Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3099355d506...eb.exe
windows7-x64
10099355d506...eb.exe
windows10-2004-x64
1023d6f9a120...1e.exe
windows7-x64
823d6f9a120...1e.exe
windows10-2004-x64
83a9efda763...8a.exe
windows7-x64
103a9efda763...8a.exe
windows10-2004-x64
103b49b6c1cc...86.exe
windows7-x64
103b49b6c1cc...86.exe
windows10-2004-x64
104f8799e544...b7.exe
windows7-x64
104f8799e544...b7.exe
windows10-2004-x64
1051bd8c50dd...09.exe
windows7-x64
1051bd8c50dd...09.exe
windows10-2004-x64
1056b7b7798a...0e.exe
windows7-x64
1056b7b7798a...0e.exe
windows10-2004-x64
1057fb495954...9d.exe
windows7-x64
1057fb495954...9d.exe
windows10-2004-x64
105f278f8bde...cb.exe
windows7-x64
105f278f8bde...cb.exe
windows10-2004-x64
1066b157a3d4...e6.exe
windows7-x64
1066b157a3d4...e6.exe
windows10-2004-x64
106ec9f82a79...36.exe
windows7-x64
106ec9f82a79...36.exe
windows10-2004-x64
108d469fed80...33.exe
windows7-x64
108d469fed80...33.exe
windows10-2004-x64
10977e5ce44a...f1.exe
windows7-x64
10977e5ce44a...f1.exe
windows10-2004-x64
10a4865b2ed7...c6.exe
windows7-x64
10a4865b2ed7...c6.exe
windows10-2004-x64
10cbee3a2ab9...7f.exe
windows7-x64
10cbee3a2ab9...7f.exe
windows10-2004-x64
10cd3b81fbf9...1c.exe
windows7-x64
10cd3b81fbf9...1c.exe
windows10-2004-x64
10Resubmissions
12/03/2025, 21:32
250312-1dmynatxey 1011/03/2025, 16:10
250311-tmgdxaxnx4 1006/03/2025, 02:30
250306-cze8yav1az 10Analysis
-
max time kernel
900s -
max time network
890s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
099355d506f15966ba946cd6f58a72f6c02c73232349cf7f2d6af5641eed0ceb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
099355d506f15966ba946cd6f58a72f6c02c73232349cf7f2d6af5641eed0ceb.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
23d6f9a120790d441377488f28c15f7ffc4df84c3fb5d05ce42f0bae5d75731e.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
23d6f9a120790d441377488f28c15f7ffc4df84c3fb5d05ce42f0bae5d75731e.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
3a9efda763f017e1ca8237aa27f8659b081f62f42e11aa36b6e122f65caca48a.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3a9efda763f017e1ca8237aa27f8659b081f62f42e11aa36b6e122f65caca48a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
3b49b6c1cc92bed7fb10ec3399c1f03449c5ab983a7d03f22bd83392b7a2dc86.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3b49b6c1cc92bed7fb10ec3399c1f03449c5ab983a7d03f22bd83392b7a2dc86.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
51bd8c50dd5a58aa312bbcd0db0a1c297b929b8addb04cca5552a0ed1a79b209.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
51bd8c50dd5a58aa312bbcd0db0a1c297b929b8addb04cca5552a0ed1a79b209.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
56b7b7798a01e1bad522a375b7b096efeba0e118885b353b525b44471cdec90e.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
56b7b7798a01e1bad522a375b7b096efeba0e118885b353b525b44471cdec90e.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
57fb4959548b3597ea3689167e496cdbb83d07afa9f0f3acb6a56987cd50099d.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
57fb4959548b3597ea3689167e496cdbb83d07afa9f0f3acb6a56987cd50099d.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
5f278f8bdee6e51c769320f10506c28a4e84a56ee3ff44f63eec9a189236b1cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
5f278f8bdee6e51c769320f10506c28a4e84a56ee3ff44f63eec9a189236b1cb.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
66b157a3d414b913b1a436edc71e8fc733c1f5457302fe9ca950a8b16d86b9e6.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
66b157a3d414b913b1a436edc71e8fc733c1f5457302fe9ca950a8b16d86b9e6.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
6ec9f82a79152492b6a50a55dee43665e5205d607206573ce3729f824a05db36.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
6ec9f82a79152492b6a50a55dee43665e5205d607206573ce3729f824a05db36.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
8d469fed80fcd597d17e15df98cd15a4646abb69cd7f81795af94c2c46ed2a33.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
8d469fed80fcd597d17e15df98cd15a4646abb69cd7f81795af94c2c46ed2a33.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
a4865b2ed7dce154e50357674e8f15052a532609af0026dc4c8ea69b8a2f77c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
a4865b2ed7dce154e50357674e8f15052a532609af0026dc4c8ea69b8a2f77c6.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
cbee3a2ab943816de40704ed266962b9d84d1a9b58a4a79f0200eb2a7258197f.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
cbee3a2ab943816de40704ed266962b9d84d1a9b58a4a79f0200eb2a7258197f.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
cd3b81fbf93281530341f8c8cd66cfdeb7b2f1ec04f6fbe68ddcc35d28200a1c.exe
Resource
win7-20240903-en
General
-
Target
4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe
-
Size
436KB
-
MD5
9284392fd96b31b3de8d8f664de3f0e4
-
SHA1
9b2e8d834a7e50ec7e674433d019dbd19996036c
-
SHA256
4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7
-
SHA512
61efcc329ba8f50c32de43ba0bfc66e6591158c12fcb095dfa3652e54fc799255a49e44c62f2022b807d51b432050f85d94a172dc0e186af40a21e3848c7c922
-
SSDEEP
6144:qrX0zvg3rjIxvuJMQzp5dVw4JAUvxWgFdgqwixiak3IfMRfkHYgV:iEDg33IpqU4JA61dgq2G74
Malware Config
Extracted
formbook
4.1
o4ms
fishingboatpub.com
trebor72.com
qualitycleanaustralia.com
amphilykenyx.com
jayte90.net
alveegrace.com
le-fleursoleil.com
volumoffer.com
businessbookwriters.com
alpin-art.com
firsttastetogo.com
catofc.com
ref-290.com
sbo2008.com
fortlauderdaleelevators.com
shanghaiyalian.com
majestybags.com
afcerd.com
myceliated.com
ls0a.com
chautauquapistolpermit.com
cq1937.com
riafellowship.com
sjzlyk120.com
onlinerebatemall.com
bjlmzmd.com
services-neetflix-info.info
khaapa.com
thehgboutique.com
iconndigital.com
ninjavendas.com
zeonyej.icu
iddqdtrk.com
taoy360.info
conanagent.icu
mobileflirting.online
lorrainelevis.com
bakerrepublic.com
tfi50.net
mildlobr.com
turnkeypet.com
instarmall.com
contilnetnoticias.website
symbiocrm.com
earn074.com
swapf.com
daveydavisphotography.com
notes2nobody.com
pensje.net
nanoplastiakopoma.com
inlandempiresublease.com
donaldjtryump.com
secondinningseva.com
zumohub.xyz
torbiedesigns.com
koastedco.com
lifestyleeve.com
purposepalacevenue.com
risk-managements.com
doluhediye.com
revolutionarylightworkers.com
smithridge.net
share-store.net
jastalks.com
nocodehost.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral9/memory/2784-7-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\9RO4KZIXE8V = "C:\\Users\\Admin\\AppData\\Roaming\\browse\\browse.exe" control.exe Key created \Registry\User\S-1-5-21-1163522206-1469769407-485553996-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run control.exe -
Executes dropped EXE 2 IoCs
pid Process 2080 browse.exe 2652 browse.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2040 set thread context of 2784 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 32 PID 2080 set thread context of 2652 2080 browse.exe 40 PID 2652 set thread context of 1196 2652 browse.exe 21 PID 1872 set thread context of 1196 1872 control.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language browse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1163522206-1469769407-485553996-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 control.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe 1416 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2784 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 2652 browse.exe 2652 browse.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2652 browse.exe 2652 browse.exe 2652 browse.exe 1872 control.exe 1872 control.exe 1872 control.exe 1872 control.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe Token: SeDebugPrivilege 2080 browse.exe Token: SeDebugPrivilege 2652 browse.exe Token: SeDebugPrivilege 1872 control.exe Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2784 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 32 PID 2040 wrote to memory of 2784 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 32 PID 2040 wrote to memory of 2784 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 32 PID 2040 wrote to memory of 2784 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 32 PID 2040 wrote to memory of 2784 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 32 PID 2040 wrote to memory of 2784 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 32 PID 2040 wrote to memory of 2784 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 32 PID 2040 wrote to memory of 3056 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 33 PID 2040 wrote to memory of 3056 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 33 PID 2040 wrote to memory of 3056 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 33 PID 2040 wrote to memory of 3056 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 33 PID 2040 wrote to memory of 3032 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 34 PID 2040 wrote to memory of 3032 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 34 PID 2040 wrote to memory of 3032 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 34 PID 2040 wrote to memory of 3032 2040 4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe 34 PID 3056 wrote to memory of 2760 3056 cmd.exe 37 PID 3056 wrote to memory of 2760 3056 cmd.exe 37 PID 3056 wrote to memory of 2760 3056 cmd.exe 37 PID 3056 wrote to memory of 2760 3056 cmd.exe 37 PID 2524 wrote to memory of 2080 2524 taskeng.exe 39 PID 2524 wrote to memory of 2080 2524 taskeng.exe 39 PID 2524 wrote to memory of 2080 2524 taskeng.exe 39 PID 2524 wrote to memory of 2080 2524 taskeng.exe 39 PID 2080 wrote to memory of 2652 2080 browse.exe 40 PID 2080 wrote to memory of 2652 2080 browse.exe 40 PID 2080 wrote to memory of 2652 2080 browse.exe 40 PID 2080 wrote to memory of 2652 2080 browse.exe 40 PID 2080 wrote to memory of 2652 2080 browse.exe 40 PID 2080 wrote to memory of 2652 2080 browse.exe 40 PID 2080 wrote to memory of 2652 2080 browse.exe 40 PID 1196 wrote to memory of 1872 1196 Explorer.EXE 41 PID 1196 wrote to memory of 1872 1196 Explorer.EXE 41 PID 1196 wrote to memory of 1872 1196 Explorer.EXE 41 PID 1196 wrote to memory of 1872 1196 Explorer.EXE 41 PID 1872 wrote to memory of 1000 1872 control.exe 42 PID 1872 wrote to memory of 1000 1872 control.exe 42 PID 1872 wrote to memory of 1000 1872 control.exe 42 PID 1872 wrote to memory of 1000 1872 control.exe 42 PID 1872 wrote to memory of 1000 1872 control.exe 42 PID 2080 wrote to memory of 2440 2080 browse.exe 43 PID 2080 wrote to memory of 2440 2080 browse.exe 43 PID 2080 wrote to memory of 2440 2080 browse.exe 43 PID 2080 wrote to memory of 2440 2080 browse.exe 43 PID 2080 wrote to memory of 2644 2080 browse.exe 44 PID 2080 wrote to memory of 2644 2080 browse.exe 44 PID 2080 wrote to memory of 2644 2080 browse.exe 44 PID 2080 wrote to memory of 2644 2080 browse.exe 44 PID 2440 wrote to memory of 1416 2440 cmd.exe 47 PID 2440 wrote to memory of 1416 2440 cmd.exe 47 PID 2440 wrote to memory of 1416 2440 cmd.exe 47 PID 2440 wrote to memory of 1416 2440 cmd.exe 47
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe"C:\Users\Admin\AppData\Local\Temp\4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe"C:\Users\Admin\AppData\Local\Temp\4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\browse\browse.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\browse\browse.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe" "C:\Users\Admin\AppData\Roaming\browse\browse.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3032
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1000
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9185EC8D-23B1-41DA-A78D-AC61010D7E11} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\browse\browse.exeC:\Users\Admin\AppData\Roaming\browse\browse.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Roaming\browse\browse.exe"C:\Users\Admin\AppData\Roaming\browse\browse.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\browse\browse.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\browse\browse.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1416
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\browse\browse.exe" "C:\Users\Admin\AppData\Roaming\browse\browse.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD592fdeeeea15ae5738475077f6862d349
SHA129cab9bcb53bac777870fa81f307ef2010e345fd
SHA256c60a8be46fc27f2af200427bc52d4e53fe346de80222a45777178e7a568b56ca
SHA5121bda9a55be2c7076308561fa8144f1cc5f809fc44b2a0f0cb194db3f42b98a6e1dd6979b921154ef992ff8c03a1da54a2fce36243490b028f60409a346886d9a
-
Filesize
40B
MD52f245469795b865bdd1b956c23d7893d
SHA16ad80b974d3808f5a20ea1e766c7d2f88b9e5895
SHA2561662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361
SHA512909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f
-
Filesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
Filesize
40B
MD5ba3b6bc807d4f76794c4b81b09bb9ba5
SHA124cb89501f0212ff3095ecc0aba97dd563718fb1
SHA2566eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507
SHA512ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf
-
Filesize
436KB
MD59284392fd96b31b3de8d8f664de3f0e4
SHA19b2e8d834a7e50ec7e674433d019dbd19996036c
SHA2564f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7
SHA51261efcc329ba8f50c32de43ba0bfc66e6591158c12fcb095dfa3652e54fc799255a49e44c62f2022b807d51b432050f85d94a172dc0e186af40a21e3848c7c922