Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
4a4ffd20fef576exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
4a4ffd20fef576exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
4a4ffd20fef576exeexeexeex.exe
-
Size
204KB
-
MD5
4a4ffd20fef576424462f6d7d75640b9
-
SHA1
b18beec40b1af5f5021bf64913012f9321a1429e
-
SHA256
95856e8477de5ee110c7175fa00f6212a5e38775aa22addaf6ce04326e81f5f1
-
SHA512
945ae821dd656d3fc7613cc21d385a6567f4a7add9b2eb759f58005cbbc14f2585fe464f0f653350d81865db4f57e00ec6db99bb41508a0d365f3ce76ccf687c
-
SSDEEP
1536:1EGh0ocl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0ocl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 28 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B42E57F-3540-4f7e-8CFE-6E32A86F1A46} {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8CECA71A-43E5-411b-9C6E-809D07EDC148}\stubpath = "C:\\Windows\\{8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe" {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C2D953F-AAB7-42eb-B238-1A1D576F7316} {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D019A35B-06BD-42d3-A17A-9127DDBA38C8}\stubpath = "C:\\Windows\\{D019A35B-06BD-42d3-A17A-9127DDBA38C8}.exe" {22305D42-EDA2-4207-87C2-D0F93AC2BA89}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{319344D7-7F15-4369-88E0-BD81B5EC2B52} {2892A3AC-157A-43f6-9D7D-7EA74A1EDFB1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8CECA71A-43E5-411b-9C6E-809D07EDC148} {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A33E087D-1774-448e-87D9-876A1705A642}\stubpath = "C:\\Windows\\{A33E087D-1774-448e-87D9-876A1705A642}.exe" {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4}\stubpath = "C:\\Windows\\{9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4}.exe" {B1F5F927-9E65-4220-862A-EDC2EF5C708D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{30E5DE3C-1324-4423-A4CD-FC64497D4D18} {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22305D42-EDA2-4207-87C2-D0F93AC2BA89}\stubpath = "C:\\Windows\\{22305D42-EDA2-4207-87C2-D0F93AC2BA89}.exe" {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1F5F927-9E65-4220-862A-EDC2EF5C708D}\stubpath = "C:\\Windows\\{B1F5F927-9E65-4220-862A-EDC2EF5C708D}.exe" {D019A35B-06BD-42d3-A17A-9127DDBA38C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4}\stubpath = "C:\\Windows\\{5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4}.exe" {9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{319344D7-7F15-4369-88E0-BD81B5EC2B52}\stubpath = "C:\\Windows\\{319344D7-7F15-4369-88E0-BD81B5EC2B52}.exe" {2892A3AC-157A-43f6-9D7D-7EA74A1EDFB1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{30E5DE3C-1324-4423-A4CD-FC64497D4D18}\stubpath = "C:\\Windows\\{30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe" {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D019A35B-06BD-42d3-A17A-9127DDBA38C8} {22305D42-EDA2-4207-87C2-D0F93AC2BA89}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4} {B1F5F927-9E65-4220-862A-EDC2EF5C708D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4} {9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2892A3AC-157A-43f6-9D7D-7EA74A1EDFB1}\stubpath = "C:\\Windows\\{2892A3AC-157A-43f6-9D7D-7EA74A1EDFB1}.exe" {5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3CEEC807-0CAA-48b9-B7BC-60877E435D67}\stubpath = "C:\\Windows\\{3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe" {A33E087D-1774-448e-87D9-876A1705A642}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1F5F927-9E65-4220-862A-EDC2EF5C708D} {D019A35B-06BD-42d3-A17A-9127DDBA38C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2892A3AC-157A-43f6-9D7D-7EA74A1EDFB1} {5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FBB305E-5B0E-4cda-8499-0E841439DC50} 4a4ffd20fef576exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}\stubpath = "C:\\Windows\\{7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe" {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A33E087D-1774-448e-87D9-876A1705A642} {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22305D42-EDA2-4207-87C2-D0F93AC2BA89} {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FBB305E-5B0E-4cda-8499-0E841439DC50}\stubpath = "C:\\Windows\\{9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe" 4a4ffd20fef576exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C2D953F-AAB7-42eb-B238-1A1D576F7316}\stubpath = "C:\\Windows\\{3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe" {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3CEEC807-0CAA-48b9-B7BC-60877E435D67} {A33E087D-1774-448e-87D9-876A1705A642}.exe -
Deletes itself 1 IoCs
pid Process 2964 cmd.exe -
Executes dropped EXE 13 IoCs
pid Process 2036 {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe 3036 {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe 1864 {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe 2880 {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe 848 {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe 1156 {A33E087D-1774-448e-87D9-876A1705A642}.exe 2360 {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe 1768 {22305D42-EDA2-4207-87C2-D0F93AC2BA89}.exe 1492 {D019A35B-06BD-42d3-A17A-9127DDBA38C8}.exe 2660 {B1F5F927-9E65-4220-862A-EDC2EF5C708D}.exe 1788 {9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4}.exe 2708 {5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4}.exe 2636 {2892A3AC-157A-43f6-9D7D-7EA74A1EDFB1}.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File created C:\Windows\{8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe File created C:\Windows\{30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe File created C:\Windows\{22305D42-EDA2-4207-87C2-D0F93AC2BA89}.exe {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe File created C:\Windows\{2892A3AC-157A-43f6-9D7D-7EA74A1EDFB1}.exe {5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4}.exe File created C:\Windows\{7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe File created C:\Windows\{3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe File created C:\Windows\{3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe {A33E087D-1774-448e-87D9-876A1705A642}.exe File created C:\Windows\{9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4}.exe {B1F5F927-9E65-4220-862A-EDC2EF5C708D}.exe File created C:\Windows\{5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4}.exe {9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4}.exe File created C:\Windows\{319344D7-7F15-4369-88E0-BD81B5EC2B52}.exe {2892A3AC-157A-43f6-9D7D-7EA74A1EDFB1}.exe File created C:\Windows\{9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe 4a4ffd20fef576exeexeexeex.exe File created C:\Windows\{A33E087D-1774-448e-87D9-876A1705A642}.exe {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe File created C:\Windows\{D019A35B-06BD-42d3-A17A-9127DDBA38C8}.exe {22305D42-EDA2-4207-87C2-D0F93AC2BA89}.exe File created C:\Windows\{B1F5F927-9E65-4220-862A-EDC2EF5C708D}.exe {D019A35B-06BD-42d3-A17A-9127DDBA38C8}.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2284 4a4ffd20fef576exeexeexeex.exe Token: SeIncBasePriorityPrivilege 2036 {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe Token: SeIncBasePriorityPrivilege 3036 {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe Token: SeIncBasePriorityPrivilege 1864 {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe Token: SeIncBasePriorityPrivilege 2880 {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe Token: SeIncBasePriorityPrivilege 848 {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe Token: SeIncBasePriorityPrivilege 1156 {A33E087D-1774-448e-87D9-876A1705A642}.exe Token: SeIncBasePriorityPrivilege 2360 {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe Token: SeIncBasePriorityPrivilege 1768 {22305D42-EDA2-4207-87C2-D0F93AC2BA89}.exe Token: SeIncBasePriorityPrivilege 1492 {D019A35B-06BD-42d3-A17A-9127DDBA38C8}.exe Token: SeIncBasePriorityPrivilege 2660 {B1F5F927-9E65-4220-862A-EDC2EF5C708D}.exe Token: SeIncBasePriorityPrivilege 1788 {9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4}.exe Token: SeIncBasePriorityPrivilege 2708 {5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2036 2284 4a4ffd20fef576exeexeexeex.exe 28 PID 2284 wrote to memory of 2036 2284 4a4ffd20fef576exeexeexeex.exe 28 PID 2284 wrote to memory of 2036 2284 4a4ffd20fef576exeexeexeex.exe 28 PID 2284 wrote to memory of 2036 2284 4a4ffd20fef576exeexeexeex.exe 28 PID 2284 wrote to memory of 2964 2284 4a4ffd20fef576exeexeexeex.exe 29 PID 2284 wrote to memory of 2964 2284 4a4ffd20fef576exeexeexeex.exe 29 PID 2284 wrote to memory of 2964 2284 4a4ffd20fef576exeexeexeex.exe 29 PID 2284 wrote to memory of 2964 2284 4a4ffd20fef576exeexeexeex.exe 29 PID 2036 wrote to memory of 3036 2036 {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe 30 PID 2036 wrote to memory of 3036 2036 {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe 30 PID 2036 wrote to memory of 3036 2036 {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe 30 PID 2036 wrote to memory of 3036 2036 {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe 30 PID 2036 wrote to memory of 2392 2036 {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe 31 PID 2036 wrote to memory of 2392 2036 {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe 31 PID 2036 wrote to memory of 2392 2036 {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe 31 PID 2036 wrote to memory of 2392 2036 {9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe 31 PID 3036 wrote to memory of 1864 3036 {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe 32 PID 3036 wrote to memory of 1864 3036 {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe 32 PID 3036 wrote to memory of 1864 3036 {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe 32 PID 3036 wrote to memory of 1864 3036 {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe 32 PID 3036 wrote to memory of 1132 3036 {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe 33 PID 3036 wrote to memory of 1132 3036 {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe 33 PID 3036 wrote to memory of 1132 3036 {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe 33 PID 3036 wrote to memory of 1132 3036 {7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe 33 PID 1864 wrote to memory of 2880 1864 {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe 34 PID 1864 wrote to memory of 2880 1864 {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe 34 PID 1864 wrote to memory of 2880 1864 {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe 34 PID 1864 wrote to memory of 2880 1864 {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe 34 PID 1864 wrote to memory of 2956 1864 {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe 35 PID 1864 wrote to memory of 2956 1864 {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe 35 PID 1864 wrote to memory of 2956 1864 {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe 35 PID 1864 wrote to memory of 2956 1864 {8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe 35 PID 2880 wrote to memory of 848 2880 {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe 36 PID 2880 wrote to memory of 848 2880 {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe 36 PID 2880 wrote to memory of 848 2880 {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe 36 PID 2880 wrote to memory of 848 2880 {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe 36 PID 2880 wrote to memory of 1608 2880 {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe 37 PID 2880 wrote to memory of 1608 2880 {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe 37 PID 2880 wrote to memory of 1608 2880 {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe 37 PID 2880 wrote to memory of 1608 2880 {30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe 37 PID 848 wrote to memory of 1156 848 {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe 38 PID 848 wrote to memory of 1156 848 {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe 38 PID 848 wrote to memory of 1156 848 {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe 38 PID 848 wrote to memory of 1156 848 {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe 38 PID 848 wrote to memory of 652 848 {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe 39 PID 848 wrote to memory of 652 848 {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe 39 PID 848 wrote to memory of 652 848 {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe 39 PID 848 wrote to memory of 652 848 {3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe 39 PID 1156 wrote to memory of 2360 1156 {A33E087D-1774-448e-87D9-876A1705A642}.exe 40 PID 1156 wrote to memory of 2360 1156 {A33E087D-1774-448e-87D9-876A1705A642}.exe 40 PID 1156 wrote to memory of 2360 1156 {A33E087D-1774-448e-87D9-876A1705A642}.exe 40 PID 1156 wrote to memory of 2360 1156 {A33E087D-1774-448e-87D9-876A1705A642}.exe 40 PID 1156 wrote to memory of 2548 1156 {A33E087D-1774-448e-87D9-876A1705A642}.exe 41 PID 1156 wrote to memory of 2548 1156 {A33E087D-1774-448e-87D9-876A1705A642}.exe 41 PID 1156 wrote to memory of 2548 1156 {A33E087D-1774-448e-87D9-876A1705A642}.exe 41 PID 1156 wrote to memory of 2548 1156 {A33E087D-1774-448e-87D9-876A1705A642}.exe 41 PID 2360 wrote to memory of 1768 2360 {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe 42 PID 2360 wrote to memory of 1768 2360 {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe 42 PID 2360 wrote to memory of 1768 2360 {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe 42 PID 2360 wrote to memory of 1768 2360 {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe 42 PID 2360 wrote to memory of 3008 2360 {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe 43 PID 2360 wrote to memory of 3008 2360 {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe 43 PID 2360 wrote to memory of 3008 2360 {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe 43 PID 2360 wrote to memory of 3008 2360 {3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a4ffd20fef576exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\4a4ffd20fef576exeexeexeex.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\{9FBB305E-5B0E-4cda-8499-0E841439DC50}.exeC:\Windows\{9FBB305E-5B0E-4cda-8499-0E841439DC50}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\{7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exeC:\Windows\{7B42E57F-3540-4f7e-8CFE-6E32A86F1A46}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\{8CECA71A-43E5-411b-9C6E-809D07EDC148}.exeC:\Windows\{8CECA71A-43E5-411b-9C6E-809D07EDC148}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\{30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exeC:\Windows\{30E5DE3C-1324-4423-A4CD-FC64497D4D18}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\{3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exeC:\Windows\{3C2D953F-AAB7-42eb-B238-1A1D576F7316}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\{A33E087D-1774-448e-87D9-876A1705A642}.exeC:\Windows\{A33E087D-1774-448e-87D9-876A1705A642}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\{3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exeC:\Windows\{3CEEC807-0CAA-48b9-B7BC-60877E435D67}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\{22305D42-EDA2-4207-87C2-D0F93AC2BA89}.exeC:\Windows\{22305D42-EDA2-4207-87C2-D0F93AC2BA89}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Windows\{D019A35B-06BD-42d3-A17A-9127DDBA38C8}.exeC:\Windows\{D019A35B-06BD-42d3-A17A-9127DDBA38C8}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\{B1F5F927-9E65-4220-862A-EDC2EF5C708D}.exeC:\Windows\{B1F5F927-9E65-4220-862A-EDC2EF5C708D}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\{9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4}.exeC:\Windows\{9DC8C92F-4F18-47e3-BD04-E1DA7A072DE4}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\{5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4}.exeC:\Windows\{5BA8DCD4-6538-43d1-A1AC-0C3A4BE8A9C4}.exe13⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\{2892A3AC-157A-43f6-9D7D-7EA74A1EDFB1}.exeC:\Windows\{2892A3AC-157A-43f6-9D7D-7EA74A1EDFB1}.exe14⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
PID:2636 -
C:\Windows\{319344D7-7F15-4369-88E0-BD81B5EC2B52}.exeC:\Windows\{319344D7-7F15-4369-88E0-BD81B5EC2B52}.exe15⤵PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5BA8D~1.EXE > nul14⤵PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9DC8C~1.EXE > nul13⤵PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1F5F~1.EXE > nul12⤵PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D019A~1.EXE > nul11⤵PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{22305~1.EXE > nul10⤵PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3CEEC~1.EXE > nul9⤵PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A33E0~1.EXE > nul8⤵PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C2D9~1.EXE > nul7⤵PID:652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{30E5D~1.EXE > nul6⤵PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8CECA~1.EXE > nul5⤵PID:2956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7B42E~1.EXE > nul4⤵PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9FBB3~1.EXE > nul3⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\4A4FFD~1.EXE > nul2⤵
- Deletes itself
PID:2964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD51ed3a838e950bd2915a6aed01e7b4768
SHA1acb35cd9fd8fd50d8c445790ae2c651680f773bc
SHA2561b1749bcdccd829a360dd2a39dfea324d706f1e6c45dfa3b363aa850d1fc6e57
SHA512cc66c983b165b091298ad77240a40d95f44407dea767fb6a39f07d6cc8d1e720583d41083eed0848ba0be7c13e70b975b6d2ab9a720445a0b43017fc15e71a98
-
Filesize
204KB
MD51ed3a838e950bd2915a6aed01e7b4768
SHA1acb35cd9fd8fd50d8c445790ae2c651680f773bc
SHA2561b1749bcdccd829a360dd2a39dfea324d706f1e6c45dfa3b363aa850d1fc6e57
SHA512cc66c983b165b091298ad77240a40d95f44407dea767fb6a39f07d6cc8d1e720583d41083eed0848ba0be7c13e70b975b6d2ab9a720445a0b43017fc15e71a98
-
Filesize
204KB
MD5874a7b8d6fab220e27a43938861d34e1
SHA14ef42001c8569903410f400872edb5233c7c5051
SHA256bfb5191b03090a9288b3fc073e5d9d16a9cbbf850e82d25a77c80343ffa92c0a
SHA51230d767eaf6066b3dad90385e7b54fe76db190b06195a3d011c3b733ffbf5b3567e8eaf9d477acf71b9fbcb5979101dc14c3cc400f253327b2ce85499ed65e020
-
Filesize
204KB
MD5874a7b8d6fab220e27a43938861d34e1
SHA14ef42001c8569903410f400872edb5233c7c5051
SHA256bfb5191b03090a9288b3fc073e5d9d16a9cbbf850e82d25a77c80343ffa92c0a
SHA51230d767eaf6066b3dad90385e7b54fe76db190b06195a3d011c3b733ffbf5b3567e8eaf9d477acf71b9fbcb5979101dc14c3cc400f253327b2ce85499ed65e020
-
Filesize
204KB
MD549e555805893965279318265ca9c3232
SHA1dbf8a3c0ab127d9ffc8ba0766a37485af27e2210
SHA256c6c343bb66e8ee438cbc76bdac23f0fac6e0f2d61bfe6bdb09752eb1c67c5740
SHA51214a4aa0baba47331a3a9c444b12a3e56528a85b8398eecb3cbfb17b4dca376645c4589242ebc6e6b501d434e38340bcc3d2aa247d7df7f3015bbc1bdcea7660a
-
Filesize
204KB
MD549e555805893965279318265ca9c3232
SHA1dbf8a3c0ab127d9ffc8ba0766a37485af27e2210
SHA256c6c343bb66e8ee438cbc76bdac23f0fac6e0f2d61bfe6bdb09752eb1c67c5740
SHA51214a4aa0baba47331a3a9c444b12a3e56528a85b8398eecb3cbfb17b4dca376645c4589242ebc6e6b501d434e38340bcc3d2aa247d7df7f3015bbc1bdcea7660a
-
Filesize
204KB
MD50f24669c658e3913687729ab2b9dadce
SHA15c3d312f4faa0d535dc6ffa91b460da4e8f4c258
SHA256cc19ac8520cd2c49e5017c5cfd2d4a587adfcf8b5fb5a2a1ffde6d36937b527b
SHA512d27a53fd56d71d495d821f617f551ad23b7e0a8a15b5fa86a8e47b5c49ea01b2c447f6594d615e07998bab8ee8e30c80bf32160c609545fb5cd8c6af9a728256
-
Filesize
204KB
MD50f24669c658e3913687729ab2b9dadce
SHA15c3d312f4faa0d535dc6ffa91b460da4e8f4c258
SHA256cc19ac8520cd2c49e5017c5cfd2d4a587adfcf8b5fb5a2a1ffde6d36937b527b
SHA512d27a53fd56d71d495d821f617f551ad23b7e0a8a15b5fa86a8e47b5c49ea01b2c447f6594d615e07998bab8ee8e30c80bf32160c609545fb5cd8c6af9a728256
-
Filesize
204KB
MD5e0eb26d65f90b98d68447ca198349dd8
SHA107cf88fd0993a162086c34cdb69a6888b8331802
SHA256f3f0ab3a608252b5ca103cd4d6b813ff3d33db52d40c10ec3a234948c2ad8502
SHA5122538cc335146be19db24c5f3a7d896cddd4e3ab691cc1863b76c0e925b2ab7d87aa7b6676aa02c7d3fd117e9c5fce0b14e88e7db41b1b5a6c6b4c3d7b5bf5180
-
Filesize
204KB
MD5e0eb26d65f90b98d68447ca198349dd8
SHA107cf88fd0993a162086c34cdb69a6888b8331802
SHA256f3f0ab3a608252b5ca103cd4d6b813ff3d33db52d40c10ec3a234948c2ad8502
SHA5122538cc335146be19db24c5f3a7d896cddd4e3ab691cc1863b76c0e925b2ab7d87aa7b6676aa02c7d3fd117e9c5fce0b14e88e7db41b1b5a6c6b4c3d7b5bf5180
-
Filesize
204KB
MD5506a6c486dc8a3a88d68664ffc53d5ea
SHA1125f2060174464ee6940cd04fce0303e8ba96b3d
SHA2566b617831ed560b3a2f3d5f311914d650eae39f9407cbc6811ced3d684ca60c30
SHA51256f72241a8e8effde3680732ba0c6bdfbaec15a9bd0c4ba6a37708dbd3d79197ba433ffbebee1b40271a2fed0a296e73fa2862777b6c5fb4e8a066b8d017a4bb
-
Filesize
204KB
MD5506a6c486dc8a3a88d68664ffc53d5ea
SHA1125f2060174464ee6940cd04fce0303e8ba96b3d
SHA2566b617831ed560b3a2f3d5f311914d650eae39f9407cbc6811ced3d684ca60c30
SHA51256f72241a8e8effde3680732ba0c6bdfbaec15a9bd0c4ba6a37708dbd3d79197ba433ffbebee1b40271a2fed0a296e73fa2862777b6c5fb4e8a066b8d017a4bb
-
Filesize
204KB
MD565ead3a47ddcfc8745f32298612a4bf1
SHA16ff07d7b3a84166a34d8ff1203a15b4b26dc490b
SHA256fd41849f140c626de869e3adb197b025d19d19a1fa7d93e77830c50ec3f51b72
SHA5124b5afca7a3625f3c2e7963b715105032298cd4b885e6db95e2b737fc79a0ce78f9b1315b49582a024c1e9e6f773e6f51807bafb78e677b8ca3cd90af5e18c75b
-
Filesize
204KB
MD565ead3a47ddcfc8745f32298612a4bf1
SHA16ff07d7b3a84166a34d8ff1203a15b4b26dc490b
SHA256fd41849f140c626de869e3adb197b025d19d19a1fa7d93e77830c50ec3f51b72
SHA5124b5afca7a3625f3c2e7963b715105032298cd4b885e6db95e2b737fc79a0ce78f9b1315b49582a024c1e9e6f773e6f51807bafb78e677b8ca3cd90af5e18c75b
-
Filesize
204KB
MD5bb5d137dd1a1117f9f314b57a36a1498
SHA10813d75a3fc1ab965118f90c45c53b6cd9c9ab0f
SHA256f445328b4a2675a7a5c0276cf9628d153841b91de4f5ec69592338ee0aff91ec
SHA5123dc07f8557a993c18767ab475e486e3552a06df0c3d5ac1c00afd7bd3941ab7c8d70ffcf06ef7abda6e24f13b31033e29422ace4ce0be542b6914512adaa12ba
-
Filesize
204KB
MD5bb5d137dd1a1117f9f314b57a36a1498
SHA10813d75a3fc1ab965118f90c45c53b6cd9c9ab0f
SHA256f445328b4a2675a7a5c0276cf9628d153841b91de4f5ec69592338ee0aff91ec
SHA5123dc07f8557a993c18767ab475e486e3552a06df0c3d5ac1c00afd7bd3941ab7c8d70ffcf06ef7abda6e24f13b31033e29422ace4ce0be542b6914512adaa12ba
-
Filesize
204KB
MD5d4f73f76a2caad1c1af8b8dfe625f33e
SHA1dceb50cc59e1d107f559b87c67f849773a160ad5
SHA2560e0303463904042661e85477a680ef4359cc2433d9b99d2cbb9c98b0666cc6a5
SHA51278082e9eda990c3bf9953856e86857e6be4f75c1af81f006aba63fc12fbdb1e9dfdb125df34ec896467cead55d8ae713771994d29d88af67cb6fb49f0c864f08
-
Filesize
204KB
MD5d4f73f76a2caad1c1af8b8dfe625f33e
SHA1dceb50cc59e1d107f559b87c67f849773a160ad5
SHA2560e0303463904042661e85477a680ef4359cc2433d9b99d2cbb9c98b0666cc6a5
SHA51278082e9eda990c3bf9953856e86857e6be4f75c1af81f006aba63fc12fbdb1e9dfdb125df34ec896467cead55d8ae713771994d29d88af67cb6fb49f0c864f08
-
Filesize
204KB
MD5dee0f863c3d3accf4228a4edd53c9c18
SHA19e1b0a214d1eb48eb6ad7aaccf35a4b7ce31322a
SHA256478cfdde168481417a1bb56b47273fe43a2ad434106a1f4c328cdc06e6ffa9d1
SHA512de3629a083fbaf41a5f04ee58729653dda3a8c7c2a50b1593662f80a16c666c060bb499c97f871c9b2caa1d8284496d5f8be220df276ee05686cf11ccd93d9c5
-
Filesize
204KB
MD5dee0f863c3d3accf4228a4edd53c9c18
SHA19e1b0a214d1eb48eb6ad7aaccf35a4b7ce31322a
SHA256478cfdde168481417a1bb56b47273fe43a2ad434106a1f4c328cdc06e6ffa9d1
SHA512de3629a083fbaf41a5f04ee58729653dda3a8c7c2a50b1593662f80a16c666c060bb499c97f871c9b2caa1d8284496d5f8be220df276ee05686cf11ccd93d9c5
-
Filesize
204KB
MD5dee0f863c3d3accf4228a4edd53c9c18
SHA19e1b0a214d1eb48eb6ad7aaccf35a4b7ce31322a
SHA256478cfdde168481417a1bb56b47273fe43a2ad434106a1f4c328cdc06e6ffa9d1
SHA512de3629a083fbaf41a5f04ee58729653dda3a8c7c2a50b1593662f80a16c666c060bb499c97f871c9b2caa1d8284496d5f8be220df276ee05686cf11ccd93d9c5
-
Filesize
204KB
MD59578eeb48dd9427fdb1f077413844ae1
SHA1347ac6ed5c4c05ac168bf91b885ee1640f2209e9
SHA25678f17c4d9fce136a15b43290875136e210894b123100845f8b11a715dd2a81dc
SHA512e0dc392107857d096a111a6bf1eea392adbc368fe0c2607b88fb83af2a4698716d1f3cf8b90f8fa2b3a6a9addadae9296d2aea49c86fa141f875eedc607ebc55
-
Filesize
204KB
MD59578eeb48dd9427fdb1f077413844ae1
SHA1347ac6ed5c4c05ac168bf91b885ee1640f2209e9
SHA25678f17c4d9fce136a15b43290875136e210894b123100845f8b11a715dd2a81dc
SHA512e0dc392107857d096a111a6bf1eea392adbc368fe0c2607b88fb83af2a4698716d1f3cf8b90f8fa2b3a6a9addadae9296d2aea49c86fa141f875eedc607ebc55
-
Filesize
204KB
MD560295112824b57d2bd88ed67bb2c5a96
SHA1d2c6551a81d9d3a0b05d41a5c7de5e9820d0d009
SHA256f5bb979f9b7561bcec20409ab8af5b3c0543c9ce5a4364590b5e836779f69742
SHA5120101c1feb533cb7f4062c4d7fea444e0116437bb81ae4319df03b00d406a91da3432e0d94195eb09780499ae72f5ce336db777231fa45579adee816e89ff0118
-
Filesize
204KB
MD560295112824b57d2bd88ed67bb2c5a96
SHA1d2c6551a81d9d3a0b05d41a5c7de5e9820d0d009
SHA256f5bb979f9b7561bcec20409ab8af5b3c0543c9ce5a4364590b5e836779f69742
SHA5120101c1feb533cb7f4062c4d7fea444e0116437bb81ae4319df03b00d406a91da3432e0d94195eb09780499ae72f5ce336db777231fa45579adee816e89ff0118
-
Filesize
204KB
MD5f09af3177e2d2d49ac8a952bd6f5795a
SHA1ada5d81cc230dd5283adf177ede9b8923c982f2e
SHA256df09a497c6e091df8352da563dc7fd176967d9ad8d9ea575d3e84d0ba097a1c1
SHA5122aaa4d327aef7d1fef521a420346801d32fda393389ff53d49400a8a6c4da6a40942ae7319d5d7f483ae5849fbbc38749e30621d028b18dd08e06f22a8a0d94f
-
Filesize
204KB
MD5f09af3177e2d2d49ac8a952bd6f5795a
SHA1ada5d81cc230dd5283adf177ede9b8923c982f2e
SHA256df09a497c6e091df8352da563dc7fd176967d9ad8d9ea575d3e84d0ba097a1c1
SHA5122aaa4d327aef7d1fef521a420346801d32fda393389ff53d49400a8a6c4da6a40942ae7319d5d7f483ae5849fbbc38749e30621d028b18dd08e06f22a8a0d94f