Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 21:35
Behavioral task
behavioral1
Sample
72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe
Resource
win7-20240903-en
General
-
Target
72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe
-
Size
5.2MB
-
MD5
f487b79d9614ed71808b450535575a40
-
SHA1
ae9a2e88a97a10ae814246b05297a8be06466885
-
SHA256
72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25a
-
SHA512
5168a0ca532673c2cf98403d7a33291cbb96647c65d983446a80eebbaef37290b693ac66a99439f7ee01dba3459396591bd7531545c85822d172cc6f530afee6
-
SSDEEP
49152:ROdWCCi7/raA56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6lb:RWWBibj56utgpPFotBER/mQ32lUH
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral2/files/0x0009000000023444-4.dat cobalt_reflective_dll behavioral2/files/0x0007000000023449-9.dat cobalt_reflective_dll behavioral2/files/0x000700000002344b-27.dat cobalt_reflective_dll behavioral2/files/0x000700000002344c-32.dat cobalt_reflective_dll behavioral2/files/0x000700000002344d-46.dat cobalt_reflective_dll behavioral2/files/0x000700000002344e-51.dat cobalt_reflective_dll behavioral2/files/0x0007000000023453-76.dat cobalt_reflective_dll behavioral2/files/0x0007000000023456-97.dat cobalt_reflective_dll behavioral2/files/0x000700000002345a-108.dat cobalt_reflective_dll behavioral2/files/0x0007000000023458-127.dat cobalt_reflective_dll behavioral2/files/0x0007000000023459-119.dat cobalt_reflective_dll behavioral2/files/0x0007000000023457-115.dat cobalt_reflective_dll behavioral2/files/0x0007000000023454-111.dat cobalt_reflective_dll behavioral2/files/0x0007000000023455-106.dat cobalt_reflective_dll behavioral2/files/0x0008000000023445-104.dat cobalt_reflective_dll behavioral2/files/0x0007000000023452-72.dat cobalt_reflective_dll behavioral2/files/0x000700000002344f-70.dat cobalt_reflective_dll behavioral2/files/0x0007000000023451-69.dat cobalt_reflective_dll behavioral2/files/0x0007000000023450-55.dat cobalt_reflective_dll behavioral2/files/0x000700000002344a-25.dat cobalt_reflective_dll behavioral2/files/0x0007000000023448-15.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 45 IoCs
resource yara_rule behavioral2/memory/784-63-0x00007FF739640000-0x00007FF739991000-memory.dmp xmrig behavioral2/memory/3136-125-0x00007FF7DDDE0000-0x00007FF7DE131000-memory.dmp xmrig behavioral2/memory/972-124-0x00007FF6A28A0000-0x00007FF6A2BF1000-memory.dmp xmrig behavioral2/memory/4568-118-0x00007FF76E400000-0x00007FF76E751000-memory.dmp xmrig behavioral2/memory/2604-109-0x00007FF6B73E0000-0x00007FF6B7731000-memory.dmp xmrig behavioral2/memory/1640-91-0x00007FF709EB0000-0x00007FF70A201000-memory.dmp xmrig behavioral2/memory/2928-82-0x00007FF7C8C30000-0x00007FF7C8F81000-memory.dmp xmrig behavioral2/memory/3164-10-0x00007FF635490000-0x00007FF6357E1000-memory.dmp xmrig behavioral2/memory/1576-134-0x00007FF6DA680000-0x00007FF6DA9D1000-memory.dmp xmrig behavioral2/memory/2928-130-0x00007FF7C8C30000-0x00007FF7C8F81000-memory.dmp xmrig behavioral2/memory/4836-136-0x00007FF676020000-0x00007FF676371000-memory.dmp xmrig behavioral2/memory/3572-135-0x00007FF7F9110000-0x00007FF7F9461000-memory.dmp xmrig behavioral2/memory/3668-142-0x00007FF622CE0000-0x00007FF623031000-memory.dmp xmrig behavioral2/memory/1968-145-0x00007FF74AB90000-0x00007FF74AEE1000-memory.dmp xmrig behavioral2/memory/4416-152-0x00007FF720F20000-0x00007FF721271000-memory.dmp xmrig behavioral2/memory/4308-150-0x00007FF7E5900000-0x00007FF7E5C51000-memory.dmp xmrig behavioral2/memory/748-148-0x00007FF60B8B0000-0x00007FF60BC01000-memory.dmp xmrig behavioral2/memory/4840-147-0x00007FF67A820000-0x00007FF67AB71000-memory.dmp xmrig behavioral2/memory/4248-143-0x00007FF79C0F0000-0x00007FF79C441000-memory.dmp xmrig behavioral2/memory/320-140-0x00007FF7947F0000-0x00007FF794B41000-memory.dmp xmrig behavioral2/memory/5000-139-0x00007FF6D01B0000-0x00007FF6D0501000-memory.dmp xmrig behavioral2/memory/1756-138-0x00007FF6C07D0000-0x00007FF6C0B21000-memory.dmp xmrig behavioral2/memory/1920-137-0x00007FF635120000-0x00007FF635471000-memory.dmp xmrig behavioral2/memory/2928-153-0x00007FF7C8C30000-0x00007FF7C8F81000-memory.dmp xmrig behavioral2/memory/3164-212-0x00007FF635490000-0x00007FF6357E1000-memory.dmp xmrig behavioral2/memory/3136-214-0x00007FF7DDDE0000-0x00007FF7DE131000-memory.dmp xmrig behavioral2/memory/1576-216-0x00007FF6DA680000-0x00007FF6DA9D1000-memory.dmp xmrig behavioral2/memory/3572-218-0x00007FF7F9110000-0x00007FF7F9461000-memory.dmp xmrig behavioral2/memory/4836-220-0x00007FF676020000-0x00007FF676371000-memory.dmp xmrig behavioral2/memory/1920-222-0x00007FF635120000-0x00007FF635471000-memory.dmp xmrig behavioral2/memory/784-224-0x00007FF739640000-0x00007FF739991000-memory.dmp xmrig behavioral2/memory/5000-226-0x00007FF6D01B0000-0x00007FF6D0501000-memory.dmp xmrig behavioral2/memory/1756-229-0x00007FF6C07D0000-0x00007FF6C0B21000-memory.dmp xmrig behavioral2/memory/320-230-0x00007FF7947F0000-0x00007FF794B41000-memory.dmp xmrig behavioral2/memory/4248-242-0x00007FF79C0F0000-0x00007FF79C441000-memory.dmp xmrig behavioral2/memory/3668-240-0x00007FF622CE0000-0x00007FF623031000-memory.dmp xmrig behavioral2/memory/2604-245-0x00007FF6B73E0000-0x00007FF6B7731000-memory.dmp xmrig behavioral2/memory/1640-246-0x00007FF709EB0000-0x00007FF70A201000-memory.dmp xmrig behavioral2/memory/4416-253-0x00007FF720F20000-0x00007FF721271000-memory.dmp xmrig behavioral2/memory/4568-256-0x00007FF76E400000-0x00007FF76E751000-memory.dmp xmrig behavioral2/memory/972-255-0x00007FF6A28A0000-0x00007FF6A2BF1000-memory.dmp xmrig behavioral2/memory/4308-258-0x00007FF7E5900000-0x00007FF7E5C51000-memory.dmp xmrig behavioral2/memory/1968-251-0x00007FF74AB90000-0x00007FF74AEE1000-memory.dmp xmrig behavioral2/memory/748-249-0x00007FF60B8B0000-0x00007FF60BC01000-memory.dmp xmrig behavioral2/memory/4840-261-0x00007FF67A820000-0x00007FF67AB71000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 3164 eECznib.exe 3136 ZAIoCRg.exe 1576 VYBKMXL.exe 3572 asuTaEh.exe 4836 lCclBPw.exe 1920 sytbAVv.exe 1756 qLUFnkH.exe 5000 FZrNVcN.exe 784 yAyHVAe.exe 3668 SJxCBer.exe 320 dGmnyXj.exe 4248 EcylwdG.exe 1640 fJHSwQV.exe 2604 kPkDDjO.exe 4840 biKLNdN.exe 1968 zXIybeo.exe 748 PfTEDAm.exe 4568 EARfQxs.exe 972 GAesjFK.exe 4416 UOhASuO.exe 4308 HDYqrnb.exe -
resource yara_rule behavioral2/memory/2928-0-0x00007FF7C8C30000-0x00007FF7C8F81000-memory.dmp upx behavioral2/files/0x0009000000023444-4.dat upx behavioral2/files/0x0007000000023449-9.dat upx behavioral2/memory/3136-12-0x00007FF7DDDE0000-0x00007FF7DE131000-memory.dmp upx behavioral2/memory/1576-18-0x00007FF6DA680000-0x00007FF6DA9D1000-memory.dmp upx behavioral2/files/0x000700000002344b-27.dat upx behavioral2/files/0x000700000002344c-32.dat upx behavioral2/files/0x000700000002344d-46.dat upx behavioral2/files/0x000700000002344e-51.dat upx behavioral2/memory/784-63-0x00007FF739640000-0x00007FF739991000-memory.dmp upx behavioral2/files/0x0007000000023453-76.dat upx behavioral2/files/0x0007000000023456-97.dat upx behavioral2/memory/4840-98-0x00007FF67A820000-0x00007FF67AB71000-memory.dmp upx behavioral2/files/0x000700000002345a-108.dat upx behavioral2/memory/748-117-0x00007FF60B8B0000-0x00007FF60BC01000-memory.dmp upx behavioral2/memory/3136-125-0x00007FF7DDDE0000-0x00007FF7DE131000-memory.dmp upx behavioral2/files/0x0007000000023458-127.dat upx behavioral2/memory/4308-126-0x00007FF7E5900000-0x00007FF7E5C51000-memory.dmp upx behavioral2/memory/972-124-0x00007FF6A28A0000-0x00007FF6A2BF1000-memory.dmp upx behavioral2/memory/4416-123-0x00007FF720F20000-0x00007FF721271000-memory.dmp upx behavioral2/files/0x0007000000023459-119.dat upx behavioral2/memory/4568-118-0x00007FF76E400000-0x00007FF76E751000-memory.dmp upx behavioral2/files/0x0007000000023457-115.dat upx behavioral2/files/0x0007000000023454-111.dat upx behavioral2/memory/2604-109-0x00007FF6B73E0000-0x00007FF6B7731000-memory.dmp upx behavioral2/files/0x0007000000023455-106.dat upx behavioral2/files/0x0008000000023445-104.dat upx behavioral2/memory/1968-101-0x00007FF74AB90000-0x00007FF74AEE1000-memory.dmp upx behavioral2/memory/1640-91-0x00007FF709EB0000-0x00007FF70A201000-memory.dmp upx behavioral2/memory/2928-82-0x00007FF7C8C30000-0x00007FF7C8F81000-memory.dmp upx behavioral2/files/0x0007000000023452-72.dat upx behavioral2/files/0x000700000002344f-70.dat upx behavioral2/files/0x0007000000023451-69.dat upx behavioral2/memory/3668-68-0x00007FF622CE0000-0x00007FF623031000-memory.dmp upx behavioral2/memory/4248-67-0x00007FF79C0F0000-0x00007FF79C441000-memory.dmp upx behavioral2/memory/320-64-0x00007FF7947F0000-0x00007FF794B41000-memory.dmp upx behavioral2/memory/5000-57-0x00007FF6D01B0000-0x00007FF6D0501000-memory.dmp upx behavioral2/files/0x0007000000023450-55.dat upx behavioral2/memory/1756-45-0x00007FF6C07D0000-0x00007FF6C0B21000-memory.dmp upx behavioral2/memory/1920-36-0x00007FF635120000-0x00007FF635471000-memory.dmp upx behavioral2/memory/4836-35-0x00007FF676020000-0x00007FF676371000-memory.dmp upx behavioral2/files/0x000700000002344a-25.dat upx behavioral2/memory/3572-24-0x00007FF7F9110000-0x00007FF7F9461000-memory.dmp upx behavioral2/files/0x0007000000023448-15.dat upx behavioral2/memory/3164-10-0x00007FF635490000-0x00007FF6357E1000-memory.dmp upx behavioral2/memory/1576-134-0x00007FF6DA680000-0x00007FF6DA9D1000-memory.dmp upx behavioral2/memory/2928-130-0x00007FF7C8C30000-0x00007FF7C8F81000-memory.dmp upx behavioral2/memory/4836-136-0x00007FF676020000-0x00007FF676371000-memory.dmp upx behavioral2/memory/3572-135-0x00007FF7F9110000-0x00007FF7F9461000-memory.dmp upx behavioral2/memory/3668-142-0x00007FF622CE0000-0x00007FF623031000-memory.dmp upx behavioral2/memory/1968-145-0x00007FF74AB90000-0x00007FF74AEE1000-memory.dmp upx behavioral2/memory/4416-152-0x00007FF720F20000-0x00007FF721271000-memory.dmp upx behavioral2/memory/4308-150-0x00007FF7E5900000-0x00007FF7E5C51000-memory.dmp upx behavioral2/memory/748-148-0x00007FF60B8B0000-0x00007FF60BC01000-memory.dmp upx behavioral2/memory/4840-147-0x00007FF67A820000-0x00007FF67AB71000-memory.dmp upx behavioral2/memory/4248-143-0x00007FF79C0F0000-0x00007FF79C441000-memory.dmp upx behavioral2/memory/320-140-0x00007FF7947F0000-0x00007FF794B41000-memory.dmp upx behavioral2/memory/5000-139-0x00007FF6D01B0000-0x00007FF6D0501000-memory.dmp upx behavioral2/memory/1756-138-0x00007FF6C07D0000-0x00007FF6C0B21000-memory.dmp upx behavioral2/memory/1920-137-0x00007FF635120000-0x00007FF635471000-memory.dmp upx behavioral2/memory/2928-153-0x00007FF7C8C30000-0x00007FF7C8F81000-memory.dmp upx behavioral2/memory/3164-212-0x00007FF635490000-0x00007FF6357E1000-memory.dmp upx behavioral2/memory/3136-214-0x00007FF7DDDE0000-0x00007FF7DE131000-memory.dmp upx behavioral2/memory/1576-216-0x00007FF6DA680000-0x00007FF6DA9D1000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\VYBKMXL.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\zXIybeo.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\UOhASuO.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\lCclBPw.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\sytbAVv.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\FZrNVcN.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\SJxCBer.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\kPkDDjO.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\asuTaEh.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\qLUFnkH.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\dGmnyXj.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\EcylwdG.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\fJHSwQV.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\EARfQxs.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\eECznib.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\ZAIoCRg.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\yAyHVAe.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\biKLNdN.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\PfTEDAm.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\HDYqrnb.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe File created C:\Windows\System\GAesjFK.exe 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe Token: SeLockMemoryPrivilege 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3164 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 83 PID 2928 wrote to memory of 3164 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 83 PID 2928 wrote to memory of 3136 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 84 PID 2928 wrote to memory of 3136 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 84 PID 2928 wrote to memory of 1576 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 85 PID 2928 wrote to memory of 1576 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 85 PID 2928 wrote to memory of 3572 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 86 PID 2928 wrote to memory of 3572 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 86 PID 2928 wrote to memory of 4836 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 87 PID 2928 wrote to memory of 4836 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 87 PID 2928 wrote to memory of 1920 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 88 PID 2928 wrote to memory of 1920 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 88 PID 2928 wrote to memory of 1756 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 89 PID 2928 wrote to memory of 1756 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 89 PID 2928 wrote to memory of 5000 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 90 PID 2928 wrote to memory of 5000 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 90 PID 2928 wrote to memory of 320 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 91 PID 2928 wrote to memory of 320 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 91 PID 2928 wrote to memory of 784 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 92 PID 2928 wrote to memory of 784 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 92 PID 2928 wrote to memory of 3668 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 93 PID 2928 wrote to memory of 3668 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 93 PID 2928 wrote to memory of 4248 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 94 PID 2928 wrote to memory of 4248 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 94 PID 2928 wrote to memory of 1640 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 95 PID 2928 wrote to memory of 1640 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 95 PID 2928 wrote to memory of 1968 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 96 PID 2928 wrote to memory of 1968 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 96 PID 2928 wrote to memory of 2604 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 97 PID 2928 wrote to memory of 2604 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 97 PID 2928 wrote to memory of 4840 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 98 PID 2928 wrote to memory of 4840 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 98 PID 2928 wrote to memory of 748 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 99 PID 2928 wrote to memory of 748 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 99 PID 2928 wrote to memory of 4568 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 100 PID 2928 wrote to memory of 4568 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 100 PID 2928 wrote to memory of 4308 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 101 PID 2928 wrote to memory of 4308 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 101 PID 2928 wrote to memory of 972 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 102 PID 2928 wrote to memory of 972 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 102 PID 2928 wrote to memory of 4416 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 103 PID 2928 wrote to memory of 4416 2928 72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe"C:\Users\Admin\AppData\Local\Temp\72c2be6853662c4fc290f05d426afcb73690854e56e1808660101834dc03d25aN.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\System\eECznib.exeC:\Windows\System\eECznib.exe2⤵
- Executes dropped EXE
PID:3164
-
-
C:\Windows\System\ZAIoCRg.exeC:\Windows\System\ZAIoCRg.exe2⤵
- Executes dropped EXE
PID:3136
-
-
C:\Windows\System\VYBKMXL.exeC:\Windows\System\VYBKMXL.exe2⤵
- Executes dropped EXE
PID:1576
-
-
C:\Windows\System\asuTaEh.exeC:\Windows\System\asuTaEh.exe2⤵
- Executes dropped EXE
PID:3572
-
-
C:\Windows\System\lCclBPw.exeC:\Windows\System\lCclBPw.exe2⤵
- Executes dropped EXE
PID:4836
-
-
C:\Windows\System\sytbAVv.exeC:\Windows\System\sytbAVv.exe2⤵
- Executes dropped EXE
PID:1920
-
-
C:\Windows\System\qLUFnkH.exeC:\Windows\System\qLUFnkH.exe2⤵
- Executes dropped EXE
PID:1756
-
-
C:\Windows\System\FZrNVcN.exeC:\Windows\System\FZrNVcN.exe2⤵
- Executes dropped EXE
PID:5000
-
-
C:\Windows\System\dGmnyXj.exeC:\Windows\System\dGmnyXj.exe2⤵
- Executes dropped EXE
PID:320
-
-
C:\Windows\System\yAyHVAe.exeC:\Windows\System\yAyHVAe.exe2⤵
- Executes dropped EXE
PID:784
-
-
C:\Windows\System\SJxCBer.exeC:\Windows\System\SJxCBer.exe2⤵
- Executes dropped EXE
PID:3668
-
-
C:\Windows\System\EcylwdG.exeC:\Windows\System\EcylwdG.exe2⤵
- Executes dropped EXE
PID:4248
-
-
C:\Windows\System\fJHSwQV.exeC:\Windows\System\fJHSwQV.exe2⤵
- Executes dropped EXE
PID:1640
-
-
C:\Windows\System\zXIybeo.exeC:\Windows\System\zXIybeo.exe2⤵
- Executes dropped EXE
PID:1968
-
-
C:\Windows\System\kPkDDjO.exeC:\Windows\System\kPkDDjO.exe2⤵
- Executes dropped EXE
PID:2604
-
-
C:\Windows\System\biKLNdN.exeC:\Windows\System\biKLNdN.exe2⤵
- Executes dropped EXE
PID:4840
-
-
C:\Windows\System\PfTEDAm.exeC:\Windows\System\PfTEDAm.exe2⤵
- Executes dropped EXE
PID:748
-
-
C:\Windows\System\EARfQxs.exeC:\Windows\System\EARfQxs.exe2⤵
- Executes dropped EXE
PID:4568
-
-
C:\Windows\System\HDYqrnb.exeC:\Windows\System\HDYqrnb.exe2⤵
- Executes dropped EXE
PID:4308
-
-
C:\Windows\System\GAesjFK.exeC:\Windows\System\GAesjFK.exe2⤵
- Executes dropped EXE
PID:972
-
-
C:\Windows\System\UOhASuO.exeC:\Windows\System\UOhASuO.exe2⤵
- Executes dropped EXE
PID:4416
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5a55abc8d76b7879ee125d3226cc70397
SHA1788b034655853a78c613f82185a67cd51af3ea77
SHA2563d999cd190f3c12f0da339dddcedd903d0f130e672fad3dc8ac206614fe000ac
SHA51274ad5ab6feda90c01a7fd40c17af8c0dc3850940e1362d43d8c547371db0285d42f9a81f1d26ec74740c6e81fe4d373651cd2e47c1b0b169871d39fec9ad4985
-
Filesize
5.2MB
MD5b2e0f4497edad98f37321da47716f8c1
SHA1297c165c7c1f583e5723cc07b8d1b57101ee0a3c
SHA25602ed7c25c484178415123fc9e2bc2ab4741e2700282a69d5f8a051f87fafff60
SHA512318c85caceba2f2c79aeb1622bf416d71ca7842ff22e376a799ee28242d03f86247d246f916210ce001f3b17577733208a1ed146d1b1d73d1f7d118c7492b20a
-
Filesize
5.2MB
MD5bcfbdfc02f9185b092e5f370b1b3f499
SHA1c6013426eb11408ecacfb57041cbc263efb6538f
SHA25608988e79c7599e5e45f11993b5143024d80ffd99e4da89ad7f7744e76d4513a8
SHA512edcd0f12834b898b38ebbc661ce72bdf39d22ac6968d8239b3eb3faf4b80a68a2114d7e44fa648a2035fcf058c3b89f78f941803d241940d64b934ec641ae288
-
Filesize
5.2MB
MD5d1f93fcdacf26f82c9002302b239b306
SHA13ec47f14f6e622c97c7820668d7eaeb46feedda3
SHA2564289db5986670c268bc571a16cded51b9e05dffe75be78acc97f494d4d069565
SHA51291d2cc14a3086d90b6027477c9877b9085f9aa7ae0b87c1ac1c2c82cd75f06d6c2a4ab626630c39ae37457c444ca1653e5e7bf260dfa2610032df64d06e0732f
-
Filesize
5.2MB
MD5a5bf864afa9bba2c5a25a85a651ce8b0
SHA14bee545230d989f59ced6a8cd4b351ce2e04d3b0
SHA256bff1efc56d0630c8dc9ea9075a74f9e69976518aeaa43aa3752b48eea1962639
SHA512e76046939dc0847f45b25686961ce8dd5b4d321a725c95f90cce8233d2757576eb584af665e634125110029ad1b433a24a40e866cada734b5b16b0dc60f1dff8
-
Filesize
5.2MB
MD57487847498f6a36b6995c65cf06b4c8b
SHA179dcda975ee1f1d0f019afeb243a534301f8bef1
SHA2560877b058a7580591a5e57c9bc4815602ea4fdfa6c0446184e7ed29fee5b4dace
SHA5125e008c74a38bc78ce62f57fdc44a43a7dc9605a36d41f79175862fcb968cdac5080e69a5d2decbc56be8c0e1d3e0b5e177a943d78edc7ec96ec4e6e13db4df7c
-
Filesize
5.2MB
MD597f9356771d28d5cfbbd66bcdc7bde24
SHA1acbc909c01702cb5568b2f1551560198eb583699
SHA2568c1f0beadaaabcb59ec112a7cc7f10f00d63992c882cba0dc3e9d7f7e04e416a
SHA51288b1b22932cd7452a9749a9fe458547837fa80ad3764e889b1a38cb86a1cf3336ad9dd4e2adab27d143813c6106cc6f92f03b28087d3b89bf450a5a7cada71ea
-
Filesize
5.2MB
MD59dc4136a4393808f231fdf68b4f72c82
SHA16bcea91c27a056f37d7d54492eff2228cf712f42
SHA2567ab1de3f801bb7f385bf90d5bff990b75426537e347b6836a1b68f26e4f9af1a
SHA512a528464f3145de14a4757ece99acc50d8a9c8215d34953eec3c0daa135108342f83f704ab4801ad7ee40e99ae1b9a14c7f85ea59543473d1715f4240d6aeb302
-
Filesize
5.2MB
MD558cecf2b020ea39bcc99ac43f404e28a
SHA18af362ad900a711ad19e6d15442cc7a9ce20aba4
SHA256035220378666997a1c914b689a78edd40cb6150e0e91380f767dab43646006ad
SHA5121a39a9557db504c877ba3d30a36bdeddb77befc1d934973338f0a27588dcaf768fef4b5e46c31f2324a0aa93e7c66be408c3feac3bafc08bceaa198ff5a9ff6b
-
Filesize
5.2MB
MD53f381e33288c545d2767f801ced718a0
SHA191c5e271651fd7ddad64561fbec4caf4ddeb1d2f
SHA25652b75feed4d06528e39789f191435bf5c2a6ec3f7b2594b4ee5a08746178d2dc
SHA512b2ca00120a070d5057c5f7aa4a0930bee8375242fcc0cab4cdeef61b67b29d043070535da28ab36adb26d4e811e7bf4521694e5f1818e2580e011de382792478
-
Filesize
5.2MB
MD5bef1ec350306f203af9e6a02273e88d2
SHA1ec0beb244d7c341bfa4eb382574c99d4875755ca
SHA2560a52a922c93e474cee2d464b803f2384b589d296613649301e0dd6a5c6b395d5
SHA5120d1d1b9e548cbf468eb459afe4a0a6a71d355091f04e09af6ee993a385903760164653ba492c7343b2a3664fa303072c6ede3cd808ca94ec40e3f6d6a92af5b6
-
Filesize
5.2MB
MD5482d6a2ea6385c2535e56ac60a685920
SHA177361553716cd6c59ccf8d4ce55b064f32b1e7ab
SHA2563a5530a7618f314c463d9c308555db632577d936b9e82b30f4ef42f45e662e62
SHA512da2d6c9f728e9013df971bcdb3e592d5582985002c91f49ef36528174894b29d8169be93e93d2dc3ffd2f02952d1f12a17b6d976817dd161126bc20c4a187105
-
Filesize
5.2MB
MD58c59afae8e91930a7dad6890c809a2c1
SHA16d07589a2bcdb4b79147da296919413a010fa544
SHA256c7ecd14e7d7d82f6653313e84914f54c66cb31fa166caa0061dc3133a033dd39
SHA5122ca2797f58824df5479e441d8e9392e114a6d30ac0c1489db4972ed8af95bd64a40f08ea912bbc995c636462acd4328af5dae0244ca5d5d5b09bc9230504696b
-
Filesize
5.2MB
MD5da93c23af00e9bf0cd5d2ead46f61cb1
SHA17ea685b6ea197c83962430ab30e49517b8601bf3
SHA256ea52d422c5846b4d7b89addc29964e7979a7e98cdc9612f417d5d1e9caa02821
SHA5127bde66a12de7f5582ef1670dbbafe30e43df31063709b537ec287c3dfe8bca300260afda5e5817470c787752b216acca88ac544ddf4b408146c66e5393955afe
-
Filesize
5.2MB
MD5e6afc8960097fd1936f45a751947d197
SHA16121f58c54a18864b68f891915a0a07ad2ac175c
SHA2564a1bf1af63ff811dea427188a4f01afa10468f5d7fd1bafaf7208684affa4d81
SHA51248478c45e554f085ca555598b3c171f1bc8f117bbf5dbc025d2e818c9fe5b349740b20d40afe4db285b5b813163229d9144745d13760bb4d2f8b1639df613bb3
-
Filesize
5.2MB
MD56d3a04a990f7952a3e37a5e5e1e73fbd
SHA1c1c708012e07c8cba091302fb864967631c6a89a
SHA256635ff47e2961ffc0f3846ae1eecf883aa0184cbcaeac47d759f6388bbf2e48e0
SHA5129b1feda2b4217dc273b8417b80977a7e4b6e0f51b5f4311e94a5bafbcde1b23efd1d6cb52690ac017eda819c1665169aac0cb5cf169b7106470c190bb3d4a471
-
Filesize
5.2MB
MD57ab4f2cef1adffc6fd2149e68bc8fd26
SHA165c173eb6d97e3991c7146dc0ea721086c19324f
SHA256f31041fc433e5d33adc84b5d5fe038064ab64fee351f7e5bc73c03daa85dbeb6
SHA512755f00761114bc2ed874d95f7a9c48fc8ccfacc27a8af9d9932086063b981da4f83b33dff0bde8d8fe9d9efad319441fde4ff17629bda3731e05bf99b5d01f2c
-
Filesize
5.2MB
MD54d2c0a0bf924cc1df1c981a463c9818d
SHA1dd0066cb5575db9cc90af2b85b60490b08697217
SHA256508ff6c4a772454dcd39cf1f3ab43ad67e3e710175210fbd22c42f17c4d576c2
SHA5129bce7090c345cb55c5e2acf5118e7fba7ad4b4e3d1fb43e6dd5c5fd162ef6776b6bf13541cac609918cf7e506f3ef5a24f022c97a7cdd3ac8f24baac2d2d4655
-
Filesize
5.2MB
MD5079a42b1c5cdf00151a7d30dbb48e0e3
SHA1793f08697ad24bea4ff4548cab4d3e4e6414eeb0
SHA2560335fdef787e1110ee790e10a9d4377c293c2a94d32e08d1b81dad0c0d26f346
SHA51207cd5d0fc933f354b04bf01068f582a2b10c719ac92ccf60b582fab7e4fdd05ccb5632438636458e2b8b200dadf3a27877b8f4b9f0121c27e8591afc95ac6895
-
Filesize
5.2MB
MD5523e7ada30e28eb5bf92e937ef38e2a1
SHA18a21235de16b2782074cd433d11e81eebd971a53
SHA2564163cf019db222cbf2e03939370b5a562f8d5e400a1449a3dbf7288a93e5b4ff
SHA5125eb314bb894bd9774f564e4d1a3ecd5dd858174c20d0340592c12d4b81890931ff768693f2eaac66fdec21e808d37eb30aa2f6b5a7ca5a80194081a0f17452df
-
Filesize
5.2MB
MD562efb8a37880d3531f77d286c4697175
SHA1615e0aafbd4ad13faa1c1a37ee7bd66da2974b38
SHA25623360e8c67d9dc53c3929e06b6ee5b0549c0e084fbc4753b11d30e7a57796958
SHA512da6c2ec29afd0201f735f9f1a9017673ec4d9f11bebd3dbbd1e601c59f5d3f9149e5b311009aecf470d805b0cacfb4bd41d2cdd7f7f353d2cda44b0d629ff655