Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 14:42

General

  • Target

    26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe

  • Size

    286KB

  • MD5

    b988c49b9654ec30906a781cac1ebaaf

  • SHA1

    85f7f7274e6a134870f309c2b3d06b71807e7626

  • SHA256

    26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf

  • SHA512

    c4454fe6dff339982370a842133db79dba3fb641688d43a47ce4bdfb158a15eff3cad37c34ec4d881ca01e408af43e00f6f36c254f1bc7d93321b9d5f9028ad5

  • SSDEEP

    6144:EhVZx2zU1Ypil1TQxqhzu4nkhdVwbjJ1ybkCrrpo:+xT1tY4Idc1ybkCho

Malware Config

Extracted

Family

quasar

Version

1.4.0.0

Botnet

FakeCreal

C2

espinyskibidi-40205.portmap.host:40205

Mutex

CdrjrrWbtRopP1ic7E

Attributes
  • encryption_key

    HXEHSwyN1GHqlZUqunrd

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Client

  • subdirectory

    Microsoft

Signatures

  • Quasar RAT 4 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 14 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 14 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 14 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 14 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe
    "C:\Users\Admin\AppData\Local\Temp\26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe"
    1⤵
    • Quasar RAT
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf.exe" /rl HIGHEST /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1464
    • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3440
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZkH9kYana1Mc.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:696
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2916
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3532
        • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4680
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4020
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6pNjkjHbkh6l.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:848
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2056
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 10 localhost
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2772
            • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4460
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1948
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QByb0ywa31VY.bat" "
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1384
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5064
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:4880
                • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                  8⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4560
                  • C:\Windows\SysWOW64\schtasks.exe
                    "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:2468
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ItV5LwSfliNc.bat" "
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1800
                    • C:\Windows\SysWOW64\chcp.com
                      chcp 65001
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:980
                    • C:\Windows\SysWOW64\PING.EXE
                      ping -n 10 localhost
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:2284
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                      10⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3604
                      • C:\Windows\SysWOW64\schtasks.exe
                        "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                        11⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:3020
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aI2jhdI5y6j4.bat" "
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:4012
                        • C:\Windows\SysWOW64\chcp.com
                          chcp 65001
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:4532
                        • C:\Windows\SysWOW64\PING.EXE
                          ping -n 10 localhost
                          12⤵
                          • System Location Discovery: System Language Discovery
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:2388
                        • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                          "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                          12⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:976
                          • C:\Windows\SysWOW64\schtasks.exe
                            "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                            13⤵
                            • System Location Discovery: System Language Discovery
                            • Scheduled Task/Job: Scheduled Task
                            PID:4680
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Irypw3jAxHnG.bat" "
                            13⤵
                              PID:3176
                              • C:\Windows\SysWOW64\chcp.com
                                chcp 65001
                                14⤵
                                • System Location Discovery: System Language Discovery
                                PID:2092
                              • C:\Windows\SysWOW64\PING.EXE
                                ping -n 10 localhost
                                14⤵
                                • System Location Discovery: System Language Discovery
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:2212
                              • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                                14⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5072
                                • C:\Windows\SysWOW64\schtasks.exe
                                  "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                                  15⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:3848
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ySqhHvMhqXp7.bat" "
                                  15⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1556
                                  • C:\Windows\SysWOW64\chcp.com
                                    chcp 65001
                                    16⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5048
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping -n 10 localhost
                                    16⤵
                                    • System Location Discovery: System Language Discovery
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:4188
                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                                    16⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1944
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                                      17⤵
                                      • System Location Discovery: System Language Discovery
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:3008
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MOLtCZyWGimN.bat" "
                                      17⤵
                                        PID:1956
                                        • C:\Windows\SysWOW64\chcp.com
                                          chcp 65001
                                          18⤵
                                            PID:1636
                                          • C:\Windows\SysWOW64\PING.EXE
                                            ping -n 10 localhost
                                            18⤵
                                            • System Location Discovery: System Language Discovery
                                            • System Network Configuration Discovery: Internet Connection Discovery
                                            • Runs ping.exe
                                            PID:4068
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                                            18⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3400
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                                              19⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4104
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\91pE7vvgAaC3.bat" "
                                              19⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3540
                                              • C:\Windows\SysWOW64\chcp.com
                                                chcp 65001
                                                20⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2440
                                              • C:\Windows\SysWOW64\PING.EXE
                                                ping -n 10 localhost
                                                20⤵
                                                • System Location Discovery: System Language Discovery
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                • Runs ping.exe
                                                PID:3484
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                                                20⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3308
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                                                  21⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:2056
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Gqq4EjUcFWcD.bat" "
                                                  21⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4680
                                                  • C:\Windows\SysWOW64\chcp.com
                                                    chcp 65001
                                                    22⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3720
                                                  • C:\Windows\SysWOW64\PING.EXE
                                                    ping -n 10 localhost
                                                    22⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:4520
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                                                    22⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4836
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                                                      23⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:3900
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\akWWMdw89sra.bat" "
                                                      23⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:892
                                                      • C:\Windows\SysWOW64\chcp.com
                                                        chcp 65001
                                                        24⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4696
                                                      • C:\Windows\SysWOW64\PING.EXE
                                                        ping -n 10 localhost
                                                        24⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                        • Runs ping.exe
                                                        PID:1336
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                                                        24⤵
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2176
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                                                          25⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:448
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iZXMTQV4DoHk.bat" "
                                                          25⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3832
                                                          • C:\Windows\SysWOW64\chcp.com
                                                            chcp 65001
                                                            26⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:736
                                                          • C:\Windows\SysWOW64\PING.EXE
                                                            ping -n 10 localhost
                                                            26⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            • Runs ping.exe
                                                            PID:4400
                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                                                            26⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:216
                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                              "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                                                              27⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:2276
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BHa6XBMJnjpo.bat" "
                                                              27⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3632
                                                              • C:\Windows\SysWOW64\chcp.com
                                                                chcp 65001
                                                                28⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3296
                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                ping -n 10 localhost
                                                                28⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                • Runs ping.exe
                                                                PID:964
                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe
                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe"
                                                                28⤵
                                                                • Checks computer location settings
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:4008
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  "schtasks" /create /tn "Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe" /rl HIGHEST /f
                                                                  29⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:4280
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YD4HRpy8Dtl5.bat" "
                                                                  29⤵
                                                                    PID:3924
                                                                    • C:\Windows\SysWOW64\chcp.com
                                                                      chcp 65001
                                                                      30⤵
                                                                        PID:2372
                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                        ping -n 10 localhost
                                                                        30⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                        • Runs ping.exe
                                                                        PID:2388

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Client.exe.log

              Filesize

              1KB

              MD5

              10eab9c2684febb5327b6976f2047587

              SHA1

              a12ed54146a7f5c4c580416aecb899549712449e

              SHA256

              f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

              SHA512

              7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

            • C:\Users\Admin\AppData\Local\Temp\6pNjkjHbkh6l.bat

              Filesize

              210B

              MD5

              3a713285675e93114a89060c1d464a26

              SHA1

              86737b32ac6761959aabb5f40399370d36c8a61c

              SHA256

              0e2cc11eb8544b2e944aeb0b91c27f1a1136d289c94ec6692ab0b5d950e4f1cb

              SHA512

              facdfc145b18046869a602cbb7fb7d3364d5385929a697a72ecf59481fbe3b0ea6dc6740002e9cf67d763e769e9a373eda6decf80e577ec79ce7bca3783a3f43

            • C:\Users\Admin\AppData\Local\Temp\91pE7vvgAaC3.bat

              Filesize

              210B

              MD5

              543cd78bd0e0eea79d4f89db2c440a68

              SHA1

              1d933603f6019308ea16cc0c60df58f03ccfb267

              SHA256

              e0b72d63816349c727898b67515ecb16de1766e39f5cd8a68163bf52d0ae8a52

              SHA512

              155c1a3037be65fe2de6aca866da115fe6601118a193fe20ec86b99c1913541bb002798c9b9ad85144346f37b1c29eef889f16976e533ae79ae265f0ea721d18

            • C:\Users\Admin\AppData\Local\Temp\BHa6XBMJnjpo.bat

              Filesize

              210B

              MD5

              cd5c42865a1264e1f0445f3c3d366a38

              SHA1

              732e557b16b18dca2db2f6843debe54cf4b7a831

              SHA256

              504a1b27f3ec153286a4b315eba793ce9b0efcfabab9301d324e4f3dd0a005de

              SHA512

              18f035a235830f7f595ef700f0582086a312d5b22aac62f5424c101d1e9ea751e4f23c33d78a1e18f13fa822b922741a0cb356b41df8fccb5e110bb952b44911

            • C:\Users\Admin\AppData\Local\Temp\Gqq4EjUcFWcD.bat

              Filesize

              210B

              MD5

              9d04ff77edb05e9086f74c8187f86a71

              SHA1

              b96428a01fff756f81454cb5c1ef911f915c9d21

              SHA256

              427a1fcdb8c39694d89780cc807ff86f33fe48b48910e2aad05bde635939a8d3

              SHA512

              2621a5b5319458f811745cbde51e7630e69b0964f05c41d3ce45d4e8b9851e2d8575f8c3ed4a7c74382728d76cf8c4f32b665946115d6ad947e0c86003294a44

            • C:\Users\Admin\AppData\Local\Temp\Irypw3jAxHnG.bat

              Filesize

              210B

              MD5

              8097ba68ae7c4e1f9e5b72040c05f776

              SHA1

              b15deadea4c479ec2d83b782218a67355d7e7714

              SHA256

              54abf87ea74ea242c0c2349acab73e8adfb62a6a2f2bb186bc954402daf5b56b

              SHA512

              76b6c5ab496b3630366bc91652f692fbc9ca9483ebf8f646bc91a16d8e3eaeb47c27c5be356d1f5efe3fd166ab82e51d08cab4604c82916b75c9ceb2a95baaad

            • C:\Users\Admin\AppData\Local\Temp\ItV5LwSfliNc.bat

              Filesize

              210B

              MD5

              7e4d1f13288f959dbe4252159e6b917c

              SHA1

              9c27a1b7c4cc9c380dec046d96a0cb53caf67f1f

              SHA256

              08002f5cb7670a8d73e1b787d3fca963893cd8880f0836e09b78c33dad428908

              SHA512

              8aeef7ebe37d35e6b7214535a486d9f14f81a500942f44771795d8dda61094facec689b75287ab852a6b2c03b587ce54f1f948b47909d994a7335bd2ba6c2a64

            • C:\Users\Admin\AppData\Local\Temp\MOLtCZyWGimN.bat

              Filesize

              210B

              MD5

              e741ec19f4d207feb5e962d3f0fe1ef9

              SHA1

              a7410d0d04668ec024aa7ff386504cb46dc163e9

              SHA256

              c19dff3c145793463153671ce84fbd1d82a2fb63002c2ab1a34f58fed326b113

              SHA512

              0ed64bdbdbca6968330fa2345fb02941358b295db80ca06a2a7749a51651163b4d9d814a99aa9e624d7a9a33e8450e4f0603d56f918bd3bd7b5a359e9c1adb60

            • C:\Users\Admin\AppData\Local\Temp\QByb0ywa31VY.bat

              Filesize

              210B

              MD5

              8cc134ec3520969e299dab8227397a01

              SHA1

              67fc9c2f285db9207d10f48f3060963c1cef7851

              SHA256

              1ab00420d4c174c9aa398fe81143ac7c0668ffb509cccb606a74797c18393dc0

              SHA512

              1d339adc2ca1aeb8c63821a6fd38dc79d336c5f63556f1e8a0f547eb94f90c3ec8a812d2d847da0336bdec980bbc1cdb2242180273070c5c71914374aa8bd49c

            • C:\Users\Admin\AppData\Local\Temp\YD4HRpy8Dtl5.bat

              Filesize

              210B

              MD5

              1c4d21a421b905cdbf37d6e9c642c0a0

              SHA1

              7f1c89541fd8eb135e4963423a82b2708e2462b9

              SHA256

              751fdbcd989040f2d19d5a4a9f48e8aa08d7631de3bfec43d24dffd09f38f297

              SHA512

              2478a847eefd56eff6da82cc0162752d3cd0cc8ef6e9515010b63d5c7b05cc9bc1a86944fc042e107981bbbe7f62917b4f3ee907dba7e4d6f5617182904f4ac1

            • C:\Users\Admin\AppData\Local\Temp\ZkH9kYana1Mc.bat

              Filesize

              210B

              MD5

              aed87a06501e476767f60b5af61a8b87

              SHA1

              16df7394094424488efd8888745780314f11258a

              SHA256

              f62b5d2936e96b8331e88b0b4533943e41a2e72a78b54581251e0de83c30ee0c

              SHA512

              d260f0e4e447701f6cd254482b54473fc8defd3f13470773c150d735d83aab83724a6400ad53a45fcfe39c25b3112d398145b15a3618288ab0bf3c35ae943ae6

            • C:\Users\Admin\AppData\Local\Temp\aI2jhdI5y6j4.bat

              Filesize

              210B

              MD5

              4078f32b836d4ca0b73d607de70d94f6

              SHA1

              2694fab0fbc20b2d2ebd64681cb4cbe836cb7967

              SHA256

              63a55d24ee9dee9dcb7fba8ac271a115af380bc5ba3765a4e53e70add2addc0e

              SHA512

              ed794e5126ef556fcf45f026315a538f8a10d8b62475621b07fd34a9eab6a5248194c4f782f51360a3665c30d70320d7b355a375767c7d39d49070dc4d77c07a

            • C:\Users\Admin\AppData\Local\Temp\akWWMdw89sra.bat

              Filesize

              210B

              MD5

              60d3309e22e949cdae698d5484fcc600

              SHA1

              9b71091fdc44cd063fc7c6eb9ed755ea005e6550

              SHA256

              ecf8a7b659949bbb4bdfc57496206e84b18444ab74907a2577dbf6af0ee1647b

              SHA512

              42894cd08a7cea6172a4078353f1ba1251a76484a162564f1a598304c95db4a1daccbf676dc84b2b44eb1d4c9389701c473f35e2c51f1f988af87549999669fd

            • C:\Users\Admin\AppData\Local\Temp\iZXMTQV4DoHk.bat

              Filesize

              210B

              MD5

              1cf40334b23c07966d1e5904f7365c92

              SHA1

              16cdbfc3683f7fc441473305068cb02b7ec816b6

              SHA256

              48b4aa85714bdfbbd78003050c562a129c47494c098045e57252551b645b57d9

              SHA512

              bd497bb51fd2b02ed38db850942503cd3a7754125967950dd2a1d50fd941ac8fe5c7e8f81c9bbbaafb66c4b1950df9c5bf4c9b5d5539fdcd0e4fa16c6ede6f60

            • C:\Users\Admin\AppData\Local\Temp\ySqhHvMhqXp7.bat

              Filesize

              210B

              MD5

              0c7ce69b40ca2084461f7f36f75866db

              SHA1

              b9ea5cddbcdade92623b95210fafb428b31800b1

              SHA256

              bc5f781f8c0ec4312d8e9e4df02fb7c8896d823523c0f67090b43fb2ddb0410a

              SHA512

              9b9f594177bcc600ead04bdf5bc830fa645fe8c128fe86b89cbf13cc2efeca28aa31d0af76df97ef97daa23e3e1fa3837bf14d06149728c509aa7181d8424b3f

            • C:\Users\Admin\AppData\Roaming\Microsoft\Client.exe

              Filesize

              286KB

              MD5

              b988c49b9654ec30906a781cac1ebaaf

              SHA1

              85f7f7274e6a134870f309c2b3d06b71807e7626

              SHA256

              26bad763d63a12a6fed9f54fd86ab34d6d4b88250e62d67ad8fc2d433c6dcbcf

              SHA512

              c4454fe6dff339982370a842133db79dba3fb641688d43a47ce4bdfb158a15eff3cad37c34ec4d881ca01e408af43e00f6f36c254f1bc7d93321b9d5f9028ad5

            • memory/980-20-0x00000000747E0000-0x0000000074F90000-memory.dmp

              Filesize

              7.7MB

            • memory/980-15-0x00000000747E0000-0x0000000074F90000-memory.dmp

              Filesize

              7.7MB

            • memory/980-12-0x00000000747E0000-0x0000000074F90000-memory.dmp

              Filesize

              7.7MB

            • memory/4952-0-0x00000000747EE000-0x00000000747EF000-memory.dmp

              Filesize

              4KB

            • memory/4952-4-0x00000000747E0000-0x0000000074F90000-memory.dmp

              Filesize

              7.7MB

            • memory/4952-6-0x0000000005A10000-0x0000000005A22000-memory.dmp

              Filesize

              72KB

            • memory/4952-3-0x00000000054C0000-0x0000000005552000-memory.dmp

              Filesize

              584KB

            • memory/4952-2-0x0000000005A70000-0x0000000006014000-memory.dmp

              Filesize

              5.6MB

            • memory/4952-7-0x0000000006700000-0x000000000673C000-memory.dmp

              Filesize

              240KB

            • memory/4952-14-0x00000000747E0000-0x0000000074F90000-memory.dmp

              Filesize

              7.7MB

            • memory/4952-1-0x0000000000A60000-0x0000000000AAE000-memory.dmp

              Filesize

              312KB

            • memory/4952-5-0x0000000005560000-0x00000000055C6000-memory.dmp

              Filesize

              408KB