Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe
Resource
win10v2004-20241007-en
General
-
Target
aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe
-
Size
240KB
-
MD5
faf76e3e7a41eb3dbfa4a3078319ff50
-
SHA1
22ad8ec32a6a753da4f29e712cbdb9ef661768b1
-
SHA256
aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6f
-
SHA512
16b59441ba9642daa21a135bde8a1978e9accffa96b1ef10057aae81a5753fa419f5e681075418d63f239dc4083c870b298edc4ef43685036847ecc0529e2b71
-
SSDEEP
6144:0haKwdeU7LyrC6pnv445VEXs5kzlu/e7QCsXqb:0hydeUvEpbQsx/eMvqb
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/432-262-0x0000000000400000-0x000000000044D000-memory.dmp family_gandcrab behavioral1/memory/432-260-0x0000000000240000-0x0000000000257000-memory.dmp family_gandcrab behavioral1/memory/432-259-0x0000000000400000-0x000000000044D000-memory.dmp family_gandcrab behavioral1/memory/432-269-0x0000000000400000-0x000000000042C000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wklojumpuqw = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\ttpdvh.exe\"" aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\I: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\X: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\Z: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\H: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\K: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\P: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\Q: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\L: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\O: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\W: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\A: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\B: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\E: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\J: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\T: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\U: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\V: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\Y: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\M: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\N: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\R: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe File opened (read-only) \??\S: aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 432 wrote to memory of 1968 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 29 PID 432 wrote to memory of 1968 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 29 PID 432 wrote to memory of 1968 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 29 PID 432 wrote to memory of 1968 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 29 PID 432 wrote to memory of 1728 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 31 PID 432 wrote to memory of 1728 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 31 PID 432 wrote to memory of 1728 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 31 PID 432 wrote to memory of 1728 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 31 PID 432 wrote to memory of 1784 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 33 PID 432 wrote to memory of 1784 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 33 PID 432 wrote to memory of 1784 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 33 PID 432 wrote to memory of 1784 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 33 PID 432 wrote to memory of 1084 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 35 PID 432 wrote to memory of 1084 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 35 PID 432 wrote to memory of 1084 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 35 PID 432 wrote to memory of 1084 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 35 PID 432 wrote to memory of 2196 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 37 PID 432 wrote to memory of 2196 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 37 PID 432 wrote to memory of 2196 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 37 PID 432 wrote to memory of 2196 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 37 PID 432 wrote to memory of 2484 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 39 PID 432 wrote to memory of 2484 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 39 PID 432 wrote to memory of 2484 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 39 PID 432 wrote to memory of 2484 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 39 PID 432 wrote to memory of 2520 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 41 PID 432 wrote to memory of 2520 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 41 PID 432 wrote to memory of 2520 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 41 PID 432 wrote to memory of 2520 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 41 PID 432 wrote to memory of 2480 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 43 PID 432 wrote to memory of 2480 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 43 PID 432 wrote to memory of 2480 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 43 PID 432 wrote to memory of 2480 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 43 PID 432 wrote to memory of 2340 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 45 PID 432 wrote to memory of 2340 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 45 PID 432 wrote to memory of 2340 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 45 PID 432 wrote to memory of 2340 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 45 PID 432 wrote to memory of 2368 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 47 PID 432 wrote to memory of 2368 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 47 PID 432 wrote to memory of 2368 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 47 PID 432 wrote to memory of 2368 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 47 PID 432 wrote to memory of 2116 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 49 PID 432 wrote to memory of 2116 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 49 PID 432 wrote to memory of 2116 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 49 PID 432 wrote to memory of 2116 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 49 PID 432 wrote to memory of 844 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 51 PID 432 wrote to memory of 844 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 51 PID 432 wrote to memory of 844 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 51 PID 432 wrote to memory of 844 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 51 PID 432 wrote to memory of 2188 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 53 PID 432 wrote to memory of 2188 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 53 PID 432 wrote to memory of 2188 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 53 PID 432 wrote to memory of 2188 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 53 PID 432 wrote to memory of 2848 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 55 PID 432 wrote to memory of 2848 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 55 PID 432 wrote to memory of 2848 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 55 PID 432 wrote to memory of 2848 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 55 PID 432 wrote to memory of 2796 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 57 PID 432 wrote to memory of 2796 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 57 PID 432 wrote to memory of 2796 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 57 PID 432 wrote to memory of 2796 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 57 PID 432 wrote to memory of 2824 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 59 PID 432 wrote to memory of 2824 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 59 PID 432 wrote to memory of 2824 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 59 PID 432 wrote to memory of 2824 432 aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe"C:\Users\Admin\AppData\Local\Temp\aa0ce13c32f2f9b2b2df826f7e7dc27951aed02ecc0cc31acd5b20f8fbdbdc6fN.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1968
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2520
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2480
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2340
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:844
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1208
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1020
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1908
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1176
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1144
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1460
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:828
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:972
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1904
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2772
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1644
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:3032
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:948
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1272
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5fc807cca56c0920e6c0e8036d22fbc61
SHA15d2189f4c501f40dfe09365e2242b0932263f043
SHA2564e4aaff6eabcb85f2f4b5cd624073281b988c2c2605343cc06dcff08ef1baf1a
SHA512cd002ba320c564d221779bb2da246affc3f17fb28e26266173a85ef480a1e486caf2fec4a17fe61841354cb1de3f0c8ad605f87f3851bae15a0515e657002a46