Analysis
-
max time kernel
118s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
97b7adea8d8abbee7a9a0fa44a69cb00N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
97b7adea8d8abbee7a9a0fa44a69cb00N.exe
Resource
win10v2004-20240802-en
General
-
Target
97b7adea8d8abbee7a9a0fa44a69cb00N.exe
-
Size
88KB
-
MD5
97b7adea8d8abbee7a9a0fa44a69cb00
-
SHA1
e0ff0a347c150a21af5c38100018709b1d73090e
-
SHA256
d7b52eae730e74cbffb61c897b6993fdd620d5464d4b69b8b0afc637b68d5aad
-
SHA512
bb78aa2cbf8b0f25887f9da14aed94b29f231653198799f8629857a2bdd25858a34431e67dcd3821adeba0d0b3b569b68f8ec237273a52ce0624cda53ad90c16
-
SSDEEP
768:5vw9816thKQLroB4/wQkNrfrunMxVFA3V:lEG/0oBlbunMxVS3V
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F45E26D7-5CF8-4079-807E-8C0E8D713A5B}\stubpath = "C:\\Windows\\{F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe" {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64} 97b7adea8d8abbee7a9a0fa44a69cb00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F45E26D7-5CF8-4079-807E-8C0E8D713A5B} {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A5CF28EB-EC67-42bc-952E-C5A76944B41E} {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}\stubpath = "C:\\Windows\\{5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe" 97b7adea8d8abbee7a9a0fa44a69cb00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6E9D6173-6827-48cb-AFFD-BA1517DD2C71} {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6E9D6173-6827-48cb-AFFD-BA1517DD2C71}\stubpath = "C:\\Windows\\{6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe" {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{88627EEC-94E6-4d2f-ABDD-518589E940F2} {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D554011-C658-428f-B4F5-73186DAE71FF} {32196161-73E7-434c-8714-556EE748781E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{18210CF7-BA22-420d-B909-0D2818593F9A} {1D554011-C658-428f-B4F5-73186DAE71FF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{65890DAB-FF58-41c2-B010-D128DAB5F5A3}\stubpath = "C:\\Windows\\{65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe" {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{88627EEC-94E6-4d2f-ABDD-518589E940F2}\stubpath = "C:\\Windows\\{88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe" {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A5CF28EB-EC67-42bc-952E-C5A76944B41E}\stubpath = "C:\\Windows\\{A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe" {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{32196161-73E7-434c-8714-556EE748781E} {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{32196161-73E7-434c-8714-556EE748781E}\stubpath = "C:\\Windows\\{32196161-73E7-434c-8714-556EE748781E}.exe" {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D554011-C658-428f-B4F5-73186DAE71FF}\stubpath = "C:\\Windows\\{1D554011-C658-428f-B4F5-73186DAE71FF}.exe" {32196161-73E7-434c-8714-556EE748781E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{18210CF7-BA22-420d-B909-0D2818593F9A}\stubpath = "C:\\Windows\\{18210CF7-BA22-420d-B909-0D2818593F9A}.exe" {1D554011-C658-428f-B4F5-73186DAE71FF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{65890DAB-FF58-41c2-B010-D128DAB5F5A3} {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe -
Executes dropped EXE 9 IoCs
pid Process 5108 {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe 4668 {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe 1212 {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe 2452 {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe 3372 {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe 4456 {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe 3112 {32196161-73E7-434c-8714-556EE748781E}.exe 2756 {1D554011-C658-428f-B4F5-73186DAE71FF}.exe 2116 {18210CF7-BA22-420d-B909-0D2818593F9A}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{32196161-73E7-434c-8714-556EE748781E}.exe {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe File created C:\Windows\{1D554011-C658-428f-B4F5-73186DAE71FF}.exe {32196161-73E7-434c-8714-556EE748781E}.exe File created C:\Windows\{18210CF7-BA22-420d-B909-0D2818593F9A}.exe {1D554011-C658-428f-B4F5-73186DAE71FF}.exe File created C:\Windows\{F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe File created C:\Windows\{65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe File created C:\Windows\{6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe File created C:\Windows\{5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe 97b7adea8d8abbee7a9a0fa44a69cb00N.exe File created C:\Windows\{88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe File created C:\Windows\{A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97b7adea8d8abbee7a9a0fa44a69cb00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {32196161-73E7-434c-8714-556EE748781E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1D554011-C658-428f-B4F5-73186DAE71FF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {18210CF7-BA22-420d-B909-0D2818593F9A}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4816 97b7adea8d8abbee7a9a0fa44a69cb00N.exe Token: SeIncBasePriorityPrivilege 5108 {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe Token: SeIncBasePriorityPrivilege 4668 {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe Token: SeIncBasePriorityPrivilege 1212 {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe Token: SeIncBasePriorityPrivilege 2452 {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe Token: SeIncBasePriorityPrivilege 3372 {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe Token: SeIncBasePriorityPrivilege 4456 {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe Token: SeIncBasePriorityPrivilege 3112 {32196161-73E7-434c-8714-556EE748781E}.exe Token: SeIncBasePriorityPrivilege 2756 {1D554011-C658-428f-B4F5-73186DAE71FF}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4816 wrote to memory of 5108 4816 97b7adea8d8abbee7a9a0fa44a69cb00N.exe 86 PID 4816 wrote to memory of 5108 4816 97b7adea8d8abbee7a9a0fa44a69cb00N.exe 86 PID 4816 wrote to memory of 5108 4816 97b7adea8d8abbee7a9a0fa44a69cb00N.exe 86 PID 4816 wrote to memory of 2040 4816 97b7adea8d8abbee7a9a0fa44a69cb00N.exe 87 PID 4816 wrote to memory of 2040 4816 97b7adea8d8abbee7a9a0fa44a69cb00N.exe 87 PID 4816 wrote to memory of 2040 4816 97b7adea8d8abbee7a9a0fa44a69cb00N.exe 87 PID 5108 wrote to memory of 4668 5108 {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe 88 PID 5108 wrote to memory of 4668 5108 {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe 88 PID 5108 wrote to memory of 4668 5108 {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe 88 PID 5108 wrote to memory of 3364 5108 {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe 89 PID 5108 wrote to memory of 3364 5108 {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe 89 PID 5108 wrote to memory of 3364 5108 {5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe 89 PID 4668 wrote to memory of 1212 4668 {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe 93 PID 4668 wrote to memory of 1212 4668 {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe 93 PID 4668 wrote to memory of 1212 4668 {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe 93 PID 4668 wrote to memory of 4128 4668 {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe 94 PID 4668 wrote to memory of 4128 4668 {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe 94 PID 4668 wrote to memory of 4128 4668 {F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe 94 PID 1212 wrote to memory of 2452 1212 {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe 95 PID 1212 wrote to memory of 2452 1212 {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe 95 PID 1212 wrote to memory of 2452 1212 {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe 95 PID 1212 wrote to memory of 4588 1212 {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe 96 PID 1212 wrote to memory of 4588 1212 {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe 96 PID 1212 wrote to memory of 4588 1212 {65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe 96 PID 2452 wrote to memory of 3372 2452 {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe 97 PID 2452 wrote to memory of 3372 2452 {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe 97 PID 2452 wrote to memory of 3372 2452 {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe 97 PID 2452 wrote to memory of 3524 2452 {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe 98 PID 2452 wrote to memory of 3524 2452 {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe 98 PID 2452 wrote to memory of 3524 2452 {6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe 98 PID 3372 wrote to memory of 4456 3372 {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe 99 PID 3372 wrote to memory of 4456 3372 {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe 99 PID 3372 wrote to memory of 4456 3372 {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe 99 PID 3372 wrote to memory of 4440 3372 {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe 100 PID 3372 wrote to memory of 4440 3372 {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe 100 PID 3372 wrote to memory of 4440 3372 {88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe 100 PID 4456 wrote to memory of 3112 4456 {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe 101 PID 4456 wrote to memory of 3112 4456 {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe 101 PID 4456 wrote to memory of 3112 4456 {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe 101 PID 4456 wrote to memory of 4492 4456 {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe 102 PID 4456 wrote to memory of 4492 4456 {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe 102 PID 4456 wrote to memory of 4492 4456 {A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe 102 PID 3112 wrote to memory of 2756 3112 {32196161-73E7-434c-8714-556EE748781E}.exe 103 PID 3112 wrote to memory of 2756 3112 {32196161-73E7-434c-8714-556EE748781E}.exe 103 PID 3112 wrote to memory of 2756 3112 {32196161-73E7-434c-8714-556EE748781E}.exe 103 PID 3112 wrote to memory of 4828 3112 {32196161-73E7-434c-8714-556EE748781E}.exe 104 PID 3112 wrote to memory of 4828 3112 {32196161-73E7-434c-8714-556EE748781E}.exe 104 PID 3112 wrote to memory of 4828 3112 {32196161-73E7-434c-8714-556EE748781E}.exe 104 PID 2756 wrote to memory of 2116 2756 {1D554011-C658-428f-B4F5-73186DAE71FF}.exe 105 PID 2756 wrote to memory of 2116 2756 {1D554011-C658-428f-B4F5-73186DAE71FF}.exe 105 PID 2756 wrote to memory of 2116 2756 {1D554011-C658-428f-B4F5-73186DAE71FF}.exe 105 PID 2756 wrote to memory of 4548 2756 {1D554011-C658-428f-B4F5-73186DAE71FF}.exe 106 PID 2756 wrote to memory of 4548 2756 {1D554011-C658-428f-B4F5-73186DAE71FF}.exe 106 PID 2756 wrote to memory of 4548 2756 {1D554011-C658-428f-B4F5-73186DAE71FF}.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\97b7adea8d8abbee7a9a0fa44a69cb00N.exe"C:\Users\Admin\AppData\Local\Temp\97b7adea8d8abbee7a9a0fa44a69cb00N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\{5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exeC:\Windows\{5DA85F37-6A2E-4e7d-8BBF-3FEA4F984E64}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\{F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exeC:\Windows\{F45E26D7-5CF8-4079-807E-8C0E8D713A5B}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\{65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exeC:\Windows\{65890DAB-FF58-41c2-B010-D128DAB5F5A3}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\{6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exeC:\Windows\{6E9D6173-6827-48cb-AFFD-BA1517DD2C71}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\{88627EEC-94E6-4d2f-ABDD-518589E940F2}.exeC:\Windows\{88627EEC-94E6-4d2f-ABDD-518589E940F2}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\{A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exeC:\Windows\{A5CF28EB-EC67-42bc-952E-C5A76944B41E}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\{32196161-73E7-434c-8714-556EE748781E}.exeC:\Windows\{32196161-73E7-434c-8714-556EE748781E}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\{1D554011-C658-428f-B4F5-73186DAE71FF}.exeC:\Windows\{1D554011-C658-428f-B4F5-73186DAE71FF}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\{18210CF7-BA22-420d-B909-0D2818593F9A}.exeC:\Windows\{18210CF7-BA22-420d-B909-0D2818593F9A}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1D554~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{32196~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A5CF2~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{88627~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E9D6~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{65890~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F45E2~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5DA85~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\97B7AD~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD59f0b761bc625c560adaac97fe6e2f8b9
SHA128fa9c1c3f5f1cf4f7f75721547bf0e70b2aa3f1
SHA256344e0ae93b08865d220faecf3d0d8fc15dcf26176e97a3339bd84f69f6f4e1c4
SHA5126f485a6d994e0a501a2dc4a065ac35026cc429a407702dce6b7c65a027151bae9cd0f618988f577c37545866d6a05c7a3048689a66db3ea5ac74f6acb7280e2f
-
Filesize
88KB
MD551010e0a6decd9f71d1d23ba2359bd5a
SHA1cae6a0b23ccae42b9ae6cb061d63dc68875c1fb4
SHA2567bdcc1dd8c6d21365ccc94d4378ec3c39eab6fef716b363d44fc1c65fc941432
SHA512a4a4a489e0356eabbffa3cef3925575c4916d2422803f7c42284be1d21647cafedb4c4d12b576feb6781c876b35ae2c17e760eb05667566a37c3a4c699442267
-
Filesize
88KB
MD5be1d1b19b3ee5ef29f5f881f976db5f7
SHA1a0a81c99ad224e77bc3a077db78f32afc70a403f
SHA256bb264fead863db70201bdbea10571cbc632163eb8db9fbf138de7d5e7da13e0f
SHA5122f4c6f2af03aa07f0535c3ee086febb7ba387a357089d2828069cf4bc5c4a45ceda9db02f3e8319475f231c497419b33b17d32e90279cd224251cb71ba91bc4c
-
Filesize
88KB
MD524264ce90878823a2a64de2a15ea121d
SHA17ab3be1f84c67664e3c0b63dd51114d22bcb8850
SHA25653b5d64a1fba0679f4c5e841fafc3169d51cd67900e31fb0600b4b016a98d052
SHA512aa022704b55a22eee69a38bea9f8537ae251fa51a9480735ef5d28e35c4bfaa01c23dedc94b019216a14e39a3480d3cde261e25ba135eb73967438c58ef6f246
-
Filesize
88KB
MD59a4339f5f48852df9863e30fe6ba2822
SHA16f74037cf0b7f8e422e2abdfa2bb42bd7bd589e5
SHA256e7a93330985127d0e221afc03aed9c1363d69109f033b1051769e146fa670e00
SHA512e3c0a301acac54d22e7196a88a68662720c422e6378a8f6599d503688321ff88df67ff1059c833ec020cedd2cfa5b153f17e2ccd823fd0c8638678c468c9459f
-
Filesize
88KB
MD5a5291685db759f3cfdbc5752c18cead3
SHA1b2f1e690df02635b8ef21fba0d871372860e2836
SHA2565ba150c09b91858b1fb7ca7c922f4e484d99f806db1a2e85e8c6bc7c77955700
SHA512b89e829e77a259a68475b055b2268c87bed1d47dff9e567204597a86049ccf55666d4e88f59d199ece63697c74049b3efebc23175a05d18633db6fd0b5613631
-
Filesize
88KB
MD50447bf91695a394036c917f173593aeb
SHA1286e11055db3d97567d3776ef62685492ac25d8a
SHA256f4611cb9f02863bf304da3ce9788c26b2c5740fb5fccdaa1c67d4cbf1d06cdc0
SHA512d2a28800751ddd11199f33e31242d2e190ebd0b01b10f5a27eb3cd223750065f744a91982a79ef91aa70fa7a064e74f023c8a5a3e7833a9cd4986706c36dd43a
-
Filesize
88KB
MD5eab66eac0652c8084d4fe78abaf1f366
SHA138bc1610aed21bcb3951d430313c66ce26b38af6
SHA256ae4c132b4b4bea2581c699d6eb7783d1ca43a0f0785b5bba61a6915a7053cd20
SHA512eac52708f31edd9bf1fb0ab46a5b164f3a1ed07f9c2de3f22b6933ed8a1e89995f4cd3fb8992c75a5498d676306959aa5eb80400fbd2d9357531bef1dbd44037
-
Filesize
88KB
MD5d516b4877e66d58300cf2e8f8bfce4ba
SHA17dc7935a2241ef185c3627653a8d87670666f22e
SHA256e43d37c24f15bf5233026309b49e78545518714d28e479a1c2f5f877c2513307
SHA51226f1186dc1a3953262846ba3aa54ab8266cfb6640ab918dadd7a4ab1d14d845b17de78e4b4a70c9bbe749ff0679d238ef0da8c20fad116a9916b9eae075b1135