Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe
Resource
win10v2004-20240508-en
General
-
Target
867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe
-
Size
60KB
-
MD5
0b2f7e2bd23a01fce020b2eedb65d4a0
-
SHA1
2cf019777c4e0aa6214c96292130dfc405539c9f
-
SHA256
867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae
-
SHA512
dde1a5c339d8a398ac49277c8672506fc229361346ab6bce6484933da60b2f74f7348be040421769a9a737891647b6dbf1e8cd899ae847b96a2dc093d95a0d56
-
SSDEEP
384:vbLwOs8AHsc4sMfwhKQLroBBKT4/CFsrd:vvw9816vhKQLroBu4/wQ
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0}\stubpath = "C:\\Windows\\{ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0}.exe" {4268C26E-3C00-4235-AC86-764258FDD61A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B3D11928-30EF-490a-A643-738EC4E48D50} {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{937E7DC0-A6BF-46fd-A242-1F394AF7692A} {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E5855E7F-847A-4584-9317-619465B0D85E} {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{76904736-A28D-4fe4-BC7B-C22D613BA103} {E5855E7F-847A-4584-9317-619465B0D85E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0AFB429B-6601-4d7c-8E55-F7C54ED11F46} {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B2286E6-DB19-400d-99B5-EF1811058D95} {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4268C26E-3C00-4235-AC86-764258FDD61A} {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{25D41920-9F3C-4cff-A602-ED256D9BEF3D} 867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E5855E7F-847A-4584-9317-619465B0D85E}\stubpath = "C:\\Windows\\{E5855E7F-847A-4584-9317-619465B0D85E}.exe" {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{76904736-A28D-4fe4-BC7B-C22D613BA103}\stubpath = "C:\\Windows\\{76904736-A28D-4fe4-BC7B-C22D613BA103}.exe" {E5855E7F-847A-4584-9317-619465B0D85E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B2286E6-DB19-400d-99B5-EF1811058D95}\stubpath = "C:\\Windows\\{8B2286E6-DB19-400d-99B5-EF1811058D95}.exe" {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B3D11928-30EF-490a-A643-738EC4E48D50}\stubpath = "C:\\Windows\\{B3D11928-30EF-490a-A643-738EC4E48D50}.exe" {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{937E7DC0-A6BF-46fd-A242-1F394AF7692A}\stubpath = "C:\\Windows\\{937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe" {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CAA2F77F-AD53-4748-874D-CBC821FB7E42} {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E8BF828-0DD2-4ac6-886A-FA4BFCFEAA90} {ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E8BF828-0DD2-4ac6-886A-FA4BFCFEAA90}\stubpath = "C:\\Windows\\{3E8BF828-0DD2-4ac6-886A-FA4BFCFEAA90}.exe" {ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{25D41920-9F3C-4cff-A602-ED256D9BEF3D}\stubpath = "C:\\Windows\\{25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe" 867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{215C423D-2AF2-49ca-9AC9-CEEEAF21AC38} {B3D11928-30EF-490a-A643-738EC4E48D50}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}\stubpath = "C:\\Windows\\{215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe" {B3D11928-30EF-490a-A643-738EC4E48D50}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0AFB429B-6601-4d7c-8E55-F7C54ED11F46}\stubpath = "C:\\Windows\\{0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe" {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CAA2F77F-AD53-4748-874D-CBC821FB7E42}\stubpath = "C:\\Windows\\{CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe" {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4268C26E-3C00-4235-AC86-764258FDD61A}\stubpath = "C:\\Windows\\{4268C26E-3C00-4235-AC86-764258FDD61A}.exe" {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0} {4268C26E-3C00-4235-AC86-764258FDD61A}.exe -
Executes dropped EXE 12 IoCs
pid Process 1964 {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe 4540 {B3D11928-30EF-490a-A643-738EC4E48D50}.exe 3288 {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe 3028 {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe 3156 {E5855E7F-847A-4584-9317-619465B0D85E}.exe 3668 {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe 1204 {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe 2420 {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe 2796 {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe 3580 {4268C26E-3C00-4235-AC86-764258FDD61A}.exe 2444 {ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0}.exe 548 {3E8BF828-0DD2-4ac6-886A-FA4BFCFEAA90}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{3E8BF828-0DD2-4ac6-886A-FA4BFCFEAA90}.exe {ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0}.exe File created C:\Windows\{215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe {B3D11928-30EF-490a-A643-738EC4E48D50}.exe File created C:\Windows\{ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0}.exe {4268C26E-3C00-4235-AC86-764258FDD61A}.exe File created C:\Windows\{937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe File created C:\Windows\{E5855E7F-847A-4584-9317-619465B0D85E}.exe {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe File created C:\Windows\{76904736-A28D-4fe4-BC7B-C22D613BA103}.exe {E5855E7F-847A-4584-9317-619465B0D85E}.exe File created C:\Windows\{0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe File created C:\Windows\{CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe File created C:\Windows\{8B2286E6-DB19-400d-99B5-EF1811058D95}.exe {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe File created C:\Windows\{25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe 867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe File created C:\Windows\{B3D11928-30EF-490a-A643-738EC4E48D50}.exe {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe File created C:\Windows\{4268C26E-3C00-4235-AC86-764258FDD61A}.exe {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 760 867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe Token: SeIncBasePriorityPrivilege 1964 {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe Token: SeIncBasePriorityPrivilege 4540 {B3D11928-30EF-490a-A643-738EC4E48D50}.exe Token: SeIncBasePriorityPrivilege 3288 {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe Token: SeIncBasePriorityPrivilege 3028 {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe Token: SeIncBasePriorityPrivilege 3156 {E5855E7F-847A-4584-9317-619465B0D85E}.exe Token: SeIncBasePriorityPrivilege 3668 {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe Token: SeIncBasePriorityPrivilege 1204 {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe Token: SeIncBasePriorityPrivilege 2420 {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe Token: SeIncBasePriorityPrivilege 2796 {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe Token: SeIncBasePriorityPrivilege 3580 {4268C26E-3C00-4235-AC86-764258FDD61A}.exe Token: SeIncBasePriorityPrivilege 2444 {ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 760 wrote to memory of 1964 760 867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe 87 PID 760 wrote to memory of 1964 760 867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe 87 PID 760 wrote to memory of 1964 760 867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe 87 PID 760 wrote to memory of 4948 760 867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe 88 PID 760 wrote to memory of 4948 760 867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe 88 PID 760 wrote to memory of 4948 760 867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe 88 PID 1964 wrote to memory of 4540 1964 {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe 89 PID 1964 wrote to memory of 4540 1964 {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe 89 PID 1964 wrote to memory of 4540 1964 {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe 89 PID 1964 wrote to memory of 728 1964 {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe 90 PID 1964 wrote to memory of 728 1964 {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe 90 PID 1964 wrote to memory of 728 1964 {25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe 90 PID 4540 wrote to memory of 3288 4540 {B3D11928-30EF-490a-A643-738EC4E48D50}.exe 94 PID 4540 wrote to memory of 3288 4540 {B3D11928-30EF-490a-A643-738EC4E48D50}.exe 94 PID 4540 wrote to memory of 3288 4540 {B3D11928-30EF-490a-A643-738EC4E48D50}.exe 94 PID 4540 wrote to memory of 3148 4540 {B3D11928-30EF-490a-A643-738EC4E48D50}.exe 95 PID 4540 wrote to memory of 3148 4540 {B3D11928-30EF-490a-A643-738EC4E48D50}.exe 95 PID 4540 wrote to memory of 3148 4540 {B3D11928-30EF-490a-A643-738EC4E48D50}.exe 95 PID 3288 wrote to memory of 3028 3288 {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe 96 PID 3288 wrote to memory of 3028 3288 {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe 96 PID 3288 wrote to memory of 3028 3288 {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe 96 PID 3288 wrote to memory of 1244 3288 {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe 97 PID 3288 wrote to memory of 1244 3288 {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe 97 PID 3288 wrote to memory of 1244 3288 {215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe 97 PID 3028 wrote to memory of 3156 3028 {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe 98 PID 3028 wrote to memory of 3156 3028 {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe 98 PID 3028 wrote to memory of 3156 3028 {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe 98 PID 3028 wrote to memory of 4004 3028 {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe 99 PID 3028 wrote to memory of 4004 3028 {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe 99 PID 3028 wrote to memory of 4004 3028 {937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe 99 PID 3156 wrote to memory of 3668 3156 {E5855E7F-847A-4584-9317-619465B0D85E}.exe 100 PID 3156 wrote to memory of 3668 3156 {E5855E7F-847A-4584-9317-619465B0D85E}.exe 100 PID 3156 wrote to memory of 3668 3156 {E5855E7F-847A-4584-9317-619465B0D85E}.exe 100 PID 3156 wrote to memory of 1088 3156 {E5855E7F-847A-4584-9317-619465B0D85E}.exe 101 PID 3156 wrote to memory of 1088 3156 {E5855E7F-847A-4584-9317-619465B0D85E}.exe 101 PID 3156 wrote to memory of 1088 3156 {E5855E7F-847A-4584-9317-619465B0D85E}.exe 101 PID 3668 wrote to memory of 1204 3668 {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe 102 PID 3668 wrote to memory of 1204 3668 {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe 102 PID 3668 wrote to memory of 1204 3668 {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe 102 PID 3668 wrote to memory of 2696 3668 {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe 103 PID 3668 wrote to memory of 2696 3668 {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe 103 PID 3668 wrote to memory of 2696 3668 {76904736-A28D-4fe4-BC7B-C22D613BA103}.exe 103 PID 1204 wrote to memory of 2420 1204 {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe 104 PID 1204 wrote to memory of 2420 1204 {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe 104 PID 1204 wrote to memory of 2420 1204 {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe 104 PID 1204 wrote to memory of 2496 1204 {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe 105 PID 1204 wrote to memory of 2496 1204 {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe 105 PID 1204 wrote to memory of 2496 1204 {0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe 105 PID 2420 wrote to memory of 2796 2420 {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe 106 PID 2420 wrote to memory of 2796 2420 {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe 106 PID 2420 wrote to memory of 2796 2420 {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe 106 PID 2420 wrote to memory of 2436 2420 {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe 107 PID 2420 wrote to memory of 2436 2420 {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe 107 PID 2420 wrote to memory of 2436 2420 {CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe 107 PID 2796 wrote to memory of 3580 2796 {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe 108 PID 2796 wrote to memory of 3580 2796 {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe 108 PID 2796 wrote to memory of 3580 2796 {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe 108 PID 2796 wrote to memory of 3724 2796 {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe 109 PID 2796 wrote to memory of 3724 2796 {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe 109 PID 2796 wrote to memory of 3724 2796 {8B2286E6-DB19-400d-99B5-EF1811058D95}.exe 109 PID 3580 wrote to memory of 2444 3580 {4268C26E-3C00-4235-AC86-764258FDD61A}.exe 110 PID 3580 wrote to memory of 2444 3580 {4268C26E-3C00-4235-AC86-764258FDD61A}.exe 110 PID 3580 wrote to memory of 2444 3580 {4268C26E-3C00-4235-AC86-764258FDD61A}.exe 110 PID 3580 wrote to memory of 860 3580 {4268C26E-3C00-4235-AC86-764258FDD61A}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe"C:\Users\Admin\AppData\Local\Temp\867d9af89ca9558e7661b89fdc8d6b3f24545dba6012d27f7b8b387bdd4615ae.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\{25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exeC:\Windows\{25D41920-9F3C-4cff-A602-ED256D9BEF3D}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\{B3D11928-30EF-490a-A643-738EC4E48D50}.exeC:\Windows\{B3D11928-30EF-490a-A643-738EC4E48D50}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\{215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exeC:\Windows\{215C423D-2AF2-49ca-9AC9-CEEEAF21AC38}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\{937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exeC:\Windows\{937E7DC0-A6BF-46fd-A242-1F394AF7692A}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\{E5855E7F-847A-4584-9317-619465B0D85E}.exeC:\Windows\{E5855E7F-847A-4584-9317-619465B0D85E}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\{76904736-A28D-4fe4-BC7B-C22D613BA103}.exeC:\Windows\{76904736-A28D-4fe4-BC7B-C22D613BA103}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\{0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exeC:\Windows\{0AFB429B-6601-4d7c-8E55-F7C54ED11F46}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\{CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exeC:\Windows\{CAA2F77F-AD53-4748-874D-CBC821FB7E42}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\{8B2286E6-DB19-400d-99B5-EF1811058D95}.exeC:\Windows\{8B2286E6-DB19-400d-99B5-EF1811058D95}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\{4268C26E-3C00-4235-AC86-764258FDD61A}.exeC:\Windows\{4268C26E-3C00-4235-AC86-764258FDD61A}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\{ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0}.exeC:\Windows\{ACA9D494-88EA-4272-B4CA-4C91B8B5CBB0}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2444 -
C:\Windows\{3E8BF828-0DD2-4ac6-886A-FA4BFCFEAA90}.exeC:\Windows\{3E8BF828-0DD2-4ac6-886A-FA4BFCFEAA90}.exe13⤵
- Executes dropped EXE
PID:548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ACA9D~1.EXE > nul13⤵PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4268C~1.EXE > nul12⤵PID:860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B228~1.EXE > nul11⤵PID:3724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CAA2F~1.EXE > nul10⤵PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0AFB4~1.EXE > nul9⤵PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{76904~1.EXE > nul8⤵PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E5855~1.EXE > nul7⤵PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{937E7~1.EXE > nul6⤵PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{215C4~1.EXE > nul5⤵PID:1244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B3D11~1.EXE > nul4⤵PID:3148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{25D41~1.EXE > nul3⤵PID:728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\867D9A~1.EXE > nul2⤵PID:4948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD53e1b8d9a774539dcaf127082be94756d
SHA15b4e8621a17c956acae3d23b5f65deaf961fd14b
SHA256bb9c192fc02b974f9bfe02e60b85693f87d494569c3554567f853a912efdbf61
SHA512dbabb5a855b7dce88e9054412c90bb837c8c6825f8a8a4a0fa14456b82874d1b1877b1ef689002dc51243c5209d01c27811c3aa94b40572e7262d1665ee840ef
-
Filesize
60KB
MD5b8303ebb4132042e10781169da4a0799
SHA132bbf6fb67fd3f59aeb183f0aedd1b74d5e66cc0
SHA2566708960e3fed6881505f1826a1982dec1a7ec541493373674e327e96bfd6471e
SHA5122ada436ad88ef1fd56eb5475309fa86239cb5064c29874d722ac651b347dd242f434b64589e03a36024e29814ac7f272fd4a5d9abcc55a8504f58d7eb712633f
-
Filesize
60KB
MD577604586db74538225d542666afeb410
SHA1e608c727e2596df72cbeb43edffd9434813ba1c1
SHA256d0f7f0497309a8281e68c33cd1783262fb44b63493f16f5b959cb54138322cb7
SHA5124febcbaaddf503479038823c1dee61ba98150080e48c4d825d55ab46466653b7243b0dc6dca581cfc65da3ce32f9b47689c9d666ddd0729cb8fa58911290423a
-
Filesize
60KB
MD5e2eb55434d1df732b47a66fc362e0cdc
SHA1a31fcdffb0e98eaf525d6337acc7f7facb91b608
SHA2563bc9ceaa12ae44b5e11bb6a3a91ca16758970d30efe8a2af4de8c891cd8389d4
SHA5125703d7c37fc23d8d0c7bf63d5a9074c23402c19ca6fb84915edbf61e4f2a9a02cb19d021e72ea1301ef019b7ce181fac54b9d637ce3dc2761885cd4e2d9251d0
-
Filesize
60KB
MD5fa7fb7a2a81e9c725a4238da2f3aef95
SHA17e82769137682e430e2befa2f0570bc198c0905b
SHA256cd9e644d844fb095cf1cc5f6c6bea7844b9d29e43047a225e891926267c366f1
SHA512aeb25e3cd02b8aa90029f28eb427213f1b5327bebb2f52f1a350afb30d0f5204da04647619f772f379374aa1514b1124a79ab3226c3bfb326535580693fbaff2
-
Filesize
60KB
MD5568eaa918ff4d0278cd06af9ac8dd3ed
SHA1af9e8a59325b39a9e9b753a406a06c197c9b98a2
SHA256087cf6568144dda3dc8f4fb7555d4ebb87f357daeb3ce8f5cf60da38f204f871
SHA5121c43ddf3c5492e98058453f7e1edf82c237a4b4a905c297e8a88f31e8ea54b45afb8e3efc4385c7fa73d8feb6f5b87be1b385b05b2d1d408e94714e2616ccf27
-
Filesize
60KB
MD59955dd3aaced5aa4dd28860a73e2d651
SHA1de7b5619452904862a8eeac33e7858159107927d
SHA256c7e867ab83bca4986d49aabd2ea185175869650a1b7a6916ea27130e11f309a0
SHA5120dad129c8d0f096cd31687d8eeef76ee629b487ed8feaf96b0a3304e90d85bb3e0345ee1e945ff2f0bbc0f791d25f8d7369b16ace1bb275fbd081d1cdefcd967
-
Filesize
60KB
MD5819ad19f9e502e7b4c4c1e53f74b5a5e
SHA172125f91f11db4fc3901a96d0470d0d6fc607fba
SHA256e07aba81c7309fef89099331f84e511be4f0085625bc92aeaf323df77b4bed9f
SHA5123ca8e2309d1f7098ccf0e654aee3ecf1ec142d7aee4d3ba013daf6c45c9b6a6e56ae82ce4c31baa174bc9296d290b2b979f9cc8f133688e279934792d161b42d
-
Filesize
60KB
MD533d686715d6ea4f9ca22891f75326bb0
SHA154ea0762fcad41335cd5c5adb8c9adb79fe88fe3
SHA2567e9679af7dbaac8048b5d2b2620b29ea95c7bd64f92cad3e9e164c875cf49da1
SHA51211c2a248c6ae5513ff5c3b56f2a40555c2b2ebd41b8620b3652c6a6568a3f011394b25fa14310267562b272389ac971b5c8b55a0032316222d33404f2696958b
-
Filesize
60KB
MD5df6cf6f81025e5590a9109ffc5ba13bb
SHA169f933367dabf7c156558134f84aad7aaf99ecf7
SHA2563658dae2a1894ba7c098c9a6534c2c8f1c1545f268673e0c0610284a5b46a9e2
SHA512809b8afe038a6456e070ee31093d1064b2dc2ca6879583156c5598a50eff3439552ad68a1945850ea9428c7aae9a21deb5b185002f71b7d06cef23e83eb9c71b
-
Filesize
60KB
MD5c22cb6820f92740b96b366f4af795210
SHA1496dc35abba35c81f459686b92f42a1bd111c167
SHA256fae41b2f2d6715dde8b7cb73663d5c18828ed561ddbb1b02f82a756d476cfad6
SHA5124235aad127c1152ee138220672d3d9d0bc391e435f213b60c1a81607cd8fedfe23105f1f350983b245615aeb2b5a01c762c8c246fde36d2754028e73fc78ca43
-
Filesize
60KB
MD5e3f981b2f1a832ea0c385e2800e5202e
SHA1ae1752462ef4a171e293c59b196da0a8504ea71f
SHA256119b207b9a61e3fdf03e03317b36d86c2563075560fa54cb870a1c4138a6e5e5
SHA512379302f0151af800371b8a45b39b3f6ce4a00385682ac3aade3a8b96cce3c3be49032f1fc91bb9092629fa4a64dbbf5b19b3b076db41d94ccc61feea0d0ed8d5