Analysis
-
max time kernel
118s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 12:39
Static task
static1
Behavioral task
behavioral1
Sample
a6f982278b835b1d59ccef4dd76a18c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6f982278b835b1d59ccef4dd76a18c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
a6f982278b835b1d59ccef4dd76a18c0N.exe
-
Size
89KB
-
MD5
a6f982278b835b1d59ccef4dd76a18c0
-
SHA1
f4562acac412f5fe6dd53af865ba51d2e30222fa
-
SHA256
f62f794fe6a73f1ae52b62d1d56b5ede50f416c88e1ad82bba52cb1273d32629
-
SHA512
2f7186495986242c794c881b2e11a78bb61efd9d395416a0d2c6dd169c99e9a04520e7cf4406f17b5a15837bcc655ebb0fe948930fb79b50cc43cd5cdd5fb7a6
-
SSDEEP
768:Qvw9816vhKQLrot4/wQRNrfrunMxVFA3b7glL:YEGh0otl2unMxVS3Hg9
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8355FB2-CE73-44d1-9061-41CD4313076B}\stubpath = "C:\\Windows\\{A8355FB2-CE73-44d1-9061-41CD4313076B}.exe" {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2} {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}\stubpath = "C:\\Windows\\{0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe" {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA} {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF87967B-902A-4dc7-9973-B5EB45CC0ADD}\stubpath = "C:\\Windows\\{BF87967B-902A-4dc7-9973-B5EB45CC0ADD}.exe" {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9D0C6AD8-5609-48e9-9E39-451D652136F1}\stubpath = "C:\\Windows\\{9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe" {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}\stubpath = "C:\\Windows\\{60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe" {62752F86-E854-4a11-934F-B58A1809B08D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF87967B-902A-4dc7-9973-B5EB45CC0ADD} {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53468D78-D433-4dcf-9F00-C1387202F11C}\stubpath = "C:\\Windows\\{53468D78-D433-4dcf-9F00-C1387202F11C}.exe" a6f982278b835b1d59ccef4dd76a18c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{94A1CC5E-C7D4-419c-9865-D3580861523A}\stubpath = "C:\\Windows\\{94A1CC5E-C7D4-419c-9865-D3580861523A}.exe" {53468D78-D433-4dcf-9F00-C1387202F11C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{62752F86-E854-4a11-934F-B58A1809B08D}\stubpath = "C:\\Windows\\{62752F86-E854-4a11-934F-B58A1809B08D}.exe" {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}\stubpath = "C:\\Windows\\{3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe" {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53468D78-D433-4dcf-9F00-C1387202F11C} a6f982278b835b1d59ccef4dd76a18c0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{94A1CC5E-C7D4-419c-9865-D3580861523A} {53468D78-D433-4dcf-9F00-C1387202F11C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9D0C6AD8-5609-48e9-9E39-451D652136F1} {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8355FB2-CE73-44d1-9061-41CD4313076B} {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{62752F86-E854-4a11-934F-B58A1809B08D} {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179} {62752F86-E854-4a11-934F-B58A1809B08D}.exe -
Executes dropped EXE 9 IoCs
pid Process 3260 {53468D78-D433-4dcf-9F00-C1387202F11C}.exe 2264 {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe 2404 {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe 3240 {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe 4792 {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe 4764 {62752F86-E854-4a11-934F-B58A1809B08D}.exe 2840 {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe 4972 {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe 4108 {BF87967B-902A-4dc7-9973-B5EB45CC0ADD}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{53468D78-D433-4dcf-9F00-C1387202F11C}.exe a6f982278b835b1d59ccef4dd76a18c0N.exe File created C:\Windows\{9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe File created C:\Windows\{A8355FB2-CE73-44d1-9061-41CD4313076B}.exe {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe File created C:\Windows\{0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe File created C:\Windows\{60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe {62752F86-E854-4a11-934F-B58A1809B08D}.exe File created C:\Windows\{3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe File created C:\Windows\{94A1CC5E-C7D4-419c-9865-D3580861523A}.exe {53468D78-D433-4dcf-9F00-C1387202F11C}.exe File created C:\Windows\{62752F86-E854-4a11-934F-B58A1809B08D}.exe {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe File created C:\Windows\{BF87967B-902A-4dc7-9973-B5EB45CC0ADD}.exe {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6f982278b835b1d59ccef4dd76a18c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {53468D78-D433-4dcf-9F00-C1387202F11C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BF87967B-902A-4dc7-9973-B5EB45CC0ADD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {62752F86-E854-4a11-934F-B58A1809B08D}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3356 a6f982278b835b1d59ccef4dd76a18c0N.exe Token: SeIncBasePriorityPrivilege 3260 {53468D78-D433-4dcf-9F00-C1387202F11C}.exe Token: SeIncBasePriorityPrivilege 2264 {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe Token: SeIncBasePriorityPrivilege 2404 {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe Token: SeIncBasePriorityPrivilege 3240 {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe Token: SeIncBasePriorityPrivilege 4792 {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe Token: SeIncBasePriorityPrivilege 4764 {62752F86-E854-4a11-934F-B58A1809B08D}.exe Token: SeIncBasePriorityPrivilege 2840 {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe Token: SeIncBasePriorityPrivilege 4972 {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3356 wrote to memory of 3260 3356 a6f982278b835b1d59ccef4dd76a18c0N.exe 86 PID 3356 wrote to memory of 3260 3356 a6f982278b835b1d59ccef4dd76a18c0N.exe 86 PID 3356 wrote to memory of 3260 3356 a6f982278b835b1d59ccef4dd76a18c0N.exe 86 PID 3356 wrote to memory of 2164 3356 a6f982278b835b1d59ccef4dd76a18c0N.exe 87 PID 3356 wrote to memory of 2164 3356 a6f982278b835b1d59ccef4dd76a18c0N.exe 87 PID 3356 wrote to memory of 2164 3356 a6f982278b835b1d59ccef4dd76a18c0N.exe 87 PID 3260 wrote to memory of 2264 3260 {53468D78-D433-4dcf-9F00-C1387202F11C}.exe 88 PID 3260 wrote to memory of 2264 3260 {53468D78-D433-4dcf-9F00-C1387202F11C}.exe 88 PID 3260 wrote to memory of 2264 3260 {53468D78-D433-4dcf-9F00-C1387202F11C}.exe 88 PID 3260 wrote to memory of 3480 3260 {53468D78-D433-4dcf-9F00-C1387202F11C}.exe 89 PID 3260 wrote to memory of 3480 3260 {53468D78-D433-4dcf-9F00-C1387202F11C}.exe 89 PID 3260 wrote to memory of 3480 3260 {53468D78-D433-4dcf-9F00-C1387202F11C}.exe 89 PID 2264 wrote to memory of 2404 2264 {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe 92 PID 2264 wrote to memory of 2404 2264 {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe 92 PID 2264 wrote to memory of 2404 2264 {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe 92 PID 2264 wrote to memory of 1672 2264 {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe 93 PID 2264 wrote to memory of 1672 2264 {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe 93 PID 2264 wrote to memory of 1672 2264 {94A1CC5E-C7D4-419c-9865-D3580861523A}.exe 93 PID 2404 wrote to memory of 3240 2404 {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe 95 PID 2404 wrote to memory of 3240 2404 {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe 95 PID 2404 wrote to memory of 3240 2404 {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe 95 PID 2404 wrote to memory of 3640 2404 {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe 96 PID 2404 wrote to memory of 3640 2404 {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe 96 PID 2404 wrote to memory of 3640 2404 {9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe 96 PID 3240 wrote to memory of 4792 3240 {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe 97 PID 3240 wrote to memory of 4792 3240 {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe 97 PID 3240 wrote to memory of 4792 3240 {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe 97 PID 3240 wrote to memory of 636 3240 {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe 98 PID 3240 wrote to memory of 636 3240 {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe 98 PID 3240 wrote to memory of 636 3240 {A8355FB2-CE73-44d1-9061-41CD4313076B}.exe 98 PID 4792 wrote to memory of 4764 4792 {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe 99 PID 4792 wrote to memory of 4764 4792 {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe 99 PID 4792 wrote to memory of 4764 4792 {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe 99 PID 4792 wrote to memory of 4796 4792 {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe 100 PID 4792 wrote to memory of 4796 4792 {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe 100 PID 4792 wrote to memory of 4796 4792 {0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe 100 PID 4764 wrote to memory of 2840 4764 {62752F86-E854-4a11-934F-B58A1809B08D}.exe 101 PID 4764 wrote to memory of 2840 4764 {62752F86-E854-4a11-934F-B58A1809B08D}.exe 101 PID 4764 wrote to memory of 2840 4764 {62752F86-E854-4a11-934F-B58A1809B08D}.exe 101 PID 4764 wrote to memory of 4492 4764 {62752F86-E854-4a11-934F-B58A1809B08D}.exe 102 PID 4764 wrote to memory of 4492 4764 {62752F86-E854-4a11-934F-B58A1809B08D}.exe 102 PID 4764 wrote to memory of 4492 4764 {62752F86-E854-4a11-934F-B58A1809B08D}.exe 102 PID 2840 wrote to memory of 4972 2840 {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe 103 PID 2840 wrote to memory of 4972 2840 {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe 103 PID 2840 wrote to memory of 4972 2840 {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe 103 PID 2840 wrote to memory of 844 2840 {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe 104 PID 2840 wrote to memory of 844 2840 {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe 104 PID 2840 wrote to memory of 844 2840 {60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe 104 PID 4972 wrote to memory of 4108 4972 {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe 105 PID 4972 wrote to memory of 4108 4972 {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe 105 PID 4972 wrote to memory of 4108 4972 {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe 105 PID 4972 wrote to memory of 4656 4972 {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe 106 PID 4972 wrote to memory of 4656 4972 {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe 106 PID 4972 wrote to memory of 4656 4972 {3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6f982278b835b1d59ccef4dd76a18c0N.exe"C:\Users\Admin\AppData\Local\Temp\a6f982278b835b1d59ccef4dd76a18c0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\{53468D78-D433-4dcf-9F00-C1387202F11C}.exeC:\Windows\{53468D78-D433-4dcf-9F00-C1387202F11C}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\{94A1CC5E-C7D4-419c-9865-D3580861523A}.exeC:\Windows\{94A1CC5E-C7D4-419c-9865-D3580861523A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\{9D0C6AD8-5609-48e9-9E39-451D652136F1}.exeC:\Windows\{9D0C6AD8-5609-48e9-9E39-451D652136F1}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\{A8355FB2-CE73-44d1-9061-41CD4313076B}.exeC:\Windows\{A8355FB2-CE73-44d1-9061-41CD4313076B}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\{0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exeC:\Windows\{0519BD0E-4FCD-4a6b-905B-2C4FF99F2AC2}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\{62752F86-E854-4a11-934F-B58A1809B08D}.exeC:\Windows\{62752F86-E854-4a11-934F-B58A1809B08D}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\{60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exeC:\Windows\{60EF6C0E-5DA7-4df6-B2E6-ACF42CAC8179}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\{3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exeC:\Windows\{3E2F8E4D-63AA-40df-8A42-F6D73FBFA9EA}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\{BF87967B-902A-4dc7-9973-B5EB45CC0ADD}.exeC:\Windows\{BF87967B-902A-4dc7-9973-B5EB45CC0ADD}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3E2F8~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{60EF6~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{62752~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0519B~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8355~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9D0C6~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{94A1C~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{53468~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\A6F982~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5015dfc46a363193f4732c577b51619b4
SHA133362bd684072fd510fa9104bb2f601b96369b3e
SHA2560bfc40d09109e7669c6efe5cba28bc0e54810e9d1c2bc741f9a21fe171d3456e
SHA51264cba993f22d69eb862fbf9b0afea0d20a65088297ee50132763fd941fa6a274a1a5208140d8a133daea463e220b111766fba50d44722a68d3c5d20ea4235eaa
-
Filesize
89KB
MD58ad8a6875b113113733c53233802e495
SHA15cd2a048c3527e6726ed89a99a45edcb29b8e92b
SHA2562be193be042cba165da7fc1493364da154e09a8b96b74576181e9fea23e43299
SHA512dff9c9b408d2959a098989adb52fdf6fa84dce05a9741110d9473f7edd65b9e1d75a3eb4b98def679c3a1cc914112c2aa916b9700d36b5601490a5aefda1f0ae
-
Filesize
89KB
MD599e10952da40fcc88754d52ad4c8a3b7
SHA1fea007714f5ff99bf64e72ce62df0f2505fea8fc
SHA256ce1cae0381a3851ffcbddbb71cba7a8471dd4ac274d33f24f3febc78e75df6ec
SHA512f5ed4d0fb3e8465d0d4627b458ecd8ebbc86c1a65d89b91e06cc747b9bb35619d8a7a1ef971566683e584ab3908ba2e73b0f323af5c6a09e946273dbc9417036
-
Filesize
89KB
MD5f9d7e6cc758d7bffd8b3584c39e694da
SHA1682d1ce916d0ccfbfe4d3f5df337728e539954c7
SHA256161b3602453bbb794a66831f6d6627309bf05673b390c937a11bd94220d10412
SHA51231ee800ca46c1ea7cec8aa3fe9eed06b3a419daf2cc3c7a72196bc95a5310475b5d881b6ccf0b78e8cfd5b225ee8bc383fe9bab213f014b40add46ec51f68b89
-
Filesize
89KB
MD5df7594952542b0fe954a2ce44ff5ad1d
SHA1f75fa2bc12554b19d3ef57efaebf54ed23e7821f
SHA256fcb7949da350a0029a5142420c17316e13b59e2861203aecb110d967fcf8d3f8
SHA5122f87e29aad125519a1a41d701a87aba27f59b169d720c1ca121edf30093a66cf6ee31b82aa81a38d2789adf48424df461344573bd5e5dda75eded144dbbea004
-
Filesize
89KB
MD53feca518762b2151678f40ab8d0d60cc
SHA1c156fa4d5e9562c28efbc8648622bbe3bf9b8057
SHA25667a3d9ef4fa8201629579b77a3c4cbbabe88db29130717d2918c7b376b72803d
SHA512dbd6fc469e9567dedc221e634bb747e603dea3d44ab38d51cd539704aebe3b0226fad19cc617e82b80f006cce009e233ed25bda65d655fcfa8c9d3305f2554a9
-
Filesize
89KB
MD522f152b8272bf336bec6ed1a26914a02
SHA129ed6f6aabfa66eb9b0b76ba91d80441604e689d
SHA256dc9f3d06ed8c125bbb3fd55b85b5750c1e454eaf7a1ddbadf1c9d1c3e7dff8ff
SHA51274998323cd85d5946f51fe4ab7749ce91ad24ce7e16fdd36540500435709cae6d46409c33a6d740a21cc27abf255df191c95f38205194bf30455874746bb91f5
-
Filesize
89KB
MD50563fd5a43f34a8b37c51b899444e8f5
SHA1e9d8ff157f76f514e2acd6d04404cc8106e193cb
SHA256e5bc3c0f9f9a63aaea73952a047dde66f0e4e2b127c9dc96fca3e2bdbdb8c12b
SHA512de319eee26aa5d08fbf287769cef3effbc6e17eb80501dafbe3bba6cfeee6840b1acc19f45c88ddfb1730bc03958c8861ab589ca643f2b61eab6ce8d12532a53
-
Filesize
89KB
MD5590096b7fd145397058ceedf94a55dec
SHA112f4c5234926db0476b12ae0da186e7f942c0822
SHA256add4777704e0a37d8f70ce98a7bb077600a947851fffb49359165cb41635d0c0
SHA512d63beec1b0d343d25474ec0b6803bc5a6cc2482bcd1440ecde41f41e4043d1265355df93a1f4e4c6837035ae2675ceb1a56f6718bf53f2cef16cb95b3adb5f2a