Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe
Resource
win10v2004-20240802-en
General
-
Target
92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe
-
Size
80KB
-
MD5
f31ce28c80ba0a9c9e2134dc93b853d6
-
SHA1
e368fb95e9c0ee10d9dcebde39a86e47c94a50e8
-
SHA256
92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844
-
SHA512
f540cd3f52c2e1253585f9e625655d051fe78bca257abd946af9d273435d3c14163f37d6f8acd2677f0a2eb61b7bf9838b318874368f83edb183eb2c1b84af5e
-
SSDEEP
384:vbLwOs8AHsc4sMfwhKQLroT4/CFsrdOI1Nb7g7FX7XYfruVDtM9tQ/FKlnVwUUOV:vvw9816vhKQLroT4/wQRNrfrunMxVFAi
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}\stubpath = "C:\\Windows\\{FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe" 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6DE5EE12-B518-49de-9CFE-99E2E899F6E3}\stubpath = "C:\\Windows\\{6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe" {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}\stubpath = "C:\\Windows\\{4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}.exe" {C904F271-7D74-4986-9378-D15CDB5AC332}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F963250A-58FE-4448-818B-CDC88AA1909A} {4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBCE9252-B028-4a1e-A12C-14EF5AE3BC03} 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B434D6FD-326C-4c7d-AE40-15E238C8ADAF} {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8EF132C-F2B2-4f2c-9625-E83373594FDB} {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8EF132C-F2B2-4f2c-9625-E83373594FDB}\stubpath = "C:\\Windows\\{A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe" {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F963250A-58FE-4448-818B-CDC88AA1909A}\stubpath = "C:\\Windows\\{F963250A-58FE-4448-818B-CDC88AA1909A}.exe" {4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}\stubpath = "C:\\Windows\\{6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}.exe" {F963250A-58FE-4448-818B-CDC88AA1909A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FF5CB2F-5874-439a-9ADA-ADEEA2CB96EA}\stubpath = "C:\\Windows\\{9FF5CB2F-5874-439a-9ADA-ADEEA2CB96EA}.exe" {6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6DE5EE12-B518-49de-9CFE-99E2E899F6E3} {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}\stubpath = "C:\\Windows\\{B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe" {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7} {C904F271-7D74-4986-9378-D15CDB5AC332}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FF5CB2F-5874-439a-9ADA-ADEEA2CB96EA} {6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B434D6FD-326C-4c7d-AE40-15E238C8ADAF}\stubpath = "C:\\Windows\\{B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe" {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8BB55F9B-FFEA-4413-9782-D38F90289531} {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8BB55F9B-FFEA-4413-9782-D38F90289531}\stubpath = "C:\\Windows\\{8BB55F9B-FFEA-4413-9782-D38F90289531}.exe" {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F} {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C904F271-7D74-4986-9378-D15CDB5AC332} {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C904F271-7D74-4986-9378-D15CDB5AC332}\stubpath = "C:\\Windows\\{C904F271-7D74-4986-9378-D15CDB5AC332}.exe" {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F2809FE-3D7C-4e47-92EE-1742A4E8DF82} {F963250A-58FE-4448-818B-CDC88AA1909A}.exe -
Deletes itself 1 IoCs
pid Process 2316 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2464 {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe 804 {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe 2784 {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe 2696 {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe 2952 {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe 1940 {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe 1564 {C904F271-7D74-4986-9378-D15CDB5AC332}.exe 1104 {4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}.exe 976 {F963250A-58FE-4448-818B-CDC88AA1909A}.exe 3064 {6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}.exe 1428 {9FF5CB2F-5874-439a-9ADA-ADEEA2CB96EA}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}.exe {F963250A-58FE-4448-818B-CDC88AA1909A}.exe File created C:\Windows\{8BB55F9B-FFEA-4413-9782-D38F90289531}.exe {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe File created C:\Windows\{B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe File created C:\Windows\{C904F271-7D74-4986-9378-D15CDB5AC332}.exe {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe File created C:\Windows\{A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe File created C:\Windows\{4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}.exe {C904F271-7D74-4986-9378-D15CDB5AC332}.exe File created C:\Windows\{F963250A-58FE-4448-818B-CDC88AA1909A}.exe {4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}.exe File created C:\Windows\{9FF5CB2F-5874-439a-9ADA-ADEEA2CB96EA}.exe {6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}.exe File created C:\Windows\{FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe File created C:\Windows\{6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe File created C:\Windows\{B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C904F271-7D74-4986-9378-D15CDB5AC332}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F963250A-58FE-4448-818B-CDC88AA1909A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9FF5CB2F-5874-439a-9ADA-ADEEA2CB96EA}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2068 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe Token: SeIncBasePriorityPrivilege 2464 {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe Token: SeIncBasePriorityPrivilege 804 {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe Token: SeIncBasePriorityPrivilege 2784 {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe Token: SeIncBasePriorityPrivilege 2696 {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe Token: SeIncBasePriorityPrivilege 2952 {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe Token: SeIncBasePriorityPrivilege 1940 {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe Token: SeIncBasePriorityPrivilege 1564 {C904F271-7D74-4986-9378-D15CDB5AC332}.exe Token: SeIncBasePriorityPrivilege 1104 {4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}.exe Token: SeIncBasePriorityPrivilege 976 {F963250A-58FE-4448-818B-CDC88AA1909A}.exe Token: SeIncBasePriorityPrivilege 3064 {6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2464 2068 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe 31 PID 2068 wrote to memory of 2464 2068 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe 31 PID 2068 wrote to memory of 2464 2068 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe 31 PID 2068 wrote to memory of 2464 2068 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe 31 PID 2068 wrote to memory of 2316 2068 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe 32 PID 2068 wrote to memory of 2316 2068 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe 32 PID 2068 wrote to memory of 2316 2068 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe 32 PID 2068 wrote to memory of 2316 2068 92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe 32 PID 2464 wrote to memory of 804 2464 {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe 33 PID 2464 wrote to memory of 804 2464 {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe 33 PID 2464 wrote to memory of 804 2464 {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe 33 PID 2464 wrote to memory of 804 2464 {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe 33 PID 2464 wrote to memory of 2740 2464 {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe 34 PID 2464 wrote to memory of 2740 2464 {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe 34 PID 2464 wrote to memory of 2740 2464 {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe 34 PID 2464 wrote to memory of 2740 2464 {FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe 34 PID 804 wrote to memory of 2784 804 {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe 35 PID 804 wrote to memory of 2784 804 {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe 35 PID 804 wrote to memory of 2784 804 {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe 35 PID 804 wrote to memory of 2784 804 {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe 35 PID 804 wrote to memory of 2708 804 {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe 36 PID 804 wrote to memory of 2708 804 {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe 36 PID 804 wrote to memory of 2708 804 {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe 36 PID 804 wrote to memory of 2708 804 {6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe 36 PID 2784 wrote to memory of 2696 2784 {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe 37 PID 2784 wrote to memory of 2696 2784 {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe 37 PID 2784 wrote to memory of 2696 2784 {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe 37 PID 2784 wrote to memory of 2696 2784 {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe 37 PID 2784 wrote to memory of 2704 2784 {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe 38 PID 2784 wrote to memory of 2704 2784 {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe 38 PID 2784 wrote to memory of 2704 2784 {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe 38 PID 2784 wrote to memory of 2704 2784 {B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe 38 PID 2696 wrote to memory of 2952 2696 {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe 39 PID 2696 wrote to memory of 2952 2696 {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe 39 PID 2696 wrote to memory of 2952 2696 {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe 39 PID 2696 wrote to memory of 2952 2696 {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe 39 PID 2696 wrote to memory of 1012 2696 {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe 40 PID 2696 wrote to memory of 1012 2696 {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe 40 PID 2696 wrote to memory of 1012 2696 {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe 40 PID 2696 wrote to memory of 1012 2696 {8BB55F9B-FFEA-4413-9782-D38F90289531}.exe 40 PID 2952 wrote to memory of 1940 2952 {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe 41 PID 2952 wrote to memory of 1940 2952 {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe 41 PID 2952 wrote to memory of 1940 2952 {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe 41 PID 2952 wrote to memory of 1940 2952 {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe 41 PID 2952 wrote to memory of 2476 2952 {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe 42 PID 2952 wrote to memory of 2476 2952 {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe 42 PID 2952 wrote to memory of 2476 2952 {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe 42 PID 2952 wrote to memory of 2476 2952 {B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe 42 PID 1940 wrote to memory of 1564 1940 {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe 43 PID 1940 wrote to memory of 1564 1940 {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe 43 PID 1940 wrote to memory of 1564 1940 {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe 43 PID 1940 wrote to memory of 1564 1940 {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe 43 PID 1940 wrote to memory of 1876 1940 {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe 44 PID 1940 wrote to memory of 1876 1940 {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe 44 PID 1940 wrote to memory of 1876 1940 {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe 44 PID 1940 wrote to memory of 1876 1940 {A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe 44 PID 1564 wrote to memory of 1104 1564 {C904F271-7D74-4986-9378-D15CDB5AC332}.exe 45 PID 1564 wrote to memory of 1104 1564 {C904F271-7D74-4986-9378-D15CDB5AC332}.exe 45 PID 1564 wrote to memory of 1104 1564 {C904F271-7D74-4986-9378-D15CDB5AC332}.exe 45 PID 1564 wrote to memory of 1104 1564 {C904F271-7D74-4986-9378-D15CDB5AC332}.exe 45 PID 1564 wrote to memory of 1840 1564 {C904F271-7D74-4986-9378-D15CDB5AC332}.exe 46 PID 1564 wrote to memory of 1840 1564 {C904F271-7D74-4986-9378-D15CDB5AC332}.exe 46 PID 1564 wrote to memory of 1840 1564 {C904F271-7D74-4986-9378-D15CDB5AC332}.exe 46 PID 1564 wrote to memory of 1840 1564 {C904F271-7D74-4986-9378-D15CDB5AC332}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe"C:\Users\Admin\AppData\Local\Temp\92df5546dab16c11370bc26d62fffad8d1cac74e9be00ea4a853b0c00cf7f844.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\{FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exeC:\Windows\{FBCE9252-B028-4a1e-A12C-14EF5AE3BC03}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\{6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exeC:\Windows\{6DE5EE12-B518-49de-9CFE-99E2E899F6E3}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\{B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exeC:\Windows\{B434D6FD-326C-4c7d-AE40-15E238C8ADAF}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\{8BB55F9B-FFEA-4413-9782-D38F90289531}.exeC:\Windows\{8BB55F9B-FFEA-4413-9782-D38F90289531}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\{B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exeC:\Windows\{B5A4A9EC-8BFC-4eef-9DF1-8BBF9EB1802F}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\{A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exeC:\Windows\{A8EF132C-F2B2-4f2c-9625-E83373594FDB}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\{C904F271-7D74-4986-9378-D15CDB5AC332}.exeC:\Windows\{C904F271-7D74-4986-9378-D15CDB5AC332}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\{4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}.exeC:\Windows\{4CBE5EBB-CFEA-4334-A8E6-FCD86313A4F7}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\{F963250A-58FE-4448-818B-CDC88AA1909A}.exeC:\Windows\{F963250A-58FE-4448-818B-CDC88AA1909A}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:976 -
C:\Windows\{6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}.exeC:\Windows\{6F2809FE-3D7C-4e47-92EE-1742A4E8DF82}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Windows\{9FF5CB2F-5874-439a-9ADA-ADEEA2CB96EA}.exeC:\Windows\{9FF5CB2F-5874-439a-9ADA-ADEEA2CB96EA}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6F280~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9632~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4CBE5~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C904F~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8EF1~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5A4A~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8BB55~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B434D~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6DE5E~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FBCE9~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\92DF55~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD513644aa60692a0e459340988d711da3e
SHA107d29da7f84c1c51830504d94537a25a92341532
SHA256f186ab88209f4315257223e62ac69f56e7014e6bb7f56ee20dd332b418c81a71
SHA5126a241a7753045a47e2d124042f8fad56147082694ef674a01cd994ff06b9b1e4d67b91a6c327d51e2fbd1f2d7c86fe068679d2b86c40fdcaeb8c0e32033eac7c
-
Filesize
80KB
MD5165c234390c39683bd1e59ca591a5bce
SHA178feaf203a5f1cd7efcb8bae41d76215200412cb
SHA256678c3b0344773f20972f59aecdd5c1536eda413b2d690cbd817b08e305ce575a
SHA5122e502af8fb048a695f95a4ba40bcf6a9e744a862193ecc8f66e703fa2fe797368890fd134f5d97f464b29d0c95b528de6d9bdb662d9ed74d7a782f6f9fd31ef1
-
Filesize
80KB
MD57fbb80ffff3baa07b6391989af56fa50
SHA1c74f4df9e7c62225ed2f014d7a3d1e5f0a717fb2
SHA256cb5db50869eb9d9625e08140ef0f3f28d199f36cde57a02bd88a78ab8f63269c
SHA51286b4f461baa3dedcbf0510f2803a585c330801eafd0d624baa5477c33e22f1bc669dbd32988e59e579ba72c7cee49344819cb4f8d89575f21e894f41ad934c5e
-
Filesize
80KB
MD52e348a2bfe31422cebe74a33aca60b3c
SHA11401a74775f2f999d52787bef5d1ca7c9a5f1513
SHA256d7d968ccfd5e35200bd81c30145d61c4d3e61311017fd60a5bc81913e47e0dae
SHA512af7a2ed01eb96b7fc25af52ecdfa9288c678dbdc9267e8a7de304997a69cafd01bacdd78cf818329d44723bb8b98d986a1aa5efe4272b85321a017626423691c
-
Filesize
80KB
MD544ef3bae4247ba7fc557c2896e6f39dd
SHA15eb461fa0fadcd722ed9c7c2197fe9ed6680482f
SHA2565541cf9e73596107358a2b8ebc1eaa970af44e0a146cbf6b6fc7f73dd1aeff87
SHA51230b711809f6c3f40f78c0020992e4a5c99eb123b4ae5e30912505303e7f1e40c1ddf4e8c21af6fd2e8c54045e8ff524270966a98ab619262abaccff321a6d7e4
-
Filesize
80KB
MD589c72275033bf5e633a79cc5a95e0f8f
SHA1362a1b7bfaed783d24ca7c946e28ede6645818ad
SHA2565ec8d6c3dde9826e9e0516a48b94920d08a382e4c4b9c6d12c5e63fa737da2d6
SHA51247163c2edb8b4af2c50951cd07322cf1476d034e35b91fde1a0dcbc98c6a0d60c4e3bc9a2c071d48ea80ee27d75a3dbe0f0e7dae7c52a80e53f65b9f68698a01
-
Filesize
80KB
MD534f852a5089ce1ed6a1289d3e209aaf2
SHA1a5cf71745f649bb22837e345fe1c9459232ff04b
SHA2565dda95ac521b9010ea7a16debdd0083a2675694ba60988c7ec5ab45d93c130a4
SHA51267ef7d4894f53d99772ca52504811290a70417aefd60bb9ba30ff4f58d3092eab6dc29fa7ce6d0622f937169e3347db9d14917ca2ddb2623c9048a7c9cfbce00
-
Filesize
80KB
MD5fa7fcce0338ae139b34d102b3b089900
SHA1f86853884eb0238bb234ef85c1dedcf10fe90a8a
SHA2565cdd3c952de90da37bc2daa05accf6430128aa0475fa3f5f955575ae558b9dc9
SHA5120aa11fb9f926ad26ab748ced9e6db56f9ef0e87afd0e5637e800df23f866bafa311f14812d5c41d88be967e2b624e6472ca5152a02f57f0446b837ff19b60cd0
-
Filesize
80KB
MD51332a4a2826e2c39f4545dbca1d6ffc2
SHA1a8597e3dbe6eccc12d9e8e3a62b72a568b76afa1
SHA256999565c4b7f84759726ee73ba170f1658b229f46f8edf18abdcbd4a101d603fe
SHA512b792eb80d3041a94d6967b854065ba4612d6e2cecf916ee3ace852da57776d66adee4e320a5845a341cb801a9c620b3476e823e083fb52caa844aad0acc32b6b
-
Filesize
80KB
MD508643705e6f375b639ab2adae70e0219
SHA1752c5a640819debe25c945f218353c27b46b1cfc
SHA25626134053be303f41e24a5b7c6d0e5a4a5477066fe4c9a54696368dffa47ac796
SHA512c69dae8508aa02890604fa80d40dcb9d6801e488b9c9eb2d0edb036a2fc6525e90ad1f1d45fb40fced0f74a75e6f5b9d53e75125df6e9fda52e496c18372f762
-
Filesize
80KB
MD5bf0ba273ddc80e0c3b8c8ee17d8b6955
SHA1772ee1f953f650fa32030e7cfa02bb915d6e89e0
SHA2561462874598f13bf4d09cec99c2c7a207924c9298336c4677e354dde59e030508
SHA51275e3ede8ca92f71ff66664b46144b1ac7cc56a3de29e692e3d4c5029fd7ea762512cec9846dff1428a0cc51a832d80b5f4987cdb9fa4bac4fd15c6b75aefb2d2