Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
Fatality.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Fatality.exe
Resource
win10v2004-20250314-en
General
-
Target
Fatality.exe
-
Size
3.2MB
-
MD5
314375a212ba4f9038c454820d9c5cad
-
SHA1
2ce6451c052f88a9c0bddad5f23bc3253cb972bd
-
SHA256
003ace97463c139fb1d6c53909c5dac9ffd958a698330a817bc268e6131182c5
-
SHA512
31dcee114b402cded2bcc1f0589963b835e97dd9b2d173aad2ddf1afd72874e335f75bd2d08d2c14ef90334f4d7d01fe0830503479292e7b1d6938c2781eeaf8
-
SSDEEP
98304:dSSniwJ8BPhwpzMda5oyqo7UrstRTJjyPv+I:8+WwpzMw5zqo7UrsDt2PH
Malware Config
Signatures
-
Detect SalatStealer payload 18 IoCs
resource yara_rule behavioral2/memory/2316-64-0x0000000000B00000-0x0000000001624000-memory.dmp family_salatstealer behavioral2/memory/2316-75-0x0000000000B00000-0x0000000001624000-memory.dmp family_salatstealer behavioral2/memory/64-81-0x0000000000660000-0x0000000001184000-memory.dmp family_salatstealer behavioral2/memory/1040-82-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-83-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-84-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-85-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-86-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-87-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-98-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-100-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-103-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-104-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-105-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-106-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-117-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-118-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer behavioral2/memory/1040-119-0x00000000009F0000-0x0000000001514000-memory.dmp family_salatstealer -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Salatstealer family
-
salatstealer
SalatStealer is a stealer that takes sceenshot written in Golang.
-
Executes dropped EXE 16 IoCs
pid Process 2316 fatality.exe 1788 icsys.icn.exe 4924 explorer.exe 4676 spoolsv.exe 2168 svchost.exe 1492 spoolsv.exe 3780 svchost.exe 2472 explorer.exe 1456 explorer.exe 1568 svchost.exe 1040 taskhostw.exe 64 sppsvc.exe 2816 explorer.exe 5016 svchost.exe 3732 svchost.exe 1344 explorer.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\sppsvc.exe" fatality.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "C:\\Program Files (x86)\\Mozilla Maintenance Service\\taskhostw.exe" fatality.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
resource yara_rule behavioral2/files/0x0007000000024097-7.dat upx behavioral2/memory/2316-9-0x0000000000B00000-0x0000000001624000-memory.dmp upx behavioral2/memory/2316-64-0x0000000000B00000-0x0000000001624000-memory.dmp upx behavioral2/memory/2316-75-0x0000000000B00000-0x0000000001624000-memory.dmp upx behavioral2/memory/1040-76-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/64-79-0x0000000000660000-0x0000000001184000-memory.dmp upx behavioral2/memory/64-81-0x0000000000660000-0x0000000001184000-memory.dmp upx behavioral2/memory/1040-82-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-83-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-84-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-85-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-86-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-87-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-98-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-100-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-103-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-104-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-105-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-106-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-117-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-118-0x00000000009F0000-0x0000000001514000-memory.dmp upx behavioral2/memory/1040-119-0x00000000009F0000-0x0000000001514000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Mozilla Maintenance Service\e6dbb873-74ac-6e72-5da6-7f5b5f1a7374 fatality.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\taskhostw.exe fatality.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe Fatality.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fatality.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhostw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sppsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fatality.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 4668 Fatality.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 1788 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4924 explorer.exe 2168 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1040 taskhostw.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 4668 Fatality.exe 4668 Fatality.exe 1788 icsys.icn.exe 1788 icsys.icn.exe 4924 explorer.exe 4924 explorer.exe 4676 spoolsv.exe 4676 spoolsv.exe 2168 svchost.exe 2168 svchost.exe 1492 spoolsv.exe 1492 spoolsv.exe 3780 svchost.exe 3780 svchost.exe 2472 explorer.exe 2472 explorer.exe 1456 explorer.exe 1568 svchost.exe 1456 explorer.exe 1568 svchost.exe 2816 explorer.exe 5016 svchost.exe 2816 explorer.exe 5016 svchost.exe 3732 svchost.exe 1344 explorer.exe 3732 svchost.exe 1344 explorer.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4668 wrote to memory of 2316 4668 Fatality.exe 86 PID 4668 wrote to memory of 2316 4668 Fatality.exe 86 PID 4668 wrote to memory of 2316 4668 Fatality.exe 86 PID 4668 wrote to memory of 1788 4668 Fatality.exe 90 PID 4668 wrote to memory of 1788 4668 Fatality.exe 90 PID 4668 wrote to memory of 1788 4668 Fatality.exe 90 PID 1788 wrote to memory of 4924 1788 icsys.icn.exe 92 PID 1788 wrote to memory of 4924 1788 icsys.icn.exe 92 PID 1788 wrote to memory of 4924 1788 icsys.icn.exe 92 PID 4924 wrote to memory of 4676 4924 explorer.exe 93 PID 4924 wrote to memory of 4676 4924 explorer.exe 93 PID 4924 wrote to memory of 4676 4924 explorer.exe 93 PID 4676 wrote to memory of 2168 4676 spoolsv.exe 94 PID 4676 wrote to memory of 2168 4676 spoolsv.exe 94 PID 4676 wrote to memory of 2168 4676 spoolsv.exe 94 PID 2168 wrote to memory of 1492 2168 svchost.exe 95 PID 2168 wrote to memory of 1492 2168 svchost.exe 95 PID 2168 wrote to memory of 1492 2168 svchost.exe 95 PID 2732 wrote to memory of 3780 2732 cmd.exe 104 PID 2732 wrote to memory of 3780 2732 cmd.exe 104 PID 2732 wrote to memory of 3780 2732 cmd.exe 104 PID 3828 wrote to memory of 2472 3828 cmd.exe 105 PID 3828 wrote to memory of 2472 3828 cmd.exe 105 PID 3828 wrote to memory of 2472 3828 cmd.exe 105 PID 1356 wrote to memory of 1456 1356 cmd.exe 106 PID 1356 wrote to memory of 1456 1356 cmd.exe 106 PID 1356 wrote to memory of 1456 1356 cmd.exe 106 PID 2512 wrote to memory of 1568 2512 cmd.exe 107 PID 2512 wrote to memory of 1568 2512 cmd.exe 107 PID 2512 wrote to memory of 1568 2512 cmd.exe 107 PID 2316 wrote to memory of 1040 2316 fatality.exe 112 PID 2316 wrote to memory of 1040 2316 fatality.exe 112 PID 2316 wrote to memory of 1040 2316 fatality.exe 112 PID 4732 wrote to memory of 64 4732 cmd.exe 113 PID 4732 wrote to memory of 64 4732 cmd.exe 113 PID 4732 wrote to memory of 64 4732 cmd.exe 113 PID 5056 wrote to memory of 2816 5056 cmd.exe 134 PID 5056 wrote to memory of 2816 5056 cmd.exe 134 PID 5056 wrote to memory of 2816 5056 cmd.exe 134 PID 3596 wrote to memory of 5016 3596 cmd.exe 135 PID 3596 wrote to memory of 5016 3596 cmd.exe 135 PID 3596 wrote to memory of 5016 3596 cmd.exe 135 PID 3236 wrote to memory of 3732 3236 cmd.exe 142 PID 3636 wrote to memory of 1344 3636 cmd.exe 141 PID 3236 wrote to memory of 3732 3236 cmd.exe 142 PID 3236 wrote to memory of 3732 3236 cmd.exe 142 PID 3636 wrote to memory of 1344 3636 cmd.exe 141 PID 3636 wrote to memory of 1344 3636 cmd.exe 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fatality.exe"C:\Users\Admin\AppData\Local\Temp\Fatality.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4668 -
\??\c:\users\admin\appdata\local\temp\fatality.exec:\users\admin\appdata\local\temp\fatality.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Mozilla Maintenance Service\taskhostw.exe"C:\Program Files (x86)\Mozilla Maintenance Service\taskhostw.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Microsoft\sppsvc.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Microsoft\sppsvc.exeC:\Users\Admin\AppData\Local\Microsoft\sppsvc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:64
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files (x86)\Mozilla Maintenance Service\taskhostw.exe1⤵PID:2468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO1⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe RO2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3732
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5c3d006e36238ccde7635fc1dff753e18
SHA1d75c29be127aafa4391ffaf17007dfe0e04841b2
SHA25636addab1b80302055acc352fd2da83de76f98432d02749ccf15d80961d9b4f27
SHA512feed68622448f75c8bafbd411e0445751d3255db57708dcf9e64ca692c66bf9ad5ba3a9b9412813af990150047d25bc4382cf646822aef8b65553607ce690a86
-
Filesize
135KB
MD5b90b185ecf21c3c8722e665f7045ddf3
SHA13af0e7bd0f9986bdffaf9e94199680bf98b38299
SHA256434f97e8263b46c708f5087f29c8009eb0f3a58413bbb476e9c612c48e83184c
SHA512e5fe021555c09ebe1bce5c64d142ab4f85514437d3f767eae7d46869378db9d975cea21602786f2f89e094fddd7ca6aa6b701f8080a74beab760eba936ad241f
-
Filesize
135KB
MD517e0d90ebfbebf56ac506ee1a002847c
SHA1402113658d691f85cb6dbe25ac84758b4270ae5d
SHA25684af98e0d210367def7265aa7f8393e4a52253522c00919c795bd8aed2180485
SHA5120657b0d7e77cf915f6cc4bf1505f65461e38a1186f9c04fe727f6fcb510645d94bf17e38a51c079d034d42402980b076d1a19c3aea31fca466bb96d6f9aa6f3a
-
Filesize
135KB
MD5051a80ff52c781f8991aa8853e42c6dc
SHA1002e1e277568a3da1f8bf7132c5bca95cfe9b3ca
SHA256b090406afcb9aefa3917e8020728615e5edcd137f456184841a3859e4b866111
SHA512454e372176a091dc25f9a164f7e135e92233f7d9907e7c6e1cbf968ff166b9ae68a4f472e556fcf3d596d08dd5a0676cdfcf4aa26ee28a58473c308c62039ae9
-
Filesize
135KB
MD563798083cf8426ed3b7094e1f97e6a73
SHA154537ad21ed919ee401367b8beef1cabf26a2929
SHA25648d928cf6fed389abd2e4d75f41adbe34b854a5dac0762685be4c26ccf424479
SHA5126583fd3c7162899233f02ef858ff936ae958154ee0de962729a81d794807704042fff6669e325d0bca0fcadd3fe2dcccf8a7d6bb785d1ea0651fa0789c630819