Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 01:07
Static task
static1
Behavioral task
behavioral1
Sample
15d4d4a02b095380d7335c704f434ec0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
15d4d4a02b095380d7335c704f434ec0.exe
Resource
win10v2004-20240704-en
General
-
Target
15d4d4a02b095380d7335c704f434ec0.exe
-
Size
64KB
-
MD5
15d4d4a02b095380d7335c704f434ec0
-
SHA1
613d47f8f1127bfafb0bc0fc586f871a6ec4c797
-
SHA256
71535ad3f9b1b6a350d932b557af1e7499b1ff062061bd37106bcd64a527ae5a
-
SHA512
7e4f6f6c387a4a052381089ea4e2a2d1a2120b2e63320a442810bb304d2417ec18a8002faca8b91b701e6d74cdab70c16249f8437014586bb1582c7df45e3c41
-
SSDEEP
384:ObLwOs8AHsc42MPwhKQLrow4/CFsrdHWMZ/:Ovw981QvhKQLrow4/wQpWMZ/
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7955B153-7559-47eb-B750-FAB10C3254AE}\stubpath = "C:\\Windows\\{7955B153-7559-47eb-B750-FAB10C3254AE}.exe" {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B72CAF9-4A87-4a21-B2C3-329899264292} {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{306F3093-BC99-41d8-BF0B-8029602D7AA5}\stubpath = "C:\\Windows\\{306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe" {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF82FD85-376E-4e3e-9F9D-DE7536F58BAA} {483D66CC-7E26-4086-AA6B-44BF564FE717}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF82FD85-376E-4e3e-9F9D-DE7536F58BAA}\stubpath = "C:\\Windows\\{EF82FD85-376E-4e3e-9F9D-DE7536F58BAA}.exe" {483D66CC-7E26-4086-AA6B-44BF564FE717}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7F07781-8F4C-4940-97C4-33CEC4C485B4}\stubpath = "C:\\Windows\\{A7F07781-8F4C-4940-97C4-33CEC4C485B4}.exe" {C937C903-DE04-43bd-AFF2-7C2F6994F374}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2EA0ABF-6396-4e8c-BEEE-77576E16D42A} {7955B153-7559-47eb-B750-FAB10C3254AE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{49A994B1-D6DF-46f3-8F70-EF00E4B94AB0} {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{306F3093-BC99-41d8-BF0B-8029602D7AA5} {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{483D66CC-7E26-4086-AA6B-44BF564FE717}\stubpath = "C:\\Windows\\{483D66CC-7E26-4086-AA6B-44BF564FE717}.exe" {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F999404B-A5F9-43d9-A954-5EFBF1EB6FD4} 15d4d4a02b095380d7335c704f434ec0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{483D66CC-7E26-4086-AA6B-44BF564FE717} {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7F07781-8F4C-4940-97C4-33CEC4C485B4} {C937C903-DE04-43bd-AFF2-7C2F6994F374}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E697B93-5908-4192-8FA7-D38D01DC1D0B}\stubpath = "C:\\Windows\\{8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe" {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C937C903-DE04-43bd-AFF2-7C2F6994F374} {EF82FD85-376E-4e3e-9F9D-DE7536F58BAA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}\stubpath = "C:\\Windows\\{F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe" 15d4d4a02b095380d7335c704f434ec0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7955B153-7559-47eb-B750-FAB10C3254AE} {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}\stubpath = "C:\\Windows\\{D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe" {7955B153-7559-47eb-B750-FAB10C3254AE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B72CAF9-4A87-4a21-B2C3-329899264292}\stubpath = "C:\\Windows\\{7B72CAF9-4A87-4a21-B2C3-329899264292}.exe" {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}\stubpath = "C:\\Windows\\{49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe" {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E697B93-5908-4192-8FA7-D38D01DC1D0B} {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C937C903-DE04-43bd-AFF2-7C2F6994F374}\stubpath = "C:\\Windows\\{C937C903-DE04-43bd-AFF2-7C2F6994F374}.exe" {EF82FD85-376E-4e3e-9F9D-DE7536F58BAA}.exe -
Deletes itself 1 IoCs
pid Process 2112 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2192 {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe 2600 {7955B153-7559-47eb-B750-FAB10C3254AE}.exe 2468 {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe 1848 {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe 2916 {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe 272 {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe 2700 {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe 864 {483D66CC-7E26-4086-AA6B-44BF564FE717}.exe 2088 {EF82FD85-376E-4e3e-9F9D-DE7536F58BAA}.exe 656 {C937C903-DE04-43bd-AFF2-7C2F6994F374}.exe 1860 {A7F07781-8F4C-4940-97C4-33CEC4C485B4}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{483D66CC-7E26-4086-AA6B-44BF564FE717}.exe {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe File created C:\Windows\{EF82FD85-376E-4e3e-9F9D-DE7536F58BAA}.exe {483D66CC-7E26-4086-AA6B-44BF564FE717}.exe File created C:\Windows\{F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe 15d4d4a02b095380d7335c704f434ec0.exe File created C:\Windows\{7955B153-7559-47eb-B750-FAB10C3254AE}.exe {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe File created C:\Windows\{D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe {7955B153-7559-47eb-B750-FAB10C3254AE}.exe File created C:\Windows\{306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe File created C:\Windows\{A7F07781-8F4C-4940-97C4-33CEC4C485B4}.exe {C937C903-DE04-43bd-AFF2-7C2F6994F374}.exe File created C:\Windows\{7B72CAF9-4A87-4a21-B2C3-329899264292}.exe {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe File created C:\Windows\{49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe File created C:\Windows\{8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe File created C:\Windows\{C937C903-DE04-43bd-AFF2-7C2F6994F374}.exe {EF82FD85-376E-4e3e-9F9D-DE7536F58BAA}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1688 15d4d4a02b095380d7335c704f434ec0.exe Token: SeIncBasePriorityPrivilege 2192 {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe Token: SeIncBasePriorityPrivilege 2600 {7955B153-7559-47eb-B750-FAB10C3254AE}.exe Token: SeIncBasePriorityPrivilege 2468 {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe Token: SeIncBasePriorityPrivilege 1848 {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe Token: SeIncBasePriorityPrivilege 2916 {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe Token: SeIncBasePriorityPrivilege 272 {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe Token: SeIncBasePriorityPrivilege 2700 {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe Token: SeIncBasePriorityPrivilege 864 {483D66CC-7E26-4086-AA6B-44BF564FE717}.exe Token: SeIncBasePriorityPrivilege 2088 {EF82FD85-376E-4e3e-9F9D-DE7536F58BAA}.exe Token: SeIncBasePriorityPrivilege 656 {C937C903-DE04-43bd-AFF2-7C2F6994F374}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2192 1688 15d4d4a02b095380d7335c704f434ec0.exe 28 PID 1688 wrote to memory of 2192 1688 15d4d4a02b095380d7335c704f434ec0.exe 28 PID 1688 wrote to memory of 2192 1688 15d4d4a02b095380d7335c704f434ec0.exe 28 PID 1688 wrote to memory of 2192 1688 15d4d4a02b095380d7335c704f434ec0.exe 28 PID 1688 wrote to memory of 2112 1688 15d4d4a02b095380d7335c704f434ec0.exe 29 PID 1688 wrote to memory of 2112 1688 15d4d4a02b095380d7335c704f434ec0.exe 29 PID 1688 wrote to memory of 2112 1688 15d4d4a02b095380d7335c704f434ec0.exe 29 PID 1688 wrote to memory of 2112 1688 15d4d4a02b095380d7335c704f434ec0.exe 29 PID 2192 wrote to memory of 2600 2192 {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe 30 PID 2192 wrote to memory of 2600 2192 {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe 30 PID 2192 wrote to memory of 2600 2192 {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe 30 PID 2192 wrote to memory of 2600 2192 {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe 30 PID 2192 wrote to memory of 3004 2192 {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe 31 PID 2192 wrote to memory of 3004 2192 {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe 31 PID 2192 wrote to memory of 3004 2192 {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe 31 PID 2192 wrote to memory of 3004 2192 {F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe 31 PID 2600 wrote to memory of 2468 2600 {7955B153-7559-47eb-B750-FAB10C3254AE}.exe 32 PID 2600 wrote to memory of 2468 2600 {7955B153-7559-47eb-B750-FAB10C3254AE}.exe 32 PID 2600 wrote to memory of 2468 2600 {7955B153-7559-47eb-B750-FAB10C3254AE}.exe 32 PID 2600 wrote to memory of 2468 2600 {7955B153-7559-47eb-B750-FAB10C3254AE}.exe 32 PID 2600 wrote to memory of 2488 2600 {7955B153-7559-47eb-B750-FAB10C3254AE}.exe 33 PID 2600 wrote to memory of 2488 2600 {7955B153-7559-47eb-B750-FAB10C3254AE}.exe 33 PID 2600 wrote to memory of 2488 2600 {7955B153-7559-47eb-B750-FAB10C3254AE}.exe 33 PID 2600 wrote to memory of 2488 2600 {7955B153-7559-47eb-B750-FAB10C3254AE}.exe 33 PID 2468 wrote to memory of 1848 2468 {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe 36 PID 2468 wrote to memory of 1848 2468 {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe 36 PID 2468 wrote to memory of 1848 2468 {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe 36 PID 2468 wrote to memory of 1848 2468 {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe 36 PID 2468 wrote to memory of 2536 2468 {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe 37 PID 2468 wrote to memory of 2536 2468 {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe 37 PID 2468 wrote to memory of 2536 2468 {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe 37 PID 2468 wrote to memory of 2536 2468 {D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe 37 PID 1848 wrote to memory of 2916 1848 {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe 38 PID 1848 wrote to memory of 2916 1848 {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe 38 PID 1848 wrote to memory of 2916 1848 {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe 38 PID 1848 wrote to memory of 2916 1848 {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe 38 PID 1848 wrote to memory of 1428 1848 {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe 39 PID 1848 wrote to memory of 1428 1848 {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe 39 PID 1848 wrote to memory of 1428 1848 {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe 39 PID 1848 wrote to memory of 1428 1848 {7B72CAF9-4A87-4a21-B2C3-329899264292}.exe 39 PID 2916 wrote to memory of 272 2916 {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe 40 PID 2916 wrote to memory of 272 2916 {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe 40 PID 2916 wrote to memory of 272 2916 {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe 40 PID 2916 wrote to memory of 272 2916 {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe 40 PID 2916 wrote to memory of 1996 2916 {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe 41 PID 2916 wrote to memory of 1996 2916 {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe 41 PID 2916 wrote to memory of 1996 2916 {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe 41 PID 2916 wrote to memory of 1996 2916 {49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe 41 PID 272 wrote to memory of 2700 272 {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe 42 PID 272 wrote to memory of 2700 272 {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe 42 PID 272 wrote to memory of 2700 272 {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe 42 PID 272 wrote to memory of 2700 272 {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe 42 PID 272 wrote to memory of 1532 272 {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe 43 PID 272 wrote to memory of 1532 272 {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe 43 PID 272 wrote to memory of 1532 272 {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe 43 PID 272 wrote to memory of 1532 272 {306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe 43 PID 2700 wrote to memory of 864 2700 {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe 44 PID 2700 wrote to memory of 864 2700 {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe 44 PID 2700 wrote to memory of 864 2700 {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe 44 PID 2700 wrote to memory of 864 2700 {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe 44 PID 2700 wrote to memory of 2052 2700 {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe 45 PID 2700 wrote to memory of 2052 2700 {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe 45 PID 2700 wrote to memory of 2052 2700 {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe 45 PID 2700 wrote to memory of 2052 2700 {8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\15d4d4a02b095380d7335c704f434ec0.exe"C:\Users\Admin\AppData\Local\Temp\15d4d4a02b095380d7335c704f434ec0.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\{F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exeC:\Windows\{F999404B-A5F9-43d9-A954-5EFBF1EB6FD4}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\{7955B153-7559-47eb-B750-FAB10C3254AE}.exeC:\Windows\{7955B153-7559-47eb-B750-FAB10C3254AE}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\{D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exeC:\Windows\{D2EA0ABF-6396-4e8c-BEEE-77576E16D42A}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\{7B72CAF9-4A87-4a21-B2C3-329899264292}.exeC:\Windows\{7B72CAF9-4A87-4a21-B2C3-329899264292}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\{49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exeC:\Windows\{49A994B1-D6DF-46f3-8F70-EF00E4B94AB0}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\{306F3093-BC99-41d8-BF0B-8029602D7AA5}.exeC:\Windows\{306F3093-BC99-41d8-BF0B-8029602D7AA5}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\{8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exeC:\Windows\{8E697B93-5908-4192-8FA7-D38D01DC1D0B}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\{483D66CC-7E26-4086-AA6B-44BF564FE717}.exeC:\Windows\{483D66CC-7E26-4086-AA6B-44BF564FE717}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Windows\{EF82FD85-376E-4e3e-9F9D-DE7536F58BAA}.exeC:\Windows\{EF82FD85-376E-4e3e-9F9D-DE7536F58BAA}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\{C937C903-DE04-43bd-AFF2-7C2F6994F374}.exeC:\Windows\{C937C903-DE04-43bd-AFF2-7C2F6994F374}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:656 -
C:\Windows\{A7F07781-8F4C-4940-97C4-33CEC4C485B4}.exeC:\Windows\{A7F07781-8F4C-4940-97C4-33CEC4C485B4}.exe12⤵
- Executes dropped EXE
PID:1860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C937C~1.EXE > nul12⤵PID:1296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EF82F~1.EXE > nul11⤵PID:712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{483D6~1.EXE > nul10⤵PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E697~1.EXE > nul9⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{306F3~1.EXE > nul8⤵PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{49A99~1.EXE > nul7⤵PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7B72C~1.EXE > nul6⤵PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2EA0~1.EXE > nul5⤵PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7955B~1.EXE > nul4⤵PID:2488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9994~1.EXE > nul3⤵PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\15D4D4~1.EXE > nul2⤵
- Deletes itself
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5098cb12540f10243b2f88f0c6a4bab46
SHA109ee34f388a507c7e87bfe049de1c7a760e54b52
SHA256e4c676bb565a9d5ebb2316416f25d6ae2b965bbd819a330f9b85e56dd812b9f9
SHA51277013dac1ad45ec00c7bebb34b602677f2d6056ce09b4cdbe28fa7e12464bc3447dd006c2a5bb06b6da4fcfccac04768a2d9eb73b415d3a5aae674b71412d532
-
Filesize
64KB
MD5e88cc121bd391ee68ec74bfbf0bbeb21
SHA1b55407451e905ccf5cd211022eef1828d0ddaec4
SHA256a0cd0acc5da46686b71dbbe9e434b8a3c0e82990881184b4efa25cc02cf84225
SHA5122fa3f06c7ac82d144a9c6c06eb2aaacffa1f74b6b05c09e5397ae1bd596afd79bdcc4cb25116f087327f3fa30f762e0a07f1b3c500230fd2c135bf9569a294a5
-
Filesize
64KB
MD5dfb6b16fb2c0d532537cf8e3fcac8b49
SHA16cdac5f0de72f43688a3c80a26949098c9b27ed9
SHA256114d1bbba8050203d259f1018c3b054ea57c8b0538252ccd1a4ac31971308942
SHA5124053f6e1bfcd2c84093caae723d7c67b04d7caf27241d12211b75f0bbf797433f0848540efc962cd15f7720d28b3bbcb826ac00c416aa7f5c4e0443ca3ddea1a
-
Filesize
64KB
MD5380a5e8c62c107684cab38d580adfc83
SHA1d57f45ad07489279e6164ed672121cd23b8d5476
SHA256b598f14a6d3d5ff3ca35bf7e428896033836d83434ed58ecc349409a30c0c9fb
SHA512a9840fbb93088f829b35dd31ec7347eddbdf877ff62d337705d5c9def8548d2f0db684898317d613c9a914bf646cff7988017e87b986e1807d69d835d727f2b4
-
Filesize
64KB
MD53e0248136a55ae553e48e438d8314750
SHA1e12b0806e9659688dd93ce805d74398a17f1a8b5
SHA256efb6794f6041028173b3938968980c7d3cb99cc1de1360be7657a83ab92c1d45
SHA5121e6e5454a3c56346efd9222e2654ec09e2fce467611df83c63de3abd4fdf99c68618745644f809634112fcc3c0ce9b60ded840b24c5a52525add7aff010d6c47
-
Filesize
64KB
MD5486f36194e28a1585990a662a435858f
SHA1e1276a6c2d9b6899a0c0f54ec2dfe6e34e8e42bd
SHA2567b76fce73f058c6d78e92c3467a6346324b0a2fc3ea346328579078b63318a68
SHA512cc9c98c3fbfea57f71f345880481cb245135205e7a3936a2b7129cb4a17386fcc23a2ee042c4a07b632bcfb7367773b3b0fab37252f7992c07e9ffe7ed0c4cac
-
Filesize
64KB
MD57ae4d9ad00b5f4f5448c9778e315a917
SHA158fcc79eae7c9dd5966adf88473b7372d5edbfe2
SHA256ad849de8ced50b02e3089c9f6d61b0be181bd442f5c68d29be29f622d905e54a
SHA512b9126115febd5b7a3b9615766d660903f90736c537715f222a5e2aa46b051956d8b639fd6ea9bdd1cc8f5fdffa76eaad6cca01e5253447aa04661afb083c4bed
-
Filesize
64KB
MD5eae45b47c8017c991dc4bef03df31f82
SHA19c27ae80bc99eefd8a4debd0bb685f73e75ffcae
SHA2566d8bab953a5689c2adf0cf8fdf18c5fc405172d14c6ec0953d8e340228363b7a
SHA5120cb201d8fed1188a8104be8d21a4c8406e09317716658dd305022c9c5b51ba104793db966cabade34eb2a12301f2e78b0609a80bebed647fc54bc55c2d5429ec
-
Filesize
64KB
MD5d34b890285a9d8f3402ac48ae3cd0372
SHA15010f88d3522d339114cd22f40fa6baaf1567cef
SHA2564a85207139d2649db815c98d5df9bce505e20a44e609abd2ce375c5f2c499af3
SHA512e77e6a953de4f1a1c0037b06825767c45c8128e17ab168d47907d8a67ee707ae89e7fd5496f1767c91d4ae3c9a5cf3750fc26f5e5f075591aace3c915b3054a6
-
Filesize
64KB
MD560b61f2ad55600f3e8156772390a98aa
SHA11190da860f73bc989277c245a4815f52f497b2c3
SHA256c7b7cc02b6267e5a78d9439ac76011f98246aa7194015898a9e6689dc5b10426
SHA512864b2d6692097664c5822104a8c814229e277ee4a47de6a4c3223b252e49cf6ed6572fa61af547577656204e00f4585e89bf508a43d59f3dcb5135b1dc5da3b5
-
Filesize
64KB
MD5def9b4eb9673a0522c4467fd0e7fb106
SHA1fafde7969ac96bced144b2dc6d6c41950d541d5b
SHA256df5fc69cf22fecbbdf7f3a1e2f940b764f91573afd31de62d75250dc7914ab7e
SHA5125495e963e1536a9fd95231d586a7ace2f21022aefc5946e66f1263a95d3b5e5cd57efb0a794167228e79411b5f6fbabcb6d80fd386a67d6a04219ccfaab598c1