Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/07/2023, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
4077c6a7639ca0exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4077c6a7639ca0exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
4077c6a7639ca0exeexe_JC.exe
-
Size
168KB
-
MD5
4077c6a7639ca08788cbfdd7df25e060
-
SHA1
602e022481b549dc616262b4f867b233e53df593
-
SHA256
6f4cf312d22a61c88b79c3757e4edc8f22d3550c59a4ee1933941c6cc1e47d24
-
SHA512
74904d7655b9636aa6f7952b6bfef2d8fdadcf0fa7ea58f3b67b0d6e066de8185d8545c6e9553103d3025f8b035ef08fa1d1eb276e2e6ed7e8383b6ee0c3e31e
-
SSDEEP
1536:1EGh0omlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0omlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E908C635-B82B-4d86-BB0E-EAD8957C0602}\stubpath = "C:\\Windows\\{E908C635-B82B-4d86-BB0E-EAD8957C0602}.exe" {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{358D9C8A-AB22-4f4e-960A-6DD1A0C41483}\stubpath = "C:\\Windows\\{358D9C8A-AB22-4f4e-960A-6DD1A0C41483}.exe" {5C144A79-AC08-40a4-9916-1338241C0225}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7795410D-E66F-4ec6-AA5B-E04A4B07D65E} {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D293CFF-55A3-4f94-9493-1205E43B7E1C} {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D293CFF-55A3-4f94-9493-1205E43B7E1C}\stubpath = "C:\\Windows\\{0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe" {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21AC9AF4-431C-4c53-8109-51E193F51252} {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08CDB2F8-CA73-473a-AB92-575C289704D8}\stubpath = "C:\\Windows\\{08CDB2F8-CA73-473a-AB92-575C289704D8}.exe" {21AC9AF4-431C-4c53-8109-51E193F51252}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C144A79-AC08-40a4-9916-1338241C0225}\stubpath = "C:\\Windows\\{5C144A79-AC08-40a4-9916-1338241C0225}.exe" {E908C635-B82B-4d86-BB0E-EAD8957C0602}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{358D9C8A-AB22-4f4e-960A-6DD1A0C41483} {5C144A79-AC08-40a4-9916-1338241C0225}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7795410D-E66F-4ec6-AA5B-E04A4B07D65E}\stubpath = "C:\\Windows\\{7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe" {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{72D5224E-3FD1-4ac0-8A00-242A4FA1097E}\stubpath = "C:\\Windows\\{72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe" 4077c6a7639ca0exeexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}\stubpath = "C:\\Windows\\{01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe" {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21AC9AF4-431C-4c53-8109-51E193F51252}\stubpath = "C:\\Windows\\{21AC9AF4-431C-4c53-8109-51E193F51252}.exe" {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D48C216E-E89F-489c-B78F-CD4C591D6D47} {358D9C8A-AB22-4f4e-960A-6DD1A0C41483}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{72D5224E-3FD1-4ac0-8A00-242A4FA1097E} 4077c6a7639ca0exeexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B812B8AD-CE49-4d5a-8321-66A45C910AB5}\stubpath = "C:\\Windows\\{B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe" {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E} {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08CDB2F8-CA73-473a-AB92-575C289704D8} {21AC9AF4-431C-4c53-8109-51E193F51252}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E908C635-B82B-4d86-BB0E-EAD8957C0602} {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C144A79-AC08-40a4-9916-1338241C0225} {E908C635-B82B-4d86-BB0E-EAD8957C0602}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D48C216E-E89F-489c-B78F-CD4C591D6D47}\stubpath = "C:\\Windows\\{D48C216E-E89F-489c-B78F-CD4C591D6D47}.exe" {358D9C8A-AB22-4f4e-960A-6DD1A0C41483}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B812B8AD-CE49-4d5a-8321-66A45C910AB5} {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe -
Deletes itself 1 IoCs
pid Process 2288 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1668 {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe 2824 {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe 2912 {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe 3068 {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe 2696 {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe 1208 {21AC9AF4-431C-4c53-8109-51E193F51252}.exe 1092 {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe 1184 {E908C635-B82B-4d86-BB0E-EAD8957C0602}.exe 1480 {5C144A79-AC08-40a4-9916-1338241C0225}.exe 276 {358D9C8A-AB22-4f4e-960A-6DD1A0C41483}.exe 1860 {D48C216E-E89F-489c-B78F-CD4C591D6D47}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe File created C:\Windows\{0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe File created C:\Windows\{21AC9AF4-431C-4c53-8109-51E193F51252}.exe {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe File created C:\Windows\{E908C635-B82B-4d86-BB0E-EAD8957C0602}.exe {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe File created C:\Windows\{5C144A79-AC08-40a4-9916-1338241C0225}.exe {E908C635-B82B-4d86-BB0E-EAD8957C0602}.exe File created C:\Windows\{72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe 4077c6a7639ca0exeexe_JC.exe File created C:\Windows\{7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe File created C:\Windows\{B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe File created C:\Windows\{08CDB2F8-CA73-473a-AB92-575C289704D8}.exe {21AC9AF4-431C-4c53-8109-51E193F51252}.exe File created C:\Windows\{358D9C8A-AB22-4f4e-960A-6DD1A0C41483}.exe {5C144A79-AC08-40a4-9916-1338241C0225}.exe File created C:\Windows\{D48C216E-E89F-489c-B78F-CD4C591D6D47}.exe {358D9C8A-AB22-4f4e-960A-6DD1A0C41483}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1400 4077c6a7639ca0exeexe_JC.exe Token: SeIncBasePriorityPrivilege 1668 {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe Token: SeIncBasePriorityPrivilege 2824 {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe Token: SeIncBasePriorityPrivilege 2912 {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe Token: SeIncBasePriorityPrivilege 3068 {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe Token: SeIncBasePriorityPrivilege 2696 {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe Token: SeIncBasePriorityPrivilege 1208 {21AC9AF4-431C-4c53-8109-51E193F51252}.exe Token: SeIncBasePriorityPrivilege 1092 {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe Token: SeIncBasePriorityPrivilege 1184 {E908C635-B82B-4d86-BB0E-EAD8957C0602}.exe Token: SeIncBasePriorityPrivilege 1480 {5C144A79-AC08-40a4-9916-1338241C0225}.exe Token: SeIncBasePriorityPrivilege 276 {358D9C8A-AB22-4f4e-960A-6DD1A0C41483}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1668 1400 4077c6a7639ca0exeexe_JC.exe 28 PID 1400 wrote to memory of 1668 1400 4077c6a7639ca0exeexe_JC.exe 28 PID 1400 wrote to memory of 1668 1400 4077c6a7639ca0exeexe_JC.exe 28 PID 1400 wrote to memory of 1668 1400 4077c6a7639ca0exeexe_JC.exe 28 PID 1400 wrote to memory of 2288 1400 4077c6a7639ca0exeexe_JC.exe 29 PID 1400 wrote to memory of 2288 1400 4077c6a7639ca0exeexe_JC.exe 29 PID 1400 wrote to memory of 2288 1400 4077c6a7639ca0exeexe_JC.exe 29 PID 1400 wrote to memory of 2288 1400 4077c6a7639ca0exeexe_JC.exe 29 PID 1668 wrote to memory of 2824 1668 {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe 32 PID 1668 wrote to memory of 2824 1668 {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe 32 PID 1668 wrote to memory of 2824 1668 {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe 32 PID 1668 wrote to memory of 2824 1668 {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe 32 PID 1668 wrote to memory of 1692 1668 {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe 33 PID 1668 wrote to memory of 1692 1668 {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe 33 PID 1668 wrote to memory of 1692 1668 {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe 33 PID 1668 wrote to memory of 1692 1668 {72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe 33 PID 2824 wrote to memory of 2912 2824 {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe 34 PID 2824 wrote to memory of 2912 2824 {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe 34 PID 2824 wrote to memory of 2912 2824 {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe 34 PID 2824 wrote to memory of 2912 2824 {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe 34 PID 2824 wrote to memory of 2940 2824 {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe 35 PID 2824 wrote to memory of 2940 2824 {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe 35 PID 2824 wrote to memory of 2940 2824 {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe 35 PID 2824 wrote to memory of 2940 2824 {7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe 35 PID 2912 wrote to memory of 3068 2912 {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe 36 PID 2912 wrote to memory of 3068 2912 {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe 36 PID 2912 wrote to memory of 3068 2912 {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe 36 PID 2912 wrote to memory of 3068 2912 {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe 36 PID 2912 wrote to memory of 2836 2912 {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe 37 PID 2912 wrote to memory of 2836 2912 {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe 37 PID 2912 wrote to memory of 2836 2912 {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe 37 PID 2912 wrote to memory of 2836 2912 {B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe 37 PID 3068 wrote to memory of 2696 3068 {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe 38 PID 3068 wrote to memory of 2696 3068 {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe 38 PID 3068 wrote to memory of 2696 3068 {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe 38 PID 3068 wrote to memory of 2696 3068 {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe 38 PID 3068 wrote to memory of 2728 3068 {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe 39 PID 3068 wrote to memory of 2728 3068 {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe 39 PID 3068 wrote to memory of 2728 3068 {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe 39 PID 3068 wrote to memory of 2728 3068 {01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe 39 PID 2696 wrote to memory of 1208 2696 {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe 40 PID 2696 wrote to memory of 1208 2696 {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe 40 PID 2696 wrote to memory of 1208 2696 {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe 40 PID 2696 wrote to memory of 1208 2696 {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe 40 PID 2696 wrote to memory of 2740 2696 {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe 41 PID 2696 wrote to memory of 2740 2696 {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe 41 PID 2696 wrote to memory of 2740 2696 {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe 41 PID 2696 wrote to memory of 2740 2696 {0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe 41 PID 1208 wrote to memory of 1092 1208 {21AC9AF4-431C-4c53-8109-51E193F51252}.exe 42 PID 1208 wrote to memory of 1092 1208 {21AC9AF4-431C-4c53-8109-51E193F51252}.exe 42 PID 1208 wrote to memory of 1092 1208 {21AC9AF4-431C-4c53-8109-51E193F51252}.exe 42 PID 1208 wrote to memory of 1092 1208 {21AC9AF4-431C-4c53-8109-51E193F51252}.exe 42 PID 1208 wrote to memory of 696 1208 {21AC9AF4-431C-4c53-8109-51E193F51252}.exe 43 PID 1208 wrote to memory of 696 1208 {21AC9AF4-431C-4c53-8109-51E193F51252}.exe 43 PID 1208 wrote to memory of 696 1208 {21AC9AF4-431C-4c53-8109-51E193F51252}.exe 43 PID 1208 wrote to memory of 696 1208 {21AC9AF4-431C-4c53-8109-51E193F51252}.exe 43 PID 1092 wrote to memory of 1184 1092 {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe 44 PID 1092 wrote to memory of 1184 1092 {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe 44 PID 1092 wrote to memory of 1184 1092 {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe 44 PID 1092 wrote to memory of 1184 1092 {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe 44 PID 1092 wrote to memory of 1500 1092 {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe 45 PID 1092 wrote to memory of 1500 1092 {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe 45 PID 1092 wrote to memory of 1500 1092 {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe 45 PID 1092 wrote to memory of 1500 1092 {08CDB2F8-CA73-473a-AB92-575C289704D8}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\4077c6a7639ca0exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\4077c6a7639ca0exeexe_JC.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\{72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exeC:\Windows\{72D5224E-3FD1-4ac0-8A00-242A4FA1097E}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\{7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exeC:\Windows\{7795410D-E66F-4ec6-AA5B-E04A4B07D65E}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\{B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exeC:\Windows\{B812B8AD-CE49-4d5a-8321-66A45C910AB5}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\{01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exeC:\Windows\{01DF9558-BF6E-46b9-AE1C-F6D6D21AA97E}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\{0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exeC:\Windows\{0D293CFF-55A3-4f94-9493-1205E43B7E1C}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\{21AC9AF4-431C-4c53-8109-51E193F51252}.exeC:\Windows\{21AC9AF4-431C-4c53-8109-51E193F51252}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\{08CDB2F8-CA73-473a-AB92-575C289704D8}.exeC:\Windows\{08CDB2F8-CA73-473a-AB92-575C289704D8}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\{E908C635-B82B-4d86-BB0E-EAD8957C0602}.exeC:\Windows\{E908C635-B82B-4d86-BB0E-EAD8957C0602}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1184 -
C:\Windows\{5C144A79-AC08-40a4-9916-1338241C0225}.exeC:\Windows\{5C144A79-AC08-40a4-9916-1338241C0225}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\{358D9C8A-AB22-4f4e-960A-6DD1A0C41483}.exeC:\Windows\{358D9C8A-AB22-4f4e-960A-6DD1A0C41483}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:276 -
C:\Windows\{D48C216E-E89F-489c-B78F-CD4C591D6D47}.exeC:\Windows\{D48C216E-E89F-489c-B78F-CD4C591D6D47}.exe12⤵
- Executes dropped EXE
PID:1860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{358D9~1.EXE > nul12⤵PID:1204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C144~1.EXE > nul11⤵PID:2480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E908C~1.EXE > nul10⤵PID:1812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{08CDB~1.EXE > nul9⤵PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{21AC9~1.EXE > nul8⤵PID:696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D293~1.EXE > nul7⤵PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{01DF9~1.EXE > nul6⤵PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B812B~1.EXE > nul5⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{77954~1.EXE > nul4⤵PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72D52~1.EXE > nul3⤵PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\4077C6~1.EXE > nul2⤵
- Deletes itself
PID:2288
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD58535d58a9c22e3a3af54972520353c0b
SHA1f934dc58d96e780a728a242b62ce0dbfacf3958a
SHA256ac222e26c92ff88ab86b827894eb7160b2c20c68f1201f51a37ed73aad26427d
SHA51264dd77cc9e05d3c0a5177f51cca93642553b6bcf92594dc63469652781992233ea23ff83f74fe19b20ef9db3a36e35ef4c8de9dc7ae615112a9ddd6fbce055dc
-
Filesize
168KB
MD58535d58a9c22e3a3af54972520353c0b
SHA1f934dc58d96e780a728a242b62ce0dbfacf3958a
SHA256ac222e26c92ff88ab86b827894eb7160b2c20c68f1201f51a37ed73aad26427d
SHA51264dd77cc9e05d3c0a5177f51cca93642553b6bcf92594dc63469652781992233ea23ff83f74fe19b20ef9db3a36e35ef4c8de9dc7ae615112a9ddd6fbce055dc
-
Filesize
168KB
MD5f249c5feb36638a627e0b9ab247f21f0
SHA1090510daf85ad625aa73e713ddab32c216a8cc15
SHA256a012a522eca38180423943ee4a81f0ca50a0897e1510551505b7c11628f1eded
SHA5121701729f66c3e6a1126e7120cbec4c62b842edf3774da59a1570a9a073a11f312a81e9f26e70a5eacb6c3d223848206ed21f5dec19ad4b972a9f068f6e60631b
-
Filesize
168KB
MD5f249c5feb36638a627e0b9ab247f21f0
SHA1090510daf85ad625aa73e713ddab32c216a8cc15
SHA256a012a522eca38180423943ee4a81f0ca50a0897e1510551505b7c11628f1eded
SHA5121701729f66c3e6a1126e7120cbec4c62b842edf3774da59a1570a9a073a11f312a81e9f26e70a5eacb6c3d223848206ed21f5dec19ad4b972a9f068f6e60631b
-
Filesize
168KB
MD537c454f22e711914fe8635ef4df21ac4
SHA165e28ea54ae4058d5bb08a617a8701a0c7c87dd8
SHA25668525a124d63ea43fe785916d5fdd47b1e9fe0255755025e34a247a61ba55131
SHA5128cdadbfcab555b6b8b6ea0472154bf5833fe71d764c94ad5a2134582f1f8dfbb5c2f680ae8afcc19f20cb19a7d075472da242ceb0c6bd54c23023c968da4d426
-
Filesize
168KB
MD537c454f22e711914fe8635ef4df21ac4
SHA165e28ea54ae4058d5bb08a617a8701a0c7c87dd8
SHA25668525a124d63ea43fe785916d5fdd47b1e9fe0255755025e34a247a61ba55131
SHA5128cdadbfcab555b6b8b6ea0472154bf5833fe71d764c94ad5a2134582f1f8dfbb5c2f680ae8afcc19f20cb19a7d075472da242ceb0c6bd54c23023c968da4d426
-
Filesize
168KB
MD5682862a36574b51476603338e276f235
SHA1bbb36c89f9155c1786f9328573a25a98a00f5f91
SHA2563a75c3937804fce4b607268c92e7f9c0d33cc1c25d878fb99e243a543e8647dc
SHA5122b0174eb20af6e7f2d967d27ecfa851b2867ab91ee11b2825a4b3cbddeb9e55a31b232bc4903ea63fdcf0271dc6365f2d98a41800cbd81efd43a9d5f3f96f125
-
Filesize
168KB
MD5682862a36574b51476603338e276f235
SHA1bbb36c89f9155c1786f9328573a25a98a00f5f91
SHA2563a75c3937804fce4b607268c92e7f9c0d33cc1c25d878fb99e243a543e8647dc
SHA5122b0174eb20af6e7f2d967d27ecfa851b2867ab91ee11b2825a4b3cbddeb9e55a31b232bc4903ea63fdcf0271dc6365f2d98a41800cbd81efd43a9d5f3f96f125
-
Filesize
168KB
MD547c426267db0cc97a860c22b6144f22e
SHA164ad914de9e191c06e3f52a80aae19d874b23db2
SHA2566616b8677ab8c6ea1fadb8955e386044c47b039954f28c3cbca7693be7acc239
SHA51287478768cc5479966c9b881db4698426b6a94adaa80e9630edca17c1a2b3d1c3e4f8ce2353affb5072ee2dba65c9e174fbbdc7819003737bdc18e2657490d9b7
-
Filesize
168KB
MD547c426267db0cc97a860c22b6144f22e
SHA164ad914de9e191c06e3f52a80aae19d874b23db2
SHA2566616b8677ab8c6ea1fadb8955e386044c47b039954f28c3cbca7693be7acc239
SHA51287478768cc5479966c9b881db4698426b6a94adaa80e9630edca17c1a2b3d1c3e4f8ce2353affb5072ee2dba65c9e174fbbdc7819003737bdc18e2657490d9b7
-
Filesize
168KB
MD5a6a9bec62f5fee3ebe22b63be107a22e
SHA16efe666067828e50360520ca9634f8e29bde4677
SHA2561dd1b6027def3636b09a5f16e832ddf6de7f1f97e2f7d85583d7e53643ee7a0f
SHA51229e1f72a6e04907b6a60443c176547190df392910ca463a548025f82055377bc8efbd0dccf9d5bffa1c0b9d3200e226c175ac6ca20c0a270354c8126a41e8a52
-
Filesize
168KB
MD5a6a9bec62f5fee3ebe22b63be107a22e
SHA16efe666067828e50360520ca9634f8e29bde4677
SHA2561dd1b6027def3636b09a5f16e832ddf6de7f1f97e2f7d85583d7e53643ee7a0f
SHA51229e1f72a6e04907b6a60443c176547190df392910ca463a548025f82055377bc8efbd0dccf9d5bffa1c0b9d3200e226c175ac6ca20c0a270354c8126a41e8a52
-
Filesize
168KB
MD5370d56ebe731c14cc6d42b4645ae344f
SHA11676a877269283234eb537304e560eba053f81cd
SHA256b76285f608461c0d98e6b82f56d75fa8bc7c0c2de3999e0e6dc7f85f030994c7
SHA512f2cdeb24133e8bd38817ac1eee24f06d40589939e32c1339800208b104ac5fdae57b15dbc40f0d5c3d13ef201d795fb57108add3cb1d6a7f27061d32850ba711
-
Filesize
168KB
MD5370d56ebe731c14cc6d42b4645ae344f
SHA11676a877269283234eb537304e560eba053f81cd
SHA256b76285f608461c0d98e6b82f56d75fa8bc7c0c2de3999e0e6dc7f85f030994c7
SHA512f2cdeb24133e8bd38817ac1eee24f06d40589939e32c1339800208b104ac5fdae57b15dbc40f0d5c3d13ef201d795fb57108add3cb1d6a7f27061d32850ba711
-
Filesize
168KB
MD5370d56ebe731c14cc6d42b4645ae344f
SHA11676a877269283234eb537304e560eba053f81cd
SHA256b76285f608461c0d98e6b82f56d75fa8bc7c0c2de3999e0e6dc7f85f030994c7
SHA512f2cdeb24133e8bd38817ac1eee24f06d40589939e32c1339800208b104ac5fdae57b15dbc40f0d5c3d13ef201d795fb57108add3cb1d6a7f27061d32850ba711
-
Filesize
168KB
MD5339737ddd9282f7fcb2bc5e5ce6aeb58
SHA1344e940edc9b4a7d55caa4cf0efa07baa258d2fb
SHA256bc7d7e100cde756960325bce1700ac0dcffb302ea57b17c808640e5bee6e7356
SHA5129dd4fac98b146dc10bf2f0a6cdf131864fae0801df80e07e99dfee6414c5bf6f0893e26f98f80f3ba5cd47d58040e9c972e85662f3d0fe2784ab99232077d8d0
-
Filesize
168KB
MD5339737ddd9282f7fcb2bc5e5ce6aeb58
SHA1344e940edc9b4a7d55caa4cf0efa07baa258d2fb
SHA256bc7d7e100cde756960325bce1700ac0dcffb302ea57b17c808640e5bee6e7356
SHA5129dd4fac98b146dc10bf2f0a6cdf131864fae0801df80e07e99dfee6414c5bf6f0893e26f98f80f3ba5cd47d58040e9c972e85662f3d0fe2784ab99232077d8d0
-
Filesize
168KB
MD5a7b14d3b03a7268c209e47d063630ff2
SHA12212b0839661aa6f375b49dcb649c6cdecd86c9c
SHA25626cf632b78a9128c702a57bae8151e5a0bd162a8063705e525ef856a461ef40a
SHA512fa377ff2c3df087a214f1bbf26f25ea5f54211bef0589d76b77fb20190f1e00137eccbdf96a8787ab9342a666d2071f16e79cc7656403241ccdc5e54f77f6915
-
Filesize
168KB
MD5a7b14d3b03a7268c209e47d063630ff2
SHA12212b0839661aa6f375b49dcb649c6cdecd86c9c
SHA25626cf632b78a9128c702a57bae8151e5a0bd162a8063705e525ef856a461ef40a
SHA512fa377ff2c3df087a214f1bbf26f25ea5f54211bef0589d76b77fb20190f1e00137eccbdf96a8787ab9342a666d2071f16e79cc7656403241ccdc5e54f77f6915
-
Filesize
168KB
MD5de815b6645981fddebfaf2c5b3ffa251
SHA19fa58a83887b6335adc6d841e872110d5712c876
SHA2569e7b7106fa272668393743ed617e40ae77a4c4e5bdd7087a12eff4087cb842cb
SHA5129cc298012db1385f1a86b4d7e4ac9e9064b702bb8f4a161d23888689343ad55d591aaea3539fd293307b3f91d445bfb4f3ac18ae471d2f03d7d68f7e7950fee7
-
Filesize
168KB
MD57454384b7bd244b09716148eda00dc73
SHA1a920ac13ee6307456da8b72aff42874d9c234868
SHA256e5051278c4a7b597ca7dc951579a36490380b3956de5cb3a47a4f535d124b618
SHA512ac15833b636fec64527de2a6f4d0f338f40cd8b44767529f23edfda506a554caa70c102538c0779aefb10314435d525c52d23fd11fcdf70cc10261803e8c783c
-
Filesize
168KB
MD57454384b7bd244b09716148eda00dc73
SHA1a920ac13ee6307456da8b72aff42874d9c234868
SHA256e5051278c4a7b597ca7dc951579a36490380b3956de5cb3a47a4f535d124b618
SHA512ac15833b636fec64527de2a6f4d0f338f40cd8b44767529f23edfda506a554caa70c102538c0779aefb10314435d525c52d23fd11fcdf70cc10261803e8c783c