Analysis
-
max time kernel
156s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
9ce41853628c25exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9ce41853628c25exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
9ce41853628c25exeexeexeex.exe
-
Size
168KB
-
MD5
9ce41853628c25124c56c0d9df2e4ab5
-
SHA1
fbb732d62328aa03009cbfe1dccccc9c47d48704
-
SHA256
ff5725f65f53084e929b56718cffd627794084b901ddf6704d9aa1bb71832b6a
-
SHA512
efb5cb493c6ae02c43fde2f8777435b11e3f4f2b3a30aba262f933c898ac83b32c0721e0aeb89de997e4e45b7936aa64aff97728aa19c0f4f31df6439e85cbed
-
SSDEEP
1536:1EGh0oGlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oGlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AD32D490-61F5-4d43-B9B2-CBE9E43E9374}\stubpath = "C:\\Windows\\{AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe" {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33D023E7-7AB9-4869-89B6-50137F397A01}\stubpath = "C:\\Windows\\{33D023E7-7AB9-4869-89B6-50137F397A01}.exe" {63B86E80-13ED-4bad-BB57-A1471047003A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F3735450-90B2-4082-8772-939817D53DDA}\stubpath = "C:\\Windows\\{F3735450-90B2-4082-8772-939817D53DDA}.exe" {CFC1F921-55AD-445a-A084-C550BE23EAAE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E00AF714-1B39-49ff-AC48-C5C35BC747D6} {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E4E12C61-4911-4b33-A4E8-2D6845C8BF60} {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E4E12C61-4911-4b33-A4E8-2D6845C8BF60}\stubpath = "C:\\Windows\\{E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe" {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63B86E80-13ED-4bad-BB57-A1471047003A} {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91986339-E909-4332-838D-CEB428CC1691} {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFC1F921-55AD-445a-A084-C550BE23EAAE}\stubpath = "C:\\Windows\\{CFC1F921-55AD-445a-A084-C550BE23EAAE}.exe" {70467F9D-6BD7-48bf-9FDA-8BF849404F07}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E5C33E8-4C3E-4029-8BC9-C57E4DA067CE} {3D8AB01E-7A1E-476a-B311-5919515963CB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E00AF714-1B39-49ff-AC48-C5C35BC747D6}\stubpath = "C:\\Windows\\{E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe" {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F3735450-90B2-4082-8772-939817D53DDA} {CFC1F921-55AD-445a-A084-C550BE23EAAE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91986339-E909-4332-838D-CEB428CC1691}\stubpath = "C:\\Windows\\{91986339-E909-4332-838D-CEB428CC1691}.exe" {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB64CEEB-FA55-4b43-982A-51BF3F485890}\stubpath = "C:\\Windows\\{CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe" {91986339-E909-4332-838D-CEB428CC1691}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A237AB73-597C-4502-83D7-2A7BE8B1C45E} {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFC1F921-55AD-445a-A084-C550BE23EAAE} {70467F9D-6BD7-48bf-9FDA-8BF849404F07}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5297E41F-A2E5-4089-8A99-A65221AED41A}\stubpath = "C:\\Windows\\{5297E41F-A2E5-4089-8A99-A65221AED41A}.exe" 9ce41853628c25exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63B86E80-13ED-4bad-BB57-A1471047003A}\stubpath = "C:\\Windows\\{63B86E80-13ED-4bad-BB57-A1471047003A}.exe" {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33D023E7-7AB9-4869-89B6-50137F397A01} {63B86E80-13ED-4bad-BB57-A1471047003A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70467F9D-6BD7-48bf-9FDA-8BF849404F07} {33D023E7-7AB9-4869-89B6-50137F397A01}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D8AB01E-7A1E-476a-B311-5919515963CB} {F3735450-90B2-4082-8772-939817D53DDA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D8AB01E-7A1E-476a-B311-5919515963CB}\stubpath = "C:\\Windows\\{3D8AB01E-7A1E-476a-B311-5919515963CB}.exe" {F3735450-90B2-4082-8772-939817D53DDA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A237AB73-597C-4502-83D7-2A7BE8B1C45E}\stubpath = "C:\\Windows\\{A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe" {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB64CEEB-FA55-4b43-982A-51BF3F485890} {91986339-E909-4332-838D-CEB428CC1691}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AD32D490-61F5-4d43-B9B2-CBE9E43E9374} {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70467F9D-6BD7-48bf-9FDA-8BF849404F07}\stubpath = "C:\\Windows\\{70467F9D-6BD7-48bf-9FDA-8BF849404F07}.exe" {33D023E7-7AB9-4869-89B6-50137F397A01}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E5C33E8-4C3E-4029-8BC9-C57E4DA067CE}\stubpath = "C:\\Windows\\{8E5C33E8-4C3E-4029-8BC9-C57E4DA067CE}.exe" {3D8AB01E-7A1E-476a-B311-5919515963CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5297E41F-A2E5-4089-8A99-A65221AED41A} 9ce41853628c25exeexeexeex.exe -
Deletes itself 1 IoCs
pid Process 2400 cmd.exe -
Executes dropped EXE 14 IoCs
pid Process 3056 {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe 2364 {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe 656 {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe 2208 {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe 2972 {91986339-E909-4332-838D-CEB428CC1691}.exe 2228 {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe 1492 {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe 2136 {63B86E80-13ED-4bad-BB57-A1471047003A}.exe 2576 {33D023E7-7AB9-4869-89B6-50137F397A01}.exe 2692 {70467F9D-6BD7-48bf-9FDA-8BF849404F07}.exe 1932 {CFC1F921-55AD-445a-A084-C550BE23EAAE}.exe 2744 {F3735450-90B2-4082-8772-939817D53DDA}.exe 2060 {3D8AB01E-7A1E-476a-B311-5919515963CB}.exe 2480 {8E5C33E8-4C3E-4029-8BC9-C57E4DA067CE}.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File created C:\Windows\{91986339-E909-4332-838D-CEB428CC1691}.exe {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe File created C:\Windows\{AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe File created C:\Windows\{70467F9D-6BD7-48bf-9FDA-8BF849404F07}.exe {33D023E7-7AB9-4869-89B6-50137F397A01}.exe File created C:\Windows\{3D8AB01E-7A1E-476a-B311-5919515963CB}.exe {F3735450-90B2-4082-8772-939817D53DDA}.exe File created C:\Windows\{8E5C33E8-4C3E-4029-8BC9-C57E4DA067CE}.exe {3D8AB01E-7A1E-476a-B311-5919515963CB}.exe File created C:\Windows\{A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe File created C:\Windows\{63B86E80-13ED-4bad-BB57-A1471047003A}.exe {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe File created C:\Windows\{5297E41F-A2E5-4089-8A99-A65221AED41A}.exe 9ce41853628c25exeexeexeex.exe File created C:\Windows\{CFC1F921-55AD-445a-A084-C550BE23EAAE}.exe {70467F9D-6BD7-48bf-9FDA-8BF849404F07}.exe File created C:\Windows\{F3735450-90B2-4082-8772-939817D53DDA}.exe {CFC1F921-55AD-445a-A084-C550BE23EAAE}.exe File created C:\Windows\{E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe File created C:\Windows\{CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe {91986339-E909-4332-838D-CEB428CC1691}.exe File created C:\Windows\{33D023E7-7AB9-4869-89B6-50137F397A01}.exe {63B86E80-13ED-4bad-BB57-A1471047003A}.exe File created C:\Windows\{E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 784 9ce41853628c25exeexeexeex.exe Token: SeIncBasePriorityPrivilege 3056 {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe Token: SeIncBasePriorityPrivilege 2364 {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe Token: SeIncBasePriorityPrivilege 656 {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe Token: SeIncBasePriorityPrivilege 2208 {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe Token: SeIncBasePriorityPrivilege 2972 {91986339-E909-4332-838D-CEB428CC1691}.exe Token: SeIncBasePriorityPrivilege 2228 {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe Token: SeIncBasePriorityPrivilege 1492 {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe Token: SeIncBasePriorityPrivilege 2136 {63B86E80-13ED-4bad-BB57-A1471047003A}.exe Token: SeIncBasePriorityPrivilege 2576 {33D023E7-7AB9-4869-89B6-50137F397A01}.exe Token: SeIncBasePriorityPrivilege 2692 {70467F9D-6BD7-48bf-9FDA-8BF849404F07}.exe Token: SeIncBasePriorityPrivilege 1932 {CFC1F921-55AD-445a-A084-C550BE23EAAE}.exe Token: SeIncBasePriorityPrivilege 2744 {F3735450-90B2-4082-8772-939817D53DDA}.exe Token: SeIncBasePriorityPrivilege 2060 {3D8AB01E-7A1E-476a-B311-5919515963CB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 784 wrote to memory of 3056 784 9ce41853628c25exeexeexeex.exe 29 PID 784 wrote to memory of 3056 784 9ce41853628c25exeexeexeex.exe 29 PID 784 wrote to memory of 3056 784 9ce41853628c25exeexeexeex.exe 29 PID 784 wrote to memory of 3056 784 9ce41853628c25exeexeexeex.exe 29 PID 784 wrote to memory of 2400 784 9ce41853628c25exeexeexeex.exe 30 PID 784 wrote to memory of 2400 784 9ce41853628c25exeexeexeex.exe 30 PID 784 wrote to memory of 2400 784 9ce41853628c25exeexeexeex.exe 30 PID 784 wrote to memory of 2400 784 9ce41853628c25exeexeexeex.exe 30 PID 3056 wrote to memory of 2364 3056 {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe 31 PID 3056 wrote to memory of 2364 3056 {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe 31 PID 3056 wrote to memory of 2364 3056 {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe 31 PID 3056 wrote to memory of 2364 3056 {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe 31 PID 3056 wrote to memory of 2052 3056 {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe 32 PID 3056 wrote to memory of 2052 3056 {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe 32 PID 3056 wrote to memory of 2052 3056 {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe 32 PID 3056 wrote to memory of 2052 3056 {5297E41F-A2E5-4089-8A99-A65221AED41A}.exe 32 PID 2364 wrote to memory of 656 2364 {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe 33 PID 2364 wrote to memory of 656 2364 {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe 33 PID 2364 wrote to memory of 656 2364 {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe 33 PID 2364 wrote to memory of 656 2364 {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe 33 PID 2364 wrote to memory of 1220 2364 {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe 34 PID 2364 wrote to memory of 1220 2364 {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe 34 PID 2364 wrote to memory of 1220 2364 {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe 34 PID 2364 wrote to memory of 1220 2364 {E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe 34 PID 656 wrote to memory of 2208 656 {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe 35 PID 656 wrote to memory of 2208 656 {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe 35 PID 656 wrote to memory of 2208 656 {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe 35 PID 656 wrote to memory of 2208 656 {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe 35 PID 656 wrote to memory of 2904 656 {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe 36 PID 656 wrote to memory of 2904 656 {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe 36 PID 656 wrote to memory of 2904 656 {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe 36 PID 656 wrote to memory of 2904 656 {A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe 36 PID 2208 wrote to memory of 2972 2208 {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe 37 PID 2208 wrote to memory of 2972 2208 {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe 37 PID 2208 wrote to memory of 2972 2208 {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe 37 PID 2208 wrote to memory of 2972 2208 {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe 37 PID 2208 wrote to memory of 2444 2208 {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe 38 PID 2208 wrote to memory of 2444 2208 {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe 38 PID 2208 wrote to memory of 2444 2208 {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe 38 PID 2208 wrote to memory of 2444 2208 {E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe 38 PID 2972 wrote to memory of 2228 2972 {91986339-E909-4332-838D-CEB428CC1691}.exe 39 PID 2972 wrote to memory of 2228 2972 {91986339-E909-4332-838D-CEB428CC1691}.exe 39 PID 2972 wrote to memory of 2228 2972 {91986339-E909-4332-838D-CEB428CC1691}.exe 39 PID 2972 wrote to memory of 2228 2972 {91986339-E909-4332-838D-CEB428CC1691}.exe 39 PID 2972 wrote to memory of 2356 2972 {91986339-E909-4332-838D-CEB428CC1691}.exe 40 PID 2972 wrote to memory of 2356 2972 {91986339-E909-4332-838D-CEB428CC1691}.exe 40 PID 2972 wrote to memory of 2356 2972 {91986339-E909-4332-838D-CEB428CC1691}.exe 40 PID 2972 wrote to memory of 2356 2972 {91986339-E909-4332-838D-CEB428CC1691}.exe 40 PID 2228 wrote to memory of 1492 2228 {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe 41 PID 2228 wrote to memory of 1492 2228 {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe 41 PID 2228 wrote to memory of 1492 2228 {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe 41 PID 2228 wrote to memory of 1492 2228 {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe 41 PID 2228 wrote to memory of 692 2228 {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe 42 PID 2228 wrote to memory of 692 2228 {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe 42 PID 2228 wrote to memory of 692 2228 {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe 42 PID 2228 wrote to memory of 692 2228 {CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe 42 PID 1492 wrote to memory of 2136 1492 {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe 43 PID 1492 wrote to memory of 2136 1492 {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe 43 PID 1492 wrote to memory of 2136 1492 {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe 43 PID 1492 wrote to memory of 2136 1492 {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe 43 PID 1492 wrote to memory of 3048 1492 {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe 44 PID 1492 wrote to memory of 3048 1492 {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe 44 PID 1492 wrote to memory of 3048 1492 {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe 44 PID 1492 wrote to memory of 3048 1492 {AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ce41853628c25exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\9ce41853628c25exeexeexeex.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\{5297E41F-A2E5-4089-8A99-A65221AED41A}.exeC:\Windows\{5297E41F-A2E5-4089-8A99-A65221AED41A}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\{E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exeC:\Windows\{E4E12C61-4911-4b33-A4E8-2D6845C8BF60}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\{A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exeC:\Windows\{A237AB73-597C-4502-83D7-2A7BE8B1C45E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\{E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exeC:\Windows\{E00AF714-1B39-49ff-AC48-C5C35BC747D6}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\{91986339-E909-4332-838D-CEB428CC1691}.exeC:\Windows\{91986339-E909-4332-838D-CEB428CC1691}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{CB64CEEB-FA55-4b43-982A-51BF3F485890}.exeC:\Windows\{CB64CEEB-FA55-4b43-982A-51BF3F485890}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\{AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exeC:\Windows\{AD32D490-61F5-4d43-B9B2-CBE9E43E9374}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\{63B86E80-13ED-4bad-BB57-A1471047003A}.exeC:\Windows\{63B86E80-13ED-4bad-BB57-A1471047003A}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\{33D023E7-7AB9-4869-89B6-50137F397A01}.exeC:\Windows\{33D023E7-7AB9-4869-89B6-50137F397A01}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\{70467F9D-6BD7-48bf-9FDA-8BF849404F07}.exeC:\Windows\{70467F9D-6BD7-48bf-9FDA-8BF849404F07}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\{CFC1F921-55AD-445a-A084-C550BE23EAAE}.exeC:\Windows\{CFC1F921-55AD-445a-A084-C550BE23EAAE}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\{F3735450-90B2-4082-8772-939817D53DDA}.exeC:\Windows\{F3735450-90B2-4082-8772-939817D53DDA}.exe13⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\{3D8AB01E-7A1E-476a-B311-5919515963CB}.exeC:\Windows\{3D8AB01E-7A1E-476a-B311-5919515963CB}.exe14⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3D8AB~1.EXE > nul15⤵PID:2544
-
-
C:\Windows\{8E5C33E8-4C3E-4029-8BC9-C57E4DA067CE}.exeC:\Windows\{8E5C33E8-4C3E-4029-8BC9-C57E4DA067CE}.exe15⤵
- Executes dropped EXE
PID:2480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F3735~1.EXE > nul14⤵PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CFC1F~1.EXE > nul13⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70467~1.EXE > nul12⤵PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{33D02~1.EXE > nul11⤵PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{63B86~1.EXE > nul10⤵PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AD32D~1.EXE > nul9⤵PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB64C~1.EXE > nul8⤵PID:692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{91986~1.EXE > nul7⤵PID:2356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E00AF~1.EXE > nul6⤵PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A237A~1.EXE > nul5⤵PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E4E12~1.EXE > nul4⤵PID:1220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5297E~1.EXE > nul3⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\9CE418~1.EXE > nul2⤵
- Deletes itself
PID:2400
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD541130c6530a109c9e51c53e3bf08d9d9
SHA1f6ff274a0b0d83ab62dbb0f65d1719bc6a5204db
SHA25696c6210bd620ee507fdf355c520cb7028a104adfcf324cdd8c0ff20cdab98a0e
SHA512141c90906caeebde7cb6d4665c85eef4144870d4d7b1bfbaa3ce17e6daff648e4494042c4a84aea33873d1d113f7232b5a122d4f4e820d52fc740e076f0eef2c
-
Filesize
168KB
MD541130c6530a109c9e51c53e3bf08d9d9
SHA1f6ff274a0b0d83ab62dbb0f65d1719bc6a5204db
SHA25696c6210bd620ee507fdf355c520cb7028a104adfcf324cdd8c0ff20cdab98a0e
SHA512141c90906caeebde7cb6d4665c85eef4144870d4d7b1bfbaa3ce17e6daff648e4494042c4a84aea33873d1d113f7232b5a122d4f4e820d52fc740e076f0eef2c
-
Filesize
168KB
MD5668b555449267b36af7fc76d80eb9a3b
SHA159d0bf6eefaf183dab2527a782532a87184c4bd4
SHA2560a69e247d851aa321526820358c5e995ff255e0f5711cd11b609c3dc9b0d7828
SHA512dfdec37f9553d72b1f6636f07bb86505ca70abac73fef9e0e0a71b67b8392d1eb21e5c39260e4d8a26ef08477550ea1ca9a2dc0e33b5c74b1e5988a7abf93d4a
-
Filesize
168KB
MD5668b555449267b36af7fc76d80eb9a3b
SHA159d0bf6eefaf183dab2527a782532a87184c4bd4
SHA2560a69e247d851aa321526820358c5e995ff255e0f5711cd11b609c3dc9b0d7828
SHA512dfdec37f9553d72b1f6636f07bb86505ca70abac73fef9e0e0a71b67b8392d1eb21e5c39260e4d8a26ef08477550ea1ca9a2dc0e33b5c74b1e5988a7abf93d4a
-
Filesize
168KB
MD56c14339ff4adfba69fca953bf24e4fc0
SHA17056a44c6765f6e83c179a90469ad84ebf4bdddd
SHA256e7dd241459666ac7b523aaff3d9e443f0dca68376bc51f4d3642c1454d5031ff
SHA5121140358f4dca1970c6a0f06b63e0b3eb77bb86b28155571757d9a91c40796e053606fdb7680724d213fad02b96cd23d101832f8264297003da1981dbb0085608
-
Filesize
168KB
MD56c14339ff4adfba69fca953bf24e4fc0
SHA17056a44c6765f6e83c179a90469ad84ebf4bdddd
SHA256e7dd241459666ac7b523aaff3d9e443f0dca68376bc51f4d3642c1454d5031ff
SHA5121140358f4dca1970c6a0f06b63e0b3eb77bb86b28155571757d9a91c40796e053606fdb7680724d213fad02b96cd23d101832f8264297003da1981dbb0085608
-
Filesize
168KB
MD56c14339ff4adfba69fca953bf24e4fc0
SHA17056a44c6765f6e83c179a90469ad84ebf4bdddd
SHA256e7dd241459666ac7b523aaff3d9e443f0dca68376bc51f4d3642c1454d5031ff
SHA5121140358f4dca1970c6a0f06b63e0b3eb77bb86b28155571757d9a91c40796e053606fdb7680724d213fad02b96cd23d101832f8264297003da1981dbb0085608
-
Filesize
168KB
MD53feb2e64f107a2f7541c9cd18ad9dc58
SHA1154bbc4c988a83493b3c85aa126a5df947fba66c
SHA25699ec77747b6447b053544c760a994b969614b5e5e2361164837f6d18eaea967b
SHA5123e07468178b6f8a5890d3278176c98d1ff6bf38b07529bd98ad0592b5e8fe790f6ae5b14e9e96736fcdc89384ecbd16ad0716f215c7793c35657a528808d2342
-
Filesize
168KB
MD53feb2e64f107a2f7541c9cd18ad9dc58
SHA1154bbc4c988a83493b3c85aa126a5df947fba66c
SHA25699ec77747b6447b053544c760a994b969614b5e5e2361164837f6d18eaea967b
SHA5123e07468178b6f8a5890d3278176c98d1ff6bf38b07529bd98ad0592b5e8fe790f6ae5b14e9e96736fcdc89384ecbd16ad0716f215c7793c35657a528808d2342
-
Filesize
168KB
MD5b19526f55b28c92353c8b01173acafda
SHA18f280bf7361564bfe38f5e9e5496e5e9f1ab16ec
SHA256a05e8631fab0a26c5994ba0f08cd2807ba7774357b4436852a46fea15e50e095
SHA512b7eae47fa53a86e2636835be5398edd2b37891d813bc709a96b3d7e21896f4dee350f1ed036c9b037844d8f86571fb0d21d0149c31a0069108869d081ccd99b9
-
Filesize
168KB
MD5b19526f55b28c92353c8b01173acafda
SHA18f280bf7361564bfe38f5e9e5496e5e9f1ab16ec
SHA256a05e8631fab0a26c5994ba0f08cd2807ba7774357b4436852a46fea15e50e095
SHA512b7eae47fa53a86e2636835be5398edd2b37891d813bc709a96b3d7e21896f4dee350f1ed036c9b037844d8f86571fb0d21d0149c31a0069108869d081ccd99b9
-
Filesize
168KB
MD511196c7277cf59114e57fd8301cbfb66
SHA158420b757301eb8436c13bc6013b4e830559c238
SHA256386a5f73382b4c10de00f057411cc9a530be4cc3c34a644ad1d6da85b9510a3b
SHA51232ea6804222203017cff06c1bc09c6c3e1c0318b4e9bd30943cd300e7d155ebc342436d2398c67b22310c8d8f6c7cc867b0cde6491ec8eab903d8d3d3c8444a1
-
Filesize
168KB
MD59d72d57270659807cb45963e76dea0d7
SHA1346b22594c8364cd8380103ffdb44bd31cd2b63c
SHA256925f2ec3ed24dd7fd22f7c7de0e38e4a3e54e5c817f78b3efc48d55e00e86a38
SHA512f9fd96323de0fdac2423778497cff23daaa9796a914f2f9ec83fed1d414025c92bea64357616c133e91d45feb31b1c4df367086ab64311c5c67f3323446cb58a
-
Filesize
168KB
MD59d72d57270659807cb45963e76dea0d7
SHA1346b22594c8364cd8380103ffdb44bd31cd2b63c
SHA256925f2ec3ed24dd7fd22f7c7de0e38e4a3e54e5c817f78b3efc48d55e00e86a38
SHA512f9fd96323de0fdac2423778497cff23daaa9796a914f2f9ec83fed1d414025c92bea64357616c133e91d45feb31b1c4df367086ab64311c5c67f3323446cb58a
-
Filesize
168KB
MD5879f818fe363678c83650836d541aa8d
SHA130d3a94d3c7d0c1856dbcd140b83fb17b047cef0
SHA25617eda2b0b0ee896ba2ea8ed186397a719a10d777695ab91e207cce47bc695192
SHA5129253394294e51529098bb9dfa2ca86584417f353c21a769d1c6a62c8742ff8fb0c96b5373ba1000454171fb40f9dcec617981ee9675c2e5d5044ac450e0ab57d
-
Filesize
168KB
MD5879f818fe363678c83650836d541aa8d
SHA130d3a94d3c7d0c1856dbcd140b83fb17b047cef0
SHA25617eda2b0b0ee896ba2ea8ed186397a719a10d777695ab91e207cce47bc695192
SHA5129253394294e51529098bb9dfa2ca86584417f353c21a769d1c6a62c8742ff8fb0c96b5373ba1000454171fb40f9dcec617981ee9675c2e5d5044ac450e0ab57d
-
Filesize
168KB
MD5da7f86dd34d160aaffe73f9ab65a31d9
SHA1a824448be31d499f5a0361726f245b300310fbc0
SHA256193b0c12a9519c8179f1e930952aeb9d9599236feec64dca71806f82090c8432
SHA512fabdc544750799e2ed3a5ff92f68877d111aff156e75bbd29270c1be8690f2e49694e809769dafc79c5bb166d0feb25da0effd507755e5f26e5627aed0dc29c4
-
Filesize
168KB
MD5da7f86dd34d160aaffe73f9ab65a31d9
SHA1a824448be31d499f5a0361726f245b300310fbc0
SHA256193b0c12a9519c8179f1e930952aeb9d9599236feec64dca71806f82090c8432
SHA512fabdc544750799e2ed3a5ff92f68877d111aff156e75bbd29270c1be8690f2e49694e809769dafc79c5bb166d0feb25da0effd507755e5f26e5627aed0dc29c4
-
Filesize
168KB
MD537158326a2746acad3996e1b64fbbe59
SHA118eb9b72f2c5eeeb167d07942b4f8028f39461b9
SHA256d21963a51d2d88e17fdfd603c3be836a9fbaa9400a176a18dca4d0ed8ca4fc17
SHA512acdabc2e5a87ff2976d136576ae54dad84b806b6628fb7904a3090f57c939b9654a59e8ac2d49aa9509137ba7feec215e6d6120cce8cea1f1672754e57c551d3
-
Filesize
168KB
MD537158326a2746acad3996e1b64fbbe59
SHA118eb9b72f2c5eeeb167d07942b4f8028f39461b9
SHA256d21963a51d2d88e17fdfd603c3be836a9fbaa9400a176a18dca4d0ed8ca4fc17
SHA512acdabc2e5a87ff2976d136576ae54dad84b806b6628fb7904a3090f57c939b9654a59e8ac2d49aa9509137ba7feec215e6d6120cce8cea1f1672754e57c551d3
-
Filesize
168KB
MD57375a2965bf42c0fdcc55d36ccdc9764
SHA1efe7fad2185eaa2bacf3b4eb6ea5bde03ba72a68
SHA256d276ef02ebad6ce72ef784b59c27ad02c36ee07b02596af138928c1ecaa489f3
SHA512017e6766a1fd3c8932cea1c37326c4f50264733dfbe3018619ec3add6a527fe34d8d8d657a1cde2ebaa6f652ae3f701a16f54b937d6a80acc5f0d90314530332
-
Filesize
168KB
MD57375a2965bf42c0fdcc55d36ccdc9764
SHA1efe7fad2185eaa2bacf3b4eb6ea5bde03ba72a68
SHA256d276ef02ebad6ce72ef784b59c27ad02c36ee07b02596af138928c1ecaa489f3
SHA512017e6766a1fd3c8932cea1c37326c4f50264733dfbe3018619ec3add6a527fe34d8d8d657a1cde2ebaa6f652ae3f701a16f54b937d6a80acc5f0d90314530332
-
Filesize
168KB
MD5e01b898ff040ce20d6bab693e3d11e6b
SHA10027eaf0c48790aa0f0bd368f240893967fe086f
SHA25638e0f105ecc35bcae5371e21409a32f36050c97d1049135a009a71d5395bfdd6
SHA512994284d1ca469f5d0786901680f9eb36ee236fc7a48777bbfc1f553718505f767f8c07de377f6cb9aaed5bdad06fe22b1137f39858dbee54c1c6e5a6585fb04d
-
Filesize
168KB
MD5e01b898ff040ce20d6bab693e3d11e6b
SHA10027eaf0c48790aa0f0bd368f240893967fe086f
SHA25638e0f105ecc35bcae5371e21409a32f36050c97d1049135a009a71d5395bfdd6
SHA512994284d1ca469f5d0786901680f9eb36ee236fc7a48777bbfc1f553718505f767f8c07de377f6cb9aaed5bdad06fe22b1137f39858dbee54c1c6e5a6585fb04d
-
Filesize
168KB
MD596552944ed3ae9de25d7f21fe3d85062
SHA1ae9555fe614a8c94e84c476bd664e7f6dccbffb1
SHA256d2e2c014fbfcf976e0d5dd914d900f9fd04d6e9a8a82a6313ed8c7624efd80a4
SHA5124e56c5d3a6ace5311d05a804ef4a851e65b4e4d901c83bde5571427945cacd8983362e73171a97e4f0156050994bdaaa7795fdcd3330e70d6da1b8eb4df76693
-
Filesize
168KB
MD596552944ed3ae9de25d7f21fe3d85062
SHA1ae9555fe614a8c94e84c476bd664e7f6dccbffb1
SHA256d2e2c014fbfcf976e0d5dd914d900f9fd04d6e9a8a82a6313ed8c7624efd80a4
SHA5124e56c5d3a6ace5311d05a804ef4a851e65b4e4d901c83bde5571427945cacd8983362e73171a97e4f0156050994bdaaa7795fdcd3330e70d6da1b8eb4df76693
-
Filesize
168KB
MD54d9a6a73939ab234b7b1fa35c31bcbc9
SHA112406efff2613295c5c57a76776a429dd09e0cea
SHA256a01190962a032182b874d23a0c310774f4850c3973f55562ace53adc989310ae
SHA5127666fce69efac2709fd2fc7449bffb9e529ebe8b780a416f5eeb4c7f18301e2272d90392bf0f1955e60c47fef967a539ab698ef2cd8fe97f530eb6fe974ad8c6
-
Filesize
168KB
MD54d9a6a73939ab234b7b1fa35c31bcbc9
SHA112406efff2613295c5c57a76776a429dd09e0cea
SHA256a01190962a032182b874d23a0c310774f4850c3973f55562ace53adc989310ae
SHA5127666fce69efac2709fd2fc7449bffb9e529ebe8b780a416f5eeb4c7f18301e2272d90392bf0f1955e60c47fef967a539ab698ef2cd8fe97f530eb6fe974ad8c6