Analysis
-
max time kernel
149s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe
Resource
win10v2004-20240419-en
General
-
Target
c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe
-
Size
89KB
-
MD5
5c1b52d0260ac8c8bad8eaadb2ebcf2b
-
SHA1
2ba82c58b29187280fd2c3fa4135d5a9e21dec41
-
SHA256
c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0
-
SHA512
3483db971c72c551583432556557aaf6c96338c75af9bfb4adf81beb64c8801be94ce5bbdddd3d711cd81528aade75a8d3b0d324387244b852badf60a191020e
-
SSDEEP
768:Qvw9816vhKQLrop4/wQRNrfrunMxVFA3b7gl5:YEGh0opl2unMxVS3HgX
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}\stubpath = "C:\\Windows\\{06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe" {155D1377-0448-498b-93A2-55978C59B173}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2EC1196B-0312-4dcf-9E0F-F00064AABE87}\stubpath = "C:\\Windows\\{2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe" {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE868E72-7FCA-4549-B39D-02F1BADE6BCB}\stubpath = "C:\\Windows\\{FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe" {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DE777E37-B003-4385-8C91-DBBDA6CFC2F2}\stubpath = "C:\\Windows\\{DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe" {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6A3EBC30-4963-41db-BFCB-A360E3C50676} {DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69217530-D852-4fa4-99CB-7A0F1950EE1F} {6A3EBC30-4963-41db-BFCB-A360E3C50676}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{155D1377-0448-498b-93A2-55978C59B173} c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{155D1377-0448-498b-93A2-55978C59B173}\stubpath = "C:\\Windows\\{155D1377-0448-498b-93A2-55978C59B173}.exe" c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92F9F56C-25B8-499c-9949-2C629F206835}\stubpath = "C:\\Windows\\{92F9F56C-25B8-499c-9949-2C629F206835}.exe" {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F32C732-1145-4b5b-BEFC-99F20C4ED80E}\stubpath = "C:\\Windows\\{3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe" {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5CAB0878-8D0D-4b57-925D-1A2A6D918319}\stubpath = "C:\\Windows\\{5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe" {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6A3EBC30-4963-41db-BFCB-A360E3C50676}\stubpath = "C:\\Windows\\{6A3EBC30-4963-41db-BFCB-A360E3C50676}.exe" {DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92F9F56C-25B8-499c-9949-2C629F206835} {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5D5C966-AC01-457a-B749-838366FB065A}\stubpath = "C:\\Windows\\{B5D5C966-AC01-457a-B749-838366FB065A}.exe" {92F9F56C-25B8-499c-9949-2C629F206835}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}\stubpath = "C:\\Windows\\{D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe" {B5D5C966-AC01-457a-B749-838366FB065A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F32C732-1145-4b5b-BEFC-99F20C4ED80E} {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2EC1196B-0312-4dcf-9E0F-F00064AABE87} {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD} {155D1377-0448-498b-93A2-55978C59B173}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5D5C966-AC01-457a-B749-838366FB065A} {92F9F56C-25B8-499c-9949-2C629F206835}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D8E60AFD-D2BB-4407-B10C-CB0CB32247C7} {B5D5C966-AC01-457a-B749-838366FB065A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE868E72-7FCA-4549-B39D-02F1BADE6BCB} {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5CAB0878-8D0D-4b57-925D-1A2A6D918319} {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DE777E37-B003-4385-8C91-DBBDA6CFC2F2} {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69217530-D852-4fa4-99CB-7A0F1950EE1F}\stubpath = "C:\\Windows\\{69217530-D852-4fa4-99CB-7A0F1950EE1F}.exe" {6A3EBC30-4963-41db-BFCB-A360E3C50676}.exe -
Executes dropped EXE 12 IoCs
pid Process 4520 {155D1377-0448-498b-93A2-55978C59B173}.exe 4768 {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe 968 {92F9F56C-25B8-499c-9949-2C629F206835}.exe 5000 {B5D5C966-AC01-457a-B749-838366FB065A}.exe 3040 {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe 3652 {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe 4152 {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe 2632 {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe 3136 {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe 224 {DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe 3768 {6A3EBC30-4963-41db-BFCB-A360E3C50676}.exe 4388 {69217530-D852-4fa4-99CB-7A0F1950EE1F}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{6A3EBC30-4963-41db-BFCB-A360E3C50676}.exe {DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe File created C:\Windows\{69217530-D852-4fa4-99CB-7A0F1950EE1F}.exe {6A3EBC30-4963-41db-BFCB-A360E3C50676}.exe File created C:\Windows\{92F9F56C-25B8-499c-9949-2C629F206835}.exe {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe File created C:\Windows\{3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe File created C:\Windows\{5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe File created C:\Windows\{DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe File created C:\Windows\{2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe File created C:\Windows\{FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe File created C:\Windows\{155D1377-0448-498b-93A2-55978C59B173}.exe c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe File created C:\Windows\{06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe {155D1377-0448-498b-93A2-55978C59B173}.exe File created C:\Windows\{B5D5C966-AC01-457a-B749-838366FB065A}.exe {92F9F56C-25B8-499c-9949-2C629F206835}.exe File created C:\Windows\{D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe {B5D5C966-AC01-457a-B749-838366FB065A}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3020 c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe Token: SeIncBasePriorityPrivilege 4520 {155D1377-0448-498b-93A2-55978C59B173}.exe Token: SeIncBasePriorityPrivilege 4768 {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe Token: SeIncBasePriorityPrivilege 968 {92F9F56C-25B8-499c-9949-2C629F206835}.exe Token: SeIncBasePriorityPrivilege 5000 {B5D5C966-AC01-457a-B749-838366FB065A}.exe Token: SeIncBasePriorityPrivilege 3040 {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe Token: SeIncBasePriorityPrivilege 3652 {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe Token: SeIncBasePriorityPrivilege 4152 {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe Token: SeIncBasePriorityPrivilege 2632 {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe Token: SeIncBasePriorityPrivilege 3136 {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe Token: SeIncBasePriorityPrivilege 224 {DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe Token: SeIncBasePriorityPrivilege 3768 {6A3EBC30-4963-41db-BFCB-A360E3C50676}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3020 wrote to memory of 4520 3020 c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe 97 PID 3020 wrote to memory of 4520 3020 c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe 97 PID 3020 wrote to memory of 4520 3020 c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe 97 PID 3020 wrote to memory of 1416 3020 c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe 98 PID 3020 wrote to memory of 1416 3020 c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe 98 PID 3020 wrote to memory of 1416 3020 c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe 98 PID 4520 wrote to memory of 4768 4520 {155D1377-0448-498b-93A2-55978C59B173}.exe 99 PID 4520 wrote to memory of 4768 4520 {155D1377-0448-498b-93A2-55978C59B173}.exe 99 PID 4520 wrote to memory of 4768 4520 {155D1377-0448-498b-93A2-55978C59B173}.exe 99 PID 4520 wrote to memory of 3628 4520 {155D1377-0448-498b-93A2-55978C59B173}.exe 100 PID 4520 wrote to memory of 3628 4520 {155D1377-0448-498b-93A2-55978C59B173}.exe 100 PID 4520 wrote to memory of 3628 4520 {155D1377-0448-498b-93A2-55978C59B173}.exe 100 PID 4768 wrote to memory of 968 4768 {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe 103 PID 4768 wrote to memory of 968 4768 {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe 103 PID 4768 wrote to memory of 968 4768 {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe 103 PID 4768 wrote to memory of 2340 4768 {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe 104 PID 4768 wrote to memory of 2340 4768 {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe 104 PID 4768 wrote to memory of 2340 4768 {06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe 104 PID 968 wrote to memory of 5000 968 {92F9F56C-25B8-499c-9949-2C629F206835}.exe 105 PID 968 wrote to memory of 5000 968 {92F9F56C-25B8-499c-9949-2C629F206835}.exe 105 PID 968 wrote to memory of 5000 968 {92F9F56C-25B8-499c-9949-2C629F206835}.exe 105 PID 968 wrote to memory of 2856 968 {92F9F56C-25B8-499c-9949-2C629F206835}.exe 106 PID 968 wrote to memory of 2856 968 {92F9F56C-25B8-499c-9949-2C629F206835}.exe 106 PID 968 wrote to memory of 2856 968 {92F9F56C-25B8-499c-9949-2C629F206835}.exe 106 PID 5000 wrote to memory of 3040 5000 {B5D5C966-AC01-457a-B749-838366FB065A}.exe 107 PID 5000 wrote to memory of 3040 5000 {B5D5C966-AC01-457a-B749-838366FB065A}.exe 107 PID 5000 wrote to memory of 3040 5000 {B5D5C966-AC01-457a-B749-838366FB065A}.exe 107 PID 5000 wrote to memory of 2784 5000 {B5D5C966-AC01-457a-B749-838366FB065A}.exe 108 PID 5000 wrote to memory of 2784 5000 {B5D5C966-AC01-457a-B749-838366FB065A}.exe 108 PID 5000 wrote to memory of 2784 5000 {B5D5C966-AC01-457a-B749-838366FB065A}.exe 108 PID 3040 wrote to memory of 3652 3040 {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe 114 PID 3040 wrote to memory of 3652 3040 {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe 114 PID 3040 wrote to memory of 3652 3040 {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe 114 PID 3040 wrote to memory of 4384 3040 {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe 115 PID 3040 wrote to memory of 4384 3040 {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe 115 PID 3040 wrote to memory of 4384 3040 {D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe 115 PID 3652 wrote to memory of 4152 3652 {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe 116 PID 3652 wrote to memory of 4152 3652 {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe 116 PID 3652 wrote to memory of 4152 3652 {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe 116 PID 3652 wrote to memory of 4352 3652 {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe 117 PID 3652 wrote to memory of 4352 3652 {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe 117 PID 3652 wrote to memory of 4352 3652 {3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe 117 PID 4152 wrote to memory of 2632 4152 {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe 118 PID 4152 wrote to memory of 2632 4152 {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe 118 PID 4152 wrote to memory of 2632 4152 {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe 118 PID 4152 wrote to memory of 2372 4152 {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe 119 PID 4152 wrote to memory of 2372 4152 {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe 119 PID 4152 wrote to memory of 2372 4152 {2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe 119 PID 2632 wrote to memory of 3136 2632 {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe 126 PID 2632 wrote to memory of 3136 2632 {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe 126 PID 2632 wrote to memory of 3136 2632 {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe 126 PID 2632 wrote to memory of 3400 2632 {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe 127 PID 2632 wrote to memory of 3400 2632 {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe 127 PID 2632 wrote to memory of 3400 2632 {FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe 127 PID 3136 wrote to memory of 224 3136 {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe 128 PID 3136 wrote to memory of 224 3136 {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe 128 PID 3136 wrote to memory of 224 3136 {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe 128 PID 3136 wrote to memory of 2784 3136 {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe 129 PID 3136 wrote to memory of 2784 3136 {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe 129 PID 3136 wrote to memory of 2784 3136 {5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe 129 PID 224 wrote to memory of 3768 224 {DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe 130 PID 224 wrote to memory of 3768 224 {DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe 130 PID 224 wrote to memory of 3768 224 {DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe 130 PID 224 wrote to memory of 848 224 {DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe"C:\Users\Admin\AppData\Local\Temp\c83f5af0237f0f5b624a5f7917b475f77417be141c188c94fb113b13441fc7f0.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\{155D1377-0448-498b-93A2-55978C59B173}.exeC:\Windows\{155D1377-0448-498b-93A2-55978C59B173}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\{06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exeC:\Windows\{06D0D67D-0ED8-40fa-A4CC-F6BC28BC71AD}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\{92F9F56C-25B8-499c-9949-2C629F206835}.exeC:\Windows\{92F9F56C-25B8-499c-9949-2C629F206835}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\{B5D5C966-AC01-457a-B749-838366FB065A}.exeC:\Windows\{B5D5C966-AC01-457a-B749-838366FB065A}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\{D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exeC:\Windows\{D8E60AFD-D2BB-4407-B10C-CB0CB32247C7}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\{3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exeC:\Windows\{3F32C732-1145-4b5b-BEFC-99F20C4ED80E}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\{2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exeC:\Windows\{2EC1196B-0312-4dcf-9E0F-F00064AABE87}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\{FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exeC:\Windows\{FE868E72-7FCA-4549-B39D-02F1BADE6BCB}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\{5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exeC:\Windows\{5CAB0878-8D0D-4b57-925D-1A2A6D918319}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\{DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exeC:\Windows\{DE777E37-B003-4385-8C91-DBBDA6CFC2F2}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\{6A3EBC30-4963-41db-BFCB-A360E3C50676}.exeC:\Windows\{6A3EBC30-4963-41db-BFCB-A360E3C50676}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3768 -
C:\Windows\{69217530-D852-4fa4-99CB-7A0F1950EE1F}.exeC:\Windows\{69217530-D852-4fa4-99CB-7A0F1950EE1F}.exe13⤵
- Executes dropped EXE
PID:4388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6A3EB~1.EXE > nul13⤵PID:3616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DE777~1.EXE > nul12⤵PID:848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5CAB0~1.EXE > nul11⤵PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FE868~1.EXE > nul10⤵PID:3400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2EC11~1.EXE > nul9⤵PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3F32C~1.EXE > nul8⤵PID:4352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D8E60~1.EXE > nul7⤵PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5D5C~1.EXE > nul6⤵PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{92F9F~1.EXE > nul5⤵PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06D0D~1.EXE > nul4⤵PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{155D1~1.EXE > nul3⤵PID:3628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\C83F5A~1.EXE > nul2⤵PID:1416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD52bc82c69fe748750d2c99a10c3654704
SHA1f64bf6ea13313391ec4980e1583f3bef3af75539
SHA25674583631e88dcf904fbb6a0389ec87302d4dffea001dbe5abe5c1a13c69aec6b
SHA5126a132ae3acc2bfc7866520eca4f555f197a4be6658f5f06b60eaa4aeb6c7ac4284c0164fb1507160c09a66af39752c1ef1f29d68a5c95535421f35dda0afb86b
-
Filesize
89KB
MD5a76830bae818e8a60747fc845db90fe2
SHA178da901929f40024bda0566cfa1a3427672c3c1b
SHA2568e44c8d1fa48c6e8411668adcf51ebe633254131ada518022fe6ed3c77831dbd
SHA512216854073b6abcf0faff0495f1749344cf67a36e040e2a9ff780b50882d084dd378b8ce9b4fef0719e975d0458df285bd472c5c2122ddb9783e55fa81ad30425
-
Filesize
89KB
MD5c55c93f616004a5d96d32af1892a79ae
SHA1a97563024e7e1415a8daef0f4ed90dfaf6e7d1f0
SHA25635cc154cef1a778f8f0b625f7867174489bf11bde48c8c9b51c508425a426cf2
SHA512ca8c18f34e389e5a8a57730b87537e819c279accb5f7016b1ce799a8e11d83f8a4bb096bfb44744b65e7a968c9487f3195c93918e62141f3e73beed2d1ad0305
-
Filesize
89KB
MD500cf9c6ea3e29f65c3ff0ab5420c4446
SHA10c3ab65e76f7af74320523a7256587c5b4da15df
SHA2564ad9dd09e95e1deb18ef1706debfcfbf3ff0ca373810f09d701a676540bd4cb7
SHA512fee64629a4aea6b01025ceaa82b44faaee7fc40b0f8c359617000cfb03b969e437a8d276ab3de427dad9c866af2a427753b4582e584c12f47b85b1e2dce0ee5a
-
Filesize
89KB
MD57e4d0dd9d208cfd3cdbbbf1bf4bc8027
SHA1575bbed6fdae2959ecea138a9bb4fb7506b6c2c1
SHA25626fd1960c3aba9c3b5462755379eb6b8c0c9e427a2e3856ed4bbef23947b6fa3
SHA51210eb08290f5dc70e32466bccaf20493799202fe821cda6f17212a55146740095257587a945ff236233837e48db40120f32864a5e3a7b139ae4946198140c179d
-
Filesize
89KB
MD5f63b81a86177857d11a176f049973cbb
SHA15021e5daf52f5c22fd983a05307e9de72219e0ed
SHA2566a3497bc8c3161a0cb2be7a7f4851f8226cd44f1a6edf68bf6ca09cc6b3e3c16
SHA51281410e24aa0b3d5b60815c1747fce0ce74f5b955b5870cf9c0ab0cbb468ba298da217f9a02f7da356b684cc8a7f9a48b11927e81e902d44cd3e7546ec7dbb6c6
-
Filesize
89KB
MD5c0c1f8f1efa3ddaf10d849098acc807c
SHA1a7630ab7000b8a64c437d89b1d587c48809fbb51
SHA2569e39c1039c203360b15afd820d3cdb1f73642030ad2ea5f5ba8c96b94f711a73
SHA51230d2abb82a2fd45c5c2324bc85655c30ed4b4c6e1d93eb4ca574582de9dc3183427f3bb3c0e14e346e149e2d35c5aeab797c05ffe18c71a52705e9923bbd2033
-
Filesize
89KB
MD5ba9875a5bca23a2b185f9de78ae84d8b
SHA10ee742d0d12975cf6b0d8db7e966fbed9563605b
SHA256edf17962e838f0b913023b97fd0df030536e88be0395c26b4fbdad985ba1f7a5
SHA51278d598704894f6210fd6d1c786732ebff6103d2aa098249cc81105f07c6566b0e802ad96f13d5fda74b8115a83b9efde978c4b1a3f306a1e6d4d2d0cfb6a56d4
-
Filesize
89KB
MD5d9da04cbe7e53dff9a3bbb8121840fd7
SHA1026b26c423fbaa7e6da38051d49a607a95ff9b28
SHA256934f5127a2a684f4f0bd4a813472fcf21e12ba327a58147bebaa651e5ed8b821
SHA51245ce211f1d9bafe2874830b9d9c05c10c092fc02e484f7c6cb3bf5e026df9032b5323e347584a885c1e4b6f3e38193375458983103e090964f00fe9740b06a8e
-
Filesize
89KB
MD5e245409a7229290c9c96a27b5f1dfbed
SHA128674e0598f81c62dfad81877344c4edbd09e75c
SHA2561312c8fd04e84e103c03bdf813868f2c8162d14986291711e2dd783390c47b53
SHA5126cf4c40f686ffab7f329b4e8ba4ebc4a90e2713ad490fa4a40efbcdea8292d0c9860a9f698ce90c33b264086d1fdd2569f98b9146c49edb792773c2ac5f87462
-
Filesize
89KB
MD5bf5a258545db3b3671e96335923d7d46
SHA19dbd410a746b2bf999ce1db102331a3bbfe6e890
SHA2560b30866ba0d862d822917b6a4c9d637f173bef175a3b4164f3241c3f96ba40cb
SHA5124a4b713078888294fe4723f65745664b2e7b913494b60750fc542ffd0491a73a46c2d02ff9b610e095af34073c15c9f2b7e43fbc6987f0913cb34b791c80107d
-
Filesize
89KB
MD5538496f4639a10589598185a1cef72fe
SHA1b705ccf06e75319843198fbfc9d5d3aaf21536d1
SHA25635efdadc07e5ec37c0e5b58d2d8730cc5311901cdce970b6eeb5377c01d12f5f
SHA512abb583a85fe5c18f543e64b84be3e21d94ccf2129dc5d4be02757ed7bb2d43950033a2fc03f61d7a635cb488d8d0d728296645e463f356247d61358949a9bfa0