Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 21:35
Behavioral task
behavioral1
Sample
72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe
Resource
win7-20240903-en
General
-
Target
72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe
-
Size
5.2MB
-
MD5
f487b79d9614ed71808b450535575a40
-
SHA1
ae9a2e88a97a10ae814246b05297a8be06466885
-
SHA256
72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25a
-
SHA512
5168a0ca532673c2cf98403d7a33291cbb96647c65d983446a80eebbaef37290b693ac66a99439f7ee01dba3459396591bd7531545c85822d172cc6f530afee6
-
SSDEEP
49152:ROdWCCi7/raA56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lb:RWWBibj56utgpPFotBER/mQ32lUH
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x0007000000012118-3.dat cobalt_reflective_dll behavioral1/files/0x000800000001707c-11.dat cobalt_reflective_dll behavioral1/files/0x00080000000173f3-15.dat cobalt_reflective_dll behavioral1/files/0x0008000000017400-23.dat cobalt_reflective_dll behavioral1/files/0x000700000001746a-24.dat cobalt_reflective_dll behavioral1/files/0x0007000000017488-32.dat cobalt_reflective_dll behavioral1/files/0x0031000000016de8-28.dat cobalt_reflective_dll behavioral1/files/0x00070000000174a6-36.dat cobalt_reflective_dll behavioral1/files/0x000800000001757f-67.dat cobalt_reflective_dll behavioral1/files/0x0005000000019275-79.dat cobalt_reflective_dll behavioral1/files/0x0005000000019365-126.dat cobalt_reflective_dll behavioral1/files/0x00050000000193b3-116.dat cobalt_reflective_dll behavioral1/files/0x0005000000019377-111.dat cobalt_reflective_dll behavioral1/files/0x000500000001929a-110.dat cobalt_reflective_dll behavioral1/files/0x0005000000019387-106.dat cobalt_reflective_dll behavioral1/files/0x00050000000193c1-125.dat cobalt_reflective_dll behavioral1/files/0x00050000000193a4-115.dat cobalt_reflective_dll behavioral1/files/0x0005000000019319-98.dat cobalt_reflective_dll behavioral1/files/0x0005000000019278-90.dat cobalt_reflective_dll behavioral1/files/0x000600000001926c-74.dat cobalt_reflective_dll behavioral1/files/0x00080000000174c3-61.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 42 IoCs
resource yara_rule behavioral1/memory/2728-18-0x000000013F570000-0x000000013F8C1000-memory.dmp xmrig behavioral1/memory/2844-35-0x000000013F9A0000-0x000000013FCF1000-memory.dmp xmrig behavioral1/memory/2612-49-0x000000013FBC0000-0x000000013FF11000-memory.dmp xmrig behavioral1/memory/2644-134-0x000000013F020000-0x000000013F371000-memory.dmp xmrig behavioral1/memory/1316-133-0x000000013F6F0000-0x000000013FA41000-memory.dmp xmrig behavioral1/memory/1504-135-0x000000013F950000-0x000000013FCA1000-memory.dmp xmrig behavioral1/memory/2672-86-0x000000013F840000-0x000000013FB91000-memory.dmp xmrig behavioral1/memory/2128-85-0x000000013F680000-0x000000013F9D1000-memory.dmp xmrig behavioral1/memory/2672-83-0x0000000002220000-0x0000000002571000-memory.dmp xmrig behavioral1/memory/2008-123-0x000000013F940000-0x000000013FC91000-memory.dmp xmrig behavioral1/memory/2948-70-0x000000013F3F0000-0x000000013F741000-memory.dmp xmrig behavioral1/memory/2572-56-0x000000013FF50000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2672-52-0x0000000002220000-0x0000000002571000-memory.dmp xmrig behavioral1/memory/2852-50-0x000000013F9D0000-0x000000013FD21000-memory.dmp xmrig behavioral1/memory/2740-46-0x000000013F240000-0x000000013F591000-memory.dmp xmrig behavioral1/memory/2732-43-0x000000013F350000-0x000000013F6A1000-memory.dmp xmrig behavioral1/memory/2672-41-0x000000013F350000-0x000000013F6A1000-memory.dmp xmrig behavioral1/memory/3068-136-0x000000013F6E0000-0x000000013FA31000-memory.dmp xmrig behavioral1/memory/2128-138-0x000000013F680000-0x000000013F9D1000-memory.dmp xmrig behavioral1/memory/2672-139-0x000000013F840000-0x000000013FB91000-memory.dmp xmrig behavioral1/memory/1184-159-0x000000013FEC0000-0x0000000140211000-memory.dmp xmrig behavioral1/memory/592-160-0x000000013FC10000-0x000000013FF61000-memory.dmp xmrig behavioral1/memory/2288-157-0x000000013F290000-0x000000013F5E1000-memory.dmp xmrig behavioral1/memory/2648-155-0x000000013F820000-0x000000013FB71000-memory.dmp xmrig behavioral1/memory/572-153-0x000000013FB90000-0x000000013FEE1000-memory.dmp xmrig behavioral1/memory/2892-158-0x000000013FAD0000-0x000000013FE21000-memory.dmp xmrig behavioral1/memory/1332-156-0x000000013FF50000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2672-161-0x000000013F840000-0x000000013FB91000-memory.dmp xmrig behavioral1/memory/2728-212-0x000000013F570000-0x000000013F8C1000-memory.dmp xmrig behavioral1/memory/2844-214-0x000000013F9A0000-0x000000013FCF1000-memory.dmp xmrig behavioral1/memory/2732-216-0x000000013F350000-0x000000013F6A1000-memory.dmp xmrig behavioral1/memory/2740-218-0x000000013F240000-0x000000013F591000-memory.dmp xmrig behavioral1/memory/2612-232-0x000000013FBC0000-0x000000013FF11000-memory.dmp xmrig behavioral1/memory/2572-236-0x000000013FF50000-0x00000001402A1000-memory.dmp xmrig behavioral1/memory/2852-235-0x000000013F9D0000-0x000000013FD21000-memory.dmp xmrig behavioral1/memory/2948-238-0x000000013F3F0000-0x000000013F741000-memory.dmp xmrig behavioral1/memory/2644-240-0x000000013F020000-0x000000013F371000-memory.dmp xmrig behavioral1/memory/1504-242-0x000000013F950000-0x000000013FCA1000-memory.dmp xmrig behavioral1/memory/3068-246-0x000000013F6E0000-0x000000013FA31000-memory.dmp xmrig behavioral1/memory/2128-245-0x000000013F680000-0x000000013F9D1000-memory.dmp xmrig behavioral1/memory/1316-249-0x000000013F6F0000-0x000000013FA41000-memory.dmp xmrig behavioral1/memory/2008-254-0x000000013F940000-0x000000013FC91000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2728 bUaUUHj.exe 2844 MSPoApr.exe 2732 mhafDNI.exe 2740 ssQJFcw.exe 2612 VTfqfpB.exe 2852 qoOnmoj.exe 2572 gaXVvuy.exe 2644 fRGKYSj.exe 1504 bWnYSFh.exe 2948 mZhyMwB.exe 3068 wxRlGjw.exe 2128 ECCuQuX.exe 2008 YBrHcKb.exe 1316 lrzFAVe.exe 572 XKCTVzZ.exe 1332 yfNNZfG.exe 2892 WeYdsUK.exe 592 IVZlKjx.exe 2648 SLVHFuK.exe 2288 zEmfIYe.exe 1184 rQoOvIF.exe -
Loads dropped DLL 21 IoCs
pid Process 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe -
resource yara_rule behavioral1/memory/2672-0-0x000000013F840000-0x000000013FB91000-memory.dmp upx behavioral1/files/0x0007000000012118-3.dat upx behavioral1/files/0x000800000001707c-11.dat upx behavioral1/files/0x00080000000173f3-15.dat upx behavioral1/memory/2728-18-0x000000013F570000-0x000000013F8C1000-memory.dmp upx behavioral1/files/0x0008000000017400-23.dat upx behavioral1/files/0x000700000001746a-24.dat upx behavioral1/memory/2844-35-0x000000013F9A0000-0x000000013FCF1000-memory.dmp upx behavioral1/files/0x0007000000017488-32.dat upx behavioral1/files/0x0031000000016de8-28.dat upx behavioral1/files/0x00070000000174a6-36.dat upx behavioral1/memory/2612-49-0x000000013FBC0000-0x000000013FF11000-memory.dmp upx behavioral1/files/0x000800000001757f-67.dat upx behavioral1/memory/3068-76-0x000000013F6E0000-0x000000013FA31000-memory.dmp upx behavioral1/files/0x0005000000019275-79.dat upx behavioral1/files/0x0005000000019365-126.dat upx behavioral1/files/0x00050000000193b3-116.dat upx behavioral1/memory/2644-134-0x000000013F020000-0x000000013F371000-memory.dmp upx behavioral1/memory/1316-133-0x000000013F6F0000-0x000000013FA41000-memory.dmp upx behavioral1/files/0x0005000000019377-111.dat upx behavioral1/files/0x000500000001929a-110.dat upx behavioral1/files/0x0005000000019387-106.dat upx behavioral1/files/0x00050000000193c1-125.dat upx behavioral1/memory/1504-135-0x000000013F950000-0x000000013FCA1000-memory.dmp upx behavioral1/memory/2672-86-0x000000013F840000-0x000000013FB91000-memory.dmp upx behavioral1/memory/2128-85-0x000000013F680000-0x000000013F9D1000-memory.dmp upx behavioral1/memory/2008-123-0x000000013F940000-0x000000013FC91000-memory.dmp upx behavioral1/files/0x00050000000193a4-115.dat upx behavioral1/files/0x0005000000019319-98.dat upx behavioral1/files/0x0005000000019278-90.dat upx behavioral1/memory/2948-70-0x000000013F3F0000-0x000000013F741000-memory.dmp upx behavioral1/files/0x000600000001926c-74.dat upx behavioral1/memory/1504-63-0x000000013F950000-0x000000013FCA1000-memory.dmp upx behavioral1/memory/2644-57-0x000000013F020000-0x000000013F371000-memory.dmp upx behavioral1/memory/2572-56-0x000000013FF50000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2852-50-0x000000013F9D0000-0x000000013FD21000-memory.dmp upx behavioral1/memory/2740-46-0x000000013F240000-0x000000013F591000-memory.dmp upx behavioral1/memory/2732-43-0x000000013F350000-0x000000013F6A1000-memory.dmp upx behavioral1/files/0x00080000000174c3-61.dat upx behavioral1/memory/3068-136-0x000000013F6E0000-0x000000013FA31000-memory.dmp upx behavioral1/memory/2128-138-0x000000013F680000-0x000000013F9D1000-memory.dmp upx behavioral1/memory/2672-139-0x000000013F840000-0x000000013FB91000-memory.dmp upx behavioral1/memory/1184-159-0x000000013FEC0000-0x0000000140211000-memory.dmp upx behavioral1/memory/592-160-0x000000013FC10000-0x000000013FF61000-memory.dmp upx behavioral1/memory/2288-157-0x000000013F290000-0x000000013F5E1000-memory.dmp upx behavioral1/memory/2648-155-0x000000013F820000-0x000000013FB71000-memory.dmp upx behavioral1/memory/572-153-0x000000013FB90000-0x000000013FEE1000-memory.dmp upx behavioral1/memory/2892-158-0x000000013FAD0000-0x000000013FE21000-memory.dmp upx behavioral1/memory/1332-156-0x000000013FF50000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2672-161-0x000000013F840000-0x000000013FB91000-memory.dmp upx behavioral1/memory/2728-212-0x000000013F570000-0x000000013F8C1000-memory.dmp upx behavioral1/memory/2844-214-0x000000013F9A0000-0x000000013FCF1000-memory.dmp upx behavioral1/memory/2732-216-0x000000013F350000-0x000000013F6A1000-memory.dmp upx behavioral1/memory/2740-218-0x000000013F240000-0x000000013F591000-memory.dmp upx behavioral1/memory/2612-232-0x000000013FBC0000-0x000000013FF11000-memory.dmp upx behavioral1/memory/2572-236-0x000000013FF50000-0x00000001402A1000-memory.dmp upx behavioral1/memory/2852-235-0x000000013F9D0000-0x000000013FD21000-memory.dmp upx behavioral1/memory/2948-238-0x000000013F3F0000-0x000000013F741000-memory.dmp upx behavioral1/memory/2644-240-0x000000013F020000-0x000000013F371000-memory.dmp upx behavioral1/memory/1504-242-0x000000013F950000-0x000000013FCA1000-memory.dmp upx behavioral1/memory/3068-246-0x000000013F6E0000-0x000000013FA31000-memory.dmp upx behavioral1/memory/2128-245-0x000000013F680000-0x000000013F9D1000-memory.dmp upx behavioral1/memory/1316-249-0x000000013F6F0000-0x000000013FA41000-memory.dmp upx behavioral1/memory/2008-254-0x000000013F940000-0x000000013FC91000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\MSPoApr.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\VTfqfpB.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\fRGKYSj.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\ECCuQuX.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\XKCTVzZ.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\mZhyMwB.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\SLVHFuK.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\yfNNZfG.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\bUaUUHj.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\mhafDNI.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\ssQJFcw.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\qoOnmoj.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\gaXVvuy.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\IVZlKjx.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\wxRlGjw.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\lrzFAVe.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\zEmfIYe.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\WeYdsUK.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\rQoOvIF.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\bWnYSFh.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\YBrHcKb.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe Token: SeLockMemoryPrivilege 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2728 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 32 PID 2672 wrote to memory of 2728 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 32 PID 2672 wrote to memory of 2728 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 32 PID 2672 wrote to memory of 2844 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 33 PID 2672 wrote to memory of 2844 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 33 PID 2672 wrote to memory of 2844 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 33 PID 2672 wrote to memory of 2732 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 34 PID 2672 wrote to memory of 2732 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 34 PID 2672 wrote to memory of 2732 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 34 PID 2672 wrote to memory of 2740 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 35 PID 2672 wrote to memory of 2740 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 35 PID 2672 wrote to memory of 2740 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 35 PID 2672 wrote to memory of 2612 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 36 PID 2672 wrote to memory of 2612 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 36 PID 2672 wrote to memory of 2612 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 36 PID 2672 wrote to memory of 2852 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 37 PID 2672 wrote to memory of 2852 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 37 PID 2672 wrote to memory of 2852 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 37 PID 2672 wrote to memory of 2572 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 38 PID 2672 wrote to memory of 2572 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 38 PID 2672 wrote to memory of 2572 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 38 PID 2672 wrote to memory of 2644 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 39 PID 2672 wrote to memory of 2644 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 39 PID 2672 wrote to memory of 2644 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 39 PID 2672 wrote to memory of 1504 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 40 PID 2672 wrote to memory of 1504 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 40 PID 2672 wrote to memory of 1504 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 40 PID 2672 wrote to memory of 2948 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 41 PID 2672 wrote to memory of 2948 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 41 PID 2672 wrote to memory of 2948 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 41 PID 2672 wrote to memory of 3068 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 42 PID 2672 wrote to memory of 3068 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 42 PID 2672 wrote to memory of 3068 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 42 PID 2672 wrote to memory of 2128 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 43 PID 2672 wrote to memory of 2128 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 43 PID 2672 wrote to memory of 2128 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 43 PID 2672 wrote to memory of 2008 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 44 PID 2672 wrote to memory of 2008 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 44 PID 2672 wrote to memory of 2008 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 44 PID 2672 wrote to memory of 572 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 45 PID 2672 wrote to memory of 572 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 45 PID 2672 wrote to memory of 572 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 45 PID 2672 wrote to memory of 1316 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 46 PID 2672 wrote to memory of 1316 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 46 PID 2672 wrote to memory of 1316 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 46 PID 2672 wrote to memory of 2648 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 47 PID 2672 wrote to memory of 2648 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 47 PID 2672 wrote to memory of 2648 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 47 PID 2672 wrote to memory of 1332 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 48 PID 2672 wrote to memory of 1332 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 48 PID 2672 wrote to memory of 1332 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 48 PID 2672 wrote to memory of 2288 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 49 PID 2672 wrote to memory of 2288 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 49 PID 2672 wrote to memory of 2288 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 49 PID 2672 wrote to memory of 2892 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 50 PID 2672 wrote to memory of 2892 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 50 PID 2672 wrote to memory of 2892 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 50 PID 2672 wrote to memory of 1184 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 51 PID 2672 wrote to memory of 1184 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 51 PID 2672 wrote to memory of 1184 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 51 PID 2672 wrote to memory of 592 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 52 PID 2672 wrote to memory of 592 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 52 PID 2672 wrote to memory of 592 2672 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe"C:\Users\Admin\AppData\Local\Temp\72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\System\bUaUUHj.exeC:\Windows\System\bUaUUHj.exe2⤵
- Executes dropped EXE
PID:2728
-
-
C:\Windows\System\MSPoApr.exeC:\Windows\System\MSPoApr.exe2⤵
- Executes dropped EXE
PID:2844
-
-
C:\Windows\System\mhafDNI.exeC:\Windows\System\mhafDNI.exe2⤵
- Executes dropped EXE
PID:2732
-
-
C:\Windows\System\ssQJFcw.exeC:\Windows\System\ssQJFcw.exe2⤵
- Executes dropped EXE
PID:2740
-
-
C:\Windows\System\VTfqfpB.exeC:\Windows\System\VTfqfpB.exe2⤵
- Executes dropped EXE
PID:2612
-
-
C:\Windows\System\qoOnmoj.exeC:\Windows\System\qoOnmoj.exe2⤵
- Executes dropped EXE
PID:2852
-
-
C:\Windows\System\gaXVvuy.exeC:\Windows\System\gaXVvuy.exe2⤵
- Executes dropped EXE
PID:2572
-
-
C:\Windows\System\fRGKYSj.exeC:\Windows\System\fRGKYSj.exe2⤵
- Executes dropped EXE
PID:2644
-
-
C:\Windows\System\bWnYSFh.exeC:\Windows\System\bWnYSFh.exe2⤵
- Executes dropped EXE
PID:1504
-
-
C:\Windows\System\mZhyMwB.exeC:\Windows\System\mZhyMwB.exe2⤵
- Executes dropped EXE
PID:2948
-
-
C:\Windows\System\wxRlGjw.exeC:\Windows\System\wxRlGjw.exe2⤵
- Executes dropped EXE
PID:3068
-
-
C:\Windows\System\ECCuQuX.exeC:\Windows\System\ECCuQuX.exe2⤵
- Executes dropped EXE
PID:2128
-
-
C:\Windows\System\YBrHcKb.exeC:\Windows\System\YBrHcKb.exe2⤵
- Executes dropped EXE
PID:2008
-
-
C:\Windows\System\XKCTVzZ.exeC:\Windows\System\XKCTVzZ.exe2⤵
- Executes dropped EXE
PID:572
-
-
C:\Windows\System\lrzFAVe.exeC:\Windows\System\lrzFAVe.exe2⤵
- Executes dropped EXE
PID:1316
-
-
C:\Windows\System\SLVHFuK.exeC:\Windows\System\SLVHFuK.exe2⤵
- Executes dropped EXE
PID:2648
-
-
C:\Windows\System\yfNNZfG.exeC:\Windows\System\yfNNZfG.exe2⤵
- Executes dropped EXE
PID:1332
-
-
C:\Windows\System\zEmfIYe.exeC:\Windows\System\zEmfIYe.exe2⤵
- Executes dropped EXE
PID:2288
-
-
C:\Windows\System\WeYdsUK.exeC:\Windows\System\WeYdsUK.exe2⤵
- Executes dropped EXE
PID:2892
-
-
C:\Windows\System\rQoOvIF.exeC:\Windows\System\rQoOvIF.exe2⤵
- Executes dropped EXE
PID:1184
-
-
C:\Windows\System\IVZlKjx.exeC:\Windows\System\IVZlKjx.exe2⤵
- Executes dropped EXE
PID:592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5a3c1bcea0d3a753610b544987b42380e
SHA177d152fc7994b0437fe2c13e8013b635e51edfdb
SHA25671cb944c4c0b2b2f8d149b818fb954b849e6caf5f5d6799f391d129e556e8d7f
SHA5124db0d48e9b221ac61d2b51f963a93255672482124c67e563a80d243a98a42493c01c6a258f36c178f6afbd3e9078b0f508071a34ffd23b1a6776b86ff063ea10
-
Filesize
5.2MB
MD55472c6accb78ca205824116c5a6f3740
SHA18e397b826894e8b6f1cb39620c580ed81d1432ae
SHA2569ccf69c0ebad163aa8304ba8604e7dc80190bd662d04eba121e958a47509f49d
SHA512c03af4b72fdfd9789fe6d09e5f1e9e6f801297c217a0d67023f05f3753fa2c63910e6ec8c2d249b544f7d27065a8eca29355c6b762e5ef7e0109a9e1b2ee74eb
-
Filesize
5.2MB
MD53916099ff62a7ed6cc233bcd0812a215
SHA1cbe19408a7f14d76083d59179dbb0802a73b4c2c
SHA2564ef6494b6202bfc5880d71d405a953e1bc86707c81c79544ae2e2168e1036fd1
SHA51273c78348a7d4b479ec43a99353a8c5e0525b3be47b9a37d8956752d2e4163893a71532cb0284bfd62b1c7c39591551787ff6198a37a0abf069759598f61e6901
-
Filesize
5.2MB
MD59fa7ac6560919ade983c50366420a432
SHA1b6135df6695539b6454a43ac507d86fe120b1693
SHA256ce65706042fb8f619072271f8fe97a4ef0cc3cbf6713b98c725f8df1f4266c4d
SHA512dd8e00e756c87e3e01bdbfd7a3f28627ce5a8eaf9145efa3bd0bdbec595e9aae7e85621c2669aeb7df678e4ef070d505c20949c5a048f88edb79c23cea1e4d8a
-
Filesize
5.2MB
MD57783b3fb9af67bb37f405d573b2e2e86
SHA113892794f1e5e089e8a36f5d0acd2db238a0f178
SHA25606af11cbfb433f7ad18c03b405c05ff6078bb0e7476efef5f98670ca53dc9c52
SHA512e1481b9564ed9ae44ee7c7e93bc7ce247e94b79c041dcd316fc54d6dc9cc2cb27007cf69d96e92f4365ab0d47cfe331310dfac43b45385f4855b6fea03f7147a
-
Filesize
5.2MB
MD5f001ab8409a6e9fca4c172e99a05fdae
SHA1e4a7028d9b4ecbe379dcfbac7bdd08ead7fd7b16
SHA256304591749be4f9d2eec88b85ed04fab2cd3f18fe137a46317f71190ee72bc23b
SHA5122da64803eba38cd7d02fdd2ad739b1358b082df6d13290c791994520d75385145f5f202c19ed9559916526b51158f4caee7e4e2114893d811c8d3ad922993868
-
Filesize
5.2MB
MD5c51a5e4bae4335f2d3690e998e026d2c
SHA1ca55175b8feb9f90fd1a7aebb1b6c3fa518614ed
SHA256e919163b0b07b032ed66d24004d3edc9539983f76dbc5d9c4d31439590f3ea61
SHA512fcc71baefb1187470ee05925be239a76ec8ed483839dcf85172c6f1256b6639d3abf34540e16d752f9cff00191775844fb58692ca5a8b4d2f296b95e5a5dc1d3
-
Filesize
5.2MB
MD5b1597cc31d3cad20801d258a3f695ba2
SHA19c71297f1a393f2ad4dab3b5a2ddaf8c14ecb2da
SHA2561282a5116a7e5c1aa945afb44894344c7c48788df9eda83c7172f22f4d40111f
SHA512a7f7bd8ce5128b60d6434442db96845e05792ecce5ce2b4d31f6df7ab7d7e54810fabf8bc8c340471b5f7ff3146c63ef4c61b26f228815fb907d1df96cfb0b2d
-
Filesize
5.2MB
MD5dfe015e07184c53eb55d96f34ddd188c
SHA1ede280dd343fb1a38447cba53ff0f842882dcf4a
SHA256b5b2c7896daca6dfad4d7b37ca65bc7ab37f83a4c49e50480e9fcfc687438df3
SHA5122a702f42e3ff537b0f24b8d424b2f3380e4a030b6bdf5bdf809ccaee570fda29a3408365ad59b6125181641ace9dc9517af7b7f78d40b8067f0e249399794791
-
Filesize
5.2MB
MD5d27831db8e1d28d1002756b8bc82634c
SHA15fea92c068f318da69e84174ef6a1dbac33d8365
SHA256d153396a7bd0e6d8ede4e75381ef2e7d374ba0d1618a808c5fe5f7e116a528e2
SHA512efee848ba5eefa91465c2b16bb252a7aafc3508fb70cf72e8f67e96efb4ce510e6d5e0378810ad267d4c623340e0ea53c705ea0e0f1c287f3619a51027325c27
-
Filesize
5.2MB
MD5151adfd61ec9f71eac5ed97cc580a47b
SHA1c0d9f15c814d2389b1feb6c255972dbc315b3434
SHA256611440502cd23bc4dbf03ddc53761d1085877ef1ea3e48bb318769d9d2a959d9
SHA512cd93b1bca23c6048158071d418525969a670f3c0a9b25511047ce8f0d84e42290c4905ff167169919c4013986d9d863d2c0457b6cbf472c964ebcb09d5d1bf78
-
Filesize
5.2MB
MD50c5931a9e2ffeadae90a0087fb0b5f7e
SHA1f6d54268a1e451dd82546b3653749f544cd3d223
SHA256142d64adfab2b40043d9036161e0a50fcb89a30c9889d3462133f254cc7aa2c5
SHA5122cc8543dba5eef225f46d0142ba39374e713fedd092a78231353de9b669bc82d8e19f0ec42fc62dda7ca7e1f80cf0d61768a30530bffdaa817a1c708165f6821
-
Filesize
5.2MB
MD58e790cd613b53eaefb3185d6b5649fd7
SHA1889dc88fab5e6c0b6ba1e4c34bf33d1c45d4f73c
SHA256ab0d2ca3639dbee3859d1221b75a6a5033b6d4e304b80a4b4c4dd5fa0fb7e3e4
SHA512a7f9da3e6887e436dce7b77ccb3a8d8706a81bd43c5bd276cf42dfe179023ec106efeb8a0ce283070fc003cfca6b1ce0417bed2d89715feb217b50f8e8efc7e8
-
Filesize
5.2MB
MD52c7d3ee8831182f0558052ce8b65bdcc
SHA12e053facec65f18bd3e73ef6f0f4e52a80ac4e21
SHA256c1026f7fccb1207c6423551edd6a4c7db3744b188247a628a55ca721fb2501a6
SHA5124ee03f65a9226f2b3e613c035e684dd53913545f363c44af02306f7d23027abc27a7e6647ff8655e523e0a3b061fb5e2cfe7a1312b3cdebe62ae5f957b62c586
-
Filesize
5.2MB
MD5694a2d1a6a8b8ed2ad74899a0d5bd5a0
SHA153ffe86719c61c9db168dd81c13175a0aa2ced0e
SHA2569e5bece9fd390cdfae8f4dd93ea8573afb17e68e8d6702c2a43e787e390b0c6b
SHA512fa879fee9c580228fefffe0b4411348f1c974e69497ed8c788a3c208e5129f4eda88bebb5cfbfa303e827a8a2417c63d5a8290f31ab1d600d6a264972072b447
-
Filesize
5.2MB
MD599c3d1fca470dc200f6ea357f9443f7c
SHA17fc2053554fe1b03538bd906f3e78e959065cf64
SHA256504e7bcf60d510fe7bf4d7f23db2fef7dbf9d41db6d1288d2c5554d713a24ae1
SHA5123091f672baea310f6dd5388da3c9899890bf1328160877fe5b8fc6d746b1fa3f331bf8177d437f46826e4a79b79ca5f20eed6476c3a76c88acff669d618c2ac6
-
Filesize
5.2MB
MD52ed44fe14f91c24407cdeb8c0da88f82
SHA16332d0990f677d54f213102b41e37cdba23d2fb7
SHA256495064846eda978981b03565c84b763bee5c01805ae8aa8f7ab11d4b787bfa5a
SHA51272e0e7e675d58f1763f126f94fc7d2eee4f26072e5ccb0e583dd7b2458ccab4d00995434f16043ad107c0b3d4e5d921bab18e4d720d2b0b00cda143b5091ed22
-
Filesize
5.2MB
MD53a2d517c9aa795ab767eda7b61732f1c
SHA11d0e73541e916cc98d288d700cc0d59f61f4c6cc
SHA25662acbafe6c6bf749fc983c4a52aafb3c03bbefeca099f40c1af07ab26af30fdb
SHA512037c0b533bf1119b4a50072c5c403e3349703d0e3743e87a699334313dd32369358cfd61006844ca3d5125b4c7c3f4d9695640988a8b2a177c2cc7834352c698
-
Filesize
5.2MB
MD51890a233c5b8f51cbb2bce1ca5d8f216
SHA1edcc5daf96ef1f77da83ab794f08adbed3ab960e
SHA256cb5acaa79cb8a1235a060feec52078361f4b4755a8a6d588cfa02207a2351dfa
SHA5125ae8d8dde27d9738662c08b0b4a2424cb761338e62edfb9e6fc042e58b5e3aed00be1dfb0de9efd5231dfa099231a6df5816c74c4cc7bbb0ea48a9381f98dc9c
-
Filesize
5.2MB
MD5da9c42d46da5e3e0b60c8f6be2148f6c
SHA19c49dc3929ce22f7bfa2f7cc2107be3b0e8bdea6
SHA256149d0429c59d8d7517ec5d9ec6653b6f0375692bf4de03db65034c4ff6f9fe4a
SHA5120133525cd943009dce932c7e80bd919489c4e5da8d787953df6378908c0e9da0bcf924fdfae948c4efe53db9df2102bcd9ad24828ef0b686377a3c9da3ea9222
-
Filesize
5.2MB
MD5897ed8d8b95adadf5e64d8032fc95522
SHA1cf5b30737756e052b1c44caad11757d22a228ca7
SHA256d0156e5e66489e0e2da0cf8c24f0460be80f83da343cedb42ff554a681f47e8d
SHA512cf2854876d83139f68d20a47582df97403d98383bbe406cdcd7020a219f1a80c2d3aa0cce94db8be67dc3097460536fe14c13c0ff3accecb49d4e85692e023a5