Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 20:56
Behavioral task
behavioral1
Sample
76d9468f87d80dd608bc30360a246ce9.exe
Resource
win7-20240708-en
General
-
Target
76d9468f87d80dd608bc30360a246ce9.exe
-
Size
5.2MB
-
MD5
76d9468f87d80dd608bc30360a246ce9
-
SHA1
77c55a94464f78263ed8c9a602e73ea3befde2b6
-
SHA256
1a7acde47443a7ed4e01b81a28c665eb579ae10298a839107361c9ee4eff0515
-
SHA512
2f73ab2629764540745ee842f6e04d066d0347d39141bc4aea63c1951b1a8d55ebfa3de15a05b66c7fc3bd1a57ef37b6263a725178436bd7d0ce0c0a4027cc00
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lq:RWWBibf56utgpPFotBER/mQ32lUu
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x000a00000001202b-3.dat cobalt_reflective_dll behavioral1/files/0x00070000000187a7-13.dat cobalt_reflective_dll behavioral1/files/0x00080000000187ac-12.dat cobalt_reflective_dll behavioral1/files/0x0008000000018708-24.dat cobalt_reflective_dll behavioral1/files/0x00070000000187c0-21.dat cobalt_reflective_dll behavioral1/files/0x0007000000018bb0-36.dat cobalt_reflective_dll behavioral1/files/0x0007000000018be5-43.dat cobalt_reflective_dll behavioral1/files/0x0007000000018bf9-52.dat cobalt_reflective_dll behavioral1/files/0x0008000000018c11-60.dat cobalt_reflective_dll behavioral1/files/0x000500000001951e-67.dat cobalt_reflective_dll behavioral1/files/0x000500000001952c-87.dat cobalt_reflective_dll behavioral1/files/0x000500000001963d-104.dat cobalt_reflective_dll behavioral1/files/0x0005000000019643-127.dat cobalt_reflective_dll behavioral1/files/0x0005000000019533-130.dat cobalt_reflective_dll behavioral1/files/0x000500000001963f-134.dat cobalt_reflective_dll behavioral1/files/0x0005000000019645-118.dat cobalt_reflective_dll behavioral1/files/0x0005000000019610-112.dat cobalt_reflective_dll behavioral1/files/0x00050000000195b3-111.dat cobalt_reflective_dll behavioral1/files/0x000500000001963b-100.dat cobalt_reflective_dll behavioral1/files/0x00050000000195de-93.dat cobalt_reflective_dll behavioral1/files/0x0005000000019529-77.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 42 IoCs
resource yara_rule behavioral1/memory/2412-35-0x000000013F110000-0x000000013F461000-memory.dmp xmrig behavioral1/memory/2136-34-0x000000013FDD0000-0x0000000140121000-memory.dmp xmrig behavioral1/memory/2928-32-0x000000013FD00000-0x0000000140051000-memory.dmp xmrig behavioral1/memory/2136-40-0x000000013F410000-0x000000013F761000-memory.dmp xmrig behavioral1/memory/2120-39-0x000000013FA90000-0x000000013FDE1000-memory.dmp xmrig behavioral1/memory/2620-51-0x000000013F270000-0x000000013F5C1000-memory.dmp xmrig behavioral1/memory/2516-49-0x000000013F590000-0x000000013F8E1000-memory.dmp xmrig behavioral1/memory/2404-57-0x000000013F0B0000-0x000000013F401000-memory.dmp xmrig behavioral1/memory/2928-65-0x000000013FD00000-0x0000000140051000-memory.dmp xmrig behavioral1/memory/1696-66-0x000000013F280000-0x000000013F5D1000-memory.dmp xmrig behavioral1/memory/2620-138-0x000000013F270000-0x000000013F5C1000-memory.dmp xmrig behavioral1/memory/2136-85-0x000000013F960000-0x000000013FCB1000-memory.dmp xmrig behavioral1/memory/2136-74-0x000000013F410000-0x000000013F761000-memory.dmp xmrig behavioral1/memory/2900-88-0x000000013F410000-0x000000013F761000-memory.dmp xmrig behavioral1/memory/2648-141-0x000000013F610000-0x000000013F961000-memory.dmp xmrig behavioral1/memory/2136-144-0x000000013FDD0000-0x0000000140121000-memory.dmp xmrig behavioral1/memory/2136-150-0x000000013F960000-0x000000013FCB1000-memory.dmp xmrig behavioral1/memory/2612-149-0x000000013FE00000-0x0000000140151000-memory.dmp xmrig behavioral1/memory/2504-155-0x000000013F9D0000-0x000000013FD21000-memory.dmp xmrig behavioral1/memory/2676-158-0x000000013F960000-0x000000013FCB1000-memory.dmp xmrig behavioral1/memory/2224-163-0x000000013F8D0000-0x000000013FC21000-memory.dmp xmrig behavioral1/memory/308-165-0x000000013F690000-0x000000013F9E1000-memory.dmp xmrig behavioral1/memory/1588-169-0x000000013F7A0000-0x000000013FAF1000-memory.dmp xmrig behavioral1/memory/1452-171-0x000000013FD80000-0x00000001400D1000-memory.dmp xmrig behavioral1/memory/2848-170-0x000000013F170000-0x000000013F4C1000-memory.dmp xmrig behavioral1/memory/2004-168-0x000000013FAF0000-0x000000013FE41000-memory.dmp xmrig behavioral1/memory/2872-167-0x000000013F810000-0x000000013FB61000-memory.dmp xmrig behavioral1/memory/1664-166-0x000000013F630000-0x000000013F981000-memory.dmp xmrig behavioral1/memory/2352-164-0x000000013F7F0000-0x000000013FB41000-memory.dmp xmrig behavioral1/memory/2136-172-0x000000013FDD0000-0x0000000140121000-memory.dmp xmrig behavioral1/memory/2120-221-0x000000013FA90000-0x000000013FDE1000-memory.dmp xmrig behavioral1/memory/2516-223-0x000000013F590000-0x000000013F8E1000-memory.dmp xmrig behavioral1/memory/2404-228-0x000000013F0B0000-0x000000013F401000-memory.dmp xmrig behavioral1/memory/2928-230-0x000000013FD00000-0x0000000140051000-memory.dmp xmrig behavioral1/memory/2412-232-0x000000013F110000-0x000000013F461000-memory.dmp xmrig behavioral1/memory/2900-236-0x000000013F410000-0x000000013F761000-memory.dmp xmrig behavioral1/memory/2620-238-0x000000013F270000-0x000000013F5C1000-memory.dmp xmrig behavioral1/memory/2648-243-0x000000013F610000-0x000000013F961000-memory.dmp xmrig behavioral1/memory/1696-245-0x000000013F280000-0x000000013F5D1000-memory.dmp xmrig behavioral1/memory/2612-257-0x000000013FE00000-0x0000000140151000-memory.dmp xmrig behavioral1/memory/2676-259-0x000000013F960000-0x000000013FCB1000-memory.dmp xmrig behavioral1/memory/2504-261-0x000000013F9D0000-0x000000013FD21000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2120 BjNdxHa.exe 2516 hqPRsLu.exe 2404 odlxeLO.exe 2928 jQDWpiy.exe 2412 FHyXkCB.exe 2900 rhvTpfl.exe 2620 VRqtOzo.exe 2648 PcWrFcL.exe 1696 KMWhONI.exe 2612 VRFWSkI.exe 2676 CnAFJKZ.exe 2504 PzfSbMp.exe 2352 SxuKiao.exe 1664 AAZdvCc.exe 2004 bhCuieJ.exe 2848 XgpdPHb.exe 2224 FNblWUI.exe 308 kzpioSk.exe 2872 mQbsQKw.exe 1588 baqMacN.exe 1452 QZrLaYI.exe -
Loads dropped DLL 21 IoCs
pid Process 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe 2136 76d9468f87d80dd608bc30360a246ce9.exe -
resource yara_rule behavioral1/memory/2136-0-0x000000013FDD0000-0x0000000140121000-memory.dmp upx behavioral1/files/0x000a00000001202b-3.dat upx behavioral1/memory/2120-8-0x000000013FA90000-0x000000013FDE1000-memory.dmp upx behavioral1/files/0x00070000000187a7-13.dat upx behavioral1/memory/2516-15-0x000000013F590000-0x000000013F8E1000-memory.dmp upx behavioral1/files/0x00080000000187ac-12.dat upx behavioral1/memory/2404-20-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/files/0x0008000000018708-24.dat upx behavioral1/files/0x00070000000187c0-21.dat upx behavioral1/memory/2412-35-0x000000013F110000-0x000000013F461000-memory.dmp upx behavioral1/memory/2136-34-0x000000013FDD0000-0x0000000140121000-memory.dmp upx behavioral1/memory/2928-32-0x000000013FD00000-0x0000000140051000-memory.dmp upx behavioral1/files/0x0007000000018bb0-36.dat upx behavioral1/memory/2900-42-0x000000013F410000-0x000000013F761000-memory.dmp upx behavioral1/files/0x0007000000018be5-43.dat upx behavioral1/memory/2120-39-0x000000013FA90000-0x000000013FDE1000-memory.dmp upx behavioral1/memory/2620-51-0x000000013F270000-0x000000013F5C1000-memory.dmp upx behavioral1/memory/2516-49-0x000000013F590000-0x000000013F8E1000-memory.dmp upx behavioral1/files/0x0007000000018bf9-52.dat upx behavioral1/memory/2404-57-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/memory/2648-59-0x000000013F610000-0x000000013F961000-memory.dmp upx behavioral1/files/0x0008000000018c11-60.dat upx behavioral1/memory/2928-65-0x000000013FD00000-0x0000000140051000-memory.dmp upx behavioral1/memory/1696-66-0x000000013F280000-0x000000013F5D1000-memory.dmp upx behavioral1/files/0x000500000001951e-67.dat upx behavioral1/memory/2612-72-0x000000013FE00000-0x0000000140151000-memory.dmp upx behavioral1/files/0x000500000001952c-87.dat upx behavioral1/files/0x000500000001963d-104.dat upx behavioral1/files/0x0005000000019643-127.dat upx behavioral1/files/0x0005000000019533-130.dat upx behavioral1/files/0x000500000001963f-134.dat upx behavioral1/files/0x0005000000019645-118.dat upx behavioral1/files/0x0005000000019610-112.dat upx behavioral1/files/0x00050000000195b3-111.dat upx behavioral1/files/0x000500000001963b-100.dat upx behavioral1/files/0x00050000000195de-93.dat upx behavioral1/memory/2620-138-0x000000013F270000-0x000000013F5C1000-memory.dmp upx behavioral1/files/0x0005000000019529-77.dat upx behavioral1/memory/2676-91-0x000000013F960000-0x000000013FCB1000-memory.dmp upx behavioral1/memory/2504-89-0x000000013F9D0000-0x000000013FD21000-memory.dmp upx behavioral1/memory/2900-88-0x000000013F410000-0x000000013F761000-memory.dmp upx behavioral1/memory/2648-141-0x000000013F610000-0x000000013F961000-memory.dmp upx behavioral1/memory/2136-144-0x000000013FDD0000-0x0000000140121000-memory.dmp upx behavioral1/memory/2612-149-0x000000013FE00000-0x0000000140151000-memory.dmp upx behavioral1/memory/2504-155-0x000000013F9D0000-0x000000013FD21000-memory.dmp upx behavioral1/memory/2676-158-0x000000013F960000-0x000000013FCB1000-memory.dmp upx behavioral1/memory/2224-163-0x000000013F8D0000-0x000000013FC21000-memory.dmp upx behavioral1/memory/308-165-0x000000013F690000-0x000000013F9E1000-memory.dmp upx behavioral1/memory/1588-169-0x000000013F7A0000-0x000000013FAF1000-memory.dmp upx behavioral1/memory/1452-171-0x000000013FD80000-0x00000001400D1000-memory.dmp upx behavioral1/memory/2848-170-0x000000013F170000-0x000000013F4C1000-memory.dmp upx behavioral1/memory/2004-168-0x000000013FAF0000-0x000000013FE41000-memory.dmp upx behavioral1/memory/2872-167-0x000000013F810000-0x000000013FB61000-memory.dmp upx behavioral1/memory/1664-166-0x000000013F630000-0x000000013F981000-memory.dmp upx behavioral1/memory/2352-164-0x000000013F7F0000-0x000000013FB41000-memory.dmp upx behavioral1/memory/2136-172-0x000000013FDD0000-0x0000000140121000-memory.dmp upx behavioral1/memory/2120-221-0x000000013FA90000-0x000000013FDE1000-memory.dmp upx behavioral1/memory/2516-223-0x000000013F590000-0x000000013F8E1000-memory.dmp upx behavioral1/memory/2404-228-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/memory/2928-230-0x000000013FD00000-0x0000000140051000-memory.dmp upx behavioral1/memory/2412-232-0x000000013F110000-0x000000013F461000-memory.dmp upx behavioral1/memory/2900-236-0x000000013F410000-0x000000013F761000-memory.dmp upx behavioral1/memory/2620-238-0x000000013F270000-0x000000013F5C1000-memory.dmp upx behavioral1/memory/2648-243-0x000000013F610000-0x000000013F961000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\SxuKiao.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\mQbsQKw.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\hqPRsLu.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\KMWhONI.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\VRFWSkI.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\CnAFJKZ.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\bhCuieJ.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\BjNdxHa.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\FHyXkCB.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\VRqtOzo.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\PzfSbMp.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\jQDWpiy.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\FNblWUI.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\baqMacN.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\XgpdPHb.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\AAZdvCc.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\QZrLaYI.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\odlxeLO.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\rhvTpfl.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\PcWrFcL.exe 76d9468f87d80dd608bc30360a246ce9.exe File created C:\Windows\System\kzpioSk.exe 76d9468f87d80dd608bc30360a246ce9.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2136 76d9468f87d80dd608bc30360a246ce9.exe Token: SeLockMemoryPrivilege 2136 76d9468f87d80dd608bc30360a246ce9.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2120 2136 76d9468f87d80dd608bc30360a246ce9.exe 31 PID 2136 wrote to memory of 2120 2136 76d9468f87d80dd608bc30360a246ce9.exe 31 PID 2136 wrote to memory of 2120 2136 76d9468f87d80dd608bc30360a246ce9.exe 31 PID 2136 wrote to memory of 2516 2136 76d9468f87d80dd608bc30360a246ce9.exe 32 PID 2136 wrote to memory of 2516 2136 76d9468f87d80dd608bc30360a246ce9.exe 32 PID 2136 wrote to memory of 2516 2136 76d9468f87d80dd608bc30360a246ce9.exe 32 PID 2136 wrote to memory of 2404 2136 76d9468f87d80dd608bc30360a246ce9.exe 33 PID 2136 wrote to memory of 2404 2136 76d9468f87d80dd608bc30360a246ce9.exe 33 PID 2136 wrote to memory of 2404 2136 76d9468f87d80dd608bc30360a246ce9.exe 33 PID 2136 wrote to memory of 2412 2136 76d9468f87d80dd608bc30360a246ce9.exe 34 PID 2136 wrote to memory of 2412 2136 76d9468f87d80dd608bc30360a246ce9.exe 34 PID 2136 wrote to memory of 2412 2136 76d9468f87d80dd608bc30360a246ce9.exe 34 PID 2136 wrote to memory of 2928 2136 76d9468f87d80dd608bc30360a246ce9.exe 35 PID 2136 wrote to memory of 2928 2136 76d9468f87d80dd608bc30360a246ce9.exe 35 PID 2136 wrote to memory of 2928 2136 76d9468f87d80dd608bc30360a246ce9.exe 35 PID 2136 wrote to memory of 2900 2136 76d9468f87d80dd608bc30360a246ce9.exe 36 PID 2136 wrote to memory of 2900 2136 76d9468f87d80dd608bc30360a246ce9.exe 36 PID 2136 wrote to memory of 2900 2136 76d9468f87d80dd608bc30360a246ce9.exe 36 PID 2136 wrote to memory of 2620 2136 76d9468f87d80dd608bc30360a246ce9.exe 37 PID 2136 wrote to memory of 2620 2136 76d9468f87d80dd608bc30360a246ce9.exe 37 PID 2136 wrote to memory of 2620 2136 76d9468f87d80dd608bc30360a246ce9.exe 37 PID 2136 wrote to memory of 2648 2136 76d9468f87d80dd608bc30360a246ce9.exe 38 PID 2136 wrote to memory of 2648 2136 76d9468f87d80dd608bc30360a246ce9.exe 38 PID 2136 wrote to memory of 2648 2136 76d9468f87d80dd608bc30360a246ce9.exe 38 PID 2136 wrote to memory of 1696 2136 76d9468f87d80dd608bc30360a246ce9.exe 39 PID 2136 wrote to memory of 1696 2136 76d9468f87d80dd608bc30360a246ce9.exe 39 PID 2136 wrote to memory of 1696 2136 76d9468f87d80dd608bc30360a246ce9.exe 39 PID 2136 wrote to memory of 2612 2136 76d9468f87d80dd608bc30360a246ce9.exe 40 PID 2136 wrote to memory of 2612 2136 76d9468f87d80dd608bc30360a246ce9.exe 40 PID 2136 wrote to memory of 2612 2136 76d9468f87d80dd608bc30360a246ce9.exe 40 PID 2136 wrote to memory of 2676 2136 76d9468f87d80dd608bc30360a246ce9.exe 41 PID 2136 wrote to memory of 2676 2136 76d9468f87d80dd608bc30360a246ce9.exe 41 PID 2136 wrote to memory of 2676 2136 76d9468f87d80dd608bc30360a246ce9.exe 41 PID 2136 wrote to memory of 2504 2136 76d9468f87d80dd608bc30360a246ce9.exe 42 PID 2136 wrote to memory of 2504 2136 76d9468f87d80dd608bc30360a246ce9.exe 42 PID 2136 wrote to memory of 2504 2136 76d9468f87d80dd608bc30360a246ce9.exe 42 PID 2136 wrote to memory of 2224 2136 76d9468f87d80dd608bc30360a246ce9.exe 43 PID 2136 wrote to memory of 2224 2136 76d9468f87d80dd608bc30360a246ce9.exe 43 PID 2136 wrote to memory of 2224 2136 76d9468f87d80dd608bc30360a246ce9.exe 43 PID 2136 wrote to memory of 2352 2136 76d9468f87d80dd608bc30360a246ce9.exe 44 PID 2136 wrote to memory of 2352 2136 76d9468f87d80dd608bc30360a246ce9.exe 44 PID 2136 wrote to memory of 2352 2136 76d9468f87d80dd608bc30360a246ce9.exe 44 PID 2136 wrote to memory of 308 2136 76d9468f87d80dd608bc30360a246ce9.exe 45 PID 2136 wrote to memory of 308 2136 76d9468f87d80dd608bc30360a246ce9.exe 45 PID 2136 wrote to memory of 308 2136 76d9468f87d80dd608bc30360a246ce9.exe 45 PID 2136 wrote to memory of 1664 2136 76d9468f87d80dd608bc30360a246ce9.exe 46 PID 2136 wrote to memory of 1664 2136 76d9468f87d80dd608bc30360a246ce9.exe 46 PID 2136 wrote to memory of 1664 2136 76d9468f87d80dd608bc30360a246ce9.exe 46 PID 2136 wrote to memory of 2872 2136 76d9468f87d80dd608bc30360a246ce9.exe 47 PID 2136 wrote to memory of 2872 2136 76d9468f87d80dd608bc30360a246ce9.exe 47 PID 2136 wrote to memory of 2872 2136 76d9468f87d80dd608bc30360a246ce9.exe 47 PID 2136 wrote to memory of 2004 2136 76d9468f87d80dd608bc30360a246ce9.exe 48 PID 2136 wrote to memory of 2004 2136 76d9468f87d80dd608bc30360a246ce9.exe 48 PID 2136 wrote to memory of 2004 2136 76d9468f87d80dd608bc30360a246ce9.exe 48 PID 2136 wrote to memory of 1588 2136 76d9468f87d80dd608bc30360a246ce9.exe 49 PID 2136 wrote to memory of 1588 2136 76d9468f87d80dd608bc30360a246ce9.exe 49 PID 2136 wrote to memory of 1588 2136 76d9468f87d80dd608bc30360a246ce9.exe 49 PID 2136 wrote to memory of 2848 2136 76d9468f87d80dd608bc30360a246ce9.exe 50 PID 2136 wrote to memory of 2848 2136 76d9468f87d80dd608bc30360a246ce9.exe 50 PID 2136 wrote to memory of 2848 2136 76d9468f87d80dd608bc30360a246ce9.exe 50 PID 2136 wrote to memory of 1452 2136 76d9468f87d80dd608bc30360a246ce9.exe 51 PID 2136 wrote to memory of 1452 2136 76d9468f87d80dd608bc30360a246ce9.exe 51 PID 2136 wrote to memory of 1452 2136 76d9468f87d80dd608bc30360a246ce9.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\76d9468f87d80dd608bc30360a246ce9.exe"C:\Users\Admin\AppData\Local\Temp\76d9468f87d80dd608bc30360a246ce9.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\System\BjNdxHa.exeC:\Windows\System\BjNdxHa.exe2⤵
- Executes dropped EXE
PID:2120
-
-
C:\Windows\System\hqPRsLu.exeC:\Windows\System\hqPRsLu.exe2⤵
- Executes dropped EXE
PID:2516
-
-
C:\Windows\System\odlxeLO.exeC:\Windows\System\odlxeLO.exe2⤵
- Executes dropped EXE
PID:2404
-
-
C:\Windows\System\FHyXkCB.exeC:\Windows\System\FHyXkCB.exe2⤵
- Executes dropped EXE
PID:2412
-
-
C:\Windows\System\jQDWpiy.exeC:\Windows\System\jQDWpiy.exe2⤵
- Executes dropped EXE
PID:2928
-
-
C:\Windows\System\rhvTpfl.exeC:\Windows\System\rhvTpfl.exe2⤵
- Executes dropped EXE
PID:2900
-
-
C:\Windows\System\VRqtOzo.exeC:\Windows\System\VRqtOzo.exe2⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\System\PcWrFcL.exeC:\Windows\System\PcWrFcL.exe2⤵
- Executes dropped EXE
PID:2648
-
-
C:\Windows\System\KMWhONI.exeC:\Windows\System\KMWhONI.exe2⤵
- Executes dropped EXE
PID:1696
-
-
C:\Windows\System\VRFWSkI.exeC:\Windows\System\VRFWSkI.exe2⤵
- Executes dropped EXE
PID:2612
-
-
C:\Windows\System\CnAFJKZ.exeC:\Windows\System\CnAFJKZ.exe2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Windows\System\PzfSbMp.exeC:\Windows\System\PzfSbMp.exe2⤵
- Executes dropped EXE
PID:2504
-
-
C:\Windows\System\FNblWUI.exeC:\Windows\System\FNblWUI.exe2⤵
- Executes dropped EXE
PID:2224
-
-
C:\Windows\System\SxuKiao.exeC:\Windows\System\SxuKiao.exe2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Windows\System\kzpioSk.exeC:\Windows\System\kzpioSk.exe2⤵
- Executes dropped EXE
PID:308
-
-
C:\Windows\System\AAZdvCc.exeC:\Windows\System\AAZdvCc.exe2⤵
- Executes dropped EXE
PID:1664
-
-
C:\Windows\System\mQbsQKw.exeC:\Windows\System\mQbsQKw.exe2⤵
- Executes dropped EXE
PID:2872
-
-
C:\Windows\System\bhCuieJ.exeC:\Windows\System\bhCuieJ.exe2⤵
- Executes dropped EXE
PID:2004
-
-
C:\Windows\System\baqMacN.exeC:\Windows\System\baqMacN.exe2⤵
- Executes dropped EXE
PID:1588
-
-
C:\Windows\System\XgpdPHb.exeC:\Windows\System\XgpdPHb.exe2⤵
- Executes dropped EXE
PID:2848
-
-
C:\Windows\System\QZrLaYI.exeC:\Windows\System\QZrLaYI.exe2⤵
- Executes dropped EXE
PID:1452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5ffaab162a64c9edb16efd66b4ac8eb89
SHA14bd73360dadff7bf4de581f0e96eff7fcbd68015
SHA2561de67742392c94941ab6c1f5100fabbc0a4b2ce1d2f51b5d34ef919d10c5e8d2
SHA5121e875a02c7ed457c366655c8819842ec8b83eeb0a9fd2c6c9875838c05993595b583bbd083170c47c8a11b9fa4dc284c4a1039633a470a18940bd9a3a3d6f80f
-
Filesize
5.2MB
MD5a51d57736ebc4ca43c54f95fd3c8b0ca
SHA111140226374485dfb46baef3f0b8b482b4e2b97f
SHA25681d1882126c523e245f907c798658c555f8b4365049c3c676a8f1ef54e2da676
SHA51272521503e5f23a6ae5e7390f4717cf86c32fd8d7000c4d22e73e777c1dfc798ac45fc666f1bb8ec8ea1d0ec721bd7b87cd6781069caadb6a0882231f949b74e7
-
Filesize
5.2MB
MD551d9985fb9dff70c24d6eaf8b3bbd7df
SHA1e213d93ad817d7712e44374189932270fda4d48b
SHA256a85706de921e88b350e5fd88b3a7f3b6fa93260170be2cf60a1762df88bd0185
SHA512ed55ae5b7214bda7a60d2cd86a7924f799c8e6bc7c690cd4650975119a1a3d9d37c1b06cb8f37861eed6191babda1e927468206326f4ba636263870464a6c2e2
-
Filesize
5.2MB
MD5bcccb4211517f8a4ba3c7d21e4837378
SHA18dae382636ba0f802d06f82fbb1b53a4c421a7c8
SHA256defd2beb6ed306c381c577844fd4c0f700d97a1c8cb12b7a3ea8a3933b0abee1
SHA512c14d19edbe596e72cd919e9b958d8823554631d3708acf2eb484dd6ec0144454fda5f82d838bd73c2bdc32f200e5304425279feb893fdf5058e977726b6f961c
-
Filesize
5.2MB
MD5e27aa8ff61ba483e969893d4294a9124
SHA16baedb465b673171177f0b763a2af2afc9ec1a38
SHA2562a78a13d07afa67022be9311b4f594df87df6677fa3af002b1510f008b39cba6
SHA512202db23ae06957a7973a9b997532445e2773e1c23dd0db71bb0bee820c70fa90d346b87194d2f7afc8d9fd1b54244a13160e75a4062f218faad0bd5503c930a6
-
Filesize
5.2MB
MD5b3d04dc780bdeba922756259625998d6
SHA16278689ce72b53f3940b3548d14e81c455741560
SHA256880abe8395dca54143d5d091bf88c7f904eef57dadbfe27223dc969ad7679b31
SHA5127294f52a46f571943cfc26966294f808ea811dc55ffbf3621bdb95c7c2bfdcb80c853d13d90dd73c269b053e352119a406984941ab81d544ea86a40b6b0040ff
-
Filesize
5.2MB
MD5db8419e16f06814505fc3ecdf1660e0f
SHA1f8e773cc7e1f2c447c86d689aef4e5c44d01ab5d
SHA2564b7f65018abb976efee384c63a83fce4cef02ea5b5fd42b7f90793cd5d34feab
SHA51233fa70c097d6367a695b11c5a173523b2e69f3dfa4f506f836916474ecd824584f10f92240753eea2db5c1951c48818a8e430139a43f4b83883d5ad0acecd371
-
Filesize
5.2MB
MD58e04b1ec28f9e6f4626a6d0e75e4f16f
SHA1c3f0cb8f6887d17dca161744a4923dc1375a19d2
SHA256aa87c4fe4d610707ba9f43952158e1837da83f578bb33c5dfd92741284952052
SHA51281a9a830d36d9412818ad3d80cb08fab83a080ff15ba444781b51c2184f50f6abadec12578cf9de9fca9c19268dfa69a3ff0d7fcf92595594558ea2d5bf05561
-
Filesize
5.2MB
MD5d98d350485a81b195703755c8f4d8b52
SHA1c125b3e4df316709f6fa72f5a9cbc9806f0d524f
SHA256115a8da2b133d0d78cf8b5ad5b72f2df5c56fabf7c12edc8529c6f6ebf300230
SHA51289ecc61e59d781adff39b604df298205b9112397aaa19bfffc2d1c09c09d6d959ca46d04f67cc3a4bb9933ce44d0a468f1ed6abe823793752272dd939a9cf2e3
-
Filesize
5.2MB
MD511faececa9c407466516038e0aa0034d
SHA1e12043d02a5290d0b670640d5b69e1fbfb66d696
SHA256df73f731b320a94d43ab0dea0008849c96527d23bb0086a0b16c97bc06516170
SHA512f9a504de8d15e63fd826b6404f465f29406af4c04fb19079a5359ab2de77e182ee327643888f529312efccf9cb199fdf8fdc676af0b62cb0008bba59ec680ae5
-
Filesize
5.2MB
MD5b73ef9fc00e85d536040357b31aa54b2
SHA1f121346da26ed956cda183f2a327e82b392e2094
SHA256f86bedeea8c5a9605873bb9058d4cda15f61bbd0b01a6581572cbe7617189c9a
SHA51211984ce006663a38e27a21631ba81c3179f0513d9251abf4fee9396844ee3944f0df43b36bcdadb30f7b84dded303ff3e056be5748bd29eae5ef5df664b8d18a
-
Filesize
5.2MB
MD5201586f85786c263c3fac8fc7279e6d8
SHA18d2dda5d5c3cb2e5fadd3082c5114833b1adc072
SHA2569a69742e1b7fa40606b621be01bb66f34ac1af44e31fd0e94162e3561da5d72f
SHA512e580929074798087b83215c072d5f705ed44661de55f286a6c2f870169fd6bc38cb31a73f3f0867ff997521f63da7d096f594cf40de06cbdc108a96da2c9234f
-
Filesize
5.2MB
MD52de2666cb2dcf5992138ba04e4aeadd3
SHA103091c308faebc468800d863a36a1617f1a43292
SHA256b46c37ddc8ba6868f5867ea5d693cd7a3c6c8042adbd293c28e63205d4126a9a
SHA512c05c9946f7d740a3ec526f184b67b0e331fc8e9721a5cad90fe7a49b7990f6c0fed6a376e945e2153364add968fc25c4fd9ec8a0a43b77e78ec2c09fe4333d72
-
Filesize
5.2MB
MD5659e72272e97aad9aaf33c6004a69f7d
SHA1a32e6d6d159cead96b1b23a93767d84511eb6cf8
SHA25629839b9aa0db089a504506021913887cb0e03d7f81fdde28cc568bb53da5e90e
SHA512c62537f4f577ed04ae66f054c0bbb74ce5316ae272d3bf3a92ceb9e8782aa2d4466fa6ab860ebac331682d86dc746021efede270751ac764aaa555ce315997a7
-
Filesize
5.2MB
MD5b44c6ab53ff5974dd0c6d8d45e550f7d
SHA1b71a13ecb1972bf547a074fccba4600ae1a9ee97
SHA256864867366b94c951d69e180a794dfa401cdc39a2add1187c9187bd93fa66ce73
SHA512db983925cd4b7d5900576e60543e3e4d7319e7328a15d72b5b965b4d11feefd37edd02f324ca72d78cba98af05c62c6ec2d53bd23a7f31bab9c52b13970f5584
-
Filesize
5.2MB
MD5c8828a8b742702b1b456355d0596c642
SHA17524f6886ad2837a44d07854ba37021003fde317
SHA25656d8f612812e86dbd7202dcb2220348a7de82c67fb365368d27e404a741bdf86
SHA51298b934280bc8de316b8092cf338970201cff224d08e23db6304f6f29269c33410302fa03687cb7214c0f7883772162930dc2b5d10f95c70bca1cc8e01085dde6
-
Filesize
5.2MB
MD594d85f1383ab36d2d05fbf99141b3447
SHA1fa4de1438eb977b9e42014eeb3fb90ef3d0ab569
SHA2565d014fbfa7550863d248c400336e3a5b1809346f39cbe5bd8a8993294f474e1a
SHA512e9c61f1ce8cb9d25c5c3d5b9ee1b2645684e04a23c81b4f199fcee25e98df93f3e670c7e81d5d37f171c4968d8bd0b1d33ad8907da2709e5b6cce349e9bd51ff
-
Filesize
5.2MB
MD5962565ba66c46b3d2fa6f41f9597a200
SHA140def9ee4abaab6a0a3a2d896228477bdf6fb6ee
SHA2568b2c4e3dd29cb9d8890e5469ae6f43fd6b3a441eaffa7a816cf91f2f056d8962
SHA51247b43472b5b5b44747ab82746356d94e710ee4839bcf6aaff7ac4a889fadc7b69d65894733396efb439f58fabb106dc8484cc80b3fd82a32ac3d6acb5e889ab1
-
Filesize
5.2MB
MD53954b3c867b5b9a7c8343004f9c59a2f
SHA16b96c7652edbfa19f9f8815c576ad3c3af58922a
SHA25647164b1dcb932c0a5d74824dda301301dc449cab9f9c2663db391625ddccc3b6
SHA512f8512a17c4c0e4188a299faf238b2d29e4d288fd47784cfa6588a6f1deda0e0c3f86a9181a34b307aee5600c705e353ab7eaae1b5548a03829733486ab0427f3
-
Filesize
5.2MB
MD5a93f17d5eac9f162d2d10c344a875f7d
SHA1c43d223a255ef28a20aa4ded5be3ca00cabd2632
SHA2568015ea8b6aa0a573d81570afb1738fcc6b288b0d8380b10727e67e019994e378
SHA512a5bc5667ddf4aff30daddfc3e54831258b1b2e804890f65a7c1d501bf2de7ed48b972ed05dcd31fb584c5c5b6b6587a8650a44a56b236c98f684ce1e2012eca7
-
Filesize
5.2MB
MD5b7df6846b11d3f0dd1872c9473897a93
SHA141169a2351bd9387118361c63315a154d002fcd1
SHA256d90c79ebd39938a2953986f40ac208238f8221d4ab64f7bc88b632d2cf967c35
SHA512011541a375bb2062d9216184f5eb6f3e0d2eae62d8dd0c89ad5044a03b02845f0043cb18381bc0c86af17299dc9765596aa1cddabb61c79c79ef469b8cd240d4