Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe
Resource
win10v2004-20240426-en
General
-
Target
522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe
-
Size
98KB
-
MD5
075f83ccf1c96e5a0693ade441a985d3
-
SHA1
71a3883e999cd337f7e50e03c93b0fdff528386b
-
SHA256
522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff
-
SHA512
4d83111f4d7a3cdc53a770486591294c765c0e3ea3d658f1ce384a59ed534e0222770866f10c7723fde1a9c1996d87e066af5ab47d434d28fae58ef024438500
-
SSDEEP
768:5vw98169hKjroy4/wQCNrfrunMxVFA3b7glw6:lEG/HoylxunMxVS3Hgl
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 22 IoCs
Processes:
522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe{ABFBCA50-1998-48cf-827A-2AACF1879425}.exe{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe{068623D9-D6A1-4edf-824B-D72494C32451}.exe{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe{4630130F-6481-4b64-BD49-F1403A7E799D}.exe{8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe{FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C} 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ABFBCA50-1998-48cf-827A-2AACF1879425}\stubpath = "C:\\Windows\\{ABFBCA50-1998-48cf-827A-2AACF1879425}.exe" {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1} {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{068623D9-D6A1-4edf-824B-D72494C32451} {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4630130F-6481-4b64-BD49-F1403A7E799D} {068623D9-D6A1-4edf-824B-D72494C32451}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC2C6AC2-F116-4620-AC53-C6A335D90A47} {FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC2C6AC2-F116-4620-AC53-C6A335D90A47}\stubpath = "C:\\Windows\\{FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe" {FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}\stubpath = "C:\\Windows\\{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe" {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB} {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{068623D9-D6A1-4edf-824B-D72494C32451}\stubpath = "C:\\Windows\\{068623D9-D6A1-4edf-824B-D72494C32451}.exe" {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4630130F-6481-4b64-BD49-F1403A7E799D}\stubpath = "C:\\Windows\\{4630130F-6481-4b64-BD49-F1403A7E799D}.exe" {068623D9-D6A1-4edf-824B-D72494C32451}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8713C1B4-CC45-41de-9A85-ED4EF628512D} {4630130F-6481-4b64-BD49-F1403A7E799D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}\stubpath = "C:\\Windows\\{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe" 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ABFBCA50-1998-48cf-827A-2AACF1879425} {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}\stubpath = "C:\\Windows\\{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe" {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}\stubpath = "C:\\Windows\\{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exe" {FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}\stubpath = "C:\\Windows\\{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe" {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8713C1B4-CC45-41de-9A85-ED4EF628512D}\stubpath = "C:\\Windows\\{8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe" {4630130F-6481-4b64-BD49-F1403A7E799D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7} {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8} {FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5A956B6-8958-4f7a-A63B-9BC7558D3D7A} {8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5A956B6-8958-4f7a-A63B-9BC7558D3D7A}\stubpath = "C:\\Windows\\{B5A956B6-8958-4f7a-A63B-9BC7558D3D7A}.exe" {8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2636 cmd.exe -
Executes dropped EXE 11 IoCs
Processes:
{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe{ABFBCA50-1998-48cf-827A-2AACF1879425}.exe{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe{068623D9-D6A1-4edf-824B-D72494C32451}.exe{4630130F-6481-4b64-BD49-F1403A7E799D}.exe{8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe{FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exe{B5A956B6-8958-4f7a-A63B-9BC7558D3D7A}.exepid process 2052 {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe 2824 {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe 2468 {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe 2772 {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe 1708 {068623D9-D6A1-4edf-824B-D72494C32451}.exe 344 {4630130F-6481-4b64-BD49-F1403A7E799D}.exe 1848 {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe 2224 {FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe 2088 {FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe 2592 {8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exe 1700 {B5A956B6-8958-4f7a-A63B-9BC7558D3D7A}.exe -
Drops file in Windows directory 11 IoCs
Processes:
{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe{4630130F-6481-4b64-BD49-F1403A7E799D}.exe{068623D9-D6A1-4edf-824B-D72494C32451}.exe{8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe{FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exe{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe{ABFBCA50-1998-48cf-827A-2AACF1879425}.exe{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exedescription ioc process File created C:\Windows\{FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe {FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe File created C:\Windows\{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe File created C:\Windows\{068623D9-D6A1-4edf-824B-D72494C32451}.exe {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe File created C:\Windows\{8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe {4630130F-6481-4b64-BD49-F1403A7E799D}.exe File created C:\Windows\{4630130F-6481-4b64-BD49-F1403A7E799D}.exe {068623D9-D6A1-4edf-824B-D72494C32451}.exe File created C:\Windows\{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe File created C:\Windows\{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exe {FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe File created C:\Windows\{B5A956B6-8958-4f7a-A63B-9BC7558D3D7A}.exe {8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exe File created C:\Windows\{ABFBCA50-1998-48cf-827A-2AACF1879425}.exe {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe File created C:\Windows\{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe File created C:\Windows\{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe{ABFBCA50-1998-48cf-827A-2AACF1879425}.exe{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe{068623D9-D6A1-4edf-824B-D72494C32451}.exe{4630130F-6481-4b64-BD49-F1403A7E799D}.exe{8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe{FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exedescription pid process Token: SeIncBasePriorityPrivilege 2964 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe Token: SeIncBasePriorityPrivilege 2052 {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe Token: SeIncBasePriorityPrivilege 2824 {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe Token: SeIncBasePriorityPrivilege 2468 {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe Token: SeIncBasePriorityPrivilege 2772 {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe Token: SeIncBasePriorityPrivilege 1708 {068623D9-D6A1-4edf-824B-D72494C32451}.exe Token: SeIncBasePriorityPrivilege 344 {4630130F-6481-4b64-BD49-F1403A7E799D}.exe Token: SeIncBasePriorityPrivilege 1848 {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe Token: SeIncBasePriorityPrivilege 2224 {FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe Token: SeIncBasePriorityPrivilege 2088 {FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe Token: SeIncBasePriorityPrivilege 2592 {8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe{ABFBCA50-1998-48cf-827A-2AACF1879425}.exe{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe{068623D9-D6A1-4edf-824B-D72494C32451}.exe{4630130F-6481-4b64-BD49-F1403A7E799D}.exe{8713C1B4-CC45-41de-9A85-ED4EF628512D}.exedescription pid process target process PID 2964 wrote to memory of 2052 2964 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe PID 2964 wrote to memory of 2052 2964 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe PID 2964 wrote to memory of 2052 2964 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe PID 2964 wrote to memory of 2052 2964 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe PID 2964 wrote to memory of 2636 2964 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe cmd.exe PID 2964 wrote to memory of 2636 2964 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe cmd.exe PID 2964 wrote to memory of 2636 2964 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe cmd.exe PID 2964 wrote to memory of 2636 2964 522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe cmd.exe PID 2052 wrote to memory of 2824 2052 {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe PID 2052 wrote to memory of 2824 2052 {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe PID 2052 wrote to memory of 2824 2052 {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe PID 2052 wrote to memory of 2824 2052 {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe PID 2052 wrote to memory of 2448 2052 {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe cmd.exe PID 2052 wrote to memory of 2448 2052 {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe cmd.exe PID 2052 wrote to memory of 2448 2052 {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe cmd.exe PID 2052 wrote to memory of 2448 2052 {047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe cmd.exe PID 2824 wrote to memory of 2468 2824 {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe PID 2824 wrote to memory of 2468 2824 {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe PID 2824 wrote to memory of 2468 2824 {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe PID 2824 wrote to memory of 2468 2824 {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe PID 2824 wrote to memory of 2424 2824 {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe cmd.exe PID 2824 wrote to memory of 2424 2824 {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe cmd.exe PID 2824 wrote to memory of 2424 2824 {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe cmd.exe PID 2824 wrote to memory of 2424 2824 {ABFBCA50-1998-48cf-827A-2AACF1879425}.exe cmd.exe PID 2468 wrote to memory of 2772 2468 {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe PID 2468 wrote to memory of 2772 2468 {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe PID 2468 wrote to memory of 2772 2468 {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe PID 2468 wrote to memory of 2772 2468 {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe PID 2468 wrote to memory of 2760 2468 {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe cmd.exe PID 2468 wrote to memory of 2760 2468 {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe cmd.exe PID 2468 wrote to memory of 2760 2468 {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe cmd.exe PID 2468 wrote to memory of 2760 2468 {3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe cmd.exe PID 2772 wrote to memory of 1708 2772 {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe {068623D9-D6A1-4edf-824B-D72494C32451}.exe PID 2772 wrote to memory of 1708 2772 {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe {068623D9-D6A1-4edf-824B-D72494C32451}.exe PID 2772 wrote to memory of 1708 2772 {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe {068623D9-D6A1-4edf-824B-D72494C32451}.exe PID 2772 wrote to memory of 1708 2772 {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe {068623D9-D6A1-4edf-824B-D72494C32451}.exe PID 2772 wrote to memory of 1908 2772 {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe cmd.exe PID 2772 wrote to memory of 1908 2772 {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe cmd.exe PID 2772 wrote to memory of 1908 2772 {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe cmd.exe PID 2772 wrote to memory of 1908 2772 {F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe cmd.exe PID 1708 wrote to memory of 344 1708 {068623D9-D6A1-4edf-824B-D72494C32451}.exe {4630130F-6481-4b64-BD49-F1403A7E799D}.exe PID 1708 wrote to memory of 344 1708 {068623D9-D6A1-4edf-824B-D72494C32451}.exe {4630130F-6481-4b64-BD49-F1403A7E799D}.exe PID 1708 wrote to memory of 344 1708 {068623D9-D6A1-4edf-824B-D72494C32451}.exe {4630130F-6481-4b64-BD49-F1403A7E799D}.exe PID 1708 wrote to memory of 344 1708 {068623D9-D6A1-4edf-824B-D72494C32451}.exe {4630130F-6481-4b64-BD49-F1403A7E799D}.exe PID 1708 wrote to memory of 1896 1708 {068623D9-D6A1-4edf-824B-D72494C32451}.exe cmd.exe PID 1708 wrote to memory of 1896 1708 {068623D9-D6A1-4edf-824B-D72494C32451}.exe cmd.exe PID 1708 wrote to memory of 1896 1708 {068623D9-D6A1-4edf-824B-D72494C32451}.exe cmd.exe PID 1708 wrote to memory of 1896 1708 {068623D9-D6A1-4edf-824B-D72494C32451}.exe cmd.exe PID 344 wrote to memory of 1848 344 {4630130F-6481-4b64-BD49-F1403A7E799D}.exe {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe PID 344 wrote to memory of 1848 344 {4630130F-6481-4b64-BD49-F1403A7E799D}.exe {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe PID 344 wrote to memory of 1848 344 {4630130F-6481-4b64-BD49-F1403A7E799D}.exe {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe PID 344 wrote to memory of 1848 344 {4630130F-6481-4b64-BD49-F1403A7E799D}.exe {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe PID 344 wrote to memory of 1540 344 {4630130F-6481-4b64-BD49-F1403A7E799D}.exe cmd.exe PID 344 wrote to memory of 1540 344 {4630130F-6481-4b64-BD49-F1403A7E799D}.exe cmd.exe PID 344 wrote to memory of 1540 344 {4630130F-6481-4b64-BD49-F1403A7E799D}.exe cmd.exe PID 344 wrote to memory of 1540 344 {4630130F-6481-4b64-BD49-F1403A7E799D}.exe cmd.exe PID 1848 wrote to memory of 2224 1848 {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe {FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe PID 1848 wrote to memory of 2224 1848 {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe {FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe PID 1848 wrote to memory of 2224 1848 {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe {FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe PID 1848 wrote to memory of 2224 1848 {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe {FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe PID 1848 wrote to memory of 2084 1848 {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe cmd.exe PID 1848 wrote to memory of 2084 1848 {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe cmd.exe PID 1848 wrote to memory of 2084 1848 {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe cmd.exe PID 1848 wrote to memory of 2084 1848 {8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe"C:\Users\Admin\AppData\Local\Temp\522555764d7702aa33a966e1f1c17cd48bc77e50df751fc0c8f26044b7ac8fff.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exeC:\Windows\{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{ABFBCA50-1998-48cf-827A-2AACF1879425}.exeC:\Windows\{ABFBCA50-1998-48cf-827A-2AACF1879425}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exeC:\Windows\{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exeC:\Windows\{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{068623D9-D6A1-4edf-824B-D72494C32451}.exeC:\Windows\{068623D9-D6A1-4edf-824B-D72494C32451}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{4630130F-6481-4b64-BD49-F1403A7E799D}.exeC:\Windows\{4630130F-6481-4b64-BD49-F1403A7E799D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{8713C1B4-CC45-41de-9A85-ED4EF628512D}.exeC:\Windows\{8713C1B4-CC45-41de-9A85-ED4EF628512D}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exeC:\Windows\{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exeC:\Windows\{FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exeC:\Windows\{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{B5A956B6-8958-4f7a-A63B-9BC7558D3D7A}.exeC:\Windows\{B5A956B6-8958-4f7a-A63B-9BC7558D3D7A}.exe12⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E1A2~1.EXE > nul12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FC2C6~1.EXE > nul11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD8A4~1.EXE > nul10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8713C~1.EXE > nul9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{46301~1.EXE > nul8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06862~1.EXE > nul7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F5A8A~1.EXE > nul6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3D04B~1.EXE > nul5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ABFBC~1.EXE > nul4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{047A1~1.EXE > nul3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\522555~1.EXE > nul2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\{047A1AA8-B63B-4d59-ABF4-FC4592F28C4C}.exeFilesize
98KB
MD55937015aa0983983b3cf2ed22bf676cc
SHA1f48801ba9a514ab20da45224bc4259e8f12a7121
SHA256a1f92d4a9fba55bfa087fce865667a03fb48165be6dc108889a11495683016c5
SHA5120f09cb90bbb77f71b1f8446788a7a425befc66bf9183442be171f5cd83f09431687618a2d83ab58674c4a87cc7e5927b64c4342cff53732265d0164471e69207
-
C:\Windows\{068623D9-D6A1-4edf-824B-D72494C32451}.exeFilesize
98KB
MD5c6ed19d90aeba1b3d940aeb01f5d8d44
SHA106c4ed6b6bd709bf9b607dd0a9c7caef27ca66da
SHA256508ef3c66d3de6b30d7ee23c41aa9c8e5099d1331d3f834b7828ba74ab881866
SHA512239de669eb3d89a31d5fdd61c513844c4a9ac7d8b91e6ce3937467636c114a4d3200ccaa15eeacfe3032020a4b108459311b4487410e2ff41eab717febb05565
-
C:\Windows\{3D04BF70-37C4-4886-98D5-2B8FAFFE58A1}.exeFilesize
98KB
MD55965a60a9506fddc52383efe84781ea6
SHA136545f7eef63cbac7dfcf5cad91aaa8bd37ed959
SHA256bcaccd3bb209b3ee6b5514f2a2b9273e39cbfa8379f8b57c5775a53373ea24b0
SHA512639acd0f473d82bc47253c5c8ecb06c4db759ef620f4cbb70798faeccf73775809f1d344ed7ba95a7bc96a39fe21a30cdbcfd70bd40d8853cc3b5989dbf91c28
-
C:\Windows\{4630130F-6481-4b64-BD49-F1403A7E799D}.exeFilesize
98KB
MD5967fa7a75e0727e2bc33f75a2265806f
SHA12370a6e0c2242415e140ce828d5f17096a9eafc1
SHA25667ded979af632e591885a6a0d922ee3e11a7961f9730ec816b20695469c66535
SHA51240114c41354d8739f30ba70c83d6bb1cc6c3683513420e47f9ae110470fb9c50b160bfbdf8c08be6748108c39dc5624db9e8603490741e1322e5c0a3a30e124c
-
C:\Windows\{8713C1B4-CC45-41de-9A85-ED4EF628512D}.exeFilesize
98KB
MD53727c488c2936f2a1f5a0f1fc0d66fa7
SHA1f5a1f049183f8ac46a782fc1cb2e933cb2146727
SHA2567a971d0b0cc5b7b4dc7dfdb00ec3fe3d173d1957f1958f6b8ea178b819c2e65f
SHA512aec46b523cbbdbba1da8c0444163c639d4917fb52d1da674ce5edab50c00ffee316bab92b65d85d952e3de7b24898d486e6b09dc209b09de0f8192bf3a9f7886
-
C:\Windows\{8E1A27A3-3355-45c5-9B8E-46762FEE4CF8}.exeFilesize
98KB
MD59b36350c0a716d08e6c2c2515f514c3c
SHA1d9b2c1cca6e38bf345f49309cde3b140a1ac364e
SHA25684bc02c9b4175e12681637f4170c932a9cac5a2bb5c40026add95c9a9a3ef972
SHA5121532af026f738672af538fa310b97167c84c4d8dc0bfa5ebc54bebdfa7f515fbf5d35ce80939e79d4d72431a0bdc236a281d8657e9f1cff6fa069f6b585f3cec
-
C:\Windows\{ABFBCA50-1998-48cf-827A-2AACF1879425}.exeFilesize
98KB
MD5b4f51621e015ed394123cca1a1bfa67d
SHA1855cf3e239b036a707968f46bebeaea3b6478851
SHA256c6841e9705cf37e9bddaad707ce435bb36f9271406d49d744b86d4a10fb81c44
SHA512d8299b0c93f7f8c20c61ba6382adbb9ad07b83deaf04f83a02b87adbddb8be9381b0e4ba2cfeb25f1a50ac728bf45297393385be67a6f1f7b06012233d088a4f
-
C:\Windows\{B5A956B6-8958-4f7a-A63B-9BC7558D3D7A}.exeFilesize
98KB
MD5ebd8bb2ebe6f4dabeb950159cd1b156e
SHA1fa5166cd108ddbe5efc86925839f2cf4425bddba
SHA256517674f008d4b6250adab9956616ba3b8be845e4ac0cdfcd272c6984fb752012
SHA5121a682767673d30f066f99b975304cb2a6724e005d0ab30b3ddc9e6d1eca7a3dd1567089016fbfffaf0a9044513f1c8a45d1cbb83e7466f88fcdc4c743844a025
-
C:\Windows\{F5A8AB01-A8B7-4c3c-8DBF-B34783010DFB}.exeFilesize
98KB
MD5a69defe6e65c574fb693f9b24693bfce
SHA14d3c7d041d19a5f5ec2d475e04f6f995b945a15a
SHA256066e0eb083abf80cb5fb862adbe4ab65de8661954e45c878b9584db5e69fbe21
SHA51256b1dbaabef69cd04eb38e01ff3dc0244e448f69700f9150eb27cfb20b6e0e84f47f0cd03dec318bd422512a6042063261d08c980407c860cef3a7f7baf8481e
-
C:\Windows\{FC2C6AC2-F116-4620-AC53-C6A335D90A47}.exeFilesize
98KB
MD53dc171c1c59534b358c93ee7a09c021a
SHA16a4e38ad882655c1df3fc8ac72fafd2ec458b219
SHA256060b5f121defb2dfa1537c84be7c6ab0eea3e8a586dd6e721fee5e9add0faa3a
SHA51288597b92b9a275fb3ff2f49a822bc6980e70af4f8e6e17333727bab6de5d7ea9816627e811ddc3e9d9693adb0dc35a3142f3b24086fe8ce9620d62201c6fc85a
-
C:\Windows\{FD8A4F41-2008-4183-B753-DCA8AAC4C7D7}.exeFilesize
98KB
MD5f4c0c19e076407e055309763bf881af3
SHA1655484df01be2656824f340a0bd1b8adbd59d8bb
SHA256b79bebd6ef8cfd21d1f508868a00dc89a55fac40d9e4e8dca50f9e41e1a1cee6
SHA512d22b677805562ac0554a2062ee56c902559c8504cc1263f6cb713419bcd1a4821069b526e83b6aeb82d517a4bb478268e1fd27cab156a31cb0d124bce41d9f12
-
memory/344-61-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/1708-45-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/1708-53-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/1848-62-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/1848-70-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2052-8-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2052-17-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2088-85-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2224-78-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2468-34-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2468-27-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2592-94-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2772-43-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2772-36-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2824-18-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2824-25-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2964-9-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2964-0-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2964-3-0x00000000002E0000-0x00000000002F1000-memory.dmpFilesize
68KB