Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
rSCAN31804.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
rSCAN31804.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
General
-
Target
rSCAN31804.exe
-
Size
314KB
-
MD5
c7ceecb921d43912ec928af816a43ede
-
SHA1
2c4266ebdae98fc609ffb191cf26e85dc0671faa
-
SHA256
144540da6bfc395bdd8726b156099a7f7b27240321424411ba8af877cbdcbe86
-
SHA512
8b4ecfc89221af3d4dde2ab7effc288f9c9ddaba764b67acbde33fbc5c19d69e16d69c40f35de74e36f4eb12bdd2ffba44b702bea9d5249476dafc7f4f389e31
-
SSDEEP
6144:BXFKo5F4CtVeI8Y9BA6MA4ph2LN7LNNhEdMUjzz4elzC:BX54CVeI8Y9BA6uph2LN7LNNhTelO
Malware Config
Signatures
-
Loads dropped DLL 64 IoCs
Processes:
rSCAN31804.exepid process 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe 2232 rSCAN31804.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
rSCAN31804.exerSCAN31804.exepid process 2232 rSCAN31804.exe 2216 rSCAN31804.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rSCAN31804.exedescription pid process target process PID 2232 set thread context of 2216 2232 rSCAN31804.exe rSCAN31804.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
rSCAN31804.exepid process 2232 rSCAN31804.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rSCAN31804.exedescription pid process target process PID 2232 wrote to memory of 2324 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2324 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2324 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2324 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2720 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2720 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2720 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2720 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2660 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2660 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2660 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2660 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2828 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2828 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2828 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2828 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1232 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1232 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1232 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1232 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2648 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2648 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2648 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2648 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2516 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2516 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2516 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2516 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2632 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2632 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2632 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2632 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2124 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2124 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2124 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2124 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2924 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2924 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2924 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2924 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1616 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1616 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1616 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1616 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2368 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2368 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2368 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2368 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2880 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2880 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2880 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2880 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2788 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2788 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2788 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2788 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2840 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2840 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2840 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 2840 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1924 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1924 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1924 2232 rSCAN31804.exe cmd.exe PID 2232 wrote to memory of 1924 2232 rSCAN31804.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rSCAN31804.exe"C:\Users\Admin\AppData\Local\Temp\rSCAN31804.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x53^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x14^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x75^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x51^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x71^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x48^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x42^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x51^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x11^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4B^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x50^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x45^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x52^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x08^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x42^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x79^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x56^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x48^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4B^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x17^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x08^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x13^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x6D^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x63^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x74^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x68^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x63^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x6A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x14^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x70^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x52^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x53^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x47^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x67^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x45^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x63^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0B^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x17^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x13^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x13^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x10^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x10^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x10^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x56^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x08^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4B^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x50^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x45^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x52^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x79^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4D^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x13^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x11^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x17^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x08^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x11^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4B^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x50^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x45^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x52^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x08^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x42^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x79^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x47^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x42^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x13^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x13^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x13^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x10^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x10^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x53^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x55^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x43^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x15^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x14^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x1C^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x65^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x47^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x71^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x48^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x42^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x51^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x76^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x49^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x45^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x67^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0E^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x54^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x12^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0A^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x4F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x06^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x16^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x0F^38"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c set /a "0x5F^38"2⤵
-
C:\Users\Admin\AppData\Local\Temp\rSCAN31804.exe"C:\Users\Admin\AppData\Local\Temp\rSCAN31804.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsi316D.tmp\System.dllFilesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
\Users\Admin\AppData\Local\Temp\nsi316D.tmp\nsExec.dllFilesize
7KB
MD5b4579bc396ace8cafd9e825ff63fe244
SHA132a87ed28a510e3b3c06a451d1f3d0ba9faf8d9c
SHA25601e72332362345c415a7edcb366d6a1b52be9ac6e946fb9da49785c140ba1a4b
SHA5123a76e0e259a0ca12275fed922ce6e01bdfd9e33ba85973e80101b8025ef9243f5e32461a113bbcc6aa75e40894bb5d3a42d6b21045517b6b3cf12d76b4cfa36a
-
memory/2216-893-0x0000000000470000-0x00000000014D2000-memory.dmpFilesize
16.4MB