Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 08:05
Behavioral task
behavioral1
Sample
213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe
Resource
win10v2004-20240802-en
General
-
Target
213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe
-
Size
5.9MB
-
MD5
317f1ef030b157e8377bdbc6f9899097
-
SHA1
213631deb84ea67d8313c3fcdfa4c69868fb8df2
-
SHA256
028cc53e6952dfd16b8178629ca59e95f353365f8e36bde00af72bc2adc2497d
-
SHA512
e837e5d80102389eea444395b469ee5e4fbc7208b7455c428f1be4e844f4de22488cc86eb1a1f9a0060f7e472f2d171295948549d17516a2249ae5aff49c1137
-
SSDEEP
98304:demTLkNdfE0pZ3u56utgpPFotBER/mQ32lUf:E+b56utgpPF8u/7f
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x0007000000012118-6.dat cobalt_reflective_dll behavioral1/files/0x0008000000015db6-8.dat cobalt_reflective_dll behavioral1/files/0x0007000000015dc0-15.dat cobalt_reflective_dll behavioral1/files/0x0008000000015e64-21.dat cobalt_reflective_dll behavioral1/files/0x0007000000015ed2-26.dat cobalt_reflective_dll behavioral1/files/0x0007000000015f96-30.dat cobalt_reflective_dll behavioral1/files/0x0008000000016334-45.dat cobalt_reflective_dll behavioral1/files/0x000600000001746a-98.dat cobalt_reflective_dll behavioral1/files/0x0006000000017488-105.dat cobalt_reflective_dll behavioral1/files/0x0006000000017403-95.dat cobalt_reflective_dll behavioral1/files/0x0006000000017400-91.dat cobalt_reflective_dll behavioral1/files/0x00060000000173f3-85.dat cobalt_reflective_dll behavioral1/files/0x000600000001707c-80.dat cobalt_reflective_dll behavioral1/files/0x0006000000016edb-75.dat cobalt_reflective_dll behavioral1/files/0x0006000000016eb8-70.dat cobalt_reflective_dll behavioral1/files/0x0006000000016de8-65.dat cobalt_reflective_dll behavioral1/files/0x0006000000016de4-60.dat cobalt_reflective_dll behavioral1/files/0x0006000000016dd0-55.dat cobalt_reflective_dll behavioral1/files/0x0006000000016db5-50.dat cobalt_reflective_dll behavioral1/files/0x000700000001613e-41.dat cobalt_reflective_dll behavioral1/files/0x0007000000016009-36.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 56 IoCs
resource yara_rule behavioral1/memory/2528-0-0x000000013FAC0000-0x000000013FE14000-memory.dmp xmrig behavioral1/files/0x0007000000012118-6.dat xmrig behavioral1/files/0x0008000000015db6-8.dat xmrig behavioral1/files/0x0007000000015dc0-15.dat xmrig behavioral1/files/0x0008000000015e64-21.dat xmrig behavioral1/files/0x0007000000015ed2-26.dat xmrig behavioral1/files/0x0007000000015f96-30.dat xmrig behavioral1/files/0x0008000000016334-45.dat xmrig behavioral1/files/0x000600000001746a-98.dat xmrig behavioral1/files/0x0006000000017488-105.dat xmrig behavioral1/files/0x0006000000017403-95.dat xmrig behavioral1/files/0x0006000000017400-91.dat xmrig behavioral1/memory/972-134-0x000000013FE40000-0x0000000140194000-memory.dmp xmrig behavioral1/memory/2528-133-0x0000000002350000-0x00000000026A4000-memory.dmp xmrig behavioral1/memory/2676-132-0x000000013F050000-0x000000013F3A4000-memory.dmp xmrig behavioral1/memory/2612-130-0x000000013FAB0000-0x000000013FE04000-memory.dmp xmrig behavioral1/memory/2664-128-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/2528-127-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/1492-126-0x000000013F3D0000-0x000000013F724000-memory.dmp xmrig behavioral1/memory/2792-124-0x000000013FE00000-0x0000000140154000-memory.dmp xmrig behavioral1/memory/2528-123-0x0000000002350000-0x00000000026A4000-memory.dmp xmrig behavioral1/memory/2168-122-0x000000013FB60000-0x000000013FEB4000-memory.dmp xmrig behavioral1/memory/764-120-0x000000013F560000-0x000000013F8B4000-memory.dmp xmrig behavioral1/memory/2868-118-0x000000013F630000-0x000000013F984000-memory.dmp xmrig behavioral1/memory/2832-116-0x000000013FA20000-0x000000013FD74000-memory.dmp xmrig behavioral1/memory/2720-114-0x000000013F320000-0x000000013F674000-memory.dmp xmrig behavioral1/memory/2704-112-0x000000013FE60000-0x00000001401B4000-memory.dmp xmrig behavioral1/memory/2528-111-0x000000013FE60000-0x00000001401B4000-memory.dmp xmrig behavioral1/memory/2424-110-0x000000013F6D0000-0x000000013FA24000-memory.dmp xmrig behavioral1/memory/2528-109-0x000000013F6D0000-0x000000013FA24000-memory.dmp xmrig behavioral1/memory/2456-108-0x000000013F840000-0x000000013FB94000-memory.dmp xmrig behavioral1/files/0x00060000000173f3-85.dat xmrig behavioral1/files/0x000600000001707c-80.dat xmrig behavioral1/files/0x0006000000016edb-75.dat xmrig behavioral1/files/0x0006000000016eb8-70.dat xmrig behavioral1/files/0x0006000000016de8-65.dat xmrig behavioral1/files/0x0006000000016de4-60.dat xmrig behavioral1/files/0x0006000000016dd0-55.dat xmrig behavioral1/files/0x0006000000016db5-50.dat xmrig behavioral1/files/0x000700000001613e-41.dat xmrig behavioral1/files/0x0007000000016009-36.dat xmrig behavioral1/memory/2528-135-0x000000013FAC0000-0x000000013FE14000-memory.dmp xmrig behavioral1/memory/972-137-0x000000013FE40000-0x0000000140194000-memory.dmp xmrig behavioral1/memory/2424-138-0x000000013F6D0000-0x000000013FA24000-memory.dmp xmrig behavioral1/memory/2456-139-0x000000013F840000-0x000000013FB94000-memory.dmp xmrig behavioral1/memory/2704-140-0x000000013FE60000-0x00000001401B4000-memory.dmp xmrig behavioral1/memory/2720-141-0x000000013F320000-0x000000013F674000-memory.dmp xmrig behavioral1/memory/2832-142-0x000000013FA20000-0x000000013FD74000-memory.dmp xmrig behavioral1/memory/2868-143-0x000000013F630000-0x000000013F984000-memory.dmp xmrig behavioral1/memory/764-144-0x000000013F560000-0x000000013F8B4000-memory.dmp xmrig behavioral1/memory/2168-145-0x000000013FB60000-0x000000013FEB4000-memory.dmp xmrig behavioral1/memory/2792-146-0x000000013FE00000-0x0000000140154000-memory.dmp xmrig behavioral1/memory/2664-148-0x000000013F4F0000-0x000000013F844000-memory.dmp xmrig behavioral1/memory/2612-149-0x000000013FAB0000-0x000000013FE04000-memory.dmp xmrig behavioral1/memory/1492-147-0x000000013F3D0000-0x000000013F724000-memory.dmp xmrig behavioral1/memory/2676-150-0x000000013F050000-0x000000013F3A4000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 972 JhdWJYG.exe 2456 cwZOwFD.exe 2424 rBVswdp.exe 2704 wpRFNCq.exe 2720 bgwkGqj.exe 2832 KEPFvAg.exe 2868 HQNsvoP.exe 764 ZGmTEnW.exe 2168 djobJkY.exe 2792 bhKulUx.exe 1492 OPxUAdM.exe 2664 zRxYMtE.exe 2612 nynYGrU.exe 2676 eHQtzQs.exe 2172 cZHnoGu.exe 2296 dhxjxAV.exe 296 RVdfOHd.exe 492 cpIQjQa.exe 2700 advVPML.exe 2956 HemyfIh.exe 1648 rwhPlSP.exe -
Loads dropped DLL 21 IoCs
pid Process 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe -
resource yara_rule behavioral1/memory/2528-0-0x000000013FAC0000-0x000000013FE14000-memory.dmp upx behavioral1/files/0x0007000000012118-6.dat upx behavioral1/files/0x0008000000015db6-8.dat upx behavioral1/files/0x0007000000015dc0-15.dat upx behavioral1/files/0x0008000000015e64-21.dat upx behavioral1/files/0x0007000000015ed2-26.dat upx behavioral1/files/0x0007000000015f96-30.dat upx behavioral1/files/0x0008000000016334-45.dat upx behavioral1/files/0x000600000001746a-98.dat upx behavioral1/files/0x0006000000017488-105.dat upx behavioral1/files/0x0006000000017403-95.dat upx behavioral1/files/0x0006000000017400-91.dat upx behavioral1/memory/972-134-0x000000013FE40000-0x0000000140194000-memory.dmp upx behavioral1/memory/2676-132-0x000000013F050000-0x000000013F3A4000-memory.dmp upx behavioral1/memory/2612-130-0x000000013FAB0000-0x000000013FE04000-memory.dmp upx behavioral1/memory/2664-128-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/1492-126-0x000000013F3D0000-0x000000013F724000-memory.dmp upx behavioral1/memory/2792-124-0x000000013FE00000-0x0000000140154000-memory.dmp upx behavioral1/memory/2168-122-0x000000013FB60000-0x000000013FEB4000-memory.dmp upx behavioral1/memory/764-120-0x000000013F560000-0x000000013F8B4000-memory.dmp upx behavioral1/memory/2868-118-0x000000013F630000-0x000000013F984000-memory.dmp upx behavioral1/memory/2832-116-0x000000013FA20000-0x000000013FD74000-memory.dmp upx behavioral1/memory/2720-114-0x000000013F320000-0x000000013F674000-memory.dmp upx behavioral1/memory/2704-112-0x000000013FE60000-0x00000001401B4000-memory.dmp upx behavioral1/memory/2424-110-0x000000013F6D0000-0x000000013FA24000-memory.dmp upx behavioral1/memory/2456-108-0x000000013F840000-0x000000013FB94000-memory.dmp upx behavioral1/files/0x00060000000173f3-85.dat upx behavioral1/files/0x000600000001707c-80.dat upx behavioral1/files/0x0006000000016edb-75.dat upx behavioral1/files/0x0006000000016eb8-70.dat upx behavioral1/files/0x0006000000016de8-65.dat upx behavioral1/files/0x0006000000016de4-60.dat upx behavioral1/files/0x0006000000016dd0-55.dat upx behavioral1/files/0x0006000000016db5-50.dat upx behavioral1/files/0x000700000001613e-41.dat upx behavioral1/files/0x0007000000016009-36.dat upx behavioral1/memory/2528-135-0x000000013FAC0000-0x000000013FE14000-memory.dmp upx behavioral1/memory/972-137-0x000000013FE40000-0x0000000140194000-memory.dmp upx behavioral1/memory/2424-138-0x000000013F6D0000-0x000000013FA24000-memory.dmp upx behavioral1/memory/2456-139-0x000000013F840000-0x000000013FB94000-memory.dmp upx behavioral1/memory/2704-140-0x000000013FE60000-0x00000001401B4000-memory.dmp upx behavioral1/memory/2720-141-0x000000013F320000-0x000000013F674000-memory.dmp upx behavioral1/memory/2832-142-0x000000013FA20000-0x000000013FD74000-memory.dmp upx behavioral1/memory/2868-143-0x000000013F630000-0x000000013F984000-memory.dmp upx behavioral1/memory/764-144-0x000000013F560000-0x000000013F8B4000-memory.dmp upx behavioral1/memory/2168-145-0x000000013FB60000-0x000000013FEB4000-memory.dmp upx behavioral1/memory/2792-146-0x000000013FE00000-0x0000000140154000-memory.dmp upx behavioral1/memory/2664-148-0x000000013F4F0000-0x000000013F844000-memory.dmp upx behavioral1/memory/2612-149-0x000000013FAB0000-0x000000013FE04000-memory.dmp upx behavioral1/memory/1492-147-0x000000013F3D0000-0x000000013F724000-memory.dmp upx behavioral1/memory/2676-150-0x000000013F050000-0x000000013F3A4000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\rBVswdp.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\ZGmTEnW.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\OPxUAdM.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\eHQtzQs.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\JhdWJYG.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\bgwkGqj.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\djobJkY.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\dhxjxAV.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\RVdfOHd.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\cpIQjQa.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\advVPML.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\HemyfIh.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\rwhPlSP.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\cwZOwFD.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\KEPFvAg.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\zRxYMtE.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\wpRFNCq.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\HQNsvoP.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\bhKulUx.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\nynYGrU.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe File created C:\Windows\System\cZHnoGu.exe 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe Token: SeLockMemoryPrivilege 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2528 wrote to memory of 972 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 31 PID 2528 wrote to memory of 972 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 31 PID 2528 wrote to memory of 972 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 31 PID 2528 wrote to memory of 2456 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 32 PID 2528 wrote to memory of 2456 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 32 PID 2528 wrote to memory of 2456 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 32 PID 2528 wrote to memory of 2424 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 33 PID 2528 wrote to memory of 2424 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 33 PID 2528 wrote to memory of 2424 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 33 PID 2528 wrote to memory of 2704 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 34 PID 2528 wrote to memory of 2704 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 34 PID 2528 wrote to memory of 2704 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 34 PID 2528 wrote to memory of 2720 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 35 PID 2528 wrote to memory of 2720 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 35 PID 2528 wrote to memory of 2720 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 35 PID 2528 wrote to memory of 2832 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 36 PID 2528 wrote to memory of 2832 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 36 PID 2528 wrote to memory of 2832 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 36 PID 2528 wrote to memory of 2868 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 37 PID 2528 wrote to memory of 2868 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 37 PID 2528 wrote to memory of 2868 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 37 PID 2528 wrote to memory of 764 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 38 PID 2528 wrote to memory of 764 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 38 PID 2528 wrote to memory of 764 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 38 PID 2528 wrote to memory of 2168 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 39 PID 2528 wrote to memory of 2168 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 39 PID 2528 wrote to memory of 2168 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 39 PID 2528 wrote to memory of 2792 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 40 PID 2528 wrote to memory of 2792 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 40 PID 2528 wrote to memory of 2792 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 40 PID 2528 wrote to memory of 1492 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 41 PID 2528 wrote to memory of 1492 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 41 PID 2528 wrote to memory of 1492 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 41 PID 2528 wrote to memory of 2664 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 42 PID 2528 wrote to memory of 2664 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 42 PID 2528 wrote to memory of 2664 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 42 PID 2528 wrote to memory of 2612 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 43 PID 2528 wrote to memory of 2612 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 43 PID 2528 wrote to memory of 2612 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 43 PID 2528 wrote to memory of 2676 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 44 PID 2528 wrote to memory of 2676 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 44 PID 2528 wrote to memory of 2676 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 44 PID 2528 wrote to memory of 2172 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 45 PID 2528 wrote to memory of 2172 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 45 PID 2528 wrote to memory of 2172 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 45 PID 2528 wrote to memory of 2296 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 46 PID 2528 wrote to memory of 2296 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 46 PID 2528 wrote to memory of 2296 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 46 PID 2528 wrote to memory of 296 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 47 PID 2528 wrote to memory of 296 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 47 PID 2528 wrote to memory of 296 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 47 PID 2528 wrote to memory of 492 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 48 PID 2528 wrote to memory of 492 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 48 PID 2528 wrote to memory of 492 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 48 PID 2528 wrote to memory of 2700 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 49 PID 2528 wrote to memory of 2700 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 49 PID 2528 wrote to memory of 2700 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 49 PID 2528 wrote to memory of 2956 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 50 PID 2528 wrote to memory of 2956 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 50 PID 2528 wrote to memory of 2956 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 50 PID 2528 wrote to memory of 1648 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 51 PID 2528 wrote to memory of 1648 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 51 PID 2528 wrote to memory of 1648 2528 213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe"C:\Users\Admin\AppData\Local\Temp\213631deb84ea67d8313c3fcdfa4c69868fb8df2.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\System\JhdWJYG.exeC:\Windows\System\JhdWJYG.exe2⤵
- Executes dropped EXE
PID:972
-
-
C:\Windows\System\cwZOwFD.exeC:\Windows\System\cwZOwFD.exe2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Windows\System\rBVswdp.exeC:\Windows\System\rBVswdp.exe2⤵
- Executes dropped EXE
PID:2424
-
-
C:\Windows\System\wpRFNCq.exeC:\Windows\System\wpRFNCq.exe2⤵
- Executes dropped EXE
PID:2704
-
-
C:\Windows\System\bgwkGqj.exeC:\Windows\System\bgwkGqj.exe2⤵
- Executes dropped EXE
PID:2720
-
-
C:\Windows\System\KEPFvAg.exeC:\Windows\System\KEPFvAg.exe2⤵
- Executes dropped EXE
PID:2832
-
-
C:\Windows\System\HQNsvoP.exeC:\Windows\System\HQNsvoP.exe2⤵
- Executes dropped EXE
PID:2868
-
-
C:\Windows\System\ZGmTEnW.exeC:\Windows\System\ZGmTEnW.exe2⤵
- Executes dropped EXE
PID:764
-
-
C:\Windows\System\djobJkY.exeC:\Windows\System\djobJkY.exe2⤵
- Executes dropped EXE
PID:2168
-
-
C:\Windows\System\bhKulUx.exeC:\Windows\System\bhKulUx.exe2⤵
- Executes dropped EXE
PID:2792
-
-
C:\Windows\System\OPxUAdM.exeC:\Windows\System\OPxUAdM.exe2⤵
- Executes dropped EXE
PID:1492
-
-
C:\Windows\System\zRxYMtE.exeC:\Windows\System\zRxYMtE.exe2⤵
- Executes dropped EXE
PID:2664
-
-
C:\Windows\System\nynYGrU.exeC:\Windows\System\nynYGrU.exe2⤵
- Executes dropped EXE
PID:2612
-
-
C:\Windows\System\eHQtzQs.exeC:\Windows\System\eHQtzQs.exe2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Windows\System\cZHnoGu.exeC:\Windows\System\cZHnoGu.exe2⤵
- Executes dropped EXE
PID:2172
-
-
C:\Windows\System\dhxjxAV.exeC:\Windows\System\dhxjxAV.exe2⤵
- Executes dropped EXE
PID:2296
-
-
C:\Windows\System\RVdfOHd.exeC:\Windows\System\RVdfOHd.exe2⤵
- Executes dropped EXE
PID:296
-
-
C:\Windows\System\cpIQjQa.exeC:\Windows\System\cpIQjQa.exe2⤵
- Executes dropped EXE
PID:492
-
-
C:\Windows\System\advVPML.exeC:\Windows\System\advVPML.exe2⤵
- Executes dropped EXE
PID:2700
-
-
C:\Windows\System\HemyfIh.exeC:\Windows\System\HemyfIh.exe2⤵
- Executes dropped EXE
PID:2956
-
-
C:\Windows\System\rwhPlSP.exeC:\Windows\System\rwhPlSP.exe2⤵
- Executes dropped EXE
PID:1648
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5de0fd14f8bb0e7039a20c6627f7ef10d
SHA17f18016d5a2e543731d1f9ae13ac2f511ccaee07
SHA25628e0c0d4705b847cd96bb942ee21002b9f7da50c3f3faccc7eed9ffaee8f599a
SHA51243857d698493e71ec0f5b8a8924f3ed74e69bbf4364f2cb4a5ed005d022a988e5ca2778aa9137aa7cecd3894a24b3cebb2c8b6ade4d09d4440e5f51585a232ff
-
Filesize
5.9MB
MD5103b4f3a5b663c3b3f0c82290c860257
SHA1bd62310d540eb29f1dc2fd2e22f5ce948d76f53e
SHA2562b5db72c1afd49432e019a5dd0afa7c27035fb17130afdf1e61973013c2a748a
SHA512ec07cec37f1ce4c212a14943ed75531ef4a005590a035d14a72e7b573af5b9139dbd3a8bf2f0030bc3c33ab019f4020ee2f6153420100eb1d63326ea7b01b1a7
-
Filesize
5.9MB
MD5e75387340a88c172aeec8f3f1af3683e
SHA125c8a719dfb2cbfcd7db22e89016128d55f5bd01
SHA256e52ed24fe93d8a461f670eb30a99fae28d306b1c2f8450373b20857d5619ea52
SHA5122fb3b912ab0b2673da026abc39f41e2f4aad65e7f49060786f16f7b7d0a2ec2c7c97549d11be8e333178174338125c1810498b19c373104a0f04caf7e60a0af9
-
Filesize
5.9MB
MD53f21cdb947ca281553bc958422951e0f
SHA10a73df44114abf438b3a153f7e5b0ef585f7b760
SHA25612d5e0c6fa73d048e74ba1eb86a4b3ffb8c93d837bf62edbc71ff02258a9db49
SHA512a9c99cd52daff6aaad332abd3cb1a9aad5e62811beb2385e41b63581b87573c043a1f61704423cf91d2ac8a536611e3782be63949673be6452b9b62809334ca1
-
Filesize
5.9MB
MD5385dba7099f67e02a24ab6fff4da3033
SHA1e9b68c3c088a1661a2ec908cf1b74b9a174478ba
SHA256bb62e36c89a8a86a24594c3877ec48e9ce483e14f6cfa70f3cd4270da3a33e9b
SHA5121c5dd6acf28c2b0ecdc130c40c24c8ea794ccdf852b70a153c04b49b8848fe89fda13a34f5cbfa9ed4289501b769c0c1dc3e897ef31d4bd2788e84bfefa8ab54
-
Filesize
5.9MB
MD5fa6857f569e2a276f11f2994e245ce6e
SHA17a57db195f804da1f1fe6df5463acd667f189d22
SHA256536dabea26a85dcab7ca8e5aef0136b5311c5705bdb946f14088bbed39b537a8
SHA512b5d7f3bf1f3630e35018946c237f0f5498b11d0ee6fcf2db400a161aeb3c8c789826a38b014a965b91d8dff5c0a926abe3f562201d31556d580352962e5f5d05
-
Filesize
5.9MB
MD5d573adb2d7316321b5e519c3e4142fbd
SHA1d912044fe56f5cb85cc9659dcd90a129231df768
SHA256ed79084cc2ba4008fe5fbe07f70db0239baf4e160037928d7a595e68650e618d
SHA512537ad7da3be95765cc6a506b92cdf2c566137a11ea62e0d9f72a5765951a73499f68c6d968b74524e290d065e0c5565fd8987cc454c10e2179622c74b225d7e0
-
Filesize
5.9MB
MD5d4218b981de0d4240b6dca2467a6ed4e
SHA18ce4f96b5c33183eeec4207f08b886764063d072
SHA25622b2c883b119c85db6aa8719a38aef997d8fbb7f5f769d86adbfb4dbef019c4d
SHA512023e2a6f4c814d43a5a84bd906a161885fef8051b9445360d776a55ab1046460ab8e21b5f845c361946d93c26a70d66f25cfa11fbef11713049a766aa315deff
-
Filesize
5.9MB
MD59e695d3fa08523b7a010b6b922678295
SHA1fc25574d990a9f1979b59476dc53c2f683ff8dbe
SHA25668d57693357e81329f2b2b77ed5d2bb01d291ac944042d94af1ff39d59986258
SHA512f24844f79414cc8c36b64e617d86becfd395acbdb492250d1709e72e97b9761e62e7244b0e88006fe6d8c277da80de8af82a65137b24ebdafee9c3fd93852dd7
-
Filesize
5.9MB
MD5722884c9cdbd54f2c31f5c751ad7502f
SHA110366b2d11896679e0c94402b7cb170c96cbb2cd
SHA256fc3c64285b5b16197e621508cf97a20d60e949db7e5b937940603cce224bd770
SHA512732554ebc87dbc5ede7ab49703a57f6ca362a9f3d00dfc4d6ac2935b590539cd36e8d60346ea322a0116f9dd8914e594593627d2839f240957dbb98888a9535a
-
Filesize
5.9MB
MD5ac922cf61e8c9e9c7e0719b675e49f2f
SHA179c1b24a525666b11ee7d93f20d748d9009d17df
SHA2562503d8a4940c88779f08bae8650f8a4fe0c24f913252333c892f9f775a9d3e15
SHA51235650c17cc96d6e1d8ff10d1bb7b07cb1db1d488544418de03e0e8758290d1ba2ea6481fbd5d346f958535e0a29fbfadf24ce55eb78d795623e8d0b53893fb97
-
Filesize
5.9MB
MD55973467c0d0a1063a6dd81ee0bdec8e1
SHA18f410aee116bcd111672b0b4be7e192164a75f9c
SHA256cfd84e95cc890a8466c029fb420683ea51d8260102833ad0fef117e389ac981e
SHA5125df1e1fc070c14eaa36a769537274165b0f5994608ce44cf318b7c2a64f75711162b02ad79dcb49c4ee6593a9fb487603b5520f27112c0ce631cb35cbafda250
-
Filesize
5.9MB
MD5bc36141e17356572c641fbd731fb909a
SHA1c58f57ec172a4265cbee15c9de7527e064f06f12
SHA25643d6364ae7567b65605a7f7286c7b1bfd61e240b6f334fbdf89117489615f6aa
SHA512d08fe6a4c75dba8f2f9b09daf9b0f22b4c82cef62104ac79cbc35a0fbdc0be5bbb37c19b379af781384f6f7c694fecc4cab5a45b05061ae3591f285b008dad44
-
Filesize
5.9MB
MD539c357fbcb9e4e23a0e6b6773463f9b7
SHA11b336d94a8ea3523add2f6677a1f313615f3988a
SHA25681c485ef1e772df212918155895a0ca7e1c5488f8060ac3cb50c48bef92c8397
SHA5129ced1db186e3fd920a60f73870ee589fdb7bdc8330576bf979d52d4ae193d83866e54dc25d5201faa722198460f670f26cacabf971f31c63ffcafac840f741d7
-
Filesize
5.9MB
MD5e18c3c1ac4cf1d36b8f5a626325af305
SHA14c9cbfdea40fd2a6e1f17060c30a1f6867ca7e2b
SHA25624a0d37868a93d75f4d096474138e0fda9d1a7247494f279ed5e8ffbe5ae18ab
SHA51231636a716b02a83613b640a9bcc24c0d7e62571179468b10d2346f2b11c2efd5d23f14265102c1743926d830f4f9c2df56c470817d176e2bd9874b9df066f3b9
-
Filesize
5.9MB
MD5c42786c8377b3df81932b613c226769a
SHA1681c934e08cd8f7338b2252c2fec92b1e0240195
SHA2561875decf3207d67dced5592c2db7ce00867539d2a4b74ed31d7ac4f1beadd226
SHA512540200e2f2783b2947b6fea1d7730a3a50bf440bd9ea81017ede50aa70a45877cd5c263834e5801c667a4c0ec000fd519f4e046a7af802623386568d8bbf1a91
-
Filesize
5.9MB
MD565893df8eae0c842a5ec98cfa4e6b465
SHA16555123882e59c0f545f65e9f239708526dbc980
SHA2561009f7237943a63aa4a610113b0f903a169cd14dc64cf724ff443249a05f59b0
SHA51255bf0748c971f2814b293c6d03a03039ea448577eaef719446a00444b6b484812276b2e8b5fa23f4e172dee9c36b8832f916e17ed79e83c572cc08159b488109
-
Filesize
5.9MB
MD57581c9bd5074ec672edf213564a3592c
SHA103455fcdf0cb8962c22a5f3f229875e5724800a9
SHA256607a0096beda781a6c283cdea2df3245dfee7379de8a6a90b654ef78cc0e550c
SHA512cf5a6bdfaf440938283f22776d9298ba92b6ce8b137dece44acd88c2560c3ba2cf92d2aa86022982cf884fb5228d8adac4dfa255a569d63031425dd66e7be966
-
Filesize
5.9MB
MD58409dfed3f51f741140e238ea787f670
SHA157f81a2d839dda25c09fc2fbbc11780875cff295
SHA25664b4275d47a88c2f21c67bcefb3d25b800aaf220f6ca7e6a902859d37d9d4e54
SHA512d711f359b8e66ea0bf933c69461881bc6606938aaee761e765618a01c5d2e005089d7c6e04a2ce3972f7503384d119c0b39d4747cc234eb27a0fcddb44ea24e1
-
Filesize
5.9MB
MD5c107a159b7eccf6dbc7ce20aaf40455d
SHA110e220ef3290d2045c8ce77ab2a15641776deb65
SHA256621dfde056ca6cf2cbaf5f2d7ff0adf0993e665cecf4e8ee684d41a36216af0f
SHA51232fb472f2c6e6c95b74b49f530393feb42ad8b98c63190587bced643250bda1bc7859a3e8c273a0e9d62b54cdee8e7381c274f0cf8ee2022d68ad86bb7a7a7ea
-
Filesize
5.9MB
MD5704af8022772fa1e2b26738b657ea59e
SHA1f5b122e291b50f93e933fe85359f1130518a35df
SHA25623fb1030e8fc86a2cb7ca40c23e8174dc0477741f0abd84a801a260d7137083b
SHA5120814732677bc12f0cbf29267d1be2a9c3200f78f443d413e3cc0b28ed6c9b3352182bdad6f52062d1673c99448c637bf4acb31e517f7e77bcbc744f1f9d93a1f