Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
New Text Document mod.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
New Text Document mod.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
New Text Document mod.exe
Resource
win10v2004-20240802-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
remcos
Go!!!
dangerous.hopto.org:2404
dangerous.hopto.org:2602
91.92.242.184:2602
91.92.242.184:2404
-
audio_folder
??????????? ??????
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
taskhost.exe
-
copy_folder
System32
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
tapiui.dat
-
keylog_flag
false
-
keylog_folder
System32
-
mouse_option
false
-
mutex
???-LDKG91
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
?????????
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
147.45.47.36:14537
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
http://77.91.77.92/
0xAa3ea4838e8E3F6a1922c6B67E3cD6efD1ff175b
THRUoPK7oYqF7YyKZJvPYwTH35JsPZVPto
1Hw9tx4KyTq4oRoLVhPb4hjDJcLhEa4Tn6
qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
XtxFdsKkRN3oVDXtN2ipcHeNi87basT2sL
LXMNcn9D8FQKzGNLjdSyR9dEM8Rsh9NzyX
rwn7tb5KQjXEjH42GgdHWHec5PPhVgqhSH
ARML6g7zynrwUHJbFJCCzMPiysUFXYBGgQ
48jYpFT6bT8MTeph7VsyzCQeDsGHqdQNc2kUkRFJPzfRHHjarBvBtudPUtParMkDzZbYBrd3yntWBQcsnVBNeeMbN9EXifg
3PL7YCa4akNYzuScqQwiSbtTP9q9E9PLreC
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
D9AJWrbYsidS9rAU146ifLRu1fzX9oQYSH
t1gvVWHnjbGTsoWXEyoTFojc2GqEzBgvbEn
bnb1cgttf7t5hu7ud3c436ufhcmy59qnkd09adqczd
bc1q0fusmmgycnhsd5cadsuz2hk8d4maausjfjypqg
bitcoincash:qr89hag2967ef604ud3lw4pq8hmn69n46czwdnx3ut
GAUCC7ZBSU2KJMHXOZD6AP5LOBGKNDPCDNRYP2CO2ACR63YCSUBNT5QE
-
mutex
tre5eer
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
syscapvbrd.exesysarddrvs.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysarddrvs.exe -
Phorphiex payload 3 IoCs
Processes:
resource yara_rule behavioral1/files/0x0006000000019c54-217.dat family_phorphiex behavioral1/files/0x0005000000019c58-226.dat family_phorphiex behavioral1/files/0x0006000000019c73-274.dat family_phorphiex -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1000-196-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1000-194-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1000-201-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1000-200-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/1000-199-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1720-264-0x00000000002D0000-0x0000000000368000-memory.dmp family_stormkitty behavioral1/memory/1720-270-0x00000000002D0000-0x0000000000368000-memory.dmp family_stormkitty behavioral1/memory/1720-266-0x00000000002D0000-0x0000000000368000-memory.dmp family_stormkitty -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Optimum.pifdescription pid Process procid_target PID 772 created 1076 772 Optimum.pif 18 -
Processes:
syscapvbrd.exesylsplvc.exesysarddrvs.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" syscapvbrd.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid Process 1248 powershell.exe 2536 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
Processes:
aaa.execayV0Deo9jSt417.exetaskhost.exeNorthSperm.exeOptimum.pif66c609c335ba8_crypted.exepi.exetdrpload.exesyscapvbrd.exesylsplvc.exeRegAsm.exet.exe1.exesysarddrvs.exeob_6d92ff_afficher-masquer-les-dossiers-caches.exeDtrade_v1.3.6.exepid Process 2892 aaa.exe 1996 cayV0Deo9jSt417.exe 1704 taskhost.exe 380 NorthSperm.exe 772 Optimum.pif 2084 66c609c335ba8_crypted.exe 2396 pi.exe 2112 tdrpload.exe 2828 syscapvbrd.exe 2644 sylsplvc.exe 1720 RegAsm.exe 408 t.exe 568 1.exe 2012 sysarddrvs.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 408 Dtrade_v1.3.6.exe -
Loads dropped DLL 20 IoCs
Processes:
4363463463464363463463463.execlip.execmd.exeOptimum.pifRegAsm.exepid Process 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 1668 clip.exe 3052 4363463463464363463463463.exe 1268 cmd.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 772 Optimum.pif 1720 RegAsm.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe 3052 4363463463464363463463463.exe -
Processes:
sylsplvc.exesysarddrvs.exesyscapvbrd.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
clip.exetdrpload.exepi.exet.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\???-LDKG91 = "\"C:\\Users\\Admin\\AppData\\Roaming\\System32\\taskhost.exe\"" clip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\syscapvbrd.exe" tdrpload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sylsplvc.exe" pi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysarddrvs.exe" t.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x000500000001a322-301.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid Process 3028 tasklist.exe 1700 tasklist.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cayV0Deo9jSt417.exe66c609c335ba8_crypted.exedescription pid Process procid_target PID 1996 set thread context of 1668 1996 cayV0Deo9jSt417.exe 34 PID 2084 set thread context of 1000 2084 66c609c335ba8_crypted.exe 52 -
Drops file in Windows directory 10 IoCs
Processes:
pi.exet.exeNorthSperm.exetdrpload.exedescription ioc Process File created C:\Windows\sylsplvc.exe pi.exe File opened for modification C:\Windows\sylsplvc.exe pi.exe File opened for modification C:\Windows\sysarddrvs.exe t.exe File opened for modification C:\Windows\AnchorAnnotated NorthSperm.exe File created C:\Windows\syscapvbrd.exe tdrpload.exe File opened for modification C:\Windows\GamblingCedar NorthSperm.exe File opened for modification C:\Windows\syscapvbrd.exe tdrpload.exe File created C:\Windows\sysarddrvs.exe t.exe File opened for modification C:\Windows\CheckingReliable NorthSperm.exe File opened for modification C:\Windows\ConferencesInto NorthSperm.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 2528 sc.exe 3068 sc.exe 1548 sc.exe 1108 sc.exe 1768 sc.exe 2664 sc.exe 2552 sc.exe 2456 sc.exe 2444 sc.exe 264 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exeRegAsm.exet.execmd.exepowershell.exetaskhost.execmd.exetdrpload.exesylsplvc.exesc.exesc.exeNorthSperm.exetasklist.exe66c609c335ba8_crypted.exesc.exesc.exesc.execayV0Deo9jSt417.execmd.exesc.exesysarddrvs.exesyscapvbrd.exesc.exesc.exetasklist.execmd.exeob_6d92ff_afficher-masquer-les-dossiers-caches.execmd.exesc.exefindstr.exeRegAsm.exesc.exefindstr.exeOptimum.piffindstr.execmd.exechoice.exepi.execmd.exe4363463463464363463463463.execlip.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrpload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sylsplvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NorthSperm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66c609c335ba8_crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cayV0Deo9jSt417.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysarddrvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syscapvbrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ob_6d92ff_afficher-masquer-les-dossiers-caches.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Optimum.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clip.exe -
Processes:
RegAsm.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Optimum.pifpowershell.exeRegAsm.exepowershell.exepid Process 772 Optimum.pif 772 Optimum.pif 772 Optimum.pif 2536 powershell.exe 772 Optimum.pif 772 Optimum.pif 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1248 powershell.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe 1720 RegAsm.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
sysarddrvs.exesyscapvbrd.exepid Process 2012 sysarddrvs.exe 2828 syscapvbrd.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
4363463463464363463463463.exetasklist.exetasklist.exepowershell.exeRegAsm.exepowershell.exedescription pid Process Token: SeDebugPrivilege 3052 4363463463464363463463463.exe Token: SeDebugPrivilege 3028 tasklist.exe Token: SeDebugPrivilege 1700 tasklist.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeDebugPrivilege 1720 RegAsm.exe Token: SeDebugPrivilege 1248 powershell.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
Optimum.pifob_6d92ff_afficher-masquer-les-dossiers-caches.exepid Process 772 Optimum.pif 772 Optimum.pif 772 Optimum.pif 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
Optimum.pifob_6d92ff_afficher-masquer-les-dossiers-caches.exepid Process 772 Optimum.pif 772 Optimum.pif 772 Optimum.pif 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe 664 ob_6d92ff_afficher-masquer-les-dossiers-caches.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid Process 1720 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4363463463464363463463463.execayV0Deo9jSt417.execlip.exeNorthSperm.execmd.exedescription pid Process procid_target PID 3052 wrote to memory of 2892 3052 4363463463464363463463463.exe 32 PID 3052 wrote to memory of 2892 3052 4363463463464363463463463.exe 32 PID 3052 wrote to memory of 2892 3052 4363463463464363463463463.exe 32 PID 3052 wrote to memory of 2892 3052 4363463463464363463463463.exe 32 PID 3052 wrote to memory of 1996 3052 4363463463464363463463463.exe 33 PID 3052 wrote to memory of 1996 3052 4363463463464363463463463.exe 33 PID 3052 wrote to memory of 1996 3052 4363463463464363463463463.exe 33 PID 3052 wrote to memory of 1996 3052 4363463463464363463463463.exe 33 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1996 wrote to memory of 1668 1996 cayV0Deo9jSt417.exe 34 PID 1668 wrote to memory of 1704 1668 clip.exe 35 PID 1668 wrote to memory of 1704 1668 clip.exe 35 PID 1668 wrote to memory of 1704 1668 clip.exe 35 PID 1668 wrote to memory of 1704 1668 clip.exe 35 PID 3052 wrote to memory of 380 3052 4363463463464363463463463.exe 37 PID 3052 wrote to memory of 380 3052 4363463463464363463463463.exe 37 PID 3052 wrote to memory of 380 3052 4363463463464363463463463.exe 37 PID 3052 wrote to memory of 380 3052 4363463463464363463463463.exe 37 PID 380 wrote to memory of 1268 380 NorthSperm.exe 38 PID 380 wrote to memory of 1268 380 NorthSperm.exe 38 PID 380 wrote to memory of 1268 380 NorthSperm.exe 38 PID 380 wrote to memory of 1268 380 NorthSperm.exe 38 PID 1268 wrote to memory of 3028 1268 cmd.exe 40 PID 1268 wrote to memory of 3028 1268 cmd.exe 40 PID 1268 wrote to memory of 3028 1268 cmd.exe 40 PID 1268 wrote to memory of 3028 1268 cmd.exe 40 PID 1268 wrote to memory of 568 1268 cmd.exe 41 PID 1268 wrote to memory of 568 1268 cmd.exe 41 PID 1268 wrote to memory of 568 1268 cmd.exe 41 PID 1268 wrote to memory of 568 1268 cmd.exe 41 PID 1268 wrote to memory of 1700 1268 cmd.exe 43 PID 1268 wrote to memory of 1700 1268 cmd.exe 43 PID 1268 wrote to memory of 1700 1268 cmd.exe 43 PID 1268 wrote to memory of 1700 1268 cmd.exe 43 PID 1268 wrote to memory of 1648 1268 cmd.exe 44 PID 1268 wrote to memory of 1648 1268 cmd.exe 44 PID 1268 wrote to memory of 1648 1268 cmd.exe 44 PID 1268 wrote to memory of 1648 1268 cmd.exe 44 PID 1268 wrote to memory of 272 1268 cmd.exe 45 PID 1268 wrote to memory of 272 1268 cmd.exe 45 PID 1268 wrote to memory of 272 1268 cmd.exe 45 PID 1268 wrote to memory of 272 1268 cmd.exe 45 PID 1268 wrote to memory of 908 1268 cmd.exe 46 PID 1268 wrote to memory of 908 1268 cmd.exe 46 PID 1268 wrote to memory of 908 1268 cmd.exe 46 PID 1268 wrote to memory of 908 1268 cmd.exe 46 PID 1268 wrote to memory of 1696 1268 cmd.exe 47 PID 1268 wrote to memory of 1696 1268 cmd.exe 47 PID 1268 wrote to memory of 1696 1268 cmd.exe 47 PID 1268 wrote to memory of 1696 1268 cmd.exe 47 PID 1268 wrote to memory of 772 1268 cmd.exe 48 PID 1268 wrote to memory of 772 1268 cmd.exe 48 PID 1268 wrote to memory of 772 1268 cmd.exe 48
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"3⤵
- Executes dropped EXE
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cayV0Deo9jSt417.exe"C:\Users\Admin\AppData\Local\Temp\Files\cayV0Deo9jSt417.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\clip.exe"C:\Windows\SysWOW64\clip.exe"4⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\System32\taskhost.exe"C:\Users\Admin\AppData\Roaming\System32\taskhost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NorthSperm.exe"C:\Users\Admin\AppData\Local\Temp\Files\NorthSperm.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Surrey Surrey.cmd && Surrey.cmd && exit4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵
- System Location Discovery: System Language Discovery
PID:568
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7195805⤵
- System Location Discovery: System Language Discovery
PID:272
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "copehebrewinquireinnocent" Corpus5⤵
- System Location Discovery: System Language Discovery
PID:908
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Utilize + ..\Verzeichnis + ..\Built + ..\Vessels + ..\Cradle + ..\Jaguar + ..\Comics + ..\Flux + ..\Liberal f5⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\719580\Optimum.pifOptimum.pif f5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:772
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\66c609c335ba8_crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\66c609c335ba8_crypted.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pi.exe"C:\Users\Admin\AppData\Local\Temp\Files\pi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\sylsplvc.exeC:\Windows\sylsplvc.exe4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\syscapvbrd.exeC:\Windows\syscapvbrd.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:2828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t.exe"C:\Users\Admin\AppData\Local\Temp\Files\t.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\sysarddrvs.exeC:\Windows\sysarddrvs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:2012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1548
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:264
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\1.exe"C:\Users\Admin\AppData\Local\Temp\Files\1.exe"3⤵
- Executes dropped EXE
PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ob_6d92ff_afficher-masquer-les-dossiers-caches.exe"C:\Users\Admin\AppData\Local\Temp\Files\ob_6d92ff_afficher-masquer-les-dossiers-caches.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Dtrade_v1.3.6.exe"C:\Users\Admin\AppData\Local\Temp\Files\Dtrade_v1.3.6.exe"3⤵
- Executes dropped EXE
PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\719580\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\719580\RegAsm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5b37046319a495742af2d1d9e5ccc0ea9
SHA1d13ca92d5a17068773a58d167af40b77813be532
SHA2567c60a0bab1d7581bbba576b709837ef75a5c0833acb584bca3f7c780e70f6c14
SHA5125e7ad4b7d55f0d5e4c7a17cabccc54d9568cf4b98a8e0566607f253e238d090e111e5f6f44b23617e9d1a9fc2370a10fa761cbe50a9d17a182da31dcd8ad2b48
-
Filesize
619KB
MD543ca848d3a9ee13623e355d9ee71b515
SHA1944f72b5cc721b44bf50c0013b4b10151972074d
SHA2563d4000a64c1b7be8fcefe59e8f39f1ae12ef1fcd9d30a39158f83b26ee189831
SHA512e52336e652a69b34c41aa9283d8e2e8e795c5734507b23050f48aa25be4423eafcc416f38bf23463de0602c20a24f0fd75629ec23214119b4c4a98025be8513f
-
Filesize
58KB
MD50a91386341f9d1a371bc735576b276a4
SHA1a02598ef42cef1443cc94a8310a6c02df07119d4
SHA2567b857693641ff1ff59e69422b09299a5580d20677acd530c27c7fbc9e3ee3b92
SHA512b492508575c01689c982a8eb57fac2b5759e4c843c92f99d231b63c25ab4c82fa7fece9d4e9c2cc436a3232b4ed7947baecf2a06aafbf1a3cf243395af71e96b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
66KB
MD54a3aab84dbfdaf25ae909ac736489f4b
SHA176663cb1186f29fed429863013600c9d69355d36
SHA2562caa4849a4353ca50dfdbc860412e95b783fdcc7e60d8756c9b4bdf2915e1923
SHA5121c2b0ffa8783bb9e9082eae4214547d8ced58121e717b57884a56042a7ef70c55e702d7f018dea72ca95aa40170c6f24ccec7d56fa3b160237969b5c0473bea5
-
Filesize
236B
MD5148febc94e0f8036a074350ef338b007
SHA11be93210e5348f9409fe4162599dfaad797a2ade
SHA256849892bc358956ee263db6cbddd4a9cca0e1564d6caefe44e2e998d559e610a0
SHA51272b83e8cb35bf6fe295f1cb84197f3ffb4944e19b9ece9f6664ed2bc4aca40c9c912debf260e891c80feebb4c84935da4c2996b9a100ce94cde177928f31fa92
-
Filesize
78KB
MD58c59dae352a159e484b0de9603dabc11
SHA134992e582081635abf736ec18f1492ae40ca4925
SHA2563ab028b25bd6bd3ba48a92c4198dd8ff07fe71b4b41c785469d79da422f2fe46
SHA512cf041cc9470ac479702c19714d875868a5168940a8d56715a98ae3d52f0363ffab160566d7c364b1bd9e8cb263b7e2b60e6719dbac7b6ad12e5f6a87e4f57d8e
-
Filesize
92KB
MD5523fea93bbf3f0b9ddd4d1a432b624c9
SHA1578ccd6f97455881ca61fddf068695ab0daa8918
SHA256f4e881ea8495c993e2f008e9b5fc082bc2cea97812fe944dda293f3b02fb60b0
SHA512633474c0d83e92171d09ab5849b83a9bcd613f630ec54ee44ad42ac8102d25c987f9e3ec71ea6c2d3542bcc9919ded6e37c3754a8f074aeea9704f16770692f4
-
Filesize
872KB
MD567ff730b62d42030058393ab3f0dafd1
SHA179215f079836dd43b4f7b1e66739bd7dab9fb6a3
SHA25695d53427ef46fb44354a0253a611e342a30428101acaf83215f5b21432afbff1
SHA5126e7d6f12686b0b30c96eebe01546e4aee1adee39a7467409e8f41de9a37c65daa010ebcefa6c452d4849e7ba0bec9be55be1b38250420b40e2956c151478d973
-
Filesize
93KB
MD5fdadac1c5944e618315f608ad2f02714
SHA1debe3ccc5a4abc326dbcb4a86ec8074671a3417f
SHA25649687025dce701973b47fb6caba71f1443471e64551f41967a6a3275ce1e93d5
SHA51292d7da5ef3625157acb00752b74fcfb80c588bc3ddf8b7fda488f68d0a6cf332aade539ee92139a26c5dc3549c8a69471ca24fcb1568068d5293b8988bbbab58
-
Filesize
38KB
MD5524c0177830e8a3624062be7eddfa277
SHA10a830e50e9433d530094edf3577b7ec5c5d1c5f5
SHA256aacfabd8f6dde87949cbafa8eab7536dc5377e726064445e62824d10584eaec5
SHA51279ed8be7d451a885befb7001c52a9f0db3977be8e16abd7db9f7742d520270a650ac77ed72e512a377d8f888bf05643f6bce3fea2d4dba8f37c7fff73a70d0cd
-
Filesize
14KB
MD5721cde52d197da4629a6792103404e23
SHA11f5bac364c6b9546ba0501f41766bb25df98b32b
SHA25666627eef98fb038f1d22f620bc8d85430a442d08313602eb02f0b158b5471812
SHA51263a6786227915bc450ea9ca4df4962126b4194a1fd5c68fe3c686da8175726d4efdda5e88aedea7b8e4e758816b9b31981fa79e37dbe51028650def5042ccac6
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
83KB
MD54bb39f0bce8a4f7b640ba76ecccaf87b
SHA1c0c7feca88b0fc3fc1f20d1963ae25388a1f4c12
SHA25696af995b201e5392293f2d7272b1c9a3f0eb671d62aeafffb4b0bbbfed0e3560
SHA512ad2752281067584233cc19b3d0bbd0178dc3907af71c8dc3c37afe35f417afe1b1fc4d9ad2d99506d53100afde8ddb692e93669b8c9398782cb03dc22a04e1ef
-
Filesize
61KB
MD56a5ab833602af088d60d3d7f89b77229
SHA132f9fe7c6ba035993a627a78491651f02d0dfc97
SHA25641586643456496d40c3279839a1cb1528428c19deefb4c702bd58f1467a1a1d0
SHA5120598b2b38270a8d282ae2325330420b467be203047dffc2e85626fd78e78f81c5084487eebfbefbcb36115732a6670a9857655c18803388c02e37fbcf51aaa66
-
Filesize
50KB
MD5d64ef3bbcca2c221c0bcc85a7b6d5209
SHA15c3cf9d492c7021e19e103fa14ab3965fd1c6ba3
SHA256c8c35545936faa3b0e00aa1b907952e97fffd9c1958045253863b4c2fad7f295
SHA5122b6713646373b5b233295930a46fefbd499b607a94051c6294d3dce12f58b187c98f22f7f0b1243f22611a82c659b1d95f70a7858247b8f0853a1765d449e611
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0G4IOBM8GX4APYWT9W57.temp
Filesize7KB
MD56a7f7c2688ad76801d2ba805c7004fa6
SHA13398de650c454acc1c1ee564bb09d4c5f4651cf0
SHA2561e07b408eb4c6fb7545778542c7b0ebc5041836c8ee4c15b423dc49a64bbe76b
SHA5124c9c342bc245ad6d749283e6f2b4f0954d5ea1c2fcb0d2f50bea9c60d72ca775c37ede73721a61df89f4ce96d1a07acee6c6c018c3b644be4e589e8d48b2f70c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d760b83c23f890efc0f8fead4f56816b
SHA1468f53b72985c7ec4f50dff03541d611abbf22a2
SHA256f0f96b16da05dd3152eebc88222a6c7b9ba17877c2bfbb28fc472fb92fdca2d2
SHA5122d50451c7d045f4f1646d6c15ef47ae2d1f0506b39a69a453ca0a1b3c510fb8adba89a3281e1697633614f941957ddb933ab42a9e58fadc26450363d020b9806
-
Filesize
25KB
MD504ebddcc3a90b6512aef4aa2eee36624
SHA1185cd595c19dec765d5fcbdff914140b5354a864
SHA2561c4b1acf31ec2dd48c746ad7cf2cc1404c76c7492bd15a6953f2ce6991496856
SHA512fbb7d67593018cd5a12355800b8e2974ad8f04918fafedb89c98fe3ed9cde53fa3ae91e26474cb9d2b1f9e4f7b6267ba1eece6f02ae5df20e95ce94bbb1f28da
-
Filesize
3KB
MD540535f0a001a31a509e4f3f0ef440f22
SHA1d438a4bb40f7e0c0b9ef88bcb9ca58bb180789f0
SHA2569b4edc3eb4452d7e864fb51b3116fa3575840146d68d077c84cd5e90000ad5e9
SHA512e3080809211d96206e98426b9bf12a24c158eeb28f091ea9dea83f60509fab483d1db0fcdece789d000450ce08c13b57ac1e0efdbe82cf85460da8d910cea6e2
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
324KB
MD55ea478b85c9222759b2b24d76b5fa098
SHA1a8193b4b15b16b9319aedab350cdb79d01d71898
SHA256fb3da355936d1177a318557fff4d55af1c9594a800a19bc3f3f92b363232b5b1
SHA5120189f4d042e432b9d36125e13b5e06cf24ece9c76dd1bf595632fde105547f21b69b9f8bf227d847cf9c42bbb17ab8cc7cbcbf36ffaff688e0ced1115e1b218d
-
Filesize
16.4MB
MD51f6c6f36d126cd027ded1915e321c693
SHA141645700d79852f1d2bac3ca637e8b07245574de
SHA256cc3557f4fdaad9aa47bf46dce4f0a8e0a45d7e81084962a54b67b4f55f8bf64c
SHA512b20fabefb977fb89cba1e043716a3fc544faff5933f0d9aa1d6470545bd367b177d7ed087a499945cdb65c346b88bb165c67af868422b32d81b41edcc6da087c
-
Filesize
1.5MB
MD5ff83471ce09ebbe0da07d3001644b23c
SHA1672aa37f23b421e4afba46218735425f7acc29c2
SHA2569e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba
SHA512179c724558065de4b7ea11dd75588df51a3fce737db3ebc77c8fdc0b3a432f6f1fdcc5acd2e2706ab0f088c35a3310c9e638de92ce0a644322eae46729aea259
-
Filesize
19KB
MD51318fbc69b729539376cb6c9ac3cee4c
SHA1753090b4ffaa151317517e8925712dd02908fe9e
SHA256e972fb08a4dcde8d09372f78fe67ba283618288432cdb7d33015fc80613cb408
SHA5127a72a77890aa74ea272473018a683f1b6961e5e765eb90e5be0bb397f04e58b09ab47cfb6095c2fea91f4e0d39bd65e21fee54a0eade36378878b7880bcb9d22
-
Filesize
958KB
MD5aa3cdd5145d9fb980c061d2d8653fa8d
SHA1de696701275b01ddad5461e269d7ab15b7466d6a
SHA25641376827ba300374727d29048920ca2a2d9f20b929e964098181981581e47af2
SHA5124be32b5e9eaffa8d3f4cce515717faa6259373e8dbd258b9ebc2534fd0b62aaa7043093204e43627983fe332f63d8f998a90dc1cbb74f54a18c55f67e42a8a32
-
Filesize
919KB
MD514e43753cd1483a695589acd0254a4a9
SHA18cbed6043fce4fa0bfb256d8c0018cc971b2004c
SHA256b3eb0a88759bf4eacb1f04536af614989468e2bc5d8f27f7617582cf42f12380
SHA512e31edb97d00fd59c00087e8389dc2f58d975a9fad2da2f53bc37796103477945b20cc1aee1a1ec600c1c953d5f62769f0d64df68d5f55efcde490ed38ba8de05
-
Filesize
79KB
MD51e8a2ed2e3f35620fb6b8c2a782a57f3
SHA1e924ce6d147ecc8b30b7c7cad02e5c9ae09a743a
SHA2563f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879
SHA512ce4dc7fdd7f81a7a127d650f9175292b287b4803d815d74b64a4e5125cff66224d75e7ecade1d9c0e42f870bdb49a78e9613b1a49675ab5bc098611b99b49ade
-
Filesize
79KB
MD5e2e3268f813a0c5128ff8347cbaa58c8
SHA14952cbfbdec300c048808d79ee431972b8a7ba84
SHA256d8b83f78ed905a7948e2e1e371f0f905bcaaabbb314c692fee408a454f8338a3
SHA512cb5aeda8378a9a5470f33f2b70c22e77d2df97b162ba953eb16da085b3c434be31a5997eac11501db0cb612cdb30fa9045719fcd10c7227c56cc782558e0c3bc
-
Filesize
100KB
MD5ce554fe53b2620c56f6abb264a588616
SHA177bbdcd30e7e931ef95c913406faf92fa70d4c94
SHA25693237a51bb710bd488b0e5bfa8288751445eafcc795364df7652535f3c210431
SHA5122330b9bdcd3c4d5d3f6a65cb277dce7d59bb655cce6285154ea8153b2b7df41c9a51b0bb62fa218e7345032e83f3b7e738fc1fea5f56a8bb4690733f51442982