Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
64de30bfe3019e6bff78885e7c62f090N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
64de30bfe3019e6bff78885e7c62f090N.exe
Resource
win10v2004-20240709-en
General
-
Target
64de30bfe3019e6bff78885e7c62f090N.exe
-
Size
90KB
-
MD5
64de30bfe3019e6bff78885e7c62f090
-
SHA1
bd873aa9f02932cca2cfdae6ccfc7d4a5bc4db86
-
SHA256
d8b9fb74a5042f32bde6105eb99f260be83ecf710f0e166180bbc1f76e1afd6f
-
SHA512
e65c5bbebdb19cd7ccab1944bea53723cae6c111c3cc28268274353d2e38576c556671c3b723d9d0b4f6bfea7a38c19bd677b4da69f2e1d9a0c436a180f1e70d
-
SSDEEP
768:Qvw9816vhKQLrod4/wQRNrfrunMxVFA3b7glws:YEGh0odl2unMxVS3Hgz
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDA342C7-2DE1-4b59-9446-3661EF560336}\stubpath = "C:\\Windows\\{EDA342C7-2DE1-4b59-9446-3661EF560336}.exe" {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7AE094B1-3C66-4b33-AD7E-6C099942B21F}\stubpath = "C:\\Windows\\{7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe" {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F1660AF-290C-48b6-B52D-0C6B3649DA9B} {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F1660AF-290C-48b6-B52D-0C6B3649DA9B}\stubpath = "C:\\Windows\\{2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe" {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{75D1BBE1-1D1D-4b55-B4E2-C3F9BF94A757}\stubpath = "C:\\Windows\\{75D1BBE1-1D1D-4b55-B4E2-C3F9BF94A757}.exe" {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BCCF87D7-9A94-4226-B49E-E2194BB54E82} {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BCCF87D7-9A94-4226-B49E-E2194BB54E82}\stubpath = "C:\\Windows\\{BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe" {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93D9C800-6BB3-4c97-A988-183AAD1E45CC}\stubpath = "C:\\Windows\\{93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe" 64de30bfe3019e6bff78885e7c62f090N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDA342C7-2DE1-4b59-9446-3661EF560336} {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7AE094B1-3C66-4b33-AD7E-6C099942B21F} {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D02951FE-6785-44ba-A2E8-2D83D8FC5252} {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D02951FE-6785-44ba-A2E8-2D83D8FC5252}\stubpath = "C:\\Windows\\{D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe" {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93D9C800-6BB3-4c97-A988-183AAD1E45CC} 64de30bfe3019e6bff78885e7c62f090N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CBFD1952-56F9-4b80-B517-7D7234DB2AA6}\stubpath = "C:\\Windows\\{CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe" {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{465BDA2C-820E-41db-A25A-40CE2D138E60} {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{75D1BBE1-1D1D-4b55-B4E2-C3F9BF94A757} {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CBFD1952-56F9-4b80-B517-7D7234DB2AA6} {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{465BDA2C-820E-41db-A25A-40CE2D138E60}\stubpath = "C:\\Windows\\{465BDA2C-820E-41db-A25A-40CE2D138E60}.exe" {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe -
Executes dropped EXE 9 IoCs
pid Process 1548 {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe 372 {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe 4436 {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe 636 {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe 5060 {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe 2848 {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe 4812 {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe 4240 {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe 3152 {75D1BBE1-1D1D-4b55-B4E2-C3F9BF94A757}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe File created C:\Windows\{75D1BBE1-1D1D-4b55-B4E2-C3F9BF94A757}.exe {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe File created C:\Windows\{7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe File created C:\Windows\{CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe File created C:\Windows\{BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe File created C:\Windows\{465BDA2C-820E-41db-A25A-40CE2D138E60}.exe {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe File created C:\Windows\{93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe 64de30bfe3019e6bff78885e7c62f090N.exe File created C:\Windows\{EDA342C7-2DE1-4b59-9446-3661EF560336}.exe {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe File created C:\Windows\{D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64de30bfe3019e6bff78885e7c62f090N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {75D1BBE1-1D1D-4b55-B4E2-C3F9BF94A757}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4464 64de30bfe3019e6bff78885e7c62f090N.exe Token: SeIncBasePriorityPrivilege 1548 {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe Token: SeIncBasePriorityPrivilege 372 {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe Token: SeIncBasePriorityPrivilege 4436 {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe Token: SeIncBasePriorityPrivilege 636 {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe Token: SeIncBasePriorityPrivilege 5060 {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe Token: SeIncBasePriorityPrivilege 2848 {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe Token: SeIncBasePriorityPrivilege 4812 {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe Token: SeIncBasePriorityPrivilege 4240 {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1548 4464 64de30bfe3019e6bff78885e7c62f090N.exe 92 PID 4464 wrote to memory of 1548 4464 64de30bfe3019e6bff78885e7c62f090N.exe 92 PID 4464 wrote to memory of 1548 4464 64de30bfe3019e6bff78885e7c62f090N.exe 92 PID 4464 wrote to memory of 2840 4464 64de30bfe3019e6bff78885e7c62f090N.exe 93 PID 4464 wrote to memory of 2840 4464 64de30bfe3019e6bff78885e7c62f090N.exe 93 PID 4464 wrote to memory of 2840 4464 64de30bfe3019e6bff78885e7c62f090N.exe 93 PID 1548 wrote to memory of 372 1548 {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe 97 PID 1548 wrote to memory of 372 1548 {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe 97 PID 1548 wrote to memory of 372 1548 {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe 97 PID 1548 wrote to memory of 976 1548 {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe 98 PID 1548 wrote to memory of 976 1548 {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe 98 PID 1548 wrote to memory of 976 1548 {93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe 98 PID 372 wrote to memory of 4436 372 {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe 102 PID 372 wrote to memory of 4436 372 {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe 102 PID 372 wrote to memory of 4436 372 {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe 102 PID 372 wrote to memory of 4652 372 {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe 103 PID 372 wrote to memory of 4652 372 {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe 103 PID 372 wrote to memory of 4652 372 {EDA342C7-2DE1-4b59-9446-3661EF560336}.exe 103 PID 4436 wrote to memory of 636 4436 {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe 104 PID 4436 wrote to memory of 636 4436 {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe 104 PID 4436 wrote to memory of 636 4436 {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe 104 PID 4436 wrote to memory of 820 4436 {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe 105 PID 4436 wrote to memory of 820 4436 {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe 105 PID 4436 wrote to memory of 820 4436 {7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe 105 PID 636 wrote to memory of 5060 636 {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe 106 PID 636 wrote to memory of 5060 636 {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe 106 PID 636 wrote to memory of 5060 636 {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe 106 PID 636 wrote to memory of 680 636 {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe 107 PID 636 wrote to memory of 680 636 {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe 107 PID 636 wrote to memory of 680 636 {D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe 107 PID 5060 wrote to memory of 2848 5060 {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe 109 PID 5060 wrote to memory of 2848 5060 {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe 109 PID 5060 wrote to memory of 2848 5060 {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe 109 PID 5060 wrote to memory of 4160 5060 {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe 110 PID 5060 wrote to memory of 4160 5060 {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe 110 PID 5060 wrote to memory of 4160 5060 {CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe 110 PID 2848 wrote to memory of 4812 2848 {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe 111 PID 2848 wrote to memory of 4812 2848 {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe 111 PID 2848 wrote to memory of 4812 2848 {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe 111 PID 2848 wrote to memory of 1608 2848 {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe 112 PID 2848 wrote to memory of 1608 2848 {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe 112 PID 2848 wrote to memory of 1608 2848 {465BDA2C-820E-41db-A25A-40CE2D138E60}.exe 112 PID 4812 wrote to memory of 4240 4812 {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe 113 PID 4812 wrote to memory of 4240 4812 {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe 113 PID 4812 wrote to memory of 4240 4812 {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe 113 PID 4812 wrote to memory of 848 4812 {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe 114 PID 4812 wrote to memory of 848 4812 {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe 114 PID 4812 wrote to memory of 848 4812 {BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe 114 PID 4240 wrote to memory of 3152 4240 {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe 122 PID 4240 wrote to memory of 3152 4240 {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe 122 PID 4240 wrote to memory of 3152 4240 {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe 122 PID 4240 wrote to memory of 2504 4240 {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe 123 PID 4240 wrote to memory of 2504 4240 {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe 123 PID 4240 wrote to memory of 2504 4240 {2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\64de30bfe3019e6bff78885e7c62f090N.exe"C:\Users\Admin\AppData\Local\Temp\64de30bfe3019e6bff78885e7c62f090N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\{93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exeC:\Windows\{93D9C800-6BB3-4c97-A988-183AAD1E45CC}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\{EDA342C7-2DE1-4b59-9446-3661EF560336}.exeC:\Windows\{EDA342C7-2DE1-4b59-9446-3661EF560336}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\{7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exeC:\Windows\{7AE094B1-3C66-4b33-AD7E-6C099942B21F}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\{D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exeC:\Windows\{D02951FE-6785-44ba-A2E8-2D83D8FC5252}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\{CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exeC:\Windows\{CBFD1952-56F9-4b80-B517-7D7234DB2AA6}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\{465BDA2C-820E-41db-A25A-40CE2D138E60}.exeC:\Windows\{465BDA2C-820E-41db-A25A-40CE2D138E60}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\{BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exeC:\Windows\{BCCF87D7-9A94-4226-B49E-E2194BB54E82}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\{2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exeC:\Windows\{2F1660AF-290C-48b6-B52D-0C6B3649DA9B}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\{75D1BBE1-1D1D-4b55-B4E2-C3F9BF94A757}.exeC:\Windows\{75D1BBE1-1D1D-4b55-B4E2-C3F9BF94A757}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2F166~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BCCF8~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{465BD~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CBFD1~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D0295~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7AE09~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EDA34~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{93D9C~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\64DE30~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5af243ac81a2252a447aacc3b93f6b225
SHA1b0831987276f4e5c37423870e5e970b08d783400
SHA2567931a15ae80ab32bd90f96311d7159c952e23c82504bab65e4a8f0c9ed27c878
SHA512a31e05a96b83ada5f43f1e9f86d173ad41375112425db7650d067790bbe47b815049388c8042cc64c8823327a5dff1c63962c69bc4fec3ae8086c6b6ac11d1dc
-
Filesize
90KB
MD5d8a235b465e6c94614a6329e501692a2
SHA1913af2e81682a63766c9ded2283a5f0ed14471bd
SHA2568a72d275a6206918d9b2fb76e4d9294158d8228b3ccbd0039663921d9ac71717
SHA512e98ae29ec2c6dd5854ac0dfbedcd8108d976eba8dab032ccc91a3547b452d9f8118bca239ba4ae906538d8ae3855448ef730bdd866bbb6ff63449894207457d9
-
Filesize
90KB
MD56d0bfa0dc5c050484d16b0a2b86bed8e
SHA1d25a8b0d621c575741c5cb0d52e4308b018b2547
SHA2560cb7cfc595c5e02bd86165b35768fa268fe2629bd06bce4a7e177dcc777f96e9
SHA512fafaffe87ba8af9f062f7fe49ba959bf8094c80eed6857bce578b925257504d32453404ab95db5a7e320b2e7f3490d86ad11ade32458a9f07a80b7255c0e8d05
-
Filesize
90KB
MD55edcdebecd86313ebb0076ea22f7c670
SHA1c5bfe77784f31bc1b03f99eb5df6a6e81f6bb2bc
SHA2562c313186044d7d48bab3c69e7d3940177f92ca9419f8041702b47d5ae3e5f1d5
SHA512cb345532abe3e143fb387a4f356c66a2e1c628cb7a90fc442b4783c2246c30f481d3219c2631f955ade5d8bfa39bab2a8a7ed8ea730af98ea172f2fe58ae6aa0
-
Filesize
90KB
MD509beca9cb0551e6659cc147c97c71d52
SHA16c72234d0ae625996a0ab8e99bea6c492bfe519a
SHA25673c033cdfad519d206d314874c45c4bf825071bf727a223fe03aea615a3125c2
SHA51281018a72d2e1187c97a9cb290e127dc1aaa01b7e0c2c077ad094b4b2665e0be49ce11f7e8775b132ceb8b29c4b02476a8b8d6e9ee520ed9f0c85d8918ea012d6
-
Filesize
90KB
MD5e3da5142deefcb4c3b66c8d523a94b3a
SHA1f715c0666fe9867276a19fcf395de91b5de04c88
SHA25639a4a9a41d87f53bf6e35aea6b06893a7c864ce54d92a3d795f5d8f52b5aed20
SHA5129a3de54c19c7e573550a8be694fe0eb29772eafcff1f1e9c1264b7fab1feb669309efb15e92212038706cd001a6e3812013c695b805d6d0da82fd4e1f396feed
-
Filesize
90KB
MD52f4a68e37d81bdf166f7873c0c8de248
SHA113cfb2a6174d74c5338dec14fa6652e125bfe095
SHA256f212425fbe59725ce09aeeb4192be4e22b0a4ca9144c81dbdddbbaa478783977
SHA5128751e9bb041ed23a7c17edf811d8845104fe853e56a8c6d0268f86209f323211560d71e12f26e06398c33057a2641a5a978cde870bc718d576f9e94d9cae454e
-
Filesize
90KB
MD5ecec42c8cafb109498d986c0fcde517d
SHA12688b19c41b1117106e63343cd4caa5305609bcf
SHA256c912b754e0a29f2b1105f6b739272556846c0e45f5d3bfeab8821ca07a082f63
SHA512660ee5bc914d44e614721663f9c3cd959f44fbc571ea1a15b829a20c108c06ccffd4d037df0f25f69bdb4505e623cc13b73221d2ce30636970b537e8acf26f49
-
Filesize
90KB
MD500c16a4c392027ef7fe43170325b953f
SHA1512b5cb062c7758742378b6cb649d29ceaedf427
SHA256fa47d456feb43bb40b7ee1b3e08e5be7edf3164e137d086f6d0a37d92a6445fe
SHA512bde9ce99c1b27b09bcd0e8a479d61671316b7826813620d4aa0127a06ac6d833befccf896a5f99db246e65aae76431c2aab05cc63eb9332bf9462776597aeb48