Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe
Resource
win7-20240903-en
General
-
Target
e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe
-
Size
178KB
-
MD5
e569a1b41541d2e7a1bd0ac55d1826a0
-
SHA1
f7657cc8993c94ffc86174f0343f530040058d8b
-
SHA256
e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebb
-
SHA512
0cf26d15a30fcb320da15f12ee925bdd04f53a3ae3ce3db19fb458c32a7e42417787d28763fe83dbc4e025fa8afd1fbef9e81bd64699d50b1a1e29c29123d218
-
SSDEEP
3072:I7VNBmjq8Kmvn6rIVTYC7H2rAalUW4R6rv3p8WStxlQu2VCPw0:I7VzxYnWI6agAalr4UrPp8WStPQu28J
Malware Config
Extracted
netwire
wallou.publicvm.com:3365
mediafire.duckdns.org:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
DLL2
-
keylogger_dir
%AppData%\System\
-
lock_executable
true
-
mutex
KgpcGWmM
-
offline_keylogger
true
-
password
Reborn
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1464-18-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1464-15-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1464-13-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Netwire family
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1736 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 1464 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe -
Loads dropped DLL 1 IoCs
pid Process 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe -
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelCore = "C:\\ProgramData\\IntelCore\\IntelCore.exe" REG.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 276 set thread context of 1464 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 75 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 20 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2668 ping.exe 2836 ping.exe 2708 ping.exe 2320 ping.exe 2772 ping.exe 2584 ping.exe 1780 ping.exe 324 ping.exe 2436 ping.exe 692 ping.exe 2444 ping.exe 2136 ping.exe 408 ping.exe 340 ping.exe 2252 ping.exe 1840 ping.exe 2848 ping.exe 2896 ping.exe 2168 ping.exe 1664 ping.exe -
Runs ping.exe 1 TTPs 20 IoCs
pid Process 2896 ping.exe 2136 ping.exe 1840 ping.exe 2836 ping.exe 2708 ping.exe 2584 ping.exe 324 ping.exe 692 ping.exe 2168 ping.exe 408 ping.exe 2320 ping.exe 2848 ping.exe 2252 ping.exe 2772 ping.exe 2668 ping.exe 2436 ping.exe 340 ping.exe 1780 ping.exe 2444 ping.exe 1664 ping.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 276 wrote to memory of 2320 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 31 PID 276 wrote to memory of 2320 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 31 PID 276 wrote to memory of 2320 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 31 PID 276 wrote to memory of 2320 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 31 PID 276 wrote to memory of 2252 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 33 PID 276 wrote to memory of 2252 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 33 PID 276 wrote to memory of 2252 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 33 PID 276 wrote to memory of 2252 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 33 PID 276 wrote to memory of 1840 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 35 PID 276 wrote to memory of 1840 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 35 PID 276 wrote to memory of 1840 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 35 PID 276 wrote to memory of 1840 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 35 PID 276 wrote to memory of 2772 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 37 PID 276 wrote to memory of 2772 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 37 PID 276 wrote to memory of 2772 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 37 PID 276 wrote to memory of 2772 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 37 PID 276 wrote to memory of 2668 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 39 PID 276 wrote to memory of 2668 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 39 PID 276 wrote to memory of 2668 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 39 PID 276 wrote to memory of 2668 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 39 PID 276 wrote to memory of 2836 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 41 PID 276 wrote to memory of 2836 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 41 PID 276 wrote to memory of 2836 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 41 PID 276 wrote to memory of 2836 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 41 PID 276 wrote to memory of 2708 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 43 PID 276 wrote to memory of 2708 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 43 PID 276 wrote to memory of 2708 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 43 PID 276 wrote to memory of 2708 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 43 PID 276 wrote to memory of 2584 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 45 PID 276 wrote to memory of 2584 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 45 PID 276 wrote to memory of 2584 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 45 PID 276 wrote to memory of 2584 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 45 PID 276 wrote to memory of 1780 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 47 PID 276 wrote to memory of 1780 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 47 PID 276 wrote to memory of 1780 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 47 PID 276 wrote to memory of 1780 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 47 PID 276 wrote to memory of 324 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 49 PID 276 wrote to memory of 324 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 49 PID 276 wrote to memory of 324 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 49 PID 276 wrote to memory of 324 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 49 PID 276 wrote to memory of 1736 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 51 PID 276 wrote to memory of 1736 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 51 PID 276 wrote to memory of 1736 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 51 PID 276 wrote to memory of 1736 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 51 PID 276 wrote to memory of 1208 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 53 PID 276 wrote to memory of 1208 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 53 PID 276 wrote to memory of 1208 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 53 PID 276 wrote to memory of 1208 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 53 PID 276 wrote to memory of 692 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 54 PID 276 wrote to memory of 692 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 54 PID 276 wrote to memory of 692 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 54 PID 276 wrote to memory of 692 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 54 PID 276 wrote to memory of 2444 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 57 PID 276 wrote to memory of 2444 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 57 PID 276 wrote to memory of 2444 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 57 PID 276 wrote to memory of 2444 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 57 PID 276 wrote to memory of 2848 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 59 PID 276 wrote to memory of 2848 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 59 PID 276 wrote to memory of 2848 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 59 PID 276 wrote to memory of 2848 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 59 PID 276 wrote to memory of 2896 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 61 PID 276 wrote to memory of 2896 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 61 PID 276 wrote to memory of 2896 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 61 PID 276 wrote to memory of 2896 276 e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe 61 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1736 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe"C:\Users\Admin\AppData\Local\Temp\e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2320
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2252
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1840
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2772
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2668
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2836
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2708
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2584
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1780
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:324
-
-
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe2⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1736
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1208
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:692
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2444
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2848
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2896
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2136
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2168
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:408
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2436
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:340
-
-
C:\Windows\SysWOW64\ping.exeC:\Windows\System32\ping.exe google.com2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe"C:\Users\Admin\AppData\Local\Temp\e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "IntelCore" /t REG_SZ /F /D "C:\ProgramData\IntelCore\IntelCore.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5f662a0786bc0a61edd94691250a124d7
SHA16aa5f417d333f9e20c8219fc58fe7941470c0095
SHA25639eb257581fff3298b935d0511a13675d5095019b8e7a5d4ecd3a2c85a742325
SHA51271424f11415528e3c7797404d45157796c0cc44608fd6d6200ebfd86408092793fd9fcf48a8dedf9112aa408c084c73cc8ac0108d139b94165229d81b95d5cc6
-
\Users\Admin\AppData\Local\Temp\e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebbN.exe
Filesize178KB
MD5e569a1b41541d2e7a1bd0ac55d1826a0
SHA1f7657cc8993c94ffc86174f0343f530040058d8b
SHA256e71c2ff6a3436c7db33d2c5449d7a313925911b06d958337e6b9fb241ce97ebb
SHA5120cf26d15a30fcb320da15f12ee925bdd04f53a3ae3ce3db19fb458c32a7e42417787d28763fe83dbc4e025fa8afd1fbef9e81bd64699d50b1a1e29c29123d218