Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 22:47
Behavioral task
behavioral1
Sample
6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe
Resource
win7-20240903-en
General
-
Target
6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe
-
Size
5.2MB
-
MD5
7daf63d1938b313710e668cd9830ab90
-
SHA1
66e653dc24239e2a0df3b2a8bfdf6da0d7ef23fe
-
SHA256
6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553
-
SHA512
31f9af62e46d3cd1b93c84afd0cce16d0aa6c0a1ec4aabdf981eb39864a84cb106eb47dbb822a478e87f3de05a24ca424f0a3486d3ad9d3bae30166dac0f3083
-
SSDEEP
49152:ROdWCCi7/rai56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6l0:RWWBibd56utgpPFotBER/mQ32lUg
Malware Config
Extracted
cobaltstrike
0
http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
access_type
512
-
beacon_type
256
-
create_remote_thread
768
-
crypto_scheme
256
-
host
ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/N4215/adj/amzn.us.sr.aps
-
user_agent
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobalt Strike reflective loader 21 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x0003000000012000-3.dat cobalt_reflective_dll behavioral1/files/0x0008000000016d89-7.dat cobalt_reflective_dll behavioral1/files/0x0008000000017079-15.dat cobalt_reflective_dll behavioral1/files/0x00070000000173a7-19.dat cobalt_reflective_dll behavioral1/files/0x00070000000173a9-23.dat cobalt_reflective_dll behavioral1/files/0x0007000000017488-24.dat cobalt_reflective_dll behavioral1/files/0x000a000000017492-31.dat cobalt_reflective_dll behavioral1/files/0x00090000000174cc-41.dat cobalt_reflective_dll behavioral1/files/0x00050000000193b4-60.dat cobalt_reflective_dll behavioral1/files/0x0005000000019427-80.dat cobalt_reflective_dll behavioral1/files/0x0005000000019431-85.dat cobalt_reflective_dll behavioral1/files/0x000500000001944f-104.dat cobalt_reflective_dll behavioral1/files/0x0005000000019441-115.dat cobalt_reflective_dll behavioral1/files/0x0005000000019461-111.dat cobalt_reflective_dll behavioral1/files/0x0034000000016d64-100.dat cobalt_reflective_dll behavioral1/files/0x000500000001941e-75.dat cobalt_reflective_dll behavioral1/files/0x00050000000193e1-70.dat cobalt_reflective_dll behavioral1/files/0x00050000000193c2-65.dat cobalt_reflective_dll behavioral1/files/0x0005000000019350-55.dat cobalt_reflective_dll behavioral1/files/0x0005000000019334-50.dat cobalt_reflective_dll behavioral1/files/0x0007000000019282-46.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Cobaltstrike family
-
Xmrig family
-
XMRig Miner payload 39 IoCs
resource yara_rule behavioral1/memory/2216-126-0x000000013F7D0000-0x000000013FB21000-memory.dmp xmrig behavioral1/memory/2656-94-0x000000013F1B0000-0x000000013F501000-memory.dmp xmrig behavioral1/memory/2776-107-0x000000013F3D0000-0x000000013F721000-memory.dmp xmrig behavioral1/memory/3016-125-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig behavioral1/memory/576-124-0x000000013FEC0000-0x0000000140211000-memory.dmp xmrig behavioral1/memory/2720-122-0x000000013FB60000-0x000000013FEB1000-memory.dmp xmrig behavioral1/memory/3000-121-0x000000013F0F0000-0x000000013F441000-memory.dmp xmrig behavioral1/memory/2592-119-0x000000013F520000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2748-117-0x000000013F480000-0x000000013F7D1000-memory.dmp xmrig behavioral1/memory/3036-113-0x000000013F2A0000-0x000000013F5F1000-memory.dmp xmrig behavioral1/memory/2744-102-0x000000013F1C0000-0x000000013F511000-memory.dmp xmrig behavioral1/memory/2684-99-0x000000013F290000-0x000000013F5E1000-memory.dmp xmrig behavioral1/memory/2824-89-0x000000013FDE0000-0x0000000140131000-memory.dmp xmrig behavioral1/memory/2796-88-0x000000013FB20000-0x000000013FE71000-memory.dmp xmrig behavioral1/memory/2232-131-0x000000013F840000-0x000000013FB91000-memory.dmp xmrig behavioral1/memory/2232-132-0x000000013F840000-0x000000013FB91000-memory.dmp xmrig behavioral1/memory/2796-133-0x000000013FB20000-0x000000013FE71000-memory.dmp xmrig behavioral1/memory/236-150-0x000000013FC50000-0x000000013FFA1000-memory.dmp xmrig behavioral1/memory/816-149-0x000000013FC90000-0x000000013FFE1000-memory.dmp xmrig behavioral1/memory/2128-148-0x000000013FA80000-0x000000013FDD1000-memory.dmp xmrig behavioral1/memory/1820-155-0x000000013F350000-0x000000013F6A1000-memory.dmp xmrig behavioral1/memory/2652-154-0x000000013FA40000-0x000000013FD91000-memory.dmp xmrig behavioral1/memory/324-153-0x000000013F290000-0x000000013F5E1000-memory.dmp xmrig behavioral1/memory/1424-152-0x000000013F6B0000-0x000000013FA01000-memory.dmp xmrig behavioral1/memory/2232-156-0x000000013F840000-0x000000013FB91000-memory.dmp xmrig behavioral1/memory/2796-212-0x000000013FB20000-0x000000013FE71000-memory.dmp xmrig behavioral1/memory/2656-215-0x000000013F1B0000-0x000000013F501000-memory.dmp xmrig behavioral1/memory/3036-218-0x000000013F2A0000-0x000000013F5F1000-memory.dmp xmrig behavioral1/memory/2744-217-0x000000013F1C0000-0x000000013F511000-memory.dmp xmrig behavioral1/memory/2684-222-0x000000013F290000-0x000000013F5E1000-memory.dmp xmrig behavioral1/memory/2824-221-0x000000013FDE0000-0x0000000140131000-memory.dmp xmrig behavioral1/memory/2748-226-0x000000013F480000-0x000000013F7D1000-memory.dmp xmrig behavioral1/memory/2592-228-0x000000013F520000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/2776-224-0x000000013F3D0000-0x000000013F721000-memory.dmp xmrig behavioral1/memory/3000-230-0x000000013F0F0000-0x000000013F441000-memory.dmp xmrig behavioral1/memory/2720-245-0x000000013FB60000-0x000000013FEB1000-memory.dmp xmrig behavioral1/memory/576-243-0x000000013FEC0000-0x0000000140211000-memory.dmp xmrig behavioral1/memory/2216-248-0x000000013F7D0000-0x000000013FB21000-memory.dmp xmrig behavioral1/memory/3016-254-0x000000013F4F0000-0x000000013F841000-memory.dmp xmrig -
Executes dropped EXE 21 IoCs
pid Process 2796 HDqGjhm.exe 2824 nzARFbZ.exe 2656 qQuKiFC.exe 2684 OyzONMp.exe 2744 aJwFBys.exe 2776 hZbbESo.exe 3036 vOFtEtL.exe 2748 zJPjBlZ.exe 2592 FkEGHBR.exe 3000 yvrxbcz.exe 2720 xSGjCBI.exe 576 umgoAgb.exe 3016 xBrcsjL.exe 2216 nAxKiVR.exe 2128 GamEyjU.exe 816 mBuhHtx.exe 236 zmOJyyS.exe 324 JbQzxUE.exe 1820 vwTvkUs.exe 1424 JvvTCqG.exe 2652 prdwHZm.exe -
Loads dropped DLL 21 IoCs
pid Process 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe -
resource yara_rule behavioral1/memory/2232-0-0x000000013F840000-0x000000013FB91000-memory.dmp upx behavioral1/files/0x0003000000012000-3.dat upx behavioral1/files/0x0008000000016d89-7.dat upx behavioral1/files/0x0008000000017079-15.dat upx behavioral1/files/0x00070000000173a7-19.dat upx behavioral1/files/0x00070000000173a9-23.dat upx behavioral1/files/0x0007000000017488-24.dat upx behavioral1/files/0x000a000000017492-31.dat upx behavioral1/files/0x00090000000174cc-41.dat upx behavioral1/files/0x00050000000193b4-60.dat upx behavioral1/files/0x0005000000019427-80.dat upx behavioral1/files/0x0005000000019431-85.dat upx behavioral1/memory/2216-126-0x000000013F7D0000-0x000000013FB21000-memory.dmp upx behavioral1/memory/2656-94-0x000000013F1B0000-0x000000013F501000-memory.dmp upx behavioral1/memory/2776-107-0x000000013F3D0000-0x000000013F721000-memory.dmp upx behavioral1/files/0x000500000001944f-104.dat upx behavioral1/memory/3016-125-0x000000013F4F0000-0x000000013F841000-memory.dmp upx behavioral1/memory/576-124-0x000000013FEC0000-0x0000000140211000-memory.dmp upx behavioral1/memory/2720-122-0x000000013FB60000-0x000000013FEB1000-memory.dmp upx behavioral1/memory/3000-121-0x000000013F0F0000-0x000000013F441000-memory.dmp upx behavioral1/memory/2592-119-0x000000013F520000-0x000000013F871000-memory.dmp upx behavioral1/memory/2748-117-0x000000013F480000-0x000000013F7D1000-memory.dmp upx behavioral1/files/0x0005000000019441-115.dat upx behavioral1/memory/3036-113-0x000000013F2A0000-0x000000013F5F1000-memory.dmp upx behavioral1/files/0x0005000000019461-111.dat upx behavioral1/memory/2744-102-0x000000013F1C0000-0x000000013F511000-memory.dmp upx behavioral1/files/0x0034000000016d64-100.dat upx behavioral1/memory/2684-99-0x000000013F290000-0x000000013F5E1000-memory.dmp upx behavioral1/memory/2824-89-0x000000013FDE0000-0x0000000140131000-memory.dmp upx behavioral1/memory/2796-88-0x000000013FB20000-0x000000013FE71000-memory.dmp upx behavioral1/files/0x000500000001941e-75.dat upx behavioral1/files/0x00050000000193e1-70.dat upx behavioral1/files/0x00050000000193c2-65.dat upx behavioral1/files/0x0005000000019350-55.dat upx behavioral1/files/0x0005000000019334-50.dat upx behavioral1/files/0x0007000000019282-46.dat upx behavioral1/memory/2232-131-0x000000013F840000-0x000000013FB91000-memory.dmp upx behavioral1/memory/2232-132-0x000000013F840000-0x000000013FB91000-memory.dmp upx behavioral1/memory/2796-133-0x000000013FB20000-0x000000013FE71000-memory.dmp upx behavioral1/memory/236-150-0x000000013FC50000-0x000000013FFA1000-memory.dmp upx behavioral1/memory/816-149-0x000000013FC90000-0x000000013FFE1000-memory.dmp upx behavioral1/memory/2128-148-0x000000013FA80000-0x000000013FDD1000-memory.dmp upx behavioral1/memory/1820-155-0x000000013F350000-0x000000013F6A1000-memory.dmp upx behavioral1/memory/2652-154-0x000000013FA40000-0x000000013FD91000-memory.dmp upx behavioral1/memory/324-153-0x000000013F290000-0x000000013F5E1000-memory.dmp upx behavioral1/memory/1424-152-0x000000013F6B0000-0x000000013FA01000-memory.dmp upx behavioral1/memory/2232-156-0x000000013F840000-0x000000013FB91000-memory.dmp upx behavioral1/memory/2796-212-0x000000013FB20000-0x000000013FE71000-memory.dmp upx behavioral1/memory/2656-215-0x000000013F1B0000-0x000000013F501000-memory.dmp upx behavioral1/memory/3036-218-0x000000013F2A0000-0x000000013F5F1000-memory.dmp upx behavioral1/memory/2744-217-0x000000013F1C0000-0x000000013F511000-memory.dmp upx behavioral1/memory/2684-222-0x000000013F290000-0x000000013F5E1000-memory.dmp upx behavioral1/memory/2824-221-0x000000013FDE0000-0x0000000140131000-memory.dmp upx behavioral1/memory/2748-226-0x000000013F480000-0x000000013F7D1000-memory.dmp upx behavioral1/memory/2592-228-0x000000013F520000-0x000000013F871000-memory.dmp upx behavioral1/memory/2776-224-0x000000013F3D0000-0x000000013F721000-memory.dmp upx behavioral1/memory/3000-230-0x000000013F0F0000-0x000000013F441000-memory.dmp upx behavioral1/memory/2720-245-0x000000013FB60000-0x000000013FEB1000-memory.dmp upx behavioral1/memory/576-243-0x000000013FEC0000-0x0000000140211000-memory.dmp upx behavioral1/memory/2216-248-0x000000013F7D0000-0x000000013FB21000-memory.dmp upx behavioral1/memory/3016-254-0x000000013F4F0000-0x000000013F841000-memory.dmp upx -
Drops file in Windows directory 21 IoCs
description ioc Process File created C:\Windows\System\vOFtEtL.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\xSGjCBI.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\xBrcsjL.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\zmOJyyS.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\JvvTCqG.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\vwTvkUs.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\nzARFbZ.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\aJwFBys.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\hZbbESo.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\yvrxbcz.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\GamEyjU.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\prdwHZm.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\HDqGjhm.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\zJPjBlZ.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\FkEGHBR.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\JbQzxUE.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\qQuKiFC.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\OyzONMp.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\umgoAgb.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\nAxKiVR.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe File created C:\Windows\System\mBuhHtx.exe 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe Token: SeLockMemoryPrivilege 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2796 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 31 PID 2232 wrote to memory of 2796 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 31 PID 2232 wrote to memory of 2796 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 31 PID 2232 wrote to memory of 2824 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 32 PID 2232 wrote to memory of 2824 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 32 PID 2232 wrote to memory of 2824 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 32 PID 2232 wrote to memory of 2656 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 33 PID 2232 wrote to memory of 2656 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 33 PID 2232 wrote to memory of 2656 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 33 PID 2232 wrote to memory of 2684 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 34 PID 2232 wrote to memory of 2684 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 34 PID 2232 wrote to memory of 2684 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 34 PID 2232 wrote to memory of 2744 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 35 PID 2232 wrote to memory of 2744 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 35 PID 2232 wrote to memory of 2744 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 35 PID 2232 wrote to memory of 2776 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 36 PID 2232 wrote to memory of 2776 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 36 PID 2232 wrote to memory of 2776 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 36 PID 2232 wrote to memory of 3036 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 37 PID 2232 wrote to memory of 3036 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 37 PID 2232 wrote to memory of 3036 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 37 PID 2232 wrote to memory of 2748 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 38 PID 2232 wrote to memory of 2748 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 38 PID 2232 wrote to memory of 2748 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 38 PID 2232 wrote to memory of 2592 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 39 PID 2232 wrote to memory of 2592 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 39 PID 2232 wrote to memory of 2592 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 39 PID 2232 wrote to memory of 3000 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 40 PID 2232 wrote to memory of 3000 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 40 PID 2232 wrote to memory of 3000 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 40 PID 2232 wrote to memory of 2720 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 41 PID 2232 wrote to memory of 2720 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 41 PID 2232 wrote to memory of 2720 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 41 PID 2232 wrote to memory of 576 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 42 PID 2232 wrote to memory of 576 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 42 PID 2232 wrote to memory of 576 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 42 PID 2232 wrote to memory of 3016 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 43 PID 2232 wrote to memory of 3016 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 43 PID 2232 wrote to memory of 3016 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 43 PID 2232 wrote to memory of 2216 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 44 PID 2232 wrote to memory of 2216 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 44 PID 2232 wrote to memory of 2216 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 44 PID 2232 wrote to memory of 2128 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 45 PID 2232 wrote to memory of 2128 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 45 PID 2232 wrote to memory of 2128 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 45 PID 2232 wrote to memory of 816 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 46 PID 2232 wrote to memory of 816 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 46 PID 2232 wrote to memory of 816 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 46 PID 2232 wrote to memory of 236 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 47 PID 2232 wrote to memory of 236 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 47 PID 2232 wrote to memory of 236 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 47 PID 2232 wrote to memory of 1424 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 48 PID 2232 wrote to memory of 1424 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 48 PID 2232 wrote to memory of 1424 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 48 PID 2232 wrote to memory of 324 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 49 PID 2232 wrote to memory of 324 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 49 PID 2232 wrote to memory of 324 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 49 PID 2232 wrote to memory of 2652 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 50 PID 2232 wrote to memory of 2652 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 50 PID 2232 wrote to memory of 2652 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 50 PID 2232 wrote to memory of 1820 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 51 PID 2232 wrote to memory of 1820 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 51 PID 2232 wrote to memory of 1820 2232 6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe"C:\Users\Admin\AppData\Local\Temp\6c0b175ec4029304472e651cfda86561a871fc91f7941c0d729ea57f57a13553N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\System\HDqGjhm.exeC:\Windows\System\HDqGjhm.exe2⤵
- Executes dropped EXE
PID:2796
-
-
C:\Windows\System\nzARFbZ.exeC:\Windows\System\nzARFbZ.exe2⤵
- Executes dropped EXE
PID:2824
-
-
C:\Windows\System\qQuKiFC.exeC:\Windows\System\qQuKiFC.exe2⤵
- Executes dropped EXE
PID:2656
-
-
C:\Windows\System\OyzONMp.exeC:\Windows\System\OyzONMp.exe2⤵
- Executes dropped EXE
PID:2684
-
-
C:\Windows\System\aJwFBys.exeC:\Windows\System\aJwFBys.exe2⤵
- Executes dropped EXE
PID:2744
-
-
C:\Windows\System\hZbbESo.exeC:\Windows\System\hZbbESo.exe2⤵
- Executes dropped EXE
PID:2776
-
-
C:\Windows\System\vOFtEtL.exeC:\Windows\System\vOFtEtL.exe2⤵
- Executes dropped EXE
PID:3036
-
-
C:\Windows\System\zJPjBlZ.exeC:\Windows\System\zJPjBlZ.exe2⤵
- Executes dropped EXE
PID:2748
-
-
C:\Windows\System\FkEGHBR.exeC:\Windows\System\FkEGHBR.exe2⤵
- Executes dropped EXE
PID:2592
-
-
C:\Windows\System\yvrxbcz.exeC:\Windows\System\yvrxbcz.exe2⤵
- Executes dropped EXE
PID:3000
-
-
C:\Windows\System\xSGjCBI.exeC:\Windows\System\xSGjCBI.exe2⤵
- Executes dropped EXE
PID:2720
-
-
C:\Windows\System\umgoAgb.exeC:\Windows\System\umgoAgb.exe2⤵
- Executes dropped EXE
PID:576
-
-
C:\Windows\System\xBrcsjL.exeC:\Windows\System\xBrcsjL.exe2⤵
- Executes dropped EXE
PID:3016
-
-
C:\Windows\System\nAxKiVR.exeC:\Windows\System\nAxKiVR.exe2⤵
- Executes dropped EXE
PID:2216
-
-
C:\Windows\System\GamEyjU.exeC:\Windows\System\GamEyjU.exe2⤵
- Executes dropped EXE
PID:2128
-
-
C:\Windows\System\mBuhHtx.exeC:\Windows\System\mBuhHtx.exe2⤵
- Executes dropped EXE
PID:816
-
-
C:\Windows\System\zmOJyyS.exeC:\Windows\System\zmOJyyS.exe2⤵
- Executes dropped EXE
PID:236
-
-
C:\Windows\System\JvvTCqG.exeC:\Windows\System\JvvTCqG.exe2⤵
- Executes dropped EXE
PID:1424
-
-
C:\Windows\System\JbQzxUE.exeC:\Windows\System\JbQzxUE.exe2⤵
- Executes dropped EXE
PID:324
-
-
C:\Windows\System\prdwHZm.exeC:\Windows\System\prdwHZm.exe2⤵
- Executes dropped EXE
PID:2652
-
-
C:\Windows\System\vwTvkUs.exeC:\Windows\System\vwTvkUs.exe2⤵
- Executes dropped EXE
PID:1820
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5f3ea821e7e462f64113b4a6e1d5cb869
SHA1b34b8ff55a0871d8a453c84415d2806dc25548cb
SHA2561b7674b7b0d1e47fb0dbe5bc94d5fd2bfc9c2f82e616638a0d86548f59e49165
SHA512f18d09debed88c4aa98d7ccdd4bc00ff9ce17ced9c3d17231335bd0860df8e5b073d8e6eed395616840969c5218ffab0e3de7daa38d0124f013eccbb72fef693
-
Filesize
5.2MB
MD5ab88487d2be290f19dffcef4da2f98c4
SHA1d1db3c06fbc188707afa78c5fec10b7084a88dc4
SHA2567c618695eee32d977d4e1dc5d46617543ca1998c038f2543b79c09a2982756a3
SHA512c73bba068eb94ffc5c90d316c2e288b97b815f8aba26be02e2f97757c6453ea86f0cc044b84b5f3ababed7c579afb5572ea3d0502eb1efa94a5c10ad1e026671
-
Filesize
5.2MB
MD58439c759a08653bf739366209d783fc6
SHA1ce1ed091222316b6325dd88f005cb8cd9b70ced1
SHA2560a05048bb8be51951d768d994aecca5048d407e466d5ce80caa3ee7250b9a401
SHA5128c2ebf3219e08f359ceb4501c68b8548f6c83c48d5db5f22beffb51066a7acf8393d3d6a31a2124bebb4ad7dd09bbd4a97f25c41f408f7888416d29da59a099b
-
Filesize
5.2MB
MD5f18058876d08fba4398d7285af603f9c
SHA1cc76836d9a7cba9cd1b94273bf9be18b30dfcc63
SHA256a1f0cb3c38256befc41c8faa1d437580c693c6476d2fe95bc98fdcb3dc2d0700
SHA512112220cfe639d656045fab49d95ea994801ed048eea563508d43e79e9bbefad88e9b8f71746ad6bcc3ca9fec0723aa348842be1a94bfe541e34e5d4e6aa56c4b
-
Filesize
5.2MB
MD55056a7cd79587b65dfd8d6d9763e0b2e
SHA1ae547df834416bdc82b231af6f226a137573fc01
SHA256622d905cb4b73068d9daced971f1d32c4a49cf38eed159b00620b3066c420713
SHA512a6dd92297b20860c58e5197e7097dbb81f1d6571bd55dc8c83c90a04fc74481bb6812acb8c1da653fc4c069ce1ac5128284ab38714a618f92cd02a1b2fdf3a88
-
Filesize
5.2MB
MD51bd81403a1fdc3862af35f9828008010
SHA110a020e517ba97774d99efb5caa16e0b1e413fe1
SHA256b01efb18ecfaf7c8db397a6f832d5e74eddb0dbe3e542cddc34267ce8966a262
SHA5121112829a62c10aab663eac913d4a10141ba7f4e01f46b59fcc586faa504b382630620261b9a1e9a8523ba4b2440cdde1411fe262e34bbadc6a3f3e8b4bb0408e
-
Filesize
5.2MB
MD591059d39b6d98b4e667103804853d560
SHA15c0707e6e76f4e2daf384f919df2313b574c52f1
SHA2561a011842dbadd2df84ed04c577a4e67640df307214b2f8b3c9cb225a0c20508e
SHA512506a82f17c2031464a09529eb6a635b7668bbcf65ed8d2d86e8a1ed784fa5008d9f3aa62c870b6960c8f34a8816c04ac723e1937d0c1f875cbe2e6fe37d28aeb
-
Filesize
5.2MB
MD55f3f0462503256eec4dcf8c965d177e6
SHA187e4c7a79ef85acbd978a65f50888fdabd9a572e
SHA256d3f4edebaa24016b2f201fff5c6e7668113089f5ba0451255de0b77fafbac6dc
SHA5125586dae5447d7399a2b79003f17b0fd2f006cf386d55d29ef7702f11d38c405b8df4d4d1d04c2996520063a8a39d67ece5e1e463befeff639a8837dcc51cd896
-
Filesize
5.2MB
MD52735ff31bed22af453e8d6a5dd3eb2e3
SHA1b17b2395cb03679a3b639c708c66f82e5d68055f
SHA256f67f8bfb3b529eb4470686a2cdffe4c4e332e9d05a9dee6f31b3b36424f06455
SHA512f918ebbdc2ee47ef84a03d4da5bd7e2a8810960fcc1160e733895e73e92f1e825d584b4b5ca5deab003261c3464466870287bea621a170f0af91f79947f2a00e
-
Filesize
5.2MB
MD5bcbd0f2b00d519ae1147edde1620e3aa
SHA15c5670f26e24163508f61fad16a38c6d6d4472de
SHA25685ab2002493d513e043fffe934b752d602a83dc2ad1d3055748e37aa5d887c61
SHA512ceb47822b934c526e1002a35fafbe2dc51061c0ae830d03d9d10551edcbad815d2c69d2f93343f900cdcc92d9c1e3bff56dda769bdfd4ddbb01e49ae12a967c8
-
Filesize
5.2MB
MD5c2c8ce7a5692923a5efd81732df98230
SHA11866fd38091a5474f22f805740c5406e0523683f
SHA256f2dd540eaf8a66cb39db3336535d3d605c0e2ba7d46a47615a2dd5a0c1776e27
SHA5120feb8ff6d780d5c6134a7ef817eb017aff71bfa1933c23318442a109f1dda220d57306facf2169d4bbf9143616d445b4054da25a26451e1d7a0e8a2035c17655
-
Filesize
5.2MB
MD58229db79b422cf833b5f6ac493ac4f37
SHA10c840ad552b93d2d4a701263a5b16d42958376ba
SHA256d37beec929c471d9378b764ff1cd56a05f3c0d65f013af945331935c77706255
SHA5124d948b32f22bbf6b60d4a9b34f2e577c30133191825d752ad61ef595cbd21095842663985c1d6c619e436d34df9958069762d7f075c35df2b3fab776c498aff4
-
Filesize
5.2MB
MD53d388e1d8ff1f4690defae865428ee0e
SHA11a60ec2fda789acb9dc87bd05d9f9c7f0b4ecd36
SHA256a8d0b999f2c233cfe01ecc5b6b9bbc2adf9886a9af111aedc0dc95e396df40f3
SHA51234da900d9f7bef3f3728224c9998a1eb78f72d7b670c35b77dec8c404a98b6485e248d7ce3c5dc15560d3e4ffba4b805f664391f95c19cdbb8402fba2e3fb13c
-
Filesize
5.2MB
MD533b7d26fc74d71442f397a7406ecee0b
SHA17aa5df78fca103680bdf04f652355af82b421120
SHA25673c33ff0dd2a707c8baaea6e9224b921840133dc63e6c7012073e7b1bd553dc3
SHA512aa8e68d5a5095f5ef1c6e30613f8389c6f99311d350197a37480da123a66c439ea281ba66645a3d225d770ead2563f1594634c0a2c292948cf00b8cbe7b3c06b
-
Filesize
5.2MB
MD5e0e726a38d16f0566edabf1ecd2f7188
SHA15ed2fa38e541c717739c5a2f4b41a6d57affc153
SHA256c6e3c4eed42b31053b203dbe2c139121e69fd8da80129edebd82c23d2b4a8f59
SHA512144a02c8e29e0329a3fe60ac1dcd27140a7b6d28208bea272d50cfc46c36cc6347c422fd56200b0b7ee85a23df94ade4c13a0f7bb2b4d446f788d54fd52fe477
-
Filesize
5.2MB
MD5555cfcd4c4839fc3324fae930f63a937
SHA192616d75b42916d6c3994434db2466cb9953f6d5
SHA256530dca35c3b9b85aa0c6e4ebf080dd2cb61ecf358b2f5ccd68770f66a4e1c3c1
SHA5123696f94c116e1eae18536ad5ca220e115f7415244084a0d3ed25d82e3d4683116d89b10b4a73e1935534660b4d6b256b80f4e236d281f1164de656c092c03524
-
Filesize
5.2MB
MD5a563946bd62260cf2b913cbc2a538f11
SHA199d1687ef6561310f5c544c7b4a62cf229fa018a
SHA256044fb8469dabc6dd001c1aec5e92d4b7c00b44b6c3c15c97977cc69eedd736dc
SHA51288bbfea59459e682a0a14c3a82db46e0bc52ca215064d4e75faf3f967a7279ad3726c67b0c960804061a608efde54f61c815b5a4201f1f37ff34d98d6c57aaf7
-
Filesize
5.2MB
MD5ce8fd0334c86c8ccddddcb8478aa9103
SHA16c4339805d53302fd9085d11d98b656735eaf12e
SHA2560f5444e14a3e6ef265eb320d9c83ac4604294723763554a1ce4f275d83578b78
SHA5129a6252011990394bccf7538d5e3f668142895ffda61fa3d55158ecb211a6eb84ece8987f33641d8a1f7622322615b916d2cbd61a1f55240bf2655da5d4ff0ff6
-
Filesize
5.2MB
MD5ffbf5430423ab131433927a081c8b960
SHA1d0ad641e7fbd7f61f2370eaa905c7d69b2ec11bb
SHA256d6c0452343cbdc447cc2b62a34c494b3b5316bf8f96e46fa83056eb09ecdbfdb
SHA5129d4bf4f91b1061b97e5c9de06329ae9708824bccff46e0cad6ad62d22e9add85f7f28e4a8221dd8131c8872390a3a4202be5cbde1c61a0be02686ed32494d281
-
Filesize
5.2MB
MD51a0795fa8cad82ca111b5e14f580f49b
SHA15c12497f7f425495fbc7657335f12dcd5bd47d0c
SHA25647304a78ecd673e02374919b48dbfc637b0db4d82c2e909ace73bb8e7ce4585e
SHA51237f387a35665b57bd25072337e41ef26043ba819b5bd8e15122e998f26b4549ffc78af07c6544bfe3a914e4da195488edb9354edc623058efde1c93e25ee907c
-
Filesize
5.2MB
MD5acf4307becf65a31656e8f64d772b898
SHA14b3b1d487bcda6c78c131e060b920175666fc4a4
SHA256e38a8d3893595b14c6cc2576aa32e3746bc34a6b3ecc0df91c1bd156a2856a97
SHA5122a8d5acbd1ded432a7dbc338b9cdabfdf41a0f7c532842601824981e6129e1b6b08a37348992ca2cb4920656ccb82a0cdba200eba5002c54f89ded32e378bbe3