Overview
overview
10Static
static
7066d06ca00...81.exe
windows7-x64
1006d6f22d02...bc.exe
windows7-x64
809f1d49065...d1.exe
windows7-x64
10208cca124d...45.exe
windows7-x64
10241f67ece2...79.exe
windows7-x64
130616f6c48...60.exe
windows7-x64
1044f28cd6ea...7e.exe
windows7-x64
34b190a407b...5f.exe
windows7-x64
1072ddceebe7...6b.exe
windows7-x64
97b53a00b3a...b2.exe
windows7-x64
77cf39ebb44...57.exe
windows7-x64
108c42a08427...51.exe
windows7-x64
79d081b734c...91.exe
windows7-x64
4b25cc31472...15.exe
windows7-x64
10b2ec72de35...8f.exe
windows7-x64
6b4c2ffccfe...dd.exe
windows7-x64
5bab7af3306...be.exe
windows7-x64
9c531015ec0...86.exe
windows7-x64
8dc7ab2e7ed...60.exe
windows7-x64
8debfd1fb34...d8.exe
windows7-x64
8df36e2aaae...37.exe
windows7-x64
9df99316e57...27.exe
windows7-x64
4e60fc4473a...60.exe
windows7-x64
10Analysis
-
max time kernel
1200s -
max time network
844s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 19:27
Behavioral task
behavioral1
Sample
066d06ca007d19457ca609dd95975f7facb551ffb5d8f6d4edf108236ad8c981.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06d6f22d02443afd6d6880ead6648ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
09f1d49065108a595578ff86ff63a514d47d5496ab5c23f38cda1f0d57dd6cd1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
208cca124ddafe35a122f6bdd36191151a2730b4e1051804d5f68d0cb4b44145.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
241f67ece26c9e6047bb1a9fc60bf7c45a23ea1a2bb08a1617a385c71d008d79.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
30616f6c488fa16ccdcbfd6273e7ac8604c82bc1468fc1a70b2a43661b674760.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4b190a407bca89dd4778afa551bdc58dddff26fc5fe7622453e836ecdfaf565f.exe
Resource
win7-20240729-en
Behavioral task
behavioral9
Sample
72ddceebe717992c1486a2d5a5e9e20ad331a98a146d2976c943c983e088f66b.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
7b53a00b3a8859755f6144cb2149673fa17fdd6e439cbfdee21a7a513e6395b2.exe
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
7cf39ebb4409b13a7c153abff6661cc4d28d8d7109543d6419438ac9f2f1be57.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
8c42a084278ff8e25f7ee765c37da84da02780da725505108f9eb39cfb05c051.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
9d081b734c595a1ae38e254369c0060c5870ee119c9f7853989c23ebc204a291.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
b2ec72de3543060f0f3af322c4f1caf2d65fa8ff56b5a93a5e8fa59c191d178f.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
b4c2ffccfe807167860d70ea95cde0390f2dc4220992d272497ced04afb97edd.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
bab7af3306f66d5deaafda1f0cd57c20e42678451a7bc70c71255f6a7e1806be.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
c531015ec09adf346131a375df9b9d04c90657fac9b80f2b1e269dae6186de86.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
dc7ab2e7ed26554a11da51a184e95b01e685b1a2f99c7fc77d54d5966530bf60.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
debfd1fb34df5c7047c3c8837cdda27b59e6044934447a8bb6878344847b74d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
df36e2aaae85f07851810a829e38a82827252fda15d4c4410da085d59ce38737.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
df99316e57002298d88be785acad4c3a900cbc5e04a29e32d4549f25f08a7527.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
e60fc4473ada26f3a8d2dd5c5f226441073bf86737e271f6f2ec61324ef9ab60.exe
Resource
win7-20241010-en
General
-
Target
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe
-
Size
392KB
-
MD5
e3ea83c55b5ba8bafb881b6c928d2092
-
SHA1
f97d4c11815cfae72ac597aa1ca355d0c6371ae8
-
SHA256
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215
-
SHA512
37a34ca8774f9d6e3be3c14a5d560600bf468b5b9a3b68107b4b35ed3c466e1293996091f79cd20a1d91413b64c914cb2d879aeeb54537bf33a484e5722eda32
-
SSDEEP
6144:6M0SzuU2+09ccA3F8b88LmJdWrcIIFPrZZYGa/Sd6ElhL6EYp0I:6bq49cw8WIpZZbaAOx0I
Malware Config
Signatures
-
Processes:
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe043A6A5B00014973000A2A68B4EB2331.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000A2A68B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000A2A68B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000A2A68B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000A2A68B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000A2A68B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
Processes:
043A6A5B00014973000A2A68B4EB2331.exepid process 2820 043A6A5B00014973000A2A68B4EB2331.exe -
Executes dropped EXE 1 IoCs
Processes:
043A6A5B00014973000A2A68B4EB2331.exepid process 2820 043A6A5B00014973000A2A68B4EB2331.exe -
Loads dropped DLL 4 IoCs
Processes:
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe043A6A5B00014973000A2A68B4EB2331.exepid process 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe -
Processes:
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe043A6A5B00014973000A2A68B4EB2331.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000A2A68B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000A2A68B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000A2A68B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000A2A68B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000A2A68B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000A2A68B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000A2A68B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
043A6A5B00014973000A2A68B4EB2331.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6A5B00014973000A2A68B4EB2331 = "C:\\ProgramData\\043A6A5B00014973000A2A68B4EB2331\\043A6A5B00014973000A2A68B4EB2331.exe" 043A6A5B00014973000A2A68B4EB2331.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe043A6A5B00014973000A2A68B4EB2331.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 043A6A5B00014973000A2A68B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe043A6A5B00014973000A2A68B4EB2331.exepid process 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
043A6A5B00014973000A2A68B4EB2331.exepid process 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
043A6A5B00014973000A2A68B4EB2331.exepid process 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
043A6A5B00014973000A2A68B4EB2331.exepid process 2820 043A6A5B00014973000A2A68B4EB2331.exe 2820 043A6A5B00014973000A2A68B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exedescription pid process target process PID 2700 wrote to memory of 2820 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 043A6A5B00014973000A2A68B4EB2331.exe PID 2700 wrote to memory of 2820 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 043A6A5B00014973000A2A68B4EB2331.exe PID 2700 wrote to memory of 2820 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 043A6A5B00014973000A2A68B4EB2331.exe PID 2700 wrote to memory of 2820 2700 b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe 043A6A5B00014973000A2A68B4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe"C:\Users\Admin\AppData\Local\Temp\b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\ProgramData\043A6A5B00014973000A2A68B4EB2331\043A6A5B00014973000A2A68B4EB2331.exe"C:\ProgramData\043A6A5B00014973000A2A68B4EB2331\043A6A5B00014973000A2A68B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD5e3ea83c55b5ba8bafb881b6c928d2092
SHA1f97d4c11815cfae72ac597aa1ca355d0c6371ae8
SHA256b25cc314720ced9b2845941fb145bbf06493fad7b2b4a76b8fbffc995ff46215
SHA51237a34ca8774f9d6e3be3c14a5d560600bf468b5b9a3b68107b4b35ed3c466e1293996091f79cd20a1d91413b64c914cb2d879aeeb54537bf33a484e5722eda32