wrote to memory of 3620 492 429f3ce549b9fb9f5b500e91db547ca1.exe 90 PID 492 wrote to memory of 4532 492 429f3ce549b9fb9f5b500e91db547ca1.exe 91 PID 492 wrote to memory of 4532 492 429f3ce549b9fb9f5b500e91db547ca1.exe 91 PID 492 wrote to memory of 4912 492 429f3ce549b9fb9f5b500e91db547ca1.exe 92 PID 492 wrote to memory of 4912 492 429f3ce549b9fb9f5b500e91db547ca1.exe 92 PID 492 wrote to memory of 2464 492 429f3ce549b9fb9f5b500e91db547ca1.exe 93 PID 492 wrote to memory of 2464 492 429f3ce549b9fb9f5b500e91db547ca1.exe 93 PID 492 wrote to memory of 2784 492 429f3ce549b9fb9f5b500e91db547ca1.exe 94 PID 492 wrote to memory of 2784 492 429f3ce549b9fb9f5b500e91db547ca1.exe 94 PID 492 wrote to memory of 2172 492 429f3ce549b9fb9f5b500e91db547ca1.exe 95 PID 492 wrote to memory of 2172 492 429f3ce549b9fb9f5b500e91db547ca1.exe 95 PID 492 wrote to memory of 2620 492 429f3ce549b9fb9f5b500e91db547ca1.exe 96 PID 492 wrote to memory of 2620 492 429f3ce549b9fb9f5b500e91db547ca1.exe 96 PID 492 wrote to memory of 4800 492 429f3ce549b9fb9f5b500e91db547ca1.exe 97 PID 492 wrote to memory of 4800 492 429f3ce549b9fb9f5b500e91db547ca1.exe 97 PID 492 wrote to memory of 2468 492 429f3ce549b9fb9f5b500e91db547ca1.exe 98 PID 492 wrote to memory of 2468 492 429f3ce549b9fb9f5b500e91db547ca1.exe 98 PID 492 wrote to memory of 3968 492 429f3ce549b9fb9f5b500e91db547ca1.exe 99 PID 492 wrote to memory of 3968 492 429f3ce549b9fb9f5b500e91db547ca1.exe 99 PID 492 wrote to memory of 4612 492 429f3ce549b9fb9f5b500e91db547ca1.exe 100 PID 492 wrote to memory of 4612 492 429f3ce549b9fb9f5b500e91db547ca1.exe 100 PID 492 wrote to memory of 1044 492 429f3ce549b9fb9f5b500e91db547ca1.exe 101 PID 492 wrote to memory of 1044 492 429f3ce549b9fb9f5b500e91db547ca1.exe 101 PID 492 wrote to memory of 3996 492 429f3ce549b9fb9f5b500e91db547ca1.exe 102 PID 492 wrote to memory of 3996 492 429f3ce549b9fb9f5b500e91db547ca1.exe 102 PID 492 wrote to memory of 4444 492 429f3ce549b9fb9f5b500e91db547ca1.exe 103 PID 492 wrote to memory of 4444 492 429f3ce549b9fb9f5b500e91db547ca1.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\429f3ce549b9fb9f5b500e91db547ca1.exe"C:\Users\Admin\AppData\Local\Temp\429f3ce549b9fb9f5b500e91db547ca1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\System\cVshfEM.exeC:\Windows\System\cVshfEM.exe2⤵
- Executes dropped EXE
PID:1444
-
-
C:\Windows\System\ZTYHYVJ.exeC:\Windows\System\ZTYHYVJ.exe2⤵
- Executes dropped EXE
PID:216
-
-
C:\Windows\System\ZSlxOUp.exeC:\Windows\System\ZSlxOUp.exe2⤵
- Executes dropped EXE
PID:1468
-
-
C:\Windows\System\wOfRyOu.exeC:\Windows\System\wOfRyOu.exe2⤵
- Executes dropped EXE
PID:4100
-
-
C:\Windows\System\qkzYGMB.exeC:\Windows\System\qkzYGMB.exe2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Windows\System\izwwAgG.exeC:\Windows\System\izwwAgG.exe2⤵
- Executes dropped EXE
PID:3840
-
-
C:\Windows\System\KNhnttH.exeC:\Windows\System\KNhnttH.exe2⤵
- Executes dropped EXE
PID:2432
-
-
C:\Windows\System\xgrrZZw.exeC:\Windows\System\xgrrZZw.exe2⤵
- Executes dropped EXE
PID:3620
-
-
C:\Windows\System\YEljbHh.exeC:\Windows\System\YEljbHh.exe2⤵
- Executes dropped EXE
PID:4532
-
-
C:\Windows\System\fuoqlkL.exeC:\Windows\System\fuoqlkL.exe2⤵
- Executes dropped EXE
PID:4912
-
-
C:\Windows\System\gCBbMKd.exeC:\Windows\System\gCBbMKd.exe2⤵
- Executes dropped EXE
PID:2464
-
-
C:\Windows\System\bgRjvjo.exeC:\Windows\System\bgRjvjo.exe2⤵
- Executes dropped EXE
PID:2784
-
-
C:\Windows\System\MyKVqVX.exeC:\Windows\System\MyKVqVX.exe2⤵
- Executes dropped EXE
PID:2172
-
-
C:\Windows\System\lCZxIth.exeC:\Windows\System\lCZxIth.exe2⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\System\FNccFOZ.exeC:\Windows\System\FNccFOZ.exe2⤵
- Executes dropped EXE
PID:4800
-
-
C:\Windows\System\stvDrtt.exeC:\Windows\System\stvDrtt.exe2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Windows\System\SJbCrOs.exeC:\Windows\System\SJbCrOs.exe2⤵
- Executes dropped EXE
PID:3968
-
-
C:\Windows\System\JSFqpGi.exeC:\Windows\System\JSFqpGi.exe2⤵
- Executes dropped EXE
PID:4612
-
-
C:\Windows\System\GBQwPGE.exeC:\Windows\System\GBQwPGE.exe2⤵
- Executes dropped EXE
PID:1044
-
-
C:\Windows\System\itJejXB.exeC:\Windows\System\itJejXB.exe2⤵
- Executes dropped EXE
PID:3996
-
-
C:\Windows\System\tsVyeSs.exeC:\Windows\System\tsVyeSs.exe2⤵
- Executes dropped EXE
PID:4444
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD50fd05ea51da48941fd575eb9940b69ab
SHA195de44ad2e7f2e01f617ef42e22b43fbc6639148
SHA256004fa01ea36f71feae7660a98aa11af7a6676621f58b8478f0b77e3d6bb9e8d7
SHA5128b8aea1607f25f4f232162d325faacfcba5bc72f08ead9aa5768fcb96afb848a6cef742dc8d48948914806ca58eefb62620117d1ee3e19936b991f137598b9b5
-
Filesize
5.2MB
MD545b317539215d1170f6a3290507352e7
SHA19ea244fc2be8cab730972be0e1f2cb22eef3f0c2
SHA256404c6ec19cfea78a4fd3a9b536de353f9302c83f2e703af83a15a858f130b718
SHA512c47d9fdecdfdea679f95c5f939d141505e35e14960cb2b35f05425833091a39b9dc4f0331b5a290291183974cc14e9012e7747c2ef2d4b718bce48382f516434
-
Filesize
5.2MB
MD5bd443e6874073a7e33943cb149dff0fa
SHA1c71751815dada4ebfe6e5c86ca9ee40bdce79965
SHA256726472d542cea9447ed7fed898e5ae6af5fbce304d52ed010a87872dbafa9cc7
SHA512153cbacb55c2d21279e493140c3792bcfb906e51665bc3cc08c57ec69c690a2ff0c57408bd98180e794535164a8c1920a60e371e21b85957a670e1d24775a20d
-
Filesize
5.2MB
MD555306bc19bd8297a5c0d7f7918572380
SHA19fd706d505945f29e19b5b866dedcd03546302ab
SHA2561498888e2bc2ddbcd5ffa820e3543dd8ae49af11a07d08810e64c293aed72cac
SHA512c0bb58600742f74803dc02a51a0a6a800c597a437c262d8a0ced5fe745353998345716d94ab4fcfe2db928fa37a4b3fa49a06c20609ce72aebab63482cee44d0
-
Filesize
5.2MB
MD5279710d90ffc9452f50fa55d76d3e043
SHA1d2b93067683f3396ea487a6373fd84a838e8a753
SHA256d36905945fe94963b7d4575c10c0ad7331d428ce6afcc53b9bfc14f9091d9513
SHA512050fd34e9f5b7e4b6a0f2206d25f80436677b816cc7599f398aa06f02065e64704d0d2132413f585898215af060e66314492aef79d32f242adc92d14e43c03c6
-
Filesize
5.2MB
MD5046b5fb6c7f7bf798e99baa7a1caa377
SHA1db39b0fb1a7e2d8b3ec5c96f3d00a46f64584c8d
SHA256e1d1ba98972d235798ee209a3bfca0980491d10557295657e555b7628ad68c39
SHA512679e298b38a32f35e833428bef8c64494c5c196ec4ba9b8c36a9c74e22283c6e627ab2abe93552bae1116141b3908d06c91c2eca64f9b77e06827a6a1a4f34fe
-
Filesize
5.2MB
MD5dbb15f506d1da83fb57be2d6cd69ae2a
SHA12d294614dfb7ca846c00eb7b3cf0f7884a1475aa
SHA256aab120604095e8112eb40a1143d5edf2e4a00cd8e0256b7f93747c5302b4a9ca
SHA512dbf5d8596723efd8be91fdc998c1aed15f7c769ea1d7c8936361c5b1e996376c0d8124895e0df84957c0d1f23830a5bab494e11cc15eb800f611c0d168ca60d9
-
Filesize
5.2MB
MD5571d798aa832e06f16307f0523e8f12a
SHA19ca9f5155ffc2f190405be97ac72bfbc570d8d89
SHA25601e408f16ddac210defe8484c94d55acd5e3186b09954e3aca963274c6070bc3
SHA51235332ae0ae3ea40cc48927e52e8160696468dd6785a135ede5204765e002b7008546e46a5eda4f88e5bf4323c736da1c6183114309cc7dd96af711e7c9dc4d8f
-
Filesize
5.2MB
MD5ed75db1882aec5122fd428eff11699d9
SHA1fdc70c5b1cd60765613144e9bd01a35516fcce8c
SHA256737befe11d3dee05e5f31796c4f10d7fdd1ec4ead844c3ff7b25ee9d28d48c43
SHA5124b59ed83b80bc350cf01e38e95483e22d7571a6cff53001cf65e65acd00b8b14648094c64243c4f23ebb1c104a03531cd85b278d1f3397a4437c69fd33fdddaa
-
Filesize
5.2MB
MD5dcc09b39fbbe7ea8454591d6f2736198
SHA18bcedb0acccc0ce778cc9bdb818086792861483f
SHA25615840a0399d6a52a2a13b74a6a939661cf4a6f317273c35bee8a27ad4653bfbb
SHA512e90f441802a7799eb0793bcce1f8f36614387e7a1dba9be366cd1dc07d2e26564dd597df31442697f74bfc6f6989bed4b3b27d5987e2e207e1a8d24ab1aa40d7
-
Filesize
5.2MB
MD5b4b0268de021d7c304ef12b94b23a3ab
SHA1a8aec53a8a6fd3707fe8d55ddf228d9e68e0d5f7
SHA25697f0a3f9525dcdc07823c8d2472301324707daa03ceabe5475f57f32b86de573
SHA512c6c7c89824406bdc646ef3e0a37294d67753bbdd4bcb83e705a266911e2ccdb208a415aa0daf2225350f9978f7b9763868c351c6ccb917f543330dd6a6646d5a
-
Filesize
5.2MB
MD592c1c69f64b68848205b2abb92138c3b
SHA1af3e94a83221d4a8579c37a408cc410ecd17f1fa
SHA256a378ddfb88e370db338071caab7b0e2fbbed3fe64c8f160d99f0f2d6a6ea534b
SHA51234f97f6bded3612f760f8316f10f78a5880062f08798469fd3bf41c0246c466aba09fff0733db36e03538d5f758dd3db95837b501b162a87c6261a81a86edc8c
-
Filesize
5.2MB
MD51472a2c255ea2aea6f012cf1e860399b
SHA1c72118e190430747bc2b8f1f7d7b1dabc8956205
SHA256c51af825b98f227634688c8bfb2f6513ecfbc4efb85dc2b8db28d338ff624b25
SHA5128aaf015d97169ea6a112d6636d7b80d1c917c0aad58253c24d9ca05b8ec731580ded158094fcee5909edf475e3f49902b918f0a2dc6cbf5191bb8762666d6e41
-
Filesize
5.2MB
MD5db994e4ea89280e098e2a0a51d81d4a4
SHA104cc2adbe26b911685059bbe94b9cc04dac6e125
SHA2564d9b44d39281090221c75fb592a24b7039de83ec6450c2ace6d75eabc8ae6b8a
SHA512500bc2360a2a4699d82961a506843ef9eac6a71a2a4a97c0a2882893a7000c2753b72ff0668f963c7dc3a489cdf1e2d86359ec54dafc614fb6f1816047457134
-
Filesize
5.2MB
MD5b44d66322aec4cb64f8081e2776bb5d5
SHA1b8e13590e5ae47493c7b11c4d86eac6c1a498117
SHA256289d9b2346b110bcd60c8934c0cf7094dd49e2282e764776ddab67f3279e377e
SHA5126e6748aab32429f210ceca2deec32a38e9768ebb0ed037004673cf643430c6d6e749e543362b5254eb001817be704446f8156684ea85dbd219f0321554b1822b
-
Filesize
5.2MB
MD52b9b44fee5d7efd91ee78e53547bcad4
SHA145bb51e71091f89719c08438c6547b20ecd0d35d
SHA2561e2a07f09cbbbff1287d550b9c224e7adcf4c222f832c7ba0cb5c1d5eded72e9
SHA512bb1f47b26e13cbf68d8964b7a1fa94dac4d1016ec5056994b17e3e713cefd271c025d535c86270a7b3720fbb82487bc697e8e55e911942a2ce8cfe487d7a0063
-
Filesize
5.2MB
MD5ac72b9337d73bdbbd6ec34bafcc7b6ab
SHA107744a5782b08d38e3435d884b9e92b2be79e18a
SHA256a735d50b943753746957196f497499a3a905b2719d3539d56760041c7dabe4e1
SHA5126ab8ca0a66e89dc0cd87cba9afdf59e3fbe3ba9b498cf0bce7976d8b11624af389ffe5c94c526e9f561d7d2f7faf41f7f4669ab1a310c4d370dd66579bf99565
-
Filesize
5.2MB
MD599f8460357782d2431f0fa8fbe44350b
SHA132daae9ecc3a5c5edf472bb366a308078278cb7f
SHA25691b8804017f6c1c8c8b450f452778763b38376de15da6dad4a3cce8222b1dd40
SHA51263fd0a053b749920dabd5d321d72f6279248a7d39255a585fb92d961db1d41a8de0aab4be34de819eb668505cc551b610b6f65ad5d55cce7079de8921a7b6831
-
Filesize
5.2MB
MD5ae53fab50bdaaf81ab82d28007008f63
SHA17f0226a0d8813cf9da396fcf2e315929effb641c
SHA25640cf080c8636fb215492a2a0ba67dbf6f8ccb8aa6d3d14a3d9a0d28162d862bf
SHA512d804b1112a1ef4f39b562896c86f4c2827095137cf609edb5678e3f71d782902a293bf1391563070839e589228a08c2c6caad3cb8d8db4f22e3792dcf2227c67
-
Filesize
5.2MB
MD5ef2b3b2860f4bf7566a09a191233adc4
SHA13bd10aa82d406066b2c9fd6af7205dc3b75c51af
SHA25686bdbdf10d8aa3511e0e45ae55ed7ee70186ebadc1c4b995cf9585b93317fd2f
SHA512e91dd2c081f13c6578b19940aab150c5351116b3d61b5a177208a36b638280d3032a46e1863ccc8dae1145828394dc5557e6fe0765818f417a36a4595d6798cc
-
Filesize
5.2MB
MD52b69c0206a76a8221d48740a5347401f
SHA1e1e539800b6684e3584f4eec639d4e9bd4aed5f7
SHA256f2263127e7bede7a25ff6078c6de94185aee161a01bfbe1b5107c70e275cffac
SHA5124ace5f46739c47a7afd156af56cb1e6d2f31ecd7ba027fe8e287d55dbe6c50a295e2d6b2a49b0e16c842fe08b09db30a5d04c0f221628a8e615ed1ec134a656c