Analysis
-
max time kernel
111s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 12:56
Behavioral task
behavioral1
Sample
a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe
Resource
win7-20241010-en
General
-
Target
a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe
-
Size
5.2MB
-
MD5
f60891ab856d2f3a9c4a2f65576c6d20
-
SHA1
5dd7aa9b1205e76e543d8e734839c12503525ceb
-
SHA256
a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337
-
SHA512
8b857ddde10ec0758d4ae2a206535bcfacc9c363895fd39306ddac53a7baa023ab6a2238899a73d0bc51713444ce9778a1f634d2e0c11118d75756dcc8b18785
-
SSDEEP
49152:ROdWCCi7/ras56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l5:RWWBibf56utgpPFotBER/mQ32lUF
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral2/files/0x000c000000023b29-5.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8b-7.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8a-10.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8c-23.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8e-30.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8f-42.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b93-61.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b95-81.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b98-95.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b9a-103.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b99-115.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b9c-127.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b9b-125.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b97-121.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b96-100.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b94-78.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b92-75.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b91-65.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b90-62.dat cobalt_reflective_dll behavioral2/files/0x000d000000023b83-44.dat cobalt_reflective_dll behavioral2/files/0x000a000000023b8d-39.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Xmrig family
-
XMRig Miner payload 46 IoCs
resource yara_rule behavioral2/memory/3940-131-0x00007FF645DB0000-0x00007FF646101000-memory.dmp xmrig behavioral2/memory/2392-130-0x00007FF77E700000-0x00007FF77EA51000-memory.dmp xmrig behavioral2/memory/3688-129-0x00007FF69CC50000-0x00007FF69CFA1000-memory.dmp xmrig behavioral2/memory/3124-124-0x00007FF6ACB90000-0x00007FF6ACEE1000-memory.dmp xmrig behavioral2/memory/1508-98-0x00007FF7BB860000-0x00007FF7BBBB1000-memory.dmp xmrig behavioral2/memory/2216-88-0x00007FF634DC0000-0x00007FF635111000-memory.dmp xmrig behavioral2/memory/1640-77-0x00007FF64DC70000-0x00007FF64DFC1000-memory.dmp xmrig behavioral2/memory/2216-132-0x00007FF634DC0000-0x00007FF635111000-memory.dmp xmrig behavioral2/memory/1108-135-0x00007FF635CB0000-0x00007FF636001000-memory.dmp xmrig behavioral2/memory/2772-134-0x00007FF7BE650000-0x00007FF7BE9A1000-memory.dmp xmrig behavioral2/memory/4988-133-0x00007FF6ACD00000-0x00007FF6AD051000-memory.dmp xmrig behavioral2/memory/4792-142-0x00007FF645E10000-0x00007FF646161000-memory.dmp xmrig behavioral2/memory/1780-145-0x00007FF6EAFC0000-0x00007FF6EB311000-memory.dmp xmrig behavioral2/memory/5072-144-0x00007FF707150000-0x00007FF7074A1000-memory.dmp xmrig behavioral2/memory/4552-155-0x00007FF69E8B0000-0x00007FF69EC01000-memory.dmp xmrig behavioral2/memory/3980-153-0x00007FF7F5E50000-0x00007FF7F61A1000-memory.dmp xmrig behavioral2/memory/1692-152-0x00007FF601B10000-0x00007FF601E61000-memory.dmp xmrig behavioral2/memory/1168-150-0x00007FF7D4A80000-0x00007FF7D4DD1000-memory.dmp xmrig behavioral2/memory/1640-148-0x00007FF64DC70000-0x00007FF64DFC1000-memory.dmp xmrig behavioral2/memory/4812-151-0x00007FF659F90000-0x00007FF65A2E1000-memory.dmp xmrig behavioral2/memory/1592-149-0x00007FF69B340000-0x00007FF69B691000-memory.dmp xmrig behavioral2/memory/1260-147-0x00007FF761B50000-0x00007FF761EA1000-memory.dmp xmrig behavioral2/memory/1216-146-0x00007FF7E27D0000-0x00007FF7E2B21000-memory.dmp xmrig behavioral2/memory/3480-157-0x00007FF68FF40000-0x00007FF690291000-memory.dmp xmrig behavioral2/memory/2216-158-0x00007FF634DC0000-0x00007FF635111000-memory.dmp xmrig behavioral2/memory/1508-217-0x00007FF7BB860000-0x00007FF7BBBB1000-memory.dmp xmrig behavioral2/memory/3124-219-0x00007FF6ACB90000-0x00007FF6ACEE1000-memory.dmp xmrig behavioral2/memory/3688-221-0x00007FF69CC50000-0x00007FF69CFA1000-memory.dmp xmrig behavioral2/memory/4988-223-0x00007FF6ACD00000-0x00007FF6AD051000-memory.dmp xmrig behavioral2/memory/1108-225-0x00007FF635CB0000-0x00007FF636001000-memory.dmp xmrig behavioral2/memory/4792-227-0x00007FF645E10000-0x00007FF646161000-memory.dmp xmrig behavioral2/memory/1216-230-0x00007FF7E27D0000-0x00007FF7E2B21000-memory.dmp xmrig behavioral2/memory/2772-233-0x00007FF7BE650000-0x00007FF7BE9A1000-memory.dmp xmrig behavioral2/memory/5072-232-0x00007FF707150000-0x00007FF7074A1000-memory.dmp xmrig behavioral2/memory/1780-235-0x00007FF6EAFC0000-0x00007FF6EB311000-memory.dmp xmrig behavioral2/memory/1640-248-0x00007FF64DC70000-0x00007FF64DFC1000-memory.dmp xmrig behavioral2/memory/1260-249-0x00007FF761B50000-0x00007FF761EA1000-memory.dmp xmrig behavioral2/memory/1592-246-0x00007FF69B340000-0x00007FF69B691000-memory.dmp xmrig behavioral2/memory/1168-251-0x00007FF7D4A80000-0x00007FF7D4DD1000-memory.dmp xmrig behavioral2/memory/4812-253-0x00007FF659F90000-0x00007FF65A2E1000-memory.dmp xmrig behavioral2/memory/3980-255-0x00007FF7F5E50000-0x00007FF7F61A1000-memory.dmp xmrig behavioral2/memory/2392-257-0x00007FF77E700000-0x00007FF77EA51000-memory.dmp xmrig behavioral2/memory/4552-265-0x00007FF69E8B0000-0x00007FF69EC01000-memory.dmp xmrig behavioral2/memory/1692-264-0x00007FF601B10000-0x00007FF601E61000-memory.dmp xmrig behavioral2/memory/3480-262-0x00007FF68FF40000-0x00007FF690291000-memory.dmp xmrig behavioral2/memory/3940-260-0x00007FF645DB0000-0x00007FF646101000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 1508 pJrhxEj.exe 3124 TweSfWh.exe 3688 HcCrPnp.exe 4988 IUTFOPE.exe 2772 zFuBdyK.exe 1108 nqEYhrh.exe 4792 xmdlHLY.exe 5072 Mnovezr.exe 1780 uLKfGEX.exe 1216 GopzslE.exe 1640 VeVoejE.exe 1260 lFIjXEG.exe 1592 WcPCCbw.exe 1168 etgQkkx.exe 4812 TqwDqqG.exe 3980 zGiwDpW.exe 2392 mDzrOUS.exe 1692 qXutapm.exe 4552 gmRSmKb.exe 3940 tnLEsMp.exe 3480 bfLNVrc.exe -
resource yara_rule behavioral2/memory/2216-0-0x00007FF634DC0000-0x00007FF635111000-memory.dmp upx behavioral2/files/0x000c000000023b29-5.dat upx behavioral2/files/0x000a000000023b8b-7.dat upx behavioral2/memory/1508-8-0x00007FF7BB860000-0x00007FF7BBBB1000-memory.dmp upx behavioral2/files/0x000a000000023b8a-10.dat upx behavioral2/memory/3124-11-0x00007FF6ACB90000-0x00007FF6ACEE1000-memory.dmp upx behavioral2/files/0x000a000000023b8c-23.dat upx behavioral2/files/0x000a000000023b8e-30.dat upx behavioral2/files/0x000a000000023b8f-42.dat upx behavioral2/memory/1108-43-0x00007FF635CB0000-0x00007FF636001000-memory.dmp upx behavioral2/files/0x000a000000023b93-61.dat upx behavioral2/memory/1216-67-0x00007FF7E27D0000-0x00007FF7E2B21000-memory.dmp upx behavioral2/memory/1260-71-0x00007FF761B50000-0x00007FF761EA1000-memory.dmp upx behavioral2/files/0x000a000000023b95-81.dat upx behavioral2/files/0x000a000000023b98-95.dat upx behavioral2/files/0x000a000000023b9a-103.dat upx behavioral2/memory/4812-105-0x00007FF659F90000-0x00007FF65A2E1000-memory.dmp upx behavioral2/files/0x000a000000023b99-115.dat upx behavioral2/memory/3480-123-0x00007FF68FF40000-0x00007FF690291000-memory.dmp upx behavioral2/memory/3940-131-0x00007FF645DB0000-0x00007FF646101000-memory.dmp upx behavioral2/memory/2392-130-0x00007FF77E700000-0x00007FF77EA51000-memory.dmp upx behavioral2/memory/3688-129-0x00007FF69CC50000-0x00007FF69CFA1000-memory.dmp upx behavioral2/files/0x000a000000023b9c-127.dat upx behavioral2/files/0x000a000000023b9b-125.dat upx behavioral2/memory/3124-124-0x00007FF6ACB90000-0x00007FF6ACEE1000-memory.dmp upx behavioral2/files/0x000a000000023b97-121.dat upx behavioral2/memory/4552-118-0x00007FF69E8B0000-0x00007FF69EC01000-memory.dmp upx behavioral2/memory/1692-117-0x00007FF601B10000-0x00007FF601E61000-memory.dmp upx behavioral2/memory/3980-109-0x00007FF7F5E50000-0x00007FF7F61A1000-memory.dmp upx behavioral2/files/0x000a000000023b96-100.dat upx behavioral2/memory/1508-98-0x00007FF7BB860000-0x00007FF7BBBB1000-memory.dmp upx behavioral2/memory/1168-89-0x00007FF7D4A80000-0x00007FF7D4DD1000-memory.dmp upx behavioral2/memory/2216-88-0x00007FF634DC0000-0x00007FF635111000-memory.dmp upx behavioral2/memory/1592-83-0x00007FF69B340000-0x00007FF69B691000-memory.dmp upx behavioral2/files/0x000a000000023b94-78.dat upx behavioral2/memory/1640-77-0x00007FF64DC70000-0x00007FF64DFC1000-memory.dmp upx behavioral2/files/0x000a000000023b92-75.dat upx behavioral2/files/0x000a000000023b91-65.dat upx behavioral2/files/0x000a000000023b90-62.dat upx behavioral2/memory/1780-60-0x00007FF6EAFC0000-0x00007FF6EB311000-memory.dmp upx behavioral2/memory/5072-55-0x00007FF707150000-0x00007FF7074A1000-memory.dmp upx behavioral2/memory/4792-46-0x00007FF645E10000-0x00007FF646161000-memory.dmp upx behavioral2/files/0x000d000000023b83-44.dat upx behavioral2/memory/2772-36-0x00007FF7BE650000-0x00007FF7BE9A1000-memory.dmp upx behavioral2/files/0x000a000000023b8d-39.dat upx behavioral2/memory/4988-28-0x00007FF6ACD00000-0x00007FF6AD051000-memory.dmp upx behavioral2/memory/3688-21-0x00007FF69CC50000-0x00007FF69CFA1000-memory.dmp upx behavioral2/memory/2216-132-0x00007FF634DC0000-0x00007FF635111000-memory.dmp upx behavioral2/memory/1108-135-0x00007FF635CB0000-0x00007FF636001000-memory.dmp upx behavioral2/memory/2772-134-0x00007FF7BE650000-0x00007FF7BE9A1000-memory.dmp upx behavioral2/memory/4988-133-0x00007FF6ACD00000-0x00007FF6AD051000-memory.dmp upx behavioral2/memory/4792-142-0x00007FF645E10000-0x00007FF646161000-memory.dmp upx behavioral2/memory/1780-145-0x00007FF6EAFC0000-0x00007FF6EB311000-memory.dmp upx behavioral2/memory/5072-144-0x00007FF707150000-0x00007FF7074A1000-memory.dmp upx behavioral2/memory/4552-155-0x00007FF69E8B0000-0x00007FF69EC01000-memory.dmp upx behavioral2/memory/3980-153-0x00007FF7F5E50000-0x00007FF7F61A1000-memory.dmp upx behavioral2/memory/1692-152-0x00007FF601B10000-0x00007FF601E61000-memory.dmp upx behavioral2/memory/1168-150-0x00007FF7D4A80000-0x00007FF7D4DD1000-memory.dmp upx behavioral2/memory/1640-148-0x00007FF64DC70000-0x00007FF64DFC1000-memory.dmp upx behavioral2/memory/4812-151-0x00007FF659F90000-0x00007FF65A2E1000-memory.dmp upx behavioral2/memory/1592-149-0x00007FF69B340000-0x00007FF69B691000-memory.dmp upx behavioral2/memory/1260-147-0x00007FF761B50000-0x00007FF761EA1000-memory.dmp upx behavioral2/memory/1216-146-0x00007FF7E27D0000-0x00007FF7E2B21000-memory.dmp upx behavioral2/memory/3480-157-0x00007FF68FF40000-0x00007FF690291000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\bfLNVrc.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\IUTFOPE.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\xmdlHLY.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\uLKfGEX.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\qXutapm.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\zGiwDpW.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\etgQkkx.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\gmRSmKb.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\nqEYhrh.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\GopzslE.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\lFIjXEG.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\VeVoejE.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\WcPCCbw.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\HcCrPnp.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\TqwDqqG.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\mDzrOUS.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\tnLEsMp.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\pJrhxEj.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\TweSfWh.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\zFuBdyK.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe File created C:\Windows\System\Mnovezr.exe a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe Token: SeLockMemoryPrivilege 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1508 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 84 PID 2216 wrote to memory of 1508 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 84 PID 2216 wrote to memory of 3124 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 85 PID 2216 wrote to memory of 3124 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 85 PID 2216 wrote to memory of 3688 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 86 PID 2216 wrote to memory of 3688 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 86 PID 2216 wrote to memory of 4988 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 87 PID 2216 wrote to memory of 4988 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 87 PID 2216 wrote to memory of 2772 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 88 PID 2216 wrote to memory of 2772 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 88 PID 2216 wrote to memory of 1108 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 89 PID 2216 wrote to memory of 1108 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 89 PID 2216 wrote to memory of 4792 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 90 PID 2216 wrote to memory of 4792 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 90 PID 2216 wrote to memory of 5072 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 91 PID 2216 wrote to memory of 5072 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 91 PID 2216 wrote to memory of 1780 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 92 PID 2216 wrote to memory of 1780 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 92 PID 2216 wrote to memory of 1216 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 93 PID 2216 wrote to memory of 1216 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 93 PID 2216 wrote to memory of 1260 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 94 PID 2216 wrote to memory of 1260 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 94 PID 2216 wrote to memory of 1640 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 95 PID 2216 wrote to memory of 1640 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 95 PID 2216 wrote to memory of 1592 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 96 PID 2216 wrote to memory of 1592 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 96 PID 2216 wrote to memory of 1168 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 97 PID 2216 wrote to memory of 1168 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 97 PID 2216 wrote to memory of 4812 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 98 PID 2216 wrote to memory of 4812 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 98 PID 2216 wrote to memory of 1692 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 99 PID 2216 wrote to memory of 1692 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 99 PID 2216 wrote to memory of 3980 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 100 PID 2216 wrote to memory of 3980 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 100 PID 2216 wrote to memory of 2392 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 101 PID 2216 wrote to memory of 2392 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 101 PID 2216 wrote to memory of 4552 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 102 PID 2216 wrote to memory of 4552 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 102 PID 2216 wrote to memory of 3940 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 103 PID 2216 wrote to memory of 3940 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 103 PID 2216 wrote to memory of 3480 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 104 PID 2216 wrote to memory of 3480 2216 a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe"C:\Users\Admin\AppData\Local\Temp\a49cade162d70bd2c12a1b085c680361770b0e2dbf0512840a379b433e86c337N.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\System\pJrhxEj.exeC:\Windows\System\pJrhxEj.exe2⤵
- Executes dropped EXE
PID:1508
-
-
C:\Windows\System\TweSfWh.exeC:\Windows\System\TweSfWh.exe2⤵
- Executes dropped EXE
PID:3124
-
-
C:\Windows\System\HcCrPnp.exeC:\Windows\System\HcCrPnp.exe2⤵
- Executes dropped EXE
PID:3688
-
-
C:\Windows\System\IUTFOPE.exeC:\Windows\System\IUTFOPE.exe2⤵
- Executes dropped EXE
PID:4988
-
-
C:\Windows\System\zFuBdyK.exeC:\Windows\System\zFuBdyK.exe2⤵
- Executes dropped EXE
PID:2772
-
-
C:\Windows\System\nqEYhrh.exeC:\Windows\System\nqEYhrh.exe2⤵
- Executes dropped EXE
PID:1108
-
-
C:\Windows\System\xmdlHLY.exeC:\Windows\System\xmdlHLY.exe2⤵
- Executes dropped EXE
PID:4792
-
-
C:\Windows\System\Mnovezr.exeC:\Windows\System\Mnovezr.exe2⤵
- Executes dropped EXE
PID:5072
-
-
C:\Windows\System\uLKfGEX.exeC:\Windows\System\uLKfGEX.exe2⤵
- Executes dropped EXE
PID:1780
-
-
C:\Windows\System\GopzslE.exeC:\Windows\System\GopzslE.exe2⤵
- Executes dropped EXE
PID:1216
-
-
C:\Windows\System\lFIjXEG.exeC:\Windows\System\lFIjXEG.exe2⤵
- Executes dropped EXE
PID:1260
-
-
C:\Windows\System\VeVoejE.exeC:\Windows\System\VeVoejE.exe2⤵
- Executes dropped EXE
PID:1640
-
-
C:\Windows\System\WcPCCbw.exeC:\Windows\System\WcPCCbw.exe2⤵
- Executes dropped EXE
PID:1592
-
-
C:\Windows\System\etgQkkx.exeC:\Windows\System\etgQkkx.exe2⤵
- Executes dropped EXE
PID:1168
-
-
C:\Windows\System\TqwDqqG.exeC:\Windows\System\TqwDqqG.exe2⤵
- Executes dropped EXE
PID:4812
-
-
C:\Windows\System\qXutapm.exeC:\Windows\System\qXutapm.exe2⤵
- Executes dropped EXE
PID:1692
-
-
C:\Windows\System\zGiwDpW.exeC:\Windows\System\zGiwDpW.exe2⤵
- Executes dropped EXE
PID:3980
-
-
C:\Windows\System\mDzrOUS.exeC:\Windows\System\mDzrOUS.exe2⤵
- Executes dropped EXE
PID:2392
-
-
C:\Windows\System\gmRSmKb.exeC:\Windows\System\gmRSmKb.exe2⤵
- Executes dropped EXE
PID:4552
-
-
C:\Windows\System\tnLEsMp.exeC:\Windows\System\tnLEsMp.exe2⤵
- Executes dropped EXE
PID:3940
-
-
C:\Windows\System\bfLNVrc.exeC:\Windows\System\bfLNVrc.exe2⤵
- Executes dropped EXE
PID:3480
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5ce74220f4a492c5abebc5364e030bc16
SHA19c50f5c490febe1d6b275eb0d8427a5cdbc1ce77
SHA2563c518625e5dc1fc08ef6bd813d636009a1a262af8614b3e01a028260375827d4
SHA512dc58a07e655b80c76028c45050cac2b19faa5b703f6d60d823085b28776d743ce61f2d79523b9586ffde276a0a9d544b669e959f7af74f33ec5e6b38dfbb95c2
-
Filesize
5.2MB
MD5ba8e11f34d68e43360b316d0e1d317b4
SHA1716ab393212c5c1ba9180f2f64bc274f9cbfaeef
SHA256c0745feffc604e6e38585524b34a14f71f793ff1f05b3c8c56214c9b64d646c8
SHA512f265343d574406129c5e10b2b33c2f5948e771e849cbd023c5f25d1ea09bbf25ef5b1edf34cd15b6e8b7459e5c568fb61701526f436b3b16ba36687990e034e2
-
Filesize
5.2MB
MD5f32daeb89dde211e236989b1bdcd514f
SHA14a9828c1247569097df5e8c97b5bbf4ff4a44da3
SHA2568f588a1b524d5e73a39052d4c21acb98c4495ac3ae81424fa0b1acc9c7dc4965
SHA5126c3858d03e26d2f3ee4bc0a48198bcb16d6cbe06b1b91522196fb2160d9672c8002148660aea52fa6b72797c9a1300eefc68542de7cd9ed13af632e8e8afdfd2
-
Filesize
5.2MB
MD5ef48f6158d5778c8cba9a35ac4358b3e
SHA1afb9c3fb8127f1377a80576b709571638790cf51
SHA256ee3ec4d280297a174a5fd12ad9f3369f3c4df9db106961bfa0331cfee66bc24e
SHA512f9b5d02d8d197124c86862eb1c91ec5b09123d88ea42db7bd529009a140dd94c4e8e71f48c559f7836c335cbb2caabe24bdb3e90e14e29f6e02eaf564f947f99
-
Filesize
5.2MB
MD57bda64276f6c7f9cfa3d81cf3a48af3f
SHA146231f875cd6e81d8b10b937ce06e4dcffe634b6
SHA2569b5ff7d39626364f014e8299e5fd0c7995f47ebed9a95aefc695341e43978fd6
SHA512162e027f806a5ca091494506daacc440242dc09023189f516fc594c06f487dc2494c31ed302d830efc99f43a283aaa651c026cf48df3eaf16e25b1eabc712696
-
Filesize
5.2MB
MD59abdf824c4b5ef7f8b7c963965062ce5
SHA181101a5384a94db8d8240b9db78f288bb1c5aade
SHA2566350ca54e7bf201542035c722ca050fee5a8a33790e8509d306e023713de7cc3
SHA512dcaea3a0eebf07ed5cbf0f4e20a1627fe4b2abe22df7c452b85ad76f847de96a77c0a4c4ab04aa6760bec2689514fafb563e24e9f079a8947c4e7ec7ef2c0c03
-
Filesize
5.2MB
MD565e996c102909d6492a75457c61ea514
SHA1193c8bcb7812545524ee689aa933735a836b92ff
SHA256a3d6fe0acb45b60facf54bb63a2ef1b65ea1933f3dd78af300ac7e47cdc1bdbb
SHA512bd102c3980aea789ced39b1753d9c5f7a72e3e48512772ef63d115d9a930f2010dc3b5b34097de71e8fe199c66405fc43e138a49ec43990ea2931e860122716f
-
Filesize
5.2MB
MD54a64e34fb701128240aeb193dca5378e
SHA19d12e36bfe73feee25fe3f456f2c722fe6e84dde
SHA2568f98700543d1b35c9a117c1033437e78f73610a9ebf92cfc86a59087070629b1
SHA512b1b8553d8f64c7cedf19bad53d59edf9f0480ec8113e7a665ee12433d8082b93f04c221650851535b80c9c7f15da76b5a153850bbb76dd35a158ea692ec9b048
-
Filesize
5.2MB
MD5643aba05a10b93999cc658c887e233e3
SHA136312da32b026a478792d7465ea27e7ae6c4da73
SHA2569b3c1b05d77ab2b6f4953a5458a036015d265c9b11985a428d173f22bf2eb77d
SHA512b490ce124b25814871f11ebb0e89117d0dbb336cab2ae6e29f1156e21d694ea0d18741dc8590b5a0a676c48cb4876466422fc29bcbbaf45e0b56dd1b45b38cdc
-
Filesize
5.2MB
MD588948758168aa3baecbed1973b561fed
SHA13718697baaad22ccc737a367560c59b3e6022142
SHA256d38e6996bc451afef75da5df66f83522956e7c5fe937fbbeb67bd60d3853b47a
SHA51206f92fefa8e2500cc683de863797cd7620933fbff999305527df2e3202e41b032a2b1c6d1599ec05864162a30bb3c4511d2c6a976a8a6d9de4283eb27375b7e1
-
Filesize
5.2MB
MD53494a5456953a3a1976fc38f11e7e29b
SHA122abf272502116ce9789fad0cd2b37a7b0ecd004
SHA2566394195a02bcea11eb0542228c3c73465b3aeb2c144d1b9169381b5774f99cd2
SHA51222592a0897fde03556207af12146d1323791db72f749fbea0cde21a81f0b6fd68029d66577e72d8911fc1ab941e1800b3d5428315b8697082c10b47013b96374
-
Filesize
5.2MB
MD553301bb8bedbc821cfa1dba6e0aa04bf
SHA1ef6b852c298d20b9eed95b1b9a64c0323f483e24
SHA2566c13888fcd4d3502295103e15610a5de18574e540dbf08c802488ff97bfd919c
SHA512453cefeefeb5f9c7281e328f8c57b1037e86fbbcfb11c2b223a4affa0d548a831d9967aaad7b60c2ae38769eebb3d43406e72d5f3f7c4b22ef5ba14e963f9889
-
Filesize
5.2MB
MD58b2b9d7807f1480d6ad753cfc3e4dd13
SHA16426f0360e08ee85acce5029968ec24b06b41de2
SHA2561ef779792289096c8cf50012bbb434fff77bb3d57baddf0f6b2029f87f0f6545
SHA5121194c1fcaf3518d3c5796abc3adaa2af4bd7d276de8b4f22e92726c6f1c9a636f89b8d3047c988a3f6e9e062c40affc41cb8ee28f79ae61799e534ac6d2a5407
-
Filesize
5.2MB
MD5a5529d9f6311d8e70ea87f09f32f95d0
SHA1aa7920e13d2968922f1c9b2af7e45cf006bf937f
SHA256204efa8be3ce9635cbc696962c722ac02ce0fc9e3b5dcb5d2169bdda89767c8d
SHA512530dfca40989070efdc2875b04b97d44a925e345188d3dea22cc86228522b7eddf058263ce7d45f4fd6a02fbbedfc297ef7496eaf5233e835ec4f7dfe5e61917
-
Filesize
5.2MB
MD50c2bd8531cd5e35023365efb2a763b67
SHA104677e04950647ceef1d23d1dc5695c81d939970
SHA25619e9fba3fcdee0190cfea42785847872f7df8c6131a9aa9bbe6503b663c8b29e
SHA5126d68c39b5571a409429f32692ee0011bfaae134711a571a1429b9559ac5dff7e237bc95810f216b5e47c28b2fbf1be52bf9f56b0e1ea9b64b2171c68ab4abf27
-
Filesize
5.2MB
MD57349dde126b40b98152d819d496947fc
SHA14f25669c438c8d36e788e3fd18a65f7de1619d3e
SHA2565e308a9f51c43fbadc49d9e73d9acc50c770120b26762553141202fb8aef149b
SHA512919620285f48a8c7baa0fba3d2d4931a85c19a8876a8e047d67d57330308e396cca618fcfc2638429407d251e937ae03d7e107de6259d5e27c93fa578b8e9479
-
Filesize
5.2MB
MD5eff45fa39af7aec1376291edc9424db0
SHA1760c3a2543630392a56dd1b02ffbe2e32c889157
SHA256eddf32fad1e8b2467bcc3a8cc6d89d3bd1d5bf01cd7b971f646e7ddc88fc41c3
SHA512424a5a56c6091e226c911c61c9706342309ec97d11e406b6d6f3102e9642d5c8bd366a6aa4dbf7f764b0b57474193c2f98c953e92b2eefd0bfb8957e16485082
-
Filesize
5.2MB
MD52db5fd028b67d301c604b4a352b10221
SHA16f21e4082c07e8c9cf179d800a31eb185a9d0039
SHA2565d4b564d6e010338138bab4d03ef98f79c4b5e58b4d43831bf11b1659146d4d7
SHA512258d30d200e4d971d7416a01ca462adceb7d35918b7522ee7de6569a2dcfae45990bc64edc7b17a5f4354568d3d416b000cefa27090b35200a802c8af2f7e9d8
-
Filesize
5.2MB
MD5d6f487d19a0b80cef0627ebfa6dea471
SHA1a9e3d48ebf2134059762e9d72b1c91674239652e
SHA256b9bdec150eda022b9bd3d38c8c2148a042bb2ba8535fbd31878927f03d281a2a
SHA512e66182fc1de527f1e22e9146b576a3d9fd48f458d18f51eafe4be4e3fa4a961a7cb839d62fa4a2c525fe7d0ef5760f64b91fb92dabb84afa47cc05e40be33958
-
Filesize
5.2MB
MD5f4b71116f16d1025fcf97f05fb39eaa0
SHA1666478899e022a9ca0f5c109ffcaeab5236bc288
SHA2566ff5bb537f847e6b4a871fd0b5838357220c55d1eb8b7da26efca9c6e9ba575b
SHA512e33b2f27c7ed69cb2ea9afaff5c3cf95bc28cac04f6280451582568bd0e1a192ae1b54edacdf857e79c6b4050ae4854768982dc7354b3eba8e2e54f1f7168c27
-
Filesize
5.2MB
MD54d41eb7e7601526fb19065829a6858e3
SHA164a3d838dadd9d39bb6b86f7adb92cc0ce3891a2
SHA25650c599f0f04bf9347c55d8bdc482168929c26020500ae4e1d7c0b48a678837d5
SHA5121000e0aa9b1bb99e43e028162632f308cd093128c7527be865a8cd89794e5891e96107a1d999a9f4c689cca39e6fce73c818cef9c12f0f004ef63cc4271d5aef