Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:11
Static task
static1
Behavioral task
behavioral1
Sample
dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe
Resource
win10v2004-20240802-en
General
-
Target
dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe
-
Size
10.4MB
-
MD5
46ac7a29d572cb9b4ebc44a71b5b2ba6
-
SHA1
fc779839ebe405098dc5f986386323bd6444eb4a
-
SHA256
dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568
-
SHA512
c02abd7eae2767d54ce872f0d3fcd483a978b9754e208cf93048337ca34a9e401cb1ba4552a08d9e39b237c77e6860ab39d0eb7cae12ad5f472f219faff2d3a2
-
SSDEEP
196608:XZGmuwsR2/LGPLCXOKODxH5qFlXS47dV2MANpvrjVbEKGWIoS:XZGnwsREJLODBWlX3d+NpvdHIo
Malware Config
Signatures
-
Executes dropped EXE 18 IoCs
pid Process 2804 ymtvadgkbn.exe 2916 ymtvadgkbn.exe 3032 gtclfmatcb.exe 2852 gtclfmatcb.exe 2656 nxlgcniflu.exe 2664 nxlgcniflu.exe 2424 vpuoiypsbd.exe 1496 vpuoiypsbd.exe 2112 shbkjivcxp.exe 1680 shbkjivcxp.exe 2840 tmzkwfbgvv.exe 1788 tmzkwfbgvv.exe 492 eygtidilym.exe 2016 eygtidilym.exe 584 hjjzfaoqkk.exe 2472 hjjzfaoqkk.exe 2148 towndamhvb.exe 1088 towndamhvb.exe -
Loads dropped DLL 18 IoCs
pid Process 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 2804 ymtvadgkbn.exe 2804 ymtvadgkbn.exe 3032 gtclfmatcb.exe 3032 gtclfmatcb.exe 2656 nxlgcniflu.exe 2656 nxlgcniflu.exe 2424 vpuoiypsbd.exe 2424 vpuoiypsbd.exe 2112 shbkjivcxp.exe 2112 shbkjivcxp.exe 2840 tmzkwfbgvv.exe 2840 tmzkwfbgvv.exe 492 eygtidilym.exe 492 eygtidilym.exe 584 hjjzfaoqkk.exe 584 hjjzfaoqkk.exe 2148 towndamhvb.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
pid Process 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 2200 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 2804 ymtvadgkbn.exe 2916 ymtvadgkbn.exe 3032 gtclfmatcb.exe 2852 gtclfmatcb.exe 2656 nxlgcniflu.exe 2664 nxlgcniflu.exe 2424 vpuoiypsbd.exe 1496 vpuoiypsbd.exe 2112 shbkjivcxp.exe 1680 shbkjivcxp.exe 2840 tmzkwfbgvv.exe 1788 tmzkwfbgvv.exe 492 eygtidilym.exe 2016 eygtidilym.exe 584 hjjzfaoqkk.exe 2472 hjjzfaoqkk.exe 2148 towndamhvb.exe 1088 towndamhvb.exe -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxlgcniflu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpuoiypsbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language towndamhvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtclfmatcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtclfmatcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eygtidilym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language towndamhvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxlgcniflu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpuoiypsbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymtvadgkbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shbkjivcxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmzkwfbgvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymtvadgkbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmzkwfbgvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eygtidilym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjjzfaoqkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjjzfaoqkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shbkjivcxp.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 2200 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 2804 ymtvadgkbn.exe 2804 ymtvadgkbn.exe 2916 ymtvadgkbn.exe 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 3032 gtclfmatcb.exe 3032 gtclfmatcb.exe 2852 gtclfmatcb.exe 2804 ymtvadgkbn.exe 2656 nxlgcniflu.exe 2656 nxlgcniflu.exe 2664 nxlgcniflu.exe 3032 gtclfmatcb.exe 2424 vpuoiypsbd.exe 2424 vpuoiypsbd.exe 1496 vpuoiypsbd.exe 2656 nxlgcniflu.exe 2112 shbkjivcxp.exe 2112 shbkjivcxp.exe 1680 shbkjivcxp.exe 2424 vpuoiypsbd.exe 2840 tmzkwfbgvv.exe 2840 tmzkwfbgvv.exe 1788 tmzkwfbgvv.exe 2112 shbkjivcxp.exe 492 eygtidilym.exe 492 eygtidilym.exe 2016 eygtidilym.exe 2840 tmzkwfbgvv.exe 584 hjjzfaoqkk.exe 584 hjjzfaoqkk.exe 2472 hjjzfaoqkk.exe 492 eygtidilym.exe 2148 towndamhvb.exe 2148 towndamhvb.exe 1088 towndamhvb.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 2200 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 2200 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 2804 ymtvadgkbn.exe 2804 ymtvadgkbn.exe 2916 ymtvadgkbn.exe 2916 ymtvadgkbn.exe 3032 gtclfmatcb.exe 3032 gtclfmatcb.exe 2852 gtclfmatcb.exe 2852 gtclfmatcb.exe 2656 nxlgcniflu.exe 2656 nxlgcniflu.exe 2664 nxlgcniflu.exe 2664 nxlgcniflu.exe 2424 vpuoiypsbd.exe 2424 vpuoiypsbd.exe 1496 vpuoiypsbd.exe 1496 vpuoiypsbd.exe 2112 shbkjivcxp.exe 2112 shbkjivcxp.exe 1680 shbkjivcxp.exe 1680 shbkjivcxp.exe 2840 tmzkwfbgvv.exe 2840 tmzkwfbgvv.exe 1788 tmzkwfbgvv.exe 1788 tmzkwfbgvv.exe 492 eygtidilym.exe 492 eygtidilym.exe 2016 eygtidilym.exe 2016 eygtidilym.exe 584 hjjzfaoqkk.exe 584 hjjzfaoqkk.exe 2472 hjjzfaoqkk.exe 2472 hjjzfaoqkk.exe 2148 towndamhvb.exe 2148 towndamhvb.exe 1088 towndamhvb.exe 1088 towndamhvb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2200 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 30 PID 1992 wrote to memory of 2200 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 30 PID 1992 wrote to memory of 2200 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 30 PID 1992 wrote to memory of 2200 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 30 PID 1992 wrote to memory of 2804 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 31 PID 1992 wrote to memory of 2804 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 31 PID 1992 wrote to memory of 2804 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 31 PID 1992 wrote to memory of 2804 1992 dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe 31 PID 2804 wrote to memory of 2916 2804 ymtvadgkbn.exe 32 PID 2804 wrote to memory of 2916 2804 ymtvadgkbn.exe 32 PID 2804 wrote to memory of 2916 2804 ymtvadgkbn.exe 32 PID 2804 wrote to memory of 2916 2804 ymtvadgkbn.exe 32 PID 2804 wrote to memory of 3032 2804 ymtvadgkbn.exe 33 PID 2804 wrote to memory of 3032 2804 ymtvadgkbn.exe 33 PID 2804 wrote to memory of 3032 2804 ymtvadgkbn.exe 33 PID 2804 wrote to memory of 3032 2804 ymtvadgkbn.exe 33 PID 3032 wrote to memory of 2852 3032 gtclfmatcb.exe 34 PID 3032 wrote to memory of 2852 3032 gtclfmatcb.exe 34 PID 3032 wrote to memory of 2852 3032 gtclfmatcb.exe 34 PID 3032 wrote to memory of 2852 3032 gtclfmatcb.exe 34 PID 3032 wrote to memory of 2656 3032 gtclfmatcb.exe 35 PID 3032 wrote to memory of 2656 3032 gtclfmatcb.exe 35 PID 3032 wrote to memory of 2656 3032 gtclfmatcb.exe 35 PID 3032 wrote to memory of 2656 3032 gtclfmatcb.exe 35 PID 2656 wrote to memory of 2664 2656 nxlgcniflu.exe 36 PID 2656 wrote to memory of 2664 2656 nxlgcniflu.exe 36 PID 2656 wrote to memory of 2664 2656 nxlgcniflu.exe 36 PID 2656 wrote to memory of 2664 2656 nxlgcniflu.exe 36 PID 2656 wrote to memory of 2424 2656 nxlgcniflu.exe 37 PID 2656 wrote to memory of 2424 2656 nxlgcniflu.exe 37 PID 2656 wrote to memory of 2424 2656 nxlgcniflu.exe 37 PID 2656 wrote to memory of 2424 2656 nxlgcniflu.exe 37 PID 2424 wrote to memory of 1496 2424 vpuoiypsbd.exe 38 PID 2424 wrote to memory of 1496 2424 vpuoiypsbd.exe 38 PID 2424 wrote to memory of 1496 2424 vpuoiypsbd.exe 38 PID 2424 wrote to memory of 1496 2424 vpuoiypsbd.exe 38 PID 2424 wrote to memory of 2112 2424 vpuoiypsbd.exe 39 PID 2424 wrote to memory of 2112 2424 vpuoiypsbd.exe 39 PID 2424 wrote to memory of 2112 2424 vpuoiypsbd.exe 39 PID 2424 wrote to memory of 2112 2424 vpuoiypsbd.exe 39 PID 2112 wrote to memory of 1680 2112 shbkjivcxp.exe 40 PID 2112 wrote to memory of 1680 2112 shbkjivcxp.exe 40 PID 2112 wrote to memory of 1680 2112 shbkjivcxp.exe 40 PID 2112 wrote to memory of 1680 2112 shbkjivcxp.exe 40 PID 2112 wrote to memory of 2840 2112 shbkjivcxp.exe 41 PID 2112 wrote to memory of 2840 2112 shbkjivcxp.exe 41 PID 2112 wrote to memory of 2840 2112 shbkjivcxp.exe 41 PID 2112 wrote to memory of 2840 2112 shbkjivcxp.exe 41 PID 2840 wrote to memory of 1788 2840 tmzkwfbgvv.exe 42 PID 2840 wrote to memory of 1788 2840 tmzkwfbgvv.exe 42 PID 2840 wrote to memory of 1788 2840 tmzkwfbgvv.exe 42 PID 2840 wrote to memory of 1788 2840 tmzkwfbgvv.exe 42 PID 2840 wrote to memory of 492 2840 tmzkwfbgvv.exe 43 PID 2840 wrote to memory of 492 2840 tmzkwfbgvv.exe 43 PID 2840 wrote to memory of 492 2840 tmzkwfbgvv.exe 43 PID 2840 wrote to memory of 492 2840 tmzkwfbgvv.exe 43 PID 492 wrote to memory of 2016 492 eygtidilym.exe 44 PID 492 wrote to memory of 2016 492 eygtidilym.exe 44 PID 492 wrote to memory of 2016 492 eygtidilym.exe 44 PID 492 wrote to memory of 2016 492 eygtidilym.exe 44 PID 492 wrote to memory of 584 492 eygtidilym.exe 46 PID 492 wrote to memory of 584 492 eygtidilym.exe 46 PID 492 wrote to memory of 584 492 eygtidilym.exe 46 PID 492 wrote to memory of 584 492 eygtidilym.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe"C:\Users\Admin\AppData\Local\Temp\dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exeC:\Users\Admin\AppData\Local\Temp\dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe update ymtvadgkbn.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\ymtvadgkbn.exeC:\Users\Admin\AppData\Local\Temp\ymtvadgkbn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\ymtvadgkbn.exeC:\Users\Admin\AppData\Local\Temp\ymtvadgkbn.exe update gtclfmatcb.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\gtclfmatcb.exeC:\Users\Admin\AppData\Local\Temp\gtclfmatcb.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\gtclfmatcb.exeC:\Users\Admin\AppData\Local\Temp\gtclfmatcb.exe update nxlgcniflu.exe4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\nxlgcniflu.exeC:\Users\Admin\AppData\Local\Temp\nxlgcniflu.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\nxlgcniflu.exeC:\Users\Admin\AppData\Local\Temp\nxlgcniflu.exe update vpuoiypsbd.exe5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\vpuoiypsbd.exeC:\Users\Admin\AppData\Local\Temp\vpuoiypsbd.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\vpuoiypsbd.exeC:\Users\Admin\AppData\Local\Temp\vpuoiypsbd.exe update shbkjivcxp.exe6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\shbkjivcxp.exeC:\Users\Admin\AppData\Local\Temp\shbkjivcxp.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\shbkjivcxp.exeC:\Users\Admin\AppData\Local\Temp\shbkjivcxp.exe update tmzkwfbgvv.exe7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\tmzkwfbgvv.exeC:\Users\Admin\AppData\Local\Temp\tmzkwfbgvv.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\tmzkwfbgvv.exeC:\Users\Admin\AppData\Local\Temp\tmzkwfbgvv.exe update eygtidilym.exe8⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\eygtidilym.exeC:\Users\Admin\AppData\Local\Temp\eygtidilym.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\eygtidilym.exeC:\Users\Admin\AppData\Local\Temp\eygtidilym.exe update hjjzfaoqkk.exe9⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\hjjzfaoqkk.exeC:\Users\Admin\AppData\Local\Temp\hjjzfaoqkk.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:584 -
C:\Users\Admin\AppData\Local\Temp\hjjzfaoqkk.exeC:\Users\Admin\AppData\Local\Temp\hjjzfaoqkk.exe update towndamhvb.exe10⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\towndamhvb.exeC:\Users\Admin\AppData\Local\Temp\towndamhvb.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\towndamhvb.exeC:\Users\Admin\AppData\Local\Temp\towndamhvb.exe update snfdimnvzw.exe11⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\snfdimnvzw.exeC:\Users\Admin\AppData\Local\Temp\snfdimnvzw.exe11⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\snfdimnvzw.exeC:\Users\Admin\AppData\Local\Temp\snfdimnvzw.exe update gmteaihsqn.exe12⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\gmteaihsqn.exeC:\Users\Admin\AppData\Local\Temp\gmteaihsqn.exe12⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\gmteaihsqn.exeC:\Users\Admin\AppData\Local\Temp\gmteaihsqn.exe update ctnumeldnq.exe13⤵PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\ctnumeldnq.exeC:\Users\Admin\AppData\Local\Temp\ctnumeldnq.exe13⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\ctnumeldnq.exeC:\Users\Admin\AppData\Local\Temp\ctnumeldnq.exe update ylqijylvxy.exe14⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\ylqijylvxy.exeC:\Users\Admin\AppData\Local\Temp\ylqijylvxy.exe14⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\ylqijylvxy.exeC:\Users\Admin\AppData\Local\Temp\ylqijylvxy.exe update vasoshnxoi.exe15⤵PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\vasoshnxoi.exeC:\Users\Admin\AppData\Local\Temp\vasoshnxoi.exe15⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\vasoshnxoi.exeC:\Users\Admin\AppData\Local\Temp\vasoshnxoi.exe update urneldetka.exe16⤵PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\urneldetka.exeC:\Users\Admin\AppData\Local\Temp\urneldetka.exe16⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\urneldetka.exeC:\Users\Admin\AppData\Local\Temp\urneldetka.exe update tfkcbljvhk.exe17⤵PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\tfkcbljvhk.exeC:\Users\Admin\AppData\Local\Temp\tfkcbljvhk.exe17⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\tfkcbljvhk.exeC:\Users\Admin\AppData\Local\Temp\tfkcbljvhk.exe update hamprdwxmn.exe18⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\hamprdwxmn.exeC:\Users\Admin\AppData\Local\Temp\hamprdwxmn.exe18⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\hamprdwxmn.exeC:\Users\Admin\AppData\Local\Temp\hamprdwxmn.exe update nseyycpcwu.exe19⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\nseyycpcwu.exeC:\Users\Admin\AppData\Local\Temp\nseyycpcwu.exe19⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\nseyycpcwu.exeC:\Users\Admin\AppData\Local\Temp\nseyycpcwu.exe update mjwzwazpoi.exe20⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\mjwzwazpoi.exeC:\Users\Admin\AppData\Local\Temp\mjwzwazpoi.exe20⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\mjwzwazpoi.exeC:\Users\Admin\AppData\Local\Temp\mjwzwazpoi.exe update fzisjvfslp.exe21⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\fzisjvfslp.exeC:\Users\Admin\AppData\Local\Temp\fzisjvfslp.exe21⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\fzisjvfslp.exeC:\Users\Admin\AppData\Local\Temp\fzisjvfslp.exe update cncxbdamch.exe22⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\cncxbdamch.exeC:\Users\Admin\AppData\Local\Temp\cncxbdamch.exe22⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\cncxbdamch.exeC:\Users\Admin\AppData\Local\Temp\cncxbdamch.exe update vsbrinpzgy.exe23⤵PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\vsbrinpzgy.exeC:\Users\Admin\AppData\Local\Temp\vsbrinpzgy.exe23⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\vsbrinpzgy.exeC:\Users\Admin\AppData\Local\Temp\vsbrinpzgy.exe update cktrpuimye.exe24⤵PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\cktrpuimye.exeC:\Users\Admin\AppData\Local\Temp\cktrpuimye.exe24⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\cktrpuimye.exeC:\Users\Admin\AppData\Local\Temp\cktrpuimye.exe update prusuxmbpf.exe25⤵PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\prusuxmbpf.exeC:\Users\Admin\AppData\Local\Temp\prusuxmbpf.exe25⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\prusuxmbpf.exeC:\Users\Admin\AppData\Local\Temp\prusuxmbpf.exe update ywqbuoldzj.exe26⤵PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\ywqbuoldzj.exeC:\Users\Admin\AppData\Local\Temp\ywqbuoldzj.exe26⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\ywqbuoldzj.exeC:\Users\Admin\AppData\Local\Temp\ywqbuoldzj.exe update touhkeomkw.exe27⤵PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\touhkeomkw.exeC:\Users\Admin\AppData\Local\Temp\touhkeomkw.exe27⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\touhkeomkw.exeC:\Users\Admin\AppData\Local\Temp\touhkeomkw.exe update pofpebgjwn.exe28⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\pofpebgjwn.exeC:\Users\Admin\AppData\Local\Temp\pofpebgjwn.exe28⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\pofpebgjwn.exeC:\Users\Admin\AppData\Local\Temp\pofpebgjwn.exe update zlpbxrdauz.exe29⤵PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\zlpbxrdauz.exeC:\Users\Admin\AppData\Local\Temp\zlpbxrdauz.exe29⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\zlpbxrdauz.exeC:\Users\Admin\AppData\Local\Temp\zlpbxrdauz.exe update ryzmfkvcmf.exe30⤵PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\ryzmfkvcmf.exeC:\Users\Admin\AppData\Local\Temp\ryzmfkvcmf.exe30⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\ryzmfkvcmf.exeC:\Users\Admin\AppData\Local\Temp\ryzmfkvcmf.exe update ucdkwzelbz.exe31⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\ucdkwzelbz.exeC:\Users\Admin\AppData\Local\Temp\ucdkwzelbz.exe31⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\ucdkwzelbz.exeC:\Users\Admin\AppData\Local\Temp\ucdkwzelbz.exe update fvmyfpfuhn.exe32⤵PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\fvmyfpfuhn.exeC:\Users\Admin\AppData\Local\Temp\fvmyfpfuhn.exe32⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\fvmyfpfuhn.exeC:\Users\Admin\AppData\Local\Temp\fvmyfpfuhn.exe update rdyjuwvgsn.exe33⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\rdyjuwvgsn.exeC:\Users\Admin\AppData\Local\Temp\rdyjuwvgsn.exe33⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\rdyjuwvgsn.exeC:\Users\Admin\AppData\Local\Temp\rdyjuwvgsn.exe update ugdrfqogwt.exe34⤵PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\ugdrfqogwt.exeC:\Users\Admin\AppData\Local\Temp\ugdrfqogwt.exe34⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\ugdrfqogwt.exeC:\Users\Admin\AppData\Local\Temp\ugdrfqogwt.exe update xdxsrtvkgu.exe35⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\xdxsrtvkgu.exeC:\Users\Admin\AppData\Local\Temp\xdxsrtvkgu.exe35⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\xdxsrtvkgu.exeC:\Users\Admin\AppData\Local\Temp\xdxsrtvkgu.exe update nbswutacgq.exe36⤵PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\nbswutacgq.exeC:\Users\Admin\AppData\Local\Temp\nbswutacgq.exe36⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\nbswutacgq.exeC:\Users\Admin\AppData\Local\Temp\nbswutacgq.exe update aekpjtztfs.exe37⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\aekpjtztfs.exeC:\Users\Admin\AppData\Local\Temp\aekpjtztfs.exe37⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\aekpjtztfs.exeC:\Users\Admin\AppData\Local\Temp\aekpjtztfs.exe update iclxamoldq.exe38⤵PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\iclxamoldq.exeC:\Users\Admin\AppData\Local\Temp\iclxamoldq.exe38⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\iclxamoldq.exeC:\Users\Admin\AppData\Local\Temp\iclxamoldq.exe update revwqhhobf.exe39⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\revwqhhobf.exeC:\Users\Admin\AppData\Local\Temp\revwqhhobf.exe39⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\revwqhhobf.exeC:\Users\Admin\AppData\Local\Temp\revwqhhobf.exe update mpirniyfai.exe40⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\mpirniyfai.exeC:\Users\Admin\AppData\Local\Temp\mpirniyfai.exe40⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\mpirniyfai.exeC:\Users\Admin\AppData\Local\Temp\mpirniyfai.exe update tzucblvncf.exe41⤵PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\tzucblvncf.exeC:\Users\Admin\AppData\Local\Temp\tzucblvncf.exe41⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\tzucblvncf.exeC:\Users\Admin\AppData\Local\Temp\tzucblvncf.exe update snbyqzdczw.exe42⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\snbyqzdczw.exeC:\Users\Admin\AppData\Local\Temp\snbyqzdczw.exe42⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\snbyqzdczw.exeC:\Users\Admin\AppData\Local\Temp\snbyqzdczw.exe update drlwccutyk.exe43⤵PID:2504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.4MB
MD594a68ec25d35f1aa6fadc61a04cb44ce
SHA12157d61c3b525dbe8aa371fe31e9e9394c352a73
SHA2568298a722c5ec742df46dc7ebc3bbae66ae3b476dad5c5fff3a31b17fef58bc60
SHA512516ebb7705de51aa0f9a21d727732a945597119a2fa792268365bbc162868cde6790a9a4581ba55f74fd61a6c6b433844c6a1dbe36beeaf5ea902c3700821604
-
Filesize
10.4MB
MD5aa64d5a2f59e4d6657c676797e7f601d
SHA1f130584b8a507c5b2471a1b2ae90feb6317efeef
SHA256a8fa52e175fc88560fb91eec1c64d8568271e91ca3ef1efeb31e786d1e0c3c3d
SHA512f01700a732142e2a0b90ba3dd5dd72497d6c47c8795a13e957136871907817e9b30aad00a118a16ae7a9234828836fc989eec4f41ff355daac20797680e490a0
-
Filesize
10.4MB
MD51d706541a6f596a0f0bdb4c3ad30c994
SHA1ed9a34e5b51c5259d136f709d29481a693df994c
SHA2562fc87bf6331a8a0b2604f94619dcb83e3cb2c16a83752ccfe8cf5a8f2a5d4db0
SHA512354e9cbf1313c291fdb58de05e9c2b7cb859e56cf9f90caf93a1ab303f069d6c56299517db683724bc65727efefa3c1e664af3a6fdf48cc5fc5f4f902c112432
-
Filesize
10.4MB
MD5e956de4cca2e370b63d0c1134136f868
SHA19945ef5bf427489593a1f470fe1cbbb554d90580
SHA256b66bd637f1d3dff917f8d88a23f11d86c21e892b0006f7daf2b9dc67341a58fd
SHA51204d6fc07c8d027f33cd0f7e3d22a16ff83c633ada54f185b54d2c358877e3e9388261dfdd4d3a17b3fc80882a19b230d6c02d47e3261323a91f9bb4f7aa86480
-
Filesize
10.4MB
MD56bf5a612f4be6504e36e6a29cafb98e6
SHA15fc737536925bbf025650458d1fb0a1f85a73065
SHA2563eb88e55d932d59e7609fa9a6598c7684dfda8b17a286b1ec4304a3a2fd6ea8f
SHA51250be485c834eada8fbd0b5e77b62da09e3413229069f2b2461f2e417cb2799fb0e3b5fba2c3c4db3418e4d060ac7e6dec75271d28d26736786a89af50c113905
-
Filesize
10.4MB
MD5572b7cd01fcebd4eae78850a4881895a
SHA1309a4a8d98007289bf12bec59ff7dcb046899b7a
SHA256c7c533436d0cd0d86dba1f8cbe7ae9e1cea1e07da75630741375f2d76831ce22
SHA512a4506684bc2d704ba5bde87825a2495da6450c520d47dac8f03a811d4460fe7e5a9949bd20ddcd310ba334635c55e6ca4cf640148a8d2b998fdf699868e1f111
-
Filesize
10.4MB
MD59c4cc4a04afeb8a5df4e8cbac2cddfad
SHA1cacc0eaf001f28e35b9241a88553a9456a522820
SHA2561920fad5cfcf93488d4d8ab4355f9abe1afe7e50d7dc44da302480d7f30c0cf8
SHA5125eacba9d2141ea6ecd7a2d34309ff1a0d36f986acae84934291abc100aff8ca22f7acd2f6152d0168aac4bfe13b818373f13a77258103cf979b7d11258d35a85
-
Filesize
10.4MB
MD5985e1b6dcbe02dc400d813b7dcd467c1
SHA1bcdecc00d415b88dade1162db48caf036173aa40
SHA256ca57dc300f18463bcf139ee6f9c9d147be823299546bf6711eec55422d28e56b
SHA512d2c1f0de046d90f14171da7ef4c04b1676f92f41d7c2a13fcd52725cb5240e1a2c98ee4b31ec6482f1ecf6e11dc14ed678094231c315cd977a7ddd30eb4caf29
-
Filesize
10.4MB
MD57f6d181fa9a8346b804035649c070291
SHA16f67921856fc3df898ed6e2bfba15de4926f0575
SHA2561c66fb747fcffc4401a45add9e2824869059c1823c53b125f289ef860d013896
SHA512fe397768d434b165382dc80c14aee0e8b244150c16f0ca330baa8393e50d73d3aa1f022483a851ae38e72a52c1769021ad347f18b8031e1a1fd9852a63938150
-
Filesize
10.4MB
MD552b5ecb7be08b004bcf211cdbded52a2
SHA1dedbd86cd8219bebc1625b67889b01c762db711f
SHA2567984176117af8e0b8ac7260f1bcc82d3bd5ccc93b1d9cb08985a26946f30c4e4
SHA512eee875b91ce605ce64c78647f1431513216471ac162af89a46342439b48ba3dcfca98416a6a3cd4fffae0ccfd3184eae9644bfc654549549d3b524933c4f1540
-
Filesize
10.4MB
MD5c414b8614b0ad9b81d51ea2c8378a72a
SHA1c354f8808a24594a9818cbd47594be42dba8d0e4
SHA256a7bbe07eb04c65b815555e7ee4528cf8e1c532300eb8fa8d79daceaada323b59
SHA5124fc036288c0ff58a76ab0a4e6a6f99306962593f6ba124d6fb533ce24ed264a7905edddaa55ba70cd7b001066e12616156d71faed5e5a41d112add1171ff27b8
-
Filesize
10.4MB
MD502b12931ed4c695d899abe51da678e24
SHA183bcd29598f7aeb6e52dd924b2839c8f120f45d3
SHA256d9d5b71afcf4159db85fec03066e31db782895be3bb6a0b41b9b4feb2ff9077c
SHA5126d7181b2454d244dc79db1b4425bc7d755542ca87b93055e2899e6ee39344431f21ebbbee07de9cfdc1fc36e81ff8568265df6fe2fa24b5b2382bb2e6acdab06
-
Filesize
10.4MB
MD5b29a5b51c0d039ecb1bf5c7f7cc56f74
SHA1549a76267e5ad4681b9efa040ebe37437584714e
SHA2569837037b76c39f74b0323115774bc843ac2da8cf32132820502c9ee0d37eee4f
SHA5128665892dfcde6224c5fd974034620d403aa476598c070b52b88389460758c720d67e19c33eed0a61da206e948ce8c16260b0deb2a02c20b1bd88e7e5452bb5e5
-
Filesize
10.4MB
MD519d04c894a78638c9dfacec3e8fb9983
SHA1a360d53012943b6f10083c2a23494f08e8442aec
SHA256862b720c708d8e6a76427f22edbadb4b24d25417d1e274b8e59637ca36820dc6
SHA512a0dca6bf5afe1d486fc317baaa67565b389f53d6832f1fb48a02bf299b59bd87e6697bc6291cbb0fc6f0dc0c1069ddd1e58885bcd5e9522f771565f6447955fa
-
Filesize
10.4MB
MD52722e184a70052591eb4ef5c2a69bde5
SHA1d2de64e16701966b3bfdc30b82ac1b34f1eb8311
SHA256ac56639fbbddf4cf1b8ad161751137aa54fbe33b4ca9440da4cbc4bd06b83dc3
SHA512bdef45ed80c9266fdbe2db27519d258ba2ccabc5a99adba878a61d99f6b011d12f4473ea182ca0453ee573f8485a88b87349315411ee13318b8d64b27240a1ae
-
Filesize
10.4MB
MD5cbeba64eef9227b95dd47cd7eb8ab273
SHA16ca1d5d06a8c64fa23985fc474a172545c02175e
SHA256040fb051d058d6d141d8fc9135aef55f4a4ac6bbe9b9d396b4d33b60b8c58864
SHA512317804db2d5e63c3f0a4921d0ea2202526fd7a7d7e39417145ddf1d61867ab197a80ba2d3758a14cde9689db5a13b6807322730ff64c5b457271ab1141b3f725
-
Filesize
10.4MB
MD5c4b0f6c6f99f23c46dea3c8868ce36bd
SHA178e20ae065ba8b2bf40dee3d43df046b498fcd5d
SHA256c4f7346a1ac3a82dd8b7eec2e0bb3ed460155a47d62d1d26aa3becacc25e4e3d
SHA512590bb37e6ad57910d9b3878299aafb26c2001544c0bcd5de6e5e1beaf89d38d6f273bf3faf91f73bc2a2a7431701a677c0b7b698a0b4e36b341aa522de9fdeec
-
Filesize
10.4MB
MD5005ebc30627fe68cc0e8b50c7d1dc860
SHA1ab18767fabdc52cf30f0f764eaf24e613cb17800
SHA25676ec2e1a6ae3b57d7bf92fe42eda52625d9c23af61733d64b6380c2c3da020c7
SHA51241424216a0b1f610aa626f2d12fc0fc944cfdfb024f3bd3788e1448d1b7ae658406447a8ae16255d1c90083cd12b830452f33da900717f4028bdcab53406db77
-
Filesize
10.4MB
MD5c894b3d82bccd8d85774cd606bc81831
SHA168672fe7424cc23b63b8a10c36995183ec9f5293
SHA2564f9ec60c3507c95f8e2efa27fbbcbe7afa4048bb470835bdc25b5b724e72527e
SHA51223fad52ea7f940cf3972e1fc6798d115bf6526e409f31dd5ccee8cacf40530c0016da1d9e746436aebbcd216b7aed161ce43abf01f7d608b0564cf3fb34686b3