Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 19:36
Static task
static1
Behavioral task
behavioral1
Sample
21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe
Resource
win10v2004-20241007-en
General
-
Target
21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe
-
Size
178KB
-
MD5
33529338b08fefb84dc9ce5416fab27b
-
SHA1
6adbe2f716c2417e3a3d5a238c1ee70afd14d10b
-
SHA256
21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df
-
SHA512
381bea13ddcf77f942ccf45fee495698319a060b067edc54ce534bd97084eca90b0b9c3c42432d1d8202425cf481ace64ff40637a9b77e2fe12f911b4d1be1a9
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPw2:I7VzxYnWI6agAalr4UrPp8WStPQu28F
Malware Config
Extracted
netwire
wallou.publicvm.com:3365
mediafire.duckdns.org:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
DLL2
-
keylogger_dir
%AppData%\System\
-
lock_executable
true
-
mutex
KgpcGWmM
-
offline_keylogger
true
-
password
Reborn
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/112-15-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/112-12-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/112-18-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 764 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 112 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe -
Loads dropped DLL 1 IoCs
pid Process 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 796 set thread context of 112 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 20 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2528 ping.exe 1856 ping.exe 1292 ping.exe 704 ping.exe 2280 ping.exe 2648 ping.exe 944 ping.exe 1320 ping.exe 2548 ping.exe 2976 ping.exe 1444 ping.exe 1808 ping.exe 1776 ping.exe 2824 ping.exe 2852 ping.exe 3064 ping.exe 2636 ping.exe 2996 ping.exe 2400 ping.exe 2644 ping.exe -
Runs ping.exe 1 TTPs 20 IoCs
pid Process 1808 ping.exe 2824 ping.exe 2400 ping.exe 2528 ping.exe 2644 ping.exe 1856 ping.exe 2996 ping.exe 2280 ping.exe 2636 ping.exe 1444 ping.exe 2852 ping.exe 704 ping.exe 1320 ping.exe 3064 ping.exe 2548 ping.exe 1776 ping.exe 1292 ping.exe 944 ping.exe 2648 ping.exe 2976 ping.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 796 wrote to memory of 2280 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 28 PID 796 wrote to memory of 2280 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 28 PID 796 wrote to memory of 2280 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 28 PID 796 wrote to memory of 2280 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 28 PID 796 wrote to memory of 2400 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 30 PID 796 wrote to memory of 2400 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 30 PID 796 wrote to memory of 2400 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 30 PID 796 wrote to memory of 2400 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 30 PID 796 wrote to memory of 3064 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 34 PID 796 wrote to memory of 3064 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 34 PID 796 wrote to memory of 3064 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 34 PID 796 wrote to memory of 3064 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 34 PID 796 wrote to memory of 2636 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 36 PID 796 wrote to memory of 2636 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 36 PID 796 wrote to memory of 2636 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 36 PID 796 wrote to memory of 2636 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 36 PID 796 wrote to memory of 2644 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 38 PID 796 wrote to memory of 2644 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 38 PID 796 wrote to memory of 2644 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 38 PID 796 wrote to memory of 2644 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 38 PID 796 wrote to memory of 2648 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 40 PID 796 wrote to memory of 2648 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 40 PID 796 wrote to memory of 2648 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 40 PID 796 wrote to memory of 2648 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 40 PID 796 wrote to memory of 2528 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 42 PID 796 wrote to memory of 2528 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 42 PID 796 wrote to memory of 2528 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 42 PID 796 wrote to memory of 2528 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 42 PID 796 wrote to memory of 2548 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 44 PID 796 wrote to memory of 2548 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 44 PID 796 wrote to memory of 2548 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 44 PID 796 wrote to memory of 2548 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 44 PID 796 wrote to memory of 2976 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 46 PID 796 wrote to memory of 2976 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 46 PID 796 wrote to memory of 2976 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 46 PID 796 wrote to memory of 2976 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 46 PID 796 wrote to memory of 1444 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 48 PID 796 wrote to memory of 1444 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 48 PID 796 wrote to memory of 1444 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 48 PID 796 wrote to memory of 1444 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 48 PID 796 wrote to memory of 764 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 50 PID 796 wrote to memory of 764 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 50 PID 796 wrote to memory of 764 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 50 PID 796 wrote to memory of 764 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 50 PID 796 wrote to memory of 2040 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 52 PID 796 wrote to memory of 2040 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 52 PID 796 wrote to memory of 2040 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 52 PID 796 wrote to memory of 2040 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 52 PID 796 wrote to memory of 1856 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 53 PID 796 wrote to memory of 1856 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 53 PID 796 wrote to memory of 1856 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 53 PID 796 wrote to memory of 1856 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 53 PID 796 wrote to memory of 1808 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 56 PID 796 wrote to memory of 1808 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 56 PID 796 wrote to memory of 1808 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 56 PID 796 wrote to memory of 1808 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 56 PID 796 wrote to memory of 1776 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 58 PID 796 wrote to memory of 1776 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 58 PID 796 wrote to memory of 1776 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 58 PID 796 wrote to memory of 1776 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 58 PID 796 wrote to memory of 2824 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 60 PID 796 wrote to memory of 2824 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 60 PID 796 wrote to memory of 2824 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 60 PID 796 wrote to memory of 2824 796 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 60 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 764 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe"C:\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2280
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2400
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3064
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2636
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2644
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2648
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2528
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2548
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2976
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1444
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe2⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:764
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1856
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1808
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1776
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2824
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2996
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2852
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1292
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:704
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:944
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe"C:\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:112
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2132
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1744
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2676
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1004
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5f20060b68fffa14795fc8b2221852722
SHA123e5d87dcfa5eda024549b770b784343e80a9d63
SHA2560448862cc6b2a6c1d8cfa0ec5eb1d94ea9ea23d5eadf415f1859b0d1b4d86bf0
SHA512788b5413f19eb6eaa1ac8c32c7211fc6d66bb9385bb0e8ee2ebaa1585eb1c36e75578540d2a4ee602f2176cd5dddb2b7bb48c1a43c840768c8ce2d982343579e
-
\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe
Filesize178KB
MD533529338b08fefb84dc9ce5416fab27b
SHA16adbe2f716c2417e3a3d5a238c1ee70afd14d10b
SHA25621078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df
SHA512381bea13ddcf77f942ccf45fee495698319a060b067edc54ce534bd97084eca90b0b9c3c42432d1d8202425cf481ace64ff40637a9b77e2fe12f911b4d1be1a9