Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
f06151047b4390exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
f06151047b4390exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
f06151047b4390exeexeexeex.exe
-
Size
372KB
-
MD5
f06151047b4390b87b5f683cb315add1
-
SHA1
eeafdf08781682912822bd2375127c46d60ec20a
-
SHA256
b8bcd7862c8d1d41c40e3dec3b4988b3c443cc62ca3b43d235fc3cc456699a47
-
SHA512
61c349208cbd2d1d41c0bc6b004d6fc2838dc9b54b6e0856c124f342f62097c8c1ffc70a669a169d58e0bde77421f39066d02c539f14837349d7dbc70b8ecfe4
-
SSDEEP
3072:CEGh0oSmlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEG5l/Oe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{80D64D45-FA2B-4124-BB80-4767B73BC730} {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}\stubpath = "C:\\Windows\\{A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe" {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A78C34EE-3D16-4dd4-9113-F6AF56A67E53} {EC69C11B-E881-4062-BFFB-F24688E76883}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{983301CA-5655-4afe-B888-3EA61EBB2F56} f06151047b4390exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F301BEAF-792E-4690-967E-2AFC4AF50EAB} {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC} {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5} {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A78C34EE-3D16-4dd4-9113-F6AF56A67E53}\stubpath = "C:\\Windows\\{A78C34EE-3D16-4dd4-9113-F6AF56A67E53}.exe" {EC69C11B-E881-4062-BFFB-F24688E76883}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{48380CC7-4AB9-4e57-B7A9-A837B1C0AA5B} {A78C34EE-3D16-4dd4-9113-F6AF56A67E53}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{983301CA-5655-4afe-B888-3EA61EBB2F56}\stubpath = "C:\\Windows\\{983301CA-5655-4afe-B888-3EA61EBB2F56}.exe" f06151047b4390exeexeexeex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}\stubpath = "C:\\Windows\\{6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe" {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7CE52440-C09A-469c-9AB2-7D2EE97F6FF9} {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}\stubpath = "C:\\Windows\\{7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe" {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{81BF642B-A574-4395-A49D-DC04FAE54F4D}\stubpath = "C:\\Windows\\{81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe" {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA5E9346-9495-46a5-B6A5-C1EADC4BEADD} {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}\stubpath = "C:\\Windows\\{AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe" {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5} {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC69C11B-E881-4062-BFFB-F24688E76883} {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC69C11B-E881-4062-BFFB-F24688E76883}\stubpath = "C:\\Windows\\{EC69C11B-E881-4062-BFFB-F24688E76883}.exe" {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F301BEAF-792E-4690-967E-2AFC4AF50EAB}\stubpath = "C:\\Windows\\{F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe" {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{81BF642B-A574-4395-A49D-DC04FAE54F4D} {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}\stubpath = "C:\\Windows\\{FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe" {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{80D64D45-FA2B-4124-BB80-4767B73BC730}\stubpath = "C:\\Windows\\{80D64D45-FA2B-4124-BB80-4767B73BC730}.exe" {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{48380CC7-4AB9-4e57-B7A9-A837B1C0AA5B}\stubpath = "C:\\Windows\\{48380CC7-4AB9-4e57-B7A9-A837B1C0AA5B}.exe" {A78C34EE-3D16-4dd4-9113-F6AF56A67E53}.exe -
Executes dropped EXE 12 IoCs
pid Process 1724 {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe 4144 {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe 4632 {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe 1648 {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe 2636 {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe 4972 {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe 5096 {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe 4488 {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe 988 {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe 2204 {EC69C11B-E881-4062-BFFB-F24688E76883}.exe 4548 {A78C34EE-3D16-4dd4-9113-F6AF56A67E53}.exe 2936 {48380CC7-4AB9-4e57-B7A9-A837B1C0AA5B}.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{5F48B34F-36F4-47F9-B861-C507A5E82505}.catalogItem svchost.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe File created C:\Windows\{983301CA-5655-4afe-B888-3EA61EBB2F56}.exe f06151047b4390exeexeexeex.exe File created C:\Windows\{F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe File created C:\Windows\{6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe File created C:\Windows\{7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe File created C:\Windows\{FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe File created C:\Windows\{80D64D45-FA2B-4124-BB80-4767B73BC730}.exe {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe File created C:\Windows\{AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe File created C:\Windows\{EC69C11B-E881-4062-BFFB-F24688E76883}.exe {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe File created C:\Windows\{A78C34EE-3D16-4dd4-9113-F6AF56A67E53}.exe {EC69C11B-E881-4062-BFFB-F24688E76883}.exe File created C:\Windows\{81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe File created C:\Windows\{48380CC7-4AB9-4e57-B7A9-A837B1C0AA5B}.exe {A78C34EE-3D16-4dd4-9113-F6AF56A67E53}.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3716 f06151047b4390exeexeexeex.exe Token: SeIncBasePriorityPrivilege 1724 {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe Token: SeIncBasePriorityPrivilege 4144 {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe Token: SeIncBasePriorityPrivilege 4632 {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe Token: SeIncBasePriorityPrivilege 1648 {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe Token: SeIncBasePriorityPrivilege 2636 {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe Token: SeIncBasePriorityPrivilege 4972 {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe Token: SeIncBasePriorityPrivilege 5096 {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe Token: SeIncBasePriorityPrivilege 4488 {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe Token: SeIncBasePriorityPrivilege 988 {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe Token: SeIncBasePriorityPrivilege 2204 {EC69C11B-E881-4062-BFFB-F24688E76883}.exe Token: SeIncBasePriorityPrivilege 4548 {A78C34EE-3D16-4dd4-9113-F6AF56A67E53}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3716 wrote to memory of 1724 3716 f06151047b4390exeexeexeex.exe 95 PID 3716 wrote to memory of 1724 3716 f06151047b4390exeexeexeex.exe 95 PID 3716 wrote to memory of 1724 3716 f06151047b4390exeexeexeex.exe 95 PID 3716 wrote to memory of 2956 3716 f06151047b4390exeexeexeex.exe 96 PID 3716 wrote to memory of 2956 3716 f06151047b4390exeexeexeex.exe 96 PID 3716 wrote to memory of 2956 3716 f06151047b4390exeexeexeex.exe 96 PID 1724 wrote to memory of 4144 1724 {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe 99 PID 1724 wrote to memory of 4144 1724 {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe 99 PID 1724 wrote to memory of 4144 1724 {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe 99 PID 1724 wrote to memory of 1112 1724 {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe 100 PID 1724 wrote to memory of 1112 1724 {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe 100 PID 1724 wrote to memory of 1112 1724 {983301CA-5655-4afe-B888-3EA61EBB2F56}.exe 100 PID 4144 wrote to memory of 4632 4144 {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe 102 PID 4144 wrote to memory of 4632 4144 {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe 102 PID 4144 wrote to memory of 4632 4144 {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe 102 PID 4144 wrote to memory of 1608 4144 {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe 103 PID 4144 wrote to memory of 1608 4144 {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe 103 PID 4144 wrote to memory of 1608 4144 {F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe 103 PID 4632 wrote to memory of 1648 4632 {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe 104 PID 4632 wrote to memory of 1648 4632 {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe 104 PID 4632 wrote to memory of 1648 4632 {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe 104 PID 4632 wrote to memory of 1804 4632 {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe 105 PID 4632 wrote to memory of 1804 4632 {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe 105 PID 4632 wrote to memory of 1804 4632 {81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe 105 PID 1648 wrote to memory of 2636 1648 {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe 106 PID 1648 wrote to memory of 2636 1648 {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe 106 PID 1648 wrote to memory of 2636 1648 {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe 106 PID 1648 wrote to memory of 5000 1648 {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe 107 PID 1648 wrote to memory of 5000 1648 {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe 107 PID 1648 wrote to memory of 5000 1648 {6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe 107 PID 2636 wrote to memory of 4972 2636 {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe 108 PID 2636 wrote to memory of 4972 2636 {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe 108 PID 2636 wrote to memory of 4972 2636 {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe 108 PID 2636 wrote to memory of 4524 2636 {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe 109 PID 2636 wrote to memory of 4524 2636 {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe 109 PID 2636 wrote to memory of 4524 2636 {7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe 109 PID 4972 wrote to memory of 5096 4972 {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe 110 PID 4972 wrote to memory of 5096 4972 {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe 110 PID 4972 wrote to memory of 5096 4972 {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe 110 PID 4972 wrote to memory of 880 4972 {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe 111 PID 4972 wrote to memory of 880 4972 {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe 111 PID 4972 wrote to memory of 880 4972 {FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe 111 PID 5096 wrote to memory of 4488 5096 {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe 112 PID 5096 wrote to memory of 4488 5096 {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe 112 PID 5096 wrote to memory of 4488 5096 {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe 112 PID 5096 wrote to memory of 3700 5096 {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe 113 PID 5096 wrote to memory of 3700 5096 {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe 113 PID 5096 wrote to memory of 3700 5096 {80D64D45-FA2B-4124-BB80-4767B73BC730}.exe 113 PID 4488 wrote to memory of 988 4488 {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe 115 PID 4488 wrote to memory of 988 4488 {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe 115 PID 4488 wrote to memory of 988 4488 {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe 115 PID 4488 wrote to memory of 1108 4488 {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe 114 PID 4488 wrote to memory of 1108 4488 {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe 114 PID 4488 wrote to memory of 1108 4488 {AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe 114 PID 988 wrote to memory of 2204 988 {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe 116 PID 988 wrote to memory of 2204 988 {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe 116 PID 988 wrote to memory of 2204 988 {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe 116 PID 988 wrote to memory of 1164 988 {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe 117 PID 988 wrote to memory of 1164 988 {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe 117 PID 988 wrote to memory of 1164 988 {A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe 117 PID 2204 wrote to memory of 4548 2204 {EC69C11B-E881-4062-BFFB-F24688E76883}.exe 118 PID 2204 wrote to memory of 4548 2204 {EC69C11B-E881-4062-BFFB-F24688E76883}.exe 118 PID 2204 wrote to memory of 4548 2204 {EC69C11B-E881-4062-BFFB-F24688E76883}.exe 118 PID 2204 wrote to memory of 4016 2204 {EC69C11B-E881-4062-BFFB-F24688E76883}.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1332
-
C:\Users\Admin\AppData\Local\Temp\f06151047b4390exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\f06151047b4390exeexeexeex.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\{983301CA-5655-4afe-B888-3EA61EBB2F56}.exeC:\Windows\{983301CA-5655-4afe-B888-3EA61EBB2F56}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\{F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exeC:\Windows\{F301BEAF-792E-4690-967E-2AFC4AF50EAB}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\{81BF642B-A574-4395-A49D-DC04FAE54F4D}.exeC:\Windows\{81BF642B-A574-4395-A49D-DC04FAE54F4D}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\{6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exeC:\Windows\{6FAF4F8C-47D0-4169-BEB3-B838B2BA4CFC}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\{7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exeC:\Windows\{7CE52440-C09A-469c-9AB2-7D2EE97F6FF9}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\{FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exeC:\Windows\{FF5AB3F7-53E7-4cdc-BAA2-EC14B03349D5}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\{80D64D45-FA2B-4124-BB80-4767B73BC730}.exeC:\Windows\{80D64D45-FA2B-4124-BB80-4767B73BC730}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\{AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exeC:\Windows\{AA5E9346-9495-46a5-B6A5-C1EADC4BEADD}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA5E9~1.EXE > nul10⤵PID:1108
-
-
C:\Windows\{A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exeC:\Windows\{A6AA7B5F-1793-4ccf-93B7-0CAB69F255A5}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\{EC69C11B-E881-4062-BFFB-F24688E76883}.exeC:\Windows\{EC69C11B-E881-4062-BFFB-F24688E76883}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\{A78C34EE-3D16-4dd4-9113-F6AF56A67E53}.exeC:\Windows\{A78C34EE-3D16-4dd4-9113-F6AF56A67E53}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Windows\{48380CC7-4AB9-4e57-B7A9-A837B1C0AA5B}.exeC:\Windows\{48380CC7-4AB9-4e57-B7A9-A837B1C0AA5B}.exe13⤵
- Executes dropped EXE
PID:2936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A78C3~1.EXE > nul13⤵PID:1460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EC69C~1.EXE > nul12⤵PID:4016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6AA7~1.EXE > nul11⤵PID:1164
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80D64~1.EXE > nul9⤵PID:3700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FF5AB~1.EXE > nul8⤵PID:880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7CE52~1.EXE > nul7⤵PID:4524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6FAF4~1.EXE > nul6⤵PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81BF6~1.EXE > nul5⤵PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F301B~1.EXE > nul4⤵PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98330~1.EXE > nul3⤵PID:1112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\F06151~1.EXE > nul2⤵PID:2956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD58f330c18adf7d10ae7f3bcc00329f715
SHA15b677aa8e046d3ef610fa929e8eda6456945fcc1
SHA2567d18dd9f5bbe4ade9d77180c57f9b2fa81db88d29bd1317a4cce57a91217129a
SHA51254012f03d50b19c32594428e9ffa1b2d4afef9a0658dfdb76b0d4593373ce2734a637b4e5cd08e174fc6350ac0d9dc9443f92b025b406332c6977f6c5b11dfa8
-
Filesize
372KB
MD58f330c18adf7d10ae7f3bcc00329f715
SHA15b677aa8e046d3ef610fa929e8eda6456945fcc1
SHA2567d18dd9f5bbe4ade9d77180c57f9b2fa81db88d29bd1317a4cce57a91217129a
SHA51254012f03d50b19c32594428e9ffa1b2d4afef9a0658dfdb76b0d4593373ce2734a637b4e5cd08e174fc6350ac0d9dc9443f92b025b406332c6977f6c5b11dfa8
-
Filesize
372KB
MD562ace01f1c190f2844b8c3f1f714e2eb
SHA1878ec19ef490a301e43c1ece1fab911d2897617c
SHA256c13ba69c236461d27de0130d42aab82d9b0021bf2e60fa7f825b73e854a62939
SHA512921dd179b5e2a813da7c271f79d233844e5b79defed30f1a0f7a709c4b8f5b5215ecac671d961659e72da7ffd03d27085744c8c020b31cab97bcab05840f4ed3
-
Filesize
372KB
MD562ace01f1c190f2844b8c3f1f714e2eb
SHA1878ec19ef490a301e43c1ece1fab911d2897617c
SHA256c13ba69c236461d27de0130d42aab82d9b0021bf2e60fa7f825b73e854a62939
SHA512921dd179b5e2a813da7c271f79d233844e5b79defed30f1a0f7a709c4b8f5b5215ecac671d961659e72da7ffd03d27085744c8c020b31cab97bcab05840f4ed3
-
Filesize
372KB
MD501be32929b58b68fc56e4bcedcf2bd07
SHA124b07716810760467e4fb70fb5f3c989ab093c97
SHA25662123d70bacbfec9449bf5fe6e74ad3080ca76da71d6afc03d7d82b72578e31d
SHA512e3205322e5de2cb0f8f552dd731f301a1e4be0d344b0186aeafc15ca7b661cc3c0c2f81db27020750f9488e52d0354c7fd95da573de7395393b3c58099195fde
-
Filesize
372KB
MD501be32929b58b68fc56e4bcedcf2bd07
SHA124b07716810760467e4fb70fb5f3c989ab093c97
SHA25662123d70bacbfec9449bf5fe6e74ad3080ca76da71d6afc03d7d82b72578e31d
SHA512e3205322e5de2cb0f8f552dd731f301a1e4be0d344b0186aeafc15ca7b661cc3c0c2f81db27020750f9488e52d0354c7fd95da573de7395393b3c58099195fde
-
Filesize
372KB
MD552eff89c8c50d45a887ac6aabd8f7f37
SHA1f1f89fedd35c6f16be73e690e8b40fc8f05a4578
SHA25692dbdace332fc2517dbd7dc5bb2f3574c7a82a25dbc167db02be007c857dbe94
SHA5124b9737f338e8fc0222b890f3bc8d235d5cd0951eb2e2a7df95938bbbfcb5652df9d504379337f5169aabcefb804eab2e8c0002d321e0c7f8e3fb7c98789f31a1
-
Filesize
372KB
MD552eff89c8c50d45a887ac6aabd8f7f37
SHA1f1f89fedd35c6f16be73e690e8b40fc8f05a4578
SHA25692dbdace332fc2517dbd7dc5bb2f3574c7a82a25dbc167db02be007c857dbe94
SHA5124b9737f338e8fc0222b890f3bc8d235d5cd0951eb2e2a7df95938bbbfcb5652df9d504379337f5169aabcefb804eab2e8c0002d321e0c7f8e3fb7c98789f31a1
-
Filesize
372KB
MD59ce1c2d0164b75982969e2a39b659e44
SHA111616221827962a37492d657b233cf769f8d45d6
SHA25656d0d71646df845900e5cd62be3bd169270eddfaae174d9b6a75d7682ada718d
SHA51243c263e6c7d5bc3b01dbb1279eb653a8fc4f6147badd6cf24dc67f051fa3b44b47379b0aa0af08cc6bd94d689fadc8a02642f8d9206f94408eeaff1ee613debf
-
Filesize
372KB
MD59ce1c2d0164b75982969e2a39b659e44
SHA111616221827962a37492d657b233cf769f8d45d6
SHA25656d0d71646df845900e5cd62be3bd169270eddfaae174d9b6a75d7682ada718d
SHA51243c263e6c7d5bc3b01dbb1279eb653a8fc4f6147badd6cf24dc67f051fa3b44b47379b0aa0af08cc6bd94d689fadc8a02642f8d9206f94408eeaff1ee613debf
-
Filesize
372KB
MD59ce1c2d0164b75982969e2a39b659e44
SHA111616221827962a37492d657b233cf769f8d45d6
SHA25656d0d71646df845900e5cd62be3bd169270eddfaae174d9b6a75d7682ada718d
SHA51243c263e6c7d5bc3b01dbb1279eb653a8fc4f6147badd6cf24dc67f051fa3b44b47379b0aa0af08cc6bd94d689fadc8a02642f8d9206f94408eeaff1ee613debf
-
Filesize
372KB
MD5906ead242f7f82c98100485a205bf305
SHA1a0500c358eceb0b794082b0bfe74889932f1a1cd
SHA256017e44c0bf1582ad10bcf5a8469541b9a681fa27163a46e919db38216a0528c7
SHA51213d83374a0cf3529bc463fea4e24849a40e1ca4ac2186f5edff6520752e49be1d59d7fcc40a674191afb16ad1751a9bb5f38244e762ed5e85fe23ee302f8215b
-
Filesize
372KB
MD5906ead242f7f82c98100485a205bf305
SHA1a0500c358eceb0b794082b0bfe74889932f1a1cd
SHA256017e44c0bf1582ad10bcf5a8469541b9a681fa27163a46e919db38216a0528c7
SHA51213d83374a0cf3529bc463fea4e24849a40e1ca4ac2186f5edff6520752e49be1d59d7fcc40a674191afb16ad1751a9bb5f38244e762ed5e85fe23ee302f8215b
-
Filesize
372KB
MD56e10f79127adda77945ad35c7594b8bb
SHA1d3c585740f5b4e49234ec1df9a1f7a50d40359b2
SHA25618d56b61b4b98dc4fc23f15cf0793255cb7cf358bfe6c93aebb228d537ec62c8
SHA512dccfa2a37a154f1f3529d57a1f4a200e2c59914e2019afee5f558d8fec50fa659c6c9805aa8e74a4eb76af7b2e9c519a58f190f209cbeada0e17aedc89a53106
-
Filesize
372KB
MD56e10f79127adda77945ad35c7594b8bb
SHA1d3c585740f5b4e49234ec1df9a1f7a50d40359b2
SHA25618d56b61b4b98dc4fc23f15cf0793255cb7cf358bfe6c93aebb228d537ec62c8
SHA512dccfa2a37a154f1f3529d57a1f4a200e2c59914e2019afee5f558d8fec50fa659c6c9805aa8e74a4eb76af7b2e9c519a58f190f209cbeada0e17aedc89a53106
-
Filesize
372KB
MD54aee6593ff42fa137dda181350e21bd5
SHA1d69a0efee030f4ae5df4b10568df932c60a730e5
SHA2563e51fcfff2b8e196dc2a993688916464a5e8f8e8ef7238404f38783a00972a21
SHA51294e638fcaf505053dcf55e8bd1f867eb7217f42925a6ed09fdcba05d582c28c30788786f1f167f68b4a38cc01a69ec2b1bfcdb7f4b4053a4329c1fbdc39d1ed4
-
Filesize
372KB
MD54aee6593ff42fa137dda181350e21bd5
SHA1d69a0efee030f4ae5df4b10568df932c60a730e5
SHA2563e51fcfff2b8e196dc2a993688916464a5e8f8e8ef7238404f38783a00972a21
SHA51294e638fcaf505053dcf55e8bd1f867eb7217f42925a6ed09fdcba05d582c28c30788786f1f167f68b4a38cc01a69ec2b1bfcdb7f4b4053a4329c1fbdc39d1ed4
-
Filesize
372KB
MD5030d07f184308e1e617936d3ca5204b6
SHA1656f3c8ad583f591b4b8c3aafd7d2667011022ec
SHA256d43ed2e0e0e9ced0ef690ced4476fec740119645602dead1caee647052e83683
SHA512fc6d3d31fc4614feaba1316f5eb00f77dcac93ae5cfcaffbce74efec49f65b618fb392fe0e572dca8f3958837b51282f2da4fa671445bc519be4f71a3c84090c
-
Filesize
372KB
MD5030d07f184308e1e617936d3ca5204b6
SHA1656f3c8ad583f591b4b8c3aafd7d2667011022ec
SHA256d43ed2e0e0e9ced0ef690ced4476fec740119645602dead1caee647052e83683
SHA512fc6d3d31fc4614feaba1316f5eb00f77dcac93ae5cfcaffbce74efec49f65b618fb392fe0e572dca8f3958837b51282f2da4fa671445bc519be4f71a3c84090c
-
Filesize
372KB
MD5dcf3d4fbfb91fff61b1300f0b8246e1e
SHA13e39e5d8ed15af95f16531e7ca3011bd855ef6ea
SHA25643dd7302e598150dc7f0f5080ff38b87d9ca7ae9a298fc585df56239b7f16365
SHA512db43fb1266417fdfd979dd964738027d44f2c5f0f9bff39158123590df93bf879d25bd17d620bb88711ea95eaaa2f67fe538f37c57c13c0fb588d1ccf050cab5
-
Filesize
372KB
MD5dcf3d4fbfb91fff61b1300f0b8246e1e
SHA13e39e5d8ed15af95f16531e7ca3011bd855ef6ea
SHA25643dd7302e598150dc7f0f5080ff38b87d9ca7ae9a298fc585df56239b7f16365
SHA512db43fb1266417fdfd979dd964738027d44f2c5f0f9bff39158123590df93bf879d25bd17d620bb88711ea95eaaa2f67fe538f37c57c13c0fb588d1ccf050cab5
-
Filesize
372KB
MD5ec2112b6c7d864f77f102149e1bc46b3
SHA1c14b7cb1af2372e22cd66216196c8e72afd8872b
SHA25636db91d163d6794072eb68385d8556dbee4c9588c890d5f2c89db13d733d9ff3
SHA51243804ba9e0fc805dc4ef37310956a53527a54169f241a817a396bc4f4d57c20914f999bbdc3d8182bdfb295d385897a512bf5abfbe19d26104dafdf48a05b6a0
-
Filesize
372KB
MD5ec2112b6c7d864f77f102149e1bc46b3
SHA1c14b7cb1af2372e22cd66216196c8e72afd8872b
SHA25636db91d163d6794072eb68385d8556dbee4c9588c890d5f2c89db13d733d9ff3
SHA51243804ba9e0fc805dc4ef37310956a53527a54169f241a817a396bc4f4d57c20914f999bbdc3d8182bdfb295d385897a512bf5abfbe19d26104dafdf48a05b6a0
-
Filesize
372KB
MD5ec8dbbb099280f33b4f0a57940969450
SHA174abbccf00c6f07610b1ad6a9adb44537800dfbc
SHA256a617c04995d4f0c5cfe6d85ec28cb9f722af664e37ff1a657eabbf08280ba282
SHA51236ec427e4e2dbfc5a873d3b6a747795dcaacf2e6feac2c633ec4344e841c0a251b649c50593f099c1fdb7523adc02ea74c9692a9174eace7750d5a6197748f47
-
Filesize
372KB
MD5ec8dbbb099280f33b4f0a57940969450
SHA174abbccf00c6f07610b1ad6a9adb44537800dfbc
SHA256a617c04995d4f0c5cfe6d85ec28cb9f722af664e37ff1a657eabbf08280ba282
SHA51236ec427e4e2dbfc5a873d3b6a747795dcaacf2e6feac2c633ec4344e841c0a251b649c50593f099c1fdb7523adc02ea74c9692a9174eace7750d5a6197748f47