Analysis
-
max time kernel
148s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe
Resource
win10v2004-20241007-en
General
-
Target
acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe
-
Size
178KB
-
MD5
a1d75653e4bd80d6a9eeee186e1b1ab8
-
SHA1
94beecf7b9225c253f8358468e846f3bfc363eb1
-
SHA256
acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0
-
SHA512
834fe98451a44103c65dceae07d7221a27108e325225a37e9d9e47a484098c79b4a488e0513ab37b23250df673ea598fcc49a88fd34b4ad2e7499d1d6152351d
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPwz:I7VzxYnWI6agAalr4UrPp8WStPQu28Y
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4120 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe -
Executes dropped EXE 1 IoCs
pid Process 4032 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 20 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1692 ping.exe 4748 ping.exe 4492 ping.exe 5008 ping.exe 2764 ping.exe 388 ping.exe 2736 ping.exe 4884 ping.exe 1684 ping.exe 1496 ping.exe 1148 ping.exe 5112 ping.exe 4128 ping.exe 4508 ping.exe 5068 ping.exe 3176 ping.exe 312 ping.exe 3452 ping.exe 3684 ping.exe 2444 ping.exe -
Runs ping.exe 1 TTPs 20 IoCs
pid Process 2764 ping.exe 4748 ping.exe 312 ping.exe 1496 ping.exe 5008 ping.exe 2444 ping.exe 4128 ping.exe 4884 ping.exe 3176 ping.exe 1148 ping.exe 388 ping.exe 2736 ping.exe 5068 ping.exe 5112 ping.exe 1692 ping.exe 1684 ping.exe 3452 ping.exe 3684 ping.exe 4492 ping.exe 4508 ping.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 5068 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 84 PID 1376 wrote to memory of 5068 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 84 PID 1376 wrote to memory of 5068 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 84 PID 1376 wrote to memory of 4884 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 87 PID 1376 wrote to memory of 4884 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 87 PID 1376 wrote to memory of 4884 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 87 PID 1376 wrote to memory of 4748 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 90 PID 1376 wrote to memory of 4748 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 90 PID 1376 wrote to memory of 4748 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 90 PID 1376 wrote to memory of 3176 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 93 PID 1376 wrote to memory of 3176 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 93 PID 1376 wrote to memory of 3176 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 93 PID 1376 wrote to memory of 312 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 96 PID 1376 wrote to memory of 312 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 96 PID 1376 wrote to memory of 312 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 96 PID 1376 wrote to memory of 1684 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 99 PID 1376 wrote to memory of 1684 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 99 PID 1376 wrote to memory of 1684 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 99 PID 1376 wrote to memory of 1496 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 102 PID 1376 wrote to memory of 1496 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 102 PID 1376 wrote to memory of 1496 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 102 PID 1376 wrote to memory of 3452 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 105 PID 1376 wrote to memory of 3452 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 105 PID 1376 wrote to memory of 3452 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 105 PID 1376 wrote to memory of 3684 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 108 PID 1376 wrote to memory of 3684 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 108 PID 1376 wrote to memory of 3684 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 108 PID 1376 wrote to memory of 4492 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 111 PID 1376 wrote to memory of 4492 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 111 PID 1376 wrote to memory of 4492 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 111 PID 1376 wrote to memory of 4120 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 117 PID 1376 wrote to memory of 4120 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 117 PID 1376 wrote to memory of 4120 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 117 PID 1376 wrote to memory of 2328 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 119 PID 1376 wrote to memory of 2328 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 119 PID 1376 wrote to memory of 2328 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 119 PID 1376 wrote to memory of 1148 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 120 PID 1376 wrote to memory of 1148 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 120 PID 1376 wrote to memory of 1148 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 120 PID 1376 wrote to memory of 5008 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 124 PID 1376 wrote to memory of 5008 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 124 PID 1376 wrote to memory of 5008 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 124 PID 1376 wrote to memory of 388 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 127 PID 1376 wrote to memory of 388 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 127 PID 1376 wrote to memory of 388 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 127 PID 1376 wrote to memory of 5112 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 131 PID 1376 wrote to memory of 5112 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 131 PID 1376 wrote to memory of 5112 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 131 PID 1376 wrote to memory of 2444 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 133 PID 1376 wrote to memory of 2444 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 133 PID 1376 wrote to memory of 2444 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 133 PID 1376 wrote to memory of 2736 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 136 PID 1376 wrote to memory of 2736 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 136 PID 1376 wrote to memory of 2736 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 136 PID 1376 wrote to memory of 4128 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 139 PID 1376 wrote to memory of 4128 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 139 PID 1376 wrote to memory of 4128 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 139 PID 1376 wrote to memory of 4508 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 142 PID 1376 wrote to memory of 4508 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 142 PID 1376 wrote to memory of 4508 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 142 PID 1376 wrote to memory of 2764 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 145 PID 1376 wrote to memory of 2764 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 145 PID 1376 wrote to memory of 2764 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 145 PID 1376 wrote to memory of 1692 1376 acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe 148 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4120 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe"C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5068
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4884
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4748
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3176
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:312
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1684
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1496
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3452
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3684
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4492
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe2⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4120
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1148
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5008
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:388
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5112
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2444
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2736
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4128
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4508
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2764
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe"C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe"2⤵
- Executes dropped EXE
PID:4032
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3240
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1888
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3824
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4796
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4192
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:532
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3204
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4940
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4276
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5ffeca330f7a390c9b1a6661a36d671bb
SHA1dd7a3a4970a78e6db413a40f2bd425506f912412
SHA256ee0f8742b52cdff150c31ffc6ffa4012bcf0e13f012f4338a5f3a5087133a242
SHA512e77f45799435050f56df19cf9da59b841434c04566188c9eea76b3029c7887af26ca4951304b9ba4128d61c76376db04ec516cb63b90c175be19dbbe462ac1a7
-
C:\Users\Admin\AppData\Local\Temp\acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0.exe
Filesize178KB
MD5a1d75653e4bd80d6a9eeee186e1b1ab8
SHA194beecf7b9225c253f8358468e846f3bfc363eb1
SHA256acdd91b9109d9941966054c920abed4607eb57d13b0bed263739a09725f384d0
SHA512834fe98451a44103c65dceae07d7221a27108e325225a37e9d9e47a484098c79b4a488e0513ab37b23250df673ea598fcc49a88fd34b4ad2e7499d1d6152351d