Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe
Resource
win7-20240903-en
General
-
Target
b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe
-
Size
4.7MB
-
MD5
aec88dc0fce9bab66fc9c31b30af950d
-
SHA1
476e270fd4e4c7df0d0d3d744b8440d4b7bc2641
-
SHA256
b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc
-
SHA512
235702f1077e47cbeca8373340fd1291bca84d2c34c99eee5f39f331eaaab29bc0b7f91797ba70528f155fa8366562b21c776d3c2ef8085947a6a026915f55e7
-
SSDEEP
98304:3nhRkDypHFpvQLVth6GNvYPFOAzHQidMy/aujLhjCBUl0GO1s:mAHF6JOGNwPFOUHcXuXAlB1s
Malware Config
Signatures
-
CryptBot payload 13 IoCs
resource yara_rule behavioral1/memory/2984-285-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-286-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-289-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-305-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-547-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-578-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-583-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-586-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-589-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-593-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-596-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-599-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot behavioral1/memory/2984-602-0x000000013F7A0000-0x000000013FEB0000-memory.dmp family_cryptbot -
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ilrspct.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2396 WScript.exe 7 2396 WScript.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ilrspct.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ilrspct.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ftagtxvcka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion pffkwkietq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion pffkwkietq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ftagtxvcka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk ftagtxvcka.exe -
Executes dropped EXE 4 IoCs
pid Process 2984 pffkwkietq.exe 1736 ilrspct.exe 1792 ftagtxvcka.exe 2240 SmartClock.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ilrspct.exe -
Loads dropped DLL 11 IoCs
pid Process 1796 cmd.exe 1796 cmd.exe 2896 cmd.exe 1736 ilrspct.exe 1736 ilrspct.exe 1736 ilrspct.exe 2196 cmd.exe 2196 cmd.exe 1792 ftagtxvcka.exe 1792 ftagtxvcka.exe 1792 ftagtxvcka.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 3 iplogger.org 4 iplogger.org 22 bitbucket.org 23 bitbucket.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 1736 ilrspct.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilrspct.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 pffkwkietq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString pffkwkietq.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 964 timeout.exe 1940 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2240 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 1736 ilrspct.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2984 pffkwkietq.exe 2984 pffkwkietq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2592 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 30 PID 2776 wrote to memory of 2592 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 30 PID 2776 wrote to memory of 2592 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 30 PID 2776 wrote to memory of 2592 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 30 PID 2592 wrote to memory of 2396 2592 cmd.exe 32 PID 2592 wrote to memory of 2396 2592 cmd.exe 32 PID 2592 wrote to memory of 2396 2592 cmd.exe 32 PID 2592 wrote to memory of 2396 2592 cmd.exe 32 PID 2776 wrote to memory of 1796 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 33 PID 2776 wrote to memory of 1796 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 33 PID 2776 wrote to memory of 1796 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 33 PID 2776 wrote to memory of 1796 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 33 PID 1796 wrote to memory of 2984 1796 cmd.exe 35 PID 1796 wrote to memory of 2984 1796 cmd.exe 35 PID 1796 wrote to memory of 2984 1796 cmd.exe 35 PID 1796 wrote to memory of 2984 1796 cmd.exe 35 PID 2776 wrote to memory of 2896 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 39 PID 2776 wrote to memory of 2896 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 39 PID 2776 wrote to memory of 2896 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 39 PID 2776 wrote to memory of 2896 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 39 PID 2896 wrote to memory of 1736 2896 cmd.exe 41 PID 2896 wrote to memory of 1736 2896 cmd.exe 41 PID 2896 wrote to memory of 1736 2896 cmd.exe 41 PID 2896 wrote to memory of 1736 2896 cmd.exe 41 PID 2896 wrote to memory of 1736 2896 cmd.exe 41 PID 2896 wrote to memory of 1736 2896 cmd.exe 41 PID 2896 wrote to memory of 1736 2896 cmd.exe 41 PID 1736 wrote to memory of 1256 1736 ilrspct.exe 42 PID 1736 wrote to memory of 1256 1736 ilrspct.exe 42 PID 1736 wrote to memory of 1256 1736 ilrspct.exe 42 PID 1736 wrote to memory of 1256 1736 ilrspct.exe 42 PID 1736 wrote to memory of 1256 1736 ilrspct.exe 42 PID 1736 wrote to memory of 1256 1736 ilrspct.exe 42 PID 1736 wrote to memory of 1256 1736 ilrspct.exe 42 PID 1256 wrote to memory of 964 1256 cmd.exe 44 PID 1256 wrote to memory of 964 1256 cmd.exe 44 PID 1256 wrote to memory of 964 1256 cmd.exe 44 PID 1256 wrote to memory of 964 1256 cmd.exe 44 PID 1256 wrote to memory of 964 1256 cmd.exe 44 PID 1256 wrote to memory of 964 1256 cmd.exe 44 PID 1256 wrote to memory of 964 1256 cmd.exe 44 PID 1736 wrote to memory of 1360 1736 ilrspct.exe 45 PID 1736 wrote to memory of 1360 1736 ilrspct.exe 45 PID 1736 wrote to memory of 1360 1736 ilrspct.exe 45 PID 1736 wrote to memory of 1360 1736 ilrspct.exe 45 PID 1736 wrote to memory of 1360 1736 ilrspct.exe 45 PID 1736 wrote to memory of 1360 1736 ilrspct.exe 45 PID 1736 wrote to memory of 1360 1736 ilrspct.exe 45 PID 1360 wrote to memory of 1940 1360 cmd.exe 47 PID 1360 wrote to memory of 1940 1360 cmd.exe 47 PID 1360 wrote to memory of 1940 1360 cmd.exe 47 PID 1360 wrote to memory of 1940 1360 cmd.exe 47 PID 1360 wrote to memory of 1940 1360 cmd.exe 47 PID 1360 wrote to memory of 1940 1360 cmd.exe 47 PID 1360 wrote to memory of 1940 1360 cmd.exe 47 PID 2776 wrote to memory of 2196 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 49 PID 2776 wrote to memory of 2196 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 49 PID 2776 wrote to memory of 2196 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 49 PID 2776 wrote to memory of 2196 2776 b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe 49 PID 2196 wrote to memory of 1792 2196 cmd.exe 51 PID 2196 wrote to memory of 1792 2196 cmd.exe 51 PID 2196 wrote to memory of 1792 2196 cmd.exe 51 PID 2196 wrote to memory of 1792 2196 cmd.exe 51 PID 1792 wrote to memory of 2240 1792 ftagtxvcka.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe"C:\Users\Admin\AppData\Local\Temp\b308cb2b9e0c87edfca66e3b337f4efbecefbd2ece7a52f8a0708da0934322fc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\lvajjlgtwyrq.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lvajjlgtwyrq.vbs"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\pffkwkietq.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\pffkwkietq.exe"C:\Users\Admin\AppData\Local\Temp\pffkwkietq.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ilrspct.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\ilrspct.exe"C:\Users\Admin\AppData\Local\Temp\ilrspct.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\igbldijht & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\ilrspct.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:964
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\igbldijht & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\ilrspct.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1940
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ftagtxvcka.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\ftagtxvcka.exe"C:\Users\Admin\AppData\Local\Temp\ftagtxvcka.exe"3⤵
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2240
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45B
MD5eeb84128f0e6d62759ef91b599c9c16f
SHA19542da14ec41997313dc529ac9a473f9e962a6d7
SHA256b874d64c8d16b7b050255fa6aaba83ab5f0560ef5fb4eb01ad1fb268b1788bb9
SHA5124f107e656a4a34d99c63e1eefa38af7dc6e64d9f16475cd0bf6444d385825c5648233e05ccfdd682412b22092c08fbceb318b2de09a343f9fd6b832a270d72cf
-
Filesize
150B
MD5cadc7176449b1ef7d75c247c7d248b41
SHA13262d7ebfe5735d499e092504c41d39fb51ade31
SHA256edd1379685f9c0c83b7f870591d940432648d231a666d934dd22ea1a6c690f36
SHA51267321a6d375c18a26a433051980bd868c17cef922473b43e219ec3bb94e22b05c622d3f272150252b4cb8a5d1470b5302a200d08c4d675eaec5581421a9c72cf
-
Filesize
111B
MD540bb2e5b0e040561c035969ab2c199b0
SHA1d1628457775a5c63014c4d5ae4e24395b2876f19
SHA2563179d4be57ac714fbf6f40ccd69f279ef9aaebffc2540a9b9a60f7ba455774dc
SHA512a16027c038b36e4f0c772037885f128e661b57717b8105a19ae765ef63b79f9f914f2507b0607fcfb15dab226d5d0f279077b379cbca5c73f18e7fcec912e27a
-
Filesize
258B
MD554a97a515213b2a11470681080323f37
SHA13d17aa0d015659f24f5addaa10351b134aaee9d0
SHA256663994f111f9d39e3ca2e7677fc23ba27531b8bb595a204fa676823621448c2f
SHA512015028cc16951b8b308ae0a918cdfc170b9cad2ab1fc2038596dfc587830b77977538b6ac6efe279332c4ac0db115e0eb352f2e004b03875af9c95be20d4e369
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a761ac9cfd2c7bee0692fe02017e9bfd
SHA11e27b83685a692b12de1b7d670ed614bfa878219
SHA256a17af9866570f560671183dcb3a982c843934f9219db99f41ea107721b94a2b0
SHA51226a9d88143998b6e9433c44f5e89cfb60bff2eae315665fe415abff572319d52fb6e4ca19a5d5e37b7157dbfd50832509e0998fcf1de84830f1b01b9d9f060e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62b763d024faeb88efb2afcbbfdc96a
SHA10e32882cccfd1dfd199d7aa0846d92e749371714
SHA256aa947efb24798e1da291d2973657f36031ea2326b10485e58c791aeaedb62bea
SHA512659f8e7ef2772ffa4c54e1796efaabedb2b34712f0b0a7032fa4a7f08630781e4dc53fbef0a64a465d70d0933c0ef601eb66b837265181e935f880876b1c7abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5421fe6e8960d3b931c2901e726b09a4f
SHA1cd86dc39ca787556720b6990e0ee4313b3b0e291
SHA256c44b2ade5807284e22caac011e15a66054ef69e5405460d2b4e33e69f6b29c2c
SHA512fc10a308060a42e91d0f6a00bcac0ad559eabf3cc56d92b5f228c91515f04dc502756f01c5adb4ea73481401a94e4976d20c2da7f794e707c57abc68e57c3e2f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1.2MB
MD57afc74bcc667a560be84886ba9b1862d
SHA1ac73fcb0a4418a6a875d5f62a123b92959b98886
SHA2562701d341bcee34e1eea1f853441a1d5199ae0062c98d63d3e40b66da998a0452
SHA51286f02c8fa5b6bf456bc1a78a15caa8ebc7fe0e6a737bfeb977eeaaf4489ab039a47b7c661c4772bb86b68cab9c3b0fdbc41104d36855e2d61bf313f9c20d5bf3
-
Filesize
1.2MB
MD54ecfa11183676f5c8105946d6b2f9ad1
SHA1f3cb200ecae3c4f22fc7967ee32e8a6961666cbf
SHA256d4972e6a37722d8bc884ba45c08ba94e3e0eaa57879f90110994ffd7413d548b
SHA51247c0f46a0de6892ea77f60858cfe6af1685d562a51dfdac476c417a753a7ead993aff9dacebda40e25c4e684b9b906b0a2a921bd06715fca757f4be297b35668
-
Filesize
650B
MD5c675c00525f000d3acae93cbce308759
SHA197f670a215146f0b52e7be184594990d159dd094
SHA256ad1429fdf1a916262dacc38aba62135dca5f3c18414ac7e067b2d1b2c686c52b
SHA51201016fb29ac4d700234c1b709fb8a60b7990a218c399c8af9e1b8abb7c2d99681352f8ee8ec7d42869a97762ff029ba5b025289c789111c134f7d9c6042b906d
-
Filesize
8KB
MD546e2d57198aca4fb24015f3f2b587aed
SHA17ea3b8b498193744f18c8dd0eef66d7275df6289
SHA2568df446781559ffc875d910e8c895fd263ba2e9f3f1d5f3c9d06f9e315069aba6
SHA51218a3782db68cad3edf28cfae69effcac618b46736f248ed365e1f7d83bfe1169c3a2649e6fec8e42b940a4d261c7460c2ab7e8ffc945a924bc3d7d4286c4edd9
-
Filesize
47KB
MD56140644c0744bcd69aa64a8cd7f6a003
SHA1c623a03c08847dab43200120b172f452cceaa8f5
SHA25629ec28bf5ec56951b74f65e713e842653386bcf828e687bd7031e521f75589cd
SHA512ef3d38fdcc42f858e2b6639cb4bdc6d532f793e89211e8756b4498404e4ee01b4a03cfc7b556cca62ff7d9154c3620379e2521e9cb95786d6d313f7114aeb01b
-
Filesize
8KB
MD58dd4471eadbb03e5abab46dce5452cd6
SHA1ca53fa761129aa442ebcfdd334e9ddac3496045b
SHA256cc1790cfa7bfc45576ee59d1499db7d73f9707483edafdc481128b8442b1e800
SHA5121108fc68a256467e3fad48419b4ae43562f0480d0fb2da4f4ffbb0884bc9df385c49cf325e630b3b7677aa9f5c8a610ec1a07d17c9b3c0ccfc2b47d277403425
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD50b4ed39c36bea4bc90d57db7556425bf
SHA1840599a34fc5d8325549b10923c8f77c75fc1705
SHA2563944226b949ca639f50db91bd17cab82ade458e842c25ea40e01b5745a09da0c
SHA5120b916e0915b48c05184f4ab52ef4d7cd8f47fe4efcf8020c03595cd0286206fdeac74cae3050275b70eb0b030c5864d67548bee7b2180cd3ff95c3e356b4b72e
-
Filesize
133B
MD5f87ae10d8fd0327e8fb467cbb139dc5e
SHA1745f5e71753c7cb0f7aad8d7a2c34fb2f0eeb892
SHA256fd7a1c9877e19604ffb09bb0ab6d4f036e82f82524749ca7c62ae95db7615448
SHA512e10069c917ae15c28fc4155c9c31b40c04db5f5f95012f1fdc914495abdbf5ae9bd2ca43b9d4686659785e9d1a727396292a457ca905f9bdcd61d4fe35ae9e98
-
Filesize
2.8MB
MD5a5a71f1b721751b117fceea0839fe78e
SHA1494e98026b7224c6352ca29708264cb90b7f60cb
SHA25693a2e7fcea1289778ced81ff9c61f317c3be87e468a187e89cba9dbdb6a1e5a2
SHA5120898128bab8faf756461262101529642ea67aa8a5330bd6ec50364067fa8350e9a7ef4a9bb83f44e2f976863e6a705d9780eb405ffd123abe0f18c6d11e6e5fa
-
Filesize
2.7MB
MD5c73890713ed117b033c37367c32b90ab
SHA189c73459c9d885cc2664a7a47032773665cc667c
SHA25604901e185e151e3d7205d0aab5e4239c8bead0fb1ec7c866b00d00964bd33d1f
SHA512b1bc799f1fa4687e1fd10c46c634325fc6a250c9668c7b92f4a9546e81a7fc14f7fd919a61643c1155798c5d4c25dc1d9e08245007838fb3b9f8659030a943e5