Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe
Resource
win10v2004-20240508-en
General
-
Target
4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe
-
Size
90KB
-
MD5
0326c71b0291122a302b68694d8705dc
-
SHA1
249185e7484a784a15f2e0f5eb8c943b8bfad379
-
SHA256
4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e
-
SHA512
94044f931a7241de228cefba1e179f4ad37732a514043ebbfc9574ba2b004c08a125ae63b38f6018124ae4ab86f7d7ac1bcea2e22dc3010a372c4088088e933f
-
SSDEEP
768:5vw981UMhKQLroU4/wQ4pNrfrunMxVFA3bA:lEG00oUl3zunMxVS3c
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{27638D64-366E-4791-81CC-48F36CC96C72} {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E2C38172-C308-439e-A8D5-3BD8232DACC1} {27638D64-366E-4791-81CC-48F36CC96C72}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E62A011-BEDC-4cc4-B6C1-99B740E6EB88}\stubpath = "C:\\Windows\\{1E62A011-BEDC-4cc4-B6C1-99B740E6EB88}.exe" {01D309CF-029A-43b2-865E-64089BAC222C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7ED5CF79-3866-4174-99B2-1E6E599B2135}\stubpath = "C:\\Windows\\{7ED5CF79-3866-4174-99B2-1E6E599B2135}.exe" {1E62A011-BEDC-4cc4-B6C1-99B740E6EB88}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{011DCBD3-1681-4dea-831D-8970A1E0B559} {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{011DCBD3-1681-4dea-831D-8970A1E0B559}\stubpath = "C:\\Windows\\{011DCBD3-1681-4dea-831D-8970A1E0B559}.exe" {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80BC2E75-D590-4205-A58A-EDC1E5B23391} {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01D309CF-029A-43b2-865E-64089BAC222C}\stubpath = "C:\\Windows\\{01D309CF-029A-43b2-865E-64089BAC222C}.exe" {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E62A011-BEDC-4cc4-B6C1-99B740E6EB88} {01D309CF-029A-43b2-865E-64089BAC222C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4B72138E-A71F-4041-95FE-60BA1C752310}\stubpath = "C:\\Windows\\{4B72138E-A71F-4041-95FE-60BA1C752310}.exe" {7ED5CF79-3866-4174-99B2-1E6E599B2135}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C252F05-DF91-4724-A1AD-014FDB7B98CD}\stubpath = "C:\\Windows\\{5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe" 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80BC2E75-D590-4205-A58A-EDC1E5B23391}\stubpath = "C:\\Windows\\{80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe" {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}\stubpath = "C:\\Windows\\{C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe" {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E2C38172-C308-439e-A8D5-3BD8232DACC1}\stubpath = "C:\\Windows\\{E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe" {27638D64-366E-4791-81CC-48F36CC96C72}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01D309CF-029A-43b2-865E-64089BAC222C} {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4B72138E-A71F-4041-95FE-60BA1C752310} {7ED5CF79-3866-4174-99B2-1E6E599B2135}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63F52E4E-F0BB-44d4-8A00-992410BE1A87}\stubpath = "C:\\Windows\\{63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe" {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD} {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7ED5CF79-3866-4174-99B2-1E6E599B2135} {1E62A011-BEDC-4cc4-B6C1-99B740E6EB88}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C252F05-DF91-4724-A1AD-014FDB7B98CD} 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{27638D64-366E-4791-81CC-48F36CC96C72}\stubpath = "C:\\Windows\\{27638D64-366E-4791-81CC-48F36CC96C72}.exe" {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63F52E4E-F0BB-44d4-8A00-992410BE1A87} {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe -
Deletes itself 1 IoCs
pid Process 2792 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1620 {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe 2880 {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe 2632 {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe 2668 {27638D64-366E-4791-81CC-48F36CC96C72}.exe 848 {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe 2808 {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe 2500 {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe 2496 {01D309CF-029A-43b2-865E-64089BAC222C}.exe 2372 {1E62A011-BEDC-4cc4-B6C1-99B740E6EB88}.exe 1432 {7ED5CF79-3866-4174-99B2-1E6E599B2135}.exe 1904 {4B72138E-A71F-4041-95FE-60BA1C752310}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{011DCBD3-1681-4dea-831D-8970A1E0B559}.exe {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe File created C:\Windows\{63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe File created C:\Windows\{C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe File created C:\Windows\{1E62A011-BEDC-4cc4-B6C1-99B740E6EB88}.exe {01D309CF-029A-43b2-865E-64089BAC222C}.exe File created C:\Windows\{5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe File created C:\Windows\{27638D64-366E-4791-81CC-48F36CC96C72}.exe {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe File created C:\Windows\{E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe {27638D64-366E-4791-81CC-48F36CC96C72}.exe File created C:\Windows\{01D309CF-029A-43b2-865E-64089BAC222C}.exe {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe File created C:\Windows\{7ED5CF79-3866-4174-99B2-1E6E599B2135}.exe {1E62A011-BEDC-4cc4-B6C1-99B740E6EB88}.exe File created C:\Windows\{4B72138E-A71F-4041-95FE-60BA1C752310}.exe {7ED5CF79-3866-4174-99B2-1E6E599B2135}.exe File created C:\Windows\{80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1676 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe Token: SeIncBasePriorityPrivilege 1620 {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe Token: SeIncBasePriorityPrivilege 2880 {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe Token: SeIncBasePriorityPrivilege 2632 {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe Token: SeIncBasePriorityPrivilege 2668 {27638D64-366E-4791-81CC-48F36CC96C72}.exe Token: SeIncBasePriorityPrivilege 848 {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe Token: SeIncBasePriorityPrivilege 2808 {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe Token: SeIncBasePriorityPrivilege 2500 {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe Token: SeIncBasePriorityPrivilege 2496 {01D309CF-029A-43b2-865E-64089BAC222C}.exe Token: SeIncBasePriorityPrivilege 2372 {1E62A011-BEDC-4cc4-B6C1-99B740E6EB88}.exe Token: SeIncBasePriorityPrivilege 1432 {7ED5CF79-3866-4174-99B2-1E6E599B2135}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1620 1676 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe 31 PID 1676 wrote to memory of 1620 1676 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe 31 PID 1676 wrote to memory of 1620 1676 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe 31 PID 1676 wrote to memory of 1620 1676 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe 31 PID 1676 wrote to memory of 2792 1676 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe 32 PID 1676 wrote to memory of 2792 1676 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe 32 PID 1676 wrote to memory of 2792 1676 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe 32 PID 1676 wrote to memory of 2792 1676 4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe 32 PID 1620 wrote to memory of 2880 1620 {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe 33 PID 1620 wrote to memory of 2880 1620 {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe 33 PID 1620 wrote to memory of 2880 1620 {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe 33 PID 1620 wrote to memory of 2880 1620 {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe 33 PID 1620 wrote to memory of 2712 1620 {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe 34 PID 1620 wrote to memory of 2712 1620 {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe 34 PID 1620 wrote to memory of 2712 1620 {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe 34 PID 1620 wrote to memory of 2712 1620 {5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe 34 PID 2880 wrote to memory of 2632 2880 {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe 35 PID 2880 wrote to memory of 2632 2880 {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe 35 PID 2880 wrote to memory of 2632 2880 {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe 35 PID 2880 wrote to memory of 2632 2880 {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe 35 PID 2880 wrote to memory of 2744 2880 {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe 36 PID 2880 wrote to memory of 2744 2880 {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe 36 PID 2880 wrote to memory of 2744 2880 {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe 36 PID 2880 wrote to memory of 2744 2880 {011DCBD3-1681-4dea-831D-8970A1E0B559}.exe 36 PID 2632 wrote to memory of 2668 2632 {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe 37 PID 2632 wrote to memory of 2668 2632 {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe 37 PID 2632 wrote to memory of 2668 2632 {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe 37 PID 2632 wrote to memory of 2668 2632 {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe 37 PID 2632 wrote to memory of 852 2632 {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe 38 PID 2632 wrote to memory of 852 2632 {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe 38 PID 2632 wrote to memory of 852 2632 {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe 38 PID 2632 wrote to memory of 852 2632 {80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe 38 PID 2668 wrote to memory of 848 2668 {27638D64-366E-4791-81CC-48F36CC96C72}.exe 39 PID 2668 wrote to memory of 848 2668 {27638D64-366E-4791-81CC-48F36CC96C72}.exe 39 PID 2668 wrote to memory of 848 2668 {27638D64-366E-4791-81CC-48F36CC96C72}.exe 39 PID 2668 wrote to memory of 848 2668 {27638D64-366E-4791-81CC-48F36CC96C72}.exe 39 PID 2668 wrote to memory of 2324 2668 {27638D64-366E-4791-81CC-48F36CC96C72}.exe 40 PID 2668 wrote to memory of 2324 2668 {27638D64-366E-4791-81CC-48F36CC96C72}.exe 40 PID 2668 wrote to memory of 2324 2668 {27638D64-366E-4791-81CC-48F36CC96C72}.exe 40 PID 2668 wrote to memory of 2324 2668 {27638D64-366E-4791-81CC-48F36CC96C72}.exe 40 PID 848 wrote to memory of 2808 848 {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe 41 PID 848 wrote to memory of 2808 848 {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe 41 PID 848 wrote to memory of 2808 848 {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe 41 PID 848 wrote to memory of 2808 848 {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe 41 PID 848 wrote to memory of 2980 848 {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe 42 PID 848 wrote to memory of 2980 848 {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe 42 PID 848 wrote to memory of 2980 848 {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe 42 PID 848 wrote to memory of 2980 848 {E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe 42 PID 2808 wrote to memory of 2500 2808 {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe 43 PID 2808 wrote to memory of 2500 2808 {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe 43 PID 2808 wrote to memory of 2500 2808 {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe 43 PID 2808 wrote to memory of 2500 2808 {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe 43 PID 2808 wrote to memory of 1980 2808 {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe 44 PID 2808 wrote to memory of 1980 2808 {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe 44 PID 2808 wrote to memory of 1980 2808 {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe 44 PID 2808 wrote to memory of 1980 2808 {63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe 44 PID 2500 wrote to memory of 2496 2500 {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe 45 PID 2500 wrote to memory of 2496 2500 {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe 45 PID 2500 wrote to memory of 2496 2500 {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe 45 PID 2500 wrote to memory of 2496 2500 {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe 45 PID 2500 wrote to memory of 1364 2500 {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe 46 PID 2500 wrote to memory of 1364 2500 {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe 46 PID 2500 wrote to memory of 1364 2500 {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe 46 PID 2500 wrote to memory of 1364 2500 {C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe"C:\Users\Admin\AppData\Local\Temp\4ace5014b62da53a3f1a26068625f8a3599b950e6abab7a806f693f91374075e.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\{5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exeC:\Windows\{5C252F05-DF91-4724-A1AD-014FDB7B98CD}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\{011DCBD3-1681-4dea-831D-8970A1E0B559}.exeC:\Windows\{011DCBD3-1681-4dea-831D-8970A1E0B559}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\{80BC2E75-D590-4205-A58A-EDC1E5B23391}.exeC:\Windows\{80BC2E75-D590-4205-A58A-EDC1E5B23391}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\{27638D64-366E-4791-81CC-48F36CC96C72}.exeC:\Windows\{27638D64-366E-4791-81CC-48F36CC96C72}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\{E2C38172-C308-439e-A8D5-3BD8232DACC1}.exeC:\Windows\{E2C38172-C308-439e-A8D5-3BD8232DACC1}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\{63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exeC:\Windows\{63F52E4E-F0BB-44d4-8A00-992410BE1A87}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\{C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exeC:\Windows\{C0F1CAEA-D91B-41e4-BF16-F91C0D4638FD}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\{01D309CF-029A-43b2-865E-64089BAC222C}.exeC:\Windows\{01D309CF-029A-43b2-865E-64089BAC222C}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2496 -
C:\Windows\{1E62A011-BEDC-4cc4-B6C1-99B740E6EB88}.exeC:\Windows\{1E62A011-BEDC-4cc4-B6C1-99B740E6EB88}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2372 -
C:\Windows\{7ED5CF79-3866-4174-99B2-1E6E599B2135}.exeC:\Windows\{7ED5CF79-3866-4174-99B2-1E6E599B2135}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\{4B72138E-A71F-4041-95FE-60BA1C752310}.exeC:\Windows\{4B72138E-A71F-4041-95FE-60BA1C752310}.exe12⤵
- Executes dropped EXE
PID:1904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7ED5C~1.EXE > nul12⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1E62A~1.EXE > nul11⤵PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{01D30~1.EXE > nul10⤵PID:1236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0F1C~1.EXE > nul9⤵PID:1364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{63F52~1.EXE > nul8⤵PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E2C38~1.EXE > nul7⤵PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{27638~1.EXE > nul6⤵PID:2324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80BC2~1.EXE > nul5⤵PID:852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{011DC~1.EXE > nul4⤵PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C252~1.EXE > nul3⤵PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\4ACE50~1.EXE > nul2⤵
- Deletes itself
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5baad1f80b4b1d1db2b84daa812a258f6
SHA1cd14807fd34cc69f7d44771af398cdf591cbfd8d
SHA2560ad29a61414cf847424c2b6ecd222486cf75acffcf63085720986606cd24e77a
SHA512dddc8bbc61814495538cfc2592ae5e83bd546b2f5f955bc847399c8d44d933ccde790910eeef81bc12e909cb6b7c40f7eae9b12aa56978422fc7bd0bcd67aa18
-
Filesize
90KB
MD58df596446cff0638b06b257796209473
SHA19921ffcb9b191ff20b4a36a71d0a0c3d881099d8
SHA25656a04f5efe6467de1acdd880b5aac5b76c91477859e77d6fb3001f31bfab79d4
SHA512f4c92c274fd95f890d4e2634c306459029d4312e3eb901cd1edb731f365c308342793e2bc5437c7bd3329d747d620e282ad51f535afc4edf4baf02e51271a332
-
Filesize
90KB
MD554defae3365b90580f3b85b844379bd8
SHA1097838a98867b53f1742313e66b7d8c3f312d459
SHA256f22575153f1df21ca8253e2743a305c5abb7f28ea4f960181555a8f51f3db0f2
SHA512469575ba56faec06ed1dd336fa886fe2744f9cdcd225afb74293f86dad4db0085fe9803700600067625c2c9ee9b889ea547104f1e07035ab87791b03a47b492f
-
Filesize
90KB
MD5e29a533c92aee09eca8c004c498cfbc1
SHA1d811510a26e40abe75f5a984b1db46d65f77ff7c
SHA256f72bcce5f530f7666576fd5cddc9abac6c011003c227d41905ff8c60a5ef54d9
SHA512f774ab0e1e1a2e58e7aada81d4a148b80b9a0a882cc8b8914de2bcc20c07eb4800b857fa1184ecf95eeaac159810c43ec5ccf5164934257e5a213b2b1ca3ce3b
-
Filesize
90KB
MD5a6f4e563ec30edfd3d11a2eb908082a5
SHA19a1d6a6bb682b8833cdd4c3b989b55b6b9afeb88
SHA256527d29d6729dbffbb73b95fffbb1a76390d9ce713567d954853a357bda336ce0
SHA512203600f32017eee8b62ba481d984f5f3f1e5210cc96bbdc3e4facb8ea39080daa58fbb312e1aee92166c3bc59f7168d463b1a3f3dd11a2d3518cbc4baacd846e
-
Filesize
90KB
MD5f672cc633d3a56d537385971a4c0834b
SHA1437d3d31717a28bc442f06d19822620a8eed7a37
SHA256ee89223d8b7ee2d96cb1d3e9415f913e643d3e794a15b6687259edaad6bbedd8
SHA512aead99c43f5a36c748652cedf6dd46e033d1d8250ee8570a9ab904cc54c1cb089fe9c550517c76b82a21e39e81899cb694691daf741822b0f2ecab073e2c3968
-
Filesize
90KB
MD5686597795f085e75b98a20648cf872b4
SHA134ad47698fc1b816b7506a63a06a007fa09bea6d
SHA25629956228a4e8689151d51451b27b4a258c9debbe16a75958e5643667d1527695
SHA512a1712682b09fee923e25156b2728e6e975b422613858e34bdde3f6864fb957d16acd7216d8b66b46cc50fbb2a38a2fcbe679ca94eb873af251d89da5d0a7f733
-
Filesize
90KB
MD53d61a944b01249728a7b011e04472f2e
SHA1aba6ea352cf0ced5a51f3a79261bc1c4b3c52775
SHA256f66e414cfe947db24b95c78889bf5f503d244ff9edac9bba62cf88d244f4dbd4
SHA5126a18d7efefee0d7339d0b33a63694413a326418a8ea95d2ee641289bea7e0515fd2e2b121c5582b64febf3979dc85071652b342d1e191533a53f374e70833387
-
Filesize
90KB
MD536e2104bc9d24b08d1d081be43634f44
SHA1d7780de9a8411ea60b46ce440a1221f5855d2793
SHA256a1e124e1b8b251767b6f17ffff635f654651fb0e677e17c2c4d873c81499827a
SHA5127b52fca9cc4a3ce446a59ffd655509283acb71456a5813ee39774eb6d9dede4b202a65ff08e8bbb0a7950febef8ca12e15c9ae10895f8b67f8dd5bcea2a314d3
-
Filesize
90KB
MD5721e03d4208d9c41be42877143b26dc2
SHA129dc4422dc67bf69b479fba001f1e4223bd054ec
SHA2562c98811aa8d3154b28e7d4a8c95f76bd493e134a663df8b93d48616172e52004
SHA51251631b71d7d874bd5c876e56e72093caf1c01a683355995b934245f6c09b2a5d73ff2b9421406fb76d4fa33b0d58b6f68e63d32cc4524ffbdb383e40a13e461e
-
Filesize
90KB
MD501b634ef75246587ac12574d1b1e0366
SHA130b28879d23c3968acee0e4b73aae2be6d417e55
SHA256f9bf555daf3687c537f59113922229883ef8c8083a2415c6333b78092835eb5c
SHA512c94235b472c239d4f276489b7af024b2c15dcdcbfb59b0911a4da0178272d1cb5921b29e447255964874fd4b1e8cf12befedc5be471519fc1e6797096ab653fc