Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/03/2025, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
Crypt C.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Crypt C.dll
Resource
win10v2004-20250314-en
General
-
Target
Crypt C.dll
-
Size
5.5MB
-
MD5
8d252f7a6ff4f929d86cf7feb95a5b08
-
SHA1
fa67e72ea1f9a6018407490359007022c784bdf8
-
SHA256
46a1eec81e8b0d889b6fde07a85405874d4b21da998b34e8b91fd852d1ddb458
-
SHA512
297ab8de6d887c1807bbbb49a04fe83c74874bf8647ab16e69f1680551c4dc50153affc92395c6c0705309df33a035c3368eba67d17220562f3c8c98a5c27f29
-
SSDEEP
98304:DW0704A7pKmwDNRdBYaAGmOGio38um37R6BJZO4A5cfebV/FkZQ:DW044gnwPnbAGmO83OR6BJZ9ATF
Malware Config
Extracted
danabot
-
type
loader
Signatures
-
Danabot family
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" rundll32.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 2 2776 rundll32.exe 17 2776 rundll32.exe -
Uses browser remote debugging 2 TTPs 2 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2196 chrome.exe 2936 chrome.exe -
Loads dropped DLL 10 IoCs
pid Process 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\K: rundll32.exe -
Suspicious use of SetThreadContext 22 IoCs
description pid Process procid_target PID 2776 set thread context of 1840 2776 rundll32.exe 33 PID 2776 set thread context of 696 2776 rundll32.exe 34 PID 2776 set thread context of 2784 2776 rundll32.exe 41 PID 2776 set thread context of 2984 2776 rundll32.exe 42 PID 2776 set thread context of 2164 2776 rundll32.exe 43 PID 2776 set thread context of 1332 2776 rundll32.exe 44 PID 2776 set thread context of 916 2776 rundll32.exe 45 PID 2776 set thread context of 1344 2776 rundll32.exe 46 PID 2776 set thread context of 700 2776 rundll32.exe 47 PID 2776 set thread context of 1940 2776 rundll32.exe 48 PID 2776 set thread context of 880 2776 rundll32.exe 49 PID 2776 set thread context of 620 2776 rundll32.exe 50 PID 2776 set thread context of 2420 2776 rundll32.exe 52 PID 2776 set thread context of 1028 2776 rundll32.exe 53 PID 2776 set thread context of 940 2776 rundll32.exe 54 PID 2776 set thread context of 2432 2776 rundll32.exe 55 PID 2776 set thread context of 1580 2776 rundll32.exe 56 PID 2776 set thread context of 1780 2776 rundll32.exe 57 PID 2776 set thread context of 1620 2776 rundll32.exe 58 PID 2776 set thread context of 1624 2776 rundll32.exe 59 PID 2776 set thread context of 2016 2776 rundll32.exe 60 PID 2776 set thread context of 912 2776 rundll32.exe 61 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 19 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\311674062263A525A133E698AA8C73CFA46AAB09 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\311674062263A525A133E698AA8C73CFA46AAB09\Blob = 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 rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2776 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2776 rundll32.exe Token: SeDebugPrivilege 2776 rundll32.exe Token: SeDebugPrivilege 2776 rundll32.exe Token: SeDebugPrivilege 2776 rundll32.exe Token: SeDebugPrivilege 2776 rundll32.exe Token: SeDebugPrivilege 2776 rundll32.exe Token: SeDebugPrivilege 2776 rundll32.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 1840 rundll32.exe 696 rundll32.exe 2776 rundll32.exe 2784 rundll32.exe 2984 rundll32.exe 2164 rundll32.exe 1332 rundll32.exe 916 rundll32.exe 1344 rundll32.exe 700 rundll32.exe 1940 rundll32.exe 880 rundll32.exe 620 rundll32.exe 2420 rundll32.exe 1028 rundll32.exe 940 rundll32.exe 2432 rundll32.exe 1580 rundll32.exe 1780 rundll32.exe 1620 rundll32.exe 1624 rundll32.exe 2016 rundll32.exe 912 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2776 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2776 3028 rundll32.exe 31 PID 3028 wrote to memory of 2776 3028 rundll32.exe 31 PID 3028 wrote to memory of 2776 3028 rundll32.exe 31 PID 3028 wrote to memory of 2776 3028 rundll32.exe 31 PID 3028 wrote to memory of 2776 3028 rundll32.exe 31 PID 3028 wrote to memory of 2776 3028 rundll32.exe 31 PID 3028 wrote to memory of 2776 3028 rundll32.exe 31 PID 2776 wrote to memory of 1840 2776 rundll32.exe 33 PID 2776 wrote to memory of 1840 2776 rundll32.exe 33 PID 2776 wrote to memory of 1840 2776 rundll32.exe 33 PID 2776 wrote to memory of 1840 2776 rundll32.exe 33 PID 2776 wrote to memory of 1840 2776 rundll32.exe 33 PID 2776 wrote to memory of 696 2776 rundll32.exe 34 PID 2776 wrote to memory of 696 2776 rundll32.exe 34 PID 2776 wrote to memory of 696 2776 rundll32.exe 34 PID 2776 wrote to memory of 696 2776 rundll32.exe 34 PID 2776 wrote to memory of 696 2776 rundll32.exe 34 PID 2776 wrote to memory of 2196 2776 rundll32.exe 36 PID 2776 wrote to memory of 2196 2776 rundll32.exe 36 PID 2776 wrote to memory of 2196 2776 rundll32.exe 36 PID 2776 wrote to memory of 2196 2776 rundll32.exe 36 PID 2196 wrote to memory of 448 2196 chrome.exe 37 PID 2196 wrote to memory of 448 2196 chrome.exe 37 PID 2196 wrote to memory of 448 2196 chrome.exe 37 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 PID 2196 wrote to memory of 700 2196 chrome.exe 38 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Crypt C.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Crypt C.dll",#12⤵
- Modifies visibility of file extensions in Explorer
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2776 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:1840
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe--restore-last-session --remote-debugging-port=9223 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default"3⤵
- Uses browser remote debugging
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x7fef5f49758,0x7fef5f49768,0x7fef5f497784⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --mojo-platform-channel-handle=872 --field-trial-handle=932,i,9903325639187678170,10677037691473259544,131072 --disable-features=PaintHolding /prefetch:24⤵PID:700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1228 --field-trial-handle=932,i,9903325639187678170,10677037691473259544,131072 --disable-features=PaintHolding /prefetch:84⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --first-renderer-process --remote-debugging-port=9223 --allow-pre-commit-input --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1472 --field-trial-handle=932,i,9903325639187678170,10677037691473259544,131072 --disable-features=PaintHolding /prefetch:14⤵
- Uses browser remote debugging
PID:2936
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:2784
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:2984
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:2164
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:1332
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:916
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:1344
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:700
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:1940
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:880
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:620
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:2420
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:1028
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:940
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:2432
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:1580
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:1780
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:1620
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:1624
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:2016
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Suspicious use of FindShellTrayWindow
PID:912
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Authentication Process
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD5d7c0ee6a2f6fe1fd914f68d97d9c4bac
SHA19bafcd16513dae622dc8e13be6b67c35c9dbf2f5
SHA256c30428cd5d7eeeac1ccd995143d00d5c262f9b973e16f15ef64b0f1b9afb77bd
SHA5123f2309a860089150d3c47ec4803ec5dedaecb7c12663f50af05f11168f810ba8df038fe879d52b5f12474c2b374ed06bb1359c69bc6eb06aebebf34ffecf0688
-
Filesize
292KB
MD5ae71383c3cbc5a7c64ee793a5779015b
SHA11cabfd5c590a76fe86af0c042b4d9a6e1546cf78
SHA25629bbdf534e97add374f41c9a2e5a1a34952b8eac501f1a8828f5999e7e0d79f7
SHA512f7703b0e5b67e2c3bbba42efe912eda68c90d7fe4425c7d2f20f02f2d6e659f71870286055eb87095a0861e4ba04a9fbf72bfb328bda10aadafe2880fd06e51d
-
Filesize
46KB
MD5b13fcb3223116f6eec60be9143cae98b
SHA19a9eb6da6d8e008a51e6ce6212c49bfbe7cb3c88
SHA256961fc9bf866c5b58401d3c91735f9a7b7b4fc93c94038c504c965491f622b52b
SHA51289d72b893acd2ec537b3c3deffcc71d1ce02211f9f5b931c561625ee7162052b511e46d4b4596c0a715e1c992310f2536ebdd512db400eeab23c8960ec4d312d
-
Filesize
654KB
MD51fd347ee17287e9c9532c46a49c4abc4
SHA1ad5d9599030bfbcc828c4321fffd7b9066369393
SHA256912373af6f3c176b7e0a71c986d6288f76f5be80de7c9a580b110690271e9237
SHA5129e52622077e805fcff2c6fe510524bf9ca7246da9ef42843041e82ced28b59163a2729335139df9e2d2a4c748ed56471bb053f337655a77d2d0976370f07acf4