Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe
Resource
win7-20240903-en
General
-
Target
e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe
-
Size
178KB
-
MD5
9b54007058cb81000006c77286da2280
-
SHA1
277bb51bbf5ed551cb43ebbc50d188aa77e5a995
-
SHA256
e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465
-
SHA512
57ac12587776eb78f5fe509b9b5185d806d280c913395fdf1213b72c25c74ba5c0413803ac0d99c1eb503ae3d9a7d2c47f138a8a926d56ae69ad18ad224c1191
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPww:I7VzxYnWI6agAalr4UrPp8WStPQu28t
Malware Config
Extracted
netwire
wallou.publicvm.com:3365
mediafire.duckdns.org:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
DLL2
-
keylogger_dir
%AppData%\System\
-
lock_executable
true
-
mutex
KgpcGWmM
-
offline_keylogger
true
-
password
Reborn
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1360-12-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1360-18-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1360-15-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Netwire family
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Executes dropped EXE 1 IoCs
Processes:
e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exepid process 1360 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe -
Loads dropped DLL 1 IoCs
Processes:
e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exepid process 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe -
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
REG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exedescription pid process target process PID 2260 set thread context of 1360 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ping.exeping.exeping.exeping.exeREG.exeREG.exeping.exeping.exeping.exeping.exeping.exee34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exeREG.exeREG.exeREG.exeping.exeping.exeping.exeattrib.exeping.exeREG.exeREG.exeping.exeping.exeREG.exeREG.exeREG.exee34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exeping.exeping.exeping.exeREG.exeping.exeping.exeREG.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 20 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 2800 ping.exe 2804 ping.exe 2988 ping.exe 1160 ping.exe 960 ping.exe 1040 ping.exe 2192 ping.exe 2228 ping.exe 2620 ping.exe 2332 ping.exe 2928 ping.exe 2092 ping.exe 2432 ping.exe 336 ping.exe 280 ping.exe 1668 ping.exe 2140 ping.exe 3036 ping.exe 2132 ping.exe 2856 ping.exe -
Runs ping.exe 1 TTPs 20 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 2856 ping.exe 2092 ping.exe 1160 ping.exe 2228 ping.exe 2332 ping.exe 2988 ping.exe 336 ping.exe 1040 ping.exe 280 ping.exe 2192 ping.exe 2140 ping.exe 2132 ping.exe 2432 ping.exe 2800 ping.exe 2804 ping.exe 2620 ping.exe 2928 ping.exe 3036 ping.exe 960 ping.exe 1668 ping.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exepid process 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exedescription pid process Token: SeDebugPrivilege 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exedescription pid process target process PID 2260 wrote to memory of 280 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 280 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 280 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 280 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2192 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2192 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2192 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2192 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2228 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2228 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2228 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2228 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2140 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2140 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2140 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2140 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2800 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2800 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2800 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2800 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2804 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2804 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2804 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2804 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2620 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2620 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2620 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2620 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2332 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2332 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2332 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2332 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2856 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2856 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2856 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2856 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2928 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2928 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2928 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2928 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2588 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe attrib.exe PID 2260 wrote to memory of 2588 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe attrib.exe PID 2260 wrote to memory of 2588 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe attrib.exe PID 2260 wrote to memory of 2588 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe attrib.exe PID 2260 wrote to memory of 2944 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe REG.exe PID 2260 wrote to memory of 2944 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe REG.exe PID 2260 wrote to memory of 2944 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe REG.exe PID 2260 wrote to memory of 2944 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe REG.exe PID 2260 wrote to memory of 2988 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2988 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2988 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2988 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2092 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2092 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2092 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 2092 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 1160 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 1160 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 1160 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 1160 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 3036 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 3036 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 3036 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe PID 2260 wrote to memory of 3036 2260 e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe ping.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe"C:\Users\Admin\AppData\Local\Temp\e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:280
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2192
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2228
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2140
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2800
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2804
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2620
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2332
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2856
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2928
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe2⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2588
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2988
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2092
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1160
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3036
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2132
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2432
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:960
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:336
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1040
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe"C:\Users\Admin\AppData\Local\Temp\e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1360
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:548
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2196
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5be3262b7eb3f98caf33d95b09a8ce0e8
SHA192d38c1f7c0e15094379e58c9cbd57f0b624d17f
SHA25696a158acc594d9ed952b090666f8b8227d36f54e1a3cc9093e2314a43afa7fd0
SHA512f9c9171115aeb3fc7649d04e73279f4007af5962ea0b954226f636f7406f3cb2f22c0bfb59f72ea3f47c40978f3673438555abf3b2297aaded9945d1945d8da6
-
\Users\Admin\AppData\Local\Temp\e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465N.exe
Filesize178KB
MD59b54007058cb81000006c77286da2280
SHA1277bb51bbf5ed551cb43ebbc50d188aa77e5a995
SHA256e34a1cc921f95e1726b6ec2bb2f8eecc891e4fca223c8d1cb43a4462c45b3465
SHA51257ac12587776eb78f5fe509b9b5185d806d280c913395fdf1213b72c25c74ba5c0413803ac0d99c1eb503ae3d9a7d2c47f138a8a926d56ae69ad18ad224c1191