Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 00:34
Behavioral task
behavioral1
Sample
925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe
Resource
win7-20240903-en
General
-
Target
925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe
-
Size
5.2MB
-
MD5
9242f298b0877d8187f24b0c1b70b837
-
SHA1
8604aa7c3a07e0ba71edcc0a7b48bdef3922f5e9
-
SHA256
925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1
-
SHA512
5dbce0df256f29d5659a1cb6afe5c307f08fa06b4cceb89e9f8c18dbb2f9ecb23031e45a60096906d28408802da8af3b6f202ae3f497785649e13fc35ac4cdeb
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l3:RWWBibf56utgpPFotBER/mQ32lUj
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x000a000000012250-3.dat cobalt_reflective_dll behavioral1/files/0x00030000000178b0-12.dat cobalt_reflective_dll behavioral1/files/0x00160000000185f5-10.dat cobalt_reflective_dll behavioral1/files/0x0011000000017553-23.dat cobalt_reflective_dll behavioral1/files/0x0005000000018663-33.dat cobalt_reflective_dll behavioral1/files/0x000500000001866b-40.dat cobalt_reflective_dll behavioral1/files/0x0007000000018671-54.dat cobalt_reflective_dll behavioral1/files/0x000700000001867e-64.dat cobalt_reflective_dll behavioral1/files/0x000500000001866f-52.dat cobalt_reflective_dll behavioral1/files/0x0005000000018ea1-76.dat cobalt_reflective_dll behavioral1/files/0x0005000000018eba-89.dat cobalt_reflective_dll behavioral1/files/0x0005000000018eb2-92.dat cobalt_reflective_dll behavioral1/files/0x0005000000018ef7-109.dat cobalt_reflective_dll behavioral1/files/0x0005000000018ed5-101.dat cobalt_reflective_dll behavioral1/files/0x0005000000018f08-116.dat cobalt_reflective_dll behavioral1/files/0x0005000000018f6e-134.dat cobalt_reflective_dll behavioral1/files/0x0005000000018f88-149.dat cobalt_reflective_dll behavioral1/files/0x0005000000018f84-144.dat cobalt_reflective_dll behavioral1/files/0x0005000000018f80-139.dat cobalt_reflective_dll behavioral1/files/0x0005000000018f40-129.dat cobalt_reflective_dll behavioral1/files/0x0005000000018f2c-124.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 43 IoCs
resource yara_rule behavioral1/memory/2672-16-0x000000013F9D0000-0x000000013FD21000-memory.dmp xmrig behavioral1/memory/2000-25-0x000000013FEA0000-0x00000001401F1000-memory.dmp xmrig behavioral1/memory/2220-30-0x000000013F8B0000-0x000000013FC01000-memory.dmp xmrig behavioral1/memory/2704-32-0x000000013FDA0000-0x00000001400F1000-memory.dmp xmrig behavioral1/memory/2800-47-0x000000013F8F0000-0x000000013FC41000-memory.dmp xmrig behavioral1/memory/2780-42-0x000000013F570000-0x000000013F8C1000-memory.dmp xmrig behavioral1/memory/2704-62-0x000000013FDA0000-0x00000001400F1000-memory.dmp xmrig behavioral1/memory/2844-67-0x000000013F200000-0x000000013F551000-memory.dmp xmrig behavioral1/memory/2000-71-0x000000013F8F0000-0x000000013FC41000-memory.dmp xmrig behavioral1/memory/2420-98-0x000000013FDD0000-0x0000000140121000-memory.dmp xmrig behavioral1/memory/1672-88-0x000000013FDB0000-0x0000000140101000-memory.dmp xmrig behavioral1/memory/2616-87-0x000000013FDC0000-0x0000000140111000-memory.dmp xmrig behavioral1/memory/2584-100-0x000000013F370000-0x000000013F6C1000-memory.dmp xmrig behavioral1/memory/2196-99-0x000000013FC80000-0x000000013FFD1000-memory.dmp xmrig behavioral1/memory/2000-78-0x0000000002200000-0x0000000002551000-memory.dmp xmrig behavioral1/memory/2700-105-0x000000013F4E0000-0x000000013F831000-memory.dmp xmrig behavioral1/memory/2000-102-0x000000013F800000-0x000000013FB51000-memory.dmp xmrig behavioral1/memory/2000-158-0x000000013FEA0000-0x00000001401F1000-memory.dmp xmrig behavioral1/memory/2000-161-0x000000013F800000-0x000000013FB51000-memory.dmp xmrig behavioral1/memory/2432-164-0x000000013F800000-0x000000013FB51000-memory.dmp xmrig behavioral1/memory/940-169-0x000000013F0B0000-0x000000013F401000-memory.dmp xmrig behavioral1/memory/2756-171-0x000000013FEB0000-0x0000000140201000-memory.dmp xmrig behavioral1/memory/2328-175-0x000000013FB40000-0x000000013FE91000-memory.dmp xmrig behavioral1/memory/2948-174-0x000000013F140000-0x000000013F491000-memory.dmp xmrig behavioral1/memory/1516-177-0x000000013FA40000-0x000000013FD91000-memory.dmp xmrig behavioral1/memory/1980-176-0x000000013F230000-0x000000013F581000-memory.dmp xmrig behavioral1/memory/2344-172-0x000000013F7D0000-0x000000013FB21000-memory.dmp xmrig behavioral1/memory/2864-173-0x000000013F080000-0x000000013F3D1000-memory.dmp xmrig behavioral1/memory/2000-184-0x000000013FEA0000-0x00000001401F1000-memory.dmp xmrig behavioral1/memory/2220-210-0x000000013F8B0000-0x000000013FC01000-memory.dmp xmrig behavioral1/memory/2672-212-0x000000013F9D0000-0x000000013FD21000-memory.dmp xmrig behavioral1/memory/2780-216-0x000000013F570000-0x000000013F8C1000-memory.dmp xmrig behavioral1/memory/2704-230-0x000000013FDA0000-0x00000001400F1000-memory.dmp xmrig behavioral1/memory/2844-233-0x000000013F200000-0x000000013F551000-memory.dmp xmrig behavioral1/memory/2800-236-0x000000013F8F0000-0x000000013FC41000-memory.dmp xmrig behavioral1/memory/2616-241-0x000000013FDC0000-0x0000000140111000-memory.dmp xmrig behavioral1/memory/2584-247-0x000000013F370000-0x000000013F6C1000-memory.dmp xmrig behavioral1/memory/2700-251-0x000000013F4E0000-0x000000013F831000-memory.dmp xmrig behavioral1/memory/1672-250-0x000000013FDB0000-0x0000000140101000-memory.dmp xmrig behavioral1/memory/2420-255-0x000000013FDD0000-0x0000000140121000-memory.dmp xmrig behavioral1/memory/2196-258-0x000000013FC80000-0x000000013FFD1000-memory.dmp xmrig behavioral1/memory/2432-259-0x000000013F800000-0x000000013FB51000-memory.dmp xmrig behavioral1/memory/940-268-0x000000013F0B0000-0x000000013F401000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2220 mCDWsyM.exe 2672 inHVZTR.exe 2780 CvmyKEl.exe 2704 DevGtlD.exe 2844 uOtdFCB.exe 2800 HXfQPrR.exe 2616 JQpqinM.exe 2584 iNbzIED.exe 2700 sScRuHU.exe 1672 XyRcfqo.exe 2196 aAvlGIU.exe 2420 oAluImS.exe 2432 wQwiVgm.exe 940 IHXTsrn.exe 2756 PeHpxqc.exe 2344 JOZarNb.exe 2864 inrnuWc.exe 2948 ClyuGWa.exe 2328 nOrVFmL.exe 1980 ThFugSP.exe 1516 ukfYYLW.exe -
Loads dropped DLL 21 IoCs
pid Process 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe -
resource yara_rule behavioral1/memory/2000-1-0x000000013FEA0000-0x00000001401F1000-memory.dmp upx behavioral1/files/0x000a000000012250-3.dat upx behavioral1/memory/2672-16-0x000000013F9D0000-0x000000013FD21000-memory.dmp upx behavioral1/files/0x00030000000178b0-12.dat upx behavioral1/memory/2220-11-0x000000013F8B0000-0x000000013FC01000-memory.dmp upx behavioral1/files/0x00160000000185f5-10.dat upx behavioral1/memory/2780-21-0x000000013F570000-0x000000013F8C1000-memory.dmp upx behavioral1/files/0x0011000000017553-23.dat upx behavioral1/memory/2000-25-0x000000013FEA0000-0x00000001401F1000-memory.dmp upx behavioral1/memory/2220-30-0x000000013F8B0000-0x000000013FC01000-memory.dmp upx behavioral1/memory/2704-32-0x000000013FDA0000-0x00000001400F1000-memory.dmp upx behavioral1/files/0x0005000000018663-33.dat upx behavioral1/memory/2844-38-0x000000013F200000-0x000000013F551000-memory.dmp upx behavioral1/files/0x000500000001866b-40.dat upx behavioral1/memory/2800-47-0x000000013F8F0000-0x000000013FC41000-memory.dmp upx behavioral1/memory/2780-42-0x000000013F570000-0x000000013F8C1000-memory.dmp upx behavioral1/files/0x0007000000018671-54.dat upx behavioral1/memory/2584-60-0x000000013F370000-0x000000013F6C1000-memory.dmp upx behavioral1/memory/2616-53-0x000000013FDC0000-0x0000000140111000-memory.dmp upx behavioral1/memory/2700-66-0x000000013F4E0000-0x000000013F831000-memory.dmp upx behavioral1/files/0x000700000001867e-64.dat upx behavioral1/memory/2704-62-0x000000013FDA0000-0x00000001400F1000-memory.dmp upx behavioral1/files/0x000500000001866f-52.dat upx behavioral1/memory/2844-67-0x000000013F200000-0x000000013F551000-memory.dmp upx behavioral1/files/0x0005000000018ea1-76.dat upx behavioral1/files/0x0005000000018eba-89.dat upx behavioral1/memory/2420-98-0x000000013FDD0000-0x0000000140121000-memory.dmp upx behavioral1/memory/1672-88-0x000000013FDB0000-0x0000000140101000-memory.dmp upx behavioral1/memory/2616-87-0x000000013FDC0000-0x0000000140111000-memory.dmp upx behavioral1/memory/2584-100-0x000000013F370000-0x000000013F6C1000-memory.dmp upx behavioral1/memory/2196-99-0x000000013FC80000-0x000000013FFD1000-memory.dmp upx behavioral1/files/0x0005000000018eb2-92.dat upx behavioral1/files/0x0005000000018ef7-109.dat upx behavioral1/memory/940-113-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/files/0x0005000000018ed5-101.dat upx behavioral1/files/0x0005000000018f08-116.dat upx behavioral1/files/0x0005000000018f6e-134.dat upx behavioral1/files/0x0005000000018f88-149.dat upx behavioral1/files/0x0005000000018f84-144.dat upx behavioral1/files/0x0005000000018f80-139.dat upx behavioral1/files/0x0005000000018f40-129.dat upx behavioral1/files/0x0005000000018f2c-124.dat upx behavioral1/memory/2432-106-0x000000013F800000-0x000000013FB51000-memory.dmp upx behavioral1/memory/2700-105-0x000000013F4E0000-0x000000013F831000-memory.dmp upx behavioral1/memory/2000-158-0x000000013FEA0000-0x00000001401F1000-memory.dmp upx behavioral1/memory/2432-164-0x000000013F800000-0x000000013FB51000-memory.dmp upx behavioral1/memory/940-169-0x000000013F0B0000-0x000000013F401000-memory.dmp upx behavioral1/memory/2756-171-0x000000013FEB0000-0x0000000140201000-memory.dmp upx behavioral1/memory/2328-175-0x000000013FB40000-0x000000013FE91000-memory.dmp upx behavioral1/memory/2948-174-0x000000013F140000-0x000000013F491000-memory.dmp upx behavioral1/memory/1516-177-0x000000013FA40000-0x000000013FD91000-memory.dmp upx behavioral1/memory/1980-176-0x000000013F230000-0x000000013F581000-memory.dmp upx behavioral1/memory/2344-172-0x000000013F7D0000-0x000000013FB21000-memory.dmp upx behavioral1/memory/2864-173-0x000000013F080000-0x000000013F3D1000-memory.dmp upx behavioral1/memory/2000-184-0x000000013FEA0000-0x00000001401F1000-memory.dmp upx behavioral1/memory/2220-210-0x000000013F8B0000-0x000000013FC01000-memory.dmp upx behavioral1/memory/2672-212-0x000000013F9D0000-0x000000013FD21000-memory.dmp upx behavioral1/memory/2780-216-0x000000013F570000-0x000000013F8C1000-memory.dmp upx behavioral1/memory/2704-230-0x000000013FDA0000-0x00000001400F1000-memory.dmp upx behavioral1/memory/2844-233-0x000000013F200000-0x000000013F551000-memory.dmp upx behavioral1/memory/2800-236-0x000000013F8F0000-0x000000013FC41000-memory.dmp upx behavioral1/memory/2616-241-0x000000013FDC0000-0x0000000140111000-memory.dmp upx behavioral1/memory/2584-247-0x000000013F370000-0x000000013F6C1000-memory.dmp upx behavioral1/memory/2700-251-0x000000013F4E0000-0x000000013F831000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\mCDWsyM.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\aAvlGIU.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\oAluImS.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\inHVZTR.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\iNbzIED.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\IHXTsrn.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\inrnuWc.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\XyRcfqo.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\PeHpxqc.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\JOZarNb.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\ClyuGWa.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\CvmyKEl.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\DevGtlD.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\JQpqinM.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\sScRuHU.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\nOrVFmL.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\ThFugSP.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\ukfYYLW.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\uOtdFCB.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\HXfQPrR.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe File created C:\Windows\System\wQwiVgm.exe 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe Token: SeLockMemoryPrivilege 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2220 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 30 PID 2000 wrote to memory of 2220 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 30 PID 2000 wrote to memory of 2220 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 30 PID 2000 wrote to memory of 2672 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 31 PID 2000 wrote to memory of 2672 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 31 PID 2000 wrote to memory of 2672 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 31 PID 2000 wrote to memory of 2780 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 32 PID 2000 wrote to memory of 2780 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 32 PID 2000 wrote to memory of 2780 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 32 PID 2000 wrote to memory of 2704 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 33 PID 2000 wrote to memory of 2704 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 33 PID 2000 wrote to memory of 2704 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 33 PID 2000 wrote to memory of 2844 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 34 PID 2000 wrote to memory of 2844 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 34 PID 2000 wrote to memory of 2844 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 34 PID 2000 wrote to memory of 2800 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 35 PID 2000 wrote to memory of 2800 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 35 PID 2000 wrote to memory of 2800 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 35 PID 2000 wrote to memory of 2616 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 36 PID 2000 wrote to memory of 2616 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 36 PID 2000 wrote to memory of 2616 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 36 PID 2000 wrote to memory of 2584 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 37 PID 2000 wrote to memory of 2584 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 37 PID 2000 wrote to memory of 2584 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 37 PID 2000 wrote to memory of 2700 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 38 PID 2000 wrote to memory of 2700 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 38 PID 2000 wrote to memory of 2700 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 38 PID 2000 wrote to memory of 1672 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 39 PID 2000 wrote to memory of 1672 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 39 PID 2000 wrote to memory of 1672 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 39 PID 2000 wrote to memory of 2196 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 40 PID 2000 wrote to memory of 2196 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 40 PID 2000 wrote to memory of 2196 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 40 PID 2000 wrote to memory of 2420 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 41 PID 2000 wrote to memory of 2420 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 41 PID 2000 wrote to memory of 2420 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 41 PID 2000 wrote to memory of 2432 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 42 PID 2000 wrote to memory of 2432 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 42 PID 2000 wrote to memory of 2432 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 42 PID 2000 wrote to memory of 940 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 43 PID 2000 wrote to memory of 940 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 43 PID 2000 wrote to memory of 940 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 43 PID 2000 wrote to memory of 2756 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 44 PID 2000 wrote to memory of 2756 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 44 PID 2000 wrote to memory of 2756 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 44 PID 2000 wrote to memory of 2344 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 45 PID 2000 wrote to memory of 2344 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 45 PID 2000 wrote to memory of 2344 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 45 PID 2000 wrote to memory of 2864 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 46 PID 2000 wrote to memory of 2864 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 46 PID 2000 wrote to memory of 2864 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 46 PID 2000 wrote to memory of 2948 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 47 PID 2000 wrote to memory of 2948 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 47 PID 2000 wrote to memory of 2948 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 47 PID 2000 wrote to memory of 2328 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 48 PID 2000 wrote to memory of 2328 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 48 PID 2000 wrote to memory of 2328 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 48 PID 2000 wrote to memory of 1980 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 49 PID 2000 wrote to memory of 1980 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 49 PID 2000 wrote to memory of 1980 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 49 PID 2000 wrote to memory of 1516 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 50 PID 2000 wrote to memory of 1516 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 50 PID 2000 wrote to memory of 1516 2000 925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe"C:\Users\Admin\AppData\Local\Temp\925c0800d4a0337693d90fe11c96655c8629434ee6b5136863040263531062a1.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\System\mCDWsyM.exeC:\Windows\System\mCDWsyM.exe2⤵
- Executes dropped EXE
PID:2220
-
-
C:\Windows\System\inHVZTR.exeC:\Windows\System\inHVZTR.exe2⤵
- Executes dropped EXE
PID:2672
-
-
C:\Windows\System\CvmyKEl.exeC:\Windows\System\CvmyKEl.exe2⤵
- Executes dropped EXE
PID:2780
-
-
C:\Windows\System\DevGtlD.exeC:\Windows\System\DevGtlD.exe2⤵
- Executes dropped EXE
PID:2704
-
-
C:\Windows\System\uOtdFCB.exeC:\Windows\System\uOtdFCB.exe2⤵
- Executes dropped EXE
PID:2844
-
-
C:\Windows\System\HXfQPrR.exeC:\Windows\System\HXfQPrR.exe2⤵
- Executes dropped EXE
PID:2800
-
-
C:\Windows\System\JQpqinM.exeC:\Windows\System\JQpqinM.exe2⤵
- Executes dropped EXE
PID:2616
-
-
C:\Windows\System\iNbzIED.exeC:\Windows\System\iNbzIED.exe2⤵
- Executes dropped EXE
PID:2584
-
-
C:\Windows\System\sScRuHU.exeC:\Windows\System\sScRuHU.exe2⤵
- Executes dropped EXE
PID:2700
-
-
C:\Windows\System\XyRcfqo.exeC:\Windows\System\XyRcfqo.exe2⤵
- Executes dropped EXE
PID:1672
-
-
C:\Windows\System\aAvlGIU.exeC:\Windows\System\aAvlGIU.exe2⤵
- Executes dropped EXE
PID:2196
-
-
C:\Windows\System\oAluImS.exeC:\Windows\System\oAluImS.exe2⤵
- Executes dropped EXE
PID:2420
-
-
C:\Windows\System\wQwiVgm.exeC:\Windows\System\wQwiVgm.exe2⤵
- Executes dropped EXE
PID:2432
-
-
C:\Windows\System\IHXTsrn.exeC:\Windows\System\IHXTsrn.exe2⤵
- Executes dropped EXE
PID:940
-
-
C:\Windows\System\PeHpxqc.exeC:\Windows\System\PeHpxqc.exe2⤵
- Executes dropped EXE
PID:2756
-
-
C:\Windows\System\JOZarNb.exeC:\Windows\System\JOZarNb.exe2⤵
- Executes dropped EXE
PID:2344
-
-
C:\Windows\System\inrnuWc.exeC:\Windows\System\inrnuWc.exe2⤵
- Executes dropped EXE
PID:2864
-
-
C:\Windows\System\ClyuGWa.exeC:\Windows\System\ClyuGWa.exe2⤵
- Executes dropped EXE
PID:2948
-
-
C:\Windows\System\nOrVFmL.exeC:\Windows\System\nOrVFmL.exe2⤵
- Executes dropped EXE
PID:2328
-
-
C:\Windows\System\ThFugSP.exeC:\Windows\System\ThFugSP.exe2⤵
- Executes dropped EXE
PID:1980
-
-
C:\Windows\System\ukfYYLW.exeC:\Windows\System\ukfYYLW.exe2⤵
- Executes dropped EXE
PID:1516
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5ed82460e3da96b7b68bee1302aa0ab92
SHA15fc55aad8ba272587bcfe92bda136682af6f490b
SHA256ae08f4b724fb2b404443ff86a92c8fe5d83c02bdcdd448aa22622a7fb55cd591
SHA5122f82378ff2b67e1bc5ef9bd46e02383d5c4719d64bf89411c0c243c24cd89e3917e3fb6a5d11c05db88b832ab87e1a5ccd558da786990dd7f6225a599f1f06e0
-
Filesize
5.2MB
MD597b8589a523f80ea762aa5d3a1c047da
SHA1cb5db38ab9dd003a929e3572057da352df6e352c
SHA2567e8d11071f895ecfdf9dc4e1cd1b48b7282caa46b645e66062c4d29a424f87c5
SHA512bb42366fcd1d4c6355b6c363db2e796169fafb48ff461eab7a703f017afcd1f7b2dbec7e2078abc78e7f25dc0e648e40e362e5b3f0c0555c80bfc03a144cf4f6
-
Filesize
5.2MB
MD5c9fc5691b6d289b861c651591f2fb78a
SHA11f27595bb34c337cac5e26d460d14aa03e8042d3
SHA25618a41da84144ac7fdae14f8f83d5ece7968a0a9af24fd36539591d768760e229
SHA512e9751f57957364991ecb18043e83eade1b5c998f923370a070711d1713176f7aea179629149f87b09cae89e4762c33b68c8ddc06c3298391c19c02984629d0d2
-
Filesize
5.2MB
MD5e7c3d17c8143abec510ee2d9b7e448d2
SHA1e596bb59dfd49f3263095b5e46983fe217c79fe5
SHA256b70fff47136f282e6b0ac2145d40654d60395c9876b22fdfef3074b671eb49d9
SHA512e4c1528693434c76f36578e071a5b6e1bc0e1a579e41c5034e9eea0d4dbe414348631f7e59bf4b729d26e42d260167d16faaf555df93988e0930bdbf2fcf5172
-
Filesize
5.2MB
MD54b7ecee7714a41949a24a36d06667fc0
SHA195967da0652ceeb3967919fd71b49f396c954f35
SHA256fa87ef89941c35f84bc9dc4337d5e6201de91083cb56ff72d73057f84d72374a
SHA512a14a348653c2753117852f7ab3083e5c0b7b101c5381305ad3ca3dfcd1e3aaac1d8476d2166297b7e0545755f6a3c6d9de21eba12b4284d69485578a53725dd8
-
Filesize
5.2MB
MD5b397c6ef62703e07de4a3bc86a6ec121
SHA1c99abd5c61ee85607df00c922598f63a5c4aa797
SHA25602693ebfc580723db4583c54418155c766ab8fe0588cd878220f54ad0827d87a
SHA51266f58395612bd82eb6f92003200c808484cc1e92218558c52890cc85ea16408adac5e19ea9ccec60480defe4b0c318caa032464cf84512abf53511bb3bd69d62
-
Filesize
5.2MB
MD56ba825359662fb16e1c32341191f3f56
SHA18dd88a5bc07d8d5419e25494375e04d3660b9c56
SHA25642fce403c7d6cea6b0addfb9fda195e2b5a9e15921a261f77c88c2610f7caced
SHA5124dba78c5d2ddcb6818d9d38a3dba1b16fbde983f6d9a43d6e74798a454b76094cb1c4907f20ccf17e74e5b09a9c08692400c910e49ab93de9663275fcb6285f1
-
Filesize
5.2MB
MD5bd49765b76355cd607bdcde46a65ec09
SHA11bc2ca605528fd9c0c1c2317f4536bf0a5426dff
SHA256210cac7546355ad742219e9c1dfc30c42bd882643478aec0136c791bd9891abf
SHA512e88609132b0af04f98aff8662ae752b390c33781b0363bfb977d07c05ecd62af1fa698ca21516ce743bc5dc767b4b55b5faab1710cc43cb2035a68f35d32a51e
-
Filesize
5.2MB
MD59b52ca23a56a01b8b089d1abbfb622a9
SHA129f8796fd5d35b81f111201d8ec85f7be0ef69e0
SHA2560f9656397f744ee6ec828ac6f725370957f6e9df1166942bd6cfa4a98bebbe27
SHA512445709e2050fcd8ea94f58bf7c4a52e42de1464bf84f632a46c8a428444ab6065c590ae0b7c4f2dc3cf902b4fad37932ff93754395f831fc383dc5b1f04ecb96
-
Filesize
5.2MB
MD54c6f69240e0e645e0a1085c64b0cd366
SHA1127f04e2d2ffa3e01d711458cad4c412990fd64e
SHA2564ded32ab5367c7abd93468ac05c794064bb4a96522fc292f9183ecc50f5697f7
SHA512352ecdbfc0c83795182daeb0e9fc8784f2496a4ab60fda6b9e4e018846cdf1a496989321e91d557155669fd9b3ef888a182c1e4423859476a6ed712fac011e41
-
Filesize
5.2MB
MD52182932c34abfa77bbb14872ff927bd1
SHA1d2a0aa76df335239296290d11cdc6492fe22726a
SHA256ef368c4c55c1b7c7878f5fccd52db0ba2d6cb7bedf7ac39f41067b14d26b7469
SHA512f84504b4eac4da83912c27b41fb7f7b302d31ad0d48abc2cd82e151b82f7e8933987ac4a519be7a0db80699d5b8417c03246aa50de5ff4741565290e58db06e3
-
Filesize
5.2MB
MD54a5072cc64040ccc50245b280ea6d2d5
SHA15d26c68aae7969ba4a8d61d02c8c83374d34f46b
SHA256a69bfde39763bcc55eb7aba565928cd84c4b224bde0c2bb51756f2d860162ea1
SHA512780ad453ff237d412504ad9a2252031128ab3fe8b16d4f11ef1d86e80d42ca648fa2456deb25b7650b8145f86bf040145ef5c24dc0c3d2dd1a1426778c03d562
-
Filesize
5.2MB
MD5dc0f3fa61035b75b3169e35e99736118
SHA1ea2fea1ddd652271bc6ab6999804f2d4c2ced9a8
SHA256a3c8386295ccfbe7c1576fb8e6afedc364df9c8a106296d3a3cb9197110971e5
SHA512e9dcd8f498b4c493ce333395675a8c014e1662c185e023d72d8d16f684618845fdbbf436b25837b93b6c96631ad0d34a9fe68cd127b6a57deecf88dfcea6e6cd
-
Filesize
5.2MB
MD579686eb94b61d90c7b452dd5eea7afa8
SHA10cf038ae4bbe17b6c2a6318e2a344535affd3c57
SHA2566d246ec7692ad64037dd5e11a2a8c4bfbb6b300597624dcf1e2c5de10bea2b69
SHA5121ac85e3a294df1e835af8d7ac3b730bb1e0603f8647b61bac774afa493cbb186a356ba7cc3c71035bc892b4ee9e4c44041b72304944a4f1c9bd9c33a4365d502
-
Filesize
5.2MB
MD5d9e190a0c52e9e65e652f1fcc610e335
SHA14fdc18fe72f34933518c6dc9b6562c99b1be62ec
SHA2561a63f5caccc97e8cb5dbea3629e1d885bc8e0cae45c9dcae040c3045edfc17e4
SHA5124b2f73b52ac268ca234589b1004b7cf9c49bb873261d977744e87d16323691fe98db4d96b8534cd868cb748fb59d62b6ba6617eec3589ddb20c908ed7463c1ca
-
Filesize
5.2MB
MD55cef07b9072b2f0943b8fd408947173e
SHA1fc080bf687df4c615866ee069144094d9dfc2a3a
SHA25675226bd941935a28c0f49e86a016d6b9b506f8e8ffd3fe3d308ac6843692e373
SHA512698641615ed274b5e230e1ca2b0d9f1ada265b6ebdfce31f082577ae630bdb0e6e30e3f2c699718a860d3912988169784d059547db595e4be1c690ba16a480e4
-
Filesize
5.2MB
MD591657bc5ec02ea7eda1e6f55bed02154
SHA1e529a2252800d4c6166f43f008e54e1db46a476b
SHA256f737bb9775f12357c05a98e1f50c555acb57a8cb91e77024cfae566139d92055
SHA512c2ea9146a7536722bdff683580fa266370a2d3c3973a5428375bc0a8b95c43de98e9cf317115fd6aea82ffd9bfaff3a6272fef2c9bab7d27478b793943290fb9
-
Filesize
5.2MB
MD53e6637356a456a9491067e578702c746
SHA14c45af2785bb9bfce72cde4f1bc5acd3d69a1947
SHA256ebdfb3cece4904ccfa2ce9a8be863f3db23da5ace8da8618d9fa390e1db4f596
SHA5129a90669583ace81c4704d6ca1eb1101596363518392d96fa991009a459730f51b18c83c3c7b4d49c801916a2d9a854f22e549606ae526b7e84ce0dda374a547d
-
Filesize
5.2MB
MD579ae745539e8c7fac2318c10324fb8f9
SHA1e8f8b9b6f6d2961ffb094f254dbe7ee68f9cd0b7
SHA25677f410c28fa34ca506e40c50869dc1d3904e358dc17cba48ef60a65113e4f4b4
SHA5124010d0fe3f1c5322b872bdcbcb6d9d24e7a61091a387a2be8f71a1e8165055cc6de201930e54b90dd339ad949fc5dea309ad145af4abd40da342ea0b5fd5b06c
-
Filesize
5.2MB
MD59a11ed8bd471f716d6a9c0efd4c48d97
SHA1828a83923544f890c954e21c9d0e924ddf6523dc
SHA256723aaf8003476008632178c11f673d26041b4f058e4e432d479ecb7dc757271c
SHA512df0a59a4ded623cd40ea37b2ef5d9837bee5581d750f5d88096425e2a658a0b2f28f58366cd47acd50688e838cb7ac3975746e6e6f1e82a57bf24c6360e3fe7f
-
Filesize
5.2MB
MD50ebdddb3a064f0b32a6e841c6e8eb04e
SHA1855f9b9b17e99cbe25fd1f6b4001335f08f2461c
SHA2566d7d6de3d2f91877420ed8c92d7b4787088b8bc57a980132e3cc6677de5d6b64
SHA51208895f83586297020b38b70c53ac3320298249d0ec896157c86f536969ebc6c1ff78bc453969314584e376110ceca1b8a601513554d7b67e93592e252316d644