Overview
overview
10Static
static
1055b3d90596...38.exe
windows7-x64
1055b3d90596...38.exe
windows10-2004-x64
1055bc6e4a24...7e.exe
windows7-x64
855bc6e4a24...7e.exe
windows10-2004-x64
855be056b62...2f.exe
windows7-x64
1055be056b62...2f.exe
windows10-2004-x64
1055c90346c1...7d.exe
windows7-x64
755c90346c1...7d.exe
windows10-2004-x64
755e68f668a...36.exe
windows7-x64
1055e68f668a...36.exe
windows10-2004-x64
105600890872...c9.exe
windows7-x64
15600890872...c9.exe
windows10-2004-x64
1563d48f590...69.exe
windows7-x64
7563d48f590...69.exe
windows10-2004-x64
756583e9f6e...61.exe
windows7-x64
1056583e9f6e...61.exe
windows10-2004-x64
10569bb28f26...62.exe
windows7-x64
7569bb28f26...62.exe
windows10-2004-x64
756a0fe7669...54.exe
windows7-x64
1056a0fe7669...54.exe
windows10-2004-x64
1056bf03053c...ec.exe
windows7-x64
1056bf03053c...ec.exe
windows10-2004-x64
1056f180528b...73.exe
windows7-x64
1056f180528b...73.exe
windows10-2004-x64
105737ca76a6...88.exe
windows7-x64
105737ca76a6...88.exe
windows10-2004-x64
10575bc86968...a1.exe
windows7-x64
7575bc86968...a1.exe
windows10-2004-x64
757d8199712...1f.exe
windows7-x64
1057d8199712...1f.exe
windows10-2004-x64
57f8be0d4c...5a.exe
windows7-x64
1057f8be0d4c...5a.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:11
Behavioral task
behavioral1
Sample
55b3d9059616b5aefb891d6c73e91acc1479e9b151684a2663ee031c71fb1538.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55b3d9059616b5aefb891d6c73e91acc1479e9b151684a2663ee031c71fb1538.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
55bc6e4a240651d4266ea63bd771337e.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
55bc6e4a240651d4266ea63bd771337e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
55be056b6277768f3344436f323aca62fe5baaf572f804f9e32e9edc48c4802f.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
55be056b6277768f3344436f323aca62fe5baaf572f804f9e32e9edc48c4802f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
55e68f668a9bc6872ae937e6ffb74136.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
55e68f668a9bc6872ae937e6ffb74136.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
5600890872cfada0e85b0d33ada4d88b2a0c359fb3cc5300d70bb0a1575e19c9.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
5600890872cfada0e85b0d33ada4d88b2a0c359fb3cc5300d70bb0a1575e19c9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
563d48f59066cea184f9ca9c8e116af85f627335f9e38749e10b9f5a8224e469.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
56583e9f6e3105d594f0451658686110a1f68b5fb285057148d1b3c6d087bb61.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
56583e9f6e3105d594f0451658686110a1f68b5fb285057148d1b3c6d087bb61.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
569bb28f26e0170d21d0f5788a4ee262.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
569bb28f26e0170d21d0f5788a4ee262.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
56a0fe76690153775e7d0af4698d0ef50c369cf078079269825f53cf2eec5b54.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
56a0fe76690153775e7d0af4698d0ef50c369cf078079269825f53cf2eec5b54.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
56bf03053c6a58211b3bb060862ea7ec.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
56bf03053c6a58211b3bb060862ea7ec.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
56f180528b74e418299dd53d17305073.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
56f180528b74e418299dd53d17305073.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
5737ca76a64d47bb4cca4745520c6e536f4b8360502070dfdacbd4ba1bb6ae88.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
5737ca76a64d47bb4cca4745520c6e536f4b8360502070dfdacbd4ba1bb6ae88.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
575bc86968dd39f1d1c96d337977010b47d6617890d54c1a0a4d0fee013be6a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
575bc86968dd39f1d1c96d337977010b47d6617890d54c1a0a4d0fee013be6a1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
57d8199712f6f26f823f126d36745bb96fdec8d3ea2cb92b42b655a8adbba21f.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
57d8199712f6f26f823f126d36745bb96fdec8d3ea2cb92b42b655a8adbba21f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
57f8be0d4c7021dd7b09ec4eff55e6803ca1f11b7bb4935319b4ee8c70034b5a.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
57f8be0d4c7021dd7b09ec4eff55e6803ca1f11b7bb4935319b4ee8c70034b5a.exe
Resource
win10v2004-20250314-en
General
-
Target
55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe
-
Size
3.6MB
-
MD5
3253b2e17495ad4fa33b0caa88defd97
-
SHA1
112eeaa584434e26a2303b9ed654b2d9feabab20
-
SHA256
55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d
-
SHA512
e15a08a9a16817699526111907e9b3d9ed437c3d2da7b4a83a54f395cb71403cc6805b415494aa0bd2eb753ce53021ef77e4a1153865339572bd0841aadb1d77
-
SSDEEP
98304:i250LpLG9AVCX9Uv1k24W2xhg+rjTCYSGtS+T7OvTik:i250PVCNUdF4zxhg+HSGQ+3kT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation csrss.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation csrss.exe -
Executes dropped EXE 5 IoCs
pid Process 4556 csrss.exe 380 csrss.exe 2716 csrss.exe 2300 csrss.exe 4236 csrss.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\dllhost.exe 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\5940a34987c991 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Sun\Java\Deployment\csrss.exe 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe File created C:\Windows\Sun\Java\Deployment\886983d96e3d3e 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4760 PING.EXE 4056 PING.EXE 3456 PING.EXE 4972 PING.EXE -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings csrss.exe Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings csrss.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 3456 PING.EXE 4972 PING.EXE 4760 PING.EXE 4056 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe Token: SeDebugPrivilege 4556 csrss.exe Token: SeDebugPrivilege 380 csrss.exe Token: SeDebugPrivilege 2716 csrss.exe Token: SeDebugPrivilege 2300 csrss.exe Token: SeDebugPrivilege 4236 csrss.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1320 wrote to memory of 5320 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 88 PID 1320 wrote to memory of 5320 1320 55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe 88 PID 5320 wrote to memory of 4744 5320 cmd.exe 90 PID 5320 wrote to memory of 4744 5320 cmd.exe 90 PID 5320 wrote to memory of 4760 5320 cmd.exe 91 PID 5320 wrote to memory of 4760 5320 cmd.exe 91 PID 5320 wrote to memory of 4556 5320 cmd.exe 97 PID 5320 wrote to memory of 4556 5320 cmd.exe 97 PID 4556 wrote to memory of 2448 4556 csrss.exe 101 PID 4556 wrote to memory of 2448 4556 csrss.exe 101 PID 2448 wrote to memory of 5108 2448 cmd.exe 103 PID 2448 wrote to memory of 5108 2448 cmd.exe 103 PID 2448 wrote to memory of 4056 2448 cmd.exe 104 PID 2448 wrote to memory of 4056 2448 cmd.exe 104 PID 2448 wrote to memory of 380 2448 cmd.exe 108 PID 2448 wrote to memory of 380 2448 cmd.exe 108 PID 380 wrote to memory of 4596 380 csrss.exe 109 PID 380 wrote to memory of 4596 380 csrss.exe 109 PID 4596 wrote to memory of 3384 4596 cmd.exe 111 PID 4596 wrote to memory of 3384 4596 cmd.exe 111 PID 4596 wrote to memory of 3508 4596 cmd.exe 112 PID 4596 wrote to memory of 3508 4596 cmd.exe 112 PID 4596 wrote to memory of 2716 4596 cmd.exe 114 PID 4596 wrote to memory of 2716 4596 cmd.exe 114 PID 2716 wrote to memory of 4764 2716 csrss.exe 119 PID 2716 wrote to memory of 4764 2716 csrss.exe 119 PID 4764 wrote to memory of 1040 4764 cmd.exe 121 PID 4764 wrote to memory of 1040 4764 cmd.exe 121 PID 4764 wrote to memory of 3456 4764 cmd.exe 122 PID 4764 wrote to memory of 3456 4764 cmd.exe 122 PID 4764 wrote to memory of 2300 4764 cmd.exe 123 PID 4764 wrote to memory of 2300 4764 cmd.exe 123 PID 2300 wrote to memory of 448 2300 csrss.exe 124 PID 2300 wrote to memory of 448 2300 csrss.exe 124 PID 448 wrote to memory of 4344 448 cmd.exe 126 PID 448 wrote to memory of 4344 448 cmd.exe 126 PID 448 wrote to memory of 4972 448 cmd.exe 127 PID 448 wrote to memory of 4972 448 cmd.exe 127 PID 448 wrote to memory of 4236 448 cmd.exe 128 PID 448 wrote to memory of 4236 448 cmd.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe"C:\Users\Admin\AppData\Local\Temp\55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Sdtk7fBZfT.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5320 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4744
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4760
-
-
C:\Windows\Sun\Java\Deployment\csrss.exe"C:\Windows\Sun\Java\Deployment\csrss.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tdcOVhdoAh.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:5108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4056
-
-
C:\Windows\Sun\Java\Deployment\csrss.exe"C:\Windows\Sun\Java\Deployment\csrss.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\s4Al4mMfKa.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:3384
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:3508
-
-
C:\Windows\Sun\Java\Deployment\csrss.exe"C:\Windows\Sun\Java\Deployment\csrss.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\J8RurXaqj7.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:1040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3456
-
-
C:\Windows\Sun\Java\Deployment\csrss.exe"C:\Windows\Sun\Java\Deployment\csrss.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jyswAWn9wk.bat"10⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\system32\chcp.comchcp 6500111⤵PID:4344
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4972
-
-
C:\Windows\Sun\Java\Deployment\csrss.exe"C:\Windows\Sun\Java\Deployment\csrss.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD53253b2e17495ad4fa33b0caa88defd97
SHA1112eeaa584434e26a2303b9ed654b2d9feabab20
SHA25655c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d
SHA512e15a08a9a16817699526111907e9b3d9ed437c3d2da7b4a83a54f395cb71403cc6805b415494aa0bd2eb753ce53021ef77e4a1153865339572bd0841aadb1d77
-
Filesize
1KB
MD58ee01a9d8d8d1ecf515b687bf5e354ca
SHA1c3b943dce30e425ae34e6737c7d5c3cdd92f79c5
SHA256c45f52a36b283b46aae313b5a4fcbfbfb67b3c5ac4ee3ecd921087ddadb691a1
SHA5126cb43253ddb3d2e5bdedcf76bc299e91ce970c6ccc53a2d9df7ba621435a6a704ce3990bdf59d939e513e609bab3daf8f110c1cca8485e1a9fe8536a67d41dda
-
Filesize
168B
MD5d12c75b72ca7a226cc4a3f5f7d4ca949
SHA1b6f66e2863e218c4933a9a50b0caf0ac87a9520a
SHA256e46d1b19cb285441c42d97c16d3dd4c0200ff34fbff0b20e8da5a5bddcf09f3c
SHA51229261c052eb403ba36c237757ee5e64183fa2ac67b04b0fd2b0db250e375c3870c780e0ea24e89bb177981de0968c5e4798b91a34f2536c9e3a188c5b578e59b
-
Filesize
168B
MD5178a84032d31dcef58f14ba49b91c76a
SHA1e2d00600aac1b6d3a8ff70291d374f3c5e0fa869
SHA256116118e62860ecd23fae64e8f03237d932a5258f7ac9c13fe183a954706c2e77
SHA5125bbe5bf51b1f252fc85687b3f06a61d4a7e25f12b8e6712bbc0cb4ebe5fcd8772da60ef4b79a0e3c2e222ba196d708ef386bf89e5ac3bb8ffbe0a1ace56305e3
-
Filesize
168B
MD508c92b00eca3093aade2fb40be395b74
SHA1772d90341cb88b2a5949e8b848f5aa96cfde1352
SHA256659bbae53ae567649c7b599f68c571a965c98e622eb489a1101a58449d1e32ff
SHA512aef6918e1bec48aa400f773792b6ecf70e009a76ff6d426e005cb8418bb9f03fe8393e91baa65f3834ba5469833eabfe3d260d7a8b4a30447bd847971042f9fe
-
Filesize
216B
MD5e9ffcc0457879d659df4cfaea2bd399f
SHA18ba33df402767e1b766361abe1fc41aee9484609
SHA2568ac48f811cbb1da0c628b7521d3307dd34242b6bebbaf7f5b69ce84b7a182832
SHA5124b0a7bc4dbac0cc35b6997d686218c6316249aecaf3b20f28c87ef2fce171c0654e7f7351c2526ff82e557e20e814636fa89ade029e55dc7eda3d7fec602d06a
-
Filesize
168B
MD5960650debdadb6f83cb5cc6446bb94f1
SHA1bad6e90815b96df5f4e557cc4fef86e8d6a46a09
SHA256e3269be845be5c208e5f6162e57e5e5d4c9ca140f38e4ceeca23e7d60597ef24
SHA512716fdf4a973458cbe388b1a746bde6196be7b885ba16041755a3932c63c18f3ef874bafb3b03c4233428c40cda577288bc8a3ac15c49e4e98ee1277c8add614a