Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe
Resource
win10v2004-20240709-en
General
-
Target
c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe
-
Size
168KB
-
MD5
95074c10bc3a8f961a7ee9c8d9de603b
-
SHA1
700bb0790ebde7295596377bbff4419897d2d8d7
-
SHA256
c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061
-
SHA512
52c0b8fbc896432a925a979b101bd8ba9d9d607b7670874518e200cd5e61ade80a9e57d344fa5934b0c98459f10021c7d75154f69efa168e80a09a3ef622e9f8
-
SSDEEP
1536:1EGh0oDlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oDlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}\stubpath = "C:\\Windows\\{390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe" {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1466F107-3FE1-4a07-9F9D-5395D5100A55} {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{557E36C1-4868-4b3a-BA37-F83BF93E41DA}\stubpath = "C:\\Windows\\{557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe" {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBCE894E-1AFE-42d3-9D49-00010DBC8706} {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBCE894E-1AFE-42d3-9D49-00010DBC8706}\stubpath = "C:\\Windows\\{BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe" {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1106C43-6E5A-4d92-BE18-3F09523E68CB}\stubpath = "C:\\Windows\\{B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe" {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F951E3F-9215-4a79-89F6-577E56D84AE9} {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F951E3F-9215-4a79-89F6-577E56D84AE9}\stubpath = "C:\\Windows\\{6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe" {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{444D9DA9-02FA-4c44-B010-C97A635E011D}\stubpath = "C:\\Windows\\{444D9DA9-02FA-4c44-B010-C97A635E011D}.exe" {7F5EFC64-319C-47e6-AEB2-B0E9EA201101}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BA08C432-E6F5-43c0-98D1-A809069C97FE} c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{50DC5AA3-B0BE-42dd-A237-B88ACE403B1E} {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}\stubpath = "C:\\Windows\\{50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe" {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1466F107-3FE1-4a07-9F9D-5395D5100A55}\stubpath = "C:\\Windows\\{1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe" {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{116920F9-B2FA-481f-B2A6-BB65048E7788}\stubpath = "C:\\Windows\\{116920F9-B2FA-481f-B2A6-BB65048E7788}.exe" {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{557E36C1-4868-4b3a-BA37-F83BF93E41DA} {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7F5EFC64-319C-47e6-AEB2-B0E9EA201101} {BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7F5EFC64-319C-47e6-AEB2-B0E9EA201101}\stubpath = "C:\\Windows\\{7F5EFC64-319C-47e6-AEB2-B0E9EA201101}.exe" {BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1106C43-6E5A-4d92-BE18-3F09523E68CB} {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{76D096B5-48D6-43fb-A75F-4D57BECC96B7} {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{76D096B5-48D6-43fb-A75F-4D57BECC96B7}\stubpath = "C:\\Windows\\{76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe" {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{444D9DA9-02FA-4c44-B010-C97A635E011D} {7F5EFC64-319C-47e6-AEB2-B0E9EA201101}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BA08C432-E6F5-43c0-98D1-A809069C97FE}\stubpath = "C:\\Windows\\{BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe" c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F} {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{116920F9-B2FA-481f-B2A6-BB65048E7788} {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe -
Executes dropped EXE 12 IoCs
pid Process 464 {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe 4736 {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe 5108 {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe 3844 {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe 4156 {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe 4624 {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe 1764 {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe 2912 {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe 4160 {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe 4600 {BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe 960 {7F5EFC64-319C-47e6-AEB2-B0E9EA201101}.exe 1584 {444D9DA9-02FA-4c44-B010-C97A635E011D}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe File created C:\Windows\{BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe File created C:\Windows\{7F5EFC64-319C-47e6-AEB2-B0E9EA201101}.exe {BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe File created C:\Windows\{B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe File created C:\Windows\{6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe File created C:\Windows\{390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe File created C:\Windows\{557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe File created C:\Windows\{50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe File created C:\Windows\{444D9DA9-02FA-4c44-B010-C97A635E011D}.exe {7F5EFC64-319C-47e6-AEB2-B0E9EA201101}.exe File created C:\Windows\{BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe File created C:\Windows\{76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe File created C:\Windows\{116920F9-B2FA-481f-B2A6-BB65048E7788}.exe {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7F5EFC64-319C-47e6-AEB2-B0E9EA201101}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {444D9DA9-02FA-4c44-B010-C97A635E011D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2772 c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe Token: SeIncBasePriorityPrivilege 464 {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe Token: SeIncBasePriorityPrivilege 4736 {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe Token: SeIncBasePriorityPrivilege 5108 {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe Token: SeIncBasePriorityPrivilege 3844 {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe Token: SeIncBasePriorityPrivilege 4156 {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe Token: SeIncBasePriorityPrivilege 4624 {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe Token: SeIncBasePriorityPrivilege 1764 {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe Token: SeIncBasePriorityPrivilege 2912 {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe Token: SeIncBasePriorityPrivilege 4160 {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe Token: SeIncBasePriorityPrivilege 4600 {BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe Token: SeIncBasePriorityPrivilege 960 {7F5EFC64-319C-47e6-AEB2-B0E9EA201101}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2772 wrote to memory of 464 2772 c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe 96 PID 2772 wrote to memory of 464 2772 c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe 96 PID 2772 wrote to memory of 464 2772 c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe 96 PID 2772 wrote to memory of 4604 2772 c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe 97 PID 2772 wrote to memory of 4604 2772 c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe 97 PID 2772 wrote to memory of 4604 2772 c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe 97 PID 464 wrote to memory of 4736 464 {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe 98 PID 464 wrote to memory of 4736 464 {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe 98 PID 464 wrote to memory of 4736 464 {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe 98 PID 464 wrote to memory of 1456 464 {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe 99 PID 464 wrote to memory of 1456 464 {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe 99 PID 464 wrote to memory of 1456 464 {BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe 99 PID 4736 wrote to memory of 5108 4736 {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe 105 PID 4736 wrote to memory of 5108 4736 {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe 105 PID 4736 wrote to memory of 5108 4736 {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe 105 PID 4736 wrote to memory of 1780 4736 {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe 106 PID 4736 wrote to memory of 1780 4736 {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe 106 PID 4736 wrote to memory of 1780 4736 {B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe 106 PID 5108 wrote to memory of 3844 5108 {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe 107 PID 5108 wrote to memory of 3844 5108 {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe 107 PID 5108 wrote to memory of 3844 5108 {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe 107 PID 5108 wrote to memory of 4932 5108 {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe 108 PID 5108 wrote to memory of 4932 5108 {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe 108 PID 5108 wrote to memory of 4932 5108 {76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe 108 PID 3844 wrote to memory of 4156 3844 {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe 109 PID 3844 wrote to memory of 4156 3844 {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe 109 PID 3844 wrote to memory of 4156 3844 {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe 109 PID 3844 wrote to memory of 5076 3844 {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe 110 PID 3844 wrote to memory of 5076 3844 {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe 110 PID 3844 wrote to memory of 5076 3844 {6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe 110 PID 4156 wrote to memory of 4624 4156 {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe 111 PID 4156 wrote to memory of 4624 4156 {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe 111 PID 4156 wrote to memory of 4624 4156 {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe 111 PID 4156 wrote to memory of 1208 4156 {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe 112 PID 4156 wrote to memory of 1208 4156 {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe 112 PID 4156 wrote to memory of 1208 4156 {390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe 112 PID 4624 wrote to memory of 1764 4624 {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe 117 PID 4624 wrote to memory of 1764 4624 {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe 117 PID 4624 wrote to memory of 1764 4624 {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe 117 PID 4624 wrote to memory of 1728 4624 {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe 118 PID 4624 wrote to memory of 1728 4624 {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe 118 PID 4624 wrote to memory of 1728 4624 {1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe 118 PID 1764 wrote to memory of 2912 1764 {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe 119 PID 1764 wrote to memory of 2912 1764 {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe 119 PID 1764 wrote to memory of 2912 1764 {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe 119 PID 1764 wrote to memory of 4896 1764 {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe 120 PID 1764 wrote to memory of 4896 1764 {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe 120 PID 1764 wrote to memory of 4896 1764 {116920F9-B2FA-481f-B2A6-BB65048E7788}.exe 120 PID 2912 wrote to memory of 4160 2912 {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe 122 PID 2912 wrote to memory of 4160 2912 {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe 122 PID 2912 wrote to memory of 4160 2912 {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe 122 PID 2912 wrote to memory of 5052 2912 {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe 123 PID 2912 wrote to memory of 5052 2912 {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe 123 PID 2912 wrote to memory of 5052 2912 {557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe 123 PID 4160 wrote to memory of 4600 4160 {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe 124 PID 4160 wrote to memory of 4600 4160 {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe 124 PID 4160 wrote to memory of 4600 4160 {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe 124 PID 4160 wrote to memory of 1048 4160 {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe 125 PID 4160 wrote to memory of 1048 4160 {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe 125 PID 4160 wrote to memory of 1048 4160 {50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe 125 PID 4600 wrote to memory of 960 4600 {BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe 126 PID 4600 wrote to memory of 960 4600 {BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe 126 PID 4600 wrote to memory of 960 4600 {BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe 126 PID 4600 wrote to memory of 3840 4600 {BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe"C:\Users\Admin\AppData\Local\Temp\c7a01f7c4d5cca969bb4d4fef5b64af71a7ce93a6002f5c35fe2188b9fadb061.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\{BA08C432-E6F5-43c0-98D1-A809069C97FE}.exeC:\Windows\{BA08C432-E6F5-43c0-98D1-A809069C97FE}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\{B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exeC:\Windows\{B1106C43-6E5A-4d92-BE18-3F09523E68CB}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\{76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exeC:\Windows\{76D096B5-48D6-43fb-A75F-4D57BECC96B7}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\{6F951E3F-9215-4a79-89F6-577E56D84AE9}.exeC:\Windows\{6F951E3F-9215-4a79-89F6-577E56D84AE9}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\{390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exeC:\Windows\{390CFE7F-8E14-44ae-ABB0-7CE378C9FB5F}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\{1466F107-3FE1-4a07-9F9D-5395D5100A55}.exeC:\Windows\{1466F107-3FE1-4a07-9F9D-5395D5100A55}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\{116920F9-B2FA-481f-B2A6-BB65048E7788}.exeC:\Windows\{116920F9-B2FA-481f-B2A6-BB65048E7788}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\{557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exeC:\Windows\{557E36C1-4868-4b3a-BA37-F83BF93E41DA}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\{50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exeC:\Windows\{50DC5AA3-B0BE-42dd-A237-B88ACE403B1E}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\{BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exeC:\Windows\{BBCE894E-1AFE-42d3-9D49-00010DBC8706}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\{7F5EFC64-319C-47e6-AEB2-B0E9EA201101}.exeC:\Windows\{7F5EFC64-319C-47e6-AEB2-B0E9EA201101}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\Windows\{444D9DA9-02FA-4c44-B010-C97A635E011D}.exeC:\Windows\{444D9DA9-02FA-4c44-B010-C97A635E011D}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7F5EF~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BBCE8~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:3840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{50DC5~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{557E3~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11692~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1466F~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{390CF~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6F951~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:5076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{76D09~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1106~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BA08C~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\C7A01F~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5b7664b09367e3ca82fd0a24a4496e6b9
SHA1a3b3d80a73b954801fb54e801bae01946e3ab4f4
SHA2562e75241dbf5b1be1b8d202a05109b87e4c93a6686f6b9d95293310abc0b3059f
SHA512c6742733ab2e7cc8e9415e67436c4c75c49caed2561240ec6b3a5a09c3f5d6cfa5acff79af47cda9eaa5f34b4ac79abed116a22b7d93fd32034971541f57dfa0
-
Filesize
168KB
MD5d6d38afd5bdb9c2583a359c00378676b
SHA1015da6e51aa57539bca8015e84baf8b0b72558d9
SHA256afaad3f543c4457ea6c920ba263633c821f023bdd4fa6adf04585ebbd3589ab5
SHA512103c1b70a855feae5b512619cb21b029dc7bbf3c2fe1da5dbc9c7d796cbe39c9bc9574b847b05f4055a85851cc7b029ff3ab4f667c2c9cb38dd272f43c45229e
-
Filesize
168KB
MD5e96a2cddcd8888e36a312efe7511625a
SHA1c90e9c1660c84db778b967a96ebb00f06b22e62c
SHA25654c742aaa9c3545010402d1c0aeb42e88c07bba9d0204d186de4d3ebe03820ad
SHA5122aba567c1f40b27e69cf60da554eece0517352290ea1ffc3a015daa01709235b4e04a289a29c29b41fa919c9983342fe4903f668c3ad66c4fd7dc3e515dda19a
-
Filesize
168KB
MD5e93032bc626cb6cc66dffd12e6970d88
SHA158bda03f2af6aefa0ebf03ff26c82528483a07e0
SHA25663efaecb87c40196d09e61822137098a0b44622c3c956a95cfee7590a13d39dc
SHA5129b703d1eb396a7bdb96f8761bbc89572ead76f193cd00c055ff8dd14def367a2d14dede212ff057ededde2656c5c049b3aac0f91dfc3392233d5da351424810a
-
Filesize
168KB
MD51ceffc6087b331ca74418fb71ef4a833
SHA138dbf8b4198b7886ab5ecfb34e0822e45d495578
SHA256148424df4fbb222b5d47eaa995b754fc35c0615d2c5febda3f95e82193c9bb83
SHA512fef73782b108522cf19083d84a6618731d57beee912dfff473062e4c00f22b3811d3b5dd81e807d1436b3f312da0dc68eb820d6711075e92c657ebd31164675c
-
Filesize
168KB
MD5f6994ceb638db4d087b90dd5ac7b09ff
SHA19d799dd944fd1353f03acb2cc674555574580836
SHA256ccd8644558800d106217e4cbd3bbad133a006d5c7278754791cdcb355143e974
SHA512a3c3c3853b5c830f75267d720259506edf5ed18d8f7fd3936f2a36e9ac54c6376cd27fcca4f3f1c9c356a447569583214e56dc4ca3b97b91cf81c792018e9211
-
Filesize
168KB
MD595a3252dd36646396258d152c5f21265
SHA13e2dad78ac90e6375b93cf1fdc28fd9973d6eca4
SHA256e59144b2f94a5dd4e743eee129b175e35e41ba024e805569e2b030678592bfe0
SHA51254516059a85256b1f7205b8a14f197d095bf04bae02e45d1c234aa4988b0224072a0ca9eb8662b60ea9e9e0536a0921e37236304463923a10f0290abf366a010
-
Filesize
168KB
MD59733a99c99b81b3be2def6f837430cc1
SHA1a55bdf10c0b6c9c8a934aec0e83e13591217d0e6
SHA2561017746b1137a9f629c73d02cb843ebd63a627b7985bfcd7a5510b835da0ddee
SHA51289b4a6e1a33e827f5f63d586fd5f9c0fc84b627d75456bdcb7ceac4747919d3cc4de9158b530e1a3a8772323724bd7251a18a0cd2528db5fba16133920524033
-
Filesize
168KB
MD56374ecb5cd06d9edb19c0a55476e59c1
SHA160e2b0bcd4a71a5f416aa69a44754d65340846b4
SHA256c9aea5743d9509d5ebbc967fb242cb80523de912380a14279c4baf1b24b5d3c0
SHA51279b8cd94c6118558b1e07a798c87f845c280ce006d531391f9c4e4d61feb9cc9e8ac0e437443a439576b56c20009a77d5f4e14f5cddee4449195446ab28358a4
-
Filesize
168KB
MD59250687898c4b952337d75d777c60876
SHA1425ec379b5e722120a1b6b8ecd2738d559f1e7c8
SHA2560a3c6ae6b3558f101b9e25e4ba0ed61d1a6a5d0ed71caccad28dc9d6d597b17c
SHA5120a1d8a2ed5f0f366dc39f4c4eb53fbaa205c00b30663ba3050f8925f82d9ff2dcfbdb3b4a192a1537e79da153f6953b29914c555d72dfff4d4d46455f4dde061
-
Filesize
168KB
MD59cc800276218c616fc6775fff71624a4
SHA1d52df5f699a15a6aeb87a09971a7191da15cd6ef
SHA256fcfd37d0030fa23cea91ae14c85630d60a481d4264a33b4d951332a8d75380bb
SHA5124004fcfb9625e6c376b1b4a517c3b8e6113bb7e21d31040276047e6f61fc3f1e4a8558db7a941b228b620aff56429885cca2388739ec7db2934c92813650837e
-
Filesize
168KB
MD5c0e83cc844208e42073491a5d50c898c
SHA1bacfc14059d5ebc5485caa0dbd1098c8f26cf4bf
SHA2563af4e4ef10764dafc3a7cd7e7495799b444b1b8ab0242dc6e1eabcf9429e9292
SHA512c7634c8e1a3bcb18903a6df2f5f2470815858f3d0685d57d22684074e4bf8e6cbf6eff1ffd69430ad1b43d5918bd9f8308f5bb396ef2e73cf0fbda633ded5aef