Analysis
-
max time kernel
113s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe
Resource
win10v2004-20240611-en
General
-
Target
63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe
-
Size
91KB
-
MD5
1dae4eabf236e67e6c74122f695640cb
-
SHA1
cc2f0532715b38ea35834311418dbf2fc4f308f0
-
SHA256
63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863
-
SHA512
623693604ca8068853d571b953df17bfdc8cada0fe605be3a664e90c5d950bf053d08fc0710343a1eab09e0eee7e187899bce44c4fc257ebeef85684ab268e75
-
SSDEEP
768:5vw9816uhKirop4/wQNNrfrunMxVFA3b7t:lEGkmoplCunMxVS3Ht
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B7F1EB85-7EA4-45ab-995F-F575FBA2F321} {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B7F1EB85-7EA4-45ab-995F-F575FBA2F321}\stubpath = "C:\\Windows\\{B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe" {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{420B04F1-2325-42e7-9DC8-B0A17E28A4BD} {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E83C5933-4613-4f82-92B6-A9B4F40B789C} {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5CF6191D-C86E-4e78-8C27-94CF0002CFAB} {E83C5933-4613-4f82-92B6-A9B4F40B789C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5CF6191D-C86E-4e78-8C27-94CF0002CFAB}\stubpath = "C:\\Windows\\{5CF6191D-C86E-4e78-8C27-94CF0002CFAB}.exe" {E83C5933-4613-4f82-92B6-A9B4F40B789C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FE76797B-0766-4a95-BD84-A3B81564AC1C} {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A566DB8F-96A7-493b-9835-69407359CA1A} 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C38EAAD2-6D69-4b65-896E-2285543D9669}\stubpath = "C:\\Windows\\{C38EAAD2-6D69-4b65-896E-2285543D9669}.exe" {A566DB8F-96A7-493b-9835-69407359CA1A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{751E38E1-8A28-4c58-AC8A-7CAA749FBAD4} {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E6A48A1-06DC-4646-BEA1-D141173EF877} {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E6A48A1-06DC-4646-BEA1-D141173EF877}\stubpath = "C:\\Windows\\{5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe" {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E83C5933-4613-4f82-92B6-A9B4F40B789C}\stubpath = "C:\\Windows\\{E83C5933-4613-4f82-92B6-A9B4F40B789C}.exe" {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A566DB8F-96A7-493b-9835-69407359CA1A}\stubpath = "C:\\Windows\\{A566DB8F-96A7-493b-9835-69407359CA1A}.exe" 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C38EAAD2-6D69-4b65-896E-2285543D9669} {A566DB8F-96A7-493b-9835-69407359CA1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}\stubpath = "C:\\Windows\\{751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe" {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{420B04F1-2325-42e7-9DC8-B0A17E28A4BD}\stubpath = "C:\\Windows\\{420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe" {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FE76797B-0766-4a95-BD84-A3B81564AC1C}\stubpath = "C:\\Windows\\{FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe" {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe -
Deletes itself 1 IoCs
pid Process 2052 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2924 {A566DB8F-96A7-493b-9835-69407359CA1A}.exe 2852 {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe 2624 {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe 2676 {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe 1196 {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe 1448 {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe 2556 {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe 1260 {E83C5933-4613-4f82-92B6-A9B4F40B789C}.exe 2468 {5CF6191D-C86E-4e78-8C27-94CF0002CFAB}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe File created C:\Windows\{5CF6191D-C86E-4e78-8C27-94CF0002CFAB}.exe {E83C5933-4613-4f82-92B6-A9B4F40B789C}.exe File created C:\Windows\{A566DB8F-96A7-493b-9835-69407359CA1A}.exe 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe File created C:\Windows\{751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe File created C:\Windows\{5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe File created C:\Windows\{B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe File created C:\Windows\{420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe File created C:\Windows\{E83C5933-4613-4f82-92B6-A9B4F40B789C}.exe {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe File created C:\Windows\{C38EAAD2-6D69-4b65-896E-2285543D9669}.exe {A566DB8F-96A7-493b-9835-69407359CA1A}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2096 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe Token: SeIncBasePriorityPrivilege 2924 {A566DB8F-96A7-493b-9835-69407359CA1A}.exe Token: SeIncBasePriorityPrivilege 2852 {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe Token: SeIncBasePriorityPrivilege 2624 {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe Token: SeIncBasePriorityPrivilege 2676 {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe Token: SeIncBasePriorityPrivilege 1196 {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe Token: SeIncBasePriorityPrivilege 1448 {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe Token: SeIncBasePriorityPrivilege 2556 {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe Token: SeIncBasePriorityPrivilege 1260 {E83C5933-4613-4f82-92B6-A9B4F40B789C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2924 2096 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe 28 PID 2096 wrote to memory of 2924 2096 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe 28 PID 2096 wrote to memory of 2924 2096 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe 28 PID 2096 wrote to memory of 2924 2096 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe 28 PID 2096 wrote to memory of 2052 2096 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe 29 PID 2096 wrote to memory of 2052 2096 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe 29 PID 2096 wrote to memory of 2052 2096 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe 29 PID 2096 wrote to memory of 2052 2096 63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe 29 PID 2924 wrote to memory of 2852 2924 {A566DB8F-96A7-493b-9835-69407359CA1A}.exe 30 PID 2924 wrote to memory of 2852 2924 {A566DB8F-96A7-493b-9835-69407359CA1A}.exe 30 PID 2924 wrote to memory of 2852 2924 {A566DB8F-96A7-493b-9835-69407359CA1A}.exe 30 PID 2924 wrote to memory of 2852 2924 {A566DB8F-96A7-493b-9835-69407359CA1A}.exe 30 PID 2924 wrote to memory of 2604 2924 {A566DB8F-96A7-493b-9835-69407359CA1A}.exe 31 PID 2924 wrote to memory of 2604 2924 {A566DB8F-96A7-493b-9835-69407359CA1A}.exe 31 PID 2924 wrote to memory of 2604 2924 {A566DB8F-96A7-493b-9835-69407359CA1A}.exe 31 PID 2924 wrote to memory of 2604 2924 {A566DB8F-96A7-493b-9835-69407359CA1A}.exe 31 PID 2852 wrote to memory of 2624 2852 {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe 32 PID 2852 wrote to memory of 2624 2852 {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe 32 PID 2852 wrote to memory of 2624 2852 {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe 32 PID 2852 wrote to memory of 2624 2852 {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe 32 PID 2852 wrote to memory of 2544 2852 {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe 33 PID 2852 wrote to memory of 2544 2852 {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe 33 PID 2852 wrote to memory of 2544 2852 {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe 33 PID 2852 wrote to memory of 2544 2852 {C38EAAD2-6D69-4b65-896E-2285543D9669}.exe 33 PID 2624 wrote to memory of 2676 2624 {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe 36 PID 2624 wrote to memory of 2676 2624 {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe 36 PID 2624 wrote to memory of 2676 2624 {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe 36 PID 2624 wrote to memory of 2676 2624 {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe 36 PID 2624 wrote to memory of 2796 2624 {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe 37 PID 2624 wrote to memory of 2796 2624 {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe 37 PID 2624 wrote to memory of 2796 2624 {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe 37 PID 2624 wrote to memory of 2796 2624 {751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe 37 PID 2676 wrote to memory of 1196 2676 {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe 38 PID 2676 wrote to memory of 1196 2676 {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe 38 PID 2676 wrote to memory of 1196 2676 {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe 38 PID 2676 wrote to memory of 1196 2676 {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe 38 PID 2676 wrote to memory of 1588 2676 {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe 39 PID 2676 wrote to memory of 1588 2676 {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe 39 PID 2676 wrote to memory of 1588 2676 {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe 39 PID 2676 wrote to memory of 1588 2676 {5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe 39 PID 1196 wrote to memory of 1448 1196 {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe 40 PID 1196 wrote to memory of 1448 1196 {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe 40 PID 1196 wrote to memory of 1448 1196 {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe 40 PID 1196 wrote to memory of 1448 1196 {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe 40 PID 1196 wrote to memory of 1580 1196 {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe 41 PID 1196 wrote to memory of 1580 1196 {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe 41 PID 1196 wrote to memory of 1580 1196 {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe 41 PID 1196 wrote to memory of 1580 1196 {B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe 41 PID 1448 wrote to memory of 2556 1448 {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe 42 PID 1448 wrote to memory of 2556 1448 {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe 42 PID 1448 wrote to memory of 2556 1448 {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe 42 PID 1448 wrote to memory of 2556 1448 {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe 42 PID 1448 wrote to memory of 1624 1448 {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe 43 PID 1448 wrote to memory of 1624 1448 {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe 43 PID 1448 wrote to memory of 1624 1448 {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe 43 PID 1448 wrote to memory of 1624 1448 {420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe 43 PID 2556 wrote to memory of 1260 2556 {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe 44 PID 2556 wrote to memory of 1260 2556 {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe 44 PID 2556 wrote to memory of 1260 2556 {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe 44 PID 2556 wrote to memory of 1260 2556 {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe 44 PID 2556 wrote to memory of 2240 2556 {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe 45 PID 2556 wrote to memory of 2240 2556 {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe 45 PID 2556 wrote to memory of 2240 2556 {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe 45 PID 2556 wrote to memory of 2240 2556 {FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe"C:\Users\Admin\AppData\Local\Temp\63466aaeb1c59461c309449977de4160ad36b242c484115019176bc930fa0863.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\{A566DB8F-96A7-493b-9835-69407359CA1A}.exeC:\Windows\{A566DB8F-96A7-493b-9835-69407359CA1A}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\{C38EAAD2-6D69-4b65-896E-2285543D9669}.exeC:\Windows\{C38EAAD2-6D69-4b65-896E-2285543D9669}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\{751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exeC:\Windows\{751E38E1-8A28-4c58-AC8A-7CAA749FBAD4}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\{5E6A48A1-06DC-4646-BEA1-D141173EF877}.exeC:\Windows\{5E6A48A1-06DC-4646-BEA1-D141173EF877}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\{B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exeC:\Windows\{B7F1EB85-7EA4-45ab-995F-F575FBA2F321}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\{420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exeC:\Windows\{420B04F1-2325-42e7-9DC8-B0A17E28A4BD}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\{FE76797B-0766-4a95-BD84-A3B81564AC1C}.exeC:\Windows\{FE76797B-0766-4a95-BD84-A3B81564AC1C}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\{E83C5933-4613-4f82-92B6-A9B4F40B789C}.exeC:\Windows\{E83C5933-4613-4f82-92B6-A9B4F40B789C}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1260 -
C:\Windows\{5CF6191D-C86E-4e78-8C27-94CF0002CFAB}.exeC:\Windows\{5CF6191D-C86E-4e78-8C27-94CF0002CFAB}.exe10⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\{272E5FD3-931F-477d-8A6E-6966480C7DD2}.exeC:\Windows\{272E5FD3-931F-477d-8A6E-6966480C7DD2}.exe11⤵PID:1140
-
C:\Windows\{35F432E0-C5DE-4dc5-A975-BA7DCA2C3D16}.exeC:\Windows\{35F432E0-C5DE-4dc5-A975-BA7DCA2C3D16}.exe12⤵PID:1796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{272E5~1.EXE > nul12⤵PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5CF61~1.EXE > nul11⤵PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E83C5~1.EXE > nul10⤵PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FE767~1.EXE > nul9⤵PID:2240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{420B0~1.EXE > nul8⤵PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B7F1E~1.EXE > nul7⤵PID:1580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5E6A4~1.EXE > nul6⤵PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{751E3~1.EXE > nul5⤵PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C38EA~1.EXE > nul4⤵PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A566D~1.EXE > nul3⤵PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\63466A~1.EXE > nul2⤵
- Deletes itself
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD56aa35db24d97b258590890f8362dc95c
SHA1040c93f54a00f8eb231f58b080cf55f20e090eda
SHA256b4a46181e0c3881fc090e393f613ae7185f2d0f1cfb27ba0849bd55f9a48bd03
SHA51257c589b11ef0dfb00f62d7a06b6dcf2bb4989031d8a0a250001eec438362e46e2a16873c8cdb45f0c7b5f96224dbddfb728d62702a625b335661c73eb28b4c4f
-
Filesize
91KB
MD56805d38b741ed1873b4f80f70479c8a8
SHA13439db349cac792cb6426d58dffdb03da12411fa
SHA25655ed1dddfe9c5dae79d3c66b0d0a091587ccdeae7cd932acde901142feb8fe86
SHA51290a85f70efcb6de7190e3c9bda5c35ccf2f55a95a59480ff91a2a97c1b235a1d40fa52dc6ab94cf5f937b4392e74569bd7e604c427b0625c3a29277833aae17b
-
Filesize
91KB
MD505ce7b03ab1095110277b1a84d90a44c
SHA12056c7ae2b6be347078ced769dccb9d36b602795
SHA25604d15c3783d27ad1d70353a628cba84538842ee09fbb3aefde7c86959cd6550b
SHA51242fe06af095fe26fdb8e13d8c9938369ac19e5cd8271ba8fc6a561cf768fcf3cb2fb14618f29b668ec70d52cbd8e8f8ca170579f5fa1b1d80e472dd7b95c846d
-
Filesize
91KB
MD5cedc510f6ab01216c2bd6c804626e8f2
SHA120ba9e04537bd276963bdb300da2c002057dd419
SHA256be703c23cfe3638825798d0f7b273d2f5266a021c472f9ed6c79b5cb693aa2d5
SHA512a955d4de73d32aa1e6b6567e7c869d7983ffccedf9d4c74db19c8a9f198308b08568c4681c4b2197cc6737d4585c0a2e3011dcbc9bb5541393af65aaecf15da2
-
Filesize
91KB
MD5c758fe5b5a35c984269e36377379811c
SHA133e22d6b1bd980ea6e9f8985822ba69cec3da4aa
SHA256ccc354f02a9e53eb4eb4a4a891aadb165f25f27b91067017153887ee8277c8fd
SHA51271cb28c62da333f2d0c935d0de4482da85f7590f781deb56bb0c346d7e52c7c7c31c52bd637d0a4da7f3c68654b66cc5add375319b2185d69b3f328bf31f9575
-
Filesize
91KB
MD5bd92167e3d0a788e993ba33460a8b3ac
SHA1fd5f21d314d2547024006dd8c50b488ef67767f1
SHA25679a1facd93ac56301508dac793dc60ac81118bb1ebe872d8e6b93abce7091c48
SHA512489e6262caf992dc77c348452fce4e26acf5715abcb022cc58f6f1031a35c2ae2810442ede18dcb3ec2a7d0c437ab0aaa1950e8e1c8790acfa7205d57d67a62e
-
Filesize
91KB
MD524239df1059a76987b6e06ec787a2534
SHA121189ee2773221353fff05e04701cd30e280c722
SHA256e7304e8ed2c4e01217ca17db7908b7f1bf1af1b3a6e5a6c4d125c4e5f5561816
SHA5126439a54c3d0b6f68140a6e600f6ff6b6b892da74763576846ddb6e43a61601573e1c5e3bfd2dc28dac33da52349e94cd851dfe0bf2243a72fad6c3f08cb385fa
-
Filesize
91KB
MD56e45ff1aac77b09be53941e598394b53
SHA185f6235dff5ff3231419093871ed6b6a9f06f01c
SHA256ba16967029e7e243bda6684c5e9985fa73ef810f27b3dd51e9cc35353331275b
SHA51277694dc8e2fa6f664c3187d342db9b6727a9855e37ec10210f27dd2cf31f3b42fb6caad6d490f9a4caca2b21dd03cf4e8bbebad3e4ffc011808d84753dcb9b88
-
Filesize
91KB
MD50a8424349e9686fc01863ab0ecd429b8
SHA1dd3e63995cedbae01c763b83e5a609fe6176a1da
SHA2567a105e0381209625e884866f258f326324b5d7e676ac7b287b37298d55d5a445
SHA51296e4e6cd93fd28913ba907375c0d36a83ddafea5c22bfe7443fabff584ae432ad83a1fd124f18ac0f3cd1187494ea11e4efc2a1de598fdd05e1cc923e0a7510a
-
Filesize
91KB
MD51d6b3ddd8c04e848b9870f95845e0a57
SHA15c699cbc62a06a4538993f8f0fa15e00fc394e35
SHA25653ffb6147d06d1ef49972dbdcdce0abae514300f66e8719a7b02f0a2cc338779
SHA512cb80c690bf94c30de12abdc229f200871878d829b32b2e20e0aca97ce85e398dafc8fa0552c6b619f2f5cddc3fb3ea8281db95b8fa9d22fbb0b90f3d3724c6d1
-
Filesize
91KB
MD5c9bb74211130243fbb9a8766f0c2e4f3
SHA127f7311701aba5741c0c2adfbfaf4f3846b3e3c7
SHA256cdd83dd97bca3f5b2c54822b2281fc85171e72c61bc0ec86110472ba34aeec11
SHA512f39eaa613f6e6c36b550dc3acbb6bf257e80c68fe37cdec20066deed0b56561e17768d4931179ffecbb09b204cd93be36dcd33f409467bf49d2d5ab01c1e795f