Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 09:53
Behavioral task
behavioral1
Sample
9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe
Resource
win10v2004-20241007-en
General
-
Target
9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe
-
Size
483KB
-
MD5
80f82098b4ff87c7980403091b1b17bd
-
SHA1
e148a4bf5d34eddec309012bfb68e459d9129e5b
-
SHA256
9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623
-
SHA512
f44b97af2199f5573eef474e78bc6acbac560455ef5730c4101588c40531099f3784787df95d885dc5756cb7913a2864b7a0987876aac75acfdb7ab1eeffff1a
-
SSDEEP
6144:rSpXb1XT7pvYgsVaeR2gmwhqLhyImR+/tVZecPmzF7aPM1Ujvbj7SHMsz61+:rOr1Xnppc3hTVStVscVPGSXmHj61+
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
DCRat payload 2 IoCs
resource yara_rule behavioral2/memory/2520-1-0x0000000000D30000-0x0000000000DB0000-memory.dmp family_dcrat_v2 behavioral2/files/0x000a000000023b6e-10.dat family_dcrat_v2 -
Checks computer location settings 2 TTPs 21 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation smss.exe -
Executes dropped EXE 20 IoCs
pid Process 1668 smss.exe 2556 smss.exe 3604 smss.exe 4976 smss.exe 972 smss.exe 2200 smss.exe 3640 smss.exe 3692 smss.exe 3508 smss.exe 5052 smss.exe 4960 smss.exe 3684 smss.exe 4848 smss.exe 3844 smss.exe 1624 smss.exe 948 smss.exe 4400 smss.exe 4364 smss.exe 1424 smss.exe 4560 smss.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\SIGNUP\smss.exe 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe File created C:\Program Files\Internet Explorer\SIGNUP\69ddcba757bf72 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\LanguageOverlayCache\explorer.exe 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe File created C:\Windows\InputMethod\CHT\RuntimeBroker.exe 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe File opened for modification C:\Windows\InputMethod\CHT\RuntimeBroker.exe 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe File created C:\Windows\InputMethod\CHT\9e8d7a4ca61bd9 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 9 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5000 PING.EXE 1352 PING.EXE 3412 PING.EXE 5028 PING.EXE 556 PING.EXE 2100 PING.EXE 3696 PING.EXE 880 PING.EXE 1092 PING.EXE -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings smss.exe -
Runs ping.exe 1 TTPs 9 IoCs
pid Process 1092 PING.EXE 5028 PING.EXE 2100 PING.EXE 3412 PING.EXE 1352 PING.EXE 3696 PING.EXE 880 PING.EXE 556 PING.EXE 5000 PING.EXE -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe Token: SeDebugPrivilege 1668 smss.exe Token: SeDebugPrivilege 2556 smss.exe Token: SeDebugPrivilege 3604 smss.exe Token: SeDebugPrivilege 4976 smss.exe Token: SeDebugPrivilege 972 smss.exe Token: SeDebugPrivilege 2200 smss.exe Token: SeDebugPrivilege 3640 smss.exe Token: SeDebugPrivilege 3692 smss.exe Token: SeDebugPrivilege 3508 smss.exe Token: SeDebugPrivilege 5052 smss.exe Token: SeDebugPrivilege 4960 smss.exe Token: SeDebugPrivilege 3684 smss.exe Token: SeDebugPrivilege 4848 smss.exe Token: SeDebugPrivilege 3844 smss.exe Token: SeDebugPrivilege 1624 smss.exe Token: SeDebugPrivilege 948 smss.exe Token: SeDebugPrivilege 4400 smss.exe Token: SeDebugPrivilege 4364 smss.exe Token: SeDebugPrivilege 1424 smss.exe Token: SeDebugPrivilege 4560 smss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3780 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 84 PID 2520 wrote to memory of 3780 2520 9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe 84 PID 3780 wrote to memory of 1084 3780 cmd.exe 86 PID 3780 wrote to memory of 1084 3780 cmd.exe 86 PID 3780 wrote to memory of 556 3780 cmd.exe 87 PID 3780 wrote to memory of 556 3780 cmd.exe 87 PID 3780 wrote to memory of 1668 3780 cmd.exe 92 PID 3780 wrote to memory of 1668 3780 cmd.exe 92 PID 1668 wrote to memory of 532 1668 smss.exe 93 PID 1668 wrote to memory of 532 1668 smss.exe 93 PID 532 wrote to memory of 4768 532 cmd.exe 95 PID 532 wrote to memory of 4768 532 cmd.exe 95 PID 532 wrote to memory of 3696 532 cmd.exe 96 PID 532 wrote to memory of 3696 532 cmd.exe 96 PID 532 wrote to memory of 2556 532 cmd.exe 100 PID 532 wrote to memory of 2556 532 cmd.exe 100 PID 2556 wrote to memory of 1360 2556 smss.exe 101 PID 2556 wrote to memory of 1360 2556 smss.exe 101 PID 1360 wrote to memory of 3124 1360 cmd.exe 103 PID 1360 wrote to memory of 3124 1360 cmd.exe 103 PID 1360 wrote to memory of 456 1360 cmd.exe 104 PID 1360 wrote to memory of 456 1360 cmd.exe 104 PID 1360 wrote to memory of 3604 1360 cmd.exe 105 PID 1360 wrote to memory of 3604 1360 cmd.exe 105 PID 3604 wrote to memory of 4856 3604 smss.exe 106 PID 3604 wrote to memory of 4856 3604 smss.exe 106 PID 4856 wrote to memory of 1912 4856 cmd.exe 108 PID 4856 wrote to memory of 1912 4856 cmd.exe 108 PID 4856 wrote to memory of 2992 4856 cmd.exe 109 PID 4856 wrote to memory of 2992 4856 cmd.exe 109 PID 4856 wrote to memory of 4976 4856 cmd.exe 110 PID 4856 wrote to memory of 4976 4856 cmd.exe 110 PID 4976 wrote to memory of 2700 4976 smss.exe 111 PID 4976 wrote to memory of 2700 4976 smss.exe 111 PID 2700 wrote to memory of 1260 2700 cmd.exe 113 PID 2700 wrote to memory of 1260 2700 cmd.exe 113 PID 2700 wrote to memory of 2100 2700 cmd.exe 114 PID 2700 wrote to memory of 2100 2700 cmd.exe 114 PID 2700 wrote to memory of 972 2700 cmd.exe 117 PID 2700 wrote to memory of 972 2700 cmd.exe 117 PID 972 wrote to memory of 3512 972 smss.exe 118 PID 972 wrote to memory of 3512 972 smss.exe 118 PID 3512 wrote to memory of 2172 3512 cmd.exe 120 PID 3512 wrote to memory of 2172 3512 cmd.exe 120 PID 3512 wrote to memory of 1572 3512 cmd.exe 121 PID 3512 wrote to memory of 1572 3512 cmd.exe 121 PID 3512 wrote to memory of 2200 3512 cmd.exe 122 PID 3512 wrote to memory of 2200 3512 cmd.exe 122 PID 2200 wrote to memory of 3472 2200 smss.exe 123 PID 2200 wrote to memory of 3472 2200 smss.exe 123 PID 3472 wrote to memory of 3024 3472 cmd.exe 125 PID 3472 wrote to memory of 3024 3472 cmd.exe 125 PID 3472 wrote to memory of 5000 3472 cmd.exe 126 PID 3472 wrote to memory of 5000 3472 cmd.exe 126 PID 3472 wrote to memory of 3640 3472 cmd.exe 127 PID 3472 wrote to memory of 3640 3472 cmd.exe 127 PID 3640 wrote to memory of 1708 3640 smss.exe 128 PID 3640 wrote to memory of 1708 3640 smss.exe 128 PID 1708 wrote to memory of 1668 1708 cmd.exe 130 PID 1708 wrote to memory of 1668 1708 cmd.exe 130 PID 1708 wrote to memory of 3924 1708 cmd.exe 131 PID 1708 wrote to memory of 3924 1708 cmd.exe 131 PID 1708 wrote to memory of 3692 1708 cmd.exe 132 PID 1708 wrote to memory of 3692 1708 cmd.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe"C:\Users\Admin\AppData\Local\Temp\9d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623_Sigmanly.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Yw42pgrUyU.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1084
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:556
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zvVxKkmDS4.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4768
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:3696
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EdToEt2qxP.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:3124
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:456
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mup9OI6yD3.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:1912
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2992
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YrEnXzY23X.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\chcp.comchcp 6500111⤵PID:1260
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2100
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\JanKBv1Gj5.bat"12⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\system32\chcp.comchcp 6500113⤵PID:2172
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:1572
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ECvQfnJznV.bat"14⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\system32\chcp.comchcp 6500115⤵PID:3024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5000
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\M4O85ItfzR.bat"16⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\chcp.comchcp 6500117⤵PID:1668
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵PID:3924
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lf01uW6718.bat"18⤵PID:812
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:1716
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:3532
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3508 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\XcOf3EZBsc.bat"20⤵PID:2724
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:3076
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1352
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5052 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\BVR2CWKREk.bat"22⤵PID:4796
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:3920
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵PID:2268
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Z63w1kYtFS.bat"24⤵PID:2732
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:3148
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵PID:4844
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iPELUvEZwh.bat"26⤵PID:2140
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:4164
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵PID:2172
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4848 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kQAtPl7GpD.bat"28⤵PID:748
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:2704
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3412
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3844 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lf01uW6718.bat"30⤵PID:3428
-
C:\Windows\system32\chcp.comchcp 6500131⤵PID:4820
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:1632
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1624 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\n8fHs36pOy.bat"32⤵PID:3064
-
C:\Windows\system32\chcp.comchcp 6500133⤵PID:1296
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3696
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fhkx1dF1Mw.bat"34⤵PID:3592
-
C:\Windows\system32\chcp.comchcp 6500135⤵PID:440
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost35⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:880
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4400 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TFXmW6rvw2.bat"36⤵PID:4700
-
C:\Windows\system32\chcp.comchcp 6500137⤵PID:1076
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:237⤵PID:904
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4364 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iPELUvEZwh.bat"38⤵PID:3100
-
C:\Windows\system32\chcp.comchcp 6500139⤵PID:736
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:239⤵PID:2696
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\81mmE0Ljqu.bat"40⤵PID:2676
-
C:\Windows\system32\chcp.comchcp 6500141⤵PID:5080
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost41⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1092
-
-
C:\Program Files\Internet Explorer\SIGNUP\smss.exe"C:\Program Files\Internet Explorer\SIGNUP\smss.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4560 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WOZXYTZLgh.bat"42⤵PID:2440
-
C:\Windows\system32\chcp.comchcp 6500143⤵PID:332
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD580f82098b4ff87c7980403091b1b17bd
SHA1e148a4bf5d34eddec309012bfb68e459d9129e5b
SHA2569d616be0e9388f525e3256467fd034bb7b647e6aca98ca64b46475cf0b2bf623
SHA512f44b97af2199f5573eef474e78bc6acbac560455ef5730c4101588c40531099f3784787df95d885dc5756cb7913a2864b7a0987876aac75acfdb7ab1eeffff1a
-
Filesize
1KB
MD50f31e501ab247a1b471e8e69930fda3d
SHA1cc4a26314aad742126f6df0e92b777a786eade0b
SHA256f6562e9acf0bb58a78a8ad59d5bc88bdf7a2508b84745605dfc28a19f60e4742
SHA51265c14701fa94622aca52146b0f2d501ac2acdd4acd2a4c666903a800f26310832404a66478f861dd9b10a0a74d99e2b683fb73aef5d153b7ac26aabb96cfea24
-
Filesize
178B
MD5c4b898226603160022640473bcde40cd
SHA164aa74902ee4fad76a441ed123d9e73812f73de7
SHA2565e6b82f73856ea46adcf6035a80a94b0e52dacd13dc20c2ac6f7fc1e19b91e88
SHA51283079cff996cbaa1309bd1995de6842fdab4234602d2895a468f63e338c9118812391e58c88b691bdca8cc5ded8ce38459896357658fe0d703a04d47b28b4178
-
Filesize
226B
MD552cf694bb3a007ba31c10d4058e3da22
SHA1820f2fd410a87cf5c1e853fde24b06aa97f10aeb
SHA25678e1a6d60d2a0b87cd3b1a6276cba6268a78990cdd0e12c04c7b0a0ae68669ff
SHA5129b47407714ba002d493f0a031941d02b748974e844d4f10ae4d2e9cd36649905bb20e1ca9ce4088ff321c45b4bfb5c0426376d84e2a82fb6456a055cac3f16aa
-
Filesize
178B
MD5cdf054243b2b36ce88a41b43cc177489
SHA1e1e46ee4f5eafeb2d6dc62f36bd80c62952205b8
SHA2567264ff4a948ed44c45efabcf93d3f2a6d4271440d08d2aee82391149c7a17f30
SHA51216c5a67b31129639ab84939dfa5c6fcc82ce713402f85090897c1ecf7f00e61eb64cc1ec78575b3c755bc8e336de53cb34400f24c1959bf6880797c991d6dc01
-
Filesize
226B
MD5ddc47a4d5d57e8d643df0a45f16f9af1
SHA1ac9117d9c8158d4a14db49f2e97e8011716576a9
SHA2566e6e11084994690f9e20fbe15cb518c0538505f46f8baa2d4d64652e872c7d9e
SHA512d6e22491114705e02834f2ab788148aec253c4f5a32ab8ba4cca8b5362889e3441c441f3259911f0afdf1d9bbb81d94882668df9195d797d10cf1d173cba8920
-
Filesize
226B
MD5477dd64bb433cec4ffefef64a7f31ef1
SHA106c52d2a75fe14ebb9d75966e04f46b911027bad
SHA25699a2c0c0d3f6ad8b45766c98706b13695603b73986e562a187ac9386968a4f66
SHA5123a1f0ae7a64d7ce0f2ca691231ae15c0053441ae89594711db8930ab84d840d0fecb0fea66d2074f4de3277bc78608cfb30cf4dcf08d5ed10df535965154b744
-
Filesize
226B
MD565d2d395f6ba287c0f9d1becf06f38ce
SHA1790c45108b56a4d505c8bb9bbaf47b3c07390a29
SHA256be18eec456f8371c2a65257455ed60f4bba1d7b839d658944915930bf23868c3
SHA512c29b3b549d28267000fd76d7d780040adf3105e4b279154fbe4393e7dfc37d065f1d20302d79064fedb7212e8ec39029392ffd4b9494c5f6d6f7e0817ecc7628
-
Filesize
226B
MD55ed2692af4a06ad023ff60e142ce0fe8
SHA12def2efbd33f51182e7b6c67fa6ccb86c6ae1b29
SHA2566becb5ce2a92db028a1672689586769c071484a3a4e8f49815dab90741ac48f0
SHA512c99e91822b71913b5b4f3dc9231a205b4e6b09a4b385cd721eb3e6383f483b473d51d6a690ff8cd73dbc98ee040c3c41f989f9387ed608ff2415635ade952e27
-
Filesize
178B
MD5d897dae631654d610da824bb7aa00abf
SHA172bbdb72dc7a1cea1d069e4130d7db7997c54d20
SHA256d6c059042bb5cccd887147e4c19f9b03b15550e04ddb14f5e74783d05feb2e53
SHA512f8bd51460116f62d9be3fabe0a26cfdcf8203bf5cb18086c40fe6088a43077b45d8fd0afdc0f39417e685eb9bf1ec3e9f99b70852212208d8f6434e17b9562bd
-
Filesize
178B
MD57f49b87e6907c5ba85a824f82ac137be
SHA1dbe5e4f2ab96a7b797ffe1ed2949476da18dc08d
SHA2567389c99d78bef511c76342aefc9a758a13324fdbd65d6b287e4651eb2003ba16
SHA51212df350078d6be020ea3e7a47ea4579ca84e8c7152493c65827d47394239e306a398de1193b355cd38fe020131ce743e5afc67ec1104871168ea38fe3a4f9585
-
Filesize
178B
MD578c3b0561c3c3c9759bd2e1c283da0ee
SHA14c8789c3cdcc1c611ebab8a37cb9f9eeccd1c9b7
SHA2566bc5ae1a9dec937a00c53cca7ff0cbebc636e8dd22cf0beee715fee7430da3f0
SHA5126b616e06a66be66f50759acc7f6eebf0dde118d2fe1c5bb477c20ea51182a477eba9a1b01cc1639d9e06f42e5199fa7c390b431d6080773dfa469459c4b0ebbe
-
Filesize
178B
MD5931541f8121d1980ace5cc03e7296726
SHA173cd8cfda63f1321f2fa220df286ff76661e33ca
SHA2566798ca59071f1d0b31637f26d5d5d9e4f18a00baab5367678853c60dc92725e1
SHA512817ff8641a5448ab998231488968e1cbd4b63c124a02210356db7206037c726daaf6ad614088a4260d067e9fb646d9d0c31e0754df3f7223cf6dd9336c0204ae
-
Filesize
226B
MD59a5f21f97d8728e348822c784dd48b6f
SHA14ffc4c6f6d7b30bd8924d5cf1ee8d2a593cd203d
SHA256cf5a87280f0183cdfd2ed6d35310c83a156509fb6d742eb6fb917e7f0c105f46
SHA512018c2cb9a1f1732350556c4332919e1f5775d53b508c7a81cd3cc709dec01a15c59bbd654ee8606e5731f568664768daa5d767514ec72143ccc1d58c06899039
-
Filesize
178B
MD53c9c848d699b62d1b661429dda1881f4
SHA176371bfe04f0db95c3c6000efc1d6818fb58c7c6
SHA25602ad71c369ee5dbc4c8cb35ff31668995b835a5edcd50bf79e63c69b1327998f
SHA512089b1067a90cd0d5ab750772fff2277968aaec3ad2a1d4f0aefbc0ad385e1badb02937ae744051ecfd068c14a6fd35cf7d5ec9eb28d16b584e9b3e70361e5302
-
Filesize
226B
MD5fb711af4886ba5d40a852d815c15883d
SHA1e1f3b8d45ce386b8d4256e80360ad9e5c72db56f
SHA2569a9ea72dbee407a21b6ccf42d74fd0da6e1dc8f2104118d47b1bd3a3b8f572a2
SHA512ed4e7721929d3f2d25ec8de93e442b26d585f52febabb90e828fc349940ec88bf87c949c44ec6f517cc7bfd2dcd3620e28efd3229b3593e521f094fa920dbd61
-
Filesize
178B
MD57570fbf0dc9ab0ef4d2de912975f5730
SHA16655a49bf794ac7e466a6acfb2018206eea15708
SHA2566724391cdecf621721d83c68dd8157951f353ba964c86986243114543ad68ce9
SHA512253deb95ccbb1949552f0ae63ddfdb425d9aa28ab0298170c466f84c29019702235a73045ec9561d3bf0139055690588ff2a7477f772044050f14bf4567fa914
-
Filesize
226B
MD5571ac2e252fc08fdf2b51da297e6bc08
SHA1b0f1cfa49fbb46a87e5e868bb4cd4ce8238d3e0e
SHA2560253946012d67b50a3459680559d9a2524eb99672012c460d30f6d074b056c08
SHA5126fedbb4cce6b069c7e7b3dbe410bd8ed5649d4b910ac13a72a986e8902198f9a8b0656f10faa59c9572c68186598189790bdfd2ca1363d05289b2bfbb2429f60
-
Filesize
226B
MD5caeab2492b0f27feb52fa457562c0660
SHA17323dabcb5a6631a2f48605a85f3eeb92cd7f13f
SHA256dd84f5259ce29a98bfcc77a2818f011c949baf41e3b19ada8bf74f54bff4ec61
SHA51283d34ea41c193bac364f4b3e7a901a2bc934642cfb5251a62cfec5243c4c791af67b0a97bb9ab419836a3d250ca268b1863be1557a467bfb65c0b80622ab7086
-
Filesize
178B
MD57f7cfd74154c8faa4e692f515502f330
SHA17d7f34ebfd19121fd6002bfb376caf7828a68fae
SHA256c6b9b1ee00e6c19fcdd9009a3ad44cd5c5a382ccecb8d416c8c96ddc32a26f97
SHA512b63c410c9333a1164d754fac0a2b41e63181cea20cb3317f5d87d8b6ed93a43c87f7ca940490d86110e25525443e27df6e0904b42ea5a67bed73f6766edee499
-
Filesize
226B
MD57875759d63eb90900596398b5de5d8f4
SHA14c15975413bcbbe3cb4c394fdb8efb7c3e985418
SHA256d3b5269ae7b2fdfaa1273ec3be99918b40c69585bda56290f3d8c04c6a85f134
SHA512f90a7700f1a5fee5148a7f6b1e5a1696c968128ebe746868a73c9a7d30db472ab20c971397be90ee4235a01902b2452a96dbb7c611085d2c6069c4338fe9a5bf