Analysis
-
max time kernel
118s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
40b15579d6bc74f709cadebf3d9af8e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40b15579d6bc74f709cadebf3d9af8e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
40b15579d6bc74f709cadebf3d9af8e0N.exe
-
Size
89KB
-
MD5
40b15579d6bc74f709cadebf3d9af8e0
-
SHA1
a5670b35352bf55f3a528ea8dec3857f2f1596c4
-
SHA256
731015f43c7f27e90928260025a5de730cf2e26c5e9b68479bcaf5350625b609
-
SHA512
14b52f4c9526468ee7cde533965f15993fe267a77c78270afddd64cde4d6074e472ebb68bf7f3c840815a44f5d5277ab107719b25569b738a33c92e56a8e051a
-
SSDEEP
768:Qvw9816vhKQLroy4/wQRNrfrunMxVFA3b7glL:YEGh0oyl2unMxVS3Hg9
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{84D78053-DA04-41f3-AB46-05F5309E37D6}\stubpath = "C:\\Windows\\{84D78053-DA04-41f3-AB46-05F5309E37D6}.exe" 40b15579d6bc74f709cadebf3d9af8e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{349F41DC-3D66-4e9c-A30C-EB879D0F2C6D} {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}\stubpath = "C:\\Windows\\{349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe" {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06665BC6-246C-4abf-862B-05952B7E2F93}\stubpath = "C:\\Windows\\{06665BC6-246C-4abf-862B-05952B7E2F93}.exe" {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BB8795C-592B-482e-82A7-E65DDB96C162} {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{17679EC4-A89C-4412-A6A5-BB78AB18334E} {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{17679EC4-A89C-4412-A6A5-BB78AB18334E}\stubpath = "C:\\Windows\\{17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe" {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B22C292A-E108-4d42-B099-5AC5A4EDA821} {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2} {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{85BC5396-33A8-4a61-A8C8-F6F042175600}\stubpath = "C:\\Windows\\{85BC5396-33A8-4a61-A8C8-F6F042175600}.exe" {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12} {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}\stubpath = "C:\\Windows\\{C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe" {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{84D78053-DA04-41f3-AB46-05F5309E37D6} 40b15579d6bc74f709cadebf3d9af8e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BB8795C-592B-482e-82A7-E65DDB96C162}\stubpath = "C:\\Windows\\{4BB8795C-592B-482e-82A7-E65DDB96C162}.exe" {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B22C292A-E108-4d42-B099-5AC5A4EDA821}\stubpath = "C:\\Windows\\{B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe" {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{85BC5396-33A8-4a61-A8C8-F6F042175600} {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}\stubpath = "C:\\Windows\\{A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe" {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06665BC6-246C-4abf-862B-05952B7E2F93} {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe -
Executes dropped EXE 9 IoCs
pid Process 4612 {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe 4808 {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe 1052 {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe 2336 {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe 4856 {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe 3172 {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe 724 {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe 2392 {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe 388 {06665BC6-246C-4abf-862B-05952B7E2F93}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{85BC5396-33A8-4a61-A8C8-F6F042175600}.exe {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe File created C:\Windows\{C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe File created C:\Windows\{A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe File created C:\Windows\{4BB8795C-592B-482e-82A7-E65DDB96C162}.exe {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe File created C:\Windows\{17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe File created C:\Windows\{B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe File created C:\Windows\{349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe File created C:\Windows\{06665BC6-246C-4abf-862B-05952B7E2F93}.exe {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe File created C:\Windows\{84D78053-DA04-41f3-AB46-05F5309E37D6}.exe 40b15579d6bc74f709cadebf3d9af8e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {06665BC6-246C-4abf-862B-05952B7E2F93}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40b15579d6bc74f709cadebf3d9af8e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 888 40b15579d6bc74f709cadebf3d9af8e0N.exe Token: SeIncBasePriorityPrivilege 4612 {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe Token: SeIncBasePriorityPrivilege 4808 {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe Token: SeIncBasePriorityPrivilege 1052 {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe Token: SeIncBasePriorityPrivilege 2336 {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe Token: SeIncBasePriorityPrivilege 4856 {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe Token: SeIncBasePriorityPrivilege 3172 {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe Token: SeIncBasePriorityPrivilege 724 {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe Token: SeIncBasePriorityPrivilege 2392 {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 888 wrote to memory of 4612 888 40b15579d6bc74f709cadebf3d9af8e0N.exe 92 PID 888 wrote to memory of 4612 888 40b15579d6bc74f709cadebf3d9af8e0N.exe 92 PID 888 wrote to memory of 4612 888 40b15579d6bc74f709cadebf3d9af8e0N.exe 92 PID 888 wrote to memory of 4848 888 40b15579d6bc74f709cadebf3d9af8e0N.exe 93 PID 888 wrote to memory of 4848 888 40b15579d6bc74f709cadebf3d9af8e0N.exe 93 PID 888 wrote to memory of 4848 888 40b15579d6bc74f709cadebf3d9af8e0N.exe 93 PID 4612 wrote to memory of 4808 4612 {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe 96 PID 4612 wrote to memory of 4808 4612 {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe 96 PID 4612 wrote to memory of 4808 4612 {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe 96 PID 4612 wrote to memory of 3228 4612 {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe 97 PID 4612 wrote to memory of 3228 4612 {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe 97 PID 4612 wrote to memory of 3228 4612 {84D78053-DA04-41f3-AB46-05F5309E37D6}.exe 97 PID 4808 wrote to memory of 1052 4808 {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe 100 PID 4808 wrote to memory of 1052 4808 {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe 100 PID 4808 wrote to memory of 1052 4808 {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe 100 PID 4808 wrote to memory of 3108 4808 {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe 101 PID 4808 wrote to memory of 3108 4808 {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe 101 PID 4808 wrote to memory of 3108 4808 {4BB8795C-592B-482e-82A7-E65DDB96C162}.exe 101 PID 1052 wrote to memory of 2336 1052 {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe 104 PID 1052 wrote to memory of 2336 1052 {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe 104 PID 1052 wrote to memory of 2336 1052 {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe 104 PID 1052 wrote to memory of 1420 1052 {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe 105 PID 1052 wrote to memory of 1420 1052 {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe 105 PID 1052 wrote to memory of 1420 1052 {17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe 105 PID 2336 wrote to memory of 4856 2336 {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe 106 PID 2336 wrote to memory of 4856 2336 {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe 106 PID 2336 wrote to memory of 4856 2336 {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe 106 PID 2336 wrote to memory of 2860 2336 {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe 107 PID 2336 wrote to memory of 2860 2336 {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe 107 PID 2336 wrote to memory of 2860 2336 {B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe 107 PID 4856 wrote to memory of 3172 4856 {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe 109 PID 4856 wrote to memory of 3172 4856 {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe 109 PID 4856 wrote to memory of 3172 4856 {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe 109 PID 4856 wrote to memory of 212 4856 {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe 110 PID 4856 wrote to memory of 212 4856 {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe 110 PID 4856 wrote to memory of 212 4856 {85BC5396-33A8-4a61-A8C8-F6F042175600}.exe 110 PID 3172 wrote to memory of 724 3172 {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe 111 PID 3172 wrote to memory of 724 3172 {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe 111 PID 3172 wrote to memory of 724 3172 {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe 111 PID 3172 wrote to memory of 532 3172 {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe 112 PID 3172 wrote to memory of 532 3172 {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe 112 PID 3172 wrote to memory of 532 3172 {349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe 112 PID 724 wrote to memory of 2392 724 {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe 113 PID 724 wrote to memory of 2392 724 {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe 113 PID 724 wrote to memory of 2392 724 {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe 113 PID 724 wrote to memory of 220 724 {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe 114 PID 724 wrote to memory of 220 724 {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe 114 PID 724 wrote to memory of 220 724 {C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe 114 PID 2392 wrote to memory of 388 2392 {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe 123 PID 2392 wrote to memory of 388 2392 {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe 123 PID 2392 wrote to memory of 388 2392 {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe 123 PID 2392 wrote to memory of 4040 2392 {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe 124 PID 2392 wrote to memory of 4040 2392 {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe 124 PID 2392 wrote to memory of 4040 2392 {A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\40b15579d6bc74f709cadebf3d9af8e0N.exe"C:\Users\Admin\AppData\Local\Temp\40b15579d6bc74f709cadebf3d9af8e0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\{84D78053-DA04-41f3-AB46-05F5309E37D6}.exeC:\Windows\{84D78053-DA04-41f3-AB46-05F5309E37D6}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\{4BB8795C-592B-482e-82A7-E65DDB96C162}.exeC:\Windows\{4BB8795C-592B-482e-82A7-E65DDB96C162}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\{17679EC4-A89C-4412-A6A5-BB78AB18334E}.exeC:\Windows\{17679EC4-A89C-4412-A6A5-BB78AB18334E}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\{B22C292A-E108-4d42-B099-5AC5A4EDA821}.exeC:\Windows\{B22C292A-E108-4d42-B099-5AC5A4EDA821}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\{85BC5396-33A8-4a61-A8C8-F6F042175600}.exeC:\Windows\{85BC5396-33A8-4a61-A8C8-F6F042175600}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\{349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exeC:\Windows\{349F41DC-3D66-4e9c-A30C-EB879D0F2C6D}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\{C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exeC:\Windows\{C3ABFD48-FEFB-45d5-BFF9-114ED50CAB12}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\{A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exeC:\Windows\{A0451AAF-3BFC-4819-82CB-6F9CF40CCBC2}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\{06665BC6-246C-4abf-862B-05952B7E2F93}.exeC:\Windows\{06665BC6-246C-4abf-862B-05952B7E2F93}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A0451~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C3ABF~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{349F4~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{85BC5~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B22C2~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{17679~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4BB87~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{84D78~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\40B155~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5b3ea620e7b2d124ddc587f52efc3ffac
SHA154d63a892d7e6a9db5029a0584faf7b0d4de01f2
SHA2564dbda16446f5bec9141d2fed661965818c19898e69395ef10f4a8d23711ca78b
SHA5122f9a993f55cb4c05097c55790f133e92dd256adcd2d1a8a804c4a6ae31c15208b7c99add1624bdf7a3c93670aea0edc665901868a842a4b9a2ffc204b3ff4e66
-
Filesize
89KB
MD590acb11801db10e0772d89a4fe5107ba
SHA12f11fa1d77997642a2b83a7f25b16d63dc8b5b10
SHA2560cba9b82db6db18956ec23554fd30ea2a22206653a3bda442e980f58bd21ab11
SHA51219cae56eb3ee100d9a341af3b1ee373188a9fbbc4f150eb43babbda8cfb7d32ecfbbfb905df3ac3ac3d5c58797a96d0c03cc4bd9770a01f6ad28fc9a269e039c
-
Filesize
89KB
MD5db237cfdb3a81698b85da0dfccac9bff
SHA15c06c5fd2f7eb6219d286e13ed9d92b2ae5fad64
SHA2561256228cc26ce37d9844e315517b25443cc3446670c39c41ff5677c0fbb5fd21
SHA512a07cd4347c5362b3250040fb83cb77834a6528d86d638798590813e5d9e0c735224a938dec4dfe10e16e0ed11ec21db41e9d53186bc872904a265a9aa90665f8
-
Filesize
89KB
MD5d6e019051f80bd2b78e04e388d4684ca
SHA13bc9a89fa6e0b1cc564613cad075456a142a7f76
SHA25693ee3d4282d2e44e22e670b13755aa65d3b61068cc87a2804690c1f76f6ddcc6
SHA512aa5d2c19ab92befefd62d2de508f27ff5e771807b53bffa3325252af04eaf6930a2cb7e5412f34b138ab1d0eceae65a9ce07ad8146da58dcff190c1e68467cc3
-
Filesize
89KB
MD50268a5a3c5d8cb16596e22a73f7d3b3f
SHA11663a15f72a0a2dff474f2b3c1e497ed8887375d
SHA256e665731b3591354fc5c574bd985905d95ca44616f7a0a1cc18ab5b292dedba93
SHA512743baee2fe61dba5f9e34f8f212c22c906888fbb1cd573b6eb2cb7ca6ff8c132f0d1dde3018659156c46e713a7a82c8d084593243147a9bcdc06a3f4910410b7
-
Filesize
89KB
MD52e23443ae7b6b35c65e86bf7b965bcbd
SHA15d08e11fa15584f9682c3cf5c17ca81a5f870873
SHA25600c6563bcd3e9da928941748624f77a6fee94cea5f6003493d7746b7b3b6fc34
SHA5122c2644092dbdde654c843c71dc933eda02739b87c4dc80b6b309fe46ca69778dcdc8bda69ea537608a72be54c1535cd890edaff57b37437766d0e555e35495eb
-
Filesize
89KB
MD5cd9ecc604a2214e63c39fb5cb9f38abd
SHA184ac3bf1a5c20d152a67d37665ebf002dea08c40
SHA256d6fb33ee0af5cc6e911ccf11a6647b91ce6efb7e711b57b5f2075040875f0502
SHA51295c658dd58ce4056dd0ce0139e1c9d7beaa0ded6b1c0e69f1b2b268d70fff8495406d7612d091fedabc432e90e912162df00b89e8d7f1b9db3846077a7a603d1
-
Filesize
89KB
MD5a1689d8bf72bf52964582b817e035760
SHA1c78138b067885740e6fff4d2e1697d617c82b6fb
SHA25675d168bfd66670c8318644198960ec12c7e9428c103ce6d986819592d2ec7953
SHA512153750747e3fe69cfe5e70b8d832eaeb081b7bdca90e5b546ed81c78b0d9abd751e5ef558b56ee1ac526f948d313fe734776ff39b8961e69d4c1be963ed2ed40
-
Filesize
89KB
MD542da8bede4ec126ad2ab5ffef01a1bab
SHA1f138c5abd378beea621a4c8ebc36dc488b7a337f
SHA256db715d1c2c2389c618b4b6f49832ca1363565342c935b31d2d696a8ed5a2a4c0
SHA5123b799c774840b4d6e93ae6a12e3bd6b914945757b5d5bf32164b1aad99bfa890c80d70323cd0f14161b2bab83b860ff5607602fe9e6c93adfa95b0b2127e11f2