Analysis
-
max time kernel
146s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
72adb39dee7f9fexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
72adb39dee7f9fexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
72adb39dee7f9fexeexeexeex.exe
-
Size
168KB
-
MD5
72adb39dee7f9f75a1918f699e5cb711
-
SHA1
9ae85756737ea1a80ae2885acbe9b11fb319f701
-
SHA256
cfa135e9b32cf39dfa1a6345507559450570149cc01fd25069a4c8cd50e70e9c
-
SHA512
9a16a390e4cbb2de8f6f7b9371fbe47d62f035e1a365a71b6cc1e1a18e41877c710dc258973e4e4ce30d1cdc5e913b1ab4c8e6a941a2624b04292544613c25ef
-
SSDEEP
1536:1EGh0o6lq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o6lqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA64C425-FED9-40f5-899A-398C069C5E58} {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A57B28C4-C68B-4ea5-839A-7401C70292F9}\stubpath = "C:\\Windows\\{A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe" {5B627B59-F856-4759-9244-537F8D62ACEB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECED5834-495B-4810-8DFC-73F175DA6DA8} {B3E7168F-1ABF-4381-9823-8971F8AEB98C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECED5834-495B-4810-8DFC-73F175DA6DA8}\stubpath = "C:\\Windows\\{ECED5834-495B-4810-8DFC-73F175DA6DA8}.exe" {B3E7168F-1ABF-4381-9823-8971F8AEB98C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A} {97CD1D9A-874C-47a9-9306-766EB27E2D26}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A}\stubpath = "C:\\Windows\\{6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A}.exe" {97CD1D9A-874C-47a9-9306-766EB27E2D26}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93AADB59-59BA-448e-865B-8595ECFFFD8E}\stubpath = "C:\\Windows\\{93AADB59-59BA-448e-865B-8595ECFFFD8E}.exe" {6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{633B8BFA-F783-40aa-B33E-67D5C863FCC4}\stubpath = "C:\\Windows\\{633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe" {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F1E52DAB-E9ED-4958-BE9E-59817C9173A2}\stubpath = "C:\\Windows\\{F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe" {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{633B8BFA-F783-40aa-B33E-67D5C863FCC4} {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5B627B59-F856-4759-9244-537F8D62ACEB} {DA64C425-FED9-40f5-899A-398C069C5E58}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5B627B59-F856-4759-9244-537F8D62ACEB}\stubpath = "C:\\Windows\\{5B627B59-F856-4759-9244-537F8D62ACEB}.exe" {DA64C425-FED9-40f5-899A-398C069C5E58}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A57B28C4-C68B-4ea5-839A-7401C70292F9} {5B627B59-F856-4759-9244-537F8D62ACEB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21B79110-D106-4db2-AB96-B402BFE68A38}\stubpath = "C:\\Windows\\{21B79110-D106-4db2-AB96-B402BFE68A38}.exe" {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D986CB87-D71E-4fdc-97CF-564F99B5CBC6} {21B79110-D106-4db2-AB96-B402BFE68A38}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA335EA6-8FBF-45d9-A03C-804036B2888A}\stubpath = "C:\\Windows\\{FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe" 72adb39dee7f9fexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{97CD1D9A-874C-47a9-9306-766EB27E2D26}\stubpath = "C:\\Windows\\{97CD1D9A-874C-47a9-9306-766EB27E2D26}.exe" {ECED5834-495B-4810-8DFC-73F175DA6DA8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B3E7168F-1ABF-4381-9823-8971F8AEB98C} {D986CB87-D71E-4fdc-97CF-564F99B5CBC6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21B79110-D106-4db2-AB96-B402BFE68A38} {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B3E7168F-1ABF-4381-9823-8971F8AEB98C}\stubpath = "C:\\Windows\\{B3E7168F-1ABF-4381-9823-8971F8AEB98C}.exe" {D986CB87-D71E-4fdc-97CF-564F99B5CBC6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{97CD1D9A-874C-47a9-9306-766EB27E2D26} {ECED5834-495B-4810-8DFC-73F175DA6DA8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA335EA6-8FBF-45d9-A03C-804036B2888A} 72adb39dee7f9fexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA64C425-FED9-40f5-899A-398C069C5E58}\stubpath = "C:\\Windows\\{DA64C425-FED9-40f5-899A-398C069C5E58}.exe" {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D986CB87-D71E-4fdc-97CF-564F99B5CBC6}\stubpath = "C:\\Windows\\{D986CB87-D71E-4fdc-97CF-564F99B5CBC6}.exe" {21B79110-D106-4db2-AB96-B402BFE68A38}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93AADB59-59BA-448e-865B-8595ECFFFD8E} {6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F1E52DAB-E9ED-4958-BE9E-59817C9173A2} {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe -
Deletes itself 1 IoCs
pid Process 1776 cmd.exe -
Executes dropped EXE 13 IoCs
pid Process 2348 {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe 2380 {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe 2156 {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe 2916 {DA64C425-FED9-40f5-899A-398C069C5E58}.exe 1164 {5B627B59-F856-4759-9244-537F8D62ACEB}.exe 1708 {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe 1132 {21B79110-D106-4db2-AB96-B402BFE68A38}.exe 1932 {D986CB87-D71E-4fdc-97CF-564F99B5CBC6}.exe 2368 {B3E7168F-1ABF-4381-9823-8971F8AEB98C}.exe 2732 {ECED5834-495B-4810-8DFC-73F175DA6DA8}.exe 1696 {97CD1D9A-874C-47a9-9306-766EB27E2D26}.exe 2648 {6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A}.exe 2652 {93AADB59-59BA-448e-865B-8595ECFFFD8E}.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\{5B627B59-F856-4759-9244-537F8D62ACEB}.exe {DA64C425-FED9-40f5-899A-398C069C5E58}.exe File created C:\Windows\{D986CB87-D71E-4fdc-97CF-564F99B5CBC6}.exe {21B79110-D106-4db2-AB96-B402BFE68A38}.exe File created C:\Windows\{B3E7168F-1ABF-4381-9823-8971F8AEB98C}.exe {D986CB87-D71E-4fdc-97CF-564F99B5CBC6}.exe File created C:\Windows\{97CD1D9A-874C-47a9-9306-766EB27E2D26}.exe {ECED5834-495B-4810-8DFC-73F175DA6DA8}.exe File created C:\Windows\{6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A}.exe {97CD1D9A-874C-47a9-9306-766EB27E2D26}.exe File created C:\Windows\{FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe 72adb39dee7f9fexeexeexeex.exe File created C:\Windows\{DA64C425-FED9-40f5-899A-398C069C5E58}.exe {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe File created C:\Windows\{A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe {5B627B59-F856-4759-9244-537F8D62ACEB}.exe File created C:\Windows\{21B79110-D106-4db2-AB96-B402BFE68A38}.exe {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe File created C:\Windows\{ECED5834-495B-4810-8DFC-73F175DA6DA8}.exe {B3E7168F-1ABF-4381-9823-8971F8AEB98C}.exe File created C:\Windows\{93AADB59-59BA-448e-865B-8595ECFFFD8E}.exe {6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A}.exe File created C:\Windows\{F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe File created C:\Windows\{633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2336 72adb39dee7f9fexeexeexeex.exe Token: SeIncBasePriorityPrivilege 2348 {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe Token: SeIncBasePriorityPrivilege 2380 {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe Token: SeIncBasePriorityPrivilege 2156 {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe Token: SeIncBasePriorityPrivilege 2916 {DA64C425-FED9-40f5-899A-398C069C5E58}.exe Token: SeIncBasePriorityPrivilege 1164 {5B627B59-F856-4759-9244-537F8D62ACEB}.exe Token: SeIncBasePriorityPrivilege 1708 {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe Token: SeIncBasePriorityPrivilege 1132 {21B79110-D106-4db2-AB96-B402BFE68A38}.exe Token: SeIncBasePriorityPrivilege 1932 {D986CB87-D71E-4fdc-97CF-564F99B5CBC6}.exe Token: SeIncBasePriorityPrivilege 2368 {B3E7168F-1ABF-4381-9823-8971F8AEB98C}.exe Token: SeIncBasePriorityPrivilege 2732 {ECED5834-495B-4810-8DFC-73F175DA6DA8}.exe Token: SeIncBasePriorityPrivilege 1696 {97CD1D9A-874C-47a9-9306-766EB27E2D26}.exe Token: SeIncBasePriorityPrivilege 2648 {6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2348 2336 72adb39dee7f9fexeexeexeex.exe 29 PID 2336 wrote to memory of 2348 2336 72adb39dee7f9fexeexeexeex.exe 29 PID 2336 wrote to memory of 2348 2336 72adb39dee7f9fexeexeexeex.exe 29 PID 2336 wrote to memory of 2348 2336 72adb39dee7f9fexeexeexeex.exe 29 PID 2336 wrote to memory of 1776 2336 72adb39dee7f9fexeexeexeex.exe 30 PID 2336 wrote to memory of 1776 2336 72adb39dee7f9fexeexeexeex.exe 30 PID 2336 wrote to memory of 1776 2336 72adb39dee7f9fexeexeexeex.exe 30 PID 2336 wrote to memory of 1776 2336 72adb39dee7f9fexeexeexeex.exe 30 PID 2348 wrote to memory of 2380 2348 {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe 31 PID 2348 wrote to memory of 2380 2348 {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe 31 PID 2348 wrote to memory of 2380 2348 {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe 31 PID 2348 wrote to memory of 2380 2348 {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe 31 PID 2348 wrote to memory of 1868 2348 {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe 32 PID 2348 wrote to memory of 1868 2348 {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe 32 PID 2348 wrote to memory of 1868 2348 {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe 32 PID 2348 wrote to memory of 1868 2348 {FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe 32 PID 2380 wrote to memory of 2156 2380 {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe 34 PID 2380 wrote to memory of 2156 2380 {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe 34 PID 2380 wrote to memory of 2156 2380 {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe 34 PID 2380 wrote to memory of 2156 2380 {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe 34 PID 2380 wrote to memory of 2236 2380 {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe 33 PID 2380 wrote to memory of 2236 2380 {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe 33 PID 2380 wrote to memory of 2236 2380 {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe 33 PID 2380 wrote to memory of 2236 2380 {F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe 33 PID 2156 wrote to memory of 2916 2156 {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe 36 PID 2156 wrote to memory of 2916 2156 {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe 36 PID 2156 wrote to memory of 2916 2156 {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe 36 PID 2156 wrote to memory of 2916 2156 {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe 36 PID 2156 wrote to memory of 3008 2156 {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe 35 PID 2156 wrote to memory of 3008 2156 {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe 35 PID 2156 wrote to memory of 3008 2156 {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe 35 PID 2156 wrote to memory of 3008 2156 {633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe 35 PID 2916 wrote to memory of 1164 2916 {DA64C425-FED9-40f5-899A-398C069C5E58}.exe 37 PID 2916 wrote to memory of 1164 2916 {DA64C425-FED9-40f5-899A-398C069C5E58}.exe 37 PID 2916 wrote to memory of 1164 2916 {DA64C425-FED9-40f5-899A-398C069C5E58}.exe 37 PID 2916 wrote to memory of 1164 2916 {DA64C425-FED9-40f5-899A-398C069C5E58}.exe 37 PID 2916 wrote to memory of 1892 2916 {DA64C425-FED9-40f5-899A-398C069C5E58}.exe 38 PID 2916 wrote to memory of 1892 2916 {DA64C425-FED9-40f5-899A-398C069C5E58}.exe 38 PID 2916 wrote to memory of 1892 2916 {DA64C425-FED9-40f5-899A-398C069C5E58}.exe 38 PID 2916 wrote to memory of 1892 2916 {DA64C425-FED9-40f5-899A-398C069C5E58}.exe 38 PID 1164 wrote to memory of 1708 1164 {5B627B59-F856-4759-9244-537F8D62ACEB}.exe 39 PID 1164 wrote to memory of 1708 1164 {5B627B59-F856-4759-9244-537F8D62ACEB}.exe 39 PID 1164 wrote to memory of 1708 1164 {5B627B59-F856-4759-9244-537F8D62ACEB}.exe 39 PID 1164 wrote to memory of 1708 1164 {5B627B59-F856-4759-9244-537F8D62ACEB}.exe 39 PID 1164 wrote to memory of 1620 1164 {5B627B59-F856-4759-9244-537F8D62ACEB}.exe 40 PID 1164 wrote to memory of 1620 1164 {5B627B59-F856-4759-9244-537F8D62ACEB}.exe 40 PID 1164 wrote to memory of 1620 1164 {5B627B59-F856-4759-9244-537F8D62ACEB}.exe 40 PID 1164 wrote to memory of 1620 1164 {5B627B59-F856-4759-9244-537F8D62ACEB}.exe 40 PID 1708 wrote to memory of 1132 1708 {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe 41 PID 1708 wrote to memory of 1132 1708 {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe 41 PID 1708 wrote to memory of 1132 1708 {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe 41 PID 1708 wrote to memory of 1132 1708 {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe 41 PID 1708 wrote to memory of 2228 1708 {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe 42 PID 1708 wrote to memory of 2228 1708 {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe 42 PID 1708 wrote to memory of 2228 1708 {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe 42 PID 1708 wrote to memory of 2228 1708 {A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe 42 PID 1132 wrote to memory of 1932 1132 {21B79110-D106-4db2-AB96-B402BFE68A38}.exe 43 PID 1132 wrote to memory of 1932 1132 {21B79110-D106-4db2-AB96-B402BFE68A38}.exe 43 PID 1132 wrote to memory of 1932 1132 {21B79110-D106-4db2-AB96-B402BFE68A38}.exe 43 PID 1132 wrote to memory of 1932 1132 {21B79110-D106-4db2-AB96-B402BFE68A38}.exe 43 PID 1132 wrote to memory of 1712 1132 {21B79110-D106-4db2-AB96-B402BFE68A38}.exe 44 PID 1132 wrote to memory of 1712 1132 {21B79110-D106-4db2-AB96-B402BFE68A38}.exe 44 PID 1132 wrote to memory of 1712 1132 {21B79110-D106-4db2-AB96-B402BFE68A38}.exe 44 PID 1132 wrote to memory of 1712 1132 {21B79110-D106-4db2-AB96-B402BFE68A38}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\72adb39dee7f9fexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\72adb39dee7f9fexeexeexeex.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\{FA335EA6-8FBF-45d9-A03C-804036B2888A}.exeC:\Windows\{FA335EA6-8FBF-45d9-A03C-804036B2888A}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\{F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exeC:\Windows\{F1E52DAB-E9ED-4958-BE9E-59817C9173A2}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1E52~1.EXE > nul4⤵PID:2236
-
-
C:\Windows\{633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exeC:\Windows\{633B8BFA-F783-40aa-B33E-67D5C863FCC4}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{633B8~1.EXE > nul5⤵PID:3008
-
-
C:\Windows\{DA64C425-FED9-40f5-899A-398C069C5E58}.exeC:\Windows\{DA64C425-FED9-40f5-899A-398C069C5E58}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\{5B627B59-F856-4759-9244-537F8D62ACEB}.exeC:\Windows\{5B627B59-F856-4759-9244-537F8D62ACEB}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\{A57B28C4-C68B-4ea5-839A-7401C70292F9}.exeC:\Windows\{A57B28C4-C68B-4ea5-839A-7401C70292F9}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\{21B79110-D106-4db2-AB96-B402BFE68A38}.exeC:\Windows\{21B79110-D106-4db2-AB96-B402BFE68A38}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\{D986CB87-D71E-4fdc-97CF-564F99B5CBC6}.exeC:\Windows\{D986CB87-D71E-4fdc-97CF-564F99B5CBC6}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D986C~1.EXE > nul10⤵PID:2636
-
-
C:\Windows\{B3E7168F-1ABF-4381-9823-8971F8AEB98C}.exeC:\Windows\{B3E7168F-1ABF-4381-9823-8971F8AEB98C}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2368 -
C:\Windows\{ECED5834-495B-4810-8DFC-73F175DA6DA8}.exeC:\Windows\{ECED5834-495B-4810-8DFC-73F175DA6DA8}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2732 -
C:\Windows\{97CD1D9A-874C-47a9-9306-766EB27E2D26}.exeC:\Windows\{97CD1D9A-874C-47a9-9306-766EB27E2D26}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{97CD1~1.EXE > nul13⤵PID:2508
-
-
C:\Windows\{6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A}.exeC:\Windows\{6A98ACC7-7695-4d81-A7C3-7D1AEF4EB08A}.exe13⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\{93AADB59-59BA-448e-865B-8595ECFFFD8E}.exeC:\Windows\{93AADB59-59BA-448e-865B-8595ECFFFD8E}.exe14⤵
- Executes dropped EXE
PID:2652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6A98A~1.EXE > nul14⤵PID:2600
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ECED5~1.EXE > nul12⤵PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B3E71~1.EXE > nul11⤵PID:2644
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{21B79~1.EXE > nul9⤵PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A57B2~1.EXE > nul8⤵PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5B627~1.EXE > nul7⤵PID:1620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DA64C~1.EXE > nul6⤵PID:1892
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FA335~1.EXE > nul3⤵PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\72ADB3~1.EXE > nul2⤵
- Deletes itself
PID:1776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5f18a147a1bbf959637ebb4a752120683
SHA162caba3820fc44a53e044bbd9d2d0b1e647d5d66
SHA256148bc90f5b92bd3537a39e94c33a983855b68c5c2c640ee68e4fa113392e6e51
SHA512ced4e152d00d30730bf51648d5bc5511afccbc540ebccb3f0f0fe4e0fc42bedceeadd3fa86aea34d2d7afc64e092ceb0749a497496c2c5c4c4ac470144bd5b91
-
Filesize
168KB
MD5f18a147a1bbf959637ebb4a752120683
SHA162caba3820fc44a53e044bbd9d2d0b1e647d5d66
SHA256148bc90f5b92bd3537a39e94c33a983855b68c5c2c640ee68e4fa113392e6e51
SHA512ced4e152d00d30730bf51648d5bc5511afccbc540ebccb3f0f0fe4e0fc42bedceeadd3fa86aea34d2d7afc64e092ceb0749a497496c2c5c4c4ac470144bd5b91
-
Filesize
168KB
MD5a4781be7881a9d6767e31dc81b1581b4
SHA1b14c7075b25d81fbfdd0e06da53000c20c03a34c
SHA256505e3b5f33021f5e93564cd53f5569fd841877b9abd0c34bad1125107b0321ae
SHA512358cd1f8b972fa11b517ac150c0ba376e7eb8ee5bde71a3e5a626d7dae2387b59ef2f91a4c3f63bf438f418f52279112f56c16725d9ed20dad4c3240ae5e5038
-
Filesize
168KB
MD5a4781be7881a9d6767e31dc81b1581b4
SHA1b14c7075b25d81fbfdd0e06da53000c20c03a34c
SHA256505e3b5f33021f5e93564cd53f5569fd841877b9abd0c34bad1125107b0321ae
SHA512358cd1f8b972fa11b517ac150c0ba376e7eb8ee5bde71a3e5a626d7dae2387b59ef2f91a4c3f63bf438f418f52279112f56c16725d9ed20dad4c3240ae5e5038
-
Filesize
168KB
MD5d07eabf31e26be4abf51ea7f7752bde2
SHA19a239179c1b04eb47f455cf2173282511ee2f67f
SHA256ced300a83f1f723277ed060764d10c38fcd8ce4ec984bc8363b979c5ee4a2214
SHA5125944f08a8f1224e72b5e64ba711053f4b53cb0fba2f3ffdd9085dd818be1adb7464b39e6cd81f5c9f59089886782fe9a46ce998b8c8376b2b8cd67aafb12a6d0
-
Filesize
168KB
MD5d07eabf31e26be4abf51ea7f7752bde2
SHA19a239179c1b04eb47f455cf2173282511ee2f67f
SHA256ced300a83f1f723277ed060764d10c38fcd8ce4ec984bc8363b979c5ee4a2214
SHA5125944f08a8f1224e72b5e64ba711053f4b53cb0fba2f3ffdd9085dd818be1adb7464b39e6cd81f5c9f59089886782fe9a46ce998b8c8376b2b8cd67aafb12a6d0
-
Filesize
168KB
MD526a4cf184c1fae7f6c3e5925f46d906d
SHA12d0bfeaa90251e8fb102483b443ac5d1d6b7f128
SHA2565ab8aaabefcdbf14b4f74937031aaf499974ed72ba01a85389c6d5710e624e59
SHA512c3f850182b343680136db8c78d2075117851075ad31ce27593cf38bde6d1a164ea8bb968fefbc6dd5bcb45c11a3c97bf9b0381936cd50e4e3c31bac1b829e387
-
Filesize
168KB
MD526a4cf184c1fae7f6c3e5925f46d906d
SHA12d0bfeaa90251e8fb102483b443ac5d1d6b7f128
SHA2565ab8aaabefcdbf14b4f74937031aaf499974ed72ba01a85389c6d5710e624e59
SHA512c3f850182b343680136db8c78d2075117851075ad31ce27593cf38bde6d1a164ea8bb968fefbc6dd5bcb45c11a3c97bf9b0381936cd50e4e3c31bac1b829e387
-
Filesize
168KB
MD507f5eefd57a6586bbee12bc12ee7881f
SHA1e78c9d3e6ca5ec6cf8f502f17a0f092f26ad1dc3
SHA256f66b6fd8ff769fa3cdf73bf814148def75905ca61ca26eb749a2bc7f2148ec1d
SHA512c8281f91ead3633828d3138a1d60dc7686f62a2111a01221a985045851a4fb7ea4218f3561df5968d7a39579a72f3a6b7bcc8157f1575954b0a64c0bd2b1ec32
-
Filesize
168KB
MD5fa1d35517b4ac351515cc202515d5c09
SHA1672ecb91a2e9a3513836a7d10f5c3105ba97be4e
SHA256c3eeeff0c7da99a25769c4079ab3a37e737811275a29ba42b3cb443797bea688
SHA512cf03ae64e297af227d34ca0ccef967ae57770ce18951ac05cd23583246cb9d7d180a2192b755512e0428c49974aa13f2c767a5d78fdac972e20d1cce96f08048
-
Filesize
168KB
MD5fa1d35517b4ac351515cc202515d5c09
SHA1672ecb91a2e9a3513836a7d10f5c3105ba97be4e
SHA256c3eeeff0c7da99a25769c4079ab3a37e737811275a29ba42b3cb443797bea688
SHA512cf03ae64e297af227d34ca0ccef967ae57770ce18951ac05cd23583246cb9d7d180a2192b755512e0428c49974aa13f2c767a5d78fdac972e20d1cce96f08048
-
Filesize
168KB
MD5f699a135a382ade94ca504acdc07ce34
SHA178f73b7f83e55ede7c554068ab8bba9fd72cd7fd
SHA25669327dd70d546e88d7139755e3f067a6b13160a88dd26b8b5ec47773cfc74907
SHA512a0616e5ea716b64a030f3826475e3324619b56276a359e6cc145ef254b547041978b415c33ddc8f7cfd29b7cb3ea6f4ee3e0beb05b9677f15eab97ce12db2e8c
-
Filesize
168KB
MD5f699a135a382ade94ca504acdc07ce34
SHA178f73b7f83e55ede7c554068ab8bba9fd72cd7fd
SHA25669327dd70d546e88d7139755e3f067a6b13160a88dd26b8b5ec47773cfc74907
SHA512a0616e5ea716b64a030f3826475e3324619b56276a359e6cc145ef254b547041978b415c33ddc8f7cfd29b7cb3ea6f4ee3e0beb05b9677f15eab97ce12db2e8c
-
Filesize
168KB
MD5537383b7de584f14b710eb1e215fd861
SHA1cb8d0732d952667d51c02aaf42d4026a0eed8784
SHA256b8e36edc8cf920391e52e0029d134ceef0e782dca30681f0c80338cba335dd3c
SHA512ee2386ded4191d5f2bea0c81be460d638e5b4a0c0b1b4b0cc6f07e3638a254b01abc9389cf270b3c256d0d8c2932d9f70f360484097d3f9df19311c182dcde33
-
Filesize
168KB
MD5537383b7de584f14b710eb1e215fd861
SHA1cb8d0732d952667d51c02aaf42d4026a0eed8784
SHA256b8e36edc8cf920391e52e0029d134ceef0e782dca30681f0c80338cba335dd3c
SHA512ee2386ded4191d5f2bea0c81be460d638e5b4a0c0b1b4b0cc6f07e3638a254b01abc9389cf270b3c256d0d8c2932d9f70f360484097d3f9df19311c182dcde33
-
Filesize
168KB
MD575d501e4de63593b4896e903782f1776
SHA1172fe8b28839f13baa7460ac3a24f46cd5099b1e
SHA2569590af2e0f67c8209fbe0fc4b1b29fc4931705067b58d6e8a14d63c11f02f9e5
SHA5129126af8a815ad7ca8bdf49ba74ad24df294821cf2ac418e7da68bc90d46eb4119197f2d037e734d944c924faca55b261ef04148f4e0923b57e2c5b46443510c0
-
Filesize
168KB
MD575d501e4de63593b4896e903782f1776
SHA1172fe8b28839f13baa7460ac3a24f46cd5099b1e
SHA2569590af2e0f67c8209fbe0fc4b1b29fc4931705067b58d6e8a14d63c11f02f9e5
SHA5129126af8a815ad7ca8bdf49ba74ad24df294821cf2ac418e7da68bc90d46eb4119197f2d037e734d944c924faca55b261ef04148f4e0923b57e2c5b46443510c0
-
Filesize
168KB
MD5df0a94930f50716e2f734934711eb450
SHA102ca66fa6465954784fcb6d3772176a0d33dd809
SHA2564b63a4610b12a3378d3ce421e26ffc24fab36fb8f5561e617b20e39172778af1
SHA5126ea8a1e45d5e0b2094f11de241c6a61b4ed4de48cedce95d8ede6b6613dc254606d605e2ce5530ecd84795bf2db2aff00b17016b4ab6b01d759354abeafd9e78
-
Filesize
168KB
MD5df0a94930f50716e2f734934711eb450
SHA102ca66fa6465954784fcb6d3772176a0d33dd809
SHA2564b63a4610b12a3378d3ce421e26ffc24fab36fb8f5561e617b20e39172778af1
SHA5126ea8a1e45d5e0b2094f11de241c6a61b4ed4de48cedce95d8ede6b6613dc254606d605e2ce5530ecd84795bf2db2aff00b17016b4ab6b01d759354abeafd9e78
-
Filesize
168KB
MD5b04e68be33907d2f405515874dd6d4af
SHA1997e2cd54b6bf1243ac2d785b2e2a925b1aafe4d
SHA256b142e0c7fbe122f1bcd56800a20ef51a1c07e77f6666406b157bd8af7f5059be
SHA5123d855d242cc4e4b9b140468f3b9af2f8118ccf1b1a1942b706d5e61f275f27165465106424fd7366bcfe483a445eb808eea69460746c2fdf416cceb5d8067a76
-
Filesize
168KB
MD5b04e68be33907d2f405515874dd6d4af
SHA1997e2cd54b6bf1243ac2d785b2e2a925b1aafe4d
SHA256b142e0c7fbe122f1bcd56800a20ef51a1c07e77f6666406b157bd8af7f5059be
SHA5123d855d242cc4e4b9b140468f3b9af2f8118ccf1b1a1942b706d5e61f275f27165465106424fd7366bcfe483a445eb808eea69460746c2fdf416cceb5d8067a76
-
Filesize
168KB
MD5c9c00830312821b350593f59e999cee1
SHA1bffefbc69ffade4612de166b95f572dac0266afc
SHA256a921e2856f701a015daa39bb2bdfdf708a5ee5f606d3f6c8aca544383db1dcca
SHA512c2f3edc4868fa558c2c709460808e4180bbb66e5e4544522025fc588ec8d7a6f3cdcf7b16eb70dbc4384c3617433bd71272ef8c31c266ae4382598a733dc98d9
-
Filesize
168KB
MD5c9c00830312821b350593f59e999cee1
SHA1bffefbc69ffade4612de166b95f572dac0266afc
SHA256a921e2856f701a015daa39bb2bdfdf708a5ee5f606d3f6c8aca544383db1dcca
SHA512c2f3edc4868fa558c2c709460808e4180bbb66e5e4544522025fc588ec8d7a6f3cdcf7b16eb70dbc4384c3617433bd71272ef8c31c266ae4382598a733dc98d9
-
Filesize
168KB
MD594f75a98fdf087dc60ab9e4dd2a02ce0
SHA1bc5bde5c2f371e5811e1b1a8806c62d0485477d7
SHA256616c1461e5a6918e29dfdea7d3fa6c031c9a4bddf7ec4239452ee2566ce5472f
SHA51257d37665418fe919a3d93ff381348273688e69e98f2884832384fd098e32c2482ada0613d38bd3422a35fab08ae5109857f259e449c9667c1f79d1d51f2340d2
-
Filesize
168KB
MD594f75a98fdf087dc60ab9e4dd2a02ce0
SHA1bc5bde5c2f371e5811e1b1a8806c62d0485477d7
SHA256616c1461e5a6918e29dfdea7d3fa6c031c9a4bddf7ec4239452ee2566ce5472f
SHA51257d37665418fe919a3d93ff381348273688e69e98f2884832384fd098e32c2482ada0613d38bd3422a35fab08ae5109857f259e449c9667c1f79d1d51f2340d2
-
Filesize
168KB
MD594f75a98fdf087dc60ab9e4dd2a02ce0
SHA1bc5bde5c2f371e5811e1b1a8806c62d0485477d7
SHA256616c1461e5a6918e29dfdea7d3fa6c031c9a4bddf7ec4239452ee2566ce5472f
SHA51257d37665418fe919a3d93ff381348273688e69e98f2884832384fd098e32c2482ada0613d38bd3422a35fab08ae5109857f259e449c9667c1f79d1d51f2340d2