Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe
Resource
win10v2004-20240704-en
General
-
Target
042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe
-
Size
380KB
-
MD5
d7f67f5e053d2943cabd1a645ceae080
-
SHA1
2c8808bdd5bef7b95016d6f5f54ecc1252ce0ccb
-
SHA256
042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd
-
SHA512
89b56fb034b1e09f6ba536a42dd9e3936661f3cac967cb1ff3c69e5491711f0e6cbe282b20aa7ca6bcbf03b940011ed1a9895d665dfd13a2aa8a6329e55dfcd0
-
SSDEEP
3072:mEGh0oWlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGol7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A3D90225-FFBC-4ecd-9B98-74A40F6491CC}\stubpath = "C:\\Windows\\{A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe" {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4EC3AC5B-4054-4084-84F6-D6DA8C610D34} {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6C6E4BDC-B632-418e-95AC-2B75BEE940A1} {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F827516E-4E13-4114-B1C8-9E9DA7832CB6}\stubpath = "C:\\Windows\\{F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe" {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{112E6797-8304-4433-9F28-797FE83045D3}\stubpath = "C:\\Windows\\{112E6797-8304-4433-9F28-797FE83045D3}.exe" 042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{262463E8-010E-4ba9-9E49-27CACC4A4B33}\stubpath = "C:\\Windows\\{262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe" {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C1288B2-86C6-4125-9297-FA7CEA1FE847} {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6C6E4BDC-B632-418e-95AC-2B75BEE940A1}\stubpath = "C:\\Windows\\{6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe" {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F827516E-4E13-4114-B1C8-9E9DA7832CB6} {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{262463E8-010E-4ba9-9E49-27CACC4A4B33} {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{275CC07A-ACE5-453a-BC14-533BD92554AB} {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{275CC07A-ACE5-453a-BC14-533BD92554AB}\stubpath = "C:\\Windows\\{275CC07A-ACE5-453a-BC14-533BD92554AB}.exe" {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{112E6797-8304-4433-9F28-797FE83045D3} 042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{23EEB724-4B4B-4229-A6E8-9B76F26C8705} {112E6797-8304-4433-9F28-797FE83045D3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{23EEB724-4B4B-4229-A6E8-9B76F26C8705}\stubpath = "C:\\Windows\\{23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe" {112E6797-8304-4433-9F28-797FE83045D3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0CCD870B-0A99-411d-AC5C-2FA8C0C19731}\stubpath = "C:\\Windows\\{0CCD870B-0A99-411d-AC5C-2FA8C0C19731}.exe" {8418EB6F-42DE-4cae-B7FF-040EC97620BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1319F2D2-66B7-4738-ABEB-FC70243B3144}\stubpath = "C:\\Windows\\{1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe" {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8418EB6F-42DE-4cae-B7FF-040EC97620BC} {1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8418EB6F-42DE-4cae-B7FF-040EC97620BC}\stubpath = "C:\\Windows\\{8418EB6F-42DE-4cae-B7FF-040EC97620BC}.exe" {1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1319F2D2-66B7-4738-ABEB-FC70243B3144} {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0CCD870B-0A99-411d-AC5C-2FA8C0C19731} {8418EB6F-42DE-4cae-B7FF-040EC97620BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4EC3AC5B-4054-4084-84F6-D6DA8C610D34}\stubpath = "C:\\Windows\\{4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe" {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A3D90225-FFBC-4ecd-9B98-74A40F6491CC} {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C1288B2-86C6-4125-9297-FA7CEA1FE847}\stubpath = "C:\\Windows\\{7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe" {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe -
Executes dropped EXE 12 IoCs
pid Process 4424 {112E6797-8304-4433-9F28-797FE83045D3}.exe 1048 {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe 1460 {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe 3868 {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe 2708 {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe 2196 {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe 3100 {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe 4428 {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe 1476 {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe 2784 {1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe 5092 {8418EB6F-42DE-4cae-B7FF-040EC97620BC}.exe 2812 {0CCD870B-0A99-411d-AC5C-2FA8C0C19731}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe {112E6797-8304-4433-9F28-797FE83045D3}.exe File created C:\Windows\{6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe File created C:\Windows\{275CC07A-ACE5-453a-BC14-533BD92554AB}.exe {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe File created C:\Windows\{7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe File created C:\Windows\{8418EB6F-42DE-4cae-B7FF-040EC97620BC}.exe {1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe File created C:\Windows\{112E6797-8304-4433-9F28-797FE83045D3}.exe 042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe File created C:\Windows\{4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe File created C:\Windows\{F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe File created C:\Windows\{262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe File created C:\Windows\{A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe File created C:\Windows\{1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe File created C:\Windows\{0CCD870B-0A99-411d-AC5C-2FA8C0C19731}.exe {8418EB6F-42DE-4cae-B7FF-040EC97620BC}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4984 042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe Token: SeIncBasePriorityPrivilege 4424 {112E6797-8304-4433-9F28-797FE83045D3}.exe Token: SeIncBasePriorityPrivilege 1048 {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe Token: SeIncBasePriorityPrivilege 1460 {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe Token: SeIncBasePriorityPrivilege 3868 {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe Token: SeIncBasePriorityPrivilege 2708 {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe Token: SeIncBasePriorityPrivilege 2196 {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe Token: SeIncBasePriorityPrivilege 3100 {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe Token: SeIncBasePriorityPrivilege 4428 {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe Token: SeIncBasePriorityPrivilege 1476 {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe Token: SeIncBasePriorityPrivilege 2784 {1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe Token: SeIncBasePriorityPrivilege 5092 {8418EB6F-42DE-4cae-B7FF-040EC97620BC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4424 4984 042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe 78 PID 4984 wrote to memory of 4424 4984 042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe 78 PID 4984 wrote to memory of 4424 4984 042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe 78 PID 4984 wrote to memory of 3076 4984 042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe 79 PID 4984 wrote to memory of 3076 4984 042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe 79 PID 4984 wrote to memory of 3076 4984 042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe 79 PID 4424 wrote to memory of 1048 4424 {112E6797-8304-4433-9F28-797FE83045D3}.exe 80 PID 4424 wrote to memory of 1048 4424 {112E6797-8304-4433-9F28-797FE83045D3}.exe 80 PID 4424 wrote to memory of 1048 4424 {112E6797-8304-4433-9F28-797FE83045D3}.exe 80 PID 4424 wrote to memory of 3008 4424 {112E6797-8304-4433-9F28-797FE83045D3}.exe 81 PID 4424 wrote to memory of 3008 4424 {112E6797-8304-4433-9F28-797FE83045D3}.exe 81 PID 4424 wrote to memory of 3008 4424 {112E6797-8304-4433-9F28-797FE83045D3}.exe 81 PID 1048 wrote to memory of 1460 1048 {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe 82 PID 1048 wrote to memory of 1460 1048 {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe 82 PID 1048 wrote to memory of 1460 1048 {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe 82 PID 1048 wrote to memory of 2020 1048 {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe 83 PID 1048 wrote to memory of 2020 1048 {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe 83 PID 1048 wrote to memory of 2020 1048 {23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe 83 PID 1460 wrote to memory of 3868 1460 {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe 84 PID 1460 wrote to memory of 3868 1460 {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe 84 PID 1460 wrote to memory of 3868 1460 {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe 84 PID 1460 wrote to memory of 4400 1460 {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe 85 PID 1460 wrote to memory of 4400 1460 {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe 85 PID 1460 wrote to memory of 4400 1460 {4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe 85 PID 3868 wrote to memory of 2708 3868 {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe 86 PID 3868 wrote to memory of 2708 3868 {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe 86 PID 3868 wrote to memory of 2708 3868 {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe 86 PID 3868 wrote to memory of 1784 3868 {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe 87 PID 3868 wrote to memory of 1784 3868 {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe 87 PID 3868 wrote to memory of 1784 3868 {6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe 87 PID 2708 wrote to memory of 2196 2708 {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe 88 PID 2708 wrote to memory of 2196 2708 {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe 88 PID 2708 wrote to memory of 2196 2708 {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe 88 PID 2708 wrote to memory of 3176 2708 {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe 89 PID 2708 wrote to memory of 3176 2708 {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe 89 PID 2708 wrote to memory of 3176 2708 {F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe 89 PID 2196 wrote to memory of 3100 2196 {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe 90 PID 2196 wrote to memory of 3100 2196 {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe 90 PID 2196 wrote to memory of 3100 2196 {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe 90 PID 2196 wrote to memory of 2456 2196 {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe 91 PID 2196 wrote to memory of 2456 2196 {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe 91 PID 2196 wrote to memory of 2456 2196 {262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe 91 PID 3100 wrote to memory of 4428 3100 {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe 92 PID 3100 wrote to memory of 4428 3100 {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe 92 PID 3100 wrote to memory of 4428 3100 {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe 92 PID 3100 wrote to memory of 1156 3100 {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe 93 PID 3100 wrote to memory of 1156 3100 {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe 93 PID 3100 wrote to memory of 1156 3100 {A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe 93 PID 4428 wrote to memory of 1476 4428 {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe 94 PID 4428 wrote to memory of 1476 4428 {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe 94 PID 4428 wrote to memory of 1476 4428 {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe 94 PID 4428 wrote to memory of 1100 4428 {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe 95 PID 4428 wrote to memory of 1100 4428 {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe 95 PID 4428 wrote to memory of 1100 4428 {275CC07A-ACE5-453a-BC14-533BD92554AB}.exe 95 PID 1476 wrote to memory of 2784 1476 {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe 96 PID 1476 wrote to memory of 2784 1476 {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe 96 PID 1476 wrote to memory of 2784 1476 {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe 96 PID 1476 wrote to memory of 1492 1476 {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe 97 PID 1476 wrote to memory of 1492 1476 {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe 97 PID 1476 wrote to memory of 1492 1476 {7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe 97 PID 2784 wrote to memory of 5092 2784 {1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe 98 PID 2784 wrote to memory of 5092 2784 {1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe 98 PID 2784 wrote to memory of 5092 2784 {1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe 98 PID 2784 wrote to memory of 2508 2784 {1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe"C:\Users\Admin\AppData\Local\Temp\042cddd179e76980a693de37ac6f94c7b7e34605d6fc22e63928abbc05a533bd.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\{112E6797-8304-4433-9F28-797FE83045D3}.exeC:\Windows\{112E6797-8304-4433-9F28-797FE83045D3}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\{23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exeC:\Windows\{23EEB724-4B4B-4229-A6E8-9B76F26C8705}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\{4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exeC:\Windows\{4EC3AC5B-4054-4084-84F6-D6DA8C610D34}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\{6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exeC:\Windows\{6C6E4BDC-B632-418e-95AC-2B75BEE940A1}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\{F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exeC:\Windows\{F827516E-4E13-4114-B1C8-9E9DA7832CB6}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\{262463E8-010E-4ba9-9E49-27CACC4A4B33}.exeC:\Windows\{262463E8-010E-4ba9-9E49-27CACC4A4B33}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\{A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exeC:\Windows\{A3D90225-FFBC-4ecd-9B98-74A40F6491CC}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\{275CC07A-ACE5-453a-BC14-533BD92554AB}.exeC:\Windows\{275CC07A-ACE5-453a-BC14-533BD92554AB}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\{7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exeC:\Windows\{7C1288B2-86C6-4125-9297-FA7CEA1FE847}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\{1319F2D2-66B7-4738-ABEB-FC70243B3144}.exeC:\Windows\{1319F2D2-66B7-4738-ABEB-FC70243B3144}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\{8418EB6F-42DE-4cae-B7FF-040EC97620BC}.exeC:\Windows\{8418EB6F-42DE-4cae-B7FF-040EC97620BC}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5092 -
C:\Windows\{0CCD870B-0A99-411d-AC5C-2FA8C0C19731}.exeC:\Windows\{0CCD870B-0A99-411d-AC5C-2FA8C0C19731}.exe13⤵
- Executes dropped EXE
PID:2812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8418E~1.EXE > nul13⤵PID:3696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1319F~1.EXE > nul12⤵PID:2508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C128~1.EXE > nul11⤵PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{275CC~1.EXE > nul10⤵PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A3D90~1.EXE > nul9⤵PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26246~1.EXE > nul8⤵PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F8275~1.EXE > nul7⤵PID:3176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C6E4~1.EXE > nul6⤵PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4EC3A~1.EXE > nul5⤵PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{23EEB~1.EXE > nul4⤵PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{112E6~1.EXE > nul3⤵PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\042CDD~1.EXE > nul2⤵PID:3076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD529c31c4e521dfe6c2758b54a6762772c
SHA17e690c16904b43250795af15443c156018f16a0e
SHA2561514da18f3812dbdf09ace83ba2ebbac4c84c66f17dc1ea5f811492031cd06b1
SHA512664166d348db238732beec3f4db5879bb428a41b48464ff3589483073d632d6ca890f4b78c56ec662a106fcdea24a1526b105d9f67e5f81f2e4490e4690077e8
-
Filesize
380KB
MD5f540a0569ad05aef15dfe186988a6bc5
SHA10a6a611005f52c376e603516e8a0c8d2afea856d
SHA256240d794961f18b68b4df97055cb256529c636863ccb2ea1ad87347e3d76e1652
SHA5120ccf3511795efc37b79885502a512ff8212b6fc8d6e720e1a895f7b5f6d04e40cef0bea68d7d22839c1e425bd09001efa6497d8b8dbfcb77c7e5d9626f9d9466
-
Filesize
380KB
MD5516089e013618877d11d61e9afe77473
SHA1b91ce41c58ea8bc3e8e176d207731a64fd8c7e2a
SHA256841d6c9ed6e9fb9383855c54f1b9aaa7a077cb2d478e3039a71709efd9708eb6
SHA512d7d9be83531262f67bd9d27c6ea7c8d33403b50ceae2c7001451ae1601f1392d03111d099e7a889be29433b8a4e191812c9955e42f2e89a44249412803709fa0
-
Filesize
380KB
MD5965b846aaeb623cc1edbc95be69136ec
SHA14495f73212e95ab55d31201135470020c489e045
SHA256598a7964d770f0413de559c647898741d93c6277f252a399528b14ceed06240d
SHA5125c77f885aaea6c1941c19b9932184d06a4f81ef4e1d0973072ef99f723010700d80ad4cedbac42edf520211f0cc4c9e29d0912e8d4d67a0cfc5f9e1e8cb8dd93
-
Filesize
380KB
MD5c06e497c30a22e795f5113d5a2872a7d
SHA13d2296d615aa0c9e52eb4b2ad33e39cf8c6bbf31
SHA25601de83563df16079def5e7c32bd2c6be866d5e38023ffd4ba9c5bc74b87d50ab
SHA512e8dd273837c303468f3e3888794b15c1b047cc9ab70a7881aa90a9186a346d410d649f47fba3b58d1732e2e18324d465325197f0f42bb9834c78177ce3757d9c
-
Filesize
380KB
MD5aaf8507ae2a8a7fa7abd5e84b6a5868f
SHA18b0f24fda02001cb645906a9a51ca7120c04d9d4
SHA2569f1ef6c039ac4e9a265da2fa74c7748998041eb71dc118100d8d08a81331ea64
SHA51295e9f147831cb2e8ac9fac907d9f219e6b3a343bdda6554b9bc7876f4b0aa65a5dcd4e79110261fd1a789af944cfe605b75670a1028799696a95dd5333248fb6
-
Filesize
380KB
MD52c508948e3990fcda1f8a05f11b44c6a
SHA1a5da83b8b9ad19814d5b83228619f5a805c1f054
SHA256739d3910f9815041013b1c7d494375a6ed69782c5a23391cecb4fc1649c29094
SHA512e30f01cbaa4e28e9bff36bc2c6062aee0b782008f450f84a985d820a10d990d3b2166c5a306c145d72bf085cd3f7cc3c10998da1c40e6bcb843f6b9c997f7d10
-
Filesize
380KB
MD59c0f4b81d18cf508ffdb460c007b652a
SHA1eb854687cb0169d9c6e0200086c137ccb0d054fe
SHA2563ed864ed05d36b87017fc16ab8fd20867621d1eb6a483192a8ec1f0614bb4458
SHA512fb3dd1ba1efe43ba188b8c12ccfcf06e8f538bc4041b4c8bff52faad474fa8738275f96db5ae61bf5e44a66d399df589ba395bedc4e4503bb0637a5a41d77cfd
-
Filesize
380KB
MD525d55e5251c5831354ae1f0b6d7abf78
SHA160a43b4cbcafa75299e35091e0b9c2b479db722d
SHA25657e118b27561ee45b07d4180d58138e5a39aa8513cb2403947ca5dd5a6280e74
SHA512feaa5799ec2fddcb34ebb961c6bd6eb1ca32fe3c0ec610363135d27f32df843f64b2eb04da52917c209b34ddf9a18cfcda8b9a18df6856402a58dbd37ef80c79
-
Filesize
380KB
MD5b330a0ecf85706ffb91c97552a25ecde
SHA1732904d660e4f8d71b38bdf17f121d3aedec9a35
SHA256589d967b664a388bf4503abe5808b816c94343d2fca9c1a0e6c43afb87655b50
SHA5121e95e91fd99b7842206a77bdc54fdddfa94c955ab2e04da21f12b73f0ed4e94d2379ba5fde0650bb61407efd1a7de188cf795007bb90f981470abd457f9f6ba5
-
Filesize
380KB
MD540900b83395a6bce041472aa227bbd7d
SHA11eba3b84dca68a66b932fa7dc1dc182216cdc0dd
SHA25663ec1ce98540a3b2c1e22c29f2be66fafd37289613a4c0d3c736e95859305310
SHA512bda335f0cf1195d7c8413c1ccad0f611de213cd9312bfdcd89e9aa8406a1e210eed73d813c3fda7718ea508bb84eb62c88b54a66bdccfaa7dd396f19b1798701
-
Filesize
380KB
MD526fd9574548901484e9624e0c7534e35
SHA18cb05a62675c1d2d537b18868b5129b82621dfcb
SHA256ffed738255ac3eb5a123c883c348f08220a4aec486be4002f9ff0956aa1d7b1e
SHA5127f9eca19d653ce2f8578e7770139fe281a9ad2c9844ebfcd20e5010f1747e8b9e3f12c37c82b7c1d69981327496eacbf363c4e368b92ed5ce93d0f22721aa9ac