Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe
Resource
win10v2004-20240704-en
General
-
Target
22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe
-
Size
408KB
-
MD5
bdcc607a2cdf3f6c710bcf7fc8477ee8
-
SHA1
0b7c8e8ecab3d7bd522347cc8456f0c4ccfbf1be
-
SHA256
22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d
-
SHA512
b53ba2922964ae4b9363368adeca061698064238652edb0e16457c145276e853aeeb631f5325a15b117b5867f7ae66462749f59268a10231e24b3a8fc7ebb6f1
-
SSDEEP
3072:CEGh0oJl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGHldOe2MUVg3vTeKcAEciTBqr3jy9
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{951F8FE3-4CF9-468e-A320-024FB6E418CF}\stubpath = "C:\\Windows\\{951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe" {1568D133-02C7-4099-99C3-B351FEC6A185}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8EBCF102-23EF-4330-AFFF-9C47534B2B36} {27E16512-A2E2-4e47-B905-0DBD91DBAD90}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CAD8014F-37A0-4e45-ABFC-7C284586A0A7} {8EBCF102-23EF-4330-AFFF-9C47534B2B36}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{699AD3BD-6C1A-41ee-99A2-2440EEE33F0B} 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C478288C-E356-4fbc-99F5-58AFA3699D0F} {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C478288C-E356-4fbc-99F5-58AFA3699D0F}\stubpath = "C:\\Windows\\{C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe" {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686} {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}\stubpath = "C:\\Windows\\{1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe" {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1568D133-02C7-4099-99C3-B351FEC6A185}\stubpath = "C:\\Windows\\{1568D133-02C7-4099-99C3-B351FEC6A185}.exe" {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8EBCF102-23EF-4330-AFFF-9C47534B2B36}\stubpath = "C:\\Windows\\{8EBCF102-23EF-4330-AFFF-9C47534B2B36}.exe" {27E16512-A2E2-4e47-B905-0DBD91DBAD90}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C6CB159-27D6-4659-9609-6CA83C24FD51} {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C6CB159-27D6-4659-9609-6CA83C24FD51}\stubpath = "C:\\Windows\\{2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe" {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1568D133-02C7-4099-99C3-B351FEC6A185} {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{951F8FE3-4CF9-468e-A320-024FB6E418CF} {1568D133-02C7-4099-99C3-B351FEC6A185}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{27E16512-A2E2-4e47-B905-0DBD91DBAD90} {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CAD8014F-37A0-4e45-ABFC-7C284586A0A7}\stubpath = "C:\\Windows\\{CAD8014F-37A0-4e45-ABFC-7C284586A0A7}.exe" {8EBCF102-23EF-4330-AFFF-9C47534B2B36}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{175EBF0D-3676-47d7-95E6-EF69690EBA99} {CAD8014F-37A0-4e45-ABFC-7C284586A0A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}\stubpath = "C:\\Windows\\{699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe" 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A626D0A3-1E59-4c07-9FC8-FF2300EE4C66} {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}\stubpath = "C:\\Windows\\{A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe" {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{27E16512-A2E2-4e47-B905-0DBD91DBAD90}\stubpath = "C:\\Windows\\{27E16512-A2E2-4e47-B905-0DBD91DBAD90}.exe" {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{175EBF0D-3676-47d7-95E6-EF69690EBA99}\stubpath = "C:\\Windows\\{175EBF0D-3676-47d7-95E6-EF69690EBA99}.exe" {CAD8014F-37A0-4e45-ABFC-7C284586A0A7}.exe -
Deletes itself 1 IoCs
pid Process 2824 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2356 {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe 2772 {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe 2544 {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe 2336 {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe 2844 {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe 1968 {1568D133-02C7-4099-99C3-B351FEC6A185}.exe 292 {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe 2704 {27E16512-A2E2-4e47-B905-0DBD91DBAD90}.exe 884 {8EBCF102-23EF-4330-AFFF-9C47534B2B36}.exe 2936 {CAD8014F-37A0-4e45-ABFC-7C284586A0A7}.exe 776 {175EBF0D-3676-47d7-95E6-EF69690EBA99}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe File created C:\Windows\{C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe File created C:\Windows\{1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe File created C:\Windows\{2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe File created C:\Windows\{8EBCF102-23EF-4330-AFFF-9C47534B2B36}.exe {27E16512-A2E2-4e47-B905-0DBD91DBAD90}.exe File created C:\Windows\{175EBF0D-3676-47d7-95E6-EF69690EBA99}.exe {CAD8014F-37A0-4e45-ABFC-7C284586A0A7}.exe File created C:\Windows\{A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe File created C:\Windows\{1568D133-02C7-4099-99C3-B351FEC6A185}.exe {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe File created C:\Windows\{951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe {1568D133-02C7-4099-99C3-B351FEC6A185}.exe File created C:\Windows\{27E16512-A2E2-4e47-B905-0DBD91DBAD90}.exe {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe File created C:\Windows\{CAD8014F-37A0-4e45-ABFC-7C284586A0A7}.exe {8EBCF102-23EF-4330-AFFF-9C47534B2B36}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2416 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe Token: SeIncBasePriorityPrivilege 2356 {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe Token: SeIncBasePriorityPrivilege 2772 {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe Token: SeIncBasePriorityPrivilege 2544 {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe Token: SeIncBasePriorityPrivilege 2336 {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe Token: SeIncBasePriorityPrivilege 2844 {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe Token: SeIncBasePriorityPrivilege 1968 {1568D133-02C7-4099-99C3-B351FEC6A185}.exe Token: SeIncBasePriorityPrivilege 292 {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe Token: SeIncBasePriorityPrivilege 2704 {27E16512-A2E2-4e47-B905-0DBD91DBAD90}.exe Token: SeIncBasePriorityPrivilege 884 {8EBCF102-23EF-4330-AFFF-9C47534B2B36}.exe Token: SeIncBasePriorityPrivilege 2936 {CAD8014F-37A0-4e45-ABFC-7C284586A0A7}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2356 2416 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe 28 PID 2416 wrote to memory of 2356 2416 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe 28 PID 2416 wrote to memory of 2356 2416 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe 28 PID 2416 wrote to memory of 2356 2416 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe 28 PID 2416 wrote to memory of 2824 2416 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe 29 PID 2416 wrote to memory of 2824 2416 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe 29 PID 2416 wrote to memory of 2824 2416 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe 29 PID 2416 wrote to memory of 2824 2416 22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe 29 PID 2356 wrote to memory of 2772 2356 {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe 30 PID 2356 wrote to memory of 2772 2356 {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe 30 PID 2356 wrote to memory of 2772 2356 {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe 30 PID 2356 wrote to memory of 2772 2356 {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe 30 PID 2356 wrote to memory of 2660 2356 {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe 31 PID 2356 wrote to memory of 2660 2356 {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe 31 PID 2356 wrote to memory of 2660 2356 {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe 31 PID 2356 wrote to memory of 2660 2356 {699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe 31 PID 2772 wrote to memory of 2544 2772 {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe 32 PID 2772 wrote to memory of 2544 2772 {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe 32 PID 2772 wrote to memory of 2544 2772 {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe 32 PID 2772 wrote to memory of 2544 2772 {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe 32 PID 2772 wrote to memory of 2536 2772 {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe 33 PID 2772 wrote to memory of 2536 2772 {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe 33 PID 2772 wrote to memory of 2536 2772 {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe 33 PID 2772 wrote to memory of 2536 2772 {C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe 33 PID 2544 wrote to memory of 2336 2544 {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe 36 PID 2544 wrote to memory of 2336 2544 {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe 36 PID 2544 wrote to memory of 2336 2544 {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe 36 PID 2544 wrote to memory of 2336 2544 {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe 36 PID 2544 wrote to memory of 3024 2544 {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe 37 PID 2544 wrote to memory of 3024 2544 {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe 37 PID 2544 wrote to memory of 3024 2544 {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe 37 PID 2544 wrote to memory of 3024 2544 {1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe 37 PID 2336 wrote to memory of 2844 2336 {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe 38 PID 2336 wrote to memory of 2844 2336 {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe 38 PID 2336 wrote to memory of 2844 2336 {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe 38 PID 2336 wrote to memory of 2844 2336 {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe 38 PID 2336 wrote to memory of 2848 2336 {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe 39 PID 2336 wrote to memory of 2848 2336 {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe 39 PID 2336 wrote to memory of 2848 2336 {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe 39 PID 2336 wrote to memory of 2848 2336 {2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe 39 PID 2844 wrote to memory of 1968 2844 {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe 40 PID 2844 wrote to memory of 1968 2844 {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe 40 PID 2844 wrote to memory of 1968 2844 {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe 40 PID 2844 wrote to memory of 1968 2844 {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe 40 PID 2844 wrote to memory of 1920 2844 {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe 41 PID 2844 wrote to memory of 1920 2844 {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe 41 PID 2844 wrote to memory of 1920 2844 {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe 41 PID 2844 wrote to memory of 1920 2844 {A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe 41 PID 1968 wrote to memory of 292 1968 {1568D133-02C7-4099-99C3-B351FEC6A185}.exe 42 PID 1968 wrote to memory of 292 1968 {1568D133-02C7-4099-99C3-B351FEC6A185}.exe 42 PID 1968 wrote to memory of 292 1968 {1568D133-02C7-4099-99C3-B351FEC6A185}.exe 42 PID 1968 wrote to memory of 292 1968 {1568D133-02C7-4099-99C3-B351FEC6A185}.exe 42 PID 1968 wrote to memory of 2404 1968 {1568D133-02C7-4099-99C3-B351FEC6A185}.exe 43 PID 1968 wrote to memory of 2404 1968 {1568D133-02C7-4099-99C3-B351FEC6A185}.exe 43 PID 1968 wrote to memory of 2404 1968 {1568D133-02C7-4099-99C3-B351FEC6A185}.exe 43 PID 1968 wrote to memory of 2404 1968 {1568D133-02C7-4099-99C3-B351FEC6A185}.exe 43 PID 292 wrote to memory of 2704 292 {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe 44 PID 292 wrote to memory of 2704 292 {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe 44 PID 292 wrote to memory of 2704 292 {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe 44 PID 292 wrote to memory of 2704 292 {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe 44 PID 292 wrote to memory of 308 292 {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe 45 PID 292 wrote to memory of 308 292 {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe 45 PID 292 wrote to memory of 308 292 {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe 45 PID 292 wrote to memory of 308 292 {951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe"C:\Users\Admin\AppData\Local\Temp\22d74fe2a82b7d6831a87754853b5ce6086b820d968491f77504cf1facd70e8d.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\{699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exeC:\Windows\{699AD3BD-6C1A-41ee-99A2-2440EEE33F0B}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\{C478288C-E356-4fbc-99F5-58AFA3699D0F}.exeC:\Windows\{C478288C-E356-4fbc-99F5-58AFA3699D0F}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\{1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exeC:\Windows\{1F38ECC6-98E9-4cc9-B8E3-3F35A5AC4686}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\{2C6CB159-27D6-4659-9609-6CA83C24FD51}.exeC:\Windows\{2C6CB159-27D6-4659-9609-6CA83C24FD51}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\{A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exeC:\Windows\{A626D0A3-1E59-4c07-9FC8-FF2300EE4C66}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\{1568D133-02C7-4099-99C3-B351FEC6A185}.exeC:\Windows\{1568D133-02C7-4099-99C3-B351FEC6A185}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\{951F8FE3-4CF9-468e-A320-024FB6E418CF}.exeC:\Windows\{951F8FE3-4CF9-468e-A320-024FB6E418CF}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\{27E16512-A2E2-4e47-B905-0DBD91DBAD90}.exeC:\Windows\{27E16512-A2E2-4e47-B905-0DBD91DBAD90}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2704 -
C:\Windows\{8EBCF102-23EF-4330-AFFF-9C47534B2B36}.exeC:\Windows\{8EBCF102-23EF-4330-AFFF-9C47534B2B36}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\{CAD8014F-37A0-4e45-ABFC-7C284586A0A7}.exeC:\Windows\{CAD8014F-37A0-4e45-ABFC-7C284586A0A7}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\{175EBF0D-3676-47d7-95E6-EF69690EBA99}.exeC:\Windows\{175EBF0D-3676-47d7-95E6-EF69690EBA99}.exe12⤵
- Executes dropped EXE
PID:776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CAD80~1.EXE > nul12⤵PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8EBCF~1.EXE > nul11⤵PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{27E16~1.EXE > nul10⤵PID:624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{951F8~1.EXE > nul9⤵PID:308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1568D~1.EXE > nul8⤵PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A626D~1.EXE > nul7⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2C6CB~1.EXE > nul6⤵PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1F38E~1.EXE > nul5⤵PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C4782~1.EXE > nul4⤵PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{699AD~1.EXE > nul3⤵PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\22D74F~1.EXE > nul2⤵
- Deletes itself
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5c201d0b835791bcadea0113fcaeee1bf
SHA1e341e8502d0d2a4f50a9ddc83aba6047d5fc5281
SHA256edd267db8be27e981ebaeb65ede0ceffcc18e57c38c4c49af7e90ff1f8699275
SHA5121e10770075142b2214b0db8f36d4b318be4781d11cec68a8f50b9226c3eff52568eb01af8d10149fec77dd28b815cb0c49ff8149e83fb9af04e20f1f60a49812
-
Filesize
408KB
MD5ca1ea07f74a3f4ebcfe7c1c7116ff517
SHA13af428329f2ba7abdf63f1f897226409d69b12a9
SHA256aaf2eda4a89bf581407efecc0a8a2a42368d9fac21043fa168826b57e8f770a1
SHA5126cc187ab576e897c4ea142fcbe61726c8fae2079e43a425008baa98b00888b420e4e67a7582ebf9e62e239c47811915f7744ebb22ea66879df878def07de70f6
-
Filesize
408KB
MD51860753aa1c053182a939fb381312276
SHA1a4ea3a2d19816b6ad40db8062ef15325cd2edcbe
SHA2561e0f885d2717ed8b0405aed002d646f63723a644a64ebafe3ac972e7162deeea
SHA512df277b79ee21a6c156663b6da7604dbb9bd705373a8be9292e084a25948859d8d99ec44af87533458fa43fb7931c030b68b6cb5335a66fc042b10f51e5e6cae2
-
Filesize
408KB
MD5366cb5a3648b857ad336880e320621fb
SHA18161557ede64a312902bc9923045ff7bb12a72c9
SHA256efd6fb18ed90a8a95a9e0aec75c3d82e1d278285855c3acb9e098f912dd9f213
SHA5129ac1756789cb9f8514f2174042496bfe1e1df69942638bdc98ac7014be60b597f18a5665d13e271b3d8c92a47798b66e0ae00b5c41977dfefb75beeb33a43b4e
-
Filesize
408KB
MD50ebfd0ebebc5c8a319e3d4c7d8ceaeab
SHA1a0a3f1fba79e1040122b46678247ef39ffe19f45
SHA25618c9318ae25d07514f4271ea0ac0300ddd375225ba30272c94766f4358f3488a
SHA512005b5fe74ecbc90d387493f6c28b1174fd69c68883fa42bf7b4ed912c0258cc8db2bd7121231a41393fdfa4cdc8594523aea3ce394767af7b8e1c4f2f087c29b
-
Filesize
408KB
MD59079206c6e7675846d06d99c7e8949ae
SHA13e3aebf03fabd56a4f9ee62afe8cbbb067daca24
SHA2564898fd26bd9f72168100348997c772b7a0f1d92d63f1af969218d4875ad906f7
SHA512b0947a48c5bf96dc0e28b2f6c9372a35fa54e985da9ae9e843aa3f4f112e6c00f779694ebf994660a1e979709cd39a0f48725c2b441a56e0051873c8db8a0183
-
Filesize
408KB
MD52f7b27030d2048893366c6ad0a59f482
SHA1dcfdac2038d5fcca9a5352bae2baeabcd08d8a17
SHA25644a10dd9232aa2e63466265bbb0805f657c47b770a88e7a6649f983341632f38
SHA5125a5c5000fe74756551de2aebb4af3aa835741abcbe6109fe514c118101646914d93e50d984bcbbdbf90e96bfb256d23092711f1463243cbb982d4312155a462b
-
Filesize
408KB
MD5a2c07cd8a5b48641f103705435099609
SHA1458f3bdfe11f1313a26694083c21174548799c38
SHA256766e0d5e60c66a08f35da7b0e3ea6467dd0c4441e1d3c3f84e59403e8b6fc375
SHA51243d282ee7bf4f0dc1000bc8003a012fd2b1c0cd49ef5ee2b13d7cc8e7811b06de7d0fb2fdbf64b8604ad5ba048a470bdda9f0803fda47e9e63ead09d1d06d5ec
-
Filesize
408KB
MD59ca4432fc0421f19b7f7bd828e0fb7ce
SHA19384e0996fadacf2b93333311a0e92adce757664
SHA256b8dba2d85e81cd931e987ca80a1097b36c05a392d8c823cfe5815b3c3c258bb1
SHA512e0957967e1fa2107b10d92f56ca0fc1b3a3886a682387c1515bce6b35e84f35e6840569c78d5f5955c05ea7e3c69158c6a117e870762e94ee76d9f4362a6296c
-
Filesize
408KB
MD510d8aa2988e813bd57d48f81df896ae1
SHA1131578112997dbe8aa81ea552bbcfc5b8c0213e8
SHA256f6097964c063c0b8e62a0d4a582aa6a35d9a1658b003c00dbf81a08f198ac52c
SHA51290c8f024684c5959cd14e8c3ae7d6b3276d14d6674cad552e23b2bc33b9a54f1961001f91998bafdc200e09e99f9282c468c29ed9b3c01a5cd06428dec5351f6
-
Filesize
408KB
MD5ba3dae6b4b3b4d54cb864d20ff58f84f
SHA1fe660e30c9b5b309db8204964d8a7abc12e32311
SHA2569aff5a9e315106b2f93cf3e76baf914a97ede8a3ed8308e70acf7922cb78e597
SHA51246ee13c0bbf9a85073de09338cea6f5b83578f8d1cc9e65403a13a43a24fe11c732d9b60704c067254f53b90b5c307ef46d8eaf91dae7070b2bf6c5e4be2610b