Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe
Resource
win10v2004-20240704-en
General
-
Target
09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe
-
Size
116KB
-
MD5
99c0caf5c211b625eefcfd223264e044
-
SHA1
afb066c5f47c7c7989a2bf78a68f37204de57ea7
-
SHA256
09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113
-
SHA512
f34693273e7fa80aca3c01d542ea75997415cebbf82e86b3ae2d1739d26991d4617989ec37fb0be79335a285c675a76e6ee0aeb097ed720646a44344fc871814
-
SSDEEP
768:Qvw9816vhKQLroe4/wQRNrfrunMxVFA3b7glwRjMlfwGxEI5nWAwxt6sDntNiLJN:YEGh0oel2unMxVS3HgdoKjhLJhL
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C} {CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C}\stubpath = "C:\\Windows\\{E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C}.exe" {CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2B57FE5F-3A65-4c64-8094-32DFEE717B07} {5E54009E-7515-467a-8985-CE89BECC970B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5ED60392-3295-49e5-B7AB-C79511291A44}\stubpath = "C:\\Windows\\{5ED60392-3295-49e5-B7AB-C79511291A44}.exe" {C81C9DA1-6444-4983-8E1A-877099943655}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D939D4A5-13A4-45ed-B7F8-D85F8146476E}\stubpath = "C:\\Windows\\{D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe" {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F620D9B0-6F0E-44aa-80D9-273277E4E833} {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CC532636-C49C-4d57-88B7-ECA39A55CDDF}\stubpath = "C:\\Windows\\{CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe" {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5E54009E-7515-467a-8985-CE89BECC970B} {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C81C9DA1-6444-4983-8E1A-877099943655} {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF6D8527-BD95-4895-B2E6-3DDAA913779F}\stubpath = "C:\\Windows\\{CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe" {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6838F9AC-6BFE-4b68-8353-9E52C0B8A859}\stubpath = "C:\\Windows\\{6838F9AC-6BFE-4b68-8353-9E52C0B8A859}.exe" {E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0A28CF46-0D90-4e85-937A-27070008ABBE} 09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5ED60392-3295-49e5-B7AB-C79511291A44} {C81C9DA1-6444-4983-8E1A-877099943655}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}\stubpath = "C:\\Windows\\{BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe" {5ED60392-3295-49e5-B7AB-C79511291A44}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F620D9B0-6F0E-44aa-80D9-273277E4E833}\stubpath = "C:\\Windows\\{F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe" {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6838F9AC-6BFE-4b68-8353-9E52C0B8A859} {E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF6D8527-BD95-4895-B2E6-3DDAA913779F} {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D939D4A5-13A4-45ed-B7F8-D85F8146476E} {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CC532636-C49C-4d57-88B7-ECA39A55CDDF} {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0A28CF46-0D90-4e85-937A-27070008ABBE}\stubpath = "C:\\Windows\\{0A28CF46-0D90-4e85-937A-27070008ABBE}.exe" 09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5E54009E-7515-467a-8985-CE89BECC970B}\stubpath = "C:\\Windows\\{5E54009E-7515-467a-8985-CE89BECC970B}.exe" {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2B57FE5F-3A65-4c64-8094-32DFEE717B07}\stubpath = "C:\\Windows\\{2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe" {5E54009E-7515-467a-8985-CE89BECC970B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C81C9DA1-6444-4983-8E1A-877099943655}\stubpath = "C:\\Windows\\{C81C9DA1-6444-4983-8E1A-877099943655}.exe" {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F} {5ED60392-3295-49e5-B7AB-C79511291A44}.exe -
Executes dropped EXE 12 IoCs
pid Process 1208 {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe 324 {5E54009E-7515-467a-8985-CE89BECC970B}.exe 556 {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe 1688 {C81C9DA1-6444-4983-8E1A-877099943655}.exe 4148 {5ED60392-3295-49e5-B7AB-C79511291A44}.exe 1272 {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe 1608 {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe 3988 {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe 4008 {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe 5084 {CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe 472 {E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C}.exe 4932 {6838F9AC-6BFE-4b68-8353-9E52C0B8A859}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe File created C:\Windows\{D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe File created C:\Windows\{F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe File created C:\Windows\{E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C}.exe {CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe File created C:\Windows\{C81C9DA1-6444-4983-8E1A-877099943655}.exe {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe File created C:\Windows\{BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe {5ED60392-3295-49e5-B7AB-C79511291A44}.exe File created C:\Windows\{2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe {5E54009E-7515-467a-8985-CE89BECC970B}.exe File created C:\Windows\{5ED60392-3295-49e5-B7AB-C79511291A44}.exe {C81C9DA1-6444-4983-8E1A-877099943655}.exe File created C:\Windows\{CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe File created C:\Windows\{6838F9AC-6BFE-4b68-8353-9E52C0B8A859}.exe {E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C}.exe File created C:\Windows\{0A28CF46-0D90-4e85-937A-27070008ABBE}.exe 09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe File created C:\Windows\{5E54009E-7515-467a-8985-CE89BECC970B}.exe {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4520 09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe Token: SeIncBasePriorityPrivilege 1208 {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe Token: SeIncBasePriorityPrivilege 324 {5E54009E-7515-467a-8985-CE89BECC970B}.exe Token: SeIncBasePriorityPrivilege 556 {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe Token: SeIncBasePriorityPrivilege 1688 {C81C9DA1-6444-4983-8E1A-877099943655}.exe Token: SeIncBasePriorityPrivilege 4148 {5ED60392-3295-49e5-B7AB-C79511291A44}.exe Token: SeIncBasePriorityPrivilege 1272 {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe Token: SeIncBasePriorityPrivilege 1608 {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe Token: SeIncBasePriorityPrivilege 3988 {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe Token: SeIncBasePriorityPrivilege 4008 {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe Token: SeIncBasePriorityPrivilege 5084 {CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe Token: SeIncBasePriorityPrivilege 472 {E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 1208 4520 09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe 85 PID 4520 wrote to memory of 1208 4520 09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe 85 PID 4520 wrote to memory of 1208 4520 09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe 85 PID 4520 wrote to memory of 3996 4520 09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe 86 PID 4520 wrote to memory of 3996 4520 09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe 86 PID 4520 wrote to memory of 3996 4520 09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe 86 PID 1208 wrote to memory of 324 1208 {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe 87 PID 1208 wrote to memory of 324 1208 {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe 87 PID 1208 wrote to memory of 324 1208 {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe 87 PID 1208 wrote to memory of 3240 1208 {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe 88 PID 1208 wrote to memory of 3240 1208 {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe 88 PID 1208 wrote to memory of 3240 1208 {0A28CF46-0D90-4e85-937A-27070008ABBE}.exe 88 PID 324 wrote to memory of 556 324 {5E54009E-7515-467a-8985-CE89BECC970B}.exe 92 PID 324 wrote to memory of 556 324 {5E54009E-7515-467a-8985-CE89BECC970B}.exe 92 PID 324 wrote to memory of 556 324 {5E54009E-7515-467a-8985-CE89BECC970B}.exe 92 PID 324 wrote to memory of 4688 324 {5E54009E-7515-467a-8985-CE89BECC970B}.exe 93 PID 324 wrote to memory of 4688 324 {5E54009E-7515-467a-8985-CE89BECC970B}.exe 93 PID 324 wrote to memory of 4688 324 {5E54009E-7515-467a-8985-CE89BECC970B}.exe 93 PID 556 wrote to memory of 1688 556 {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe 94 PID 556 wrote to memory of 1688 556 {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe 94 PID 556 wrote to memory of 1688 556 {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe 94 PID 556 wrote to memory of 4100 556 {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe 95 PID 556 wrote to memory of 4100 556 {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe 95 PID 556 wrote to memory of 4100 556 {2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe 95 PID 1688 wrote to memory of 4148 1688 {C81C9DA1-6444-4983-8E1A-877099943655}.exe 96 PID 1688 wrote to memory of 4148 1688 {C81C9DA1-6444-4983-8E1A-877099943655}.exe 96 PID 1688 wrote to memory of 4148 1688 {C81C9DA1-6444-4983-8E1A-877099943655}.exe 96 PID 1688 wrote to memory of 4628 1688 {C81C9DA1-6444-4983-8E1A-877099943655}.exe 97 PID 1688 wrote to memory of 4628 1688 {C81C9DA1-6444-4983-8E1A-877099943655}.exe 97 PID 1688 wrote to memory of 4628 1688 {C81C9DA1-6444-4983-8E1A-877099943655}.exe 97 PID 4148 wrote to memory of 1272 4148 {5ED60392-3295-49e5-B7AB-C79511291A44}.exe 98 PID 4148 wrote to memory of 1272 4148 {5ED60392-3295-49e5-B7AB-C79511291A44}.exe 98 PID 4148 wrote to memory of 1272 4148 {5ED60392-3295-49e5-B7AB-C79511291A44}.exe 98 PID 4148 wrote to memory of 2460 4148 {5ED60392-3295-49e5-B7AB-C79511291A44}.exe 99 PID 4148 wrote to memory of 2460 4148 {5ED60392-3295-49e5-B7AB-C79511291A44}.exe 99 PID 4148 wrote to memory of 2460 4148 {5ED60392-3295-49e5-B7AB-C79511291A44}.exe 99 PID 1272 wrote to memory of 1608 1272 {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe 100 PID 1272 wrote to memory of 1608 1272 {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe 100 PID 1272 wrote to memory of 1608 1272 {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe 100 PID 1272 wrote to memory of 1912 1272 {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe 101 PID 1272 wrote to memory of 1912 1272 {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe 101 PID 1272 wrote to memory of 1912 1272 {BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe 101 PID 1608 wrote to memory of 3988 1608 {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe 102 PID 1608 wrote to memory of 3988 1608 {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe 102 PID 1608 wrote to memory of 3988 1608 {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe 102 PID 1608 wrote to memory of 2076 1608 {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe 103 PID 1608 wrote to memory of 2076 1608 {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe 103 PID 1608 wrote to memory of 2076 1608 {CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe 103 PID 3988 wrote to memory of 4008 3988 {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe 104 PID 3988 wrote to memory of 4008 3988 {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe 104 PID 3988 wrote to memory of 4008 3988 {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe 104 PID 3988 wrote to memory of 1588 3988 {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe 105 PID 3988 wrote to memory of 1588 3988 {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe 105 PID 3988 wrote to memory of 1588 3988 {D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe 105 PID 4008 wrote to memory of 5084 4008 {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe 106 PID 4008 wrote to memory of 5084 4008 {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe 106 PID 4008 wrote to memory of 5084 4008 {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe 106 PID 4008 wrote to memory of 840 4008 {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe 107 PID 4008 wrote to memory of 840 4008 {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe 107 PID 4008 wrote to memory of 840 4008 {F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe 107 PID 5084 wrote to memory of 472 5084 {CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe 108 PID 5084 wrote to memory of 472 5084 {CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe 108 PID 5084 wrote to memory of 472 5084 {CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe 108 PID 5084 wrote to memory of 864 5084 {CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe"C:\Users\Admin\AppData\Local\Temp\09706998901c2ebd071ca05cbc5ec81921ba9d20ead1cadbc8654735509c8113.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\{0A28CF46-0D90-4e85-937A-27070008ABBE}.exeC:\Windows\{0A28CF46-0D90-4e85-937A-27070008ABBE}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\{5E54009E-7515-467a-8985-CE89BECC970B}.exeC:\Windows\{5E54009E-7515-467a-8985-CE89BECC970B}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\{2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exeC:\Windows\{2B57FE5F-3A65-4c64-8094-32DFEE717B07}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\{C81C9DA1-6444-4983-8E1A-877099943655}.exeC:\Windows\{C81C9DA1-6444-4983-8E1A-877099943655}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\{5ED60392-3295-49e5-B7AB-C79511291A44}.exeC:\Windows\{5ED60392-3295-49e5-B7AB-C79511291A44}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\{BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exeC:\Windows\{BF18BDA0-2DB6-4a0c-B620-86457CF2FD0F}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\{CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exeC:\Windows\{CF6D8527-BD95-4895-B2E6-3DDAA913779F}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\{D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exeC:\Windows\{D939D4A5-13A4-45ed-B7F8-D85F8146476E}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\{F620D9B0-6F0E-44aa-80D9-273277E4E833}.exeC:\Windows\{F620D9B0-6F0E-44aa-80D9-273277E4E833}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\{CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exeC:\Windows\{CC532636-C49C-4d57-88B7-ECA39A55CDDF}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\{E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C}.exeC:\Windows\{E15BAE0A-08AA-4880-ABC2-9DBB1A4BDB2C}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:472 -
C:\Windows\{6838F9AC-6BFE-4b68-8353-9E52C0B8A859}.exeC:\Windows\{6838F9AC-6BFE-4b68-8353-9E52C0B8A859}.exe13⤵
- Executes dropped EXE
PID:4932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E15BA~1.EXE > nul13⤵PID:3456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CC532~1.EXE > nul12⤵PID:864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F620D~1.EXE > nul11⤵PID:840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D939D~1.EXE > nul10⤵PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CF6D8~1.EXE > nul9⤵PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BF18B~1.EXE > nul8⤵PID:1912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5ED60~1.EXE > nul7⤵PID:2460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C81C9~1.EXE > nul6⤵PID:4628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2B57F~1.EXE > nul5⤵PID:4100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5E540~1.EXE > nul4⤵PID:4688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0A28C~1.EXE > nul3⤵PID:3240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\097069~1.EXE > nul2⤵PID:3996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5a891f9c2c57d71b05d7c43ac8ecc5bda
SHA157f353c671cd92cd871412ee5160c8ffd900f32c
SHA256e9cf128833b53cf3bfdc9df1bea70cafff1163b94b72a632e4d61cd67fcee416
SHA5123f6958ca4a5f225514c8a9a9c3459ce7e0561bb3d7919d01bf5bde1c45db911f1f060c8c685c29df17ae0636ccdc13176fdcd80778e1626c7c9ca9922b2039c3
-
Filesize
116KB
MD56d1feaa87f55a981a26bb87dc3f597e7
SHA13c6aae953d5b3924fc30cdf280bb1439378824b5
SHA2564445e194b9841e5efea3408a937d878a47667204e6fefec209960e43329b77f5
SHA512690d258fa15dd3b936c73be1f9b1a3a0a9d5019ae01895fee8ddbdac4784119d6c678055a1db3a4b2b768644a32efa975266097e38df87d8413565703ebb3be8
-
Filesize
116KB
MD54720e358f9d8cb4128176a5041f19952
SHA12a543e60e762329775ec3fb4b790f5fbcbe385bc
SHA256a47f324365bf4d3549c52d78db85098872b89fb8671f56d9bae21cdc12003926
SHA512790f8250f2fa48c5e57741ee5aaf537592983c746a581d2213891f8e1bfe92c2d10be170fd149a34a7bb024986b7263c9469bfe204b27bc7123fca5602e39bad
-
Filesize
116KB
MD590f3970807a8d9e3d37ceaa03f7f2500
SHA1f49f40f5d891026a680fcf513d979b9b2b6918da
SHA2563ec052ee0864f767522aa4d8587df23418ce54aacf5e14bbf9a0c99af0e3873d
SHA512aecbbae5d55ce2cce265dbbe43a123e7ee4128dbee400b361a6e8cd73e34fbd67bf956e282f8d6f8843b66c574d35bf2446684b67b0e943b97de3b3a5d280685
-
Filesize
116KB
MD5e840bf17f2e3e47a1e82f9fe40322d74
SHA142805c7d257600430bdc9e862c0ec79f94b6d45b
SHA2563434768492482c299c44c5d858ae4ec5dfcede3fd99437b831ebc1943c050f1b
SHA512c7e5fee6df3edd27c8f1d50707a17e7bc00d48e7c2b35e9f11de27aa324e1cfbd684ba62427feba1a76ccaa88bdcb2c8f04b71d1d74f471fb1501ed841baa28d
-
Filesize
116KB
MD5904f5dea9c347c3c58a397fda2e5cd29
SHA12895f2f21fab169832d8b05ec9cacc4584a8ac68
SHA2565f42c2548de4c5292a869cf92580e1932c6baef3de25352a5e786b962212d7c4
SHA512d52f3b35cf8d298af9e8b9f5307bd6709768aa775511019fc30ba8c091fe76c1ce5e8915791e2d4e585b93d6a20f37b6b8ad48ed1232c814e789b5ada0ac22cb
-
Filesize
116KB
MD5e5f4a743d65a54c48993b53d3599530c
SHA13c301b594e3bb8726e9aa592cd41da6186520d43
SHA2564ab6c007d7be4106c6180c56051b733b5f58d58ac41a5e6aa4bcdd44c475cc41
SHA51204f32c38a337752ffe42c93405469a1992a3c667aa949bd63d3d9ac498689794e772a825c0506c0072977db24a97e4345ef67a982e49e2d225a142c11a53f746
-
Filesize
116KB
MD50b450803785659c317c6bc05751e8a13
SHA1b117392373b55d1234ebfe79190228cef80afb2c
SHA2566378241db22ed04502a2552b3b6f88d500b71f5402c471ef9fd6fad874932edb
SHA5120433bb6f298274b4fbd94f6d321b5c3dee485d5bca010ee0d2cb633cb95c586937c8bd95c3ec9ce94281bdd365e45e90e53232e147d49c5f2355784158d16738
-
Filesize
116KB
MD5523fe7ad4d88a40e82f28c73bcaa319d
SHA1ce41ec379e018e629b6a442f62491fa82cbab464
SHA256c01e6a1a658b7e97090024c2be3f0d2e87d01561d57c245c41f14be46372acf2
SHA5128ff0b4e7fb0d6c9912759a5a4d5e7c9093283c73f3da7e98c5b8545c0a1371087766a7d1058d88a4d7dc5dc546718680cae8a7092e7c5719fb981019cff1185c
-
Filesize
116KB
MD5abb1383a422f76b1bd609d6b2093f46d
SHA1d181174664f77cb1ff77fa6e1213a61e2b1ddc36
SHA2569f578f3a6275fb919bca4e8ba99558ab2e9e66da641fc2ad151bcfdde8500c33
SHA512ffc032e92584f1ec3314adf586ddb07439a9b1eeb854fe670ee0eeb530d5eeed28fe26fa91bad619c45a0dff27a4002013509166a2631e9187226b8672e55b3a
-
Filesize
116KB
MD528f11f2eff750eb3e2827f60e20e39e8
SHA1fddd3e6ca8de745b49a8b9e29b5d0a2e7fbc258d
SHA25687c5528d4436441b7748c09091388fd9b530b984a9a2629dda5cc6bfe4453d0d
SHA5123a7d0e1d63d8b899d33096a4005826f5de670e75306bbad27146f2804ddb6ebc6d20b2372f5a411b0749c7842b3e7e74d4cd5358ca3aa98e03c605ba3e12809e
-
Filesize
116KB
MD53ec36b48d5f914c66df75cf0e9615205
SHA151c3b5734cb6ff661477e5fa386b27071a67af10
SHA25601c8b1ceb21a924c9f759b57121a0990d910706737dd8b6c0206bb36443f9293
SHA512dfc3dd8931ea8dc2912c6c135f5feba7bf499b58978252f9079a6a0967a53758462d8404bb96aad3027734bc72fd4bfdccfe6036d4e62531602f1fa04fd7f746