Analysis

  • max time kernel
    13s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 10:49

General

  • Target

    5c8a333934faf641ad398ad34b28fd352079c4ac4b590184e4d25fcd19858460.exe

  • Size

    2.8MB

  • MD5

    07370a3e0d4ab1538cfa487df0fbfc21

  • SHA1

    75d65babd5d230893af02f1fb4461cfcb566804d

  • SHA256

    5c8a333934faf641ad398ad34b28fd352079c4ac4b590184e4d25fcd19858460

  • SHA512

    c503d393a18a3b92127b7d8dfabcb6f8f69bbce003f3f157c65ec0da3770797ce904c6ef4436af2a131f0a63d6033e6e33daddb6cf45a593bfa5440e265f406d

  • SSDEEP

    24576:kX88NtYiNm0p4xm762XwJwx4BYmcRzQv9Bif/Ev09udw39HEsWaxHY6W9ySQaUad:sNtjmWcm71whGzQW8vt0Wa9Y5Yag

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://shineugler.biz/api

Extracted

Family

lumma

C2

https://shineugler.biz/api

https://immureprech.biz/api

https://deafeninggeh.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 33 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c8a333934faf641ad398ad34b28fd352079c4ac4b590184e4d25fcd19858460.exe
    "C:\Users\Admin\AppData\Local\Temp\5c8a333934faf641ad398ad34b28fd352079c4ac4b590184e4d25fcd19858460.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Users\Admin\AppData\Local\Temp\1015563001\aec54b9ae4.exe
        "C:\Users\Admin\AppData\Local\Temp\1015563001\aec54b9ae4.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1412
      • C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe
        "C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Users\Admin\AppData\Local\Temp\WViTNDFC\LrYDTuCopX8QE60J.exe
          C:\Users\Admin\AppData\Local\Temp\WViTNDFC\LrYDTuCopX8QE60J.exe 1812
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:1308
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 508
            5⤵
            • Program crash
            PID:28860
        • C:\Users\Admin\AppData\Local\Temp\1015564001\3IFFNakUWu4iuFfI.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\3IFFNakUWu4iuFfI.exe 1812
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1836
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 256
            5⤵
            • Program crash
            PID:24036
        • C:\Users\Admin\AppData\Local\Temp\1015564001\8YoLdGmSC0bGQcF0.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\8YoLdGmSC0bGQcF0.exe 1812
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2052
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 536
            5⤵
            • Program crash
            PID:23960
        • C:\Users\Admin\AppData\Local\Temp\1015564001\hnAPGHdSg6zgy9wp.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\hnAPGHdSg6zgy9wp.exe 1812
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:968
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 528
            5⤵
            • Program crash
            PID:6116
        • C:\Users\Admin\AppData\Local\Temp\1015564001\3HxIlVD8YPSHvoXw.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\3HxIlVD8YPSHvoXw.exe 1812
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1492
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 248
            5⤵
            • Program crash
            PID:13560
        • C:\Users\Admin\AppData\Local\Temp\1015564001\i3KDVCqS0GowMVIM.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\i3KDVCqS0GowMVIM.exe 1812
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2224
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 492
            5⤵
            • Program crash
            PID:9064
        • C:\Users\Admin\AppData\Local\Temp\1015564001\FRjVy3szIUXufly9.exe
          C:\Users\Admin\AppData\Local\Temp\1015564001\FRjVy3szIUXufly9.exe 1812
          4⤵
            PID:2124
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 232
              5⤵
              • Program crash
              PID:6944
          • C:\Users\Admin\AppData\Local\Temp\1015564001\xnTbTZAbv3SPZ36e.exe
            C:\Users\Admin\AppData\Local\Temp\1015564001\xnTbTZAbv3SPZ36e.exe 1812
            4⤵
              PID:2364
            • C:\Users\Admin\AppData\Local\Temp\1015564001\lGlZFNuZ6q5GZ3t7.exe
              C:\Users\Admin\AppData\Local\Temp\1015564001\lGlZFNuZ6q5GZ3t7.exe 1812
              4⤵
                PID:2836
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 236
                  5⤵
                  • Program crash
                  PID:7764
              • C:\Users\Admin\AppData\Local\Temp\1015564001\UQdCk0XyMatSktn8.exe
                C:\Users\Admin\AppData\Local\Temp\1015564001\UQdCk0XyMatSktn8.exe 1812
                4⤵
                  PID:864
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 248
                    5⤵
                    • Program crash
                    PID:18600
                • C:\Users\Admin\AppData\Local\Temp\1015564001\6ARLC9OLsKw2tQAW.exe
                  C:\Users\Admin\AppData\Local\Temp\1015564001\6ARLC9OLsKw2tQAW.exe 1812
                  4⤵
                    PID:2464
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 248
                      5⤵
                      • Program crash
                      PID:10948
                  • C:\Users\Admin\AppData\Local\Temp\1015564001\2SQFNIKQnLx6HEyA.exe
                    C:\Users\Admin\AppData\Local\Temp\1015564001\2SQFNIKQnLx6HEyA.exe 1812
                    4⤵
                      PID:2700
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 260
                        5⤵
                        • Program crash
                        PID:9224
                    • C:\Users\Admin\AppData\Local\Temp\1015564001\CKri0Dc3vJhhkdK3.exe
                      C:\Users\Admin\AppData\Local\Temp\1015564001\CKri0Dc3vJhhkdK3.exe 1812
                      4⤵
                        PID:920
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 260
                          5⤵
                          • Program crash
                          PID:16400
                      • C:\Users\Admin\AppData\Local\Temp\1015564001\P32bSZHLu0pTiUO8.exe
                        C:\Users\Admin\AppData\Local\Temp\1015564001\P32bSZHLu0pTiUO8.exe 1812
                        4⤵
                          PID:2008
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 264
                            5⤵
                            • Program crash
                            PID:6392
                        • C:\Users\Admin\AppData\Local\Temp\1015564001\JhYDCuUADd1dITwU.exe
                          C:\Users\Admin\AppData\Local\Temp\1015564001\JhYDCuUADd1dITwU.exe 1812
                          4⤵
                            PID:7096
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 7096 -s 268
                              5⤵
                              • Program crash
                              PID:29556
                          • C:\Users\Admin\AppData\Local\Temp\1015564001\xC0rxsdmyPSTEGO8.exe
                            C:\Users\Admin\AppData\Local\Temp\1015564001\xC0rxsdmyPSTEGO8.exe 1812
                            4⤵
                              PID:7216
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 7216 -s 280
                                5⤵
                                • Program crash
                                PID:12104
                            • C:\Users\Admin\AppData\Local\Temp\1015564001\IXK8QXtA6btUq5Vz.exe
                              C:\Users\Admin\AppData\Local\Temp\1015564001\IXK8QXtA6btUq5Vz.exe 1812
                              4⤵
                                PID:7280
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 7280 -s 276
                                  5⤵
                                  • Program crash
                                  PID:31676
                              • C:\Users\Admin\AppData\Local\Temp\1015564001\E2edjEKM5qz4aqU4.exe
                                C:\Users\Admin\AppData\Local\Temp\1015564001\E2edjEKM5qz4aqU4.exe 1812
                                4⤵
                                  PID:7384
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 7384 -s 284
                                    5⤵
                                    • Program crash
                                    PID:30828
                                • C:\Users\Admin\AppData\Local\Temp\1015564001\XbPKPb5IFjhDzYMM.exe
                                  C:\Users\Admin\AppData\Local\Temp\1015564001\XbPKPb5IFjhDzYMM.exe 1812
                                  4⤵
                                    PID:7424
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 7424 -s 280
                                      5⤵
                                      • Program crash
                                      PID:24768
                                  • C:\Users\Admin\AppData\Local\Temp\1015564001\5VUSOObkGYAkZa0c.exe
                                    C:\Users\Admin\AppData\Local\Temp\1015564001\5VUSOObkGYAkZa0c.exe 1812
                                    4⤵
                                      PID:7560
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 7560 -s 296
                                        5⤵
                                        • Program crash
                                        PID:15376
                                    • C:\Users\Admin\AppData\Local\Temp\1015564001\I2eXn5R5AW0pG4JV.exe
                                      C:\Users\Admin\AppData\Local\Temp\1015564001\I2eXn5R5AW0pG4JV.exe 1812
                                      4⤵
                                        PID:7624
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 292
                                          5⤵
                                          • Program crash
                                          PID:20636
                                      • C:\Users\Admin\AppData\Local\Temp\1015564001\VbyUqKg0N4me53Ar.exe
                                        C:\Users\Admin\AppData\Local\Temp\1015564001\VbyUqKg0N4me53Ar.exe 1812
                                        4⤵
                                          PID:7680
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 7680 -s 296
                                            5⤵
                                            • Program crash
                                            PID:2772
                                        • C:\Users\Admin\AppData\Local\Temp\1015564001\KRpdR3WK9AsAo9mF.exe
                                          C:\Users\Admin\AppData\Local\Temp\1015564001\KRpdR3WK9AsAo9mF.exe 1812
                                          4⤵
                                            PID:7856
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 7856 -s 160
                                              5⤵
                                              • Program crash
                                              PID:7984
                                          • C:\Users\Admin\AppData\Local\Temp\1015564001\QP8nWovtYCC2PnH7.exe
                                            C:\Users\Admin\AppData\Local\Temp\1015564001\QP8nWovtYCC2PnH7.exe 1812
                                            4⤵
                                              PID:7860
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 296
                                                5⤵
                                                • Program crash
                                                PID:25144
                                            • C:\Users\Admin\AppData\Local\Temp\1015564001\vyjNinltj2bSwjlx.exe
                                              C:\Users\Admin\AppData\Local\Temp\1015564001\vyjNinltj2bSwjlx.exe 1812
                                              4⤵
                                                PID:7876
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 7876 -s 316
                                                  5⤵
                                                  • Program crash
                                                  PID:4164
                                              • C:\Users\Admin\AppData\Local\Temp\1015564001\2oaBueh1qL1Nz1xo.exe
                                                C:\Users\Admin\AppData\Local\Temp\1015564001\2oaBueh1qL1Nz1xo.exe 1812
                                                4⤵
                                                  PID:8024
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 8024 -s 304
                                                    5⤵
                                                    • Program crash
                                                    PID:26408
                                                • C:\Users\Admin\AppData\Local\Temp\1015564001\j7sY3Hg9zJQDv5ND.exe
                                                  C:\Users\Admin\AppData\Local\Temp\1015564001\j7sY3Hg9zJQDv5ND.exe 1812
                                                  4⤵
                                                    PID:8072
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 8072 -s 296
                                                      5⤵
                                                      • Program crash
                                                      PID:11052
                                                  • C:\Users\Admin\AppData\Local\Temp\1015564001\UrHxGhj4QcwnASrP.exe
                                                    C:\Users\Admin\AppData\Local\Temp\1015564001\UrHxGhj4QcwnASrP.exe 1812
                                                    4⤵
                                                      PID:316
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 320
                                                        5⤵
                                                        • Program crash
                                                        PID:31288
                                                    • C:\Users\Admin\AppData\Local\Temp\1015564001\x2LTOzyNIvQtBxyt.exe
                                                      C:\Users\Admin\AppData\Local\Temp\1015564001\x2LTOzyNIvQtBxyt.exe 1812
                                                      4⤵
                                                        PID:7988
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 7988 -s 320
                                                          5⤵
                                                          • Program crash
                                                          PID:1424
                                                      • C:\Users\Admin\AppData\Local\Temp\1015564001\0YqVgS2PdSXUxhLZ.exe
                                                        C:\Users\Admin\AppData\Local\Temp\1015564001\0YqVgS2PdSXUxhLZ.exe 1812
                                                        4⤵
                                                          PID:844
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 844 -s 316
                                                            5⤵
                                                            • Program crash
                                                            PID:7640
                                                        • C:\Users\Admin\AppData\Local\Temp\1015564001\SLr4bPJQJOyl1D8l.exe
                                                          C:\Users\Admin\AppData\Local\Temp\1015564001\SLr4bPJQJOyl1D8l.exe 1812
                                                          4⤵
                                                            PID:1544
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 312
                                                              5⤵
                                                              • Program crash
                                                              PID:13776
                                                          • C:\Users\Admin\AppData\Local\Temp\1015564001\0Mk77cQLn6c9PxHk.exe
                                                            C:\Users\Admin\AppData\Local\Temp\1015564001\0Mk77cQLn6c9PxHk.exe 1812
                                                            4⤵
                                                              PID:2196
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 324
                                                                5⤵
                                                                • Program crash
                                                                PID:4948
                                                            • C:\Users\Admin\AppData\Local\Temp\1015564001\hm4EnFvnC6nB1EFB.exe
                                                              C:\Users\Admin\AppData\Local\Temp\1015564001\hm4EnFvnC6nB1EFB.exe 1812
                                                              4⤵
                                                                PID:8036
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 8036 -s 312
                                                                  5⤵
                                                                  • Program crash
                                                                  PID:16404
                                                              • C:\Users\Admin\AppData\Local\Temp\1015564001\AEyvYBcrBZ8oxdNj.exe
                                                                C:\Users\Admin\AppData\Local\Temp\1015564001\AEyvYBcrBZ8oxdNj.exe 1812
                                                                4⤵
                                                                  PID:2908
                                                                • C:\Users\Admin\AppData\Local\Temp\1015564001\H1ZzkXrzWl1roe7C.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\1015564001\H1ZzkXrzWl1roe7C.exe 1812
                                                                  4⤵
                                                                    PID:3756
                                                                  • C:\Users\Admin\AppData\Local\Temp\1015564001\Up4rQ8m8jqWB3ypd.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\1015564001\Up4rQ8m8jqWB3ypd.exe 1812
                                                                    4⤵
                                                                      PID:16496
                                                                    • C:\Users\Admin\AppData\Local\Temp\1015564001\CTWaj9CZdHrVuWMo.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\1015564001\CTWaj9CZdHrVuWMo.exe 1812
                                                                      4⤵
                                                                        PID:16528
                                                                      • C:\Users\Admin\AppData\Local\Temp\1015564001\VeVmXmLKwiQhhuH4.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\1015564001\VeVmXmLKwiQhhuH4.exe 1812
                                                                        4⤵
                                                                          PID:9460
                                                                        • C:\Users\Admin\AppData\Local\Temp\1015564001\4TAWv8zQpIYu5bw7.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\1015564001\4TAWv8zQpIYu5bw7.exe 1812
                                                                          4⤵
                                                                            PID:16604
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 16604 -s 376
                                                                              5⤵
                                                                              • Program crash
                                                                              PID:2220
                                                                          • C:\Users\Admin\AppData\Local\Temp\1015564001\cRwSF8f18gadSHMB.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\1015564001\cRwSF8f18gadSHMB.exe 1812
                                                                            4⤵
                                                                              PID:16640
                                                                            • C:\Users\Admin\AppData\Local\Temp\1015564001\A4QIm0zW3qUwjpZn.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\1015564001\A4QIm0zW3qUwjpZn.exe 1812
                                                                              4⤵
                                                                                PID:9516
                                                                              • C:\Users\Admin\AppData\Local\Temp\1015564001\viNXr2IwalGXYify.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\1015564001\viNXr2IwalGXYify.exe 1812
                                                                                4⤵
                                                                                  PID:16716
                                                                                • C:\Users\Admin\AppData\Local\Temp\1015564001\doZXqWU1r68v29ea.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\1015564001\doZXqWU1r68v29ea.exe 1812
                                                                                  4⤵
                                                                                    PID:16748
                                                                                  • C:\Users\Admin\AppData\Local\Temp\1015564001\m3xNEtGSXaQVd1hn.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\1015564001\m3xNEtGSXaQVd1hn.exe 1812
                                                                                    4⤵
                                                                                      PID:16784
                                                                                    • C:\Users\Admin\AppData\Local\Temp\1015564001\OcF93OkhDAbBhtE5.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\1015564001\OcF93OkhDAbBhtE5.exe 1812
                                                                                      4⤵
                                                                                        PID:16828
                                                                                      • C:\Users\Admin\AppData\Local\Temp\1015564001\TjGDKmgEmGhD5Bct.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\1015564001\TjGDKmgEmGhD5Bct.exe 1812
                                                                                        4⤵
                                                                                          PID:9612
                                                                                        • C:\Users\Admin\AppData\Local\Temp\1015564001\I5BTGu4QKyiX5fgd.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\1015564001\I5BTGu4QKyiX5fgd.exe 1812
                                                                                          4⤵
                                                                                            PID:27588
                                                                                          • C:\Users\Admin\AppData\Local\Temp\1015564001\I6rJOXTkMBEoi2JW.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\1015564001\I6rJOXTkMBEoi2JW.exe 1812
                                                                                            4⤵
                                                                                              PID:14112
                                                                                            • C:\Users\Admin\AppData\Local\Temp\1015564001\WQyA9GUSpK1UIO6i.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\1015564001\WQyA9GUSpK1UIO6i.exe 1812
                                                                                              4⤵
                                                                                                PID:14312
                                                                                              • C:\Users\Admin\AppData\Local\Temp\1015564001\4BTt8HAuP8SvZ3Gb.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\1015564001\4BTt8HAuP8SvZ3Gb.exe 1812
                                                                                                4⤵
                                                                                                  PID:27896
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1015564001\WbTIdNumQRuR1RJR.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\1015564001\WbTIdNumQRuR1RJR.exe 1812
                                                                                                  4⤵
                                                                                                    PID:28064
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\1015564001\KdZbnCuV41ORrUwl.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\1015564001\KdZbnCuV41ORrUwl.exe 1812
                                                                                                    4⤵
                                                                                                      PID:28288
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1015564001\vWSslPobUCgTIH7V.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\1015564001\vWSslPobUCgTIH7V.exe 1812
                                                                                                      4⤵
                                                                                                        PID:28656
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1015564001\9gBP7UhjQ1ja4MVF.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\1015564001\9gBP7UhjQ1ja4MVF.exe 1812
                                                                                                        4⤵
                                                                                                          PID:25444
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1015564001\IcA6kusCEJbU8hFo.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\1015564001\IcA6kusCEJbU8hFo.exe 1812
                                                                                                          4⤵
                                                                                                            PID:10068
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\1015564001\2hp3certucr4GEEc.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\1015564001\2hp3certucr4GEEc.exe 1812
                                                                                                            4⤵
                                                                                                              PID:18896
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1015564001\cqUqmS9dwCt4IK9T.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\1015564001\cqUqmS9dwCt4IK9T.exe 1812
                                                                                                              4⤵
                                                                                                                PID:20148
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1015564001\qzWSoJ0QezkapcEH.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\1015564001\qzWSoJ0QezkapcEH.exe 1812
                                                                                                                4⤵
                                                                                                                  PID:20840
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1015564001\NRB4vHrQfEmgCuaw.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\1015564001\NRB4vHrQfEmgCuaw.exe 1812
                                                                                                                  4⤵
                                                                                                                    PID:21412

                                                                                                            Network

                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                            Replay Monitor

                                                                                                            Loading Replay Monitor...

                                                                                                            Downloads

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1015563001\aec54b9ae4.exe

                                                                                                              Filesize

                                                                                                              1.7MB

                                                                                                              MD5

                                                                                                              6c1d0dabe1ec5e928f27b3223f25c26b

                                                                                                              SHA1

                                                                                                              e25ab704a6e9b3e4c30a6c1f7043598a13856ad9

                                                                                                              SHA256

                                                                                                              92228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d

                                                                                                              SHA512

                                                                                                              3a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe

                                                                                                              Filesize

                                                                                                              256KB

                                                                                                              MD5

                                                                                                              c37a981bc24c4aba6454da4eecb7acbe

                                                                                                              SHA1

                                                                                                              2bffdf27d0d4f7c810e323c1671a87ed2d6b644f

                                                                                                              SHA256

                                                                                                              d6fc121d54e4cdf3a1b6b0505c4f691f16d91fdd421bf96c04388b1c6f19e361

                                                                                                              SHA512

                                                                                                              2f44b5218b323bc2bad3ee37426b5bbcbb089b1a561e5f2f48fd455fed0a395b50a6cbb3783bf06e25b144b3f77078629ab1d86fb2c8df1a532230c81a3b2ab8

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Cab32C.tmp

                                                                                                              Filesize

                                                                                                              70KB

                                                                                                              MD5

                                                                                                              49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                              SHA1

                                                                                                              1723be06719828dda65ad804298d0431f6aff976

                                                                                                              SHA256

                                                                                                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                              SHA512

                                                                                                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Tar3FA.tmp

                                                                                                              Filesize

                                                                                                              181KB

                                                                                                              MD5

                                                                                                              4ea6026cf93ec6338144661bf1202cd1

                                                                                                              SHA1

                                                                                                              a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                              SHA256

                                                                                                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                              SHA512

                                                                                                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                                              Filesize

                                                                                                              2.8MB

                                                                                                              MD5

                                                                                                              07370a3e0d4ab1538cfa487df0fbfc21

                                                                                                              SHA1

                                                                                                              75d65babd5d230893af02f1fb4461cfcb566804d

                                                                                                              SHA256

                                                                                                              5c8a333934faf641ad398ad34b28fd352079c4ac4b590184e4d25fcd19858460

                                                                                                              SHA512

                                                                                                              c503d393a18a3b92127b7d8dfabcb6f8f69bbce003f3f157c65ec0da3770797ce904c6ef4436af2a131f0a63d6033e6e33daddb6cf45a593bfa5440e265f406d

                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk

                                                                                                              Filesize

                                                                                                              1KB

                                                                                                              MD5

                                                                                                              479a5dd5f1357fb39fbba0595926b730

                                                                                                              SHA1

                                                                                                              ba4b120d1f758cf825569393d7930b1f703b3d98

                                                                                                              SHA256

                                                                                                              aac34f175c42d32f29539be970c774efa2573ec5116f8e2493c7f316a5382761

                                                                                                              SHA512

                                                                                                              27c0968735ba6fd1a527f5ab73e0eedf3a2d52b4d295f982a99432b042bd0d1374a442a559cdddb819689c3f3a7c23cfc73335f0d59ea3ce0a009f77f66282b3

                                                                                                            • memory/1412-48-0x0000000000990000-0x0000000000E1B000-memory.dmp

                                                                                                              Filesize

                                                                                                              4.5MB

                                                                                                            • memory/1412-188-0x0000000000990000-0x0000000000E1B000-memory.dmp

                                                                                                              Filesize

                                                                                                              4.5MB

                                                                                                            • memory/2316-4-0x0000000001390000-0x00000000016A5000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2316-17-0x0000000001390000-0x00000000016A5000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2316-18-0x0000000006A90000-0x0000000006DA5000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2316-19-0x0000000006A90000-0x0000000006DA5000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2316-0-0x0000000001390000-0x00000000016A5000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2316-3-0x0000000001390000-0x00000000016A5000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2316-2-0x0000000001391000-0x00000000013BF000-memory.dmp

                                                                                                              Filesize

                                                                                                              184KB

                                                                                                            • memory/2316-1-0x00000000776C0000-0x00000000776C2000-memory.dmp

                                                                                                              Filesize

                                                                                                              8KB

                                                                                                            • memory/2936-46-0x0000000006AB0000-0x0000000006F3B000-memory.dmp

                                                                                                              Filesize

                                                                                                              4.5MB

                                                                                                            • memory/2936-215-0x0000000006AB0000-0x0000000006F3B000-memory.dmp

                                                                                                              Filesize

                                                                                                              4.5MB

                                                                                                            • memory/2936-43-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-45-0x0000000006AB0000-0x0000000006F3B000-memory.dmp

                                                                                                              Filesize

                                                                                                              4.5MB

                                                                                                            • memory/2936-27-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-50-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-26-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-25-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-23-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-22-0x0000000001041000-0x000000000106F000-memory.dmp

                                                                                                              Filesize

                                                                                                              184KB

                                                                                                            • memory/2936-21-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-47-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-219-0x0000000006AB0000-0x0000000006F3B000-memory.dmp

                                                                                                              Filesize

                                                                                                              4.5MB

                                                                                                            • memory/2936-218-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-253-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-268-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-302-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-403-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-338-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/2936-340-0x0000000001040000-0x0000000001355000-memory.dmp

                                                                                                              Filesize

                                                                                                              3.1MB

                                                                                                            • memory/7856-305-0x00000000000B0000-0x00000000000F5000-memory.dmp

                                                                                                              Filesize

                                                                                                              276KB