Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 04:29

General

  • Target

    7656795a9bc477c652d442164354215f0318f750bfcd71ec71ed6b90a0da6387N.exe

  • Size

    2.2MB

  • MD5

    0a7017d110df385e4e830c4aa899ab70

  • SHA1

    8b2ebd38873f44fa9d8e446d1629471da6d7890e

  • SHA256

    7656795a9bc477c652d442164354215f0318f750bfcd71ec71ed6b90a0da6387

  • SHA512

    03994a46aa32f5ccb1346f0acc3a3056d13999dba9e2ebf7993da35392e1468bccef9973ca08c2d307a7717ce8aa8c785c022ceb478a78a5745079bedee5e70e

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZy:0UzeyQMS4DqodCnoe+iitjWwwO

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 33 IoCs
  • Drops file in Windows directory 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7656795a9bc477c652d442164354215f0318f750bfcd71ec71ed6b90a0da6387N.exe
    "C:\Users\Admin\AppData\Local\Temp\7656795a9bc477c652d442164354215f0318f750bfcd71ec71ed6b90a0da6387N.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4020
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2836
      • C:\Users\Admin\AppData\Local\Temp\7656795a9bc477c652d442164354215f0318f750bfcd71ec71ed6b90a0da6387N.exe
        "C:\Users\Admin\AppData\Local\Temp\7656795a9bc477c652d442164354215f0318f750bfcd71ec71ed6b90a0da6387N.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3148
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3340
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2440
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3388
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2324
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3796
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:1604
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2976
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4504
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2880
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:904
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1576
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:5072
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3168
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1288
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4348
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2272
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  PID:4344
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4920
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4860
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4620
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4304
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3812
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3876
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:5056
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4060
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3096
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3868
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4816
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1252
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:756
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4460
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2284
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4112
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4516
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2912
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:748
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3648
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:532
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1552
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3128
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4644
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3684
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:996
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4832
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  PID:1584
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3512
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1892
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2900
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1500
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4124
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:320
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1620
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2692
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4956
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:988
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Drops file in Windows directory
                  PID:2556
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2804
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3004
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4904
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:852
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:652
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4768
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3076
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4848
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:512
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Suspicious use of SetWindowsHookEx
                PID:4172
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Drops file in Windows directory
                  PID:5012
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1856
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                  PID:1216
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:924
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Drops file in Windows directory
                PID:4724
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                    PID:3496
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                        PID:4564
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:2120
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:3580
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:2344
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:1524
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:528
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Drops file in Windows directory
                    PID:1544
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Drops file in Windows directory
                    PID:4360
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:4340
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Drops file in Windows directory
                    PID:4972
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:692
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4388
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                      PID:4188
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                        PID:3172
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                1⤵
                  PID:2664

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Windows\Parameters.ini

                  Filesize

                  74B

                  MD5

                  6687785d6a31cdf9a5f80acb3abc459b

                  SHA1

                  1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                  SHA256

                  3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                  SHA512

                  5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                • C:\Windows\System\explorer.exe

                  Filesize

                  2.2MB

                  MD5

                  23276be493fe5d34b925a20f0ef15bf1

                  SHA1

                  b38db21d5e0466ebf1ad5e509689f3a2ea5ea64f

                  SHA256

                  f7eaeb3187eda3741111321bcbcab010dd24de0154870dc47c7c8f7ddcf9e3a8

                  SHA512

                  2649aa572e6b4daf1a95637b94d42c48b2c4a65c04385c0c4caccee4a7c2b0bb47192d16432584abd1195cef98e289b524cf657651cc667351698598c0dd81a4

                • C:\Windows\System\spoolsv.exe

                  Filesize

                  2.2MB

                  MD5

                  450a827668600f66188a23dc1e0841b4

                  SHA1

                  cbb4269367d302f326f940237e2953440dc6be60

                  SHA256

                  04a296ad6472a14a084a0a40615a67fc6de7200f857a9198fc72b1074a20de3a

                  SHA512

                  74c26fd8c39a9aae2ae884b9e26ccd84e2e35b26dde8e1303e7abdb974fafb3a9fd64da3238a423e396a50d4c58c2b1f0503acedc897496246c535604f68f4fc

                • memory/320-2708-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/320-2703-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/532-2480-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/748-2398-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/748-2394-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/756-1578-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/852-2889-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/904-2046-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/904-2051-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/904-2048-0x0000000000440000-0x0000000000509000-memory.dmp

                  Filesize

                  804KB

                • memory/988-2772-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/988-2946-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/996-1961-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/1216-3228-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/1252-2289-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/1288-2074-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/1288-2070-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/1552-1842-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/1576-1122-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/1604-3372-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/1604-3376-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/1620-2057-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/1892-2602-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2272-2139-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2272-2357-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2324-1969-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2324-2121-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2440-99-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2440-705-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2880-2049-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/2880-1036-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/2900-1973-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/2912-1723-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/2976-1978-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/2976-970-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3004-2782-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3096-1476-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3148-45-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3148-44-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3148-87-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3168-1123-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3340-98-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3340-93-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3388-854-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3388-1970-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3512-1967-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3648-1780-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3684-2508-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3684-2504-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3812-1352-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3868-2278-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/3876-2167-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4020-48-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4020-0-0x00000000008E0000-0x00000000008E1000-memory.dmp

                  Filesize

                  4KB

                • memory/4020-41-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4020-42-0x00000000008E0000-0x00000000008E1000-memory.dmp

                  Filesize

                  4KB

                • memory/4060-2267-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4112-1651-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4124-2041-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4172-3089-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4348-1179-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4460-2375-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4460-2575-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4504-1980-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4516-2385-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4620-1286-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4644-1904-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4768-2900-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4768-2895-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4816-1487-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4832-2751-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4832-2592-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4848-2907-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4860-2148-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4860-2151-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/4920-1230-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/5056-1409-0x0000000000400000-0x00000000005D3000-memory.dmp

                  Filesize

                  1.8MB

                • memory/5072-2061-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB