Analysis
-
max time kernel
111s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 12:56
Behavioral task
behavioral1
Sample
a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe
Resource
win7-20241010-en
General
-
Target
a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe
-
Size
5.2MB
-
MD5
f60891ab856d2f3a9c4a2f65576c6d20
-
SHA1
5dd7aa9b1205e76e543d8e734839c12503525ceb
-
SHA256
a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337
-
SHA512
8b857ddde10ec0758d4ae2a206535bcfacc9c363895fd39306ddac53a7baa023ab6a2238899a73d0bc51713444ce9778a1f634d2e0c11118d75756dcc8b18785
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l5:RWWBibf56utgpPFotBER/mQ32lUF
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x0009000000012238-3.dat cobalt_reflective_dll behavioral1/files/0x00080000000193b8-11.dat cobalt_reflective_dll behavioral1/files/0x0006000000019480-22.dat cobalt_reflective_dll behavioral1/files/0x0007000000019470-20.dat cobalt_reflective_dll behavioral1/files/0x0030000000019326-31.dat cobalt_reflective_dll behavioral1/files/0x0006000000019489-44.dat cobalt_reflective_dll behavioral1/files/0x000600000001948c-47.dat cobalt_reflective_dll behavioral1/files/0x0006000000019490-61.dat cobalt_reflective_dll behavioral1/files/0x00080000000194a3-67.dat cobalt_reflective_dll behavioral1/files/0x00080000000194eb-75.dat cobalt_reflective_dll behavioral1/files/0x000500000001a309-85.dat cobalt_reflective_dll behavioral1/files/0x000500000001a3ab-92.dat cobalt_reflective_dll behavioral1/files/0x000500000001a3f8-104.dat cobalt_reflective_dll behavioral1/files/0x000500000001a3f6-99.dat cobalt_reflective_dll behavioral1/files/0x000500000001a400-121.dat cobalt_reflective_dll behavioral1/files/0x000500000001a438-131.dat cobalt_reflective_dll behavioral1/files/0x000500000001a44f-141.dat cobalt_reflective_dll behavioral1/files/0x000500000001a457-145.dat cobalt_reflective_dll behavioral1/files/0x000500000001a44d-137.dat cobalt_reflective_dll behavioral1/files/0x000500000001a404-126.dat cobalt_reflective_dll behavioral1/files/0x000500000001a3fd-116.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Xmrig family
-
XMRig Miner payload 47 IoCs
resource yara_rule behavioral1/memory/2904-12-0x000000013FEE0000-0x0000000140231000-memory.dmp xmrig behavioral1/memory/1268-25-0x000000013F980000-0x000000013FCD1000-memory.dmp xmrig behavioral1/memory/1248-33-0x000000013F8C0000-0x000000013FC11000-memory.dmp xmrig behavioral1/memory/1268-42-0x0000000002350000-0x00000000026A1000-memory.dmp xmrig behavioral1/memory/2892-35-0x000000013F2E0000-0x000000013F631000-memory.dmp xmrig behavioral1/memory/2716-41-0x000000013FA90000-0x000000013FDE1000-memory.dmp xmrig behavioral1/memory/2904-38-0x000000013FEE0000-0x0000000140231000-memory.dmp xmrig behavioral1/memory/1268-50-0x0000000002350000-0x00000000026A1000-memory.dmp xmrig behavioral1/memory/828-48-0x000000013F440000-0x000000013F791000-memory.dmp xmrig behavioral1/memory/2980-73-0x000000013FB10000-0x000000013FE61000-memory.dmp xmrig behavioral1/memory/2804-70-0x000000013FF30000-0x0000000140281000-memory.dmp xmrig behavioral1/memory/1268-79-0x0000000002350000-0x00000000026A1000-memory.dmp xmrig behavioral1/memory/2848-84-0x000000013F6D0000-0x000000013FA21000-memory.dmp xmrig behavioral1/memory/564-83-0x000000013FA40000-0x000000013FD91000-memory.dmp xmrig behavioral1/memory/1268-108-0x000000013F360000-0x000000013F6B1000-memory.dmp xmrig behavioral1/memory/2516-110-0x000000013F670000-0x000000013F9C1000-memory.dmp xmrig behavioral1/memory/564-142-0x000000013FA40000-0x000000013FD91000-memory.dmp xmrig behavioral1/memory/2444-152-0x000000013F590000-0x000000013F8E1000-memory.dmp xmrig behavioral1/memory/1268-114-0x0000000002350000-0x00000000026A1000-memory.dmp xmrig behavioral1/memory/1268-113-0x0000000002350000-0x00000000026A1000-memory.dmp xmrig behavioral1/memory/1444-153-0x000000013FD40000-0x0000000140091000-memory.dmp xmrig behavioral1/memory/1268-154-0x000000013F980000-0x000000013FCD1000-memory.dmp xmrig behavioral1/memory/1332-160-0x000000013F9E0000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/1268-164-0x000000013F360000-0x000000013F6B1000-memory.dmp xmrig behavioral1/memory/1732-168-0x000000013F360000-0x000000013F6B1000-memory.dmp xmrig behavioral1/memory/1188-171-0x000000013FB00000-0x000000013FE51000-memory.dmp xmrig behavioral1/memory/1996-173-0x000000013FDB0000-0x0000000140101000-memory.dmp xmrig behavioral1/memory/1724-175-0x000000013FDF0000-0x0000000140141000-memory.dmp xmrig behavioral1/memory/1268-174-0x0000000002350000-0x00000000026A1000-memory.dmp xmrig behavioral1/memory/2784-172-0x000000013F6F0000-0x000000013FA41000-memory.dmp xmrig behavioral1/memory/1888-170-0x000000013F160000-0x000000013F4B1000-memory.dmp xmrig behavioral1/memory/1292-169-0x000000013F7F0000-0x000000013FB41000-memory.dmp xmrig behavioral1/memory/1244-179-0x000000013FE40000-0x0000000140191000-memory.dmp xmrig behavioral1/memory/2904-210-0x000000013FEE0000-0x0000000140231000-memory.dmp xmrig behavioral1/memory/1248-212-0x000000013F8C0000-0x000000013FC11000-memory.dmp xmrig behavioral1/memory/828-214-0x000000013F440000-0x000000013F791000-memory.dmp xmrig behavioral1/memory/2892-230-0x000000013F2E0000-0x000000013F631000-memory.dmp xmrig behavioral1/memory/2716-233-0x000000013FA90000-0x000000013FDE1000-memory.dmp xmrig behavioral1/memory/2848-237-0x000000013F6D0000-0x000000013FA21000-memory.dmp xmrig behavioral1/memory/2980-236-0x000000013FB10000-0x000000013FE61000-memory.dmp xmrig behavioral1/memory/2804-242-0x000000013FF30000-0x0000000140281000-memory.dmp xmrig behavioral1/memory/2516-246-0x000000013F670000-0x000000013F9C1000-memory.dmp xmrig behavioral1/memory/564-248-0x000000013FA40000-0x000000013FD91000-memory.dmp xmrig behavioral1/memory/2444-255-0x000000013F590000-0x000000013F8E1000-memory.dmp xmrig behavioral1/memory/1444-257-0x000000013FD40000-0x0000000140091000-memory.dmp xmrig behavioral1/memory/1332-259-0x000000013F9E0000-0x000000013FD31000-memory.dmp xmrig behavioral1/memory/1732-274-0x000000013F360000-0x000000013F6B1000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 1248 VPKtGIl.exe 2904 QmRCSjv.exe 828 VhWFYUW.exe 2892 jFoeAxW.exe 2716 zbUgFca.exe 2980 RNcttFE.exe 2848 pwCrLkl.exe 2804 wYREoGv.exe 2516 pRAkNcT.exe 564 PUFjyMv.exe 2444 zWYGhyk.exe 1444 dlvJeBx.exe 1332 rmOjVuN.exe 1732 YxrwrNr.exe 1292 idraDXX.exe 1888 gNcMKtm.exe 1188 DubeMJi.exe 2784 vQmcJjc.exe 1996 JQYuStU.exe 1724 PFQhViU.exe 1244 LKYvrtO.exe -
Loads dropped DLL 21 IoCs
pid Process 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe -
resource yara_rule behavioral1/memory/1268-0-0x000000013F980000-0x000000013FCD1000-memory.dmp upx behavioral1/files/0x0009000000012238-3.dat upx behavioral1/files/0x00080000000193b8-11.dat upx behavioral1/memory/2904-12-0x000000013FEE0000-0x0000000140231000-memory.dmp upx behavioral1/memory/828-21-0x000000013F440000-0x000000013F791000-memory.dmp upx behavioral1/files/0x0006000000019480-22.dat upx behavioral1/files/0x0007000000019470-20.dat upx behavioral1/memory/1248-10-0x000000013F8C0000-0x000000013FC11000-memory.dmp upx behavioral1/memory/1268-25-0x000000013F980000-0x000000013FCD1000-memory.dmp upx behavioral1/files/0x0030000000019326-31.dat upx behavioral1/memory/1248-33-0x000000013F8C0000-0x000000013FC11000-memory.dmp upx behavioral1/files/0x0006000000019489-44.dat upx behavioral1/memory/2892-35-0x000000013F2E0000-0x000000013F631000-memory.dmp upx behavioral1/memory/2980-45-0x000000013FB10000-0x000000013FE61000-memory.dmp upx behavioral1/memory/2716-41-0x000000013FA90000-0x000000013FDE1000-memory.dmp upx behavioral1/memory/2904-38-0x000000013FEE0000-0x0000000140231000-memory.dmp upx behavioral1/files/0x000600000001948c-47.dat upx behavioral1/memory/2848-52-0x000000013F6D0000-0x000000013FA21000-memory.dmp upx behavioral1/memory/828-48-0x000000013F440000-0x000000013F791000-memory.dmp upx behavioral1/files/0x0006000000019490-61.dat upx behavioral1/files/0x00080000000194a3-67.dat upx behavioral1/memory/2516-74-0x000000013F670000-0x000000013F9C1000-memory.dmp upx behavioral1/memory/2980-73-0x000000013FB10000-0x000000013FE61000-memory.dmp upx behavioral1/memory/2804-70-0x000000013FF30000-0x0000000140281000-memory.dmp upx behavioral1/files/0x00080000000194eb-75.dat upx behavioral1/memory/2848-84-0x000000013F6D0000-0x000000013FA21000-memory.dmp upx behavioral1/memory/564-83-0x000000013FA40000-0x000000013FD91000-memory.dmp upx behavioral1/files/0x000500000001a309-85.dat upx behavioral1/files/0x000500000001a3ab-92.dat upx behavioral1/memory/1444-96-0x000000013FD40000-0x0000000140091000-memory.dmp upx behavioral1/memory/2444-89-0x000000013F590000-0x000000013F8E1000-memory.dmp upx behavioral1/files/0x000500000001a3f8-104.dat upx behavioral1/memory/1732-109-0x000000013F360000-0x000000013F6B1000-memory.dmp upx behavioral1/memory/2516-110-0x000000013F670000-0x000000013F9C1000-memory.dmp upx behavioral1/files/0x000500000001a3f6-99.dat upx behavioral1/files/0x000500000001a400-121.dat upx behavioral1/files/0x000500000001a438-131.dat upx behavioral1/files/0x000500000001a44f-141.dat upx behavioral1/files/0x000500000001a457-145.dat upx behavioral1/memory/564-142-0x000000013FA40000-0x000000013FD91000-memory.dmp upx behavioral1/files/0x000500000001a44d-137.dat upx behavioral1/files/0x000500000001a404-126.dat upx behavioral1/memory/2444-152-0x000000013F590000-0x000000013F8E1000-memory.dmp upx behavioral1/files/0x000500000001a3fd-116.dat upx behavioral1/memory/1332-103-0x000000013F9E0000-0x000000013FD31000-memory.dmp upx behavioral1/memory/1444-153-0x000000013FD40000-0x0000000140091000-memory.dmp upx behavioral1/memory/1268-154-0x000000013F980000-0x000000013FCD1000-memory.dmp upx behavioral1/memory/1332-160-0x000000013F9E0000-0x000000013FD31000-memory.dmp upx behavioral1/memory/1732-168-0x000000013F360000-0x000000013F6B1000-memory.dmp upx behavioral1/memory/1188-171-0x000000013FB00000-0x000000013FE51000-memory.dmp upx behavioral1/memory/1996-173-0x000000013FDB0000-0x0000000140101000-memory.dmp upx behavioral1/memory/1724-175-0x000000013FDF0000-0x0000000140141000-memory.dmp upx behavioral1/memory/2784-172-0x000000013F6F0000-0x000000013FA41000-memory.dmp upx behavioral1/memory/1888-170-0x000000013F160000-0x000000013F4B1000-memory.dmp upx behavioral1/memory/1292-169-0x000000013F7F0000-0x000000013FB41000-memory.dmp upx behavioral1/memory/1244-179-0x000000013FE40000-0x0000000140191000-memory.dmp upx behavioral1/memory/2904-210-0x000000013FEE0000-0x0000000140231000-memory.dmp upx behavioral1/memory/1248-212-0x000000013F8C0000-0x000000013FC11000-memory.dmp upx behavioral1/memory/828-214-0x000000013F440000-0x000000013F791000-memory.dmp upx behavioral1/memory/2892-230-0x000000013F2E0000-0x000000013F631000-memory.dmp upx behavioral1/memory/2716-233-0x000000013FA90000-0x000000013FDE1000-memory.dmp upx behavioral1/memory/2848-237-0x000000013F6D0000-0x000000013FA21000-memory.dmp upx behavioral1/memory/2980-236-0x000000013FB10000-0x000000013FE61000-memory.dmp upx behavioral1/memory/2804-242-0x000000013FF30000-0x0000000140281000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\VhWFYUW.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\pwCrLkl.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\YxrwrNr.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\vQmcJjc.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\zWYGhyk.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\rmOjVuN.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\idraDXX.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\QmRCSjv.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\jFoeAxW.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\zbUgFca.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\RNcttFE.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\PUFjyMv.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\gNcMKtm.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\DubeMJi.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\JQYuStU.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\pRAkNcT.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\dlvJeBx.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\VPKtGIl.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\wYREoGv.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\PFQhViU.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\LKYvrtO.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe Token: SeLockMemoryPrivilege 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1248 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 30 PID 1268 wrote to memory of 1248 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 30 PID 1268 wrote to memory of 1248 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 30 PID 1268 wrote to memory of 2904 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 31 PID 1268 wrote to memory of 2904 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 31 PID 1268 wrote to memory of 2904 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 31 PID 1268 wrote to memory of 828 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 32 PID 1268 wrote to memory of 828 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 32 PID 1268 wrote to memory of 828 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 32 PID 1268 wrote to memory of 2892 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 33 PID 1268 wrote to memory of 2892 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 33 PID 1268 wrote to memory of 2892 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 33 PID 1268 wrote to memory of 2716 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 34 PID 1268 wrote to memory of 2716 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 34 PID 1268 wrote to memory of 2716 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 34 PID 1268 wrote to memory of 2980 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 35 PID 1268 wrote to memory of 2980 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 35 PID 1268 wrote to memory of 2980 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 35 PID 1268 wrote to memory of 2848 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 36 PID 1268 wrote to memory of 2848 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 36 PID 1268 wrote to memory of 2848 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 36 PID 1268 wrote to memory of 2804 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 37 PID 1268 wrote to memory of 2804 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 37 PID 1268 wrote to memory of 2804 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 37 PID 1268 wrote to memory of 2516 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 38 PID 1268 wrote to memory of 2516 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 38 PID 1268 wrote to memory of 2516 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 38 PID 1268 wrote to memory of 564 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 39 PID 1268 wrote to memory of 564 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 39 PID 1268 wrote to memory of 564 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 39 PID 1268 wrote to memory of 2444 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 40 PID 1268 wrote to memory of 2444 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 40 PID 1268 wrote to memory of 2444 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 40 PID 1268 wrote to memory of 1444 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 41 PID 1268 wrote to memory of 1444 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 41 PID 1268 wrote to memory of 1444 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 41 PID 1268 wrote to memory of 1332 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 42 PID 1268 wrote to memory of 1332 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 42 PID 1268 wrote to memory of 1332 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 42 PID 1268 wrote to memory of 1732 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 43 PID 1268 wrote to memory of 1732 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 43 PID 1268 wrote to memory of 1732 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 43 PID 1268 wrote to memory of 1292 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 44 PID 1268 wrote to memory of 1292 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 44 PID 1268 wrote to memory of 1292 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 44 PID 1268 wrote to memory of 1888 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 45 PID 1268 wrote to memory of 1888 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 45 PID 1268 wrote to memory of 1888 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 45 PID 1268 wrote to memory of 1188 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 46 PID 1268 wrote to memory of 1188 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 46 PID 1268 wrote to memory of 1188 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 46 PID 1268 wrote to memory of 2784 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 47 PID 1268 wrote to memory of 2784 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 47 PID 1268 wrote to memory of 2784 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 47 PID 1268 wrote to memory of 1996 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 48 PID 1268 wrote to memory of 1996 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 48 PID 1268 wrote to memory of 1996 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 48 PID 1268 wrote to memory of 1724 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 49 PID 1268 wrote to memory of 1724 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 49 PID 1268 wrote to memory of 1724 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 49 PID 1268 wrote to memory of 1244 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 50 PID 1268 wrote to memory of 1244 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 50 PID 1268 wrote to memory of 1244 1268 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe"C:\Users\Admin\AppData\Local\Temp\a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\System\VPKtGIl.exeC:\Windows\System\VPKtGIl.exe2⤵
- Executes dropped EXE
PID:1248
-
-
C:\Windows\System\QmRCSjv.exeC:\Windows\System\QmRCSjv.exe2⤵
- Executes dropped EXE
PID:2904
-
-
C:\Windows\System\VhWFYUW.exeC:\Windows\System\VhWFYUW.exe2⤵
- Executes dropped EXE
PID:828
-
-
C:\Windows\System\jFoeAxW.exeC:\Windows\System\jFoeAxW.exe2⤵
- Executes dropped EXE
PID:2892
-
-
C:\Windows\System\zbUgFca.exeC:\Windows\System\zbUgFca.exe2⤵
- Executes dropped EXE
PID:2716
-
-
C:\Windows\System\RNcttFE.exeC:\Windows\System\RNcttFE.exe2⤵
- Executes dropped EXE
PID:2980
-
-
C:\Windows\System\pwCrLkl.exeC:\Windows\System\pwCrLkl.exe2⤵
- Executes dropped EXE
PID:2848
-
-
C:\Windows\System\wYREoGv.exeC:\Windows\System\wYREoGv.exe2⤵
- Executes dropped EXE
PID:2804
-
-
C:\Windows\System\pRAkNcT.exeC:\Windows\System\pRAkNcT.exe2⤵
- Executes dropped EXE
PID:2516
-
-
C:\Windows\System\PUFjyMv.exeC:\Windows\System\PUFjyMv.exe2⤵
- Executes dropped EXE
PID:564
-
-
C:\Windows\System\zWYGhyk.exeC:\Windows\System\zWYGhyk.exe2⤵
- Executes dropped EXE
PID:2444
-
-
C:\Windows\System\dlvJeBx.exeC:\Windows\System\dlvJeBx.exe2⤵
- Executes dropped EXE
PID:1444
-
-
C:\Windows\System\rmOjVuN.exeC:\Windows\System\rmOjVuN.exe2⤵
- Executes dropped EXE
PID:1332
-
-
C:\Windows\System\YxrwrNr.exeC:\Windows\System\YxrwrNr.exe2⤵
- Executes dropped EXE
PID:1732
-
-
C:\Windows\System\idraDXX.exeC:\Windows\System\idraDXX.exe2⤵
- Executes dropped EXE
PID:1292
-
-
C:\Windows\System\gNcMKtm.exeC:\Windows\System\gNcMKtm.exe2⤵
- Executes dropped EXE
PID:1888
-
-
C:\Windows\System\DubeMJi.exeC:\Windows\System\DubeMJi.exe2⤵
- Executes dropped EXE
PID:1188
-
-
C:\Windows\System\vQmcJjc.exeC:\Windows\System\vQmcJjc.exe2⤵
- Executes dropped EXE
PID:2784
-
-
C:\Windows\System\JQYuStU.exeC:\Windows\System\JQYuStU.exe2⤵
- Executes dropped EXE
PID:1996
-
-
C:\Windows\System\PFQhViU.exeC:\Windows\System\PFQhViU.exe2⤵
- Executes dropped EXE
PID:1724
-
-
C:\Windows\System\LKYvrtO.exeC:\Windows\System\LKYvrtO.exe2⤵
- Executes dropped EXE
PID:1244
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5bab0e544101812865015019c49d914be
SHA16fa0b83462ccc967aa9ba6302c2138a341fbfee6
SHA256de7f9646c5935aefe5bf138876772a652962758bb2b732f432cf614ea6f5eeba
SHA512e19187ecab64bcbaa5eaf09578f2cc1e8c9debf72e75746589a51c0882fc9887c9c61c469f5ec9ff4cbce600048d253f1371ddf871b8cf2fa9a892c3ed66bd9f
-
Filesize
5.2MB
MD5ddbd70f175570003f8166e10f6ab442d
SHA11bc051c342a90acf057389339f4d700b570d8ca7
SHA256dd20730f8b6498292395a370b60f4f01014f2dbab0fcda01961ddd2f0e1b144c
SHA512424290fe4241320ba8a8e7984d02533dd06cbe7d9d738a8c1a264c97231792f27d900a797e00776edbd5a43e917be0c03a3e2b887d1f4dffb43abfc1c527ab39
-
Filesize
5.2MB
MD5767c0a2de3f34f1c44b3a30ba8147ca0
SHA178f1f6f86615f99cae98a47db4ef08669e739eca
SHA256d004529b05a87eb1d2c928ddd9d21ec3270c5e8ae842673b1acc70ec6273884e
SHA5125f23c1f88948b0ca868228a4a9b3e4abc0ca31015887a3874178ea7b651ae2a4e3eec4726cfa6b9cfcd7ae168aed68380fe2ce00cda7e3f062ec26fd3438a24f
-
Filesize
5.2MB
MD5e785ab06a0e63f106dbff97ecb8d196e
SHA19509ec01324ed830621914cd1b78a70e39d5224b
SHA25610a8fbae1be39261d4f040fb88a4df829423aa2baa37826a2eacbf463d2ba90c
SHA5121cec1e176d2eb0f53eecf7ddc20f995156a41a1ee115de167e1e27d5db41a6970004696db3e7b1c250c40874afc9949c3b323dd3bc2f35a9de86c46d6c788e27
-
Filesize
5.2MB
MD58abaccc18aced7a85ba078d5e625876c
SHA1560a3ba91e442290e9c97e8f49f9e60ed9112ba6
SHA256a8987a2fbd474cfb0909806132875843f70e8c98d5f2728aa1aefdf5e402ee96
SHA512b3b52dc071eb6773177abe9a47a875902bae8feb927ab70f6034d82ea0c4ef5a52fcf28d0dca9868608555478dfe17ffafa5cfb23b34207343e7cc09938c05d2
-
Filesize
5.2MB
MD5bea28c452b06b3a1822d2ec3d521795e
SHA17cfde94d3706a7f2c0008199855766a53ca4a90a
SHA256ff497079d6011f25a128a4176713fc040ef6f01e4b8a2211ffa05e6054cf0390
SHA512848f21941ba04aabeb442a4d05bb9f7ad05f4b7c055ef23475e6504ceff1762cb27d7bb64ed3fc7c0167cb0d92a1d1d1a93cb3ea60bf303753b6eb3d0e11f2bd
-
Filesize
5.2MB
MD50397daf37c48454df77dee1794c47aaf
SHA1f9872862496f305533404b8abcf7f1cf79b3226c
SHA256dff4c13f16dbc774e5cba6897ef0185fcfb52a4e0c2b683a288cad14f4ec1543
SHA512c15cf5c86f65f6d56f161316a39d4386cfe31f342f336ddfdf45c621259faba2b9c7dc82367e27d76ba9f2e3143d34f831107082f44953f16948aaec12d8af10
-
Filesize
5.2MB
MD5cbbac95be77edb0a2014a530497d2b54
SHA15a6c8c5352827fa6f166f77bc3313f7936ff6ef1
SHA256f2eeddb638835e9caf40c2f55c717584be62408405aaa41c7863fd2f83d8ef14
SHA51227eecf6dc08b071642e90a893c09f14b1e4d294c8e41a94ddba327cc2bdba69b933a085f8bab44a28536c438a29f4a7c12ab89688be7395829153be56e9b95b9
-
Filesize
5.2MB
MD53d22d33c18c8e429c4dc46cfdfec65af
SHA19eedf62a73725b4c6f7ed600b210895c20bbf58a
SHA25656ff4c1892d391587f1a0b1a9c29f303167a0bfa2ee205e59d014f5a3e51e80a
SHA5121d76c67808a3add8a0e73a4668753cf92c8cefe47b0e8360023b22209b80b1a62239c528344edd748b783135886599bdaeb0021468502098e3aeb4238de8c5ec
-
Filesize
5.2MB
MD59849348d89b17b40b6fa208887f6e4bb
SHA12dda70cc2ec6b0307e508cee4dc10129d81e2bed
SHA25696e3f9e34d80ea8230f81f44412714eea14354ff4f6b449edd0f63999657c17b
SHA5124cd2b51c9002b0b037ad7eae8803b8cecdb00dc205e6ce91f97a024b61706c01a6cb1aafaee046fb6e7a1c7547a5e33ca7cb0fa5a9ae966de960741ba78bcddd
-
Filesize
5.2MB
MD5435f0711cac8496eba9377df9c5eadf0
SHA19297523b6a768f360e74d334e61caa8add0e039f
SHA256b68527f6b93a6de89bf714485d78d8f1d0e8d6d558225914e7977dc88b0e8b87
SHA512257e54ff5ab608ff75db2d994e5da3ce81f70cb75b5f764df332f6c0856fe8a41f2f6c368890475720d4bc3de9d10567e9b0eb92e4b780eacb00d52c95dc40c2
-
Filesize
5.2MB
MD52351febfa6745a84c70afb5c6b1d2530
SHA1927cba03f2fa5d7a467a42ed45e3ec9978514aab
SHA25663d61e6e8fae7d947c7119afaa264d2af81c327be8b5d6bf37b1ce7fedb9b208
SHA5122725e9f100ddcf4bc58acfbbee9f2226a596a530564e25a116f80bd46958ce294c956cf02f99836660d15c6de88e0f3d705626363a0d133417b5f685fbcc9e11
-
Filesize
5.2MB
MD55cb7ca3a57d837da884ef372e183caf2
SHA10cccaaafe7d13445944a807bd7f5bcf44e372fcc
SHA2560c5f5ce8dc0515394e3d4ed073d302b3b66a8cd101d112f7ad47557943eaf49b
SHA512340977c1fb38a32ed5e61181caa3d6781ad607a871194ad334c39c5ce715f00fafe5eb2d6a229bb1dd5d027e58f82d49ee8a5aaa6fc238f09e5c24aff8d8a0ca
-
Filesize
5.2MB
MD5fabb7d01c6a71e7ca280e3426fac6187
SHA14b51fbba29fd5b3d567e5ba72ddf990b23e9f239
SHA256c38124048497e7bac6c03931bc478a33f78e9ab03b93f00f5f1665643bb84e79
SHA51240ce8be1ed4c967d75cc3df999f8ff1b4e84c5ce5aa9a030da9fbfaf1bbce22b0496fda61f7b782f5328a8bc3be8ac5ed4ca932aac198fdaa282ea25cd082e75
-
Filesize
5.2MB
MD537f54c0f9ae53eb8848e808a80bdcc4d
SHA1464f98c0cd2841b16fc4cda85b29a3a46948a3cf
SHA2560b9b6ea48350ed3d6315b311ae2d434df5dff84dcc1b2c8ae523025aec4dcc98
SHA5125b7f5d12d1fca2a5e18acc85841c4ecbc45125da6654bb36c6c4db2c8ec9c79972aebb2ec47e0c53095ae78e2dea7ff34e6ae850495a93b393e431d81a78b928
-
Filesize
5.2MB
MD598e783891dc4264ac1847855c48ce164
SHA1ae0413805363d287974dc28eee253ee21e080253
SHA25618fc1faa9a0b8d58002e0619279c692fb439be0eec9e228d713117c2069fab97
SHA512bfa6b5b5584dd897ae854f064aae3f90b7e202a967af738baaae5c008e8c9582f130740e3196832c30d1c42add58e4fe8c05578a1dfb04621c102a48bea759b5
-
Filesize
5.2MB
MD5d6e129b8ccaa9d2d4be1412b44fe7f13
SHA103ac08a0ec94676917fc19b93f9bf6064435c4e7
SHA2561fdd778eaab69b996a30fce920a4cf2d073693abb2c17f696c74f26ae35bb16d
SHA5122d73bbe8625c603541cb9682a309e41cbc484808490d1be3376f56df3bd8bca8a27e7e1aee5b5c914630b3f5c88b2bbd585ee9f93241880cfdbc0c1478217572
-
Filesize
5.2MB
MD5c73e77a7a7884728190f52d5418bf417
SHA163ed9aa9c5c1a8af3dbc1c30ff909faaef486ed0
SHA256c234ea2e97470950e45bc43cb4fd87f8ffcfefae5174656af4eea8102e6d7277
SHA5120c01a5c50fe727c301a58a4e159552243156ee5761e57f14fb29d8cf7b946d0a13c320f90d34e55bbdade368b12e757cfbe5df883fe5eda4b7d8acfb4c29a9bf
-
Filesize
5.2MB
MD55655dcc5b3667fb5d16d714f3e23e1ae
SHA14a8dd2e37cac162504e429b4a2229f44e60172a6
SHA2568962d0aa8114952f8e50f83c5aa7be48ba8e295e748188fb681e1ff1d689107b
SHA5124ea9b30d19df0087b675aaf7019d9512cc0678d2c9f80fb533d2f989a6a2c1f18df618e29f195167b660d289397f3418ce6e3cb46af80daedbbdbbfbd0862a04
-
Filesize
5.2MB
MD56b66d6f95b8d922e4c10007e34b30602
SHA149e0c1bc5fc332dec930f2fbd99374fbd35e37bb
SHA2564fb35d51767c4f6059a70a95110a9bf571418969465c154e591ea348ee6c7670
SHA512d0d1fd1b71103d1b48099c5a2965de7d42625f4e1331390a7a51759a8155e077546466d212ca2f69e0321d971e84b38d19cd5c3d5dc379cb32161ef3c22fb62b
-
Filesize
5.2MB
MD5b2249d3ea7043837103fb1cca46b56e4
SHA1266fc7073583ddef9fb57bd8ca05ddecac10c728
SHA256de931904839d60c324efd970be94823654cfc58f08f7ff7738b212ed3930ad76
SHA5129fa1e47db4638fe4d7470572be79c886bd8f53e330c3071c8ea5cf5dcd744bd3185cb1fd461721a2840b1b950df2594a67a5205f9ffb73cad113ad7307c0d319