Analysis
-
max time kernel
120s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:56
Behavioral task
behavioral1
Sample
b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe
Resource
win10v2004-20240802-en
General
-
Target
b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe
-
Size
24KB
-
MD5
3f6ac7b00ec9a46dddf3f386e9969590
-
SHA1
4dbbe6377cb87bf51328365166a33d4ce65b1683
-
SHA256
b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4
-
SHA512
da51b0949fbcc059d6e9f2a48cee98d1922774afb342df65e7ca9a547372d2fb9113f3e6dbcaa8ed094a61cf2dfc0dbfa40bfe873c49fece11c40ba09a6e8f0c
-
SSDEEP
768:g5BOFKksO1mE9B77777J77c77c77c71xeH1eMRPQE4FhdyV:g8Fs+DB77777J77c77c77c71EbRQh8V
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Windows\\3610902.exe\"" 3610902QSVWUW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Windows\\3610902.exe\"" b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe \"C:\\Windows\\3610902.exe\"" 3610902.exe -
Executes dropped EXE 5 IoCs
pid Process 1536 3610902.exe 2100 3610902QSVWUW.exe 1864 3610902QSVWUW.exe 1788 3610902.exe 2896 3610902.exe -
resource yara_rule behavioral1/memory/2360-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x0008000000016d36-6.dat upx behavioral1/memory/1536-14-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x0008000000016d3f-18.dat upx behavioral1/memory/2100-21-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1864-30-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1788-32-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2896-36-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2360-40-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2896-39-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-41-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-42-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-43-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-45-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-46-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-47-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-48-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-49-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-50-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-51-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-52-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-53-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-54-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-55-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-56-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-57-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-58-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-60-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-59-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-61-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-62-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1536-63-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2100-64-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3610902.exe = "C:\\Windows\\3610902.exe" b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3610902.exe = "C:\\Windows\\3610902.exe" 3610902.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3610902.exe = "C:\\Windows\\3610902.exe" 3610902QSVWUW.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\3610902.exe b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe File opened for modification C:\Windows\3610902QSVWUW.exe b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe -
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3610902QSVWUW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3610902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3610902QSVWUW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3610902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3610902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe -
Kills process with taskkill 42 IoCs
pid Process 3024 TASKKILL.exe 2700 TASKKILL.exe 2940 TASKKILL.exe 1144 TASKKILL.exe 2268 TASKKILL.exe 1944 TASKKILL.exe 2904 TASKKILL.exe 2588 TASKKILL.exe 2284 TASKKILL.exe 1936 TASKKILL.exe 1952 TASKKILL.exe 2408 TASKKILL.exe 2764 TASKKILL.exe 1468 TASKKILL.exe 1648 TASKKILL.exe 596 TASKKILL.exe 480 TASKKILL.exe 1632 TASKKILL.exe 2832 TASKKILL.exe 2432 TASKKILL.exe 1092 TASKKILL.exe 2124 TASKKILL.exe 2788 TASKKILL.exe 3044 TASKKILL.exe 1992 TASKKILL.exe 2704 TASKKILL.exe 1660 TASKKILL.exe 448 TASKKILL.exe 3040 TASKKILL.exe 960 TASKKILL.exe 1780 TASKKILL.exe 1532 TASKKILL.exe 2548 TASKKILL.exe 2852 TASKKILL.exe 1496 TASKKILL.exe 1100 TASKKILL.exe 2768 TASKKILL.exe 580 TASKKILL.exe 1816 TASKKILL.exe 3036 TASKKILL.exe 1064 TASKKILL.exe 1244 TASKKILL.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2408 TASKKILL.exe Token: SeDebugPrivilege 2284 TASKKILL.exe Token: SeDebugPrivilege 2704 TASKKILL.exe Token: SeDebugPrivilege 2548 TASKKILL.exe Token: SeDebugPrivilege 1244 TASKKILL.exe Token: SeDebugPrivilege 2768 TASKKILL.exe Token: SeDebugPrivilege 1100 TASKKILL.exe Token: SeDebugPrivilege 2588 TASKKILL.exe Token: SeDebugPrivilege 2832 TASKKILL.exe Token: SeDebugPrivilege 2124 TASKKILL.exe Token: SeDebugPrivilege 1936 TASKKILL.exe Token: SeDebugPrivilege 3024 TASKKILL.exe Token: SeDebugPrivilege 2904 TASKKILL.exe Token: SeDebugPrivilege 2764 TASKKILL.exe Token: SeDebugPrivilege 1648 TASKKILL.exe Token: SeDebugPrivilege 2700 TASKKILL.exe Token: SeDebugPrivilege 480 TASKKILL.exe Token: SeDebugPrivilege 596 TASKKILL.exe Token: SeDebugPrivilege 1952 TASKKILL.exe Token: SeDebugPrivilege 1992 TASKKILL.exe Token: SeDebugPrivilege 1468 TASKKILL.exe Token: SeDebugPrivilege 2852 TASKKILL.exe Token: SeDebugPrivilege 580 TASKKILL.exe Token: SeDebugPrivilege 1816 TASKKILL.exe Token: SeDebugPrivilege 1632 TASKKILL.exe Token: SeDebugPrivilege 1660 TASKKILL.exe Token: SeDebugPrivilege 2940 TASKKILL.exe Token: SeDebugPrivilege 3036 TASKKILL.exe Token: SeDebugPrivilege 2788 TASKKILL.exe Token: SeDebugPrivilege 448 TASKKILL.exe Token: SeDebugPrivilege 960 TASKKILL.exe Token: SeDebugPrivilege 3040 TASKKILL.exe Token: SeDebugPrivilege 2432 TASKKILL.exe Token: SeDebugPrivilege 3044 TASKKILL.exe Token: SeDebugPrivilege 1780 TASKKILL.exe Token: SeDebugPrivilege 1092 TASKKILL.exe Token: SeDebugPrivilege 1144 TASKKILL.exe Token: SeDebugPrivilege 2268 TASKKILL.exe Token: SeDebugPrivilege 1532 TASKKILL.exe Token: SeDebugPrivilege 1496 TASKKILL.exe Token: SeDebugPrivilege 1064 TASKKILL.exe Token: SeDebugPrivilege 1944 TASKKILL.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 1536 3610902.exe 2100 3610902QSVWUW.exe 1864 3610902QSVWUW.exe 1788 3610902.exe 2896 3610902.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1244 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 30 PID 2360 wrote to memory of 1244 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 30 PID 2360 wrote to memory of 1244 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 30 PID 2360 wrote to memory of 1244 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 30 PID 2360 wrote to memory of 1100 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 31 PID 2360 wrote to memory of 1100 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 31 PID 2360 wrote to memory of 1100 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 31 PID 2360 wrote to memory of 1100 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 31 PID 2360 wrote to memory of 2124 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 32 PID 2360 wrote to memory of 2124 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 32 PID 2360 wrote to memory of 2124 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 32 PID 2360 wrote to memory of 2124 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 32 PID 2360 wrote to memory of 2408 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 34 PID 2360 wrote to memory of 2408 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 34 PID 2360 wrote to memory of 2408 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 34 PID 2360 wrote to memory of 2408 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 34 PID 2360 wrote to memory of 2588 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 35 PID 2360 wrote to memory of 2588 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 35 PID 2360 wrote to memory of 2588 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 35 PID 2360 wrote to memory of 2588 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 35 PID 2360 wrote to memory of 2548 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 36 PID 2360 wrote to memory of 2548 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 36 PID 2360 wrote to memory of 2548 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 36 PID 2360 wrote to memory of 2548 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 36 PID 2360 wrote to memory of 2904 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 41 PID 2360 wrote to memory of 2904 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 41 PID 2360 wrote to memory of 2904 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 41 PID 2360 wrote to memory of 2904 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 41 PID 2360 wrote to memory of 2704 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 42 PID 2360 wrote to memory of 2704 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 42 PID 2360 wrote to memory of 2704 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 42 PID 2360 wrote to memory of 2704 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 42 PID 2360 wrote to memory of 2284 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 44 PID 2360 wrote to memory of 2284 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 44 PID 2360 wrote to memory of 2284 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 44 PID 2360 wrote to memory of 2284 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 44 PID 2360 wrote to memory of 1936 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 46 PID 2360 wrote to memory of 1936 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 46 PID 2360 wrote to memory of 1936 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 46 PID 2360 wrote to memory of 1936 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 46 PID 2360 wrote to memory of 2768 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 48 PID 2360 wrote to memory of 2768 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 48 PID 2360 wrote to memory of 2768 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 48 PID 2360 wrote to memory of 2768 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 48 PID 2360 wrote to memory of 2832 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 49 PID 2360 wrote to memory of 2832 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 49 PID 2360 wrote to memory of 2832 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 49 PID 2360 wrote to memory of 2832 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 49 PID 2360 wrote to memory of 3024 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 52 PID 2360 wrote to memory of 3024 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 52 PID 2360 wrote to memory of 3024 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 52 PID 2360 wrote to memory of 3024 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 52 PID 2360 wrote to memory of 2764 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 53 PID 2360 wrote to memory of 2764 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 53 PID 2360 wrote to memory of 2764 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 53 PID 2360 wrote to memory of 2764 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 53 PID 2360 wrote to memory of 1536 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 58 PID 2360 wrote to memory of 1536 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 58 PID 2360 wrote to memory of 1536 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 58 PID 2360 wrote to memory of 1536 2360 b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe 58 PID 1536 wrote to memory of 1468 1536 3610902.exe 59 PID 1536 wrote to memory of 1468 1536 3610902.exe 59 PID 1536 wrote to memory of 1468 1536 3610902.exe 59 PID 1536 wrote to memory of 1468 1536 3610902.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe"C:\Users\Admin\AppData\Local\Temp\b6d2a5659af183f2a20dd4062721654b1eb1e3368ad901f57fb3bc04290c06e4N.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM services.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM lsass.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM csrss.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM smss.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM svchost.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM services.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM lsass.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM csrss.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM smss.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM svchost.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\3610902.exeC:\Windows\3610902.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM services.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM lsass.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM csrss.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM smss.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM svchost.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:480
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM services.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM lsass.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM csrss.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM smss.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM svchost.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\3610902QSVWUW.exeC:\Windows\3610902QSVWUW.exe3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM services.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM lsass.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM csrss.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM smss.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM svchost.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM winlogon.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM services.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM lsass.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM csrss.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM smss.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM inetinfo.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /S COMPUTERNAME /F /IM svchost.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\3610902QSVWUW.exeC:\Windows\3610902QSVWUW.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
C:\Windows\3610902.exeC:\Windows\3610902.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
-
C:\Windows\3610902.exeC:\Windows\3610902.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD582734ce7c1eea8d8a7c78c80fe4860b7
SHA1d4659f01a784f5e7812d888ccc3d023ccedb1e9d
SHA2568a318c7056c45fd3a172caa6cb85254c131fa8d1b0637f141753d7e3d0ae4bd2
SHA5120b3ad37edf621eab2df212aeab7d5e082ede2c4e7a9a6b6ef893116e9376c6d52f52036aca0df99fa4cb56fdc3d07f4a749875200940ae96653c60b14feea915
-
Filesize
47KB
MD555c618683e65be56cc1f34d049061cac
SHA1c41d4fe2a1cfb36632d937b930fdd7b63233cc05
SHA25627316262688726b92785a611249361dbf0ca0c0ed4ac4bbc5ea0ad7373b5dde7
SHA51213354d7e3af69d9e39e35368c1bf5fb439194236d017cc5b9bee3c11493f7fe05e1d2f7e34eac097045d5d6eea740948cb7104cce2dbe1324d662a6a5ed812b1