Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 06:31

General

  • Target

    Java32.exe

  • Size

    3.3MB

  • MD5

    bc884c0edbc8df559985b42fdd2fc985

  • SHA1

    9611a03c424e0285ab1a8ea9683918ce7b5909ab

  • SHA256

    e848b330ee5a8bd5ae1f6b991551e30a4a5b2e5deeb4718a15b2122101f2c270

  • SHA512

    1b8c97d500de45fbf994dcd9bf65cc78106a62ff0770a362add18866cceebbe9f5e157a77d26cb0d0d8de89abe3d446bc911f33e7027fa8f8809d2720b0cedcc

  • SSDEEP

    49152:BvmI22SsaNYfdPBldt698dBcjHideEErHFk/uVSoGdf3THHB72eh2NT:Bvr22SsaNYfdPBldt6+dBcjHidel8

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Java

C2

dez345-37245.portmap.host:37245

Mutex

f0e53bcd-851e-44af-8fd5-07d8ab5ed968

Attributes
  • encryption_key

    65439CE7DEF3E0FAF01C526FEA90388C9FD487A1

  • install_name

    java.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    java ©

  • subdirectory

    Programfiles

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Java32.exe
    "C:\Users\Admin\AppData\Local\Temp\Java32.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4736
    • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
      "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4444
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xdOm4jUCaRrh.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:3356
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4192
          • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
            "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3528
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:4724
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IXpN2gabX9tk.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4068
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:828
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:4748
                • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                  "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:5020
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:4832
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nubSkf0SrQEx.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2636
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:4360
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:3916
                      • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                        "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                        8⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:1012
                        • C:\Windows\SYSTEM32\schtasks.exe
                          "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:988
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fMk5AUx30wds.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2504
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:208
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:116
                            • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                              "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                              10⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of WriteProcessMemory
                              PID:2956
                              • C:\Windows\SYSTEM32\schtasks.exe
                                "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                11⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:4308
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4h6UG2YqxcSl.bat" "
                                11⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2600
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  12⤵
                                    PID:1432
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    12⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:2216
                                  • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                    "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                    12⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of WriteProcessMemory
                                    PID:3812
                                    • C:\Windows\SYSTEM32\schtasks.exe
                                      "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                      13⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:4260
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QDNKXXzEzzwq.bat" "
                                      13⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:1844
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        14⤵
                                          PID:2112
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 10 localhost
                                          14⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:4176
                                        • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                          "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                          14⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          PID:4836
                                          • C:\Windows\SYSTEM32\schtasks.exe
                                            "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                            15⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:4980
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iDeZ2mSOpkVb.bat" "
                                            15⤵
                                              PID:2924
                                              • C:\Windows\system32\chcp.com
                                                chcp 65001
                                                16⤵
                                                  PID:4428
                                                • C:\Windows\system32\PING.EXE
                                                  ping -n 10 localhost
                                                  16⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:4476
                                                • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                                  "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                                  16⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:5012
                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                    "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                                    17⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:4612
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iKdl7dEiK0nz.bat" "
                                                    17⤵
                                                      PID:1800
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        18⤵
                                                          PID:3220
                                                        • C:\Windows\system32\PING.EXE
                                                          ping -n 10 localhost
                                                          18⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:3348
                                                        • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                                          "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                                          18⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          PID:2704
                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                            "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                                            19⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2144
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UWgCBhRE4xvD.bat" "
                                                            19⤵
                                                              PID:1412
                                                              • C:\Windows\system32\chcp.com
                                                                chcp 65001
                                                                20⤵
                                                                  PID:1696
                                                                • C:\Windows\system32\PING.EXE
                                                                  ping -n 10 localhost
                                                                  20⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:3972
                                                                • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                                                  "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                                                  20⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  • Suspicious use of SendNotifyMessage
                                                                  PID:1904
                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                    "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                                                    21⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:4448
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7qG58GGHLDf9.bat" "
                                                                    21⤵
                                                                      PID:1504
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp 65001
                                                                        22⤵
                                                                          PID:4968
                                                                        • C:\Windows\system32\PING.EXE
                                                                          ping -n 10 localhost
                                                                          22⤵
                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                          • Runs ping.exe
                                                                          PID:2908
                                                                        • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                                                          "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                                                          22⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:4616
                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                            "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                                                            23⤵
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:4300
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ieqwswIZ4NVn.bat" "
                                                                            23⤵
                                                                              PID:1128
                                                                              • C:\Windows\system32\chcp.com
                                                                                chcp 65001
                                                                                24⤵
                                                                                  PID:2256
                                                                                • C:\Windows\system32\PING.EXE
                                                                                  ping -n 10 localhost
                                                                                  24⤵
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  • Runs ping.exe
                                                                                  PID:3388
                                                                                • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                                                                  24⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                  • Suspicious use of SendNotifyMessage
                                                                                  PID:4272
                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                    "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                                                                    25⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:5108
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WGoLtMvghMSH.bat" "
                                                                                    25⤵
                                                                                      PID:672
                                                                                      • C:\Windows\system32\chcp.com
                                                                                        chcp 65001
                                                                                        26⤵
                                                                                          PID:1664
                                                                                        • C:\Windows\system32\PING.EXE
                                                                                          ping -n 10 localhost
                                                                                          26⤵
                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                          • Runs ping.exe
                                                                                          PID:4824
                                                                                        • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                                                                          26⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                          • Suspicious use of SendNotifyMessage
                                                                                          PID:396
                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                            "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                                                                            27⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:4992
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VynZsGEZXkjH.bat" "
                                                                                            27⤵
                                                                                              PID:2540
                                                                                              • C:\Windows\system32\chcp.com
                                                                                                chcp 65001
                                                                                                28⤵
                                                                                                  PID:1240
                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                  ping -n 10 localhost
                                                                                                  28⤵
                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                  • Runs ping.exe
                                                                                                  PID:1920
                                                                                                • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                                                                                  28⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                  PID:2900
                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                    "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                                                                                    29⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:4284
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aR29bYjYYd1p.bat" "
                                                                                                    29⤵
                                                                                                      PID:1160
                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                        chcp 65001
                                                                                                        30⤵
                                                                                                          PID:3604
                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                          ping -n 10 localhost
                                                                                                          30⤵
                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                          • Runs ping.exe
                                                                                                          PID:3500
                                                                                                        • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"
                                                                                                          30⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                          PID:1276
                                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                            "schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f
                                                                                                            31⤵
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:3856
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\z90uFtDPzHrl.bat" "
                                                                                                            31⤵
                                                                                                              PID:5088
                                                                                                              • C:\Windows\system32\chcp.com
                                                                                                                chcp 65001
                                                                                                                32⤵
                                                                                                                  PID:4648
                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                  ping -n 10 localhost
                                                                                                                  32⤵
                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                  • Runs ping.exe
                                                                                                                  PID:2940

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\java.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    8f0271a63446aef01cf2bfc7b7c7976b

                                                    SHA1

                                                    b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7

                                                    SHA256

                                                    da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c

                                                    SHA512

                                                    78a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5

                                                  • C:\Users\Admin\AppData\Local\Temp\4h6UG2YqxcSl.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    d04c53e9316518494bdb02c6820a289c

                                                    SHA1

                                                    0a64200ba3ccc40dce8150d9eee7e6c05c6a9ae6

                                                    SHA256

                                                    68b77ada96f88dac321825288c0ed1b4bc30784b520b95e59caf53260513fcde

                                                    SHA512

                                                    1dc767d52a654e797eb34ec8fb763c152ab313c23554e147c5d3fc893520b422ca7e45ff66585261fc97b568f86b143b79a2abd5384e016cefd6f242e702934b

                                                  • C:\Users\Admin\AppData\Local\Temp\7qG58GGHLDf9.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    805afc961414131a163f15d10aff691d

                                                    SHA1

                                                    be9f64989a38cbada64386857bc56737c4bb1593

                                                    SHA256

                                                    474ae9270e4766ae5651e7314130081292b131aeebd4b8e9bbd295bcb94e1711

                                                    SHA512

                                                    93d396854a18743e71defaf3e38bc126e49dea8e558c586d1e486c482e019889d20d21caa1e4a66b282023e72397bb99a13ef17bf4aab6cd591037e90ae27a28

                                                  • C:\Users\Admin\AppData\Local\Temp\IXpN2gabX9tk.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    cf8e3eb45ed2a9ccb4532babbfbe2e1d

                                                    SHA1

                                                    34bd7e56dda374837dc336a613e828a487b1f090

                                                    SHA256

                                                    1550440373298a9aa686a152ffb342badf822a1a3e33463c147efa898510c08b

                                                    SHA512

                                                    1c689989a4cc9972261419a75ca5ccbe4a27cfcffa68c7f566addba6438cdb630ee56e360ece524a1354d2bb4d9789525fd3d532f9e3455b3a1c6b6118104bdd

                                                  • C:\Users\Admin\AppData\Local\Temp\QDNKXXzEzzwq.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    513511dc7a8e27cb6f450f7643df4f4e

                                                    SHA1

                                                    1fbe930571e6a8e06ca3399e0954ac073700f449

                                                    SHA256

                                                    249577a12bfe733b377c2037a88aaa2e615518ee92ae836515baacdb7ac225c1

                                                    SHA512

                                                    03de74a613042a05969308cddfde03420c26c4c7454ae54175c407b6f1fcf31625dc38ff9c9d6bba91a99a04e58cac46bdd9508e1afa3b2a8c4fa80f657d16e7

                                                  • C:\Users\Admin\AppData\Local\Temp\UWgCBhRE4xvD.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    3129277a7d64b444fbeff2a24541b62b

                                                    SHA1

                                                    fcdaea6d9543c02ca6ed74132d05b9594ae0fecf

                                                    SHA256

                                                    03d7cb153bae4c284e790d87d353b0b7d44c2cb40a39696d13870750453dc99e

                                                    SHA512

                                                    da399bc851dcbdcbf93a192c681fea9aaadbb0b9940f4fdf046ab2961f940143c8037b777aa6b52e0acc58588e62908068300ca4a323b029627fda398c85dc7d

                                                  • C:\Users\Admin\AppData\Local\Temp\VynZsGEZXkjH.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    b29e1169689e32557fafa3eccccc67d1

                                                    SHA1

                                                    4f3b94cd76a15db5455a26a0615ba83bdac7ca51

                                                    SHA256

                                                    6bd7e55f89ff0400e5c29236f20ef1283322e46202775ed5fb9c5f34205e2889

                                                    SHA512

                                                    32a04c0e202fdfdb1c623ab75e96022456b8c37e3ffd16e031e54b074f2fd3f6cca9b252ef5709b61c9a33acb5ad033993370f8533ca044830712ca0021d86cf

                                                  • C:\Users\Admin\AppData\Local\Temp\WGoLtMvghMSH.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    dc6980e5a74784e2d0f0aae810a02b76

                                                    SHA1

                                                    355fddc2ad784b7454dd03e7e510c49e43bc1de7

                                                    SHA256

                                                    1e579805fc39e29b32dc80651d437e4973709d730470531ba135d16b3d870775

                                                    SHA512

                                                    86b0724b1981ec5c4904aa46d73be2ce231b6ed14615b9d44757c17a5fc788adc0f5bdae449fe1e7ed99f2225e35a99ef6eedb3c7a066e56009ff56eef2517d5

                                                  • C:\Users\Admin\AppData\Local\Temp\aR29bYjYYd1p.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    d83268c823f716fa8ee217dd9a5e608c

                                                    SHA1

                                                    7d3ce389e47074bbea85fbd7f92675c29f0db9c5

                                                    SHA256

                                                    09e788d000b4252518a481aec76edb54b0a97674ef64a36e22061725301591b7

                                                    SHA512

                                                    ea6167ccc210b00b370d966c87fead6a18534a76f165bee7f2b37c1e17734dbf970c1af49a5331f368ea35057494e9d26dc5e976c6be1ab122a167fa22fcc29f

                                                  • C:\Users\Admin\AppData\Local\Temp\fMk5AUx30wds.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    d3db761817b4f9c8207b82ee59a03d3a

                                                    SHA1

                                                    363745cfc5250c767e69a16b21e0bb23f2c7e7aa

                                                    SHA256

                                                    6552abd8080b37f3039358772401c8244ae61aaa4015271d90e609ffcb8b5def

                                                    SHA512

                                                    c5fce0a43c4614b6346272eb4e4e7967ba2bf6a546592d0dac9f4492f741cdfabda6e5132009daaedfbf7399f5b3e95ebeb22041d3a70d0f28db4bad5fffbc37

                                                  • C:\Users\Admin\AppData\Local\Temp\iDeZ2mSOpkVb.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    f37c8969d2bf94f33d9d76fb6a4a494b

                                                    SHA1

                                                    5ccc776eac90b8f8aee7a02449b546b9d956b6d1

                                                    SHA256

                                                    43fe39147072576babb7ee6c1345b8ee0e396b7343fe440fdee79525f28bb75c

                                                    SHA512

                                                    80379390bbb29cc91029347affb58ed9fc6162770c3091507679ca68e1bdcde9871dab6a680d286583bf6032482102299dec656c18b592778173a52b05d07d0d

                                                  • C:\Users\Admin\AppData\Local\Temp\iKdl7dEiK0nz.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    5188c4a1a9cf5ff781d8b903f242b422

                                                    SHA1

                                                    2cfd6603345dae6ad2f35c8918879dfdb1bdaeaa

                                                    SHA256

                                                    08f8a8c5598d3cd3775bdea60f49d6bf44732962778e756bc77514b5c074f001

                                                    SHA512

                                                    1e745347f340557f99730cbf1e453b2761e9d98475a6fb49cd3862fce10b07b2f9a17aa2fdfd62b77ae878c9e2cba1866b68ebd71f9b62bad4e75e04f7420c88

                                                  • C:\Users\Admin\AppData\Local\Temp\ieqwswIZ4NVn.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    b2f65de528fec4e4dc2c466a450098be

                                                    SHA1

                                                    5a8220634b9d1d63afb7839d9149272413d9d49e

                                                    SHA256

                                                    73b2382eb0485af71c0eb6226f068b5c8db53a658da5a6395db0787e2af025a1

                                                    SHA512

                                                    e4b6842e5cee299396788af4d09436469e3b01e9a178a1618cdcef078d3b3dd43844d159abe6b13c19517015864a9b7ec2897537d205f42b72807614ce92b5d2

                                                  • C:\Users\Admin\AppData\Local\Temp\nubSkf0SrQEx.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    a514c431f3a63cf8685a95caa8fed39e

                                                    SHA1

                                                    cabfa756cf4a2ac356e41bbf0b2cc4d75b6b2bbb

                                                    SHA256

                                                    db4d9d6436cbaba28600c6da2d33653704cdde5275d88bee0e69d8fcf8ff39f3

                                                    SHA512

                                                    aaacd00b1f08ef75293f9a1b9508defaa4b6ff1af32a6190d0db2757acdcbba72ac9ce5edddb4852282dd503de4c0071533e36a35e2e6221d89698be015e9f46

                                                  • C:\Users\Admin\AppData\Local\Temp\xdOm4jUCaRrh.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    c20ca83c16e42df57825765b19873751

                                                    SHA1

                                                    a1dda9196536d2eb35d472c58e7b215712d36a73

                                                    SHA256

                                                    d17ca482071267615dbe6ef9eb983a17dea4fa216f625aa6c3ea3a3d55afd854

                                                    SHA512

                                                    d7d3d7d507cd61fb985ff94e7f50a4e713fd44f2098fe7802ddd330a30eb71aed9c62626fb40d9739ea6fb517ba818524472cf02a32112ab747cea69257a7f8a

                                                  • C:\Users\Admin\AppData\Local\Temp\z90uFtDPzHrl.bat

                                                    Filesize

                                                    211B

                                                    MD5

                                                    6e15ec6598a43c12f828aca4368e49ce

                                                    SHA1

                                                    8776c5641df824f9bc5039d4171c9bb62aa06af7

                                                    SHA256

                                                    a175416d2a521ab77f35923e3e8af3d6422922f94baa66fe27c622413dc1de04

                                                    SHA512

                                                    6b4da6b692e9f010c13c8fb19290c48fa5ef1a869e391925df474f78d3f6dd8d3e7b2af8819e132b3fbd3c1a22e5e1160acef099fa6d154e343b0c52419a04ea

                                                  • C:\Users\Admin\AppData\Roaming\Programfiles\java.exe

                                                    Filesize

                                                    3.3MB

                                                    MD5

                                                    bc884c0edbc8df559985b42fdd2fc985

                                                    SHA1

                                                    9611a03c424e0285ab1a8ea9683918ce7b5909ab

                                                    SHA256

                                                    e848b330ee5a8bd5ae1f6b991551e30a4a5b2e5deeb4718a15b2122101f2c270

                                                    SHA512

                                                    1b8c97d500de45fbf994dcd9bf65cc78106a62ff0770a362add18866cceebbe9f5e157a77d26cb0d0d8de89abe3d446bc911f33e7027fa8f8809d2720b0cedcc

                                                  • memory/2180-0-0x00007FF989863000-0x00007FF989865000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2180-10-0x00007FF989860000-0x00007FF98A321000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/2180-2-0x00007FF989860000-0x00007FF98A321000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/2180-1-0x0000000000380000-0x00000000006CE000-memory.dmp

                                                    Filesize

                                                    3.3MB

                                                  • memory/4608-19-0x00007FF989860000-0x00007FF98A321000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/4608-9-0x00007FF989860000-0x00007FF98A321000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/4608-11-0x00007FF989860000-0x00007FF98A321000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/4608-12-0x00000000028F0000-0x0000000002940000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/4608-13-0x000000001BBE0000-0x000000001BC92000-memory.dmp

                                                    Filesize

                                                    712KB