Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe
Resource
win10v2004-20240419-en
General
-
Target
76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe
-
Size
60KB
-
MD5
050297b7a0881653bd1106f8dcb26b52
-
SHA1
7fe98acf18ccbebf6bfe94de85d27d7892c06b93
-
SHA256
76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b
-
SHA512
60961e8d4712d926a945a10811d6ba8eca6919d65457ff85d38a04dfa38efb9ddc17d9431a62b942fb2945f304fdc3e77c10d6a014792009ccf55773b62b0585
-
SSDEEP
768:vvw9816vhKQLroCA4/wQxWMZQcpFM1FgDagXP2TyS1tl7lfqvocqcdT3WVd:nEGh0oCAlwWMZQcpmgDagIyS1loL7Wr
Malware Config
Signatures
-
Detects Windows executables referencing non-Windows User-Agents 11 IoCs
resource yara_rule behavioral1/files/0x000c000000015cb0-5.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x0032000000015d0c-12.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x000d000000015cb0-19.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x0032000000015d24-26.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x0004000000004ed7-33.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x000e000000015cb0-40.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x0005000000004ed7-47.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x000f000000015cb0-54.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x0006000000004ed7-61.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x0010000000015cb0-68.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/files/0x0007000000004ed7-75.dat INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1100D62D-78BF-49f6-B2FE-F4CF048DDA49} 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F6D27D4-C499-41f6-9BAD-67988AC96CBC} {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A} {8304660E-275C-4c9c-BC73-68072E313D9A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}\stubpath = "C:\\Windows\\{4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe" {8304660E-275C-4c9c-BC73-68072E313D9A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF}\stubpath = "C:\\Windows\\{BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF}.exe" {493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EE04869E-65B3-4342-8466-42B9B30620DC}\stubpath = "C:\\Windows\\{EE04869E-65B3-4342-8466-42B9B30620DC}.exe" {13984D2D-120C-49df-B903-0B6D6D81CE23}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1100D62D-78BF-49f6-B2FE-F4CF048DDA49}\stubpath = "C:\\Windows\\{1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe" 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8304660E-275C-4c9c-BC73-68072E313D9A} {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8304660E-275C-4c9c-BC73-68072E313D9A}\stubpath = "C:\\Windows\\{8304660E-275C-4c9c-BC73-68072E313D9A}.exe" {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB}\stubpath = "C:\\Windows\\{493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB}.exe" {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF} {493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F92874FE-7E5D-43f9-A98D-1FB71D5F906E}\stubpath = "C:\\Windows\\{F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe" {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{970D55A3-C94A-4975-B6DA-049F5CC26375} {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{970D55A3-C94A-4975-B6DA-049F5CC26375}\stubpath = "C:\\Windows\\{970D55A3-C94A-4975-B6DA-049F5CC26375}.exe" {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{13984D2D-120C-49df-B903-0B6D6D81CE23} {BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{13984D2D-120C-49df-B903-0B6D6D81CE23}\stubpath = "C:\\Windows\\{13984D2D-120C-49df-B903-0B6D6D81CE23}.exe" {BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EE04869E-65B3-4342-8466-42B9B30620DC} {13984D2D-120C-49df-B903-0B6D6D81CE23}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F6D27D4-C499-41f6-9BAD-67988AC96CBC}\stubpath = "C:\\Windows\\{8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe" {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F92874FE-7E5D-43f9-A98D-1FB71D5F906E} {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9645C7D8-8A70-4460-AD97-1908C3D868C8} {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9645C7D8-8A70-4460-AD97-1908C3D868C8}\stubpath = "C:\\Windows\\{9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe" {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB} {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe -
Deletes itself 1 IoCs
pid Process 2544 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2200 {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe 2604 {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe 2672 {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe 1260 {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe 2784 {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe 2364 {8304660E-275C-4c9c-BC73-68072E313D9A}.exe 868 {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe 816 {493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB}.exe 1168 {BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF}.exe 2348 {13984D2D-120C-49df-B903-0B6D6D81CE23}.exe 1488 {EE04869E-65B3-4342-8466-42B9B30620DC}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe File created C:\Windows\{9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe File created C:\Windows\{8304660E-275C-4c9c-BC73-68072E313D9A}.exe {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe File created C:\Windows\{BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF}.exe {493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB}.exe File created C:\Windows\{493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB}.exe {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe File created C:\Windows\{13984D2D-120C-49df-B903-0B6D6D81CE23}.exe {BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF}.exe File created C:\Windows\{EE04869E-65B3-4342-8466-42B9B30620DC}.exe {13984D2D-120C-49df-B903-0B6D6D81CE23}.exe File created C:\Windows\{8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe File created C:\Windows\{F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe File created C:\Windows\{970D55A3-C94A-4975-B6DA-049F5CC26375}.exe {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe File created C:\Windows\{4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe {8304660E-275C-4c9c-BC73-68072E313D9A}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2740 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe Token: SeIncBasePriorityPrivilege 2200 {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe Token: SeIncBasePriorityPrivilege 2604 {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe Token: SeIncBasePriorityPrivilege 2672 {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe Token: SeIncBasePriorityPrivilege 1260 {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe Token: SeIncBasePriorityPrivilege 2784 {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe Token: SeIncBasePriorityPrivilege 2364 {8304660E-275C-4c9c-BC73-68072E313D9A}.exe Token: SeIncBasePriorityPrivilege 868 {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe Token: SeIncBasePriorityPrivilege 816 {493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB}.exe Token: SeIncBasePriorityPrivilege 1168 {BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF}.exe Token: SeIncBasePriorityPrivilege 2348 {13984D2D-120C-49df-B903-0B6D6D81CE23}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2200 2740 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe 28 PID 2740 wrote to memory of 2200 2740 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe 28 PID 2740 wrote to memory of 2200 2740 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe 28 PID 2740 wrote to memory of 2200 2740 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe 28 PID 2740 wrote to memory of 2544 2740 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe 29 PID 2740 wrote to memory of 2544 2740 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe 29 PID 2740 wrote to memory of 2544 2740 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe 29 PID 2740 wrote to memory of 2544 2740 76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe 29 PID 2200 wrote to memory of 2604 2200 {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe 30 PID 2200 wrote to memory of 2604 2200 {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe 30 PID 2200 wrote to memory of 2604 2200 {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe 30 PID 2200 wrote to memory of 2604 2200 {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe 30 PID 2200 wrote to memory of 2804 2200 {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe 31 PID 2200 wrote to memory of 2804 2200 {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe 31 PID 2200 wrote to memory of 2804 2200 {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe 31 PID 2200 wrote to memory of 2804 2200 {1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe 31 PID 2604 wrote to memory of 2672 2604 {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe 32 PID 2604 wrote to memory of 2672 2604 {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe 32 PID 2604 wrote to memory of 2672 2604 {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe 32 PID 2604 wrote to memory of 2672 2604 {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe 32 PID 2604 wrote to memory of 2916 2604 {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe 33 PID 2604 wrote to memory of 2916 2604 {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe 33 PID 2604 wrote to memory of 2916 2604 {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe 33 PID 2604 wrote to memory of 2916 2604 {8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe 33 PID 2672 wrote to memory of 1260 2672 {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe 36 PID 2672 wrote to memory of 1260 2672 {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe 36 PID 2672 wrote to memory of 1260 2672 {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe 36 PID 2672 wrote to memory of 1260 2672 {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe 36 PID 2672 wrote to memory of 1976 2672 {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe 37 PID 2672 wrote to memory of 1976 2672 {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe 37 PID 2672 wrote to memory of 1976 2672 {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe 37 PID 2672 wrote to memory of 1976 2672 {F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe 37 PID 1260 wrote to memory of 2784 1260 {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe 38 PID 1260 wrote to memory of 2784 1260 {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe 38 PID 1260 wrote to memory of 2784 1260 {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe 38 PID 1260 wrote to memory of 2784 1260 {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe 38 PID 1260 wrote to memory of 2172 1260 {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe 39 PID 1260 wrote to memory of 2172 1260 {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe 39 PID 1260 wrote to memory of 2172 1260 {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe 39 PID 1260 wrote to memory of 2172 1260 {970D55A3-C94A-4975-B6DA-049F5CC26375}.exe 39 PID 2784 wrote to memory of 2364 2784 {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe 40 PID 2784 wrote to memory of 2364 2784 {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe 40 PID 2784 wrote to memory of 2364 2784 {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe 40 PID 2784 wrote to memory of 2364 2784 {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe 40 PID 2784 wrote to memory of 2008 2784 {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe 41 PID 2784 wrote to memory of 2008 2784 {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe 41 PID 2784 wrote to memory of 2008 2784 {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe 41 PID 2784 wrote to memory of 2008 2784 {9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe 41 PID 2364 wrote to memory of 868 2364 {8304660E-275C-4c9c-BC73-68072E313D9A}.exe 42 PID 2364 wrote to memory of 868 2364 {8304660E-275C-4c9c-BC73-68072E313D9A}.exe 42 PID 2364 wrote to memory of 868 2364 {8304660E-275C-4c9c-BC73-68072E313D9A}.exe 42 PID 2364 wrote to memory of 868 2364 {8304660E-275C-4c9c-BC73-68072E313D9A}.exe 42 PID 2364 wrote to memory of 496 2364 {8304660E-275C-4c9c-BC73-68072E313D9A}.exe 43 PID 2364 wrote to memory of 496 2364 {8304660E-275C-4c9c-BC73-68072E313D9A}.exe 43 PID 2364 wrote to memory of 496 2364 {8304660E-275C-4c9c-BC73-68072E313D9A}.exe 43 PID 2364 wrote to memory of 496 2364 {8304660E-275C-4c9c-BC73-68072E313D9A}.exe 43 PID 868 wrote to memory of 816 868 {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe 44 PID 868 wrote to memory of 816 868 {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe 44 PID 868 wrote to memory of 816 868 {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe 44 PID 868 wrote to memory of 816 868 {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe 44 PID 868 wrote to memory of 2092 868 {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe 45 PID 868 wrote to memory of 2092 868 {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe 45 PID 868 wrote to memory of 2092 868 {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe 45 PID 868 wrote to memory of 2092 868 {4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe"C:\Users\Admin\AppData\Local\Temp\76caebcdd20f38d2571928812ac08b4addbbb52a54fbe9778aacd203c7f3fe0b.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\{1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exeC:\Windows\{1100D62D-78BF-49f6-B2FE-F4CF048DDA49}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\{8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exeC:\Windows\{8F6D27D4-C499-41f6-9BAD-67988AC96CBC}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\{F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exeC:\Windows\{F92874FE-7E5D-43f9-A98D-1FB71D5F906E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\{970D55A3-C94A-4975-B6DA-049F5CC26375}.exeC:\Windows\{970D55A3-C94A-4975-B6DA-049F5CC26375}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\{9645C7D8-8A70-4460-AD97-1908C3D868C8}.exeC:\Windows\{9645C7D8-8A70-4460-AD97-1908C3D868C8}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\{8304660E-275C-4c9c-BC73-68072E313D9A}.exeC:\Windows\{8304660E-275C-4c9c-BC73-68072E313D9A}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\{4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exeC:\Windows\{4A0A62BE-63E9-4c7f-B6AD-7934A0443D0A}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\{493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB}.exeC:\Windows\{493E28E6-E3B2-41cf-9DD5-C968E4DAE4FB}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:816 -
C:\Windows\{BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF}.exeC:\Windows\{BB6ABB1A-0685-4ac0-97B6-BAC6808ECFCF}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\{13984D2D-120C-49df-B903-0B6D6D81CE23}.exeC:\Windows\{13984D2D-120C-49df-B903-0B6D6D81CE23}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\{EE04869E-65B3-4342-8466-42B9B30620DC}.exeC:\Windows\{EE04869E-65B3-4342-8466-42B9B30620DC}.exe12⤵
- Executes dropped EXE
PID:1488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{13984~1.EXE > nul12⤵PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BB6AB~1.EXE > nul11⤵PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{493E2~1.EXE > nul10⤵PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4A0A6~1.EXE > nul9⤵PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{83046~1.EXE > nul8⤵PID:496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9645C~1.EXE > nul7⤵PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{970D5~1.EXE > nul6⤵PID:2172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9287~1.EXE > nul5⤵PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F6D2~1.EXE > nul4⤵PID:2916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1100D~1.EXE > nul3⤵PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\76CAEB~1.EXE > nul2⤵
- Deletes itself
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5530b88910ef7b5e3ddda528189180b17
SHA1d3e2d5a96bc5b79512ca2dcacd58e43bfdc221e3
SHA256a3183a34209cbb3f0453580495e8b9be6d03c3ef025d8b908fba06307eddc8f6
SHA51295ff0d33680eefad2c02046f2a5d0f41d359d9bd01f3d5d749132f000030b14b236f2ee6e6f41286b6cd8c9f4f82d571b1b3f0f1b8fb9d83e227baed0107cc97
-
Filesize
60KB
MD5833f924712a8d5e0a41a2a21828cbe2d
SHA16d19589580a8a0b5cc7ddea8a8ef54462ad28753
SHA25600302082a78218169f8b929ad72899f2901f2f766e30d3345b659cebe13b3721
SHA51276a0a1df77b310248779e60d4fa385b5ee95d329e2a11974330d68defaed1987b4ad98343a154806d54a97b65beb7d951fc6f10b0c417655fe089774b30655a8
-
Filesize
60KB
MD5d713f3afa20dcb1326a8019e0005405a
SHA1908469973e11e9507d372b83cb34cdbeb9d1892d
SHA256723be65d85d39def5b3a5df5f06f19ff67d86f091b7b76aa312dbead584e2167
SHA512f5868c95f5506ee23b02e218a0b64c22b3c7e88fc5b9c00d9315ea1f46a3383a380f21e99f9ba1f20d78011fd09131409209f56bd9ad45e7a10bdfc2de429f75
-
Filesize
60KB
MD557bb5630fbe5b329bd25cc91cf178f1c
SHA134ce94a49a8f5a8fd806c0df94168230d782303d
SHA256ced6371dbf58aec79d27b57053fd9d458580d52faff38e40fb6c44f2a204c334
SHA5122f7023164794917b61a07151d6b5d6f9a12cc3d4a1ffa371c0e2912d55ccfadd44d57cf6e8858756c860ef8432287f0b909c6d9a60a65b7e807af5703abe0788
-
Filesize
60KB
MD528b2dec86e503e10cb0286e2cd8bfb04
SHA1bdfe6a95444b1eed02562236c3d39fba00d3e55c
SHA256e706a606ddbecba537e7ee9d02f06af9ba6ea4f78aa72aa69e2611e3b20aa1e8
SHA512ea0515af96e26b44e95269fe97d7f0530f331996a7d39211ce98b31ebf5d360b1acf049dbe043fcda98bec9a9d905514a6646a76269257f8177a453363848b61
-
Filesize
60KB
MD55f9da25daf5f63b87b793d2486369147
SHA188982716220d429e67537a4c9bb40385a825441b
SHA2564fd063d8f198609b175630fc1e737cf0cc020b357f689f37df683c16dbd61748
SHA51206c27e5eb9d976a5ba30ec56e0243d51f02785f20c9a101e04d08b18036c705fc3920f5baeb70755c1c75f154be76d93785728be66505454200bb6b825f29d19
-
Filesize
60KB
MD5e121d4afed08a6e0b5add7a3e61da7e3
SHA102abcd126b3af60c8cddd9f5f1512f520fa4be16
SHA256af1b5a9d9499f7392809fc37750437bb417e8a24ba313e75722c7af55389db2f
SHA512a3597ccccbb253cfe40dbb276dadc0b40c2e7f6c993a502ef05963e719e123337c435abbcb42da6bc10db704d7c3fdfdc2325646dfb4834aa8776ea0c286518a
-
Filesize
60KB
MD503d8ba8eb4f42ee8639457efb40d5b57
SHA1af8ef447b0de61ec06e10702d4d2ceb3cac00d61
SHA25676302bcd167ca9e61e621fa9375775cb3a128808fe42c99a02cec33368f66067
SHA512dfd01be8b105d32057f0b3a9976b9316f92bddb877525d14864971e0edbb09bd7581c3e7f0c2d24b28ac5ef3985f01139d1086f0f8145f0d2a4826ae4ad100d6
-
Filesize
60KB
MD583a8756d1e4de1d916b861916bf6971f
SHA136ea3711e57fb79cf997d238794622c49915769a
SHA2565cc5dcb6be522dcbe5ec57710f69ed6994b13d7169608ead5a124f9ff9f5b846
SHA512be2de7335326b758f04c2e3a89a9cb27bcb8243daac41639f2015e342364965aba86f41eb08ea1999eac2c1b81693f5323a205ace9608d7410b7b9db58fdffb6
-
Filesize
60KB
MD5d021b69aa6fd19810195574cfbfa571d
SHA13940ab67c5657b2ce8a2cd3525ddb0c5003ee47a
SHA2562a110b928e8e6e6d5a60b81565a8f419912593a0aa118b1e9b05986188e409b3
SHA512487e05d525407378e60ecb14c4ce6e78cd34a257988a65161546d04dc40fa70fff6775b9cf3f8fe5fa35d2215725501b423da60969cabee406d8346508f6a7ca
-
Filesize
60KB
MD52cf5bce910afa048ba06ef1b3150f9e8
SHA1cb563b19610503d341a095aba51f6c560ae06e52
SHA256becd0ea257677a3900c5e10f84d94af838a4e590968c4aff0926cf3485835de4
SHA512296bc9a63c1e1cda0ce5c918cd501406c923d848c2df410e5a9093152349774e3c397d05f593663cba33ce380c3b6ea485da05a7f1088bd902b8e13a0dd8078b