Analysis
-
max time kernel
146s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
bbe4fcc0539edaexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
bbe4fcc0539edaexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
bbe4fcc0539edaexeexeexeex.exe
-
Size
168KB
-
MD5
bbe4fcc0539eda87b832655f2259c37a
-
SHA1
755d3ab3a62acf69315fc9e02f0c153902024e09
-
SHA256
f650dd36522051c4b9aee9a81485c0b1d685d09fe643a25522dced4e095b4260
-
SHA512
32c18de63e7c01cc2e22df79839b9a25d4b0d06af77100e4e7b2c8caf9197ec94326ed3c5ef1b33604f9cc732dd36df9482c059bd1aae9f4d80bfa019238c3fe
-
SSDEEP
1536:1EGh0o3lq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o3lqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3CAA4F9A-6E38-4510-BE71-DD016AC011BF}\stubpath = "C:\\Windows\\{3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe" {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A69BC221-6B76-4be3-A993-E85FD2E9C792}\stubpath = "C:\\Windows\\{A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe" {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F} {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{235F22F2-2DC5-48f1-97B1-47A93282F24E} {8C659D9E-C110-4f58-B4BE-A89F01690F4F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4100312-8D4B-43e3-8320-399AB6EBB873} {235F22F2-2DC5-48f1-97B1-47A93282F24E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFFCA095-8B0B-4a52-BFC8-91AC928DD165}\stubpath = "C:\\Windows\\{CFFCA095-8B0B-4a52-BFC8-91AC928DD165}.exe" {D4100312-8D4B-43e3-8320-399AB6EBB873}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3} bbe4fcc0539edaexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}\stubpath = "C:\\Windows\\{7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe" bbe4fcc0539edaexeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E9421476-A847-4905-8980-FC6117E6B64D}\stubpath = "C:\\Windows\\{E9421476-A847-4905-8980-FC6117E6B64D}.exe" {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25} {E9421476-A847-4905-8980-FC6117E6B64D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}\stubpath = "C:\\Windows\\{3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe" {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C659D9E-C110-4f58-B4BE-A89F01690F4F}\stubpath = "C:\\Windows\\{8C659D9E-C110-4f58-B4BE-A89F01690F4F}.exe" {CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}\stubpath = "C:\\Windows\\{3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe" {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E9421476-A847-4905-8980-FC6117E6B64D} {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}\stubpath = "C:\\Windows\\{C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe" {E9421476-A847-4905-8980-FC6117E6B64D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA} {4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA}\stubpath = "C:\\Windows\\{CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA}.exe" {4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C659D9E-C110-4f58-B4BE-A89F01690F4F} {CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4100312-8D4B-43e3-8320-399AB6EBB873}\stubpath = "C:\\Windows\\{D4100312-8D4B-43e3-8320-399AB6EBB873}.exe" {235F22F2-2DC5-48f1-97B1-47A93282F24E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFFCA095-8B0B-4a52-BFC8-91AC928DD165} {D4100312-8D4B-43e3-8320-399AB6EBB873}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7} {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3CAA4F9A-6E38-4510-BE71-DD016AC011BF} {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A69BC221-6B76-4be3-A993-E85FD2E9C792} {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD} {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD}\stubpath = "C:\\Windows\\{4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD}.exe" {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{235F22F2-2DC5-48f1-97B1-47A93282F24E}\stubpath = "C:\\Windows\\{235F22F2-2DC5-48f1-97B1-47A93282F24E}.exe" {8C659D9E-C110-4f58-B4BE-A89F01690F4F}.exe -
Deletes itself 1 IoCs
pid Process 1152 cmd.exe -
Executes dropped EXE 13 IoCs
pid Process 2396 {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe 1276 {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe 2140 {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe 2232 {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe 1976 {E9421476-A847-4905-8980-FC6117E6B64D}.exe 268 {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe 2556 {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe 2280 {4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD}.exe 2616 {CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA}.exe 2908 {8C659D9E-C110-4f58-B4BE-A89F01690F4F}.exe 840 {235F22F2-2DC5-48f1-97B1-47A93282F24E}.exe 2644 {D4100312-8D4B-43e3-8320-399AB6EBB873}.exe 2636 {CFFCA095-8B0B-4a52-BFC8-91AC928DD165}.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\{235F22F2-2DC5-48f1-97B1-47A93282F24E}.exe {8C659D9E-C110-4f58-B4BE-A89F01690F4F}.exe File created C:\Windows\{7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe bbe4fcc0539edaexeexeexeex.exe File created C:\Windows\{3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe File created C:\Windows\{3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe File created C:\Windows\{4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD}.exe {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe File created C:\Windows\{CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA}.exe {4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD}.exe File created C:\Windows\{8C659D9E-C110-4f58-B4BE-A89F01690F4F}.exe {CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA}.exe File created C:\Windows\{D4100312-8D4B-43e3-8320-399AB6EBB873}.exe {235F22F2-2DC5-48f1-97B1-47A93282F24E}.exe File created C:\Windows\{CFFCA095-8B0B-4a52-BFC8-91AC928DD165}.exe {D4100312-8D4B-43e3-8320-399AB6EBB873}.exe File created C:\Windows\{3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe File created C:\Windows\{A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe File created C:\Windows\{E9421476-A847-4905-8980-FC6117E6B64D}.exe {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe File created C:\Windows\{C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe {E9421476-A847-4905-8980-FC6117E6B64D}.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2196 bbe4fcc0539edaexeexeexeex.exe Token: SeIncBasePriorityPrivilege 2396 {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe Token: SeIncBasePriorityPrivilege 1276 {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe Token: SeIncBasePriorityPrivilege 2140 {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe Token: SeIncBasePriorityPrivilege 2232 {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe Token: SeIncBasePriorityPrivilege 1976 {E9421476-A847-4905-8980-FC6117E6B64D}.exe Token: SeIncBasePriorityPrivilege 268 {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe Token: SeIncBasePriorityPrivilege 2556 {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe Token: SeIncBasePriorityPrivilege 2280 {4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD}.exe Token: SeIncBasePriorityPrivilege 2616 {CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA}.exe Token: SeIncBasePriorityPrivilege 2908 {8C659D9E-C110-4f58-B4BE-A89F01690F4F}.exe Token: SeIncBasePriorityPrivilege 840 {235F22F2-2DC5-48f1-97B1-47A93282F24E}.exe Token: SeIncBasePriorityPrivilege 2644 {D4100312-8D4B-43e3-8320-399AB6EBB873}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2396 2196 bbe4fcc0539edaexeexeexeex.exe 29 PID 2196 wrote to memory of 2396 2196 bbe4fcc0539edaexeexeexeex.exe 29 PID 2196 wrote to memory of 2396 2196 bbe4fcc0539edaexeexeexeex.exe 29 PID 2196 wrote to memory of 2396 2196 bbe4fcc0539edaexeexeexeex.exe 29 PID 2196 wrote to memory of 1152 2196 bbe4fcc0539edaexeexeexeex.exe 30 PID 2196 wrote to memory of 1152 2196 bbe4fcc0539edaexeexeexeex.exe 30 PID 2196 wrote to memory of 1152 2196 bbe4fcc0539edaexeexeexeex.exe 30 PID 2196 wrote to memory of 1152 2196 bbe4fcc0539edaexeexeexeex.exe 30 PID 2396 wrote to memory of 1276 2396 {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe 31 PID 2396 wrote to memory of 1276 2396 {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe 31 PID 2396 wrote to memory of 1276 2396 {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe 31 PID 2396 wrote to memory of 1276 2396 {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe 31 PID 2396 wrote to memory of 2080 2396 {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe 32 PID 2396 wrote to memory of 2080 2396 {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe 32 PID 2396 wrote to memory of 2080 2396 {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe 32 PID 2396 wrote to memory of 2080 2396 {7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe 32 PID 1276 wrote to memory of 2140 1276 {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe 33 PID 1276 wrote to memory of 2140 1276 {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe 33 PID 1276 wrote to memory of 2140 1276 {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe 33 PID 1276 wrote to memory of 2140 1276 {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe 33 PID 1276 wrote to memory of 1716 1276 {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe 34 PID 1276 wrote to memory of 1716 1276 {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe 34 PID 1276 wrote to memory of 1716 1276 {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe 34 PID 1276 wrote to memory of 1716 1276 {3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe 34 PID 2140 wrote to memory of 2232 2140 {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe 35 PID 2140 wrote to memory of 2232 2140 {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe 35 PID 2140 wrote to memory of 2232 2140 {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe 35 PID 2140 wrote to memory of 2232 2140 {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe 35 PID 2140 wrote to memory of 1548 2140 {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe 36 PID 2140 wrote to memory of 1548 2140 {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe 36 PID 2140 wrote to memory of 1548 2140 {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe 36 PID 2140 wrote to memory of 1548 2140 {3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe 36 PID 2232 wrote to memory of 1976 2232 {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe 37 PID 2232 wrote to memory of 1976 2232 {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe 37 PID 2232 wrote to memory of 1976 2232 {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe 37 PID 2232 wrote to memory of 1976 2232 {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe 37 PID 2232 wrote to memory of 1240 2232 {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe 38 PID 2232 wrote to memory of 1240 2232 {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe 38 PID 2232 wrote to memory of 1240 2232 {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe 38 PID 2232 wrote to memory of 1240 2232 {A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe 38 PID 1976 wrote to memory of 268 1976 {E9421476-A847-4905-8980-FC6117E6B64D}.exe 39 PID 1976 wrote to memory of 268 1976 {E9421476-A847-4905-8980-FC6117E6B64D}.exe 39 PID 1976 wrote to memory of 268 1976 {E9421476-A847-4905-8980-FC6117E6B64D}.exe 39 PID 1976 wrote to memory of 268 1976 {E9421476-A847-4905-8980-FC6117E6B64D}.exe 39 PID 1976 wrote to memory of 1776 1976 {E9421476-A847-4905-8980-FC6117E6B64D}.exe 40 PID 1976 wrote to memory of 1776 1976 {E9421476-A847-4905-8980-FC6117E6B64D}.exe 40 PID 1976 wrote to memory of 1776 1976 {E9421476-A847-4905-8980-FC6117E6B64D}.exe 40 PID 1976 wrote to memory of 1776 1976 {E9421476-A847-4905-8980-FC6117E6B64D}.exe 40 PID 268 wrote to memory of 2556 268 {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe 41 PID 268 wrote to memory of 2556 268 {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe 41 PID 268 wrote to memory of 2556 268 {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe 41 PID 268 wrote to memory of 2556 268 {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe 41 PID 268 wrote to memory of 1972 268 {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe 42 PID 268 wrote to memory of 1972 268 {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe 42 PID 268 wrote to memory of 1972 268 {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe 42 PID 268 wrote to memory of 1972 268 {C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe 42 PID 2556 wrote to memory of 2280 2556 {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe 43 PID 2556 wrote to memory of 2280 2556 {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe 43 PID 2556 wrote to memory of 2280 2556 {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe 43 PID 2556 wrote to memory of 2280 2556 {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe 43 PID 2556 wrote to memory of 3012 2556 {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe 44 PID 2556 wrote to memory of 3012 2556 {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe 44 PID 2556 wrote to memory of 3012 2556 {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe 44 PID 2556 wrote to memory of 3012 2556 {3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbe4fcc0539edaexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\bbe4fcc0539edaexeexeexeex.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\{7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exeC:\Windows\{7ADFE7DC-2C05-49a9-8DAF-D7D49E15F8E3}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\{3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exeC:\Windows\{3AC4CEB4-EC0E-4396-87D3-ED32AB4B34C7}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\{3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exeC:\Windows\{3CAA4F9A-6E38-4510-BE71-DD016AC011BF}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\{A69BC221-6B76-4be3-A993-E85FD2E9C792}.exeC:\Windows\{A69BC221-6B76-4be3-A993-E85FD2E9C792}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\{E9421476-A847-4905-8980-FC6117E6B64D}.exeC:\Windows\{E9421476-A847-4905-8980-FC6117E6B64D}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\{C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exeC:\Windows\{C217A11E-0EBA-46f5-BBDF-2CB72C7ECB25}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\{3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exeC:\Windows\{3DB4ECB4-F7BC-4e4c-B6A1-80DB317B3E4F}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\{4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD}.exeC:\Windows\{4AE966BC-9CBC-4bfd-B3E4-26BA7E7BFEFD}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Windows\{CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA}.exeC:\Windows\{CFFBAAA5-7912-44d0-B6C3-D463BDB0F0EA}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\{8C659D9E-C110-4f58-B4BE-A89F01690F4F}.exeC:\Windows\{8C659D9E-C110-4f58-B4BE-A89F01690F4F}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\{235F22F2-2DC5-48f1-97B1-47A93282F24E}.exeC:\Windows\{235F22F2-2DC5-48f1-97B1-47A93282F24E}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\{D4100312-8D4B-43e3-8320-399AB6EBB873}.exeC:\Windows\{D4100312-8D4B-43e3-8320-399AB6EBB873}.exe13⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2644 -
C:\Windows\{CFFCA095-8B0B-4a52-BFC8-91AC928DD165}.exeC:\Windows\{CFFCA095-8B0B-4a52-BFC8-91AC928DD165}.exe14⤵
- Executes dropped EXE
PID:2636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4100~1.EXE > nul14⤵PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{235F2~1.EXE > nul13⤵PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C659~1.EXE > nul12⤵PID:3052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CFFBA~1.EXE > nul11⤵PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4AE96~1.EXE > nul10⤵PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3DB4E~1.EXE > nul9⤵PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C217A~1.EXE > nul8⤵PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E9421~1.EXE > nul7⤵PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A69BC~1.EXE > nul6⤵PID:1240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3CAA4~1.EXE > nul5⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3AC4C~1.EXE > nul4⤵PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7ADFE~1.EXE > nul3⤵PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\BBE4FC~1.EXE > nul2⤵
- Deletes itself
PID:1152
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5d0227cb2fd79ac9e9db05e4681eaca1d
SHA121126e4cef3a22cef6af9cefff85c94228513b97
SHA256f6f1a4a93ec1f512a116917dfee17f14883df8eb0243d217768c21eb96bd1c54
SHA51294918f696935d16918a91c856cb47bd455b9ab1a9ae889cc1bd45389062719157351355d307f0a98a7bfe0247d453eaa1aa2e5c66db22862969342463f29afe7
-
Filesize
168KB
MD5d0227cb2fd79ac9e9db05e4681eaca1d
SHA121126e4cef3a22cef6af9cefff85c94228513b97
SHA256f6f1a4a93ec1f512a116917dfee17f14883df8eb0243d217768c21eb96bd1c54
SHA51294918f696935d16918a91c856cb47bd455b9ab1a9ae889cc1bd45389062719157351355d307f0a98a7bfe0247d453eaa1aa2e5c66db22862969342463f29afe7
-
Filesize
168KB
MD5c119f4cb6824387405c14d81364fb420
SHA188ee7a206cf836f68f0048338ae31e947d8987e5
SHA2564ebf27675d3514d15c4c6dd397a6e3bb9485dabca3a170c817bc2466ac9006d4
SHA5120b8d3e1038faca23a316ac9ce5de5963fb25c4af1f5189ed7b492683097fb230cf6833a6db0102d7697e83ac612929049b6414380f9cadb1f0eac2a2db834b34
-
Filesize
168KB
MD5c119f4cb6824387405c14d81364fb420
SHA188ee7a206cf836f68f0048338ae31e947d8987e5
SHA2564ebf27675d3514d15c4c6dd397a6e3bb9485dabca3a170c817bc2466ac9006d4
SHA5120b8d3e1038faca23a316ac9ce5de5963fb25c4af1f5189ed7b492683097fb230cf6833a6db0102d7697e83ac612929049b6414380f9cadb1f0eac2a2db834b34
-
Filesize
168KB
MD533ee42346daf98e6f0d77ab65b0ec82d
SHA1482d46b8cf368fa57682ede20202f0bd390b8939
SHA2561c57ebb899f64fbfa1543516a670752d69154e8a64ce01812c159e77c4b372de
SHA51228e2a2ccbe4c26cf3ab1289e97445030c7beb31a88f82bd1b648097a5bbd135fd0370152b7f05bcf2d0246023e21435f8431166aa5584fb5832483b1ed04ea72
-
Filesize
168KB
MD533ee42346daf98e6f0d77ab65b0ec82d
SHA1482d46b8cf368fa57682ede20202f0bd390b8939
SHA2561c57ebb899f64fbfa1543516a670752d69154e8a64ce01812c159e77c4b372de
SHA51228e2a2ccbe4c26cf3ab1289e97445030c7beb31a88f82bd1b648097a5bbd135fd0370152b7f05bcf2d0246023e21435f8431166aa5584fb5832483b1ed04ea72
-
Filesize
168KB
MD5d857ed89f745c7725c7d33045a0dea21
SHA161db3eae403a6e8043b14078c33192116c9732a2
SHA256f8913e448068f5ac6eb36f25c553885032bba549ee210e1ba640e86a3db6cf5b
SHA512bcb65e8ed596bcd461f57e120f861a8a0ce5dd29552439610921a89ebff6ae6a9d9b8f4640733968afb4b6a417bb150aff07a885b4fc644a6f82ea3108b2a727
-
Filesize
168KB
MD5d857ed89f745c7725c7d33045a0dea21
SHA161db3eae403a6e8043b14078c33192116c9732a2
SHA256f8913e448068f5ac6eb36f25c553885032bba549ee210e1ba640e86a3db6cf5b
SHA512bcb65e8ed596bcd461f57e120f861a8a0ce5dd29552439610921a89ebff6ae6a9d9b8f4640733968afb4b6a417bb150aff07a885b4fc644a6f82ea3108b2a727
-
Filesize
168KB
MD503925209fee9f721812bb2d6d2f5a20e
SHA170da7916808ea2ad914b199f8bb89d096f11bfd5
SHA256b5c4ac2818d580de27bced85cb3aaced4c1eb8b6600e70b4e1ccc5b4acd8096b
SHA5120b9ea00c060bfee1dfb34e4d5bda67e18f4403b2391718d4409fa1a4603379d0d2fef49006a2b02a359d725c3c8c2c67ec6769f6b28c8cf3ea03dadd1d7f06d2
-
Filesize
168KB
MD503925209fee9f721812bb2d6d2f5a20e
SHA170da7916808ea2ad914b199f8bb89d096f11bfd5
SHA256b5c4ac2818d580de27bced85cb3aaced4c1eb8b6600e70b4e1ccc5b4acd8096b
SHA5120b9ea00c060bfee1dfb34e4d5bda67e18f4403b2391718d4409fa1a4603379d0d2fef49006a2b02a359d725c3c8c2c67ec6769f6b28c8cf3ea03dadd1d7f06d2
-
Filesize
168KB
MD516e01946a4e1469ae21390ed4e7f21c9
SHA1087e6039abb1b94531b69571fa22eeacc6db1fbe
SHA2569611608fc0f12caaee3aee5855133d2b153354f1ea7a50efe00b9e14f2128c66
SHA512baf3fa4cc41216778b7b5b32c3c0ff58e969510483f1f09abcb3af8dcef80c8d0c78a2b813d3050df27b1044a8f4f8187e6352e03b93bb2ba2099db00ee2556d
-
Filesize
168KB
MD516e01946a4e1469ae21390ed4e7f21c9
SHA1087e6039abb1b94531b69571fa22eeacc6db1fbe
SHA2569611608fc0f12caaee3aee5855133d2b153354f1ea7a50efe00b9e14f2128c66
SHA512baf3fa4cc41216778b7b5b32c3c0ff58e969510483f1f09abcb3af8dcef80c8d0c78a2b813d3050df27b1044a8f4f8187e6352e03b93bb2ba2099db00ee2556d
-
Filesize
168KB
MD516e01946a4e1469ae21390ed4e7f21c9
SHA1087e6039abb1b94531b69571fa22eeacc6db1fbe
SHA2569611608fc0f12caaee3aee5855133d2b153354f1ea7a50efe00b9e14f2128c66
SHA512baf3fa4cc41216778b7b5b32c3c0ff58e969510483f1f09abcb3af8dcef80c8d0c78a2b813d3050df27b1044a8f4f8187e6352e03b93bb2ba2099db00ee2556d
-
Filesize
168KB
MD5297a1a37a1dea285536cd02ca3594466
SHA10bff8ddaaa8943f3ed59f266c07f9fb611333952
SHA25692aeec75f4ed9415e07936ca281d8ce5d21e1dc5c8434dacd00149bb7f15d222
SHA512d1ec3d28d9b5ea8b8ce9054b68279a0d21f3a8fbb07222538cf0e9bdabc5f14e61cda242d831f2847c43d08454a9ae489a0f0830b25caa2e96f13d5dbc1a2549
-
Filesize
168KB
MD5297a1a37a1dea285536cd02ca3594466
SHA10bff8ddaaa8943f3ed59f266c07f9fb611333952
SHA25692aeec75f4ed9415e07936ca281d8ce5d21e1dc5c8434dacd00149bb7f15d222
SHA512d1ec3d28d9b5ea8b8ce9054b68279a0d21f3a8fbb07222538cf0e9bdabc5f14e61cda242d831f2847c43d08454a9ae489a0f0830b25caa2e96f13d5dbc1a2549
-
Filesize
168KB
MD5e63855438a16a94d97930e992cad0dbd
SHA1a02772aed1a8235166cd9a303292aa85a3ab8468
SHA256d72384bd3a5ffa01eabf78d8468ec83c315a7268d8ef1e74989ce7f9c9d8e195
SHA5128b12d631e080c328ea41c3b4502ce55f773765e8a1ab92ccab9cbe358857bb07b1b4245b0a602cdd9ff2f1e7e7dda74d7fc8e89031703ca0c726415850436251
-
Filesize
168KB
MD5e63855438a16a94d97930e992cad0dbd
SHA1a02772aed1a8235166cd9a303292aa85a3ab8468
SHA256d72384bd3a5ffa01eabf78d8468ec83c315a7268d8ef1e74989ce7f9c9d8e195
SHA5128b12d631e080c328ea41c3b4502ce55f773765e8a1ab92ccab9cbe358857bb07b1b4245b0a602cdd9ff2f1e7e7dda74d7fc8e89031703ca0c726415850436251
-
Filesize
168KB
MD5a07593bd5dcda0f7802cfd033b96d2ac
SHA1ed6b17c5b710e6f7cd0cdc288a70ec5df61a0eb9
SHA256a23cfed5c0cf7078f53b1a3662135ffb7cf1f8f2ce7d9c1e1942ee9c514563cc
SHA512048e09d9f5cadf7c5a34e8b60aac9f28335bbef675ff356320f62297e3477d17862b40792ec88747d7d2d31601a22b47825d49d1bdcd8d11fafaa787de0dcd9c
-
Filesize
168KB
MD5a07593bd5dcda0f7802cfd033b96d2ac
SHA1ed6b17c5b710e6f7cd0cdc288a70ec5df61a0eb9
SHA256a23cfed5c0cf7078f53b1a3662135ffb7cf1f8f2ce7d9c1e1942ee9c514563cc
SHA512048e09d9f5cadf7c5a34e8b60aac9f28335bbef675ff356320f62297e3477d17862b40792ec88747d7d2d31601a22b47825d49d1bdcd8d11fafaa787de0dcd9c
-
Filesize
168KB
MD5f2e93fcf59994bfe414fda1f2c71a941
SHA1816f6f2036346ec4bc52ab225b68c0e8e512bb80
SHA256fea61ba0b5291bb8c2a7b9a1c97d36d68cc72106cf871eb5d631e740c22295cd
SHA5127a053c7f498fd8f656765051771b87bd3645ec315836509aa15d8d467b0b23d86a5a5163b539b713d751d5ff1ff8ee13b0e1811a02a077a582f1952f1d70a7a3
-
Filesize
168KB
MD5f2e93fcf59994bfe414fda1f2c71a941
SHA1816f6f2036346ec4bc52ab225b68c0e8e512bb80
SHA256fea61ba0b5291bb8c2a7b9a1c97d36d68cc72106cf871eb5d631e740c22295cd
SHA5127a053c7f498fd8f656765051771b87bd3645ec315836509aa15d8d467b0b23d86a5a5163b539b713d751d5ff1ff8ee13b0e1811a02a077a582f1952f1d70a7a3
-
Filesize
168KB
MD505af53b3229bc92941ac0c1762227fd3
SHA16565c4eba532c464a11887c53c4a80d3071c2d1d
SHA2565f3e1bfa9e84e232a0ef262398eb337a7acdaa0cbe2230eb71b71fdd0bc17b81
SHA5121bc7b44d8aa39e0ec00e3f24c7a6018729a2513d138505e56ed0c16206e515f7801e7edd62d2156809a41cf0c27f4f4d322e9a8d892347073815c3a19ac1d33f
-
Filesize
168KB
MD5a793fb7300d533d2daddf47a762d5f1c
SHA19d9db696ec2e4bbab564e84cbf9af63a3b5c2299
SHA25678d61a8676a0ebd09ff6425fa6b59f38b4072184f4e2d001ac4b049a7ef9d8ba
SHA512d1eae8e0ed9c5a34409cec9ef13f58a1b254c155e84088df8430ae6e9c6bb4744cf0b018414118d790eac1b900665f2aaf85f06275f15da5da1592550d5f4d5b
-
Filesize
168KB
MD5a793fb7300d533d2daddf47a762d5f1c
SHA19d9db696ec2e4bbab564e84cbf9af63a3b5c2299
SHA25678d61a8676a0ebd09ff6425fa6b59f38b4072184f4e2d001ac4b049a7ef9d8ba
SHA512d1eae8e0ed9c5a34409cec9ef13f58a1b254c155e84088df8430ae6e9c6bb4744cf0b018414118d790eac1b900665f2aaf85f06275f15da5da1592550d5f4d5b
-
Filesize
168KB
MD5ec4fd3bc431accdbebbd9b6e75fb293d
SHA18d7ab98669f483c213121e1096e130c299df35f0
SHA2565b83b8f7d1839c91210b1988330bf295145b5e889991f1d34805a0a9f8e5bfb6
SHA512b989f1bcd972fbdcbbfacddd5eddf8becaaba1c995399970b059a996c09868837ad4c4476ab4fd03281129583de499f08691d7aec0cd9f0a4cbc31fc83525903
-
Filesize
168KB
MD5ec4fd3bc431accdbebbd9b6e75fb293d
SHA18d7ab98669f483c213121e1096e130c299df35f0
SHA2565b83b8f7d1839c91210b1988330bf295145b5e889991f1d34805a0a9f8e5bfb6
SHA512b989f1bcd972fbdcbbfacddd5eddf8becaaba1c995399970b059a996c09868837ad4c4476ab4fd03281129583de499f08691d7aec0cd9f0a4cbc31fc83525903