Resubmissions
16/04/2025, 16:46
250416-vaaahaxnt9 1016/04/2025, 13:10
250416-qerccswjt5 1016/04/2025, 12:57
250416-p6x4jsvrx2 1016/04/2025, 12:51
250416-p3kn2svrv5 10Analysis
-
max time kernel
52s -
max time network
48s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/04/2025, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win11-20250410-en
General
-
Target
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
-
Size
64KB
-
MD5
4aa5734fe9c86184f931f4ddaf2d4d7b
-
SHA1
a066ccad76f3c63d053cd68ac8692d4f4acf82ac
-
SHA256
2e18ad3e470b97415beb2cdb8e3ef7510bad21f0a5add020a7f9343dd959eeaa
-
SHA512
7355ffd3fc59af49af1d57f5327c7442a12c8e5ddc6ec9e176cc27fd4986cd6182f5f6ce91f892c07029efcac37f90d4dd077b6bb226b54c40621b94987a044c
-
SSDEEP
384:rdP9JIA7uJ1wK2xBpHbVbl+NGYD90pSCfZziEKffhaekBfdReVwoGHdRsArr2rOR:R9JIqNl/SSrrpBfiIdRsorZucnjtsq
Malware Config
Extracted
guloader
https://eficadgdl.com/well/Omitted-Credentials_encrypted_6A17930.bin
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Executes dropped EXE 16 IoCs
pid Process 5168 erythroph.exe 4876 erythroph.exe 1756 erythroph.exe 2388 erythroph.exe 2600 erythroph.exe 2128 erythroph.exe 3348 erythroph.exe 1836 erythroph.exe 5716 erythroph.exe 1408 erythroph.exe 5804 erythroph.exe 5916 erythroph.exe 5256 erythroph.exe 1920 erythroph.exe 1568 erythroph.exe 1164 erythroph.exe -
Adds Run key to start application 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 34 IoCs
pid Process 2764 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 5220 RegAsm.exe 5168 erythroph.exe 4524 RegAsm.exe 4876 erythroph.exe 4964 RegAsm.exe 1756 erythroph.exe 5088 RegAsm.exe 2388 erythroph.exe 1160 RegAsm.exe 2600 erythroph.exe 4124 RegAsm.exe 2128 erythroph.exe 904 RegAsm.exe 3348 erythroph.exe 4540 RegAsm.exe 1836 erythroph.exe 2432 RegAsm.exe 5716 erythroph.exe 2340 RegAsm.exe 1408 erythroph.exe 5988 RegAsm.exe 5804 erythroph.exe 1988 RegAsm.exe 5916 erythroph.exe 400 RegAsm.exe 5256 erythroph.exe 3056 RegAsm.exe 1920 erythroph.exe 2560 RegAsm.exe 1568 erythroph.exe 3740 RegAsm.exe 1164 erythroph.exe 4684 RegAsm.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 2764 set thread context of 5220 2764 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 79 PID 5168 set thread context of 4524 5168 erythroph.exe 84 PID 4876 set thread context of 4964 4876 erythroph.exe 90 PID 1756 set thread context of 5088 1756 erythroph.exe 95 PID 2388 set thread context of 1160 2388 erythroph.exe 100 PID 2600 set thread context of 4124 2600 erythroph.exe 106 PID 2128 set thread context of 904 2128 erythroph.exe 111 PID 3348 set thread context of 4540 3348 erythroph.exe 116 PID 1836 set thread context of 2432 1836 erythroph.exe 121 PID 5716 set thread context of 2340 5716 erythroph.exe 126 PID 1408 set thread context of 5988 1408 erythroph.exe 131 PID 5804 set thread context of 1988 5804 erythroph.exe 136 PID 5916 set thread context of 400 5916 erythroph.exe 141 PID 5256 set thread context of 3056 5256 erythroph.exe 147 PID 1920 set thread context of 2560 1920 erythroph.exe 153 PID 1568 set thread context of 3740 1568 erythroph.exe 158 PID 1164 set thread context of 4684 1164 erythroph.exe 166 -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: MapViewOfSection 24 IoCs
pid Process 2764 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 5168 erythroph.exe 4876 erythroph.exe 4876 erythroph.exe 1756 erythroph.exe 2388 erythroph.exe 2600 erythroph.exe 2600 erythroph.exe 2128 erythroph.exe 3348 erythroph.exe 1836 erythroph.exe 5716 erythroph.exe 1408 erythroph.exe 5804 erythroph.exe 5916 erythroph.exe 5256 erythroph.exe 5256 erythroph.exe 1920 erythroph.exe 1920 erythroph.exe 1568 erythroph.exe 1164 erythroph.exe 1164 erythroph.exe 1164 erythroph.exe 1164 erythroph.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2764 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 5168 erythroph.exe 4876 erythroph.exe 1756 erythroph.exe 2388 erythroph.exe 2600 erythroph.exe 2128 erythroph.exe 3348 erythroph.exe 1836 erythroph.exe 5716 erythroph.exe 1408 erythroph.exe 5804 erythroph.exe 5916 erythroph.exe 5256 erythroph.exe 1920 erythroph.exe 1568 erythroph.exe 1164 erythroph.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 5220 2764 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 79 PID 2764 wrote to memory of 5220 2764 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 79 PID 2764 wrote to memory of 5220 2764 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 79 PID 2764 wrote to memory of 5220 2764 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 79 PID 2392 wrote to memory of 5168 2392 cmd.exe 83 PID 2392 wrote to memory of 5168 2392 cmd.exe 83 PID 2392 wrote to memory of 5168 2392 cmd.exe 83 PID 5168 wrote to memory of 4524 5168 erythroph.exe 84 PID 5168 wrote to memory of 4524 5168 erythroph.exe 84 PID 5168 wrote to memory of 4524 5168 erythroph.exe 84 PID 5168 wrote to memory of 4524 5168 erythroph.exe 84 PID 2148 wrote to memory of 4876 2148 cmd.exe 88 PID 2148 wrote to memory of 4876 2148 cmd.exe 88 PID 2148 wrote to memory of 4876 2148 cmd.exe 88 PID 4876 wrote to memory of 4956 4876 erythroph.exe 89 PID 4876 wrote to memory of 4956 4876 erythroph.exe 89 PID 4876 wrote to memory of 4956 4876 erythroph.exe 89 PID 4876 wrote to memory of 4964 4876 erythroph.exe 90 PID 4876 wrote to memory of 4964 4876 erythroph.exe 90 PID 4876 wrote to memory of 4964 4876 erythroph.exe 90 PID 4876 wrote to memory of 4964 4876 erythroph.exe 90 PID 2804 wrote to memory of 1756 2804 cmd.exe 94 PID 2804 wrote to memory of 1756 2804 cmd.exe 94 PID 2804 wrote to memory of 1756 2804 cmd.exe 94 PID 1756 wrote to memory of 5088 1756 erythroph.exe 95 PID 1756 wrote to memory of 5088 1756 erythroph.exe 95 PID 1756 wrote to memory of 5088 1756 erythroph.exe 95 PID 1756 wrote to memory of 5088 1756 erythroph.exe 95 PID 4412 wrote to memory of 2388 4412 cmd.exe 99 PID 4412 wrote to memory of 2388 4412 cmd.exe 99 PID 4412 wrote to memory of 2388 4412 cmd.exe 99 PID 2388 wrote to memory of 1160 2388 erythroph.exe 100 PID 2388 wrote to memory of 1160 2388 erythroph.exe 100 PID 2388 wrote to memory of 1160 2388 erythroph.exe 100 PID 2388 wrote to memory of 1160 2388 erythroph.exe 100 PID 5948 wrote to memory of 2600 5948 cmd.exe 104 PID 5948 wrote to memory of 2600 5948 cmd.exe 104 PID 5948 wrote to memory of 2600 5948 cmd.exe 104 PID 2600 wrote to memory of 5472 2600 erythroph.exe 105 PID 2600 wrote to memory of 5472 2600 erythroph.exe 105 PID 2600 wrote to memory of 5472 2600 erythroph.exe 105 PID 2600 wrote to memory of 4124 2600 erythroph.exe 106 PID 2600 wrote to memory of 4124 2600 erythroph.exe 106 PID 2600 wrote to memory of 4124 2600 erythroph.exe 106 PID 2600 wrote to memory of 4124 2600 erythroph.exe 106 PID 4268 wrote to memory of 2128 4268 cmd.exe 110 PID 4268 wrote to memory of 2128 4268 cmd.exe 110 PID 4268 wrote to memory of 2128 4268 cmd.exe 110 PID 2128 wrote to memory of 904 2128 erythroph.exe 111 PID 2128 wrote to memory of 904 2128 erythroph.exe 111 PID 2128 wrote to memory of 904 2128 erythroph.exe 111 PID 2128 wrote to memory of 904 2128 erythroph.exe 111 PID 5640 wrote to memory of 3348 5640 cmd.exe 115 PID 5640 wrote to memory of 3348 5640 cmd.exe 115 PID 5640 wrote to memory of 3348 5640 cmd.exe 115 PID 3348 wrote to memory of 4540 3348 erythroph.exe 116 PID 3348 wrote to memory of 4540 3348 erythroph.exe 116 PID 3348 wrote to memory of 4540 3348 erythroph.exe 116 PID 3348 wrote to memory of 4540 3348 erythroph.exe 116 PID 3400 wrote to memory of 1836 3400 cmd.exe 120 PID 3400 wrote to memory of 1836 3400 cmd.exe 120 PID 3400 wrote to memory of 1836 3400 cmd.exe 120 PID 1836 wrote to memory of 2432 1836 erythroph.exe 121 PID 1836 wrote to memory of 2432 1836 erythroph.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5168 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:4956
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5948 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:5472
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5640 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:4980
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:5716 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2340
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:6048
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1408 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:5824
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:5804 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:344
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:5916 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:4068
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:5256 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:112
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:5300
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:2204
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:5412
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:1180
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1164 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:3116
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:4312
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:4792
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4684
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54aa5734fe9c86184f931f4ddaf2d4d7b
SHA1a066ccad76f3c63d053cd68ac8692d4f4acf82ac
SHA2562e18ad3e470b97415beb2cdb8e3ef7510bad21f0a5add020a7f9343dd959eeaa
SHA5127355ffd3fc59af49af1d57f5327c7442a12c8e5ddc6ec9e176cc27fd4986cd6182f5f6ce91f892c07029efcac37f90d4dd077b6bb226b54c40621b94987a044c