Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 00:05
Static task
static1
Behavioral task
behavioral1
Sample
8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe
Resource
win10v2004-20240226-en
General
-
Target
8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe
-
Size
89KB
-
MD5
f170b5191fe2546e50d4467d6d1cab8d
-
SHA1
2f847cf224cee61f3f914bb4252295fa55179863
-
SHA256
8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279
-
SHA512
862b95d28a3f96ebb4db6f0fdefe0e8311443789f650f4b6d676382baabb63057e375996ad2477191c2d943fa4e011ea25d3f422541cab2a8232e12675a7b3d5
-
SSDEEP
768:Qvw9816vhKQLroH4/wQRNrfrunMxVFA3b7gl5:YEGh0oHl2unMxVS3HgX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A298A818-F19E-4acc-A820-80C8EE8E40B1} {F9E0F3E2-C5B3-4522-ADDD-4175E6735549}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7AFC264C-6E09-4198-B91F-3FC183BF25AE}\stubpath = "C:\\Windows\\{7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe" {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3} {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}\stubpath = "C:\\Windows\\{AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe" {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9E0F3E2-C5B3-4522-ADDD-4175E6735549} {0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9E0F3E2-C5B3-4522-ADDD-4175E6735549}\stubpath = "C:\\Windows\\{F9E0F3E2-C5B3-4522-ADDD-4175E6735549}.exe" {0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3B57B780-D60D-41a2-9D09-FB669D1BE7D0} {B5611725-17FF-4455-8284-E072F1E12808}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{00F64E23-D1D5-4fd8-8B56-9D792B58CC8E} {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}\stubpath = "C:\\Windows\\{00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe" {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62}\stubpath = "C:\\Windows\\{0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62}.exe" {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF8ABDF5-6053-4a5e-86F3-30026D42D46A}\stubpath = "C:\\Windows\\{FF8ABDF5-6053-4a5e-86F3-30026D42D46A}.exe" {A298A818-F19E-4acc-A820-80C8EE8E40B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5611725-17FF-4455-8284-E072F1E12808} 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5611725-17FF-4455-8284-E072F1E12808}\stubpath = "C:\\Windows\\{B5611725-17FF-4455-8284-E072F1E12808}.exe" 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{39C5C067-577E-4ea7-86B1-F14C63FAFA2E} {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{39C5C067-577E-4ea7-86B1-F14C63FAFA2E}\stubpath = "C:\\Windows\\{39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe" {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A298A818-F19E-4acc-A820-80C8EE8E40B1}\stubpath = "C:\\Windows\\{A298A818-F19E-4acc-A820-80C8EE8E40B1}.exe" {F9E0F3E2-C5B3-4522-ADDD-4175E6735549}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF8ABDF5-6053-4a5e-86F3-30026D42D46A} {A298A818-F19E-4acc-A820-80C8EE8E40B1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3B57B780-D60D-41a2-9D09-FB669D1BE7D0}\stubpath = "C:\\Windows\\{3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe" {B5611725-17FF-4455-8284-E072F1E12808}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58F5B108-2141-49c3-86D3-7BA5185AB868} {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58F5B108-2141-49c3-86D3-7BA5185AB868}\stubpath = "C:\\Windows\\{58F5B108-2141-49c3-86D3-7BA5185AB868}.exe" {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7AFC264C-6E09-4198-B91F-3FC183BF25AE} {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62} {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe -
Deletes itself 1 IoCs
pid Process 2580 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2012 {B5611725-17FF-4455-8284-E072F1E12808}.exe 2892 {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe 2504 {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe 520 {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe 1496 {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe 308 {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe 2192 {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe 2672 {0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62}.exe 1892 {F9E0F3E2-C5B3-4522-ADDD-4175E6735549}.exe 2104 {A298A818-F19E-4acc-A820-80C8EE8E40B1}.exe 2464 {FF8ABDF5-6053-4a5e-86F3-30026D42D46A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe {B5611725-17FF-4455-8284-E072F1E12808}.exe File created C:\Windows\{00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe File created C:\Windows\{39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe File created C:\Windows\{AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe File created C:\Windows\{0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62}.exe {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe File created C:\Windows\{F9E0F3E2-C5B3-4522-ADDD-4175E6735549}.exe {0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62}.exe File created C:\Windows\{A298A818-F19E-4acc-A820-80C8EE8E40B1}.exe {F9E0F3E2-C5B3-4522-ADDD-4175E6735549}.exe File created C:\Windows\{FF8ABDF5-6053-4a5e-86F3-30026D42D46A}.exe {A298A818-F19E-4acc-A820-80C8EE8E40B1}.exe File created C:\Windows\{B5611725-17FF-4455-8284-E072F1E12808}.exe 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe File created C:\Windows\{58F5B108-2141-49c3-86D3-7BA5185AB868}.exe {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe File created C:\Windows\{7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2208 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe Token: SeIncBasePriorityPrivilege 2012 {B5611725-17FF-4455-8284-E072F1E12808}.exe Token: SeIncBasePriorityPrivilege 2892 {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe Token: SeIncBasePriorityPrivilege 2504 {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe Token: SeIncBasePriorityPrivilege 520 {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe Token: SeIncBasePriorityPrivilege 1496 {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe Token: SeIncBasePriorityPrivilege 308 {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe Token: SeIncBasePriorityPrivilege 2192 {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe Token: SeIncBasePriorityPrivilege 2672 {0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62}.exe Token: SeIncBasePriorityPrivilege 1892 {F9E0F3E2-C5B3-4522-ADDD-4175E6735549}.exe Token: SeIncBasePriorityPrivilege 2104 {A298A818-F19E-4acc-A820-80C8EE8E40B1}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2012 2208 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe 28 PID 2208 wrote to memory of 2012 2208 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe 28 PID 2208 wrote to memory of 2012 2208 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe 28 PID 2208 wrote to memory of 2012 2208 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe 28 PID 2208 wrote to memory of 2580 2208 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe 29 PID 2208 wrote to memory of 2580 2208 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe 29 PID 2208 wrote to memory of 2580 2208 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe 29 PID 2208 wrote to memory of 2580 2208 8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe 29 PID 2012 wrote to memory of 2892 2012 {B5611725-17FF-4455-8284-E072F1E12808}.exe 30 PID 2012 wrote to memory of 2892 2012 {B5611725-17FF-4455-8284-E072F1E12808}.exe 30 PID 2012 wrote to memory of 2892 2012 {B5611725-17FF-4455-8284-E072F1E12808}.exe 30 PID 2012 wrote to memory of 2892 2012 {B5611725-17FF-4455-8284-E072F1E12808}.exe 30 PID 2012 wrote to memory of 2964 2012 {B5611725-17FF-4455-8284-E072F1E12808}.exe 31 PID 2012 wrote to memory of 2964 2012 {B5611725-17FF-4455-8284-E072F1E12808}.exe 31 PID 2012 wrote to memory of 2964 2012 {B5611725-17FF-4455-8284-E072F1E12808}.exe 31 PID 2012 wrote to memory of 2964 2012 {B5611725-17FF-4455-8284-E072F1E12808}.exe 31 PID 2892 wrote to memory of 2504 2892 {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe 34 PID 2892 wrote to memory of 2504 2892 {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe 34 PID 2892 wrote to memory of 2504 2892 {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe 34 PID 2892 wrote to memory of 2504 2892 {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe 34 PID 2892 wrote to memory of 2560 2892 {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe 35 PID 2892 wrote to memory of 2560 2892 {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe 35 PID 2892 wrote to memory of 2560 2892 {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe 35 PID 2892 wrote to memory of 2560 2892 {3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe 35 PID 2504 wrote to memory of 520 2504 {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe 36 PID 2504 wrote to memory of 520 2504 {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe 36 PID 2504 wrote to memory of 520 2504 {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe 36 PID 2504 wrote to memory of 520 2504 {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe 36 PID 2504 wrote to memory of 264 2504 {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe 37 PID 2504 wrote to memory of 264 2504 {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe 37 PID 2504 wrote to memory of 264 2504 {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe 37 PID 2504 wrote to memory of 264 2504 {00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe 37 PID 520 wrote to memory of 1496 520 {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe 38 PID 520 wrote to memory of 1496 520 {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe 38 PID 520 wrote to memory of 1496 520 {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe 38 PID 520 wrote to memory of 1496 520 {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe 38 PID 520 wrote to memory of 956 520 {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe 39 PID 520 wrote to memory of 956 520 {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe 39 PID 520 wrote to memory of 956 520 {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe 39 PID 520 wrote to memory of 956 520 {39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe 39 PID 1496 wrote to memory of 308 1496 {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe 40 PID 1496 wrote to memory of 308 1496 {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe 40 PID 1496 wrote to memory of 308 1496 {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe 40 PID 1496 wrote to memory of 308 1496 {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe 40 PID 1496 wrote to memory of 2924 1496 {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe 41 PID 1496 wrote to memory of 2924 1496 {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe 41 PID 1496 wrote to memory of 2924 1496 {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe 41 PID 1496 wrote to memory of 2924 1496 {58F5B108-2141-49c3-86D3-7BA5185AB868}.exe 41 PID 308 wrote to memory of 2192 308 {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe 42 PID 308 wrote to memory of 2192 308 {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe 42 PID 308 wrote to memory of 2192 308 {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe 42 PID 308 wrote to memory of 2192 308 {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe 42 PID 308 wrote to memory of 2588 308 {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe 43 PID 308 wrote to memory of 2588 308 {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe 43 PID 308 wrote to memory of 2588 308 {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe 43 PID 308 wrote to memory of 2588 308 {7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe 43 PID 2192 wrote to memory of 2672 2192 {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe 44 PID 2192 wrote to memory of 2672 2192 {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe 44 PID 2192 wrote to memory of 2672 2192 {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe 44 PID 2192 wrote to memory of 2672 2192 {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe 44 PID 2192 wrote to memory of 2940 2192 {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe 45 PID 2192 wrote to memory of 2940 2192 {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe 45 PID 2192 wrote to memory of 2940 2192 {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe 45 PID 2192 wrote to memory of 2940 2192 {AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe"C:\Users\Admin\AppData\Local\Temp\8c7560f39a16ef0b13199ffaaaf781c5fbe47d2738a42d88360252d748e64279.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\{B5611725-17FF-4455-8284-E072F1E12808}.exeC:\Windows\{B5611725-17FF-4455-8284-E072F1E12808}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\{3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exeC:\Windows\{3B57B780-D60D-41a2-9D09-FB669D1BE7D0}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\{00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exeC:\Windows\{00F64E23-D1D5-4fd8-8B56-9D792B58CC8E}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\{39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exeC:\Windows\{39C5C067-577E-4ea7-86B1-F14C63FAFA2E}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\{58F5B108-2141-49c3-86D3-7BA5185AB868}.exeC:\Windows\{58F5B108-2141-49c3-86D3-7BA5185AB868}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\{7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exeC:\Windows\{7AFC264C-6E09-4198-B91F-3FC183BF25AE}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\{AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exeC:\Windows\{AD9B0A3A-BD7D-4fa3-9E71-3EBD5EA879F3}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\{0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62}.exeC:\Windows\{0C578F2B-DE7E-4b62-BBA8-E7E8270A1D62}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2672 -
C:\Windows\{F9E0F3E2-C5B3-4522-ADDD-4175E6735549}.exeC:\Windows\{F9E0F3E2-C5B3-4522-ADDD-4175E6735549}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Windows\{A298A818-F19E-4acc-A820-80C8EE8E40B1}.exeC:\Windows\{A298A818-F19E-4acc-A820-80C8EE8E40B1}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2104 -
C:\Windows\{FF8ABDF5-6053-4a5e-86F3-30026D42D46A}.exeC:\Windows\{FF8ABDF5-6053-4a5e-86F3-30026D42D46A}.exe12⤵
- Executes dropped EXE
PID:2464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A298A~1.EXE > nul12⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9E0F~1.EXE > nul11⤵PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0C578~1.EXE > nul10⤵PID:932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AD9B0~1.EXE > nul9⤵PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7AFC2~1.EXE > nul8⤵PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{58F5B~1.EXE > nul7⤵PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39C5C~1.EXE > nul6⤵PID:956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{00F64~1.EXE > nul5⤵PID:264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3B57B~1.EXE > nul4⤵PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5611~1.EXE > nul3⤵PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\8C7560~1.EXE > nul2⤵
- Deletes itself
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD55e7492ca81c62823c8559cc4f70eeb5c
SHA1a3d165ce9e7fe8e7a590d8632382a7734bb688ef
SHA256b97bc54a5a06a4f33877bc53c76fae945e8b691db22679b2dd4ab1c8cbd45e80
SHA512b93acc378590130fe9177bed4eac49c1ce9cc2bb42cbf5bcd4d2eb71e19cc5eed7faa26559ec6251f186ed67bb2f683f010b3d896163b9975a0f81cca92ccf87
-
Filesize
89KB
MD53db21c1145e258063316beacce6a9dc2
SHA1672c35bb9975166f126ebf1a6c61d329163a2696
SHA2566667897bb6239694b5ad8956dffacbbbbb16649b8e6d9b5a0d682576addf5128
SHA512fb681883d3b14ab2160ab6f94d2c24e44343137ee39d4e5e671a2c734bd203df27a95103af0da4edb4b014d6a61b33ab8ec54abc160d0501c1ba74fa632dc681
-
Filesize
89KB
MD587c42df2ceb2938854799965e0bf7c54
SHA12d25f9824ad8b17f0aeec616fae8fab11d061947
SHA25691b52c39770d27662043eeabc380f6b0100b15809c4c4021c987a0af1e776e85
SHA512970d22fc151733981970c025a46cdb926d1d759c656705a382fc7a999111c63a51f44c5f18271a17a02bc8d6946691854a72a6a35673193e9e972ca22b9d8303
-
Filesize
89KB
MD5f6247689ff5e02bf2866868d2fd34300
SHA16522cf09590d1d23cd42368d88e03c0387c97566
SHA2562db55e68cf4c827a857a5b81175872e0dee52646ba64b9df8db38ef012a3fb33
SHA512a4583cb76688ed62d93f46bd38c87ae54c97278f9b5f06a6b2cd28dda352f332711a2f5e7fc572f01d57aae61d67e85aea785b397ae0ef64fa2a915c35a2d822
-
Filesize
89KB
MD5514fdf5deb18beb55e7a9f6b6045caf1
SHA121b8a642e3a714530a41b618fa369667b1a2f298
SHA25686c870c9badfa6413a14d60061a8cabb1393d8e2e64153fefdc9885f45b65df8
SHA5129c5adb0aa6e1cb8fd6d5f713bde40babaf93c0cdaf519feb7bfc9b170e28edace5e569d93bc0e15d01fbf92f13b2727c8aefd16f42cd04b599292b792293382e
-
Filesize
89KB
MD592eb7bfb42a60118447999416cb97a91
SHA18d43128bc6d431bd79b67eab61c2846c3f126f93
SHA2563fd54016047ebf365de5995c301d5d8553ce97d4cbae1cbdcf10a89b8a3c3462
SHA512bddbf1ee2923c054470bf7f800830716c0eb84e82a17ba5535115af078b49700135f5375d4449c7ea2b80a8545367fbdb8feeb49677df071c81c79057d14d911
-
Filesize
89KB
MD547064eed08591f84041d66ec58725c71
SHA1f65597c42885730fa2bc49540c1378646a4d593b
SHA2569d5566010c857c3a463d9d0b265f80c773b5c7d250a4274974da7d342e28caa2
SHA51299d2046f251df97a562abec4daeb735a4dfd0cd88b4dc1f108333706c2e86ce2269bcfbd2627c0528c525e90b2b3ebbef5d6bdfe2ec873354dcc85b87c82096f
-
Filesize
89KB
MD55e0775df6df32f985f378265b10112a8
SHA1f306e2ea1160fe29e104623845d5b5a5bbbee84d
SHA25601b92b273f4f8bd0f9eb3fa236ba7d9193463983e6944bb1aca916b2f006994a
SHA512f17c8243e105c10b07bf5c19a3c4be96c212565dd321ac2128f3b4f6d15beebb6825a8246dfca4cf9893b70450aeee4e1f8a1cf876fbecff50e5ef117646698e
-
Filesize
89KB
MD57f337a01a23b50f91110beccaa03cef9
SHA147c2302bb7904506c34ddc94653121b43eaca669
SHA256521c153ffff395b8372a26b3f929a3c9cf2e81e32a6a179c1d432cc2c09f268a
SHA512e2354a763f27ba1f251d6228b006ba01da586afc09a7367b62862ae1724c1291b80e3103b46fc1069500858cec77daf85f68a48f2135a8a164bc0f7c517813b9
-
Filesize
89KB
MD5976577f5075f1b95bc7a7a571d2dea78
SHA1e1b6c546d764d3b0519a5855c1747a4d8a8901f2
SHA256e7b08fd45d0f1bc64c3d96ebbec981ad94c73d0ded18d73026a2922582dd3c1c
SHA512891aefa40b8879ee7a60e1f373cc24e84e4a9f900a097440f946b934ec26b102b71cb17c57be4394a4de6b4a24615808bc033059e2e16d474ecd75c6ab3fb7c4
-
Filesize
89KB
MD559d806ead4cdb45a4a0ec1598b16ef60
SHA1e9ab483c842f5456b9146b31057dba1e5b2e8c81
SHA25625140fed80740f64cdac8fef199c74cb0342615229614b7a4482d93924214c50
SHA512d874dbe7a989ee59340654a5bb3e38a6f19a0646d6f7d0cf023cc2061bc4f9f6145b0528429b61abff38f58725e4b0624c44ad0f7070731330352604aa367252