Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/01/2025, 20:47 UTC

General

  • Target

    1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe

  • Size

    1.2MB

  • MD5

    0ad30f2ec1276bc2214cd362b3e6cb94

  • SHA1

    97b2732d358769a61562334c4762139a533dc6aa

  • SHA256

    1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7

  • SHA512

    b7bbcd2ecd1ae713d9bf34a59354393caaa88f3dc97965b4c5d5254c1928a0dc09ad73c11369548f1f9f3c401e8ca6d05b41be7144999d78dd81813999b781da

  • SSDEEP

    24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiO:WIwgMEuy+inDfp3/XoCw57XYBwKO

Malware Config

Signatures

  • Detect PurpleFox Rootkit 7 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 8 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Purplefox family
  • Drops file in Drivers directory 1 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 3 IoCs
  • VMProtect packed file 10 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 7 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe
    "C:\Users\Admin\AppData\Local\Temp\1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\AppData\Local\Temp\AK47.exe
      "C:\Users\Admin\AppData\Local\Temp\AK47.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:3820
    • C:\Users\Admin\AppData\Local\Temp\AK47.exe
      C:\Users\Admin\AppData\Local\Temp\\AK47.exe
      2⤵
      • Server Software Component: Terminal Services DLL
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:4440
    • C:\Users\Admin\AppData\Local\Temp\AK74.exe
      C:\Users\Admin\AppData\Local\Temp\\AK74.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3300
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\AK74.exe > nul
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 2 127.0.0.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2368
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4060
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"
    1⤵
      PID:4908
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
        C:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240617828.txt",MainThread
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1712
    • C:\Windows\SysWOW64\Ghiya.exe
      C:\Windows\SysWOW64\Ghiya.exe -auto
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4568
      • C:\Windows\SysWOW64\Ghiya.exe
        C:\Windows\SysWOW64\Ghiya.exe -acsi
        2⤵
        • Drops file in Drivers directory
        • Sets service image path in registry
        • Executes dropped EXE
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:2892

    Network

    • flag-us
      DNS
      97.17.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.17.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      133.181.100.95.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      133.181.100.95.in-addr.arpa
      IN PTR
      Response
      133.181.100.95.in-addr.arpa
      IN PTR
      a95-100-181-133deploystaticakamaitechnologiescom
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      138.32.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      138.32.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      218.158.40.23.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      218.158.40.23.in-addr.arpa
      IN PTR
      Response
      218.158.40.23.in-addr.arpa
      IN PTR
      a23-40-158-218deploystaticakamaitechnologiescom
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      217.106.137.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      217.106.137.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      50.23.12.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      50.23.12.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      198.187.3.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      198.187.3.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      86.49.80.91.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      86.49.80.91.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      23.236.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      23.236.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • flag-us
      DNS
      cf1549064127.f3322.net
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      Remote address:
      8.8.8.8:53
      Request
      cf1549064127.f3322.net
      IN A
      Response
    • 43.249.193.73:54997
      1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe
      260 B
      5
    • 43.249.193.73:54997
      1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe
      260 B
      5
    • 43.249.193.73:54997
      1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe
      260 B
      5
    • 43.249.193.73:54997
      1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe
      260 B
      5
    • 43.249.193.73:54997
      1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe
      260 B
      5
    • 43.249.193.73:54997
      1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe
      260 B
      5
    • 43.249.193.73:54997
      1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe
      260 B
      5
    • 43.249.193.73:54997
      1e1964c4a89b60f96840671ad5c8bf87e84a44567b354fba5a353431a72e8da7.exe
    • 8.8.8.8:53
      97.17.167.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      97.17.167.52.in-addr.arpa

    • 8.8.8.8:53
      133.181.100.95.in-addr.arpa
      dns
      73 B
      139 B
      1
      1

      DNS Request

      133.181.100.95.in-addr.arpa

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      138.32.126.40.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      138.32.126.40.in-addr.arpa

    • 8.8.8.8:53
      218.158.40.23.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      218.158.40.23.in-addr.arpa

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      217.106.137.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      217.106.137.52.in-addr.arpa

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      50.23.12.20.in-addr.arpa
      dns
      70 B
      156 B
      1
      1

      DNS Request

      50.23.12.20.in-addr.arpa

    • 8.8.8.8:53
      198.187.3.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      198.187.3.20.in-addr.arpa

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      86.49.80.91.in-addr.arpa
      dns
      70 B
      145 B
      1
      1

      DNS Request

      86.49.80.91.in-addr.arpa

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      23.236.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      23.236.111.52.in-addr.arpa

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      136 B
      129 B
      2
      1

      DNS Request

      cf1549064127.f3322.net

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      136 B
      129 B
      2
      1

      DNS Request

      cf1549064127.f3322.net

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      136 B
      129 B
      2
      1

      DNS Request

      cf1549064127.f3322.net

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      272 B
      129 B
      4
      1

      DNS Request

      cf1549064127.f3322.net

      DNS Request

      cf1549064127.f3322.net

      DNS Request

      cf1549064127.f3322.net

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      136 B
      129 B
      2
      1

      DNS Request

      cf1549064127.f3322.net

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    • 8.8.8.8:53
      cf1549064127.f3322.net
      dns
      Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
      68 B
      129 B
      1
      1

      DNS Request

      cf1549064127.f3322.net

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\AK47.exe

      Filesize

      91KB

      MD5

      423eb994ed553294f8a6813619b8da87

      SHA1

      eca6a16ccd13adcfc27bc1041ddef97ec8081255

      SHA256

      050b4f2d5ae8eaecd414318dc8e222a56f169626da6ca8feb7edd78e8b1f0218

      SHA512

      fab0a9af8031c242c486de373df7277c8b0e39f7a0c9c2ac2e385dbd3ea67be16e91b128287634f76131e5264149ab1b452cd21df4c4895e8c4efc8d8cf99095

    • C:\Users\Admin\AppData\Local\Temp\AK74.exe

      Filesize

      400KB

      MD5

      b0998aa7d5071d33daa5b60b9c3c9735

      SHA1

      9365a1ff0c6de244d6f36c8d84072cc916665d3c

      SHA256

      3080b6bb456564899b0d99d4131bd6a0b284d31f7d80ef773e4872d94048d49a

      SHA512

      308c13cda9fea39b980ae686f44afd9090e9cb8970fffc4436320e0d09a31aee5e656914e0121fe888098a14c52749716fa04980396fd6ac70a88c11cbb6b850

    • C:\Users\Admin\AppData\Roaming\Microsoft\Config.ini

      Filesize

      92B

      MD5

      29ce53e2a4a446614ccc8d64d346bde4

      SHA1

      39a7aa5cc1124842aa0c25abb16ea94452125cbe

      SHA256

      56225be6838bc6e93ea215891eacf28844ae27a9f8b2b29bf19d3a8c2b1f58df

      SHA512

      b2c5a2708c427171a5715801f8ea733ffe88d73aaaaf59c5c752ea32cbe7aae8526cc26eabe84ad5043174c0c69b1d6b15a9fb125c15accfac3462d5d08a0faa

    • C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs

      Filesize

      753B

      MD5

      12ac02d9b8baf50555025b15dc6861ba

      SHA1

      98fe66eeb21bd88db9de3e4f6023eab47c128a18

      SHA256

      885e8d7808703983987d26b286fb325118f40a94b6f674fd44a2636837d48116

      SHA512

      0b480a8dadd97f1decc3a0202a01acf07a6a74d25ce9fbd5174df648a7eb98b76edf8e7c41f6c80be074e76dca208069202e8a53819e1d7835dcf44379cf5049

    • C:\Users\Admin\AppData\Roaming\Microsoft\svchcst.exe

      Filesize

      1.2MB

      MD5

      a9b65ad191350b53c43429c6a43437f4

      SHA1

      d54f71ca7a68cbbda6980a3a098f736a25b6383a

      SHA256

      7e5cd8eb7bd7f8f31ee77f2195cb27299844acb9a90e704e16f8fc8a359d1188

      SHA512

      bfe52f2c3552172f8d6a70b06e77788261607dfb3730dca97c2bdcbe9f718ae71eb06b042bf76ae6acb38f4b696b3bead2d5c8a63ece0ddef00cba2d9011979a

    • C:\Windows\SysWOW64\240617828.txt

      Filesize

      49KB

      MD5

      677ed75ed1cee87e2fb52cfae859147b

      SHA1

      e1573c5e8ce7ec682f5e206b2c386b51f24fa3e1

      SHA256

      e877df841669e2fc855599802dd3c9c6233d32d7be9fb6d9582dd9c96fac179a

      SHA512

      910549f6cd2dd2d402d3a0e7d1ce341b3d76eb5849d1546098c8749ff248f1dac34494ca1ea1fdad23f943a4ad7bf9f2e573c0a05f4a8d255e27ce1328370249

    • C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe

      Filesize

      60KB

      MD5

      889b99c52a60dd49227c5e485a016679

      SHA1

      8fa889e456aa646a4d0a4349977430ce5fa5e2d7

      SHA256

      6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

      SHA512

      08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641

    • memory/2808-78-0x0000000000400000-0x0000000000760000-memory.dmp

      Filesize

      3.4MB

    • memory/2808-81-0x0000000000400000-0x0000000000760000-memory.dmp

      Filesize

      3.4MB

    • memory/2808-84-0x0000000000400000-0x0000000000760000-memory.dmp

      Filesize

      3.4MB

    • memory/2808-74-0x0000000000400000-0x0000000000760000-memory.dmp

      Filesize

      3.4MB

    • memory/2808-71-0x0000000000400000-0x0000000000760000-memory.dmp

      Filesize

      3.4MB

    • memory/2808-0-0x0000000000400000-0x0000000000760000-memory.dmp

      Filesize

      3.4MB

    • memory/2808-68-0x0000000000400000-0x0000000000760000-memory.dmp

      Filesize

      3.4MB

    • memory/2808-87-0x0000000000400000-0x0000000000760000-memory.dmp

      Filesize

      3.4MB

    • memory/2808-1-0x0000000000400000-0x0000000000760000-memory.dmp

      Filesize

      3.4MB

    • memory/2892-53-0x0000000010000000-0x00000000101BA000-memory.dmp

      Filesize

      1.7MB

    • memory/2892-54-0x0000000010000000-0x00000000101BA000-memory.dmp

      Filesize

      1.7MB

    • memory/2892-49-0x0000000010000000-0x00000000101BA000-memory.dmp

      Filesize

      1.7MB

    • memory/3300-30-0x0000000010000000-0x00000000101BA000-memory.dmp

      Filesize

      1.7MB

    • memory/3300-31-0x0000000010000000-0x00000000101BA000-memory.dmp

      Filesize

      1.7MB

    • memory/3300-28-0x0000000010000000-0x00000000101BA000-memory.dmp

      Filesize

      1.7MB

    • memory/4568-36-0x0000000010000000-0x00000000101BA000-memory.dmp

      Filesize

      1.7MB

    • memory/4568-38-0x0000000010000000-0x00000000101BA000-memory.dmp

      Filesize

      1.7MB

    • memory/4568-39-0x0000000010000000-0x00000000101BA000-memory.dmp

      Filesize

      1.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.