Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
c74b3ea3149a236a727a0567e6cb3bb1.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c74b3ea3149a236a727a0567e6cb3bb1.exe
Resource
win10v2004-20240704-en
General
-
Target
c74b3ea3149a236a727a0567e6cb3bb1.exe
-
Size
344KB
-
MD5
c74b3ea3149a236a727a0567e6cb3bb1
-
SHA1
83a35334dc3f651c27cf9388596f33d1d96a7a3d
-
SHA256
9a822e4946ec6848bed838e5642dfceebe0331efafa740a063b265cbc5428526
-
SHA512
a56be4868f27aef1b267e43dbc2b10ccb573ba4fa5b2cea2ce4e684a0de4422c9f4a02c8074b4b48b4552c42fb7a58c3e2e9d239539695f98ef9f18ff8fb0f68
-
SSDEEP
3072:mEGh0oGlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGUlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4B00F63-BE67-4889-A68A-539AF208A656}\stubpath = "C:\\Windows\\{C4B00F63-BE67-4889-A68A-539AF208A656}.exe" {A54BCC8C-27E0-4f7d-91F5-CA2744E57F11}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{94970598-2693-4a7c-BD5F-CB4D35C508C7}\stubpath = "C:\\Windows\\{94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe" {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2180A8FE-1AF3-468c-BD38-0B6DF7BE769C} {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}\stubpath = "C:\\Windows\\{2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe" {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A54BCC8C-27E0-4f7d-91F5-CA2744E57F11} {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}\stubpath = "C:\\Windows\\{F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe" {11067962-299C-4b20-8452-60C6ADB23246}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}\stubpath = "C:\\Windows\\{9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe" {A101D423-EE2A-4618-921A-84DFD239A74F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A101D423-EE2A-4618-921A-84DFD239A74F}\stubpath = "C:\\Windows\\{A101D423-EE2A-4618-921A-84DFD239A74F}.exe" {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4B00F63-BE67-4889-A68A-539AF208A656} {A54BCC8C-27E0-4f7d-91F5-CA2744E57F11}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025} {C4B00F63-BE67-4889-A68A-539AF208A656}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11067962-299C-4b20-8452-60C6ADB23246} c74b3ea3149a236a727a0567e6cb3bb1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EE9956D4-157A-43cf-9462-6AF1A409C973}\stubpath = "C:\\Windows\\{EE9956D4-157A-43cf-9462-6AF1A409C973}.exe" {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{94970598-2693-4a7c-BD5F-CB4D35C508C7} {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A101D423-EE2A-4618-921A-84DFD239A74F} {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A54BCC8C-27E0-4f7d-91F5-CA2744E57F11}\stubpath = "C:\\Windows\\{A54BCC8C-27E0-4f7d-91F5-CA2744E57F11}.exe" {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025}\stubpath = "C:\\Windows\\{1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025}.exe" {C4B00F63-BE67-4889-A68A-539AF208A656}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{16BEE960-BCA6-429f-B9C5-0AA268CC567C} {1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{16BEE960-BCA6-429f-B9C5-0AA268CC567C}\stubpath = "C:\\Windows\\{16BEE960-BCA6-429f-B9C5-0AA268CC567C}.exe" {1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11067962-299C-4b20-8452-60C6ADB23246}\stubpath = "C:\\Windows\\{11067962-299C-4b20-8452-60C6ADB23246}.exe" c74b3ea3149a236a727a0567e6cb3bb1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD} {11067962-299C-4b20-8452-60C6ADB23246}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EE9956D4-157A-43cf-9462-6AF1A409C973} {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9268709A-53A2-42b1-A29C-6AB7D1FE7E2A} {A101D423-EE2A-4618-921A-84DFD239A74F}.exe -
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2752 {11067962-299C-4b20-8452-60C6ADB23246}.exe 2572 {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe 2548 {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe 1528 {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe 2988 {A101D423-EE2A-4618-921A-84DFD239A74F}.exe 1348 {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe 2796 {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe 1412 {A54BCC8C-27E0-4f7d-91F5-CA2744E57F11}.exe 600 {C4B00F63-BE67-4889-A68A-539AF208A656}.exe 2056 {1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025}.exe 1316 {16BEE960-BCA6-429f-B9C5-0AA268CC567C}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe {11067962-299C-4b20-8452-60C6ADB23246}.exe File created C:\Windows\{94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe File created C:\Windows\{A101D423-EE2A-4618-921A-84DFD239A74F}.exe {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe File created C:\Windows\{2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe File created C:\Windows\{A54BCC8C-27E0-4f7d-91F5-CA2744E57F11}.exe {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe File created C:\Windows\{11067962-299C-4b20-8452-60C6ADB23246}.exe c74b3ea3149a236a727a0567e6cb3bb1.exe File created C:\Windows\{9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe {A101D423-EE2A-4618-921A-84DFD239A74F}.exe File created C:\Windows\{C4B00F63-BE67-4889-A68A-539AF208A656}.exe {A54BCC8C-27E0-4f7d-91F5-CA2744E57F11}.exe File created C:\Windows\{1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025}.exe {C4B00F63-BE67-4889-A68A-539AF208A656}.exe File created C:\Windows\{16BEE960-BCA6-429f-B9C5-0AA268CC567C}.exe {1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025}.exe File created C:\Windows\{EE9956D4-157A-43cf-9462-6AF1A409C973}.exe {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2152 c74b3ea3149a236a727a0567e6cb3bb1.exe Token: SeIncBasePriorityPrivilege 2752 {11067962-299C-4b20-8452-60C6ADB23246}.exe Token: SeIncBasePriorityPrivilege 2572 {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe Token: SeIncBasePriorityPrivilege 2548 {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe Token: SeIncBasePriorityPrivilege 1528 {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe Token: SeIncBasePriorityPrivilege 2988 {A101D423-EE2A-4618-921A-84DFD239A74F}.exe Token: SeIncBasePriorityPrivilege 1348 {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe Token: SeIncBasePriorityPrivilege 2796 {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe Token: SeIncBasePriorityPrivilege 1412 {A54BCC8C-27E0-4f7d-91F5-CA2744E57F11}.exe Token: SeIncBasePriorityPrivilege 600 {C4B00F63-BE67-4889-A68A-539AF208A656}.exe Token: SeIncBasePriorityPrivilege 2056 {1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2752 2152 c74b3ea3149a236a727a0567e6cb3bb1.exe 30 PID 2152 wrote to memory of 2752 2152 c74b3ea3149a236a727a0567e6cb3bb1.exe 30 PID 2152 wrote to memory of 2752 2152 c74b3ea3149a236a727a0567e6cb3bb1.exe 30 PID 2152 wrote to memory of 2752 2152 c74b3ea3149a236a727a0567e6cb3bb1.exe 30 PID 2152 wrote to memory of 2740 2152 c74b3ea3149a236a727a0567e6cb3bb1.exe 31 PID 2152 wrote to memory of 2740 2152 c74b3ea3149a236a727a0567e6cb3bb1.exe 31 PID 2152 wrote to memory of 2740 2152 c74b3ea3149a236a727a0567e6cb3bb1.exe 31 PID 2152 wrote to memory of 2740 2152 c74b3ea3149a236a727a0567e6cb3bb1.exe 31 PID 2752 wrote to memory of 2572 2752 {11067962-299C-4b20-8452-60C6ADB23246}.exe 32 PID 2752 wrote to memory of 2572 2752 {11067962-299C-4b20-8452-60C6ADB23246}.exe 32 PID 2752 wrote to memory of 2572 2752 {11067962-299C-4b20-8452-60C6ADB23246}.exe 32 PID 2752 wrote to memory of 2572 2752 {11067962-299C-4b20-8452-60C6ADB23246}.exe 32 PID 2752 wrote to memory of 2560 2752 {11067962-299C-4b20-8452-60C6ADB23246}.exe 33 PID 2752 wrote to memory of 2560 2752 {11067962-299C-4b20-8452-60C6ADB23246}.exe 33 PID 2752 wrote to memory of 2560 2752 {11067962-299C-4b20-8452-60C6ADB23246}.exe 33 PID 2752 wrote to memory of 2560 2752 {11067962-299C-4b20-8452-60C6ADB23246}.exe 33 PID 2572 wrote to memory of 2548 2572 {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe 34 PID 2572 wrote to memory of 2548 2572 {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe 34 PID 2572 wrote to memory of 2548 2572 {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe 34 PID 2572 wrote to memory of 2548 2572 {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe 34 PID 2572 wrote to memory of 2604 2572 {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe 35 PID 2572 wrote to memory of 2604 2572 {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe 35 PID 2572 wrote to memory of 2604 2572 {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe 35 PID 2572 wrote to memory of 2604 2572 {F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe 35 PID 2548 wrote to memory of 1528 2548 {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe 36 PID 2548 wrote to memory of 1528 2548 {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe 36 PID 2548 wrote to memory of 1528 2548 {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe 36 PID 2548 wrote to memory of 1528 2548 {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe 36 PID 2548 wrote to memory of 1244 2548 {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe 37 PID 2548 wrote to memory of 1244 2548 {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe 37 PID 2548 wrote to memory of 1244 2548 {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe 37 PID 2548 wrote to memory of 1244 2548 {EE9956D4-157A-43cf-9462-6AF1A409C973}.exe 37 PID 1528 wrote to memory of 2988 1528 {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe 38 PID 1528 wrote to memory of 2988 1528 {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe 38 PID 1528 wrote to memory of 2988 1528 {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe 38 PID 1528 wrote to memory of 2988 1528 {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe 38 PID 1528 wrote to memory of 2316 1528 {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe 39 PID 1528 wrote to memory of 2316 1528 {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe 39 PID 1528 wrote to memory of 2316 1528 {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe 39 PID 1528 wrote to memory of 2316 1528 {94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe 39 PID 2988 wrote to memory of 1348 2988 {A101D423-EE2A-4618-921A-84DFD239A74F}.exe 40 PID 2988 wrote to memory of 1348 2988 {A101D423-EE2A-4618-921A-84DFD239A74F}.exe 40 PID 2988 wrote to memory of 1348 2988 {A101D423-EE2A-4618-921A-84DFD239A74F}.exe 40 PID 2988 wrote to memory of 1348 2988 {A101D423-EE2A-4618-921A-84DFD239A74F}.exe 40 PID 2988 wrote to memory of 1164 2988 {A101D423-EE2A-4618-921A-84DFD239A74F}.exe 41 PID 2988 wrote to memory of 1164 2988 {A101D423-EE2A-4618-921A-84DFD239A74F}.exe 41 PID 2988 wrote to memory of 1164 2988 {A101D423-EE2A-4618-921A-84DFD239A74F}.exe 41 PID 2988 wrote to memory of 1164 2988 {A101D423-EE2A-4618-921A-84DFD239A74F}.exe 41 PID 1348 wrote to memory of 2796 1348 {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe 42 PID 1348 wrote to memory of 2796 1348 {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe 42 PID 1348 wrote to memory of 2796 1348 {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe 42 PID 1348 wrote to memory of 2796 1348 {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe 42 PID 1348 wrote to memory of 1688 1348 {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe 43 PID 1348 wrote to memory of 1688 1348 {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe 43 PID 1348 wrote to memory of 1688 1348 {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe 43 PID 1348 wrote to memory of 1688 1348 {9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe 43 PID 2796 wrote to memory of 1412 2796 {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe 44 PID 2796 wrote to memory of 1412 2796 {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe 44 PID 2796 wrote to memory of 1412 2796 {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe 44 PID 2796 wrote to memory of 1412 2796 {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe 44 PID 2796 wrote to memory of 1980 2796 {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe 45 PID 2796 wrote to memory of 1980 2796 {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe 45 PID 2796 wrote to memory of 1980 2796 {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe 45 PID 2796 wrote to memory of 1980 2796 {2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\c74b3ea3149a236a727a0567e6cb3bb1.exe"C:\Users\Admin\AppData\Local\Temp\c74b3ea3149a236a727a0567e6cb3bb1.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\{11067962-299C-4b20-8452-60C6ADB23246}.exeC:\Windows\{11067962-299C-4b20-8452-60C6ADB23246}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\{F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exeC:\Windows\{F99F9D7D-1736-4758-BEEA-FC1F7AFB84CD}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\{EE9956D4-157A-43cf-9462-6AF1A409C973}.exeC:\Windows\{EE9956D4-157A-43cf-9462-6AF1A409C973}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\{94970598-2693-4a7c-BD5F-CB4D35C508C7}.exeC:\Windows\{94970598-2693-4a7c-BD5F-CB4D35C508C7}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\{A101D423-EE2A-4618-921A-84DFD239A74F}.exeC:\Windows\{A101D423-EE2A-4618-921A-84DFD239A74F}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\{9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exeC:\Windows\{9268709A-53A2-42b1-A29C-6AB7D1FE7E2A}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\{2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exeC:\Windows\{2180A8FE-1AF3-468c-BD38-0B6DF7BE769C}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\{A54BCC8C-27E0-4f7d-91F5-CA2744E57F11}.exeC:\Windows\{A54BCC8C-27E0-4f7d-91F5-CA2744E57F11}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\{C4B00F63-BE67-4889-A68A-539AF208A656}.exeC:\Windows\{C4B00F63-BE67-4889-A68A-539AF208A656}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:600 -
C:\Windows\{1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025}.exeC:\Windows\{1E8AF14A-9C09-4259-ABB8-DC9C0A8A1025}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\{16BEE960-BCA6-429f-B9C5-0AA268CC567C}.exeC:\Windows\{16BEE960-BCA6-429f-B9C5-0AA268CC567C}.exe12⤵
- Executes dropped EXE
PID:1316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1E8AF~1.EXE > nul12⤵PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C4B00~1.EXE > nul11⤵PID:2288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A54BC~1.EXE > nul10⤵PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2180A~1.EXE > nul9⤵PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{92687~1.EXE > nul8⤵PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A101D~1.EXE > nul7⤵PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{94970~1.EXE > nul6⤵PID:2316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EE995~1.EXE > nul5⤵PID:1244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F99F9~1.EXE > nul4⤵PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11067~1.EXE > nul3⤵PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\C74B3E~1.EXE > nul2⤵
- Deletes itself
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5b64befe692f360de83f830c1e3b8e4e4
SHA1898fba019047057167ae9909bab347e489d367ac
SHA256f6fb35be7ef8fca3fbda84bede28c414e5e0328f99ff76423979dfd325fba071
SHA512399f5fdbe095e412f54e609f7ab899a4a3394f7cc61fb6b223c361d18b8a0201637b577be2928f7735e6b2947cb72c199c56f134d8ddb169162b01c2fac77265
-
Filesize
344KB
MD5892c56b3424bf3795b20ceb47eaf7440
SHA181ba5af3c7da5ae73812621add9cdd4ab6c0e179
SHA2562fd91de486085064d783a502bd6b78929b719a14e3549859e342714678a9bd19
SHA512eb91dad2ad9afe4ee365e17bb8d075d0c301a91070a1eb35ea2665ee9813adaa74a55d65f40212150e55aee402780f478ad99737ac16f9b4a0248a2bf5273107
-
Filesize
344KB
MD59e9a155d314404db4913e520b43cc735
SHA128a7e75a81e11f6edae1a13e7155b5ff0ed42399
SHA256f2cad5ff4ae1140d2cc019de572a254ef3782e49a4972c0d7c8d0cb4b1fdf33b
SHA51259d3f42556825a53daa48c175a32b73fcd5cbdb30e3825a0dc6f57c286bb3534a070674234444c38002c5fd74eb12ab6136a003fa419cde3fb5f313af790d19f
-
Filesize
344KB
MD5fa1c7ce1b051ae8b82bcbe449a71e09c
SHA1f3778081a32246e3b42b63196f81b639062555db
SHA2567d913f16711d0c4c9d87cd25ef1b5e69696498e0fe8d6c0df9cd6d1cba8447b8
SHA512efa51d1073a80e9038315380b0cd782359d63d6863e54de06bf84047ab1fee5e76fafab7e82acf74862627e2ded74d0af16b4a03c5f9d5f2015d2517b4995876
-
Filesize
344KB
MD520c2020bd5b2977def0be6ac9df053d4
SHA1f510ea667d27f8e174d98e54bc5d5cfc456405ed
SHA2564fff550f757af8ba659bed5a23e92b2ea07ead468b7048acbc6ecf9f0b58f4d1
SHA512dbb752ebf78364ad025ab68389c01e7184059608d32fe34fb3696c6d35ee822125e2c41acd6a3a3b34e55dcfa4386105216d248a5225daffaf5b68fe6a7c10d9
-
Filesize
344KB
MD5d5711b674abd704760591da3599a0940
SHA11a8bb3e41a00d4d2edf73883c25fd114ce396106
SHA256cb965f2c0e8a55a642fd6faeb3104898e5116eb63d29c7d745a2d0befa32e464
SHA512889c118cb52c3a635da1d11fbc81275f32cc7ddb319ab9df5d6649ecc5a81c68853f34667a4f0107e0400df29e93a5608154578d135b477e8dee579ab0d9961b
-
Filesize
344KB
MD54a0a7b2fe042d369a6c1fef6834cb9dd
SHA18cc4c622fc5a4f358e3393ee1e25be48a6d108b1
SHA2561ea7f720e9d505fdd679bcb1a1b2dfc1d11a7261c1a4b656ae5fcdcd80b23a74
SHA51206e3f2f52739fde54ae66116fd4469bd2f996f5d13147543478b924bf3edb31fda43cc768593f29b6c4cf9854b3bda5528415f1d57e9e275a6e3fddcd1c4930d
-
Filesize
344KB
MD5a6a38aaf29731926f60f426ea181fcfa
SHA107086cfb21f6081b5c3a7dd171088a45c09845ee
SHA256bc7f4238800c90d21778c564c6f798f39cf35d66fc25a8171673cac261b6ef37
SHA5122dafe3529a9cab63895d8135cc0d0a45627e4ab407974c34795f93db5e12ed0f88715bc2be533c2b46ab2b27f4195b01a066dc7f450d56aee1df2e8319d13b6c
-
Filesize
344KB
MD511db247008647ebedb7878475825408e
SHA16691dee37f4ddfa815986a06b88e9fc48f8b7959
SHA2568b6c2b72f6357e4664a438ee5714bf360195bd74228fad2b198eab9e9711b43b
SHA5123943c4a007882ca2579b1c56b8da99177bd17a2ddff73814ad1d6547e8865f7944ffbfb01b8d7a38545631925e46ec63237847c498a526e1a2c75b0ec2a7e877
-
Filesize
344KB
MD503b7c2729c2a63a49729d1d5e4b4f895
SHA164a7bb8667f2b327f29244d16144d25cc1239a7f
SHA256803a54f6b32cb3046245c72bce06b2c3ee0f24dcae7d6685985098d22e8c3d96
SHA51232c0279c0aac7f9b7123b91d19a7f46a106d0def42816333ae5dc15900025a80acb74fbee84942248068ced11f012982ea2f7380816a04edd7d2746a74851f62
-
Filesize
344KB
MD5dc36a5554ea2c23c9dea71513304ef90
SHA140f69beb498a6c87b33a18a305bad17c4f1d5379
SHA25660c848f4c56844bf4470de05415a7d293edb1e2efba55156ffbb1342b19eb627
SHA5121cf4ca01d57d3083b125114c5d620138880a4faa9775506305fad4fb2d576efed7e35285a4626f75f8d3261cd0cd5b8db06ea4766f23ffb92c010f6ddd8152ce