Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 05:28
Behavioral task
behavioral1
Sample
7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe
Resource
win7-20240704-en
General
-
Target
7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe
-
Size
5.2MB
-
MD5
5d6559a463b4c4d14ebf58e014ccd460
-
SHA1
3e338ae47a8872397254b87eb4b20018f511fa58
-
SHA256
7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6
-
SHA512
cb170cd14d613b192aaf102549668d236c18c59835f52dab09e6be07daffa8a0f16de3a885cc6e7ccae5aa7e6e42d58de9667f9c6455701eca55065984ce9068
-
SSDEEP
49152:ROdWCCi7/raA56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6ld:RWWBibj56utgpPFotBER/mQ32lUZ
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x0008000000016d29-14.dat cobalt_reflective_dll behavioral1/files/0x0008000000016d0c-8.dat cobalt_reflective_dll behavioral1/files/0x0007000000012119-6.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d3a-21.dat cobalt_reflective_dll behavioral1/files/0x0008000000016d65-41.dat cobalt_reflective_dll behavioral1/files/0x00060000000175ed-42.dat cobalt_reflective_dll behavioral1/files/0x000a000000016d5e-36.dat cobalt_reflective_dll behavioral1/files/0x0006000000018bc8-123.dat cobalt_reflective_dll behavioral1/files/0x000500000001924a-88.dat cobalt_reflective_dll behavioral1/files/0x00050000000191f1-81.dat cobalt_reflective_dll behavioral1/files/0x000500000001870f-63.dat cobalt_reflective_dll behavioral1/files/0x00050000000186f7-56.dat cobalt_reflective_dll behavioral1/files/0x0006000000018660-114.dat cobalt_reflective_dll behavioral1/files/0x0005000000019259-111.dat cobalt_reflective_dll behavioral1/files/0x0005000000019244-110.dat cobalt_reflective_dll behavioral1/files/0x00050000000191dc-108.dat cobalt_reflective_dll behavioral1/files/0x0005000000018712-106.dat cobalt_reflective_dll behavioral1/files/0x0005000000018701-104.dat cobalt_reflective_dll behavioral1/files/0x0008000000018681-103.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d4a-30.dat cobalt_reflective_dll behavioral1/files/0x0007000000016d42-26.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
XMRig Miner payload 35 IoCs
resource yara_rule behavioral1/memory/2112-75-0x000000013F4A0000-0x000000013F7F1000-memory.dmp xmrig behavioral1/memory/1924-64-0x000000013FEE0000-0x0000000140231000-memory.dmp xmrig behavioral1/memory/2692-59-0x00000000021A0000-0x00000000024F1000-memory.dmp xmrig behavioral1/memory/2384-101-0x000000013F290000-0x000000013F5E1000-memory.dmp xmrig behavioral1/memory/2692-98-0x000000013F830000-0x000000013FB81000-memory.dmp xmrig behavioral1/memory/2900-97-0x000000013FE50000-0x00000001401A1000-memory.dmp xmrig behavioral1/memory/2860-95-0x000000013FE20000-0x0000000140171000-memory.dmp xmrig behavioral1/memory/264-93-0x000000013FAC0000-0x000000013FE11000-memory.dmp xmrig behavioral1/memory/772-79-0x000000013FFA0000-0x00000001402F1000-memory.dmp xmrig behavioral1/memory/2692-129-0x000000013FBA0000-0x000000013FEF1000-memory.dmp xmrig behavioral1/memory/1632-55-0x000000013F9C0000-0x000000013FD11000-memory.dmp xmrig behavioral1/memory/2116-130-0x000000013FE40000-0x0000000140191000-memory.dmp xmrig behavioral1/memory/2692-131-0x000000013FBA0000-0x000000013FEF1000-memory.dmp xmrig behavioral1/memory/2672-151-0x000000013F480000-0x000000013F7D1000-memory.dmp xmrig behavioral1/memory/2616-150-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/2916-149-0x000000013F5D0000-0x000000013F921000-memory.dmp xmrig behavioral1/memory/1728-148-0x000000013F720000-0x000000013FA71000-memory.dmp xmrig behavioral1/memory/2676-147-0x000000013FFC0000-0x0000000140311000-memory.dmp xmrig behavioral1/memory/2612-146-0x000000013F880000-0x000000013FBD1000-memory.dmp xmrig behavioral1/memory/2780-145-0x000000013F470000-0x000000013F7C1000-memory.dmp xmrig behavioral1/memory/1908-144-0x000000013FFA0000-0x00000001402F1000-memory.dmp xmrig behavioral1/memory/3012-143-0x000000013FB50000-0x000000013FEA1000-memory.dmp xmrig behavioral1/memory/2620-142-0x000000013F2C0000-0x000000013F611000-memory.dmp xmrig behavioral1/memory/2736-141-0x000000013F830000-0x000000013FB81000-memory.dmp xmrig behavioral1/memory/2728-165-0x000000013FEA0000-0x00000001401F1000-memory.dmp xmrig behavioral1/memory/2692-153-0x000000013FBA0000-0x000000013FEF1000-memory.dmp xmrig behavioral1/memory/2116-220-0x000000013FE40000-0x0000000140191000-memory.dmp xmrig behavioral1/memory/1632-222-0x000000013F9C0000-0x000000013FD11000-memory.dmp xmrig behavioral1/memory/1924-224-0x000000013FEE0000-0x0000000140231000-memory.dmp xmrig behavioral1/memory/2112-226-0x000000013F4A0000-0x000000013F7F1000-memory.dmp xmrig behavioral1/memory/772-228-0x000000013FFA0000-0x00000001402F1000-memory.dmp xmrig behavioral1/memory/264-230-0x000000013FAC0000-0x000000013FE11000-memory.dmp xmrig behavioral1/memory/2860-232-0x000000013FE20000-0x0000000140171000-memory.dmp xmrig behavioral1/memory/2900-234-0x000000013FE50000-0x00000001401A1000-memory.dmp xmrig behavioral1/memory/2384-244-0x000000013F290000-0x000000013F5E1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2116 QWBCZSb.exe 1632 tMjLPYz.exe 2384 BmCigXO.exe 1924 RmhQMQL.exe 2112 KABMdWd.exe 772 ebnOTLA.exe 264 AERIKcG.exe 2860 WrxzVHr.exe 2900 RpqwAPS.exe 2620 wJfteyB.exe 3012 aWgDuuc.exe 2780 UknEaen.exe 2676 yiIxYuJ.exe 2916 ZhibDEB.exe 2672 zGxKBVr.exe 2736 dhtqKsF.exe 2728 DzzSGCc.exe 1908 rjjMDjf.exe 2612 YxTBpVS.exe 1728 UfIuVZG.exe 2616 bJjapMK.exe -
Loads dropped DLL 21 IoCs
pid Process 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe -
resource yara_rule behavioral1/memory/2692-0-0x000000013FBA0000-0x000000013FEF1000-memory.dmp upx behavioral1/memory/2116-15-0x000000013FE40000-0x0000000140191000-memory.dmp upx behavioral1/files/0x0008000000016d29-14.dat upx behavioral1/files/0x0008000000016d0c-8.dat upx behavioral1/files/0x0007000000012119-6.dat upx behavioral1/files/0x0007000000016d3a-21.dat upx behavioral1/files/0x0008000000016d65-41.dat upx behavioral1/files/0x00060000000175ed-42.dat upx behavioral1/files/0x000a000000016d5e-36.dat upx behavioral1/files/0x0006000000018bc8-123.dat upx behavioral1/files/0x000500000001924a-88.dat upx behavioral1/files/0x00050000000191f1-81.dat upx behavioral1/memory/2112-75-0x000000013F4A0000-0x000000013F7F1000-memory.dmp upx behavioral1/memory/1924-64-0x000000013FEE0000-0x0000000140231000-memory.dmp upx behavioral1/files/0x000500000001870f-63.dat upx behavioral1/files/0x00050000000186f7-56.dat upx behavioral1/files/0x0006000000018660-114.dat upx behavioral1/files/0x0005000000019259-111.dat upx behavioral1/files/0x0005000000019244-110.dat upx behavioral1/files/0x00050000000191dc-108.dat upx behavioral1/files/0x0005000000018712-106.dat upx behavioral1/files/0x0005000000018701-104.dat upx behavioral1/files/0x0008000000018681-103.dat upx behavioral1/memory/2384-101-0x000000013F290000-0x000000013F5E1000-memory.dmp upx behavioral1/memory/2900-97-0x000000013FE50000-0x00000001401A1000-memory.dmp upx behavioral1/memory/2860-95-0x000000013FE20000-0x0000000140171000-memory.dmp upx behavioral1/memory/264-93-0x000000013FAC0000-0x000000013FE11000-memory.dmp upx behavioral1/memory/772-79-0x000000013FFA0000-0x00000001402F1000-memory.dmp upx behavioral1/memory/2692-129-0x000000013FBA0000-0x000000013FEF1000-memory.dmp upx behavioral1/memory/1632-55-0x000000013F9C0000-0x000000013FD11000-memory.dmp upx behavioral1/memory/2116-130-0x000000013FE40000-0x0000000140191000-memory.dmp upx behavioral1/files/0x0007000000016d4a-30.dat upx behavioral1/memory/2692-131-0x000000013FBA0000-0x000000013FEF1000-memory.dmp upx behavioral1/files/0x0007000000016d42-26.dat upx behavioral1/memory/2672-151-0x000000013F480000-0x000000013F7D1000-memory.dmp upx behavioral1/memory/2616-150-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/2916-149-0x000000013F5D0000-0x000000013F921000-memory.dmp upx behavioral1/memory/1728-148-0x000000013F720000-0x000000013FA71000-memory.dmp upx behavioral1/memory/2676-147-0x000000013FFC0000-0x0000000140311000-memory.dmp upx behavioral1/memory/2612-146-0x000000013F880000-0x000000013FBD1000-memory.dmp upx behavioral1/memory/2780-145-0x000000013F470000-0x000000013F7C1000-memory.dmp upx behavioral1/memory/1908-144-0x000000013FFA0000-0x00000001402F1000-memory.dmp upx behavioral1/memory/3012-143-0x000000013FB50000-0x000000013FEA1000-memory.dmp upx behavioral1/memory/2620-142-0x000000013F2C0000-0x000000013F611000-memory.dmp upx behavioral1/memory/2736-141-0x000000013F830000-0x000000013FB81000-memory.dmp upx behavioral1/memory/2728-165-0x000000013FEA0000-0x00000001401F1000-memory.dmp upx behavioral1/memory/2692-153-0x000000013FBA0000-0x000000013FEF1000-memory.dmp upx behavioral1/memory/2116-220-0x000000013FE40000-0x0000000140191000-memory.dmp upx behavioral1/memory/1632-222-0x000000013F9C0000-0x000000013FD11000-memory.dmp upx behavioral1/memory/1924-224-0x000000013FEE0000-0x0000000140231000-memory.dmp upx behavioral1/memory/2112-226-0x000000013F4A0000-0x000000013F7F1000-memory.dmp upx behavioral1/memory/772-228-0x000000013FFA0000-0x00000001402F1000-memory.dmp upx behavioral1/memory/264-230-0x000000013FAC0000-0x000000013FE11000-memory.dmp upx behavioral1/memory/2860-232-0x000000013FE20000-0x0000000140171000-memory.dmp upx behavioral1/memory/2900-234-0x000000013FE50000-0x00000001401A1000-memory.dmp upx behavioral1/memory/2384-244-0x000000013F290000-0x000000013F5E1000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\QWBCZSb.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\ebnOTLA.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\UfIuVZG.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\BmCigXO.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\tMjLPYz.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\RmhQMQL.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\DzzSGCc.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\aWgDuuc.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\rjjMDjf.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\YxTBpVS.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\bJjapMK.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\KABMdWd.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\AERIKcG.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\dhtqKsF.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\wJfteyB.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\UknEaen.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\yiIxYuJ.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\ZhibDEB.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\WrxzVHr.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\RpqwAPS.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe File created C:\Windows\System\zGxKBVr.exe 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe Token: SeLockMemoryPrivilege 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2116 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 31 PID 2692 wrote to memory of 2116 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 31 PID 2692 wrote to memory of 2116 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 31 PID 2692 wrote to memory of 2384 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 32 PID 2692 wrote to memory of 2384 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 32 PID 2692 wrote to memory of 2384 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 32 PID 2692 wrote to memory of 1632 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 33 PID 2692 wrote to memory of 1632 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 33 PID 2692 wrote to memory of 1632 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 33 PID 2692 wrote to memory of 1924 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 34 PID 2692 wrote to memory of 1924 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 34 PID 2692 wrote to memory of 1924 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 34 PID 2692 wrote to memory of 2112 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 35 PID 2692 wrote to memory of 2112 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 35 PID 2692 wrote to memory of 2112 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 35 PID 2692 wrote to memory of 772 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 36 PID 2692 wrote to memory of 772 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 36 PID 2692 wrote to memory of 772 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 36 PID 2692 wrote to memory of 264 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 37 PID 2692 wrote to memory of 264 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 37 PID 2692 wrote to memory of 264 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 37 PID 2692 wrote to memory of 2860 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 38 PID 2692 wrote to memory of 2860 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 38 PID 2692 wrote to memory of 2860 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 38 PID 2692 wrote to memory of 2900 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 39 PID 2692 wrote to memory of 2900 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 39 PID 2692 wrote to memory of 2900 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 39 PID 2692 wrote to memory of 2736 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 40 PID 2692 wrote to memory of 2736 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 40 PID 2692 wrote to memory of 2736 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 40 PID 2692 wrote to memory of 2620 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 41 PID 2692 wrote to memory of 2620 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 41 PID 2692 wrote to memory of 2620 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 41 PID 2692 wrote to memory of 2728 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 42 PID 2692 wrote to memory of 2728 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 42 PID 2692 wrote to memory of 2728 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 42 PID 2692 wrote to memory of 3012 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 43 PID 2692 wrote to memory of 3012 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 43 PID 2692 wrote to memory of 3012 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 43 PID 2692 wrote to memory of 1908 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 44 PID 2692 wrote to memory of 1908 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 44 PID 2692 wrote to memory of 1908 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 44 PID 2692 wrote to memory of 2780 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 45 PID 2692 wrote to memory of 2780 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 45 PID 2692 wrote to memory of 2780 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 45 PID 2692 wrote to memory of 2612 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 46 PID 2692 wrote to memory of 2612 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 46 PID 2692 wrote to memory of 2612 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 46 PID 2692 wrote to memory of 2676 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 47 PID 2692 wrote to memory of 2676 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 47 PID 2692 wrote to memory of 2676 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 47 PID 2692 wrote to memory of 1728 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 48 PID 2692 wrote to memory of 1728 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 48 PID 2692 wrote to memory of 1728 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 48 PID 2692 wrote to memory of 2916 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 49 PID 2692 wrote to memory of 2916 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 49 PID 2692 wrote to memory of 2916 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 49 PID 2692 wrote to memory of 2616 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 50 PID 2692 wrote to memory of 2616 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 50 PID 2692 wrote to memory of 2616 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 50 PID 2692 wrote to memory of 2672 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 51 PID 2692 wrote to memory of 2672 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 51 PID 2692 wrote to memory of 2672 2692 7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe"C:\Users\Admin\AppData\Local\Temp\7997ac7aea5be111de7f52d0d81f1dbf7f951a5495310d47e71b0b22006643e6N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System\QWBCZSb.exeC:\Windows\System\QWBCZSb.exe2⤵
- Executes dropped EXE
PID:2116
-
-
C:\Windows\System\BmCigXO.exeC:\Windows\System\BmCigXO.exe2⤵
- Executes dropped EXE
PID:2384
-
-
C:\Windows\System\tMjLPYz.exeC:\Windows\System\tMjLPYz.exe2⤵
- Executes dropped EXE
PID:1632
-
-
C:\Windows\System\RmhQMQL.exeC:\Windows\System\RmhQMQL.exe2⤵
- Executes dropped EXE
PID:1924
-
-
C:\Windows\System\KABMdWd.exeC:\Windows\System\KABMdWd.exe2⤵
- Executes dropped EXE
PID:2112
-
-
C:\Windows\System\ebnOTLA.exeC:\Windows\System\ebnOTLA.exe2⤵
- Executes dropped EXE
PID:772
-
-
C:\Windows\System\AERIKcG.exeC:\Windows\System\AERIKcG.exe2⤵
- Executes dropped EXE
PID:264
-
-
C:\Windows\System\WrxzVHr.exeC:\Windows\System\WrxzVHr.exe2⤵
- Executes dropped EXE
PID:2860
-
-
C:\Windows\System\RpqwAPS.exeC:\Windows\System\RpqwAPS.exe2⤵
- Executes dropped EXE
PID:2900
-
-
C:\Windows\System\dhtqKsF.exeC:\Windows\System\dhtqKsF.exe2⤵
- Executes dropped EXE
PID:2736
-
-
C:\Windows\System\wJfteyB.exeC:\Windows\System\wJfteyB.exe2⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\System\DzzSGCc.exeC:\Windows\System\DzzSGCc.exe2⤵
- Executes dropped EXE
PID:2728
-
-
C:\Windows\System\aWgDuuc.exeC:\Windows\System\aWgDuuc.exe2⤵
- Executes dropped EXE
PID:3012
-
-
C:\Windows\System\rjjMDjf.exeC:\Windows\System\rjjMDjf.exe2⤵
- Executes dropped EXE
PID:1908
-
-
C:\Windows\System\UknEaen.exeC:\Windows\System\UknEaen.exe2⤵
- Executes dropped EXE
PID:2780
-
-
C:\Windows\System\YxTBpVS.exeC:\Windows\System\YxTBpVS.exe2⤵
- Executes dropped EXE
PID:2612
-
-
C:\Windows\System\yiIxYuJ.exeC:\Windows\System\yiIxYuJ.exe2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Windows\System\UfIuVZG.exeC:\Windows\System\UfIuVZG.exe2⤵
- Executes dropped EXE
PID:1728
-
-
C:\Windows\System\ZhibDEB.exeC:\Windows\System\ZhibDEB.exe2⤵
- Executes dropped EXE
PID:2916
-
-
C:\Windows\System\bJjapMK.exeC:\Windows\System\bJjapMK.exe2⤵
- Executes dropped EXE
PID:2616
-
-
C:\Windows\System\zGxKBVr.exeC:\Windows\System\zGxKBVr.exe2⤵
- Executes dropped EXE
PID:2672
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5116c44fdb9bd00bf374bac4834ac207f
SHA16bcd824f9f0086d4db75f2e128a2008d86dd5982
SHA256da48a34a67ff1b08e11348f0ba4fdfda2b3783288484baf6d8ff35eb6cf066e4
SHA51254c647c3724fec5d3cf6b8526ae4bc7b7355fa1d4a660d96fd7c706b9870b1ad064955c7658c3306f83ef87d9d6ef8fad301d8c3cbbb84ea065cb23b2602e15e
-
Filesize
5.2MB
MD564d2a642ccc4e8ba7a4afdfee1740815
SHA1877ea6ed9f1a3e1e939f2d0d306a6659268515e6
SHA2562fb7d23588186314d72e78906401e10a3034d3c65bd22084e9d568a154f5a3f0
SHA512da690348c4f3f72c610b8fcd21f0b0e1dfdf920f9a6702f23455f0904c25ccc1553e1348ba86e5fef76a55d5fa50be97cc1f4dfb7699e0a4cc8a801b262c97d8
-
Filesize
5.2MB
MD59bf992f60497b42b4972251b58322aa9
SHA1ef3c3db0ab19bbb17ac6edb6a9518582fcad300b
SHA256c2250890a7724174c68a2410663b74c31ac2e2fcc7028e993b79424d21d53a5b
SHA5121b997548ab7a631bf97892482ba57b1bfb8d6dbe899246de12752ba907682fb6163d928f6580907408ad29f645ee87c5091ae430accf8ce24e64c3f291f6ce14
-
Filesize
5.2MB
MD52ff55ec393b6d6e10f5a4955d9337793
SHA10537290bf57344166110ea5decd5414193181dcc
SHA25617a1a3c9ffd902c1583139eb003d2ca5a5affc75bcfdfbf14b3b9274020c3c0d
SHA512799a06c756d5955b47b0d541c1102d15b704c4aada8b7f14aa8b3c158314250db8f35f6e5f597787af0bbd1d9c735e421f11f508fac9dbdff88f8281b7155ab4
-
Filesize
5.2MB
MD5abd550f5cb6be5111dfb8c34aa29c53f
SHA1bd23265ba976eb39fe9a94083444af0418d3cb1a
SHA256e49ada307e51b39bc7d5b20fdc16fc66e3061c792a6c59800186bd2163146bad
SHA5129e927ebd963b5af46e78a370bd48f21de1bb4facfc232e1cbfda599d91f7eb884b568ae147ab830b7f016dd57599ad1ba3a5ec44d09863e82bb649b38db51479
-
Filesize
5.2MB
MD5b4f70e9dd263bb0593b160ed037fc313
SHA1c9ba541ab3fa0e3614712f574cf5753d5380b882
SHA25644d42b32ad82baf03c1cff4385618dc6d965ea6e10d7444f6c6f7045dac9c0bd
SHA51209cb6f743984636c65d6570080a5e7f60fbaad617acc2b06ea7424101d8f7d7761063dc2bb7b7819818dfef7700354775a591ebb93945a57d64a9bdfdaaf642e
-
Filesize
5.2MB
MD50c834f70d46db24a2ff8b49a6cc0db1b
SHA16ecc7f3bd070598d7c7bed5d7036c39d8891db27
SHA25636f6d19135ec23d66d7465f1736e4533798a0913b0156bcb4b5588b0be176a5f
SHA512761c58162b189e0734f4ff679e5e970961ebe19fb10782657ebaf2683052597772d37bf1a78e2775774a98db816a08d1d4e5a5a6dc19ed1e2ec0e3545eefa5cb
-
Filesize
5.2MB
MD5af4ad5a4e459fe2262e77d96416928fe
SHA1230593c3a1be487da6fbbdbf8b965370cfdc0d3a
SHA2564d253eef96330e9c1c9a118ecc8d346f66b61aad8780276530cb659f44330bd5
SHA512728c815581d7504228b94aeb72c35a7ca17ac91b08ed4a13a2c8f562a37529ddbd07d8922a7a308881f88cf1ea99bd6d6386cf21afacd68fe565dcf4f6ad3fec
-
Filesize
5.2MB
MD59f6bc2b94da940a277b3a11136d1fc32
SHA11b5f7510c04a66f2b6b37e6e755c76cce006c6c7
SHA25682bab349020ed004613ebd01cf29a07602e6c391143c7f76e5f98b9f5f579599
SHA5125f92be943d2c8c7d95b03f3405ff36a458bb2382896911c62cba5297fdc100850199050fc16458d3dccb81db3cf53765b6e7e4559b9d0a58d5814eb6eeb5f25a
-
Filesize
5.2MB
MD5c6e630dc417a4712cffcec70f7c30e1a
SHA1ee37526a7c2e030c61488983718bd6478a60a6d6
SHA256c7d880da528620e10aad7a953d9895677babe03922682bd0e38ed7350c2e8cdc
SHA5120e8dab366b09e111d9fb882e8783e94d3514fcdc3854b6de50f1329a755f6aed76f32315dabd5d57cbdaff1e70a66576bd534ac0196c54da4a33d79f49c9cbca
-
Filesize
5.2MB
MD54725a42e7256fea1bb9795d2c60bbe68
SHA1ebc2c1c0641c13e13dc0104b58c4cdf1b58e3e81
SHA2560a7fd401525a25855df71078b1bc27212d3562781434ac798c0aaf4996e2a9f3
SHA512c0a1137b6268eb0d654555674c94c8da8ab3619c6d93c85c2b7e76dc20a03bd1f64c07ad8cd59112dc6b7bd593015ad6de30aeb3f6e3276a1a5258be30304180
-
Filesize
5.2MB
MD5701375737fe0b59bb019867cfe2435cb
SHA1e2eff57e3a551398b2e81856b9ba7d817a62a660
SHA256d60a3880ad1480704f0b6f2ba40cb9b4de500bb90d2b25b3f0bcd6b402570ef0
SHA5121bae4a8c6ebbf5ebf2b6672f9130dd04e4a6cc6580f32616c728779f1b21b266cc0808562101d277691f9f4149098afc566559fe8b9208de684f8dfbcdcb1df5
-
Filesize
5.2MB
MD512f9caa702b021b6cfee5be8665614ea
SHA1230b5f6d0bacd96b194120dfd551d9e105cacc87
SHA25609663ab2c5c4fc003bb12b89cfbcd07be99650a35cd037cc89128fc946f06fab
SHA512e2e55d91e68b9d99173034acf48fa0e200a4226b77d6fa36e1e733db8618a6653c1c0d6d2cdcf39918eb3c20f03de4928451b4fab54efa475f771445d1a07d5d
-
Filesize
5.2MB
MD53e85d26f8b52580d090035786a6d5d72
SHA11aecda9bebb9458b39fce91499518733f04441e5
SHA25604830e6c798c7d3c2dec33f5be41f94afbe48018908514b65c348c73367b5591
SHA512025b2e28e3349c62969c3523dd8ee4262b00779b711c64700963f510d87760aa1a00bc7167c870d8ec187f00bd2210027722f7faa46883cb3b7d198a44f9999c
-
Filesize
5.2MB
MD535c2baadc120fbfb210f2769f2171d95
SHA1ecaab2f518425d163ea6c41281652422db399cc3
SHA256d3fcaff21c467a7a0ac13baaf10cb1f14e3531851baceb964a3b58e2846c6dae
SHA512b807b9875d8822ffeb81543e7c0cf08e410aa8c50c032b5a02c71b63caaec877dc1d4e996ed4180db01104da28a268b0194bc2faa2baf5ce31455569a7030bad
-
Filesize
5.2MB
MD575bc11f33ed5f1be3b53f285090d65a8
SHA1e8baf0766fdd49bbab5e573cca768ce3d376b762
SHA256c84da3d93215e7a7ee7ca9f6752e705ee6291d6461d9dfc6a95fc3cf5544c0bf
SHA51297fd9abc16a638cc7a1862d7716d1c4bc44a88a3545370106f674bf3c4303ead1fa08c51bf246c3eba4e441bbadf6dc7ef765c0b4db16680c03defa9ae216783
-
Filesize
5.2MB
MD5d6b750fb3944af592599220d7c805920
SHA1a30035ab572f97f76b065341e1f80024e2f69ada
SHA2561ac0192b008f432f63c4f6fe5c8c266d0aeaca33257ec59066adde39a350af99
SHA512f069abdb891960f89d1990da04d9c99c6ac2afe6e76887a499fa31b551cfd969386041ac633e9bb0067d0bf12ab42a1642062f6b578cf7abd71cb74db6459bb6
-
Filesize
5.2MB
MD5420efa0847454e2445289f82aa43765e
SHA10022c1a24ac27b051c96014b35a1f7565ab44940
SHA256ed4244459b5c3bbc7d272f78466903bdd996b1f414b59e604864becc3be19a70
SHA5123014dfc192f06030b85bd57c7e2046740cd115516f3b57fe1bb56fcbee7a6b90eee0f76f9aab97e6359c9cbce329ad90ea8386b1eb081a19d8bd4fe091c98523
-
Filesize
5.2MB
MD51ccfbc19bf0777302e64bce8419e14e6
SHA18366c863e5c915d9287362d46d69aa3c350d99a5
SHA256d1d1202f09a56567cbe8162c58ac36b181fab075cdbef55fe694bc320f08af72
SHA5128c658f0d3fbffda301872004ca6cd10b4679266db9076a7444857d6ae4b32915b508ea991bf6b537b6949f8c51094810dc820a090d22278e5dad3007d5878ca1
-
Filesize
5.2MB
MD58796b858641c587441a8ae7ee548ff3c
SHA1c75c9cf7a292e84a2149d9951d691ee60dbe9910
SHA2568f5fdb5f4b31ed9f2a0961846fe07962a1d5968b7e9f090fd4797b93549891cc
SHA51263c308d37d9022127847c7d208c9b30479598bc157c4491eb7ff57e9b7ced2f381f03b34d1f4bd72f73164acc7833bc62314cc39b830abd60842657dd46de0b4
-
Filesize
5.2MB
MD522c4c00fc83a5450e797482effd6529c
SHA10203b58b611c2e793ab360711f2a5764405f6843
SHA25657701aa170543941283c8c1db0c81fa7601996a3cceb7cd2566627ead06cec52
SHA5121a4771184a40d12009023afca882afb8f08f3de87c3ec9ddcaf537963ad4de967b873f46c7cb901e875e715865c5ad6bb9ee6d7f4c791de0929b82536e6a1849