Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
dd524d23ac2dc7ff6679df3652ff49f0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd524d23ac2dc7ff6679df3652ff49f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
dd524d23ac2dc7ff6679df3652ff49f0N.exe
-
Size
89KB
-
MD5
dd524d23ac2dc7ff6679df3652ff49f0
-
SHA1
e4beb221ea156469a625bc2824268be9597f70fa
-
SHA256
2fcf555ffeab3230e32fec7de9d2e9de9c2ba436245a14ce86aaba241fc3f679
-
SHA512
9da24a6a41413daa51e108f18aa74c3750ce0724176709574d910e508d8a874d660d0087efe482383c6ee5ebfcdf3a8154590fa0f51905ff364ab6377aac0461
-
SSDEEP
768:5vw9816thKQLron4/wQkNrfrunMxVFA3k:lEG/0onlbunMxVS3k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03A52562-57F2-4e44-812D-918E578316FC} {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{61E3A30F-1771-4b03-801D-77EBCB477B7E} {03A52562-57F2-4e44-812D-918E578316FC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}\stubpath = "C:\\Windows\\{FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe" {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C75A03F-231C-4978-B81E-FA25348935A3}\stubpath = "C:\\Windows\\{3C75A03F-231C-4978-B81E-FA25348935A3}.exe" {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E53996E5-4EE6-42c1-98A5-D35242B0CD1B}\stubpath = "C:\\Windows\\{E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe" {3C75A03F-231C-4978-B81E-FA25348935A3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}\stubpath = "C:\\Windows\\{15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe" {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BE6DCE49-464E-4f6b-97B3-6BD052A341F0}\stubpath = "C:\\Windows\\{BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe" {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E53996E5-4EE6-42c1-98A5-D35242B0CD1B} {3C75A03F-231C-4978-B81E-FA25348935A3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34028C3E-3D60-4646-814A-2C1460F9AC45}\stubpath = "C:\\Windows\\{34028C3E-3D60-4646-814A-2C1460F9AC45}.exe" {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D} dd524d23ac2dc7ff6679df3652ff49f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6} {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03A52562-57F2-4e44-812D-918E578316FC}\stubpath = "C:\\Windows\\{03A52562-57F2-4e44-812D-918E578316FC}.exe" {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{61E3A30F-1771-4b03-801D-77EBCB477B7E}\stubpath = "C:\\Windows\\{61E3A30F-1771-4b03-801D-77EBCB477B7E}.exe" {03A52562-57F2-4e44-812D-918E578316FC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}\stubpath = "C:\\Windows\\{2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe" dd524d23ac2dc7ff6679df3652ff49f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C75A03F-231C-4978-B81E-FA25348935A3} {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15B6DFEF-C224-4dda-99D1-1B0EE1776DFF} {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BE6DCE49-464E-4f6b-97B3-6BD052A341F0} {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34028C3E-3D60-4646-814A-2C1460F9AC45} {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe -
Deletes itself 1 IoCs
pid Process 2212 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2812 {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe 2892 {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe 2968 {3C75A03F-231C-4978-B81E-FA25348935A3}.exe 2736 {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe 1640 {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe 2388 {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe 376 {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe 2456 {03A52562-57F2-4e44-812D-918E578316FC}.exe 1620 {61E3A30F-1771-4b03-801D-77EBCB477B7E}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe File created C:\Windows\{BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe File created C:\Windows\{34028C3E-3D60-4646-814A-2C1460F9AC45}.exe {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe File created C:\Windows\{03A52562-57F2-4e44-812D-918E578316FC}.exe {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe File created C:\Windows\{61E3A30F-1771-4b03-801D-77EBCB477B7E}.exe {03A52562-57F2-4e44-812D-918E578316FC}.exe File created C:\Windows\{2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe dd524d23ac2dc7ff6679df3652ff49f0N.exe File created C:\Windows\{3C75A03F-231C-4978-B81E-FA25348935A3}.exe {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe File created C:\Windows\{E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe {3C75A03F-231C-4978-B81E-FA25348935A3}.exe File created C:\Windows\{15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3C75A03F-231C-4978-B81E-FA25348935A3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {61E3A30F-1771-4b03-801D-77EBCB477B7E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {03A52562-57F2-4e44-812D-918E578316FC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd524d23ac2dc7ff6679df3652ff49f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3048 dd524d23ac2dc7ff6679df3652ff49f0N.exe Token: SeIncBasePriorityPrivilege 2812 {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe Token: SeIncBasePriorityPrivilege 2892 {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe Token: SeIncBasePriorityPrivilege 2968 {3C75A03F-231C-4978-B81E-FA25348935A3}.exe Token: SeIncBasePriorityPrivilege 2736 {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe Token: SeIncBasePriorityPrivilege 1640 {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe Token: SeIncBasePriorityPrivilege 2388 {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe Token: SeIncBasePriorityPrivilege 376 {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe Token: SeIncBasePriorityPrivilege 2456 {03A52562-57F2-4e44-812D-918E578316FC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2812 3048 dd524d23ac2dc7ff6679df3652ff49f0N.exe 29 PID 3048 wrote to memory of 2812 3048 dd524d23ac2dc7ff6679df3652ff49f0N.exe 29 PID 3048 wrote to memory of 2812 3048 dd524d23ac2dc7ff6679df3652ff49f0N.exe 29 PID 3048 wrote to memory of 2812 3048 dd524d23ac2dc7ff6679df3652ff49f0N.exe 29 PID 3048 wrote to memory of 2212 3048 dd524d23ac2dc7ff6679df3652ff49f0N.exe 30 PID 3048 wrote to memory of 2212 3048 dd524d23ac2dc7ff6679df3652ff49f0N.exe 30 PID 3048 wrote to memory of 2212 3048 dd524d23ac2dc7ff6679df3652ff49f0N.exe 30 PID 3048 wrote to memory of 2212 3048 dd524d23ac2dc7ff6679df3652ff49f0N.exe 30 PID 2812 wrote to memory of 2892 2812 {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe 31 PID 2812 wrote to memory of 2892 2812 {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe 31 PID 2812 wrote to memory of 2892 2812 {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe 31 PID 2812 wrote to memory of 2892 2812 {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe 31 PID 2812 wrote to memory of 2748 2812 {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe 32 PID 2812 wrote to memory of 2748 2812 {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe 32 PID 2812 wrote to memory of 2748 2812 {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe 32 PID 2812 wrote to memory of 2748 2812 {2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe 32 PID 2892 wrote to memory of 2968 2892 {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe 33 PID 2892 wrote to memory of 2968 2892 {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe 33 PID 2892 wrote to memory of 2968 2892 {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe 33 PID 2892 wrote to memory of 2968 2892 {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe 33 PID 2892 wrote to memory of 2664 2892 {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe 34 PID 2892 wrote to memory of 2664 2892 {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe 34 PID 2892 wrote to memory of 2664 2892 {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe 34 PID 2892 wrote to memory of 2664 2892 {FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe 34 PID 2968 wrote to memory of 2736 2968 {3C75A03F-231C-4978-B81E-FA25348935A3}.exe 35 PID 2968 wrote to memory of 2736 2968 {3C75A03F-231C-4978-B81E-FA25348935A3}.exe 35 PID 2968 wrote to memory of 2736 2968 {3C75A03F-231C-4978-B81E-FA25348935A3}.exe 35 PID 2968 wrote to memory of 2736 2968 {3C75A03F-231C-4978-B81E-FA25348935A3}.exe 35 PID 2968 wrote to memory of 2804 2968 {3C75A03F-231C-4978-B81E-FA25348935A3}.exe 36 PID 2968 wrote to memory of 2804 2968 {3C75A03F-231C-4978-B81E-FA25348935A3}.exe 36 PID 2968 wrote to memory of 2804 2968 {3C75A03F-231C-4978-B81E-FA25348935A3}.exe 36 PID 2968 wrote to memory of 2804 2968 {3C75A03F-231C-4978-B81E-FA25348935A3}.exe 36 PID 2736 wrote to memory of 1640 2736 {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe 37 PID 2736 wrote to memory of 1640 2736 {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe 37 PID 2736 wrote to memory of 1640 2736 {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe 37 PID 2736 wrote to memory of 1640 2736 {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe 37 PID 2736 wrote to memory of 1456 2736 {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe 38 PID 2736 wrote to memory of 1456 2736 {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe 38 PID 2736 wrote to memory of 1456 2736 {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe 38 PID 2736 wrote to memory of 1456 2736 {E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe 38 PID 1640 wrote to memory of 2388 1640 {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe 39 PID 1640 wrote to memory of 2388 1640 {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe 39 PID 1640 wrote to memory of 2388 1640 {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe 39 PID 1640 wrote to memory of 2388 1640 {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe 39 PID 1640 wrote to memory of 2836 1640 {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe 40 PID 1640 wrote to memory of 2836 1640 {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe 40 PID 1640 wrote to memory of 2836 1640 {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe 40 PID 1640 wrote to memory of 2836 1640 {15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe 40 PID 2388 wrote to memory of 376 2388 {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe 41 PID 2388 wrote to memory of 376 2388 {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe 41 PID 2388 wrote to memory of 376 2388 {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe 41 PID 2388 wrote to memory of 376 2388 {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe 41 PID 2388 wrote to memory of 2704 2388 {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe 42 PID 2388 wrote to memory of 2704 2388 {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe 42 PID 2388 wrote to memory of 2704 2388 {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe 42 PID 2388 wrote to memory of 2704 2388 {BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe 42 PID 376 wrote to memory of 2456 376 {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe 43 PID 376 wrote to memory of 2456 376 {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe 43 PID 376 wrote to memory of 2456 376 {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe 43 PID 376 wrote to memory of 2456 376 {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe 43 PID 376 wrote to memory of 2588 376 {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe 44 PID 376 wrote to memory of 2588 376 {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe 44 PID 376 wrote to memory of 2588 376 {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe 44 PID 376 wrote to memory of 2588 376 {34028C3E-3D60-4646-814A-2C1460F9AC45}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd524d23ac2dc7ff6679df3652ff49f0N.exe"C:\Users\Admin\AppData\Local\Temp\dd524d23ac2dc7ff6679df3652ff49f0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\{2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exeC:\Windows\{2E8C9790-B0A1-4087-96E8-F9A5C8F4A47D}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\{FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exeC:\Windows\{FDAD4C2A-E413-4747-8F2D-DBD1DC96D8A6}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\{3C75A03F-231C-4978-B81E-FA25348935A3}.exeC:\Windows\{3C75A03F-231C-4978-B81E-FA25348935A3}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\{E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exeC:\Windows\{E53996E5-4EE6-42c1-98A5-D35242B0CD1B}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exeC:\Windows\{15B6DFEF-C224-4dda-99D1-1B0EE1776DFF}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\{BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exeC:\Windows\{BE6DCE49-464E-4f6b-97B3-6BD052A341F0}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\{34028C3E-3D60-4646-814A-2C1460F9AC45}.exeC:\Windows\{34028C3E-3D60-4646-814A-2C1460F9AC45}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\{03A52562-57F2-4e44-812D-918E578316FC}.exeC:\Windows\{03A52562-57F2-4e44-812D-918E578316FC}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Windows\{61E3A30F-1771-4b03-801D-77EBCB477B7E}.exeC:\Windows\{61E3A30F-1771-4b03-801D-77EBCB477B7E}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03A52~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34028~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BE6DC~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{15B6D~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E5399~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C75A~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FDAD4~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2E8C9~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\DD524D~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5c495641ee77d4dde539213e23d8093b2
SHA1c6eae89e29c8be4a4d11f0b3d4fb5f107716fb59
SHA256a21e905f0c2fa6a1499063d7cb837717db953d28ee568c72fa72b1e5600e329c
SHA5128770b64a731cc4b009d38b24dc3156b73d9489cdadfec34602b3f220140eb22f950508f5bd563857bfa42510bb070a35175c1aaf17cc479791ab88524bcec033
-
Filesize
89KB
MD5c41073b1c98411d94355ee42bcf645fb
SHA1194b6867e60845a1c30fae64a1458ac3deb9beae
SHA256189497d9903f5c35e0b698e431661efee42c8a2c9a93ec8acecf21bcdefcefef
SHA51220b21e6ff6c5023c919269b8bfaf70dd0dbfbb67b6f58684ca923534605bb827f451a1e54443ae72c0f9d897fb8f170fd8c3d0a3f5eaaf804a2b38fb5ee1825c
-
Filesize
89KB
MD5c4e6bdc489f1a3be041b5bc8d018eb91
SHA1d1a9f92be6751bfbad294646a329d9cd57a24405
SHA256a8865276252d41ccdbbf70b154ac7047868ac4a50819c61505aba8d74e545d00
SHA512c8f6fe690087e8cd88ae1bf1906ecc19abf4bf4ee37a10aada95318dfa76db9b10f15cc9b45d1ffacdce22468e78c1b73129c71160102ffb47cc5d43a7bf5400
-
Filesize
89KB
MD5afecde5efde9214e7b7ed336dd994fec
SHA14cd81bc1fd9256b2bb9ab170292806f3dd136300
SHA25646d7a2a85daaa0233fcdad222aa9cc64872ae48c392f98e9f32d0bb6d54bd90c
SHA5124fab5937c39729271a7d40226d375e87f70a19e989714fbb6070a3181109c97b1680c45f157a5e325e1dabc5c85ae8fa1c2e1cd97c022d61e3b747faf18275ce
-
Filesize
89KB
MD53af20afe08d7de0f4efb0bcceda76deb
SHA12b21d4fdfd03729597a73be3ed5289bf4753c60f
SHA2567a43be409178245f344fa100b868328c61f14ea9e211d66fdbe7cf874196e870
SHA512404161311d273978c0b25ad41ec070a63cc60e27f04116f1c60f027e178dce6e181d3fa002622c8374e892257acb9c57c27fb66b3d018c11cdec7522c87c8fa7
-
Filesize
89KB
MD518fc510de6f8b85d9567a4f902c9d8a4
SHA1768ffcb24a78e1d513c598dd6354cdc9c7a81ba0
SHA2562ace1bf5e16f164c713d7b8926d4e7a6f249fbd7b49d0ab8f7da862784805510
SHA5129dcc8b17ea3e27940ee4aa5b6ddf0daa042d1eff923ed59a03ec2e619fef7101c00d7b00cef40b32250ff3997fb731736e67e44d709fb39e76267e39d16cd3e5
-
Filesize
89KB
MD5c3c944659fc2216663e42dda1a8c56c5
SHA1e90ebd186f061c470438e35778798ca91c43fdbb
SHA25686f7440f426b5bbe442aff45d2c6d4aae1b4f0a0a9e8afd2bcd12b8473826a3b
SHA512fae38d6d4185cae6e2af8a70a84ca3a8c6375e7fe8a8812865ef3cc2664762c1e55f2006a849cbd8a7e894e6fce0c0a628d68c356f07c52e61d601191891eaa9
-
Filesize
89KB
MD5b87cdf6bbe99006387971df23517283f
SHA1f0a9877e7fb0bf3f07fae9d5f08bb4229f64f129
SHA256b541f5f1996d9acf3a0ceeba70e1cf7a2b1081cdf9d778923277277817112571
SHA512204d0103e2e0aa1dff573c72628b6f738a5cf74abb6975908ff5d8153f05b9f12f4d1186c2c8930f3c9f736f1af08418f6f9ac50f91184f91e694e64fb1031e2
-
Filesize
89KB
MD5adecddf7e520356f608a76a32d60990f
SHA1c4aaf9b03b14566dd42d97cfb71c88daf458e0b8
SHA256fbec61700ac0bd68c66a01bba8b28ae2d455d6cc9dd41e0be30d9f31487b68c5
SHA512470752bdc0622064f18e94212e5a54abb34674b84d763b3331da79c906d419eb605f72a75304206a86474376766ded393a879b654f9c989477e8138d38530c8b