Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
09f082c69446df67be07b5d5bc4944a0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09f082c69446df67be07b5d5bc4944a0.exe
Resource
win10v2004-20240704-en
General
-
Target
09f082c69446df67be07b5d5bc4944a0.exe
-
Size
60KB
-
MD5
09f082c69446df67be07b5d5bc4944a0
-
SHA1
8714261efa16652b050a4079b6d4a215422ac939
-
SHA256
39f02f4a8ee5e1561d78e278f9d91a3eeeb4e7b9533a4d537c8a20b24dc61767
-
SHA512
fd976bf5201c67b6f3fa7e08a1e892c24c57978b717fdc4e175c29809693b84eee6937f44390988c32b2eff3a5eaa462f36e04d40a74f873c2cc79ff2aa3c305
-
SSDEEP
384:vbLwOs8AHsc4sMfwhKQLroO4/CFsrdHWMZ:vvw9816vhKQLroO4/wQpWMZ
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5DBF45D-5AC1-4095-8233-8597DCC31FF6}\stubpath = "C:\\Windows\\{B5DBF45D-5AC1-4095-8233-8597DCC31FF6}.exe" {8AA02673-86A9-47b4-8ACA-DF0DCCF5E303}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AFF4A6DD-C423-4226-9B61-791B84647F3A}\stubpath = "C:\\Windows\\{AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe" 09f082c69446df67be07b5d5bc4944a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}\stubpath = "C:\\Windows\\{D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe" {D61B949B-0861-4b64-B29E-C49C053B7820}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BE6DDE0C-7050-43b3-88F8-F92A6F21268C}\stubpath = "C:\\Windows\\{BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe" {E46526FA-C272-449c-B54B-5F1DC680081F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56FE662E-AECE-41ac-89A2-9D9513618BC0}\stubpath = "C:\\Windows\\{56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe" {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AFF4A6DD-C423-4226-9B61-791B84647F3A} 09f082c69446df67be07b5d5bc4944a0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2} {D61B949B-0861-4b64-B29E-C49C053B7820}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FEC7F26-31BA-4296-B2D7-A3C36773A02A} {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E46526FA-C272-449c-B54B-5F1DC680081F} {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BE6DDE0C-7050-43b3-88F8-F92A6F21268C} {E46526FA-C272-449c-B54B-5F1DC680081F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E902DF8-9481-49d4-A603-C9CEF44E2656} {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{239AA8DD-1A81-4b31-BAEC-120983EE19A8}\stubpath = "C:\\Windows\\{239AA8DD-1A81-4b31-BAEC-120983EE19A8}.exe" {7E902DF8-9481-49d4-A603-C9CEF44E2656}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8AA02673-86A9-47b4-8ACA-DF0DCCF5E303} {239AA8DD-1A81-4b31-BAEC-120983EE19A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56FE662E-AECE-41ac-89A2-9D9513618BC0} {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E902DF8-9481-49d4-A603-C9CEF44E2656}\stubpath = "C:\\Windows\\{7E902DF8-9481-49d4-A603-C9CEF44E2656}.exe" {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{239AA8DD-1A81-4b31-BAEC-120983EE19A8} {7E902DF8-9481-49d4-A603-C9CEF44E2656}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8AA02673-86A9-47b4-8ACA-DF0DCCF5E303}\stubpath = "C:\\Windows\\{8AA02673-86A9-47b4-8ACA-DF0DCCF5E303}.exe" {239AA8DD-1A81-4b31-BAEC-120983EE19A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D61B949B-0861-4b64-B29E-C49C053B7820} {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D61B949B-0861-4b64-B29E-C49C053B7820}\stubpath = "C:\\Windows\\{D61B949B-0861-4b64-B29E-C49C053B7820}.exe" {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FEC7F26-31BA-4296-B2D7-A3C36773A02A}\stubpath = "C:\\Windows\\{0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe" {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E46526FA-C272-449c-B54B-5F1DC680081F}\stubpath = "C:\\Windows\\{E46526FA-C272-449c-B54B-5F1DC680081F}.exe" {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5DBF45D-5AC1-4095-8233-8597DCC31FF6} {8AA02673-86A9-47b4-8ACA-DF0DCCF5E303}.exe -
Deletes itself 1 IoCs
pid Process 3024 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1968 {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe 2788 {D61B949B-0861-4b64-B29E-C49C053B7820}.exe 2844 {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe 2952 {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe 560 {E46526FA-C272-449c-B54B-5F1DC680081F}.exe 1940 {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe 1852 {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe 2320 {7E902DF8-9481-49d4-A603-C9CEF44E2656}.exe 2172 {239AA8DD-1A81-4b31-BAEC-120983EE19A8}.exe 2900 {8AA02673-86A9-47b4-8ACA-DF0DCCF5E303}.exe 1308 {B5DBF45D-5AC1-4095-8233-8597DCC31FF6}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{7E902DF8-9481-49d4-A603-C9CEF44E2656}.exe {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe File created C:\Windows\{239AA8DD-1A81-4b31-BAEC-120983EE19A8}.exe {7E902DF8-9481-49d4-A603-C9CEF44E2656}.exe File created C:\Windows\{8AA02673-86A9-47b4-8ACA-DF0DCCF5E303}.exe {239AA8DD-1A81-4b31-BAEC-120983EE19A8}.exe File created C:\Windows\{B5DBF45D-5AC1-4095-8233-8597DCC31FF6}.exe {8AA02673-86A9-47b4-8ACA-DF0DCCF5E303}.exe File created C:\Windows\{D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe {D61B949B-0861-4b64-B29E-C49C053B7820}.exe File created C:\Windows\{0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe File created C:\Windows\{E46526FA-C272-449c-B54B-5F1DC680081F}.exe {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe File created C:\Windows\{BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe {E46526FA-C272-449c-B54B-5F1DC680081F}.exe File created C:\Windows\{56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe File created C:\Windows\{AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe 09f082c69446df67be07b5d5bc4944a0.exe File created C:\Windows\{D61B949B-0861-4b64-B29E-C49C053B7820}.exe {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2244 09f082c69446df67be07b5d5bc4944a0.exe Token: SeIncBasePriorityPrivilege 1968 {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe Token: SeIncBasePriorityPrivilege 2788 {D61B949B-0861-4b64-B29E-C49C053B7820}.exe Token: SeIncBasePriorityPrivilege 2844 {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe Token: SeIncBasePriorityPrivilege 2952 {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe Token: SeIncBasePriorityPrivilege 560 {E46526FA-C272-449c-B54B-5F1DC680081F}.exe Token: SeIncBasePriorityPrivilege 1940 {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe Token: SeIncBasePriorityPrivilege 1852 {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe Token: SeIncBasePriorityPrivilege 2320 {7E902DF8-9481-49d4-A603-C9CEF44E2656}.exe Token: SeIncBasePriorityPrivilege 2172 {239AA8DD-1A81-4b31-BAEC-120983EE19A8}.exe Token: SeIncBasePriorityPrivilege 2900 {8AA02673-86A9-47b4-8ACA-DF0DCCF5E303}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1968 2244 09f082c69446df67be07b5d5bc4944a0.exe 28 PID 2244 wrote to memory of 1968 2244 09f082c69446df67be07b5d5bc4944a0.exe 28 PID 2244 wrote to memory of 1968 2244 09f082c69446df67be07b5d5bc4944a0.exe 28 PID 2244 wrote to memory of 1968 2244 09f082c69446df67be07b5d5bc4944a0.exe 28 PID 2244 wrote to memory of 3024 2244 09f082c69446df67be07b5d5bc4944a0.exe 29 PID 2244 wrote to memory of 3024 2244 09f082c69446df67be07b5d5bc4944a0.exe 29 PID 2244 wrote to memory of 3024 2244 09f082c69446df67be07b5d5bc4944a0.exe 29 PID 2244 wrote to memory of 3024 2244 09f082c69446df67be07b5d5bc4944a0.exe 29 PID 1968 wrote to memory of 2788 1968 {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe 30 PID 1968 wrote to memory of 2788 1968 {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe 30 PID 1968 wrote to memory of 2788 1968 {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe 30 PID 1968 wrote to memory of 2788 1968 {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe 30 PID 1968 wrote to memory of 2668 1968 {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe 31 PID 1968 wrote to memory of 2668 1968 {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe 31 PID 1968 wrote to memory of 2668 1968 {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe 31 PID 1968 wrote to memory of 2668 1968 {AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe 31 PID 2788 wrote to memory of 2844 2788 {D61B949B-0861-4b64-B29E-C49C053B7820}.exe 32 PID 2788 wrote to memory of 2844 2788 {D61B949B-0861-4b64-B29E-C49C053B7820}.exe 32 PID 2788 wrote to memory of 2844 2788 {D61B949B-0861-4b64-B29E-C49C053B7820}.exe 32 PID 2788 wrote to memory of 2844 2788 {D61B949B-0861-4b64-B29E-C49C053B7820}.exe 32 PID 2788 wrote to memory of 2604 2788 {D61B949B-0861-4b64-B29E-C49C053B7820}.exe 33 PID 2788 wrote to memory of 2604 2788 {D61B949B-0861-4b64-B29E-C49C053B7820}.exe 33 PID 2788 wrote to memory of 2604 2788 {D61B949B-0861-4b64-B29E-C49C053B7820}.exe 33 PID 2788 wrote to memory of 2604 2788 {D61B949B-0861-4b64-B29E-C49C053B7820}.exe 33 PID 2844 wrote to memory of 2952 2844 {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe 36 PID 2844 wrote to memory of 2952 2844 {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe 36 PID 2844 wrote to memory of 2952 2844 {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe 36 PID 2844 wrote to memory of 2952 2844 {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe 36 PID 2844 wrote to memory of 2304 2844 {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe 37 PID 2844 wrote to memory of 2304 2844 {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe 37 PID 2844 wrote to memory of 2304 2844 {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe 37 PID 2844 wrote to memory of 2304 2844 {D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe 37 PID 2952 wrote to memory of 560 2952 {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe 38 PID 2952 wrote to memory of 560 2952 {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe 38 PID 2952 wrote to memory of 560 2952 {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe 38 PID 2952 wrote to memory of 560 2952 {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe 38 PID 2952 wrote to memory of 1836 2952 {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe 39 PID 2952 wrote to memory of 1836 2952 {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe 39 PID 2952 wrote to memory of 1836 2952 {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe 39 PID 2952 wrote to memory of 1836 2952 {0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe 39 PID 560 wrote to memory of 1940 560 {E46526FA-C272-449c-B54B-5F1DC680081F}.exe 40 PID 560 wrote to memory of 1940 560 {E46526FA-C272-449c-B54B-5F1DC680081F}.exe 40 PID 560 wrote to memory of 1940 560 {E46526FA-C272-449c-B54B-5F1DC680081F}.exe 40 PID 560 wrote to memory of 1940 560 {E46526FA-C272-449c-B54B-5F1DC680081F}.exe 40 PID 560 wrote to memory of 352 560 {E46526FA-C272-449c-B54B-5F1DC680081F}.exe 41 PID 560 wrote to memory of 352 560 {E46526FA-C272-449c-B54B-5F1DC680081F}.exe 41 PID 560 wrote to memory of 352 560 {E46526FA-C272-449c-B54B-5F1DC680081F}.exe 41 PID 560 wrote to memory of 352 560 {E46526FA-C272-449c-B54B-5F1DC680081F}.exe 41 PID 1940 wrote to memory of 1852 1940 {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe 42 PID 1940 wrote to memory of 1852 1940 {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe 42 PID 1940 wrote to memory of 1852 1940 {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe 42 PID 1940 wrote to memory of 1852 1940 {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe 42 PID 1940 wrote to memory of 2408 1940 {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe 43 PID 1940 wrote to memory of 2408 1940 {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe 43 PID 1940 wrote to memory of 2408 1940 {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe 43 PID 1940 wrote to memory of 2408 1940 {BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe 43 PID 1852 wrote to memory of 2320 1852 {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe 44 PID 1852 wrote to memory of 2320 1852 {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe 44 PID 1852 wrote to memory of 2320 1852 {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe 44 PID 1852 wrote to memory of 2320 1852 {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe 44 PID 1852 wrote to memory of 1508 1852 {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe 45 PID 1852 wrote to memory of 1508 1852 {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe 45 PID 1852 wrote to memory of 1508 1852 {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe 45 PID 1852 wrote to memory of 1508 1852 {56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\09f082c69446df67be07b5d5bc4944a0.exe"C:\Users\Admin\AppData\Local\Temp\09f082c69446df67be07b5d5bc4944a0.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\{AFF4A6DD-C423-4226-9B61-791B84647F3A}.exeC:\Windows\{AFF4A6DD-C423-4226-9B61-791B84647F3A}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\{D61B949B-0861-4b64-B29E-C49C053B7820}.exeC:\Windows\{D61B949B-0861-4b64-B29E-C49C053B7820}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\{D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exeC:\Windows\{D8CA08FF-1325-42e1-ACC0-C9B3F8B8AAF2}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\{0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exeC:\Windows\{0FEC7F26-31BA-4296-B2D7-A3C36773A02A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\{E46526FA-C272-449c-B54B-5F1DC680081F}.exeC:\Windows\{E46526FA-C272-449c-B54B-5F1DC680081F}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\{BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exeC:\Windows\{BE6DDE0C-7050-43b3-88F8-F92A6F21268C}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\{56FE662E-AECE-41ac-89A2-9D9513618BC0}.exeC:\Windows\{56FE662E-AECE-41ac-89A2-9D9513618BC0}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\{7E902DF8-9481-49d4-A603-C9CEF44E2656}.exeC:\Windows\{7E902DF8-9481-49d4-A603-C9CEF44E2656}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2320 -
C:\Windows\{239AA8DD-1A81-4b31-BAEC-120983EE19A8}.exeC:\Windows\{239AA8DD-1A81-4b31-BAEC-120983EE19A8}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2172 -
C:\Windows\{8AA02673-86A9-47b4-8ACA-DF0DCCF5E303}.exeC:\Windows\{8AA02673-86A9-47b4-8ACA-DF0DCCF5E303}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\{B5DBF45D-5AC1-4095-8233-8597DCC31FF6}.exeC:\Windows\{B5DBF45D-5AC1-4095-8233-8597DCC31FF6}.exe12⤵
- Executes dropped EXE
PID:1308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8AA02~1.EXE > nul12⤵PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{239AA~1.EXE > nul11⤵PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E902~1.EXE > nul10⤵PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56FE6~1.EXE > nul9⤵PID:1508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BE6DD~1.EXE > nul8⤵PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E4652~1.EXE > nul7⤵PID:352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0FEC7~1.EXE > nul6⤵PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D8CA0~1.EXE > nul5⤵PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D61B9~1.EXE > nul4⤵PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AFF4A~1.EXE > nul3⤵PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\09F082~1.EXE > nul2⤵
- Deletes itself
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5b7b09fc6e74b1aad88dcf7add08d298c
SHA1f4c8173cf021a6e3191e3d40b34fad8496394b78
SHA256cf7c72540dca227c4f7afa9eb30bc60347709e71979d2e521c57cfbeed198f8e
SHA51216efbd15a617326c1fbc837f19f13765c33484c115c39c128b603fb95d7a0e83036db28cbb05ce053ffe6969cad5a246ade2ed4211c859e935616fae1ee5861e
-
Filesize
60KB
MD5988152181013cd882fec8d6c07c5b473
SHA1292ba309c14948eb0ce1bc309333912c53b2fda8
SHA256c90e3c347cfd0fecd30b1e5bfe0ebc83c9d8a1677078c5c1ba597994bd2141ec
SHA5128ddaa59fa6a39dbd70e9e73b0e8cee29a5375c79cb3c4b783fb9d713af458ffba28704dca07266bf59c68c1d1b5a91a4640c3491d28b16c867f02a456308ce44
-
Filesize
60KB
MD5653e581c8499f3ec0700e644b8cf632e
SHA189e021c03e9037496c4212c6344860060fb73556
SHA256711786f264aef05baa2fb0209fcb051a0017b413b0eccf54e36c055390db6380
SHA51219bcbf15721ba4ed5264f0167e9fc886957c45e2d6f5911376005da0cadd729478cb1d8baf6364cf61701e3a2461f671f9e4fb4b21c63f4da2aec93f85c75588
-
Filesize
60KB
MD5126e7e75e41e2bb4f8df6fb46f5d26e7
SHA1e7bd1046d9b5e6d4f5f03e76fe31118fa7e75886
SHA256e8dea065a1a4d688728738a6e0734b9683de02c201ab37e7909b14141de26edd
SHA512d456457cd0e2570a381fdcf718dd61b4242a602d7251a56d7c043265797b985446ed25c73a83c76f6a744c096da5820ddf1095de685d6c6244f32081241b789a
-
Filesize
60KB
MD568c5e908ffe9e651b1f0724123a68d68
SHA1925dc5952d73f621326a680b05be71505f88817f
SHA256c12c9ce40b51c5bb1d56095b32e11a85d149505af6e983cc4c59000ec2e2f406
SHA5127c17f74b76c1d21a23667a0a06a069e0b39be80a152132d885d6cbd698cba5044f7f5d7bdb9955947566ec100a5adc45f0f5d3a856d48fe3ac08e822115122ad
-
Filesize
60KB
MD54371ac1167ca3f4d292b7cb872042ceb
SHA14e70763b1f5f593e78902ee50edae90213b4c8ed
SHA25680ce4986764f43f5101bf4974620230d7b180a482b729e96deff59f50f00f2d7
SHA512501d254a4360dd0db0a09deba46cb6fd82834afed002f5fb06c24353813883e46d8620278ecbd73fe94e8007215ecdf7e9288551bf45aacb9ca7b0654f3dd816
-
Filesize
60KB
MD57de674463ca9b80fc6821aa9fa94b29c
SHA1da72fc07f982693f526504a4f105f3f80770c60c
SHA25681720d464bde547ee2a981f89203bbfc811854266208950a019dacb5e1dafe27
SHA512e7cf4e63a77d30e5e65d96c232236c4a4f696b04a3c4e3a394389435405323d3f867d523a85a1643a862d021b5525924ac0c548576282fdf08195389b9304868
-
Filesize
60KB
MD518c0a363a47dd358bbade656428e5f8e
SHA14f05638db7336210bfa3d4981283e43f3fe12804
SHA256633d5eb0044d54565368f6801957ce8a617c134071d9556540250ae8143bf626
SHA5129a08b0378e8d993a0d71314ff2cf00b6a2ca013d38c6ff554c943837d593fe929ee48c0befc0680ce3cebbc3512edfcb516a56ea6a986386b1e96c5235eccebb
-
Filesize
60KB
MD526e8487838a8ab69da3ad0b95cfb161e
SHA1d2202b9d618392eb4760abb0ad6921db0c8160b6
SHA2567a73cc47ea37273903dbfde82f878c79232c2e85b5b10c3c8eb94f8a66b821fb
SHA51219b3257f99d59ef073097a1042ab459f133014bf2eb6f6c765c1d428c8be2d1c9e2f4032b6ac121a6abd71a4eb913722753a1c36a0366cc9f7938f9db93f5671
-
Filesize
60KB
MD59711484df8aca3199849f9e91295f795
SHA1c98d762cae2b0fc062cf4bc6c158b45a1fe47c57
SHA2564ad38c9c0ae778b716f4132b6e8a6e919c5fd8306b7c5089e053c82d4d703f8b
SHA512c1492e8b3e7ad963227a84631139e02f8084f72bc54fc4d2224b26c74c62014ce2273ea6dc383057cbbd988d35ae2df636a7be7b2a3ea9ec54d89e38810ce5d9
-
Filesize
60KB
MD5511328a624b30252a579ca1491e751ef
SHA12f53bb84377f200f5fdfa275ff5e84b89b923c2d
SHA25605eca5773816a9cd7827178be1a36d2a7e0bad3620ed3960a5e00abc051464f6
SHA5127aa273c6ab9fba544200ff3a0c7114f31ee55b7643bbbd7a0a0017e687e27a9d8a4df90ee9024ab3404744d9474759460d9fb6f196f092a70e9c206678d7172e