Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
56e1da5ba551a748358720eed8192200N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
56e1da5ba551a748358720eed8192200N.exe
Resource
win10v2004-20240709-en
General
-
Target
56e1da5ba551a748358720eed8192200N.exe
-
Size
91KB
-
MD5
56e1da5ba551a748358720eed8192200
-
SHA1
fde2f8c1380fdafe7b3bcbb91bd08c327a300a80
-
SHA256
7cf8b75284e42eb18a0d5b00d5df3c274c3ccbd1db5e7078acec56bf1d38e4ca
-
SHA512
0cd13b6c756777b74aeb49f2148a81ebcbd7c0e59f6db7d5044a70e8d781396e1a3bd20ccad35cb024f105ccbea64242c138852d5be28a92a0173b32f6421729
-
SSDEEP
768:5vw9816uhKirob4/wQNNrfrunMxVFA3b7t:lEGkmoblCunMxVS3Ht
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E21C27D4-4402-46e6-9910-B361EE5955C8}\stubpath = "C:\\Windows\\{E21C27D4-4402-46e6-9910-B361EE5955C8}.exe" {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4E3EA360-1FE0-48b3-86D0-65C48B225DCD}\stubpath = "C:\\Windows\\{4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe" {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{518D2CBC-30DC-4074-822B-AC9CEEFE64A0}\stubpath = "C:\\Windows\\{518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe" {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C} {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88C8F73D-2798-4642-8FC6-95640B4FED95}\stubpath = "C:\\Windows\\{88C8F73D-2798-4642-8FC6-95640B4FED95}.exe" {8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{45E3EF4B-333C-4eea-B4B1-D59B222FCAF3} {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1636251A-E6DD-4056-A134-6381A6FDAECA} {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1636251A-E6DD-4056-A134-6381A6FDAECA}\stubpath = "C:\\Windows\\{1636251A-E6DD-4056-A134-6381A6FDAECA}.exe" {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{018B27A4-9803-4b18-89AB-CCE4D0A8E621} 56e1da5ba551a748358720eed8192200N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E21C27D4-4402-46e6-9910-B361EE5955C8} {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C}\stubpath = "C:\\Windows\\{8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C}.exe" {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C5FE29A2-AF3B-49b8-AB9A-E1254327809C}\stubpath = "C:\\Windows\\{C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe" {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88C8F73D-2798-4642-8FC6-95640B4FED95} {8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{018B27A4-9803-4b18-89AB-CCE4D0A8E621}\stubpath = "C:\\Windows\\{018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe" 56e1da5ba551a748358720eed8192200N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}\stubpath = "C:\\Windows\\{45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe" {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4E3EA360-1FE0-48b3-86D0-65C48B225DCD} {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{518D2CBC-30DC-4074-822B-AC9CEEFE64A0} {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C5FE29A2-AF3B-49b8-AB9A-E1254327809C} {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe -
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 1704 {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe 2896 {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe 2072 {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe 2636 {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe 1164 {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe 1168 {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe 588 {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe 2020 {8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C}.exe 2312 {88C8F73D-2798-4642-8FC6-95640B4FED95}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe File created C:\Windows\{518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe File created C:\Windows\{C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe File created C:\Windows\{8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C}.exe {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe File created C:\Windows\{45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe File created C:\Windows\{1636251A-E6DD-4056-A134-6381A6FDAECA}.exe {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe File created C:\Windows\{88C8F73D-2798-4642-8FC6-95640B4FED95}.exe {8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C}.exe File created C:\Windows\{018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe 56e1da5ba551a748358720eed8192200N.exe File created C:\Windows\{E21C27D4-4402-46e6-9910-B361EE5955C8}.exe {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 648 56e1da5ba551a748358720eed8192200N.exe Token: SeIncBasePriorityPrivilege 1704 {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe Token: SeIncBasePriorityPrivilege 2896 {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe Token: SeIncBasePriorityPrivilege 2072 {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe Token: SeIncBasePriorityPrivilege 2636 {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe Token: SeIncBasePriorityPrivilege 1164 {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe Token: SeIncBasePriorityPrivilege 1168 {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe Token: SeIncBasePriorityPrivilege 588 {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe Token: SeIncBasePriorityPrivilege 2020 {8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 648 wrote to memory of 1704 648 56e1da5ba551a748358720eed8192200N.exe 31 PID 648 wrote to memory of 1704 648 56e1da5ba551a748358720eed8192200N.exe 31 PID 648 wrote to memory of 1704 648 56e1da5ba551a748358720eed8192200N.exe 31 PID 648 wrote to memory of 1704 648 56e1da5ba551a748358720eed8192200N.exe 31 PID 648 wrote to memory of 2804 648 56e1da5ba551a748358720eed8192200N.exe 32 PID 648 wrote to memory of 2804 648 56e1da5ba551a748358720eed8192200N.exe 32 PID 648 wrote to memory of 2804 648 56e1da5ba551a748358720eed8192200N.exe 32 PID 648 wrote to memory of 2804 648 56e1da5ba551a748358720eed8192200N.exe 32 PID 1704 wrote to memory of 2896 1704 {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe 33 PID 1704 wrote to memory of 2896 1704 {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe 33 PID 1704 wrote to memory of 2896 1704 {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe 33 PID 1704 wrote to memory of 2896 1704 {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe 33 PID 1704 wrote to memory of 2768 1704 {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe 34 PID 1704 wrote to memory of 2768 1704 {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe 34 PID 1704 wrote to memory of 2768 1704 {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe 34 PID 1704 wrote to memory of 2768 1704 {018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe 34 PID 2896 wrote to memory of 2072 2896 {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe 35 PID 2896 wrote to memory of 2072 2896 {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe 35 PID 2896 wrote to memory of 2072 2896 {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe 35 PID 2896 wrote to memory of 2072 2896 {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe 35 PID 2896 wrote to memory of 3008 2896 {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe 36 PID 2896 wrote to memory of 3008 2896 {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe 36 PID 2896 wrote to memory of 3008 2896 {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe 36 PID 2896 wrote to memory of 3008 2896 {45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe 36 PID 2072 wrote to memory of 2636 2072 {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe 37 PID 2072 wrote to memory of 2636 2072 {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe 37 PID 2072 wrote to memory of 2636 2072 {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe 37 PID 2072 wrote to memory of 2636 2072 {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe 37 PID 2072 wrote to memory of 2696 2072 {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe 38 PID 2072 wrote to memory of 2696 2072 {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe 38 PID 2072 wrote to memory of 2696 2072 {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe 38 PID 2072 wrote to memory of 2696 2072 {1636251A-E6DD-4056-A134-6381A6FDAECA}.exe 38 PID 2636 wrote to memory of 1164 2636 {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe 39 PID 2636 wrote to memory of 1164 2636 {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe 39 PID 2636 wrote to memory of 1164 2636 {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe 39 PID 2636 wrote to memory of 1164 2636 {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe 39 PID 2636 wrote to memory of 784 2636 {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe 40 PID 2636 wrote to memory of 784 2636 {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe 40 PID 2636 wrote to memory of 784 2636 {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe 40 PID 2636 wrote to memory of 784 2636 {E21C27D4-4402-46e6-9910-B361EE5955C8}.exe 40 PID 1164 wrote to memory of 1168 1164 {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe 41 PID 1164 wrote to memory of 1168 1164 {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe 41 PID 1164 wrote to memory of 1168 1164 {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe 41 PID 1164 wrote to memory of 1168 1164 {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe 41 PID 1164 wrote to memory of 2040 1164 {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe 42 PID 1164 wrote to memory of 2040 1164 {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe 42 PID 1164 wrote to memory of 2040 1164 {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe 42 PID 1164 wrote to memory of 2040 1164 {4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe 42 PID 1168 wrote to memory of 588 1168 {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe 43 PID 1168 wrote to memory of 588 1168 {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe 43 PID 1168 wrote to memory of 588 1168 {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe 43 PID 1168 wrote to memory of 588 1168 {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe 43 PID 1168 wrote to memory of 1128 1168 {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe 44 PID 1168 wrote to memory of 1128 1168 {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe 44 PID 1168 wrote to memory of 1128 1168 {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe 44 PID 1168 wrote to memory of 1128 1168 {518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe 44 PID 588 wrote to memory of 2020 588 {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe 45 PID 588 wrote to memory of 2020 588 {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe 45 PID 588 wrote to memory of 2020 588 {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe 45 PID 588 wrote to memory of 2020 588 {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe 45 PID 588 wrote to memory of 1604 588 {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe 46 PID 588 wrote to memory of 1604 588 {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe 46 PID 588 wrote to memory of 1604 588 {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe 46 PID 588 wrote to memory of 1604 588 {C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\56e1da5ba551a748358720eed8192200N.exe"C:\Users\Admin\AppData\Local\Temp\56e1da5ba551a748358720eed8192200N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\{018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exeC:\Windows\{018B27A4-9803-4b18-89AB-CCE4D0A8E621}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\{45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exeC:\Windows\{45E3EF4B-333C-4eea-B4B1-D59B222FCAF3}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\{1636251A-E6DD-4056-A134-6381A6FDAECA}.exeC:\Windows\{1636251A-E6DD-4056-A134-6381A6FDAECA}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\{E21C27D4-4402-46e6-9910-B361EE5955C8}.exeC:\Windows\{E21C27D4-4402-46e6-9910-B361EE5955C8}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\{4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exeC:\Windows\{4E3EA360-1FE0-48b3-86D0-65C48B225DCD}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\{518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exeC:\Windows\{518D2CBC-30DC-4074-822B-AC9CEEFE64A0}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\{C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exeC:\Windows\{C5FE29A2-AF3B-49b8-AB9A-E1254327809C}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\{8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C}.exeC:\Windows\{8F805C7B-4957-44d5-BB9D-8DFD51B8EF8C}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Windows\{88C8F73D-2798-4642-8FC6-95640B4FED95}.exeC:\Windows\{88C8F73D-2798-4642-8FC6-95640B4FED95}.exe10⤵
- Executes dropped EXE
PID:2312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F805~1.EXE > nul10⤵PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C5FE2~1.EXE > nul9⤵PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{518D2~1.EXE > nul8⤵PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4E3EA~1.EXE > nul7⤵PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E21C2~1.EXE > nul6⤵PID:784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16362~1.EXE > nul5⤵PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{45E3E~1.EXE > nul4⤵PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{018B2~1.EXE > nul3⤵PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\56E1DA~1.EXE > nul2⤵
- Deletes itself
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD55b55d409569eae5144aa6a971b60818e
SHA1218b8c42b1caa2ff458348a4b31d2d4c56e67741
SHA2566255f09ad5ca0d76df0e44daca114eaeeee94d37f389590e676797bf3e8d92f4
SHA512cda7e487ea326e26d6b70a9e8c8242d783a4417fa9d1f7bb7a102ca58a2defcfa829968bb51163ce660b086258f1d140dced840d8e9bd31ec36b9caebf4c8e4f
-
Filesize
91KB
MD5c8bd83248ff449b0cddbbeb050377465
SHA18a60ec1617d060500572ab282fcafdb4c7828594
SHA256335735cf1545b120d2287368c3e123cec03782d83bd3bce132f3db9e5d76cd71
SHA512d8707417f3d0346523a4333f2b315280c048fc7ea05a8dcfc6c1dabede41fb77a995bda74f7677e39ff7f34cb5859d09da1e187719690f19e5fd7e9413061e6c
-
Filesize
91KB
MD524eb4c963699744e3fd28ca90d76afe2
SHA1408d5d4fc69e9cf4c8fa5714f6490a3b10f4b0d4
SHA256c37537ff9fcd46d1bf2fc0bf7d1f4a60a6c3796d78d746da3f6cac6f787c030e
SHA512db04cbb8eacdff975b9532e81656555813878bbb54d5e3f51b87f104deea42de561913174f8c1c8b37521cf421292fac5ceb3611edee9f64fadd69d07a96c2d4
-
Filesize
91KB
MD5e315588519afe3fd591d135c5051aced
SHA118bbb1aaf905c4a4d955467bf495f37473d37ed5
SHA256a55c8e99dc58a61939c587886b06a09b2026b171cf6dc7446bc3a633326c22c9
SHA5129b94609c8bf9914ee5160fbe43d1ae4611877c707fa1e4b3d09e3fc74582fd32a4bd2999b9a4b03a339ecdea1a70fb90e9069d04cb809be573fe15d24394510e
-
Filesize
91KB
MD5af10340ca2e77afad161e33ef2c53dd5
SHA107d9df9a34128bbe61d8898f6a55b7a6065d7d23
SHA25691d9d634b39e6e6db123672eaa0fad82f1643f0f9c24cfcd1da7917cbf6dafbb
SHA512248bc2f14279b1adcb2eac9471cd2e7558c52fc83bb5bbfb8f2dd1daadb63650242b451429405c2659cf83b0902d80d85972c637002325ce7b50636a5bbea6d1
-
Filesize
91KB
MD558e60e09c5de65406913a96a7e1c1900
SHA18c0f492d88ac96e4e1ad234fa179b9418bc41c5d
SHA256bc22b7a249ccc8637f289d5c662afefe8a3f8e6a8699b3b37efee5d2ca712bb2
SHA512c63c4eaee72707de35d34f7a55980821e43fe778ea29636bba15448673be7151a95c449ce2767d01a76c7faa88cb1e63948c9e0d1ec543139b7f4e8d7ed43efe
-
Filesize
91KB
MD5d4b1aca2ea3aec3ce4fac21df7259b40
SHA1b39ab166fb6b2379ce86dee1a0c2960eec72d2f3
SHA25683a0b2c2b9db2d3ee46a4839d109a7feea5d1f430ce62e00b172045ce07b7258
SHA51208ca8f155b16aa9bbdac9154cc90f75c30dd865bcce3412a0dd9d192d2dff6ff8f96d6872b3575ccd82b7e4b1746b9e7ef54dd032076dae66a013a0541622c24
-
Filesize
91KB
MD5b870bbbc4d47b763d69cc8e17fcdc536
SHA1118579402561c29971d034ff3fb1aac1295a8ae3
SHA2565aa4d680afaa51bad844b94a7ff418d1316720135dc9eb59b4bae8094473cefd
SHA512c87d48356faa434c812a9880c07d38c79a792bf7bd1743072cdaf470b9feaba1131db958f49eb7f31715eaa9025365cbcb41842e6c57c3e5163aa24878ef7bf4
-
Filesize
91KB
MD579c4f644e69cc0eaf5ec3247fa7d37a0
SHA1318274731ab552d9d6b5850e49a4a4e4d39af3cf
SHA25619ecdaa700135f60b0faad986d8f39ca74ef357804fbe9b1654cc853a9be1df8
SHA512a1a7378c7e7c3840280ec407fb9b1e17bf600258e88024423088fc21da2dcfa68a04100ef7ba213432acb62ce12320013b4fc29ca25fcf8f454ed32689ca85ee