Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe
Resource
win10v2004-20241007-en
General
-
Target
acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe
-
Size
178KB
-
MD5
a1d75653e4bd80d6a9eeee186e1b1ab8
-
SHA1
94beecf7b9225c253f8358468e846f3bfc363eb1
-
SHA256
acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0
-
SHA512
834fe98451a44103c65dceae07d7221a27108e325225a37e9d9e47a484098c79b4a488e0513ab37b23250df673ea598fcc49a88fd34b4ad2e7499d1d6152351d
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPwz:I7VzxYnWI6agAalr4UrPp8WStPQu28Y
Malware Config
Extracted
netwire
wallou.publicvm.com:3365
mediafire.duckdns.org:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
DLL2
-
keylogger_dir
%AppData%\System\
-
lock_executable
true
-
mutex
KgpcGWmM
-
offline_keylogger
true
-
password
Reborn
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1648-17-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1648-15-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1648-12-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1504 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 1648 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe -
Loads dropped DLL 1 IoCs
pid Process 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2924 set thread context of 1648 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 75 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 20 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2904 ping.exe 2544 ping.exe 448 ping.exe 2200 ping.exe 2068 ping.exe 1208 ping.exe 568 ping.exe 2468 ping.exe 2704 ping.exe 1608 ping.exe 2748 ping.exe 2864 ping.exe 1712 ping.exe 1940 ping.exe 1704 ping.exe 2888 ping.exe 2828 ping.exe 2616 ping.exe 2556 ping.exe 2804 ping.exe -
Runs ping.exe 1 TTPs 20 IoCs
pid Process 1208 ping.exe 2748 ping.exe 2616 ping.exe 2904 ping.exe 2556 ping.exe 2544 ping.exe 1712 ping.exe 2468 ping.exe 2704 ping.exe 1704 ping.exe 2068 ping.exe 2888 ping.exe 448 ping.exe 1608 ping.exe 2828 ping.exe 2864 ping.exe 2200 ping.exe 568 ping.exe 1940 ping.exe 2804 ping.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1704 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 30 PID 2924 wrote to memory of 1704 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 30 PID 2924 wrote to memory of 1704 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 30 PID 2924 wrote to memory of 1704 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 30 PID 2924 wrote to memory of 2068 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 32 PID 2924 wrote to memory of 2068 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 32 PID 2924 wrote to memory of 2068 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 32 PID 2924 wrote to memory of 2068 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 32 PID 2924 wrote to memory of 2888 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 35 PID 2924 wrote to memory of 2888 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 35 PID 2924 wrote to memory of 2888 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 35 PID 2924 wrote to memory of 2888 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 35 PID 2924 wrote to memory of 2748 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 37 PID 2924 wrote to memory of 2748 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 37 PID 2924 wrote to memory of 2748 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 37 PID 2924 wrote to memory of 2748 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 37 PID 2924 wrote to memory of 2828 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 39 PID 2924 wrote to memory of 2828 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 39 PID 2924 wrote to memory of 2828 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 39 PID 2924 wrote to memory of 2828 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 39 PID 2924 wrote to memory of 2616 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 41 PID 2924 wrote to memory of 2616 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 41 PID 2924 wrote to memory of 2616 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 41 PID 2924 wrote to memory of 2616 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 41 PID 2924 wrote to memory of 2904 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 43 PID 2924 wrote to memory of 2904 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 43 PID 2924 wrote to memory of 2904 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 43 PID 2924 wrote to memory of 2904 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 43 PID 2924 wrote to memory of 2864 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 45 PID 2924 wrote to memory of 2864 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 45 PID 2924 wrote to memory of 2864 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 45 PID 2924 wrote to memory of 2864 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 45 PID 2924 wrote to memory of 2556 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 47 PID 2924 wrote to memory of 2556 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 47 PID 2924 wrote to memory of 2556 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 47 PID 2924 wrote to memory of 2556 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 47 PID 2924 wrote to memory of 2544 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 49 PID 2924 wrote to memory of 2544 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 49 PID 2924 wrote to memory of 2544 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 49 PID 2924 wrote to memory of 2544 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 49 PID 2924 wrote to memory of 1504 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 51 PID 2924 wrote to memory of 1504 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 51 PID 2924 wrote to memory of 1504 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 51 PID 2924 wrote to memory of 1504 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 51 PID 2924 wrote to memory of 108 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 53 PID 2924 wrote to memory of 108 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 53 PID 2924 wrote to memory of 108 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 53 PID 2924 wrote to memory of 108 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 53 PID 2924 wrote to memory of 1712 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 54 PID 2924 wrote to memory of 1712 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 54 PID 2924 wrote to memory of 1712 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 54 PID 2924 wrote to memory of 1712 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 54 PID 2924 wrote to memory of 1208 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 57 PID 2924 wrote to memory of 1208 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 57 PID 2924 wrote to memory of 1208 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 57 PID 2924 wrote to memory of 1208 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 57 PID 2924 wrote to memory of 568 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 59 PID 2924 wrote to memory of 568 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 59 PID 2924 wrote to memory of 568 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 59 PID 2924 wrote to memory of 568 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 59 PID 2924 wrote to memory of 1940 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 61 PID 2924 wrote to memory of 1940 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 61 PID 2924 wrote to memory of 1940 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 61 PID 2924 wrote to memory of 1940 2924 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 61 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1504 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe"C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1704
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2068
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2888
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2748
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2828
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2616
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2904
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2864
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2556
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2544
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe2⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1504
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:108
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1712
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1208
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:568
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1940
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2804
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2468
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2704
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:448
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1608
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe"C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1636
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:236
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1548
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:696
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD51f43d824cf61d92be4266873299ed6fa
SHA12ac5ebb3dcf796eb11bd8a6c76fac69aff0ca1c3
SHA256921b4ad281958ba6c95e11325fff233d3511a473ac6e5d9f6a7b8075ea0ddd06
SHA51237f793c80e29b6bdfd2d4aed037138314fef5a6d261ec4546f7bae9019c80ccfbdf2b6c3be353b212e3c46e422804ef3aec2f406b504e8249f10f4a6e2868b45
-
\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe
Filesize178KB
MD5a1d75653e4bd80d6a9eeee186e1b1ab8
SHA194beecf7b9225c253f8358468e846f3bfc363eb1
SHA256acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0
SHA512834fe98451a44103c65dceae07d7221a27108e325225a37e9d9e47a484098c79b4a488e0513ab37b23250df673ea598fcc49a88fd34b4ad2e7499d1d6152351d