Overview
overview
10Static
static
37fedcec3a3...32.exe
windows7-x64
77fedcec3a3...32.exe
windows10-2004-x64
10$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3NSIS.exe
windows10-2004-x64
10d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...IS.exe
windows7-x64
7$R0/Uninst...IS.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3Analysis
-
max time kernel
91s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
7fedcec3a38dec8650ae2f64271b19c01372881ce83f1fe4597f85b26c4a0732.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7fedcec3a38dec8650ae2f64271b19c01372881ce83f1fe4597f85b26c4a0732.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
LICENSES.chromium.html
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
LICENSES.chromium.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
NSIS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
d3dcompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
ffmpeg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
libEGL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
libGLESv2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
resources/elevate.exe
Resource
win7-20241023-en
Behavioral task
behavioral17
Sample
resources/elevate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
vk_swiftshader.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
vulkan-1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
$R0/Uninstall NSIS.exe
Resource
win7-20241023-en
Behavioral task
behavioral25
Sample
$R0/Uninstall NSIS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20241010-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20241023-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
General
-
Target
NSIS.exe
-
Size
180.1MB
-
MD5
bd4906b9305afec35a88a3387bcb9fac
-
SHA1
1d32e6f1c6ba770c3b2625d0241be0f2d4581b5d
-
SHA256
a674229c90366a8300ad63c8ae675c2bc1c12307bccb00ae818dfa67c1955bf5
-
SHA512
40966c176eaf9e025597599cb99532b3c36c3e72bcf991b95a450eb26f663b61a79933d741cce807e18c198239e3c49973189e9eb2cdbaf4b29115a6c25ff09a
-
SSDEEP
1572864:1wl41lgY+w9QLv1JWYc6UeOtUUGQUT1jdu4BPPuuwT2GOqiB1sr7zjg7ob753oUV:rF4oD0QdG09P
Malware Config
Extracted
remcos
RemoteHost
185.42.12.39:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
jesusapt
-
mouse_option
false
-
mutex
JESUSAPT-7R4T5W
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 2976 powershell.exe 324 powershell.exe 840 powershell.exe 880 powershell.exe 232 powershell.exe 324 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyElectronApp.lnk powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 5012 winSAT.exe 3132 winSAT.exe 4896 Bginfo.exe -
Loads dropped DLL 3 IoCs
pid Process 5012 winSAT.exe 3132 winSAT.exe 4896 Bginfo.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BGInfo.bmp" Bginfo.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Performance\WinSAT\winsat.log winSAT.exe File opened for modification C:\Windows\Performance\WinSAT\winsat.log winSAT.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bginfo.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bginfo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Bginfo.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\TileWallpaper = "1" Bginfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\WallpaperStyle = "0" Bginfo.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\.bgi\ = "BGInfo.Config.1" Bginfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\BGInfo.Config.1\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\MyElectronApp\\Bginfo.exe\" \"%1\"" Bginfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\BGInfo.Config.1\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\MyElectronApp\\Bginfo.exe\",0" Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\BGInfo.Config.1\shell\open Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\BGInfo.Config.1\DefaultIcon Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\.bgi Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\BGInfo.Config.1 Bginfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\BGInfo.Config.1\ = "BGInfo Configuration File" Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\BGInfo.Config.1\shell\open\command Bginfo.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\BGInfo.Config.1\shell Bginfo.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2976 powershell.exe 232 powershell.exe 2976 powershell.exe 232 powershell.exe 324 powershell.exe 324 powershell.exe 840 powershell.exe 840 powershell.exe 880 powershell.exe 880 powershell.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 2976 powershell.exe Token: SeDebugPrivilege 232 powershell.exe Token: SeDebugPrivilege 324 powershell.exe Token: SeShutdownPrivilege 3664 NSIS.exe Token: SeCreatePagefilePrivilege 3664 NSIS.exe Token: SeShutdownPrivilege 3664 NSIS.exe Token: SeCreatePagefilePrivilege 3664 NSIS.exe Token: SeShutdownPrivilege 3664 NSIS.exe Token: SeCreatePagefilePrivilege 3664 NSIS.exe Token: SeShutdownPrivilege 3664 NSIS.exe Token: SeCreatePagefilePrivilege 3664 NSIS.exe Token: SeShutdownPrivilege 3664 NSIS.exe Token: SeCreatePagefilePrivilege 3664 NSIS.exe Token: SeDebugPrivilege 840 powershell.exe Token: SeDebugPrivilege 880 powershell.exe Token: SeShutdownPrivilege 3664 NSIS.exe Token: SeCreatePagefilePrivilege 3664 NSIS.exe Token: SeShutdownPrivilege 3664 NSIS.exe Token: SeCreatePagefilePrivilege 3664 NSIS.exe Token: SeBackupPrivilege 4896 Bginfo.exe Token: SeSecurityPrivilege 4896 Bginfo.exe Token: SeShutdownPrivilege 3664 NSIS.exe Token: SeCreatePagefilePrivilege 3664 NSIS.exe Token: SeShutdownPrivilege 3664 NSIS.exe Token: SeCreatePagefilePrivilege 3664 NSIS.exe Token: SeShutdownPrivilege 3664 NSIS.exe Token: SeCreatePagefilePrivilege 3664 NSIS.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4896 Bginfo.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 180 3664 NSIS.exe 82 PID 3664 wrote to memory of 2440 3664 NSIS.exe 83 PID 3664 wrote to memory of 2440 3664 NSIS.exe 83 PID 3664 wrote to memory of 1924 3664 NSIS.exe 84 PID 3664 wrote to memory of 1924 3664 NSIS.exe 84 PID 3664 wrote to memory of 4696 3664 NSIS.exe 87 PID 3664 wrote to memory of 4696 3664 NSIS.exe 87 PID 2440 wrote to memory of 232 2440 cmd.exe 88 PID 2440 wrote to memory of 232 2440 cmd.exe 88 PID 1924 wrote to memory of 2976 1924 cmd.exe 89 PID 1924 wrote to memory of 2976 1924 cmd.exe 89 PID 2976 wrote to memory of 5012 2976 powershell.exe 90 PID 2976 wrote to memory of 5012 2976 powershell.exe 90 PID 5012 wrote to memory of 324 5012 winSAT.exe 92 PID 5012 wrote to memory of 324 5012 winSAT.exe 92 PID 3664 wrote to memory of 3988 3664 NSIS.exe 93 PID 3664 wrote to memory of 3988 3664 NSIS.exe 93 PID 3988 wrote to memory of 840 3988 cmd.exe 95 PID 3988 wrote to memory of 840 3988 cmd.exe 95 PID 840 wrote to memory of 3132 840 powershell.exe 96 PID 840 wrote to memory of 3132 840 powershell.exe 96 PID 3132 wrote to memory of 880 3132 winSAT.exe 98 PID 3132 wrote to memory of 880 3132 winSAT.exe 98 PID 880 wrote to memory of 4896 880 powershell.exe 99 PID 880 wrote to memory of 4896 880 powershell.exe 99 PID 880 wrote to memory of 4896 880 powershell.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\NSIS.exe"C:\Users\Admin\AppData\Local\Temp\NSIS.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\NSIS.exe"C:\Users\Admin\AppData\Local\Temp\NSIS.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\NSIS" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1768,i,4286907157817903164,8569289616472333864,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1760 /prefetch:22⤵PID:180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell -Command "$s=(New-Object -COM WScript.Shell).CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyElectronApp.lnk');$s.TargetPath='C:\Users\Admin\AppData\Local\Temp\NSIS.exe';$s.Save()""2⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$s=(New-Object -COM WScript.Shell).CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyElectronApp.lnk');$s.TargetPath='C:\Users\Admin\AppData\Local\Temp\NSIS.exe';$s.Save()"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Start-Process -Filepath 'C:\Windows \System32\winSAT.exe' -WindowStyle Hidden"2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -Filepath 'C:\Windows \System32\winSAT.exe' -WindowStyle Hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows \System32\winSAT.exe"C:\Windows \System32\winSAT.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command "& {$UserProfile = [Environment]::GetFolderPath('UserProfile'); $TargetPath = Join-Path $UserProfile 'AppData\Roaming\MyElectronApp'; Add-MpPreference -ExclusionPath $TargetPath; }"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\NSIS.exe"C:\Users\Admin\AppData\Local\Temp\NSIS.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\NSIS" --field-trial-handle=2000,i,4286907157817903164,8569289616472333864,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1996 /prefetch:32⤵PID:4696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Start-Process -Filepath 'C:\Windows \System32\winSAT.exe' -WindowStyle Hidden"2⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -Filepath 'C:\Windows \System32\winSAT.exe' -WindowStyle Hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows \System32\winSAT.exe"C:\Windows \System32\winSAT.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command "& {$UserProfile = [Environment]::GetFolderPath('UserProfile'); $TargetPath = Join-Path $UserProfile 'AppData\Roaming\MyElectronApp'; $BginfoPath = Join-Path $TargetPath 'Bginfo.exe'; Start-Process -FilePath $BginfoPath -ArgumentList '/NOLICPROMPT /timer:300' -WorkingDirectory $TargetPath -WindowStyle Hidden; }"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Roaming\MyElectronApp\Bginfo.exe"C:\Users\Admin\AppData\Roaming\MyElectronApp\Bginfo.exe" /NOLICPROMPT /timer:3006⤵
- Executes dropped EXE
- Loads dropped DLL
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4896
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
1KB
MD5a2b24af1492f112d2e53cb7415fda39f
SHA1dbfcee57242a14b60997bd03379cc60198976d85
SHA256fa05674c1db3386cf01ba1db5a3e9aeb97e15d1720d82988f573bf9743adc073
SHA5129919077b8e5c7a955682e9a83f6d7ab34ac6a10a3d65af172734d753a48f7604a95739933b8680289c94b4e271b27c775d015b8d9678db277f498d8450b8aff0
-
Filesize
1KB
MD52085605a5610e9f1781a4be1ca10b0d0
SHA1b2f4674adf3bbe195077471992d89f496f87fa07
SHA2566aaaf06fe71152ed589498b93405d4c0e78ca899d19f023098677ab2ab143491
SHA5129c8626c060fa8d54b4ced648e065871cc7f7775e2dad5d26c90c1014e93d98cd4525e5dea6c93423d7284fd03291d34176496575ee54185da4effb7d70c69797
-
Filesize
64B
MD53697cafcb02b8b6d56df0ffb92e60126
SHA10356d872ab42cd534f5207e6db2227d02618c771
SHA256b8893378422fac205441f07006296846e899aae66e7207024888eb4870737d42
SHA512b1c98a62a33d8e833e82ca0e84723212ab18dadd1a4c311c7d00b674cb826ab9b7212cc0f999ff64b69e9db46465c765bd074b7b92c7409f1e2aa873b4fde1d4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD53aef228fb7ee187160482084d36c9726
SHA18b76990c5061890c94f81f504c5782912a58d8a6
SHA256c885df88693496d5c28ad16a1ecde259e191f54ad76428857742af843b846c53
SHA512e659a7cf12c6b41879e4ce987e4cd1cefce2ffc74e06817667fa833764f36f25cc5f8374dbc844b68b787acac011c7b8c8f2b74563bf8a96f623ebb110a593da
-
Filesize
256KB
MD5b9c1e07b4b2eda5d3650acad008b8374
SHA15f193013d0f9caa41e1a1b2441e5e969315803c7
SHA256a94785c2269da10bc56b8b2d526e6028b22d62d0961db3129abc0208416c119e
SHA51267effa650ceb69afbe040385f017f22ba270ab04ab7cf9ab5b2a64f4d0ecb6d6f29809bd49ee9c9f0ad42d9bfbab595f213fb276259d62f8c48d97431afd0708
-
Filesize
467KB
MD571ee48d05dcaaf3edc86c7a8ddc7cfd8
SHA19448dae20207994597047d2796f3e237ca76b287
SHA2564776212795ca4946fa4aad57df8ee4fb4a4d966cf23fba6a47ac18b3d8b73b52
SHA512814b4456a04d07662888bf35d5f6d40b2cc5938d9ebf77f597d113ef2cad62c6baae9ed9c36765f8da4fb37a848443a29632f090ad42daa50ad44ea766a138c1
-
Filesize
221KB
MD566de65d980d40f3aaac3da64be631a91
SHA1e9db45421829aadf312ee888f5340ade4545af89
SHA2561cb9fcc2d76f51dbd08d58209c3e732b1abd0c1c0a3760d95374c68c890ff010
SHA512fa8bc38b7c5d663497c1798a292d75f768d528cfe272f23c1cc3a4cdae80229772832bd45b54d2ce1815d347c941371eb87b84dcc794eaae515109f5b71f2fb4
-
Filesize
235KB
MD592b547fb6a5e079a00955b13e67e415b
SHA128eafa6cddc0cd132b3ab1cd4c00a0a7c8a04014
SHA25675a0725e4560801b81b0cc9a35a805012403072ebce5f70500c2435b6e128056
SHA5121f764832690bc718c798f30250977d6a38d47e6093cbc2ca1bc7665386c4fdc55decbd324302f59aad15238ec9f8ac3ef7df5cc85e090309aaf2782b36220471
-
Filesize
2.7MB
MD5715db53a8064c6deccf68b7501df3386
SHA199acd12c3600ad3a7c478e49126db520bc136304
SHA256cc31fdcdce05144ef750b01233d57614cda7364a73ca26ff68886ebdc650e367
SHA5129ba9eaefa1e2e4da2d14f12b81f2ed0597ab6eb6b32d85851b69bc86d77a6b38810a04aa35ffcbf64484d544f52960f05f4eaca4740cd3674a1d09d8b373ce3c
-
Filesize
570B
MD53cc4c99f09e38411c2d01e4f02babf94
SHA1bf6b0750916a427e50ddbc8f2e455cfb1f8ddd31
SHA2566346612d54f6a56004a6d833e6535213d9634d43c6aedf914dc556fc3b2c17ca
SHA51256e7629db7a8b048bb17a59d2df2cd0a6a786d648514048c728bee55c8ce7907f768d6a974a50ab77a66c45f989fc7d225d2df018cebe3100b3e01307d6456d6