Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe
Resource
win10v2004-20240802-en
General
-
Target
e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe
-
Size
89KB
-
MD5
928dab96bb48ea2bde1269a007dac3f8
-
SHA1
f8ca2ff882b5f5e43622114fdad124d769569e0b
-
SHA256
e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf
-
SHA512
17ad43a5b39e916ee1d80377ec3f03639e5aa9d20e9298d40460522af7fe381d1d4dc770b83a244bdfe4a7915ab5cd6f394fe31d99df15633c1ca72d2286b95e
-
SSDEEP
768:5vw9816thKQLro44/wQkNrfrunMxVFA3k:lEG/0o4lbunMxVS3k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0} e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}\stubpath = "C:\\Windows\\{8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe" e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4EE89ABF-502C-480f-8C6D-AB9560A43A46}\stubpath = "C:\\Windows\\{4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe" {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555} {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{28BD73B5-23C7-4792-BEFE-2A60DECA3618} {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ABCE1242-4783-4795-8FAC-B3908C4F6188} {5AE3FF5F-C842-4581-A4CA-495B408B2640}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}\stubpath = "C:\\Windows\\{0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe" {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{28BD73B5-23C7-4792-BEFE-2A60DECA3618}\stubpath = "C:\\Windows\\{28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe" {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{687B01FC-A924-4045-85B1-13ED889C3B7F}\stubpath = "C:\\Windows\\{687B01FC-A924-4045-85B1-13ED889C3B7F}.exe" {1AD3002C-9C27-4943-93B7-8647F7797324}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C0652B0-2D2A-49d2-8286-F624FA629D9A} {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}\stubpath = "C:\\Windows\\{16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe" {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5AE3FF5F-C842-4581-A4CA-495B408B2640} {16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ABCE1242-4783-4795-8FAC-B3908C4F6188}\stubpath = "C:\\Windows\\{ABCE1242-4783-4795-8FAC-B3908C4F6188}.exe" {5AE3FF5F-C842-4581-A4CA-495B408B2640}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4EE89ABF-502C-480f-8C6D-AB9560A43A46} {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A01B47C-15F1-4640-97F0-9596F1F43D28} {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1AD3002C-9C27-4943-93B7-8647F7797324} {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1AD3002C-9C27-4943-93B7-8647F7797324}\stubpath = "C:\\Windows\\{1AD3002C-9C27-4943-93B7-8647F7797324}.exe" {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C0652B0-2D2A-49d2-8286-F624FA629D9A}\stubpath = "C:\\Windows\\{8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe" {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{869C0485-0133-4d90-B0FB-B330B7E9A9B7} {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75} {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A01B47C-15F1-4640-97F0-9596F1F43D28}\stubpath = "C:\\Windows\\{5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe" {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{687B01FC-A924-4045-85B1-13ED889C3B7F} {1AD3002C-9C27-4943-93B7-8647F7797324}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{869C0485-0133-4d90-B0FB-B330B7E9A9B7}\stubpath = "C:\\Windows\\{869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe" {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5AE3FF5F-C842-4581-A4CA-495B408B2640}\stubpath = "C:\\Windows\\{5AE3FF5F-C842-4581-A4CA-495B408B2640}.exe" {16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe -
Executes dropped EXE 12 IoCs
pid Process 4908 {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe 1600 {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe 960 {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe 4020 {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe 464 {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe 4864 {1AD3002C-9C27-4943-93B7-8647F7797324}.exe 2392 {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe 5084 {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe 1960 {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe 1324 {16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe 2508 {5AE3FF5F-C842-4581-A4CA-495B408B2640}.exe 3324 {ABCE1242-4783-4795-8FAC-B3908C4F6188}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe File created C:\Windows\{4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe File created C:\Windows\{1AD3002C-9C27-4943-93B7-8647F7797324}.exe {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe File created C:\Windows\{869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe File created C:\Windows\{16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe File created C:\Windows\{5AE3FF5F-C842-4581-A4CA-495B408B2640}.exe {16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe File created C:\Windows\{ABCE1242-4783-4795-8FAC-B3908C4F6188}.exe {5AE3FF5F-C842-4581-A4CA-495B408B2640}.exe File created C:\Windows\{0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe File created C:\Windows\{5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe File created C:\Windows\{28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe File created C:\Windows\{687B01FC-A924-4045-85B1-13ED889C3B7F}.exe {1AD3002C-9C27-4943-93B7-8647F7797324}.exe File created C:\Windows\{8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1AD3002C-9C27-4943-93B7-8647F7797324}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5AE3FF5F-C842-4581-A4CA-495B408B2640}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {ABCE1242-4783-4795-8FAC-B3908C4F6188}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3268 e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe Token: SeIncBasePriorityPrivilege 4908 {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe Token: SeIncBasePriorityPrivilege 1600 {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe Token: SeIncBasePriorityPrivilege 960 {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe Token: SeIncBasePriorityPrivilege 4020 {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe Token: SeIncBasePriorityPrivilege 464 {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe Token: SeIncBasePriorityPrivilege 4864 {1AD3002C-9C27-4943-93B7-8647F7797324}.exe Token: SeIncBasePriorityPrivilege 2392 {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe Token: SeIncBasePriorityPrivilege 5084 {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe Token: SeIncBasePriorityPrivilege 1960 {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe Token: SeIncBasePriorityPrivilege 1324 {16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe Token: SeIncBasePriorityPrivilege 2508 {5AE3FF5F-C842-4581-A4CA-495B408B2640}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 4908 3268 e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe 86 PID 3268 wrote to memory of 4908 3268 e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe 86 PID 3268 wrote to memory of 4908 3268 e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe 86 PID 3268 wrote to memory of 264 3268 e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe 87 PID 3268 wrote to memory of 264 3268 e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe 87 PID 3268 wrote to memory of 264 3268 e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe 87 PID 4908 wrote to memory of 1600 4908 {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe 88 PID 4908 wrote to memory of 1600 4908 {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe 88 PID 4908 wrote to memory of 1600 4908 {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe 88 PID 4908 wrote to memory of 3284 4908 {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe 89 PID 4908 wrote to memory of 3284 4908 {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe 89 PID 4908 wrote to memory of 3284 4908 {8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe 89 PID 1600 wrote to memory of 960 1600 {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe 92 PID 1600 wrote to memory of 960 1600 {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe 92 PID 1600 wrote to memory of 960 1600 {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe 92 PID 1600 wrote to memory of 3504 1600 {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe 93 PID 1600 wrote to memory of 3504 1600 {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe 93 PID 1600 wrote to memory of 3504 1600 {4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe 93 PID 960 wrote to memory of 4020 960 {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe 96 PID 960 wrote to memory of 4020 960 {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe 96 PID 960 wrote to memory of 4020 960 {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe 96 PID 960 wrote to memory of 5056 960 {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe 97 PID 960 wrote to memory of 5056 960 {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe 97 PID 960 wrote to memory of 5056 960 {0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe 97 PID 4020 wrote to memory of 464 4020 {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe 98 PID 4020 wrote to memory of 464 4020 {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe 98 PID 4020 wrote to memory of 464 4020 {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe 98 PID 4020 wrote to memory of 4076 4020 {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe 99 PID 4020 wrote to memory of 4076 4020 {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe 99 PID 4020 wrote to memory of 4076 4020 {5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe 99 PID 464 wrote to memory of 4864 464 {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe 100 PID 464 wrote to memory of 4864 464 {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe 100 PID 464 wrote to memory of 4864 464 {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe 100 PID 464 wrote to memory of 3112 464 {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe 101 PID 464 wrote to memory of 3112 464 {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe 101 PID 464 wrote to memory of 3112 464 {28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe 101 PID 4864 wrote to memory of 2392 4864 {1AD3002C-9C27-4943-93B7-8647F7797324}.exe 102 PID 4864 wrote to memory of 2392 4864 {1AD3002C-9C27-4943-93B7-8647F7797324}.exe 102 PID 4864 wrote to memory of 2392 4864 {1AD3002C-9C27-4943-93B7-8647F7797324}.exe 102 PID 4864 wrote to memory of 3300 4864 {1AD3002C-9C27-4943-93B7-8647F7797324}.exe 103 PID 4864 wrote to memory of 3300 4864 {1AD3002C-9C27-4943-93B7-8647F7797324}.exe 103 PID 4864 wrote to memory of 3300 4864 {1AD3002C-9C27-4943-93B7-8647F7797324}.exe 103 PID 2392 wrote to memory of 5084 2392 {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe 104 PID 2392 wrote to memory of 5084 2392 {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe 104 PID 2392 wrote to memory of 5084 2392 {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe 104 PID 2392 wrote to memory of 1936 2392 {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe 105 PID 2392 wrote to memory of 1936 2392 {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe 105 PID 2392 wrote to memory of 1936 2392 {687B01FC-A924-4045-85B1-13ED889C3B7F}.exe 105 PID 5084 wrote to memory of 1960 5084 {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe 106 PID 5084 wrote to memory of 1960 5084 {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe 106 PID 5084 wrote to memory of 1960 5084 {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe 106 PID 5084 wrote to memory of 1732 5084 {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe 107 PID 5084 wrote to memory of 1732 5084 {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe 107 PID 5084 wrote to memory of 1732 5084 {8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe 107 PID 1960 wrote to memory of 1324 1960 {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe 108 PID 1960 wrote to memory of 1324 1960 {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe 108 PID 1960 wrote to memory of 1324 1960 {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe 108 PID 1960 wrote to memory of 264 1960 {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe 109 PID 1960 wrote to memory of 264 1960 {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe 109 PID 1960 wrote to memory of 264 1960 {869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe 109 PID 1324 wrote to memory of 2508 1324 {16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe 110 PID 1324 wrote to memory of 2508 1324 {16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe 110 PID 1324 wrote to memory of 2508 1324 {16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe 110 PID 1324 wrote to memory of 4412 1324 {16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe"C:\Users\Admin\AppData\Local\Temp\e2677e02cd73646fbd848d18898f16313e210e5bf6a7f5121627a38ce7419cdf.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\{8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exeC:\Windows\{8F1C36C1-D5DC-4dc3-B996-FDAF427A6EA0}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\{4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exeC:\Windows\{4EE89ABF-502C-480f-8C6D-AB9560A43A46}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\{0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exeC:\Windows\{0D9AEBE2-3BB3-45bd-9F6A-3F0A3CAA0555}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\{5A01B47C-15F1-4640-97F0-9596F1F43D28}.exeC:\Windows\{5A01B47C-15F1-4640-97F0-9596F1F43D28}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\{28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exeC:\Windows\{28BD73B5-23C7-4792-BEFE-2A60DECA3618}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\{1AD3002C-9C27-4943-93B7-8647F7797324}.exeC:\Windows\{1AD3002C-9C27-4943-93B7-8647F7797324}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\{687B01FC-A924-4045-85B1-13ED889C3B7F}.exeC:\Windows\{687B01FC-A924-4045-85B1-13ED889C3B7F}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\{8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exeC:\Windows\{8C0652B0-2D2A-49d2-8286-F624FA629D9A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\{869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exeC:\Windows\{869C0485-0133-4d90-B0FB-B330B7E9A9B7}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\{16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exeC:\Windows\{16CE0F8F-69A1-4ddf-BEF3-FEE774E7CA75}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\{5AE3FF5F-C842-4581-A4CA-495B408B2640}.exeC:\Windows\{5AE3FF5F-C842-4581-A4CA-495B408B2640}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2508 -
C:\Windows\{ABCE1242-4783-4795-8FAC-B3908C4F6188}.exeC:\Windows\{ABCE1242-4783-4795-8FAC-B3908C4F6188}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5AE3F~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16CE0~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{869C0~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C065~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{687B0~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1AD30~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{28BD7~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:3112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A01B~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D9AE~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4EE89~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F1C3~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\E2677E~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5c0a1c4871192ce0d497ba098a7be9404
SHA1b19ef6fa797531177dc86af3661a87cefcc66b2e
SHA25617fd2c39cbeb59f796672ad947427e2b7b05d4eee79dac3c3594077f2f956123
SHA5126b0ff26d728ea207313fdb8fce34ff7cb23ad9e44d69591bc8a83c2adc5441b67d2a64cd59ca712e2438733ccb4e548e3fb2dc5bae697a8ea427948d00400539
-
Filesize
89KB
MD5b1b43ca8c5aa537d5e2990291d664331
SHA1426be0095e0854aee0a9afa8f0725bc7d2d90d9e
SHA25630064cb01c4709bacfc7b41ef0b0c38d84d13ad7c1005b7f2245f87ba4ddc847
SHA512b7eef280ace89ac15fcfc8789707d7f9375dfcfb750963a73e2a85f0a9b6904c09ac755ecaf6a33c890a7c1e7f9aed899f819e87d2648f0be814d11c99b971d9
-
Filesize
89KB
MD5dc1e9fe476e977aeb42e192b0b2c3536
SHA15b4d606d78afd4ba58a8a02e6bb16c77c6b17b5d
SHA256a18da8368caf4a0164719745b0fbd0aa90dc13fdb5d76a8ec1bc31f285e6b091
SHA512da5520e1eb39322d340a8e5257b636b03b148c14f5c612f9b24855e78f4b910916bb6e2956edc064ee04bde22e69c5b1eec26da0bd9078484643115147607137
-
Filesize
89KB
MD57f20346fb0c64cc5986af4343eeb3708
SHA1df0a4530c1a705638c3c415cd2ca396e2f75c0da
SHA2561951996577e43eed37a77987c8b5fd21d03be8a9dcb4f18eace9f61ff93230c6
SHA51221725d2427a90746a29140650beb0a83090ab662862a16034968133f36589ce850b1f7ce576a5d6d9f1d5fef2f59343015746849cae667315341a5a593435124
-
Filesize
89KB
MD55b0cfd3d941617e8170ee42345eeadc6
SHA1973ef38a918e0b2f2bb227b413701877519f18ed
SHA256ac58519e44c7cbdc52b8ea30d1650a4e3b86d87ee371db24c7930336398dcc3b
SHA5122b80004d8d293b6d18b1f306f66dea480c4b493c93225febb2589a6483b1346e999c1101db98eb8619bbe7986bb59fc1c5479dd927dc163cea26bcd8ee9025dd
-
Filesize
89KB
MD5057d1626e316a1ce6755b1f776650a72
SHA16b4e1edc3789f329f79aa39318665dc1b2f43ce6
SHA2567707ff0153ccfbdc3e8cb3990e852e76a56e8dad9266ccec53b59685c109dfe4
SHA512d2ef5dfe6b9926fea9cda49a2568fd5910f02965b179141f25ad20587e991d89098250890050af3edd47bad43ae53c63c680346474c185c01d6111a8b54286c6
-
Filesize
89KB
MD50c1b010fe5d8a7af5c75aa9ed69dd2dd
SHA1719f035a25c9b9b9852088cae32b5e39077d223e
SHA2560948f0b0c66e4e6d8ee7f63e21296ce8c60a9eb6a085cd105d45f71f765089ee
SHA5129d1bd3d00adcd7a8b1b6353c33685dd1bc6487da120f781c0ee57affabee8569eeeb45ded16b18399f7647e7e35870da82907090461d5c0d9f800e2553be3c96
-
Filesize
89KB
MD506faf12555046d947856e2972098c794
SHA165755c91b289e841e805a895f2a398d31db1d269
SHA256d58e5126e375b4d68b28ae513356f1d03330ca4ed1a94aede1cab2f4ffecacb0
SHA51281554aff22edccfa14ba58cbdfafc468b717be1a04bd97b5427bdde63db24c66e500a828f6aa836e063cc920b4a75ba7c45e1566c0eda4517747637977a2ea25
-
Filesize
89KB
MD5c0e615c0e324b01eb87d71ba8fc6608d
SHA1dfb4c01090e2e7ffc98eba8bb98543fe9920444c
SHA25699c3a9ef69682502965579e8044a6c7f7353586dde310ce5f9c895295f70a560
SHA512d099654825def8278c36cf1ff7009316301ec3d8787d6704356d3466f7ddfffe87313c41461a970a6fdaa9800ba313092e4f805f2d03685fc3a9d747863e7db2
-
Filesize
89KB
MD59b2eabff67647e00b1ab4016b6822869
SHA1c62a83316353dcf39c00e534c626f9d99a2c2f8e
SHA256198e4ebc430703e5c344687c8e97810fcf836fc5cbe371087d8fca98f5e2432b
SHA5125f75eda092a1a4ef6a712a7778c7bf751ba4b447930ae0c5b1b545d708486979da9e30b969cd98c57f2d9748e30448274c34987e76fbde8fcdbf4b57f0c5014a
-
Filesize
89KB
MD57857d69c9289546c026eb909291b721b
SHA1491e5f96ce8f35818412e8228d19eeb1d80c22e5
SHA256a988b27c39b974d1d1757e015dac0e6584f9064a373860d098b4060d2f6a36a2
SHA512962e3349d688621ffbfa1a31e3d6b2fb1ba760c51b055cd6cd7561c611da250a5bc0a1a4a4a07cd7b073c8a6c3f91bf13a7b6feba318a373fc72606ce9d26084
-
Filesize
89KB
MD580d7c501fe6fbff133b2ffacf0a28a76
SHA1be7b70f9fcc37612ba21d53601f7cdb351bc25ba
SHA256bfb151237e609c56c455c840060da4bb34f642769e0039d994caf11cf973528e
SHA51286f140f90b38fd478e9de432418b34c0215a3e15183a586d137a54a379b091f37fd46948824eaa96d456db67ee723350aa9544a04b2a3c9e9c74142dd658051c