Resubmissions
16/04/2025, 16:46
250416-vaaahaxnt9 1016/04/2025, 13:10
250416-qerccswjt5 1016/04/2025, 12:57
250416-p6x4jsvrx2 1016/04/2025, 12:51
250416-p3kn2svrv5 10Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows11-21h2_x64 -
resource
win11-20250411-en -
resource tags
arch:x64arch:x86image:win11-20250411-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/04/2025, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win11-20250411-en
General
-
Target
virusshare/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
-
Size
64KB
-
MD5
4aa5734fe9c86184f931f4ddaf2d4d7b
-
SHA1
a066ccad76f3c63d053cd68ac8692d4f4acf82ac
-
SHA256
2e18ad3e470b97415beb2cdb8e3ef7510bad21f0a5add020a7f9343dd959eeaa
-
SHA512
7355ffd3fc59af49af1d57f5327c7442a12c8e5ddc6ec9e176cc27fd4986cd6182f5f6ce91f892c07029efcac37f90d4dd077b6bb226b54c40621b94987a044c
-
SSDEEP
384:rdP9JIA7uJ1wK2xBpHbVbl+NGYD90pSCfZziEKffhaekBfdReVwoGHdRsArr2rOR:R9JIqNl/SSrrpBfiIdRsorZucnjtsq
Malware Config
Extracted
guloader
https://eficadgdl.com/well/Omitted-Credentials_encrypted_6A17930.bin
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Executes dropped EXE 16 IoCs
pid Process 1000 erythroph.exe 5124 erythroph.exe 2188 erythroph.exe 4636 erythroph.exe 4744 erythroph.exe 5868 erythroph.exe 2440 erythroph.exe 5912 erythroph.exe 1228 erythroph.exe 2212 erythroph.exe 1600 erythroph.exe 5884 erythroph.exe 3212 erythroph.exe 2216 erythroph.exe 880 erythroph.exe 3812 erythroph.exe -
Adds Run key to start application 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2316063146-1984817004-4437738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Slngkapper9 = "C:\\Users\\Admin\\TROFFE\\erythroph.exe" RegAsm.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 34 IoCs
pid Process 5384 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 4220 RegAsm.exe 1000 erythroph.exe 3468 RegAsm.exe 5124 erythroph.exe 4988 RegAsm.exe 2188 erythroph.exe 5188 RegAsm.exe 4636 erythroph.exe 4628 RegAsm.exe 4744 erythroph.exe 5388 RegAsm.exe 5868 erythroph.exe 5144 RegAsm.exe 2440 erythroph.exe 860 RegAsm.exe 5912 erythroph.exe 3060 RegAsm.exe 1228 erythroph.exe 5700 RegAsm.exe 2212 erythroph.exe 4160 RegAsm.exe 1600 erythroph.exe 5428 RegAsm.exe 5884 erythroph.exe 4044 RegAsm.exe 3212 erythroph.exe 5820 RegAsm.exe 2216 erythroph.exe 1068 RegAsm.exe 880 erythroph.exe 2356 RegAsm.exe 3812 erythroph.exe 4736 RegAsm.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 5384 set thread context of 4220 5384 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 78 PID 1000 set thread context of 3468 1000 erythroph.exe 83 PID 5124 set thread context of 4988 5124 erythroph.exe 89 PID 2188 set thread context of 5188 2188 erythroph.exe 94 PID 4636 set thread context of 4628 4636 erythroph.exe 99 PID 4744 set thread context of 5388 4744 erythroph.exe 104 PID 5868 set thread context of 5144 5868 erythroph.exe 109 PID 2440 set thread context of 860 2440 erythroph.exe 116 PID 5912 set thread context of 3060 5912 erythroph.exe 121 PID 1228 set thread context of 5700 1228 erythroph.exe 126 PID 2212 set thread context of 4160 2212 erythroph.exe 131 PID 1600 set thread context of 5428 1600 erythroph.exe 137 PID 5884 set thread context of 4044 5884 erythroph.exe 142 PID 3212 set thread context of 5820 3212 erythroph.exe 147 PID 2216 set thread context of 1068 2216 erythroph.exe 154 PID 880 set thread context of 2356 880 erythroph.exe 159 PID 3812 set thread context of 4736 3812 erythroph.exe 164 -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erythroph.exe -
Suspicious behavior: MapViewOfSection 23 IoCs
pid Process 5384 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 1000 erythroph.exe 5124 erythroph.exe 5124 erythroph.exe 2188 erythroph.exe 4636 erythroph.exe 4744 erythroph.exe 5868 erythroph.exe 2440 erythroph.exe 2440 erythroph.exe 2440 erythroph.exe 5912 erythroph.exe 1228 erythroph.exe 2212 erythroph.exe 1600 erythroph.exe 1600 erythroph.exe 5884 erythroph.exe 3212 erythroph.exe 2216 erythroph.exe 2216 erythroph.exe 2216 erythroph.exe 880 erythroph.exe 3812 erythroph.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 5384 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 1000 erythroph.exe 5124 erythroph.exe 2188 erythroph.exe 4636 erythroph.exe 4744 erythroph.exe 5868 erythroph.exe 2440 erythroph.exe 5912 erythroph.exe 1228 erythroph.exe 2212 erythroph.exe 1600 erythroph.exe 5884 erythroph.exe 3212 erythroph.exe 2216 erythroph.exe 880 erythroph.exe 3812 erythroph.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5384 wrote to memory of 4220 5384 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 78 PID 5384 wrote to memory of 4220 5384 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 78 PID 5384 wrote to memory of 4220 5384 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 78 PID 5384 wrote to memory of 4220 5384 VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe 78 PID 5916 wrote to memory of 1000 5916 cmd.exe 82 PID 5916 wrote to memory of 1000 5916 cmd.exe 82 PID 5916 wrote to memory of 1000 5916 cmd.exe 82 PID 1000 wrote to memory of 3468 1000 erythroph.exe 83 PID 1000 wrote to memory of 3468 1000 erythroph.exe 83 PID 1000 wrote to memory of 3468 1000 erythroph.exe 83 PID 1000 wrote to memory of 3468 1000 erythroph.exe 83 PID 3472 wrote to memory of 5124 3472 cmd.exe 87 PID 3472 wrote to memory of 5124 3472 cmd.exe 87 PID 3472 wrote to memory of 5124 3472 cmd.exe 87 PID 5124 wrote to memory of 4980 5124 erythroph.exe 88 PID 5124 wrote to memory of 4980 5124 erythroph.exe 88 PID 5124 wrote to memory of 4980 5124 erythroph.exe 88 PID 5124 wrote to memory of 4988 5124 erythroph.exe 89 PID 5124 wrote to memory of 4988 5124 erythroph.exe 89 PID 5124 wrote to memory of 4988 5124 erythroph.exe 89 PID 5124 wrote to memory of 4988 5124 erythroph.exe 89 PID 4204 wrote to memory of 2188 4204 cmd.exe 93 PID 4204 wrote to memory of 2188 4204 cmd.exe 93 PID 4204 wrote to memory of 2188 4204 cmd.exe 93 PID 2188 wrote to memory of 5188 2188 erythroph.exe 94 PID 2188 wrote to memory of 5188 2188 erythroph.exe 94 PID 2188 wrote to memory of 5188 2188 erythroph.exe 94 PID 2188 wrote to memory of 5188 2188 erythroph.exe 94 PID 4532 wrote to memory of 4636 4532 cmd.exe 98 PID 4532 wrote to memory of 4636 4532 cmd.exe 98 PID 4532 wrote to memory of 4636 4532 cmd.exe 98 PID 4636 wrote to memory of 4628 4636 erythroph.exe 99 PID 4636 wrote to memory of 4628 4636 erythroph.exe 99 PID 4636 wrote to memory of 4628 4636 erythroph.exe 99 PID 4636 wrote to memory of 4628 4636 erythroph.exe 99 PID 2040 wrote to memory of 4744 2040 cmd.exe 103 PID 2040 wrote to memory of 4744 2040 cmd.exe 103 PID 2040 wrote to memory of 4744 2040 cmd.exe 103 PID 4744 wrote to memory of 5388 4744 erythroph.exe 104 PID 4744 wrote to memory of 5388 4744 erythroph.exe 104 PID 4744 wrote to memory of 5388 4744 erythroph.exe 104 PID 4744 wrote to memory of 5388 4744 erythroph.exe 104 PID 4748 wrote to memory of 5868 4748 cmd.exe 108 PID 4748 wrote to memory of 5868 4748 cmd.exe 108 PID 4748 wrote to memory of 5868 4748 cmd.exe 108 PID 5868 wrote to memory of 5144 5868 erythroph.exe 109 PID 5868 wrote to memory of 5144 5868 erythroph.exe 109 PID 5868 wrote to memory of 5144 5868 erythroph.exe 109 PID 5868 wrote to memory of 5144 5868 erythroph.exe 109 PID 3600 wrote to memory of 2440 3600 cmd.exe 113 PID 3600 wrote to memory of 2440 3600 cmd.exe 113 PID 3600 wrote to memory of 2440 3600 cmd.exe 113 PID 2440 wrote to memory of 2760 2440 erythroph.exe 114 PID 2440 wrote to memory of 2760 2440 erythroph.exe 114 PID 2440 wrote to memory of 2760 2440 erythroph.exe 114 PID 2440 wrote to memory of 3128 2440 erythroph.exe 115 PID 2440 wrote to memory of 3128 2440 erythroph.exe 115 PID 2440 wrote to memory of 3128 2440 erythroph.exe 115 PID 2440 wrote to memory of 860 2440 erythroph.exe 116 PID 2440 wrote to memory of 860 2440 erythroph.exe 116 PID 2440 wrote to memory of 860 2440 erythroph.exe 116 PID 2440 wrote to memory of 860 2440 erythroph.exe 116 PID 2276 wrote to memory of 5912 2276 cmd.exe 120 PID 2276 wrote to memory of 5912 2276 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5384 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5916 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5124 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:4980
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5388
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5868 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:2760
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:3128
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:5912 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:2172
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1228 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:3208
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:1748
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:5852
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:776
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:5884 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:1464
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3212 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:1040
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:5544
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵PID:4284
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:2604
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:880 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:6084
-
C:\Users\Admin\TROFFE\erythroph.exeC:\Users\Admin\TROFFE\erythroph.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3812 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeC:\Users\Admin\TROFFE\erythroph.exe3⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\TROFFE\erythroph.exe1⤵PID:1304
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54aa5734fe9c86184f931f4ddaf2d4d7b
SHA1a066ccad76f3c63d053cd68ac8692d4f4acf82ac
SHA2562e18ad3e470b97415beb2cdb8e3ef7510bad21f0a5add020a7f9343dd959eeaa
SHA5127355ffd3fc59af49af1d57f5327c7442a12c8e5ddc6ec9e176cc27fd4986cd6182f5f6ce91f892c07029efcac37f90d4dd077b6bb226b54c40621b94987a044c