Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe
Resource
win7-20240903-en
General
-
Target
21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe
-
Size
178KB
-
MD5
33529338b08fefb84dc9ce5416fab27b
-
SHA1
6adbe2f716c2417e3a3d5a238c1ee70afd14d10b
-
SHA256
21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df
-
SHA512
381bea13ddcf77f942ccf45fee495698319a060b067edc54ce534bd97084eca90b0b9c3c42432d1d8202425cf481ace64ff40637a9b77e2fe12f911b4d1be1a9
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPw2:I7VzxYnWI6agAalr4UrPp8WStPQu28F
Malware Config
Extracted
netwire
wallou.publicvm.com:3365
mediafire.duckdns.org:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
DLL2
-
keylogger_dir
%AppData%\System\
-
lock_executable
true
-
mutex
KgpcGWmM
-
offline_keylogger
true
-
password
Reborn
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2484-18-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2484-15-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2484-12-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1076 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 2484 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe -
Loads dropped DLL 1 IoCs
pid Process 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe -
Adds Run key to start application 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2964 set thread context of 2484 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 75 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 20 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1960 ping.exe 2608 ping.exe 1804 ping.exe 876 ping.exe 2800 ping.exe 3048 ping.exe 1988 ping.exe 2076 ping.exe 2080 ping.exe 616 ping.exe 2512 ping.exe 588 ping.exe 1632 ping.exe 2112 ping.exe 1088 ping.exe 2944 ping.exe 2464 ping.exe 2836 ping.exe 2628 ping.exe 2576 ping.exe -
Runs ping.exe 1 TTPs 20 IoCs
pid Process 2944 ping.exe 2076 ping.exe 1988 ping.exe 2512 ping.exe 2800 ping.exe 2836 ping.exe 2628 ping.exe 588 ping.exe 2112 ping.exe 876 ping.exe 2080 ping.exe 2576 ping.exe 1088 ping.exe 616 ping.exe 1960 ping.exe 2464 ping.exe 2608 ping.exe 3048 ping.exe 1804 ping.exe 1632 ping.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2512 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 30 PID 2964 wrote to memory of 2512 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 30 PID 2964 wrote to memory of 2512 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 30 PID 2964 wrote to memory of 2512 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 30 PID 2964 wrote to memory of 1960 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 32 PID 2964 wrote to memory of 1960 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 32 PID 2964 wrote to memory of 1960 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 32 PID 2964 wrote to memory of 1960 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 32 PID 2964 wrote to memory of 2464 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 34 PID 2964 wrote to memory of 2464 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 34 PID 2964 wrote to memory of 2464 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 34 PID 2964 wrote to memory of 2464 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 34 PID 2964 wrote to memory of 2800 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 36 PID 2964 wrote to memory of 2800 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 36 PID 2964 wrote to memory of 2800 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 36 PID 2964 wrote to memory of 2800 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 36 PID 2964 wrote to memory of 2836 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 38 PID 2964 wrote to memory of 2836 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 38 PID 2964 wrote to memory of 2836 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 38 PID 2964 wrote to memory of 2836 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 38 PID 2964 wrote to memory of 2628 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 41 PID 2964 wrote to memory of 2628 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 41 PID 2964 wrote to memory of 2628 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 41 PID 2964 wrote to memory of 2628 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 41 PID 2964 wrote to memory of 2608 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 43 PID 2964 wrote to memory of 2608 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 43 PID 2964 wrote to memory of 2608 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 43 PID 2964 wrote to memory of 2608 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 43 PID 2964 wrote to memory of 3048 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 45 PID 2964 wrote to memory of 3048 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 45 PID 2964 wrote to memory of 3048 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 45 PID 2964 wrote to memory of 3048 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 45 PID 2964 wrote to memory of 2576 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 47 PID 2964 wrote to memory of 2576 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 47 PID 2964 wrote to memory of 2576 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 47 PID 2964 wrote to memory of 2576 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 47 PID 2964 wrote to memory of 1088 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 49 PID 2964 wrote to memory of 1088 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 49 PID 2964 wrote to memory of 1088 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 49 PID 2964 wrote to memory of 1088 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 49 PID 2964 wrote to memory of 1076 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 51 PID 2964 wrote to memory of 1076 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 51 PID 2964 wrote to memory of 1076 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 51 PID 2964 wrote to memory of 1076 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 51 PID 2964 wrote to memory of 532 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 53 PID 2964 wrote to memory of 532 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 53 PID 2964 wrote to memory of 532 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 53 PID 2964 wrote to memory of 532 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 53 PID 2964 wrote to memory of 588 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 54 PID 2964 wrote to memory of 588 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 54 PID 2964 wrote to memory of 588 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 54 PID 2964 wrote to memory of 588 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 54 PID 2964 wrote to memory of 1804 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 57 PID 2964 wrote to memory of 1804 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 57 PID 2964 wrote to memory of 1804 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 57 PID 2964 wrote to memory of 1804 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 57 PID 2964 wrote to memory of 1632 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 59 PID 2964 wrote to memory of 1632 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 59 PID 2964 wrote to memory of 1632 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 59 PID 2964 wrote to memory of 1632 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 59 PID 2964 wrote to memory of 2944 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 61 PID 2964 wrote to memory of 2944 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 61 PID 2964 wrote to memory of 2944 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 61 PID 2964 wrote to memory of 2944 2964 21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe 61 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1076 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe"C:\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2512
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1960
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2464
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2800
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2836
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2628
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2608
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3048
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2576
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1088
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe2⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1076
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:532
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:588
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1804
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1632
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2944
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2112
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2076
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:876
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2080
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1988
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:616
-
-
C:\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe"C:\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1116
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:108
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1040
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1488
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5a7d922b41450b09f236d50b04fe5965a
SHA1244d782a3f4b2c97c69544da7fd40b1bf4c06c79
SHA256975227544d9c72bb8cb4ba5f6bd5f8e52d219315133c828c90a6e97f2c419888
SHA51223a57779a1b878a4b04a26056c1ba5793531032b3d276028739df537e0afc173f2b8f2ad433f79a2df1a27771f8b7cf8473c898e1411be92cac69dffa9bb1052
-
\Users\Admin\AppData\Local\Temp\21078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df.exe
Filesize178KB
MD533529338b08fefb84dc9ce5416fab27b
SHA16adbe2f716c2417e3a3d5a238c1ee70afd14d10b
SHA25621078001f9922cf0dd159a9b841959a0fe0e5267f941c3b5ee3cb56f83a542df
SHA512381bea13ddcf77f942ccf45fee495698319a060b067edc54ce534bd97084eca90b0b9c3c42432d1d8202425cf481ace64ff40637a9b77e2fe12f911b4d1be1a9