Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe
Resource
win10v2004-20240802-en
General
-
Target
34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe
-
Size
60KB
-
MD5
9e924bb39dc3dc7bdd6f49e7a9a9c62b
-
SHA1
04a64a2b79a18419b47248a9fc4f78c0806a8ab9
-
SHA256
34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0
-
SHA512
371ce4f677014790d549a36479fd6b526d845cfd27ad72b584d44463eaaa6ed0a93bffac33659db6b9980edc955c34058067b56689f0edd321d142889de9cdfb
-
SSDEEP
384:vbLwOs8AHsc4sMfwhKQLroT4/CFsrdHWMZ:vvw9816vhKQLroT4/wQpWMZ
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0AD3321A-0C0B-4342-893B-39C093D790BC} {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6B6C004C-0EF1-4bb4-8274-C2DD0982A555}\stubpath = "C:\\Windows\\{6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe" {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6FC14133-05D9-4150-8BFF-E855890020FE} {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFF02C66-F0CC-4187-97A1-4757800FA0D7}\stubpath = "C:\\Windows\\{CFF02C66-F0CC-4187-97A1-4757800FA0D7}.exe" {0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6EDFEF8C-283C-48a2-ABE5-C970D4F8131F} {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6FC14133-05D9-4150-8BFF-E855890020FE}\stubpath = "C:\\Windows\\{6FC14133-05D9-4150-8BFF-E855890020FE}.exe" {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2BA04863-D3C6-47f2-9468-1B087D8B854E} {6FC14133-05D9-4150-8BFF-E855890020FE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08102070-2722-48c9-9995-EF496607470F} {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{04F52658-F76A-415c-845A-696467352D23} {14BEA690-5D75-4ea9-BD7A-ED609E6965C7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C} {04F52658-F76A-415c-845A-696467352D23}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFF02C66-F0CC-4187-97A1-4757800FA0D7} {0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{317D0AE5-74FD-4440-9DB4-2C684866A5D4} 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0AD3321A-0C0B-4342-893B-39C093D790BC}\stubpath = "C:\\Windows\\{0AD3321A-0C0B-4342-893B-39C093D790BC}.exe" {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6B6C004C-0EF1-4bb4-8274-C2DD0982A555} {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14BEA690-5D75-4ea9-BD7A-ED609E6965C7} {08102070-2722-48c9-9995-EF496607470F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14BEA690-5D75-4ea9-BD7A-ED609E6965C7}\stubpath = "C:\\Windows\\{14BEA690-5D75-4ea9-BD7A-ED609E6965C7}.exe" {08102070-2722-48c9-9995-EF496607470F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{04F52658-F76A-415c-845A-696467352D23}\stubpath = "C:\\Windows\\{04F52658-F76A-415c-845A-696467352D23}.exe" {14BEA690-5D75-4ea9-BD7A-ED609E6965C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}\stubpath = "C:\\Windows\\{0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}.exe" {04F52658-F76A-415c-845A-696467352D23}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{317D0AE5-74FD-4440-9DB4-2C684866A5D4}\stubpath = "C:\\Windows\\{317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe" 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}\stubpath = "C:\\Windows\\{6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe" {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2BA04863-D3C6-47f2-9468-1B087D8B854E}\stubpath = "C:\\Windows\\{2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe" {6FC14133-05D9-4150-8BFF-E855890020FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08102070-2722-48c9-9995-EF496607470F}\stubpath = "C:\\Windows\\{08102070-2722-48c9-9995-EF496607470F}.exe" {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe -
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2968 {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe 2828 {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe 1624 {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe 1392 {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe 1676 {6FC14133-05D9-4150-8BFF-E855890020FE}.exe 2756 {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe 1836 {08102070-2722-48c9-9995-EF496607470F}.exe 1044 {14BEA690-5D75-4ea9-BD7A-ED609E6965C7}.exe 2500 {04F52658-F76A-415c-845A-696467352D23}.exe 112 {0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}.exe 2988 {CFF02C66-F0CC-4187-97A1-4757800FA0D7}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{CFF02C66-F0CC-4187-97A1-4757800FA0D7}.exe {0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}.exe File created C:\Windows\{6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe File created C:\Windows\{14BEA690-5D75-4ea9-BD7A-ED609E6965C7}.exe {08102070-2722-48c9-9995-EF496607470F}.exe File created C:\Windows\{0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}.exe {04F52658-F76A-415c-845A-696467352D23}.exe File created C:\Windows\{6FC14133-05D9-4150-8BFF-E855890020FE}.exe {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe File created C:\Windows\{2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe {6FC14133-05D9-4150-8BFF-E855890020FE}.exe File created C:\Windows\{08102070-2722-48c9-9995-EF496607470F}.exe {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe File created C:\Windows\{04F52658-F76A-415c-845A-696467352D23}.exe {14BEA690-5D75-4ea9-BD7A-ED609E6965C7}.exe File created C:\Windows\{317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe File created C:\Windows\{0AD3321A-0C0B-4342-893B-39C093D790BC}.exe {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe File created C:\Windows\{6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6FC14133-05D9-4150-8BFF-E855890020FE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {08102070-2722-48c9-9995-EF496607470F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {14BEA690-5D75-4ea9-BD7A-ED609E6965C7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CFF02C66-F0CC-4187-97A1-4757800FA0D7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {04F52658-F76A-415c-845A-696467352D23}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2652 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe Token: SeIncBasePriorityPrivilege 2968 {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe Token: SeIncBasePriorityPrivilege 2828 {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe Token: SeIncBasePriorityPrivilege 1624 {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe Token: SeIncBasePriorityPrivilege 1392 {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe Token: SeIncBasePriorityPrivilege 1676 {6FC14133-05D9-4150-8BFF-E855890020FE}.exe Token: SeIncBasePriorityPrivilege 2756 {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe Token: SeIncBasePriorityPrivilege 1836 {08102070-2722-48c9-9995-EF496607470F}.exe Token: SeIncBasePriorityPrivilege 1044 {14BEA690-5D75-4ea9-BD7A-ED609E6965C7}.exe Token: SeIncBasePriorityPrivilege 2500 {04F52658-F76A-415c-845A-696467352D23}.exe Token: SeIncBasePriorityPrivilege 112 {0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2968 2652 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe 30 PID 2652 wrote to memory of 2968 2652 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe 30 PID 2652 wrote to memory of 2968 2652 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe 30 PID 2652 wrote to memory of 2968 2652 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe 30 PID 2652 wrote to memory of 2676 2652 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe 31 PID 2652 wrote to memory of 2676 2652 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe 31 PID 2652 wrote to memory of 2676 2652 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe 31 PID 2652 wrote to memory of 2676 2652 34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe 31 PID 2968 wrote to memory of 2828 2968 {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe 32 PID 2968 wrote to memory of 2828 2968 {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe 32 PID 2968 wrote to memory of 2828 2968 {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe 32 PID 2968 wrote to memory of 2828 2968 {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe 32 PID 2968 wrote to memory of 2804 2968 {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe 33 PID 2968 wrote to memory of 2804 2968 {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe 33 PID 2968 wrote to memory of 2804 2968 {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe 33 PID 2968 wrote to memory of 2804 2968 {317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe 33 PID 2828 wrote to memory of 1624 2828 {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe 35 PID 2828 wrote to memory of 1624 2828 {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe 35 PID 2828 wrote to memory of 1624 2828 {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe 35 PID 2828 wrote to memory of 1624 2828 {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe 35 PID 2828 wrote to memory of 1012 2828 {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe 36 PID 2828 wrote to memory of 1012 2828 {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe 36 PID 2828 wrote to memory of 1012 2828 {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe 36 PID 2828 wrote to memory of 1012 2828 {0AD3321A-0C0B-4342-893B-39C093D790BC}.exe 36 PID 1624 wrote to memory of 1392 1624 {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe 37 PID 1624 wrote to memory of 1392 1624 {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe 37 PID 1624 wrote to memory of 1392 1624 {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe 37 PID 1624 wrote to memory of 1392 1624 {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe 37 PID 1624 wrote to memory of 2264 1624 {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe 38 PID 1624 wrote to memory of 2264 1624 {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe 38 PID 1624 wrote to memory of 2264 1624 {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe 38 PID 1624 wrote to memory of 2264 1624 {6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe 38 PID 1392 wrote to memory of 1676 1392 {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe 39 PID 1392 wrote to memory of 1676 1392 {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe 39 PID 1392 wrote to memory of 1676 1392 {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe 39 PID 1392 wrote to memory of 1676 1392 {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe 39 PID 1392 wrote to memory of 1744 1392 {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe 40 PID 1392 wrote to memory of 1744 1392 {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe 40 PID 1392 wrote to memory of 1744 1392 {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe 40 PID 1392 wrote to memory of 1744 1392 {6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe 40 PID 1676 wrote to memory of 2756 1676 {6FC14133-05D9-4150-8BFF-E855890020FE}.exe 41 PID 1676 wrote to memory of 2756 1676 {6FC14133-05D9-4150-8BFF-E855890020FE}.exe 41 PID 1676 wrote to memory of 2756 1676 {6FC14133-05D9-4150-8BFF-E855890020FE}.exe 41 PID 1676 wrote to memory of 2756 1676 {6FC14133-05D9-4150-8BFF-E855890020FE}.exe 41 PID 1676 wrote to memory of 2760 1676 {6FC14133-05D9-4150-8BFF-E855890020FE}.exe 42 PID 1676 wrote to memory of 2760 1676 {6FC14133-05D9-4150-8BFF-E855890020FE}.exe 42 PID 1676 wrote to memory of 2760 1676 {6FC14133-05D9-4150-8BFF-E855890020FE}.exe 42 PID 1676 wrote to memory of 2760 1676 {6FC14133-05D9-4150-8BFF-E855890020FE}.exe 42 PID 2756 wrote to memory of 1836 2756 {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe 43 PID 2756 wrote to memory of 1836 2756 {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe 43 PID 2756 wrote to memory of 1836 2756 {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe 43 PID 2756 wrote to memory of 1836 2756 {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe 43 PID 2756 wrote to memory of 1848 2756 {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe 44 PID 2756 wrote to memory of 1848 2756 {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe 44 PID 2756 wrote to memory of 1848 2756 {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe 44 PID 2756 wrote to memory of 1848 2756 {2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe 44 PID 1836 wrote to memory of 1044 1836 {08102070-2722-48c9-9995-EF496607470F}.exe 45 PID 1836 wrote to memory of 1044 1836 {08102070-2722-48c9-9995-EF496607470F}.exe 45 PID 1836 wrote to memory of 1044 1836 {08102070-2722-48c9-9995-EF496607470F}.exe 45 PID 1836 wrote to memory of 1044 1836 {08102070-2722-48c9-9995-EF496607470F}.exe 45 PID 1836 wrote to memory of 1052 1836 {08102070-2722-48c9-9995-EF496607470F}.exe 46 PID 1836 wrote to memory of 1052 1836 {08102070-2722-48c9-9995-EF496607470F}.exe 46 PID 1836 wrote to memory of 1052 1836 {08102070-2722-48c9-9995-EF496607470F}.exe 46 PID 1836 wrote to memory of 1052 1836 {08102070-2722-48c9-9995-EF496607470F}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe"C:\Users\Admin\AppData\Local\Temp\34b44f89d8123b335fe064d7b38ebfdfde0370a3c06bb00b3758a7fe16341cc0.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\{317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exeC:\Windows\{317D0AE5-74FD-4440-9DB4-2C684866A5D4}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\{0AD3321A-0C0B-4342-893B-39C093D790BC}.exeC:\Windows\{0AD3321A-0C0B-4342-893B-39C093D790BC}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\{6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exeC:\Windows\{6EDFEF8C-283C-48a2-ABE5-C970D4F8131F}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\{6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exeC:\Windows\{6B6C004C-0EF1-4bb4-8274-C2DD0982A555}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\{6FC14133-05D9-4150-8BFF-E855890020FE}.exeC:\Windows\{6FC14133-05D9-4150-8BFF-E855890020FE}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\{2BA04863-D3C6-47f2-9468-1B087D8B854E}.exeC:\Windows\{2BA04863-D3C6-47f2-9468-1B087D8B854E}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\{08102070-2722-48c9-9995-EF496607470F}.exeC:\Windows\{08102070-2722-48c9-9995-EF496607470F}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\{14BEA690-5D75-4ea9-BD7A-ED609E6965C7}.exeC:\Windows\{14BEA690-5D75-4ea9-BD7A-ED609E6965C7}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1044 -
C:\Windows\{04F52658-F76A-415c-845A-696467352D23}.exeC:\Windows\{04F52658-F76A-415c-845A-696467352D23}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2500 -
C:\Windows\{0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}.exeC:\Windows\{0ADFEB8E-C295-4e8a-8D37-B42C92FA7E5C}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:112 -
C:\Windows\{CFF02C66-F0CC-4187-97A1-4757800FA0D7}.exeC:\Windows\{CFF02C66-F0CC-4187-97A1-4757800FA0D7}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0ADFE~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{04F52~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{14BEA~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{08102~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2BA04~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6FC14~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6B6C0~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6EDFE~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0AD33~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{317D0~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\34B44F~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5503e26d76374c164c094f0ceb9ea3bea
SHA1bfa7df08da53742fdbd0d4dead61b5f1a080b9bb
SHA256a36ecf526de314bd7dbee42e3ea6026ac8746a227866215bea34c82942baa686
SHA512458c763e9981fa11183ab3bd74411089319b4f1f070b65e15d21c3d677c0870de20fe395785ecd56c18b1c77f28b10b2f2509ccab9eb88a47212cca8c4aba692
-
Filesize
60KB
MD5a6b42356f849a336a0dcec2f404e5c7b
SHA168ba44a29cbddb2f388fc320a322ba2e8a932ead
SHA25676a7c04757a59111eeb31ff1287a04de0454e010ea3c4ff02edd0bda91f01c35
SHA512643fee8fffb175e052cdcb6ca5f976e614102009ef0469b66ec84959a28ae52fbe70c9389935da7a731420bc555659df9768303c0e2ecad76dd40391d9bf1fef
-
Filesize
60KB
MD58af69026810fae751811141163c6681e
SHA1a406c2ec3951f5d49c94a567cae7f57130979d0d
SHA25694379e45dfb31e269e71afd119d1f4857dffecc451d95111017adae410648951
SHA512061f6092a671e45406dae6f4d039dc715f0fc1ecebeb76b4a4bf3cd20f20a41e4f4b88dea5ed4764e97f34a5aac13cf2a2c6ca9a2b8d63987704ba7e9bae96e5
-
Filesize
60KB
MD53bd20cbefb0b9d69b81e55504cc1ac6f
SHA1eacaff82da7ba33c674086f302433775c6cc95ea
SHA25617a7fd0cd9dbe6af63d61b064f284e572fb7fb4cd244b5c12ef16d2742652725
SHA512549891605c719c616c39d660cdc4d6c8a5f0b4f1ee8496c20cce29c972afb6a443262cba4d0af46a221a8e173efbf426c98ac8da07a878ab2a179a18dbe362e5
-
Filesize
60KB
MD523ec68ea8ccb002de03f88544dcaa4bf
SHA19859f227d3da530a9c5b2a30372018d4014822f8
SHA256382e87337d7a05696024c5b52d9b3fdacc5394e88b065d85b409089b10b4c797
SHA512f530ae0c91b626bcf5cfd36361b4cdfdd1051110a8d4581ed9470e2ea773fbcede91fa102bff3c1eab2cdb703ac1dfca6ab67d4fb4c2b1639207639bacac36e0
-
Filesize
60KB
MD59a693f807552d69704c75d45889b285e
SHA1961fa8c4c6b146cece6706c77251107e7a60c8bf
SHA2567bc58aa2226ce3716c06481a39b1ecca86707424c1e0a42d527317eeb5fd4b38
SHA512042c1cb0738e83763b22decb4c4c9e46adc85e196fa9c05dec43c783954261986d415c744b8f762d5f6e4315e298618eb757bf2211d4292cd39b9e058175e71e
-
Filesize
60KB
MD5c884202524d83870f74ef74c8fecfe60
SHA1f680f6dfed84011a4acf28cac9193c7f8bfecf02
SHA2566b5576378cd04c51ea1aa917f36551c6ebe60e0e1e1c5b38d0515e783e6da72e
SHA512e9dcc9d90116b649f78a646f9c67b6f2753d54ba2893fb9f3634951031fa7cdadba4a80b34df829af84a14e59f197860a419f82b20910f4b8d9860e0970034b4
-
Filesize
60KB
MD5b3ef51bb9b96e0ba0bb21f7b7a06051f
SHA1ae3c83ac883920025c1dc4c82d83714ce361c596
SHA2569a012ebcc5fabaf607baad59eea65c70ce2950f19ff2efd7ca52e52aaf8b5803
SHA512def3341dcf392f0832a7b2258db99a05e75171898348eb8fd835f4dc49ed655fae4b0236cca0513ec102649d4dcbe2ff6e4eab0c416bb0f9b1c8051a9e5147b0
-
Filesize
60KB
MD5799abbaafa13c91b47be9d5c5ac835e4
SHA11bc22ad3eab7fd8b9ddd3332b187cfe1ebd34e50
SHA2562e1cdcfa1f9d5addacd4a4dc325255110334bb461d432b20c4a7dc77f4e0c14c
SHA51200afbfa448f4fd8fcea79a811ec3cada971126b300cd7191d240611f491e3dc4d779645e0563180a3cd5a744bdfd76191f7d35acd9ba8aca31331c4321151dc5
-
Filesize
60KB
MD561eb894cfd3208001c0ef64347169eb7
SHA184b35f22f08186d495bc0cc78b0a2a5b1c29b961
SHA2562ce5e85c53fbb888fa11df118e49359ee1feb87a0a0a4388cadad8f0c387a14e
SHA51229846a025504ece3b1e157c20139dc976e5d80d8b702c3171c4db60756ad0e520d3d6a05541c6cbce55b79cd2b25f94f95f90ca8ba3484fad3f4f3264920eca2
-
Filesize
60KB
MD55dd683aebcac06768f16c8b3a03818e8
SHA1dfb3a4f8ec2e8f05c33058f70036d5058c26177e
SHA256cac647e7418c883eb1bd7ae33183087e7de1c31e962c6fdf5d8d0a074d3e4e14
SHA51233ca470bc111530f027bc3929b644bbd578437641d120d089d0c11dc8b69aa67f6967264356677b1d99f20b321d7b0f6973cd7df1c23c8a4bc89960c9994d6d6