Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 09:28

General

  • Target

    RevsExternal.exe

  • Size

    3.1MB

  • MD5

    abdb9928a2443e939fd0e3b2758fac86

  • SHA1

    963518e3d31b32ade1faa2d3ad4a5f29f4a94718

  • SHA256

    36ea2fb6f0b7279ea15e54dba6d2c41a00bc3f56e26a59e1bf21867865b2e2db

  • SHA512

    3b21a68634fe6c467de89614a7719aed29d664d83857dc3f9684eaa96a155e349aa471bf2bd7a526e201de4805ce2072224de0bb6763490fce6da61b089eb2bb

  • SSDEEP

    49152:Xvluf2NUaNmwzPWlvdaKM7ZxTwi0zBBxLSoGd5THHB72eh2NT:Xvwf2NUaNmwzPWlvdaB7ZxTwJz8

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

AuraReal

C2

tcp://auraboyy-27610.portmap.host:23133 => 4782:23133

Mutex

23455755-5d9f-40df-b240-406c00706fe9

Attributes
  • encryption_key

    2482B7514A53EC61E5CFC0A64CF01CDEB49C6056

  • install_name

    Win64.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    Extras

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Drops file in System32 directory 33 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\RevsExternal.exe
    "C:\Users\Admin\AppData\Local\Temp\RevsExternal.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3752
    • C:\Windows\system32\Extras\Win64.exe
      "C:\Windows\system32\Extras\Win64.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2940
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YCjA57eLMpZX.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4176
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:1008
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4044
          • C:\Windows\system32\Extras\Win64.exe
            "C:\Windows\system32\Extras\Win64.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3836
            • C:\Windows\SYSTEM32\schtasks.exe
              "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:828
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xPig9kNXsmPO.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1620
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:2104
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:1076
                • C:\Windows\system32\Extras\Win64.exe
                  "C:\Windows\system32\Extras\Win64.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:4600
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:1512
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nktyGP7ATK5W.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1744
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:1940
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:1536
                      • C:\Windows\system32\Extras\Win64.exe
                        "C:\Windows\system32\Extras\Win64.exe"
                        8⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:4488
                        • C:\Windows\SYSTEM32\schtasks.exe
                          "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:4776
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bIvWAUdaB8uV.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2788
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:1640
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:1476
                            • C:\Windows\system32\Extras\Win64.exe
                              "C:\Windows\system32\Extras\Win64.exe"
                              10⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of WriteProcessMemory
                              PID:3576
                              • C:\Windows\SYSTEM32\schtasks.exe
                                "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                11⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:4640
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\90zlDZLTMsoC.bat" "
                                11⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2668
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  12⤵
                                    PID:4996
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    12⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:4656
                                  • C:\Windows\system32\Extras\Win64.exe
                                    "C:\Windows\system32\Extras\Win64.exe"
                                    12⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of WriteProcessMemory
                                    PID:4016
                                    • C:\Windows\SYSTEM32\schtasks.exe
                                      "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                      13⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:4452
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\a5UnxGEqRLup.bat" "
                                      13⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:2492
                                      • C:\Windows\system32\chcp.com
                                        chcp 65001
                                        14⤵
                                          PID:2692
                                        • C:\Windows\system32\PING.EXE
                                          ping -n 10 localhost
                                          14⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:2020
                                        • C:\Windows\system32\Extras\Win64.exe
                                          "C:\Windows\system32\Extras\Win64.exe"
                                          14⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          PID:4028
                                          • C:\Windows\SYSTEM32\schtasks.exe
                                            "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                            15⤵
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:2876
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uEVSwFUdogON.bat" "
                                            15⤵
                                              PID:672
                                              • C:\Windows\system32\chcp.com
                                                chcp 65001
                                                16⤵
                                                  PID:4128
                                                • C:\Windows\system32\PING.EXE
                                                  ping -n 10 localhost
                                                  16⤵
                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                  • Runs ping.exe
                                                  PID:3428
                                                • C:\Windows\system32\Extras\Win64.exe
                                                  "C:\Windows\system32\Extras\Win64.exe"
                                                  16⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:3324
                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                    "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                                    17⤵
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:2320
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\R3v9QxMfwsnf.bat" "
                                                    17⤵
                                                      PID:4444
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        18⤵
                                                          PID:2716
                                                        • C:\Windows\system32\PING.EXE
                                                          ping -n 10 localhost
                                                          18⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:1684
                                                        • C:\Windows\system32\Extras\Win64.exe
                                                          "C:\Windows\system32\Extras\Win64.exe"
                                                          18⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of FindShellTrayWindow
                                                          • Suspicious use of SendNotifyMessage
                                                          PID:3168
                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                            "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                                            19⤵
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2456
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UVN7hMS3JTOx.bat" "
                                                            19⤵
                                                              PID:4988
                                                              • C:\Windows\system32\chcp.com
                                                                chcp 65001
                                                                20⤵
                                                                  PID:1632
                                                                • C:\Windows\system32\PING.EXE
                                                                  ping -n 10 localhost
                                                                  20⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:4040
                                                                • C:\Windows\system32\Extras\Win64.exe
                                                                  "C:\Windows\system32\Extras\Win64.exe"
                                                                  20⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  • Suspicious use of SendNotifyMessage
                                                                  PID:3668
                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                    "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                                                    21⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:852
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rmVrx32L0RL8.bat" "
                                                                    21⤵
                                                                      PID:3960
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp 65001
                                                                        22⤵
                                                                          PID:552
                                                                        • C:\Windows\system32\PING.EXE
                                                                          ping -n 10 localhost
                                                                          22⤵
                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                          • Runs ping.exe
                                                                          PID:828
                                                                        • C:\Windows\system32\Extras\Win64.exe
                                                                          "C:\Windows\system32\Extras\Win64.exe"
                                                                          22⤵
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Drops file in System32 directory
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:752
                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                            "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                                                            23⤵
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:4812
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UQezohrdrcPS.bat" "
                                                                            23⤵
                                                                              PID:2696
                                                                              • C:\Windows\system32\chcp.com
                                                                                chcp 65001
                                                                                24⤵
                                                                                  PID:5016
                                                                                • C:\Windows\system32\PING.EXE
                                                                                  ping -n 10 localhost
                                                                                  24⤵
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  • Runs ping.exe
                                                                                  PID:2980
                                                                                • C:\Windows\system32\Extras\Win64.exe
                                                                                  "C:\Windows\system32\Extras\Win64.exe"
                                                                                  24⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                  • Suspicious use of SendNotifyMessage
                                                                                  PID:2360
                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                    "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                                                                    25⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:704
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5RSTZZVLd5J2.bat" "
                                                                                    25⤵
                                                                                      PID:4604
                                                                                      • C:\Windows\system32\chcp.com
                                                                                        chcp 65001
                                                                                        26⤵
                                                                                          PID:1556
                                                                                        • C:\Windows\system32\PING.EXE
                                                                                          ping -n 10 localhost
                                                                                          26⤵
                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                          • Runs ping.exe
                                                                                          PID:2400
                                                                                        • C:\Windows\system32\Extras\Win64.exe
                                                                                          "C:\Windows\system32\Extras\Win64.exe"
                                                                                          26⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                          • Suspicious use of SendNotifyMessage
                                                                                          PID:5088
                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                            "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                                                                            27⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:1172
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Sj1tW5ZEfjMI.bat" "
                                                                                            27⤵
                                                                                              PID:2536
                                                                                              • C:\Windows\system32\chcp.com
                                                                                                chcp 65001
                                                                                                28⤵
                                                                                                  PID:1820
                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                  ping -n 10 localhost
                                                                                                  28⤵
                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                  • Runs ping.exe
                                                                                                  PID:4796
                                                                                                • C:\Windows\system32\Extras\Win64.exe
                                                                                                  "C:\Windows\system32\Extras\Win64.exe"
                                                                                                  28⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                  PID:4544
                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                    "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                                                                                    29⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:4956
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OtLb1a2Lsnd3.bat" "
                                                                                                    29⤵
                                                                                                      PID:3976
                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                        chcp 65001
                                                                                                        30⤵
                                                                                                          PID:1084
                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                          ping -n 10 localhost
                                                                                                          30⤵
                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                          • Runs ping.exe
                                                                                                          PID:2468
                                                                                                        • C:\Windows\system32\Extras\Win64.exe
                                                                                                          "C:\Windows\system32\Extras\Win64.exe"
                                                                                                          30⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Executes dropped EXE
                                                                                                          • Drops file in System32 directory
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                          PID:4040
                                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                            "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Windows\system32\Extras\Win64.exe" /rl HIGHEST /f
                                                                                                            31⤵
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:1796
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4f2grJPk11Ry.bat" "
                                                                                                            31⤵
                                                                                                              PID:1680
                                                                                                              • C:\Windows\system32\chcp.com
                                                                                                                chcp 65001
                                                                                                                32⤵
                                                                                                                  PID:4092
                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                  ping -n 10 localhost
                                                                                                                  32⤵
                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                  • Runs ping.exe
                                                                                                                  PID:3260

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Win64.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    8f0271a63446aef01cf2bfc7b7c7976b

                                                    SHA1

                                                    b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7

                                                    SHA256

                                                    da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c

                                                    SHA512

                                                    78a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5

                                                  • C:\Users\Admin\AppData\Local\Temp\4f2grJPk11Ry.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    fb7533e71b850c60f9ef22417b0bfd41

                                                    SHA1

                                                    4f9e262e6d24a77b2d9e26c457a9d6f67b497cd2

                                                    SHA256

                                                    791497b8ded13136351c006bbdfbfd13aedfdb5e2b8ee2e7e016f11b17a423f7

                                                    SHA512

                                                    db19e5903644406c53b37015d2edb5e9395181a45d35043253a3e6f7cceb4e4f5381fbe4abaf08f01b71a7a5746f66723093a015002f8b2689803d0d638659c8

                                                  • C:\Users\Admin\AppData\Local\Temp\5RSTZZVLd5J2.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    1978718e61920a4b6584a98ac52d9e17

                                                    SHA1

                                                    76df0793a37e14011ca38795247a3b427d7b1df5

                                                    SHA256

                                                    166b33109b598d4923ac7fb4e5bc5ef4e0ea48692c535566299471543a9fb7f4

                                                    SHA512

                                                    a16993919a43a1d954b65c983aca7db0f6c1be7e5c6ce0ef76fe73dac043ae53cfa0774c2096ba3f92d8df5bb0153c383bc2edd81af926d6394b12730f39a947

                                                  • C:\Users\Admin\AppData\Local\Temp\90zlDZLTMsoC.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    9b302bd64596f565e3bd1d0c46aa1abc

                                                    SHA1

                                                    099221da313d09370f3dbdc38cf695737c9e603f

                                                    SHA256

                                                    444841f5d385cfcea4298e6cdb3a097af74f53b4886aba1fa31bfb35da7f1bfb

                                                    SHA512

                                                    7cd7de9e87c757e408aa3d99726c22d90d9c035063a77991b23ce2b4a26a5040344f71833d723bd4abbc11dc4984c2810f91fe5c7286ab008f8c326fb547900c

                                                  • C:\Users\Admin\AppData\Local\Temp\OtLb1a2Lsnd3.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    dbdd15446ff169613aba8d60fb95f403

                                                    SHA1

                                                    9ce97174aef464b42ab4f2a944b4d18cd0e9e63f

                                                    SHA256

                                                    89aaecc7788ba9147b985047a9786bc3e3936d02981f5d65c147cbd02b26fa2d

                                                    SHA512

                                                    3a1d428a559c901803f78b2279549b49213f69a65e04bf327066c8f5b9d2c057ac53968a595fd9adb6a38a2412c31ccfc670d362ecc37fa3fc08bb5c13a93707

                                                  • C:\Users\Admin\AppData\Local\Temp\R3v9QxMfwsnf.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    fbf73a2228c3d2d55967b4e567d320b6

                                                    SHA1

                                                    98367ac114397ae8fcab58887099abcb56c855d0

                                                    SHA256

                                                    eef33f3dae7cd7d42e93bb8749eae20d0f0a3e1483c9d25c1ec14ce7fcf9652e

                                                    SHA512

                                                    083bd3afe74e53daeaea0ab039dfd4db9c5ac57bae53901fa0a9317194781508a169c27eea8cd6398d78081f3fa8888d28cdb95609f958c36b9f4981d76184df

                                                  • C:\Users\Admin\AppData\Local\Temp\Sj1tW5ZEfjMI.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    b65082eb8a9ca1bc660eaf99e4542fe0

                                                    SHA1

                                                    4c940c0e8522f055b553c5bd65a494df7320c72c

                                                    SHA256

                                                    f12b4685571a1de33b9eabdcecbbb3c8a69d5ef82a432383417b3a3f3e3ed641

                                                    SHA512

                                                    7e7b268ae0ba3c934a6478f8aca9d26081a41463ff7b1e3acff620bc476885df88ff995055bd07e7fa4257c3ee78e79c6f5df5172386ba43e9781084e0c840d3

                                                  • C:\Users\Admin\AppData\Local\Temp\UQezohrdrcPS.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    a862c646e65b27547542f4e33ddab3d2

                                                    SHA1

                                                    03a0abeeeb4285009021fbff0b06df7238cb1b43

                                                    SHA256

                                                    287fcc978d5622aeb437759b71de69ace903c23d987837a9e38b8bb59f49b349

                                                    SHA512

                                                    34e915dc197bffe43abc6ed9546bb54f85e8b77dca489a509373d6c365ad3f5951bc5c5cc2b17abd918d219caf12b82384be9eecf3ab014f4111daba03aee7f2

                                                  • C:\Users\Admin\AppData\Local\Temp\UVN7hMS3JTOx.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    37c5a71c34723afa03182d6c6c3800ef

                                                    SHA1

                                                    812fc0278a2d2c6d08b915bf959bef42358e7706

                                                    SHA256

                                                    538fc75386b033dc1192d79ed92c97644550f1a8d6a10b7ed1d8ea05649bb599

                                                    SHA512

                                                    f59b46ec97e5f72b0f2eee50c890f862f67b80f8dae1c2c4425e3acbeed8fb4976cd59e6b18b2df7a6c0a1a693c4396252f4cc16989d3e1e1416bddc3c5bee7d

                                                  • C:\Users\Admin\AppData\Local\Temp\YCjA57eLMpZX.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    de2f15bacedd8c41802bba14d5f9f0bf

                                                    SHA1

                                                    c9c3c67337ebbd4804f0fdc256d5626c0633ac7f

                                                    SHA256

                                                    44f87221c321164a52c6b914fb4479f7f6790e4226a22b2b6a64ee5b7b3c81a0

                                                    SHA512

                                                    03919d2b5ee7c5c1996a2a47f093fc164277e5e6180b765fb788d90f3e8f7e976b5db821179daf52637fc1d98a213b3a6589f09f8d9f888b9a3e1d6e565b5582

                                                  • C:\Users\Admin\AppData\Local\Temp\a5UnxGEqRLup.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    ec4dfd70c38ed17a792414a06c15ffe5

                                                    SHA1

                                                    e3c5d937e90df51ef3dd83a593aa41e4ac796ecb

                                                    SHA256

                                                    de8449fc1a653a4cf0292f691099157539ff22d578931f530ad3024bd4350038

                                                    SHA512

                                                    41deebf2ee6bb7189f6bb30f6c5e7775eab2d4a29f274336d9828a4472190db34ec79f3d5dabab9b68e74ca243c166eecd9968a2dc62220e50bda9ae37b677fb

                                                  • C:\Users\Admin\AppData\Local\Temp\bIvWAUdaB8uV.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    b30e94cad4bcc6a9f539687e79de2409

                                                    SHA1

                                                    1035a6a59dcb703c2a585a6e7980746395c58fd8

                                                    SHA256

                                                    d202c84e0a84480d989d2ba17a05a245dbb581843c3bd34164578dd1419d2fa4

                                                    SHA512

                                                    32f73ea8b4ebe0dbba318712a58771658ad3c64c7f1d707df54b3d9c24a0e342e82f6a41d81c7a86dd66785281f1249ea9a8295e9dcb19e313deaefa7107ecc3

                                                  • C:\Users\Admin\AppData\Local\Temp\nktyGP7ATK5W.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    ef92a0897f5ff7021c309b540c685424

                                                    SHA1

                                                    d1f8b01bbd8d088fe1d177361cecd58f795de7a6

                                                    SHA256

                                                    3744cb1daa003924c6aa3b11840be43d1d0f5114fc4db6f8e776deff207ae9f7

                                                    SHA512

                                                    4d5ab6e0f5eb622a69dcc3bdf5378730fa3e59b364f9560cfd9ceeec1286acef4207e8b97e15af582942e2103e1912033a14286f3addc2b4fd3efcea4782a198

                                                  • C:\Users\Admin\AppData\Local\Temp\rmVrx32L0RL8.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    61d2bb144d40e4e591c162d77087f581

                                                    SHA1

                                                    463df9920b8b8595160dbba11e4573e84cf6c78f

                                                    SHA256

                                                    573332ca56abde23d3ba44b4ed65865738c2139ea458ef726155cc1193a55df4

                                                    SHA512

                                                    a18670460203f3cad63d6166434615074b408504e0eb20b8248114b7937eb438815ad782accc0e8631a0f95637b62d906d18d27b85914ba4ddf7fa08e95db88e

                                                  • C:\Users\Admin\AppData\Local\Temp\uEVSwFUdogON.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    20f985445192aca2e68767cfdae219c7

                                                    SHA1

                                                    6d03a73151b799a95ffce301a8fe3255acd82ac7

                                                    SHA256

                                                    58ca08679ec7865a64eaabe140d56cc22efd62349fe8a1c60521191d282d0284

                                                    SHA512

                                                    bb3a8943b3b9ebea304442bc6003c516202a9ffd64b316a2c9a6efcb6557ea363f1245e26199cfc120f2f5d8ed889575386e7b0fe19bc04c87175d43756330bd

                                                  • C:\Users\Admin\AppData\Local\Temp\xPig9kNXsmPO.bat

                                                    Filesize

                                                    195B

                                                    MD5

                                                    d8c130e951ec441a91640a3bb93df30c

                                                    SHA1

                                                    17ba7bff1c033691c3bbc33d2e900dc6e03feb93

                                                    SHA256

                                                    e2c654c6cce7c2e5e0374d1071dcc49023cae99d5a85fb4502fa198e9616ad44

                                                    SHA512

                                                    f7b6e3b992f3f1dd597f134684e5c43c840a33cd8dd376a5b4cc655f644a26b4ae6e0b683ee8f1bdb39f72dd45199585ccde5a23c16014b37da923121e230d90

                                                  • C:\Windows\System32\Extras\Win64.exe

                                                    Filesize

                                                    3.1MB

                                                    MD5

                                                    abdb9928a2443e939fd0e3b2758fac86

                                                    SHA1

                                                    963518e3d31b32ade1faa2d3ad4a5f29f4a94718

                                                    SHA256

                                                    36ea2fb6f0b7279ea15e54dba6d2c41a00bc3f56e26a59e1bf21867865b2e2db

                                                    SHA512

                                                    3b21a68634fe6c467de89614a7719aed29d664d83857dc3f9684eaa96a155e349aa471bf2bd7a526e201de4805ce2072224de0bb6763490fce6da61b089eb2bb

                                                  • memory/1788-18-0x00007FF8A8570000-0x00007FF8A9031000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/1788-13-0x000000001BF50000-0x000000001C002000-memory.dmp

                                                    Filesize

                                                    712KB

                                                  • memory/1788-12-0x000000001BE40000-0x000000001BE90000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/1788-11-0x00007FF8A8570000-0x00007FF8A9031000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/1788-10-0x00007FF8A8570000-0x00007FF8A9031000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/3884-0-0x00007FF8A8573000-0x00007FF8A8575000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/3884-9-0x00007FF8A8570000-0x00007FF8A9031000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/3884-2-0x00007FF8A8570000-0x00007FF8A9031000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/3884-1-0x0000000000570000-0x0000000000894000-memory.dmp

                                                    Filesize

                                                    3.1MB