Analysis
-
max time kernel
44s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 18:09
Behavioral task
behavioral1
Sample
0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.7z
Resource
win10v2004-20241007-en
General
-
Target
0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.7z
-
Size
1.2MB
-
MD5
3d6462858fbdfaba38da280963663a88
-
SHA1
61beddabb7acb1e50a8c9c7d858d303d07c421b9
-
SHA256
6394c5aea697493242f8b48249b5a2020709a6c58345a0da881830c481489130
-
SHA512
1e317887f2778f25058dd27c81e5b6c6bd7d793cf4b9cdfb159ab9b1b648b47dc6392679319e1e61bcc3089fc73a08b11a7b34f6eccea6951dccaf3a5c6bd970
-
SSDEEP
24576:Z+3Q1P7yWG7g8SrvFJuouQfOnAx8/GTJoC/A1t+mErf9mJcsqyr:MQ1PibSrd0qfOnJG9b/0t+mErf9JM
Malware Config
Extracted
blackcat
- Username:
KELLERSUPPLY\Administrator - Password:
d@gw00d
- Username:
KELLERSUPPLY\AdminRecovery - Password:
K3ller!$Supp1y
- Username:
.\Administrator - Password:
d@gw00d
- Username:
.\Administrator - Password:
K3ller!$Supp1y
-
enable_network_discovery
true
-
enable_self_propagation
false
-
enable_set_wallpaper
true
-
extension
sykffle
-
note_file_name
RECOVER-${EXTENSION}-FILES.txt
-
note_full_text
>> Introduction Important files on your system was ENCRYPTED and now they have have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://zujgzbu5y64xbmvc42addp4lxkoosb4tslf5mehnh7pvqjpwxn5gokyd.onion/b21e1fb6-ff88-425b-8339-3523179a1e3e/886cf430a907bbe9a3fd38fb704d524dbd199c1b042ad6f65dc72ad78704e21 >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://mu75ltv3lxd24dbyu6gtvmnwybecigs5auki7fces437xvvflzva2nqd.onion/?access-key=${ACCESS_KEY}
Signatures
-
BlackCat
A Rust-based ransomware sold as RaaS first seen in late 2021.
-
Blackcat family
-
Expiro family
-
Expiro payload 30 IoCs
resource yara_rule behavioral1/memory/2728-4-0x0000000000697000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/2728-5-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/2728-6-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/2728-7-0x0000000000697000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/2400-22-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/748-24-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/3832-27-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/3256-29-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/3124-31-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/2660-33-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/4040-34-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/2308-37-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/4020-38-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/4840-41-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/2592-43-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/4444-45-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/4764-47-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/2192-48-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/3896-50-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/5092-52-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/3496-54-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/4072-57-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/3916-58-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/3444-61-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/2020-63-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/1632-65-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/816-66-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/3560-69-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/3140-71-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 behavioral1/memory/1840-72-0x0000000000400000-0x00000000006C7000-memory.dmp family_expiro1 -
Executes dropped EXE 27 IoCs
pid Process 2728 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 2400 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 748 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 3832 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 3256 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 3124 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 2660 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 4040 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 2308 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 4020 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 4840 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 2592 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 4444 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 4764 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 2192 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 3896 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 5092 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 3496 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 4072 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 3916 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 3444 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 2020 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 1632 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 816 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 3560 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 3140 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe 1840 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4884 7zFM.exe 720 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 4884 7zFM.exe Token: 35 4884 7zFM.exe Token: SeSecurityPrivilege 4884 7zFM.exe Token: SeDebugPrivilege 720 taskmgr.exe Token: SeSystemProfilePrivilege 720 taskmgr.exe Token: SeCreateGlobalPrivilege 720 taskmgr.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 4884 7zFM.exe 4884 7zFM.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe -
Suspicious use of SendNotifyMessage 45 IoCs
pid Process 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4884
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2728
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:720
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:2400
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:748
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:3832
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:3256
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:3124
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:2660
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:4040
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:2308
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:4020
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:4840
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:2592
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:4444
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:4764
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:2192
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:3896
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:5092
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:3496
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:4072
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:3916
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:3444
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:2020
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:1632
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:816
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:3560
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:3140
-
C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"C:\Users\Admin\Desktop\0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479.exe"1⤵
- Executes dropped EXE
PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5bb266486ee8ac70c0687989e02cefa14
SHA111203786b17bb3873d46acae32a898c8dac09850
SHA2560c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479
SHA512a167779fc95a5cf0a3eff86211e9e08c282470e050b17ae62c7499a82ea59b3447446eafea9d7b5c5ba833b7a2d060f76530b00509dd5ff7904a0735d83e14c4