Analysis
-
max time kernel
118s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
dd524d23ac2dc7ff6679df3652ff49f0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd524d23ac2dc7ff6679df3652ff49f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
dd524d23ac2dc7ff6679df3652ff49f0N.exe
-
Size
89KB
-
MD5
dd524d23ac2dc7ff6679df3652ff49f0
-
SHA1
e4beb221ea156469a625bc2824268be9597f70fa
-
SHA256
2fcf555ffeab3230e32fec7de9d2e9de9c2ba436245a14ce86aaba241fc3f679
-
SHA512
9da24a6a41413daa51e108f18aa74c3750ce0724176709574d910e508d8a874d660d0087efe482383c6ee5ebfcdf3a8154590fa0f51905ff364ab6377aac0461
-
SSDEEP
768:5vw9816thKQLron4/wQkNrfrunMxVFA3k:lEG/0onlbunMxVS3k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8CFDFE26-AA85-4964-83B8-1A88F75DECC3}\stubpath = "C:\\Windows\\{8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe" {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4D1A1558-EF5D-4d42-B687-6479FEC14892}\stubpath = "C:\\Windows\\{4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe" {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69417108-04D4-4ebf-8601-5E60A26D3E99} {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D590800B-B312-44e1-A548-11A3EC22FF2B} {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D590800B-B312-44e1-A548-11A3EC22FF2B}\stubpath = "C:\\Windows\\{D590800B-B312-44e1-A548-11A3EC22FF2B}.exe" {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}\stubpath = "C:\\Windows\\{5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe" dd524d23ac2dc7ff6679df3652ff49f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{907C535C-2C3D-47ba-B6F5-E6922FF09E3F}\stubpath = "C:\\Windows\\{907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe" {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A182EBB6-B43D-4cfb-8547-177DC87911FE} {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A182EBB6-B43D-4cfb-8547-177DC87911FE}\stubpath = "C:\\Windows\\{A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe" {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4D1A1558-EF5D-4d42-B687-6479FEC14892} {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A} dd524d23ac2dc7ff6679df3652ff49f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EA8EF378-9456-45a8-B3C1-B0984F1DB1E3} {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{907C535C-2C3D-47ba-B6F5-E6922FF09E3F} {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4913A454-F45A-4d72-ACCE-3A43EC3E7D18} {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}\stubpath = "C:\\Windows\\{EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe" {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8CFDFE26-AA85-4964-83B8-1A88F75DECC3} {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69417108-04D4-4ebf-8601-5E60A26D3E99}\stubpath = "C:\\Windows\\{69417108-04D4-4ebf-8601-5E60A26D3E99}.exe" {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4913A454-F45A-4d72-ACCE-3A43EC3E7D18}\stubpath = "C:\\Windows\\{4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe" {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe -
Executes dropped EXE 9 IoCs
pid Process 4196 {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe 3364 {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe 2740 {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe 3792 {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe 1256 {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe 4216 {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe 556 {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe 1180 {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe 4560 {D590800B-B312-44e1-A548-11A3EC22FF2B}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe File created C:\Windows\{8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe File created C:\Windows\{4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe File created C:\Windows\{69417108-04D4-4ebf-8601-5E60A26D3E99}.exe {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe File created C:\Windows\{4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe File created C:\Windows\{D590800B-B312-44e1-A548-11A3EC22FF2B}.exe {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe File created C:\Windows\{5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe dd524d23ac2dc7ff6679df3652ff49f0N.exe File created C:\Windows\{EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe File created C:\Windows\{907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd524d23ac2dc7ff6679df3652ff49f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D590800B-B312-44e1-A548-11A3EC22FF2B}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 896 dd524d23ac2dc7ff6679df3652ff49f0N.exe Token: SeIncBasePriorityPrivilege 4196 {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe Token: SeIncBasePriorityPrivilege 3364 {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe Token: SeIncBasePriorityPrivilege 2740 {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe Token: SeIncBasePriorityPrivilege 3792 {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe Token: SeIncBasePriorityPrivilege 1256 {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe Token: SeIncBasePriorityPrivilege 4216 {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe Token: SeIncBasePriorityPrivilege 556 {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe Token: SeIncBasePriorityPrivilege 1180 {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 896 wrote to memory of 4196 896 dd524d23ac2dc7ff6679df3652ff49f0N.exe 86 PID 896 wrote to memory of 4196 896 dd524d23ac2dc7ff6679df3652ff49f0N.exe 86 PID 896 wrote to memory of 4196 896 dd524d23ac2dc7ff6679df3652ff49f0N.exe 86 PID 896 wrote to memory of 220 896 dd524d23ac2dc7ff6679df3652ff49f0N.exe 87 PID 896 wrote to memory of 220 896 dd524d23ac2dc7ff6679df3652ff49f0N.exe 87 PID 896 wrote to memory of 220 896 dd524d23ac2dc7ff6679df3652ff49f0N.exe 87 PID 4196 wrote to memory of 3364 4196 {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe 88 PID 4196 wrote to memory of 3364 4196 {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe 88 PID 4196 wrote to memory of 3364 4196 {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe 88 PID 4196 wrote to memory of 1608 4196 {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe 89 PID 4196 wrote to memory of 1608 4196 {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe 89 PID 4196 wrote to memory of 1608 4196 {5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe 89 PID 3364 wrote to memory of 2740 3364 {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe 92 PID 3364 wrote to memory of 2740 3364 {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe 92 PID 3364 wrote to memory of 2740 3364 {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe 92 PID 3364 wrote to memory of 1276 3364 {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe 93 PID 3364 wrote to memory of 1276 3364 {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe 93 PID 3364 wrote to memory of 1276 3364 {EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe 93 PID 2740 wrote to memory of 3792 2740 {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe 96 PID 2740 wrote to memory of 3792 2740 {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe 96 PID 2740 wrote to memory of 3792 2740 {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe 96 PID 2740 wrote to memory of 3108 2740 {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe 97 PID 2740 wrote to memory of 3108 2740 {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe 97 PID 2740 wrote to memory of 3108 2740 {907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe 97 PID 3792 wrote to memory of 1256 3792 {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe 98 PID 3792 wrote to memory of 1256 3792 {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe 98 PID 3792 wrote to memory of 1256 3792 {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe 98 PID 3792 wrote to memory of 392 3792 {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe 99 PID 3792 wrote to memory of 392 3792 {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe 99 PID 3792 wrote to memory of 392 3792 {A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe 99 PID 1256 wrote to memory of 4216 1256 {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe 100 PID 1256 wrote to memory of 4216 1256 {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe 100 PID 1256 wrote to memory of 4216 1256 {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe 100 PID 1256 wrote to memory of 3552 1256 {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe 101 PID 1256 wrote to memory of 3552 1256 {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe 101 PID 1256 wrote to memory of 3552 1256 {8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe 101 PID 4216 wrote to memory of 556 4216 {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe 102 PID 4216 wrote to memory of 556 4216 {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe 102 PID 4216 wrote to memory of 556 4216 {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe 102 PID 4216 wrote to memory of 1080 4216 {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe 103 PID 4216 wrote to memory of 1080 4216 {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe 103 PID 4216 wrote to memory of 1080 4216 {4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe 103 PID 556 wrote to memory of 1180 556 {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe 104 PID 556 wrote to memory of 1180 556 {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe 104 PID 556 wrote to memory of 1180 556 {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe 104 PID 556 wrote to memory of 2112 556 {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe 105 PID 556 wrote to memory of 2112 556 {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe 105 PID 556 wrote to memory of 2112 556 {69417108-04D4-4ebf-8601-5E60A26D3E99}.exe 105 PID 1180 wrote to memory of 4560 1180 {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe 106 PID 1180 wrote to memory of 4560 1180 {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe 106 PID 1180 wrote to memory of 4560 1180 {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe 106 PID 1180 wrote to memory of 3308 1180 {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe 107 PID 1180 wrote to memory of 3308 1180 {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe 107 PID 1180 wrote to memory of 3308 1180 {4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd524d23ac2dc7ff6679df3652ff49f0N.exe"C:\Users\Admin\AppData\Local\Temp\dd524d23ac2dc7ff6679df3652ff49f0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\{5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exeC:\Windows\{5735BDA2-EBD3-4bc6-9FC7-9F549A014C1A}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\{EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exeC:\Windows\{EA8EF378-9456-45a8-B3C1-B0984F1DB1E3}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\{907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exeC:\Windows\{907C535C-2C3D-47ba-B6F5-E6922FF09E3F}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\{A182EBB6-B43D-4cfb-8547-177DC87911FE}.exeC:\Windows\{A182EBB6-B43D-4cfb-8547-177DC87911FE}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\{8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exeC:\Windows\{8CFDFE26-AA85-4964-83B8-1A88F75DECC3}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\{4D1A1558-EF5D-4d42-B687-6479FEC14892}.exeC:\Windows\{4D1A1558-EF5D-4d42-B687-6479FEC14892}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\{69417108-04D4-4ebf-8601-5E60A26D3E99}.exeC:\Windows\{69417108-04D4-4ebf-8601-5E60A26D3E99}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\{4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exeC:\Windows\{4913A454-F45A-4d72-ACCE-3A43EC3E7D18}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\{D590800B-B312-44e1-A548-11A3EC22FF2B}.exeC:\Windows\{D590800B-B312-44e1-A548-11A3EC22FF2B}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4913A~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69417~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4D1A1~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8CFDF~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A182E~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{907C5~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA8EF~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5735B~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\DD524D~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5ffb327cccdbb04312ce21cdce6f3a609
SHA17c69be177c5f3599fb894814528ffeb0da01f21a
SHA256184f33fb8da9c60636ee11362a61585eb0b70b9e0ec8e40a0d90a328a1327395
SHA512a11d309ab983bf18ec3c7b88caf8134bec40a396f92f86c27fa396cf845771f3368a974689fb7f34ca70400adf6454e234f20833198c446057498a264688a88e
-
Filesize
89KB
MD5bb4a549d4d5e80b07346fbd5836c5d9d
SHA1e7984904175e95d01b1e0d82df00e12144bfdf4e
SHA2566748f234fae622c5b9407cfc85bc9d6658d8e1d7d962c211e9768919de14b24b
SHA51286cae32b25f3c45f3b1d9fe65cb74573f32810b5f69cd86b76bc3d27735ee407206b7a7cb502ef41a956c4ac6f1a5b92cf49cb4dce8e739285988781af7e33e1
-
Filesize
89KB
MD5415315edb9dce2292397dcd1a759c850
SHA14431d7829d078e3f83104c681c4bc9d311a89129
SHA256dfd1b3421e7269c5f8e1b63a06191495ee1d15ab3fcbb3238d651992f0680bd3
SHA51286f5c4298f8147131c58fd86157c40a8eb95bc9940521b155d4a942c3a447e340e8e1fc2720ac50b963ebcb6ab233468c9799bd653fe1ce240ff7d6f23ad21b5
-
Filesize
89KB
MD5c12e37f165de206c1ff4efda9b5ab0f2
SHA1a97de3421bcde92e1e8257793e37480da2e0918b
SHA256618504d238a8b6c01148cd3a62937dad63aba231e4ccee90d8a9d1a39d9eb84f
SHA5124653c4b9db6a512b3fde061116e2dc02dcac6f63d4aafb3a40e0243ae33a634cb4fc1e35c754f3ceb41fd37e72f009eed581a85f1b64383de935171d75ca9fec
-
Filesize
89KB
MD5e198aafc7115e19af2253904dc14c1f3
SHA11d04b8f625ae837c7151f5ece9d0d44c78b464e7
SHA256e5f28f2cbd935f97e1273c9d444ddc28f177e7d3095b34b800ac6f00d6256b2a
SHA512098830e21feeef7090f50d3d2e4ed137c987f130323424132f61a62f5ab52b3c96a2fe7adebdd5a82768c15e54c5a6e52b0ba99d0b41fe9df468b8b8cdc127a8
-
Filesize
89KB
MD57d0a4706d9bfd12f806c91dcd242cd39
SHA1fc563708569a62e986006a756b422e9ddc13f6de
SHA256a1bdfdd39ecb2be633d7dc223703c4252a8dbd00d62ec8087e9bbc9183b66849
SHA5122e81c4daaad69409aef12b2071ac8360fd103216295f5c18d6741162be2dcb6f84bc1cd984296d6c1ca43f79c403cb7a9f3234c0e58ab25217d73689f40e4716
-
Filesize
89KB
MD5cd5eeb9117878aec82305428e42d6fed
SHA1ea92bf3f3f54cf7f1dc0d1d3f20dac6b33c56b59
SHA2569e622fdfb2165cd177784c23af0ae46a616f1688575405008ba53e232816673f
SHA512a71b01ecdeeda6ff39610480c7fee45191261bcd9b28010bf9ea53560f1a29d4d715549c51e875be8799ab064dbb090b75cdc93338d9858176c673e09662544e
-
Filesize
89KB
MD54704f0936838b3a71403e49bea387057
SHA19a407c6c1e81cc85558e3941bc13e67fe52395d8
SHA256d87e23602cc0fe06736b54a7ddaa42d0a9ca435ac571928503d67f4317f5aacb
SHA51265a172d4aa93438a098e77c166ce71a2d49e7baa2376634fb2bd02ff95b83ca3f6c0152b0dbbe90fa696f293d05e4aefa93aff58ca0bf932a075678ddf0fb285
-
Filesize
89KB
MD5e2ed3fc7c0f2c8ebc4faf28fc78ad4be
SHA18ca2fdab54eb55ae432df54de4249a84b4e16f24
SHA25672f4306aea702ee6fa2848217cd301a675e3e87c203b6eba6c0795a776bebf34
SHA5124e8ce901b796d9cec3bd21de7c3d97adf041e4637a86ee5f3390373451c95b6994b87421e998f40a0fc27cd40c9b8caf9251e6bd0b6e395d9b7ddcd244b8e2e4