Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe
Resource
win10v2004-20241007-en
General
-
Target
37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe
-
Size
739KB
-
MD5
af2a542f54000577664f54e2218b2283
-
SHA1
9b4e6ebc5426a6cfde433f7a001d70b12d202dc2
-
SHA256
37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5
-
SHA512
dfa485ede593451671b5fa6de7490efa7f4c1a8d9bd10f838304e6873156b37372a4ac5c4c60615d1b3cc3ca32bac3f75bdf3834eed617bd764fbb9a7d3f5c3e
-
SSDEEP
12288:ICQjgAtAHM+vetZxF5EWry8AJGy0UbpJbxjF1jAaGY1lNBuv+ob9vGvXCy1:I5ZWs+OZVEWry8AFZdvFH1lN8vLb9+vN
Malware Config
Extracted
cobaltstrike
http://43.143.168.10:8080/flDG
-
user_agent
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; MAGWJS)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe -
Executes dropped EXE 1 IoCs
pid Process 1984 QQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 756 wrote to memory of 2640 756 37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe 83 PID 756 wrote to memory of 2640 756 37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe 83 PID 756 wrote to memory of 2640 756 37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe 83 PID 756 wrote to memory of 1984 756 37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe 85 PID 756 wrote to memory of 1984 756 37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe 85 PID 2640 wrote to memory of 5116 2640 AcroRd32.exe 96 PID 2640 wrote to memory of 5116 2640 AcroRd32.exe 96 PID 2640 wrote to memory of 5116 2640 AcroRd32.exe 96 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2348 5116 RdrCEF.exe 97 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98 PID 5116 wrote to memory of 2692 5116 RdrCEF.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe"C:\Users\Admin\AppData\Local\Temp\37b7ef0d4d00b99958084264802d6678f1993b8d4a6ed968f56333f3690d85b5.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\王遵豪简历.pdf"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=88ACB924579B366576A3C7EDCE662FAB --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D15B1C1193B285C2913810F5A87E6A4E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D15B1C1193B285C2913810F5A87E6A4E --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=581912CF5ADE3CAFB372B9C0781DFD06 --mojo-platform-channel-handle=2336 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4764
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=390A7182B7AA7CF84489717DC24B3B9F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=390A7182B7AA7CF84489717DC24B3B9F --renderer-client-id=5 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=389A07A55699383CA7DE3D1D369278F5 --mojo-platform-channel-handle=2700 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4820
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=61216212980C753072001B1A55BE2FA4 --mojo-platform-channel-handle=2436 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\QQ.exe"C:\Users\Admin\AppData\Local\Temp\QQ.exe"2⤵
- Executes dropped EXE
PID:1984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5503dd734346dcb5e59b919ec111cdd27
SHA1a35a0ec42289aaea6f284bd6897ceda9d3f62b58
SHA2563acd46f0ae7e3c1568f1f5db5a8425fafaff9ec74ccda548074a8085f908097b
SHA51206b8c32dbbdbd709a4ecfd2bddaa2f0e39cc3a7443bf23ff50213cc7b0d830f7b188865bee9d30d4a86d46f87f1d76666b5a4b9e9f82f8bc327b7bff9885b1eb
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
19KB
MD50abf0cfd5c238c08297d830779bc92a9
SHA12f88bdfc6fb7f07dfc2d94b1658075805e5a4b42
SHA25655ccbac01139aa83ca3be72edc669306f295beacafd7b4aede0797ea8e5231a3
SHA5125a2669c00c518362c4dcc872027ed1144724dca44d0d7e9af1ddd573550a2cdf9df00f43bea96153d69bfbb3499535f316e195417b4d02276b840be213cf9f6f
-
Filesize
271KB
MD561ba05608218e1aa512336f165cca7c4
SHA18abe62564e700c238c2e9aa8627617e4c2bc1ee1
SHA256ab2145fa1377af1c7c8b33da5765aa427a403082259818a2d285ebce3d87aaf8
SHA512f93b78747108c090df8321fe7724747a8657d9f93ec2f1cca292ad80049dbbd0ac0ee8506c0686c5cf0329cfec8d053fb26d21e1dc37d27a74312ceaee9bb21d