Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
ec5d9a3c116ac4exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ec5d9a3c116ac4exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
ec5d9a3c116ac4exeexeexeex.exe
-
Size
204KB
-
MD5
ec5d9a3c116ac4621536d47bcd78d33c
-
SHA1
f1aa9b558f7b3f0ab22f8ab11fa5b8cfee072471
-
SHA256
677bf52adde8759ee8f4998029f615015b50a0291c8dce3300ae03e121e01e3f
-
SHA512
281300be75c854a7745d07c898761a686ec7cabaf6691dcb42e54efc4ed6415d96cb8c0322062391abc3dd4534d9c81e0ee7d81850593fff565f9e6a3868d106
-
SSDEEP
1536:1EGh0oql15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oql1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91CB760A-B854-4b3a-949F-356DA754586D}\stubpath = "C:\\Windows\\{91CB760A-B854-4b3a-949F-356DA754586D}.exe" ec5d9a3c116ac4exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37648057-C21D-43b8-9240-5E98E2234BD2} {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2BD59AC6-02DC-4024-B7D3-2A0C08CED72B} {109D0CB9-AA12-402b-9D9A-10E1F7002B80}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FCB2851E-0AAC-4095-A31B-EF937699A182} {457295F1-5048-45f0-B24A-6349963BF7B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{457295F1-5048-45f0-B24A-6349963BF7B8} {8D5C30B4-1429-4630-BAB1-4244FB0EC121}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A389EC64-7222-42ca-83D6-861325384CED} {91CB760A-B854-4b3a-949F-356DA754586D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A389EC64-7222-42ca-83D6-861325384CED}\stubpath = "C:\\Windows\\{A389EC64-7222-42ca-83D6-861325384CED}.exe" {91CB760A-B854-4b3a-949F-356DA754586D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A284BB9-A6A7-474b-B59B-DA79527EAD26} {37648057-C21D-43b8-9240-5E98E2234BD2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{109D0CB9-AA12-402b-9D9A-10E1F7002B80}\stubpath = "C:\\Windows\\{109D0CB9-AA12-402b-9D9A-10E1F7002B80}.exe" {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A284BB9-A6A7-474b-B59B-DA79527EAD26}\stubpath = "C:\\Windows\\{7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe" {37648057-C21D-43b8-9240-5E98E2234BD2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{109D0CB9-AA12-402b-9D9A-10E1F7002B80} {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2BD59AC6-02DC-4024-B7D3-2A0C08CED72B}\stubpath = "C:\\Windows\\{2BD59AC6-02DC-4024-B7D3-2A0C08CED72B}.exe" {109D0CB9-AA12-402b-9D9A-10E1F7002B80}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8D5C30B4-1429-4630-BAB1-4244FB0EC121} {2BD59AC6-02DC-4024-B7D3-2A0C08CED72B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91CB760A-B854-4b3a-949F-356DA754586D} ec5d9a3c116ac4exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}\stubpath = "C:\\Windows\\{F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe" {A389EC64-7222-42ca-83D6-861325384CED}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E911FAB9-0529-44cb-9028-F9D66F27A82D} {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37648057-C21D-43b8-9240-5E98E2234BD2}\stubpath = "C:\\Windows\\{37648057-C21D-43b8-9240-5E98E2234BD2}.exe" {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8D5C30B4-1429-4630-BAB1-4244FB0EC121}\stubpath = "C:\\Windows\\{8D5C30B4-1429-4630-BAB1-4244FB0EC121}.exe" {2BD59AC6-02DC-4024-B7D3-2A0C08CED72B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{457295F1-5048-45f0-B24A-6349963BF7B8}\stubpath = "C:\\Windows\\{457295F1-5048-45f0-B24A-6349963BF7B8}.exe" {8D5C30B4-1429-4630-BAB1-4244FB0EC121}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FCB2851E-0AAC-4095-A31B-EF937699A182}\stubpath = "C:\\Windows\\{FCB2851E-0AAC-4095-A31B-EF937699A182}.exe" {457295F1-5048-45f0-B24A-6349963BF7B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9D21DFEB-5E90-4e81-9EC4-65B23058E879} {FCB2851E-0AAC-4095-A31B-EF937699A182}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3} {A389EC64-7222-42ca-83D6-861325384CED}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3070FFCA-0D1A-49dc-8C24-20EAA4880450} {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3070FFCA-0D1A-49dc-8C24-20EAA4880450}\stubpath = "C:\\Windows\\{3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe" {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E911FAB9-0529-44cb-9028-F9D66F27A82D}\stubpath = "C:\\Windows\\{E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe" {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9D21DFEB-5E90-4e81-9EC4-65B23058E879}\stubpath = "C:\\Windows\\{9D21DFEB-5E90-4e81-9EC4-65B23058E879}.exe" {FCB2851E-0AAC-4095-A31B-EF937699A182}.exe -
Deletes itself 1 IoCs
pid Process 276 cmd.exe -
Executes dropped EXE 13 IoCs
pid Process 2324 {91CB760A-B854-4b3a-949F-356DA754586D}.exe 2412 {A389EC64-7222-42ca-83D6-861325384CED}.exe 2924 {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe 876 {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe 2260 {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe 2080 {37648057-C21D-43b8-9240-5E98E2234BD2}.exe 980 {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe 2120 {109D0CB9-AA12-402b-9D9A-10E1F7002B80}.exe 2556 {2BD59AC6-02DC-4024-B7D3-2A0C08CED72B}.exe 2788 {8D5C30B4-1429-4630-BAB1-4244FB0EC121}.exe 2652 {457295F1-5048-45f0-B24A-6349963BF7B8}.exe 2608 {FCB2851E-0AAC-4095-A31B-EF937699A182}.exe 2612 {9D21DFEB-5E90-4e81-9EC4-65B23058E879}.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\{8D5C30B4-1429-4630-BAB1-4244FB0EC121}.exe {2BD59AC6-02DC-4024-B7D3-2A0C08CED72B}.exe File created C:\Windows\{F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe {A389EC64-7222-42ca-83D6-861325384CED}.exe File created C:\Windows\{3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe File created C:\Windows\{E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe File created C:\Windows\{37648057-C21D-43b8-9240-5E98E2234BD2}.exe {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe File created C:\Windows\{7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe {37648057-C21D-43b8-9240-5E98E2234BD2}.exe File created C:\Windows\{109D0CB9-AA12-402b-9D9A-10E1F7002B80}.exe {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe File created C:\Windows\{2BD59AC6-02DC-4024-B7D3-2A0C08CED72B}.exe {109D0CB9-AA12-402b-9D9A-10E1F7002B80}.exe File created C:\Windows\{457295F1-5048-45f0-B24A-6349963BF7B8}.exe {8D5C30B4-1429-4630-BAB1-4244FB0EC121}.exe File created C:\Windows\{91CB760A-B854-4b3a-949F-356DA754586D}.exe ec5d9a3c116ac4exeexeexeex.exe File created C:\Windows\{A389EC64-7222-42ca-83D6-861325384CED}.exe {91CB760A-B854-4b3a-949F-356DA754586D}.exe File created C:\Windows\{FCB2851E-0AAC-4095-A31B-EF937699A182}.exe {457295F1-5048-45f0-B24A-6349963BF7B8}.exe File created C:\Windows\{9D21DFEB-5E90-4e81-9EC4-65B23058E879}.exe {FCB2851E-0AAC-4095-A31B-EF937699A182}.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2020 ec5d9a3c116ac4exeexeexeex.exe Token: SeIncBasePriorityPrivilege 2324 {91CB760A-B854-4b3a-949F-356DA754586D}.exe Token: SeIncBasePriorityPrivilege 2412 {A389EC64-7222-42ca-83D6-861325384CED}.exe Token: SeIncBasePriorityPrivilege 2924 {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe Token: SeIncBasePriorityPrivilege 876 {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe Token: SeIncBasePriorityPrivilege 2260 {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe Token: SeIncBasePriorityPrivilege 2080 {37648057-C21D-43b8-9240-5E98E2234BD2}.exe Token: SeIncBasePriorityPrivilege 980 {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe Token: SeIncBasePriorityPrivilege 2120 {109D0CB9-AA12-402b-9D9A-10E1F7002B80}.exe Token: SeIncBasePriorityPrivilege 2556 {2BD59AC6-02DC-4024-B7D3-2A0C08CED72B}.exe Token: SeIncBasePriorityPrivilege 2788 {8D5C30B4-1429-4630-BAB1-4244FB0EC121}.exe Token: SeIncBasePriorityPrivilege 2652 {457295F1-5048-45f0-B24A-6349963BF7B8}.exe Token: SeIncBasePriorityPrivilege 2608 {FCB2851E-0AAC-4095-A31B-EF937699A182}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2324 2020 ec5d9a3c116ac4exeexeexeex.exe 29 PID 2020 wrote to memory of 2324 2020 ec5d9a3c116ac4exeexeexeex.exe 29 PID 2020 wrote to memory of 2324 2020 ec5d9a3c116ac4exeexeexeex.exe 29 PID 2020 wrote to memory of 2324 2020 ec5d9a3c116ac4exeexeexeex.exe 29 PID 2020 wrote to memory of 276 2020 ec5d9a3c116ac4exeexeexeex.exe 30 PID 2020 wrote to memory of 276 2020 ec5d9a3c116ac4exeexeexeex.exe 30 PID 2020 wrote to memory of 276 2020 ec5d9a3c116ac4exeexeexeex.exe 30 PID 2020 wrote to memory of 276 2020 ec5d9a3c116ac4exeexeexeex.exe 30 PID 2324 wrote to memory of 2412 2324 {91CB760A-B854-4b3a-949F-356DA754586D}.exe 31 PID 2324 wrote to memory of 2412 2324 {91CB760A-B854-4b3a-949F-356DA754586D}.exe 31 PID 2324 wrote to memory of 2412 2324 {91CB760A-B854-4b3a-949F-356DA754586D}.exe 31 PID 2324 wrote to memory of 2412 2324 {91CB760A-B854-4b3a-949F-356DA754586D}.exe 31 PID 2324 wrote to memory of 2908 2324 {91CB760A-B854-4b3a-949F-356DA754586D}.exe 32 PID 2324 wrote to memory of 2908 2324 {91CB760A-B854-4b3a-949F-356DA754586D}.exe 32 PID 2324 wrote to memory of 2908 2324 {91CB760A-B854-4b3a-949F-356DA754586D}.exe 32 PID 2324 wrote to memory of 2908 2324 {91CB760A-B854-4b3a-949F-356DA754586D}.exe 32 PID 2412 wrote to memory of 2924 2412 {A389EC64-7222-42ca-83D6-861325384CED}.exe 33 PID 2412 wrote to memory of 2924 2412 {A389EC64-7222-42ca-83D6-861325384CED}.exe 33 PID 2412 wrote to memory of 2924 2412 {A389EC64-7222-42ca-83D6-861325384CED}.exe 33 PID 2412 wrote to memory of 2924 2412 {A389EC64-7222-42ca-83D6-861325384CED}.exe 33 PID 2412 wrote to memory of 2996 2412 {A389EC64-7222-42ca-83D6-861325384CED}.exe 34 PID 2412 wrote to memory of 2996 2412 {A389EC64-7222-42ca-83D6-861325384CED}.exe 34 PID 2412 wrote to memory of 2996 2412 {A389EC64-7222-42ca-83D6-861325384CED}.exe 34 PID 2412 wrote to memory of 2996 2412 {A389EC64-7222-42ca-83D6-861325384CED}.exe 34 PID 2924 wrote to memory of 876 2924 {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe 36 PID 2924 wrote to memory of 876 2924 {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe 36 PID 2924 wrote to memory of 876 2924 {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe 36 PID 2924 wrote to memory of 876 2924 {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe 36 PID 2924 wrote to memory of 1396 2924 {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe 35 PID 2924 wrote to memory of 1396 2924 {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe 35 PID 2924 wrote to memory of 1396 2924 {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe 35 PID 2924 wrote to memory of 1396 2924 {F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe 35 PID 876 wrote to memory of 2260 876 {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe 38 PID 876 wrote to memory of 2260 876 {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe 38 PID 876 wrote to memory of 2260 876 {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe 38 PID 876 wrote to memory of 2260 876 {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe 38 PID 876 wrote to memory of 2032 876 {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe 37 PID 876 wrote to memory of 2032 876 {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe 37 PID 876 wrote to memory of 2032 876 {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe 37 PID 876 wrote to memory of 2032 876 {3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe 37 PID 2260 wrote to memory of 2080 2260 {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe 40 PID 2260 wrote to memory of 2080 2260 {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe 40 PID 2260 wrote to memory of 2080 2260 {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe 40 PID 2260 wrote to memory of 2080 2260 {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe 40 PID 2260 wrote to memory of 2204 2260 {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe 39 PID 2260 wrote to memory of 2204 2260 {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe 39 PID 2260 wrote to memory of 2204 2260 {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe 39 PID 2260 wrote to memory of 2204 2260 {E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe 39 PID 2080 wrote to memory of 980 2080 {37648057-C21D-43b8-9240-5E98E2234BD2}.exe 42 PID 2080 wrote to memory of 980 2080 {37648057-C21D-43b8-9240-5E98E2234BD2}.exe 42 PID 2080 wrote to memory of 980 2080 {37648057-C21D-43b8-9240-5E98E2234BD2}.exe 42 PID 2080 wrote to memory of 980 2080 {37648057-C21D-43b8-9240-5E98E2234BD2}.exe 42 PID 2080 wrote to memory of 2864 2080 {37648057-C21D-43b8-9240-5E98E2234BD2}.exe 41 PID 2080 wrote to memory of 2864 2080 {37648057-C21D-43b8-9240-5E98E2234BD2}.exe 41 PID 2080 wrote to memory of 2864 2080 {37648057-C21D-43b8-9240-5E98E2234BD2}.exe 41 PID 2080 wrote to memory of 2864 2080 {37648057-C21D-43b8-9240-5E98E2234BD2}.exe 41 PID 980 wrote to memory of 2120 980 {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe 43 PID 980 wrote to memory of 2120 980 {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe 43 PID 980 wrote to memory of 2120 980 {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe 43 PID 980 wrote to memory of 2120 980 {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe 43 PID 980 wrote to memory of 2224 980 {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe 44 PID 980 wrote to memory of 2224 980 {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe 44 PID 980 wrote to memory of 2224 980 {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe 44 PID 980 wrote to memory of 2224 980 {7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec5d9a3c116ac4exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\ec5d9a3c116ac4exeexeexeex.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\{91CB760A-B854-4b3a-949F-356DA754586D}.exeC:\Windows\{91CB760A-B854-4b3a-949F-356DA754586D}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\{A389EC64-7222-42ca-83D6-861325384CED}.exeC:\Windows\{A389EC64-7222-42ca-83D6-861325384CED}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\{F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exeC:\Windows\{F9CC4BE4-979E-491f-A5D8-BB7E1F9C24B3}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9CC4~1.EXE > nul5⤵PID:1396
-
-
C:\Windows\{3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exeC:\Windows\{3070FFCA-0D1A-49dc-8C24-20EAA4880450}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3070F~1.EXE > nul6⤵PID:2032
-
-
C:\Windows\{E911FAB9-0529-44cb-9028-F9D66F27A82D}.exeC:\Windows\{E911FAB9-0529-44cb-9028-F9D66F27A82D}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E911F~1.EXE > nul7⤵PID:2204
-
-
C:\Windows\{37648057-C21D-43b8-9240-5E98E2234BD2}.exeC:\Windows\{37648057-C21D-43b8-9240-5E98E2234BD2}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37648~1.EXE > nul8⤵PID:2864
-
-
C:\Windows\{7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exeC:\Windows\{7A284BB9-A6A7-474b-B59B-DA79527EAD26}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\{109D0CB9-AA12-402b-9D9A-10E1F7002B80}.exeC:\Windows\{109D0CB9-AA12-402b-9D9A-10E1F7002B80}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Windows\{2BD59AC6-02DC-4024-B7D3-2A0C08CED72B}.exeC:\Windows\{2BD59AC6-02DC-4024-B7D3-2A0C08CED72B}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2BD59~1.EXE > nul11⤵PID:2572
-
-
C:\Windows\{8D5C30B4-1429-4630-BAB1-4244FB0EC121}.exeC:\Windows\{8D5C30B4-1429-4630-BAB1-4244FB0EC121}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\{457295F1-5048-45f0-B24A-6349963BF7B8}.exeC:\Windows\{457295F1-5048-45f0-B24A-6349963BF7B8}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2652 -
C:\Windows\{FCB2851E-0AAC-4095-A31B-EF937699A182}.exeC:\Windows\{FCB2851E-0AAC-4095-A31B-EF937699A182}.exe13⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2608 -
C:\Windows\{9D21DFEB-5E90-4e81-9EC4-65B23058E879}.exeC:\Windows\{9D21DFEB-5E90-4e81-9EC4-65B23058E879}.exe14⤵
- Executes dropped EXE
PID:2612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FCB28~1.EXE > nul14⤵PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{45729~1.EXE > nul13⤵PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D5C3~1.EXE > nul12⤵PID:2656
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{109D0~1.EXE > nul10⤵PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7A284~1.EXE > nul9⤵PID:2224
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A389E~1.EXE > nul4⤵PID:2996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{91CB7~1.EXE > nul3⤵PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\EC5D9A~1.EXE > nul2⤵
- Deletes itself
PID:276
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5e1757499ade30962cede7fea9ac1d19d
SHA1a832dd51aec9e73b3028ee999a1d1003a6641456
SHA256ebd09c447b88de43716a2417e80232d925d74b92cb8ad0356be97d8d62215ae0
SHA51202f1ed2ba69ef89448e1528846d49db299aa5824384a1f626db14cbb7dbf9511e0a447344bdbf5289379aff07ab6fd559c3e3be200f45fc9ffbc22bd8118e279
-
Filesize
204KB
MD5e1757499ade30962cede7fea9ac1d19d
SHA1a832dd51aec9e73b3028ee999a1d1003a6641456
SHA256ebd09c447b88de43716a2417e80232d925d74b92cb8ad0356be97d8d62215ae0
SHA51202f1ed2ba69ef89448e1528846d49db299aa5824384a1f626db14cbb7dbf9511e0a447344bdbf5289379aff07ab6fd559c3e3be200f45fc9ffbc22bd8118e279
-
Filesize
204KB
MD5e9b773ca38d2781ab08136ddce11cae1
SHA167c6b7bbddf6621cc39b21e7b232fbabe4208016
SHA2560477a4c5255cc091eed663837a34a69d04c656ec2680a8463418436c7b45cfe4
SHA51205ff3a78100f7026bbb7cd82ba657970cc8fd6176e60cc093dd998eea34970a52f062ca0b83e68d6275ae425c9a7317b2550d401a0a7d4baa4fbbc8b6009654b
-
Filesize
204KB
MD5e9b773ca38d2781ab08136ddce11cae1
SHA167c6b7bbddf6621cc39b21e7b232fbabe4208016
SHA2560477a4c5255cc091eed663837a34a69d04c656ec2680a8463418436c7b45cfe4
SHA51205ff3a78100f7026bbb7cd82ba657970cc8fd6176e60cc093dd998eea34970a52f062ca0b83e68d6275ae425c9a7317b2550d401a0a7d4baa4fbbc8b6009654b
-
Filesize
204KB
MD5de2b5bd8b18b1e53b5c4af094032b8bf
SHA11914fa0b341d1fd434696e6bac396306550c5089
SHA256150530d04db988e22cd4f7cd3cbc6af8fa64dd766d79eecc640112c5772ac4db
SHA512c243ecd9e730265075af97ceafc8b651309008dc309bb1a73176b06768c75455fe90e739685ce4391ac5d94c213d6063e0fec141b6047af1c04c5d6b848c84ad
-
Filesize
204KB
MD5de2b5bd8b18b1e53b5c4af094032b8bf
SHA11914fa0b341d1fd434696e6bac396306550c5089
SHA256150530d04db988e22cd4f7cd3cbc6af8fa64dd766d79eecc640112c5772ac4db
SHA512c243ecd9e730265075af97ceafc8b651309008dc309bb1a73176b06768c75455fe90e739685ce4391ac5d94c213d6063e0fec141b6047af1c04c5d6b848c84ad
-
Filesize
204KB
MD523aaa8f3cdb9ff2ef6501ce03cfe7cc3
SHA1e6db094dce9201b75b6a9169eb8530cc170a239d
SHA2562510587119f66efee14595f32032755cfc86db3471b42413c8750f516ee8c426
SHA51283967a21c8992e5c45f9a4926173bf817d863fe867ea95a471290003f4e3e6aa673aa72c14f2739d11963930428869ed39f27abf8e0a487fe85c19e323021eef
-
Filesize
204KB
MD523aaa8f3cdb9ff2ef6501ce03cfe7cc3
SHA1e6db094dce9201b75b6a9169eb8530cc170a239d
SHA2562510587119f66efee14595f32032755cfc86db3471b42413c8750f516ee8c426
SHA51283967a21c8992e5c45f9a4926173bf817d863fe867ea95a471290003f4e3e6aa673aa72c14f2739d11963930428869ed39f27abf8e0a487fe85c19e323021eef
-
Filesize
204KB
MD5a59295f2b8c7661bb7d8036144abd408
SHA193599f6c5c7a8b62cca07cfa0495bd8ba6f48440
SHA256756d672cde8f0f7299f485513ae49204a6853800fce9ef391f13a6f94d67f262
SHA512c70f251207d0872d128acaee8f34674c4fa89d872506dedbb6f122d4cf34868101556e639e1491e2795372fe0f60db761cc43688b504f577cfb1e1bb2f4e8080
-
Filesize
204KB
MD5a59295f2b8c7661bb7d8036144abd408
SHA193599f6c5c7a8b62cca07cfa0495bd8ba6f48440
SHA256756d672cde8f0f7299f485513ae49204a6853800fce9ef391f13a6f94d67f262
SHA512c70f251207d0872d128acaee8f34674c4fa89d872506dedbb6f122d4cf34868101556e639e1491e2795372fe0f60db761cc43688b504f577cfb1e1bb2f4e8080
-
Filesize
204KB
MD569a54789c9e1ef8c8ee8e7e7aa004b97
SHA13ebb1a7fed86f8c6dad51bf40bae012d1181c298
SHA25652316006f9bbfe54af25c6fe66ce093ea06674c10d6d376575f8a95956508de1
SHA512c2f78f4039c39a0d22ccb3c0ad6ff07f44371576ee062d3fbfe67e62020a73615bfd6b938f03b455d10dd17dbf580ab9a5bbd9c4effa83f05edd30c845caaa9d
-
Filesize
204KB
MD569a54789c9e1ef8c8ee8e7e7aa004b97
SHA13ebb1a7fed86f8c6dad51bf40bae012d1181c298
SHA25652316006f9bbfe54af25c6fe66ce093ea06674c10d6d376575f8a95956508de1
SHA512c2f78f4039c39a0d22ccb3c0ad6ff07f44371576ee062d3fbfe67e62020a73615bfd6b938f03b455d10dd17dbf580ab9a5bbd9c4effa83f05edd30c845caaa9d
-
Filesize
204KB
MD5219cef8332be40887af7b125a09fe4d0
SHA11f28885f27ae510f8ae24b12933fe1b8b77b5f44
SHA256233e5b77091d4b3d2ad124740bf516a236490cd8f47107743e69d299c81a8964
SHA5125d710871d9d47453ca4efcd74bda739eb7c725216675ff034f0209c51dc6096a77ef6b0ff6bd0ca93bbcde9623d090cd41f062699ddfa2b252743353df1ec0f8
-
Filesize
204KB
MD5219cef8332be40887af7b125a09fe4d0
SHA11f28885f27ae510f8ae24b12933fe1b8b77b5f44
SHA256233e5b77091d4b3d2ad124740bf516a236490cd8f47107743e69d299c81a8964
SHA5125d710871d9d47453ca4efcd74bda739eb7c725216675ff034f0209c51dc6096a77ef6b0ff6bd0ca93bbcde9623d090cd41f062699ddfa2b252743353df1ec0f8
-
Filesize
204KB
MD527fd30f507087a0f29ed8ab6ed06f6fb
SHA15bb527d823933e5c79381387d8f26bea840dc0c2
SHA256b04afb213af0489f2433692f58106fee58fd6cf2afecd369d186425b8b2dfd1d
SHA512179eff9abc0d75e4fdbe81497ca242d245430b80465dd19018930286eb08f8a039046ad06111ce731e912f3370d2d8a86bf43085b7ee5d94748582a381b40507
-
Filesize
204KB
MD527fd30f507087a0f29ed8ab6ed06f6fb
SHA15bb527d823933e5c79381387d8f26bea840dc0c2
SHA256b04afb213af0489f2433692f58106fee58fd6cf2afecd369d186425b8b2dfd1d
SHA512179eff9abc0d75e4fdbe81497ca242d245430b80465dd19018930286eb08f8a039046ad06111ce731e912f3370d2d8a86bf43085b7ee5d94748582a381b40507
-
Filesize
204KB
MD527fd30f507087a0f29ed8ab6ed06f6fb
SHA15bb527d823933e5c79381387d8f26bea840dc0c2
SHA256b04afb213af0489f2433692f58106fee58fd6cf2afecd369d186425b8b2dfd1d
SHA512179eff9abc0d75e4fdbe81497ca242d245430b80465dd19018930286eb08f8a039046ad06111ce731e912f3370d2d8a86bf43085b7ee5d94748582a381b40507
-
Filesize
204KB
MD576ed30b3059580f4c757f4076574245f
SHA11bb835de1b9a1d189f7e5c52cb34ad9acc69be3f
SHA256bb21fe1c836a7337c13b2f7f40fca3451f078a132ec4f6876b612128ef538945
SHA51247d08036b8f15891189ba4e13e14b0e239d757db1100438f45bf2e2e75df297f610af8edbb0fcb218740f35f664256a5012ff4a11860a71e7eb839fadc93eab5
-
Filesize
204KB
MD5d2c297cc7eac8773a6ebbd19a346293f
SHA1d49e8e449d6e2cb9947b4f45c639eb71ef3e0545
SHA25690810fbcd0831196ff69b4005631a0ba08aaf4e0710edeeed850d4ed474182fb
SHA512e8d6b9ccd9fac4905090bcde6bb4fa1043bd5190478c8628fdbd6de18e3cc2da20d434a3f5885d9fbe11ffbeed264ec42f249047c9266ffa3126b944e83420a7
-
Filesize
204KB
MD5d2c297cc7eac8773a6ebbd19a346293f
SHA1d49e8e449d6e2cb9947b4f45c639eb71ef3e0545
SHA25690810fbcd0831196ff69b4005631a0ba08aaf4e0710edeeed850d4ed474182fb
SHA512e8d6b9ccd9fac4905090bcde6bb4fa1043bd5190478c8628fdbd6de18e3cc2da20d434a3f5885d9fbe11ffbeed264ec42f249047c9266ffa3126b944e83420a7
-
Filesize
204KB
MD5ce07b3fb94ad2842bd5ae15f210cb710
SHA1779c1676bc1010353a675a5e5165d21fabe644fb
SHA2564754810549fda2553f4f04d9d2f2aa324823600c3e46f13370fa3ae00d007925
SHA5120ea71dbe15d01fbe6fdee33592d8d91fcd9ef5c230276643920d0bead434f4ddfe7cf2cfa7ae90e05f40812ded3f14b8983493894e3f98f69e30577d00d27bdd
-
Filesize
204KB
MD5ce07b3fb94ad2842bd5ae15f210cb710
SHA1779c1676bc1010353a675a5e5165d21fabe644fb
SHA2564754810549fda2553f4f04d9d2f2aa324823600c3e46f13370fa3ae00d007925
SHA5120ea71dbe15d01fbe6fdee33592d8d91fcd9ef5c230276643920d0bead434f4ddfe7cf2cfa7ae90e05f40812ded3f14b8983493894e3f98f69e30577d00d27bdd
-
Filesize
204KB
MD53e1ca11e92eb7346933f0b934bb5bcca
SHA132170b347ab644cbe6f8b4f21ea4c3dbc738da98
SHA256c218586fa498ea435b5aae13c4c19fd8aee29433e46f62ad2a5314441fd1c008
SHA5129e087623a321614827e1c39c0c9596b2602e829f3d7a0113a745b1de413adc91ebc6c22a84007a704ff2aec045b0e2f571b4429e840bcd7c3faddfe96c8c0f27
-
Filesize
204KB
MD53e1ca11e92eb7346933f0b934bb5bcca
SHA132170b347ab644cbe6f8b4f21ea4c3dbc738da98
SHA256c218586fa498ea435b5aae13c4c19fd8aee29433e46f62ad2a5314441fd1c008
SHA5129e087623a321614827e1c39c0c9596b2602e829f3d7a0113a745b1de413adc91ebc6c22a84007a704ff2aec045b0e2f571b4429e840bcd7c3faddfe96c8c0f27
-
Filesize
204KB
MD5b191a2d413e72694fadc733a9834aa99
SHA1f95ce12f9f972f88966a6090d7a117db9ee392c3
SHA256d63a1150d6793216e4d31752fb6c540bad4d5a0fc37d6061dce4e6e4ba0652fe
SHA512b21f524f8261164e43439efe687c4a51eedf3d316f0f4ca55c2e93905dd581f7e1937a5ec716361e34177cd69a99810912308d27abee0d9dce1006e185114988
-
Filesize
204KB
MD5b191a2d413e72694fadc733a9834aa99
SHA1f95ce12f9f972f88966a6090d7a117db9ee392c3
SHA256d63a1150d6793216e4d31752fb6c540bad4d5a0fc37d6061dce4e6e4ba0652fe
SHA512b21f524f8261164e43439efe687c4a51eedf3d316f0f4ca55c2e93905dd581f7e1937a5ec716361e34177cd69a99810912308d27abee0d9dce1006e185114988