Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
95e2fa2fd0800c554e216fbc1e493e80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
95e2fa2fd0800c554e216fbc1e493e80N.exe
Resource
win10v2004-20240802-en
General
-
Target
95e2fa2fd0800c554e216fbc1e493e80N.exe
-
Size
91KB
-
MD5
95e2fa2fd0800c554e216fbc1e493e80
-
SHA1
e41a3c1facc275b4a0b9daf944cbab7997c9bad7
-
SHA256
439c09f0b94ff1260e5c6b490701b681ca0c1245b21525d8c5584baf5a1fbf1a
-
SHA512
2b62117aa7316d9bd1ea972b6d37407d6f8fbf17933cdc0d2441acdb720e00592fd291cc36267dcbc5555ad10129c9033ac6970a82cc5f06e7b390a51f607421
-
SSDEEP
768:5vw9816uhKiroq4/wQNNrfrunMxVFA3b7t:lEGkmoqlCunMxVS3Ht
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00E82F47-697F-42ef-84BA-890278CEB4AF} {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C8E5816-DBFE-46cb-82CE-C5153872E8AE} {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{033296C5-F32B-4394-8A1D-7F1A52F98B19} {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B322EC3E-CC9B-4cbb-8D9E-34341641382E}\stubpath = "C:\\Windows\\{B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe" 95e2fa2fd0800c554e216fbc1e493e80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}\stubpath = "C:\\Windows\\{22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe" {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{033296C5-F32B-4394-8A1D-7F1A52F98B19}\stubpath = "C:\\Windows\\{033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe" {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{594371B8-0A71-4e0c-80C0-8431F41AE066}\stubpath = "C:\\Windows\\{594371B8-0A71-4e0c-80C0-8431F41AE066}.exe" {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A05FC017-C2A0-4e29-9B09-40E4B50DC852}\stubpath = "C:\\Windows\\{A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe" {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D3F5155-7A18-4dc7-9E6E-F2EA81929717}\stubpath = "C:\\Windows\\{0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe" {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00E82F47-697F-42ef-84BA-890278CEB4AF}\stubpath = "C:\\Windows\\{00E82F47-697F-42ef-84BA-890278CEB4AF}.exe" {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B322EC3E-CC9B-4cbb-8D9E-34341641382E} 95e2fa2fd0800c554e216fbc1e493e80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7E9F8EB-D824-4f56-B151-A8F0904F161A}\stubpath = "C:\\Windows\\{D7E9F8EB-D824-4f56-B151-A8F0904F161A}.exe" {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7E9F8EB-D824-4f56-B151-A8F0904F161A} {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{594371B8-0A71-4e0c-80C0-8431F41AE066} {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C8E5816-DBFE-46cb-82CE-C5153872E8AE}\stubpath = "C:\\Windows\\{8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe" {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A05FC017-C2A0-4e29-9B09-40E4B50DC852} {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D3F5155-7A18-4dc7-9E6E-F2EA81929717} {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22B2432C-5FE0-4a02-9E63-5F06A5FC21F8} {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe -
Executes dropped EXE 9 IoCs
pid Process 3152 {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe 4596 {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe 1632 {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe 4536 {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe 3928 {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe 528 {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe 2488 {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe 1848 {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe 4880 {D7E9F8EB-D824-4f56-B151-A8F0904F161A}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe File created C:\Windows\{B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe 95e2fa2fd0800c554e216fbc1e493e80N.exe File created C:\Windows\{22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe File created C:\Windows\{A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe File created C:\Windows\{0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe File created C:\Windows\{00E82F47-697F-42ef-84BA-890278CEB4AF}.exe {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe File created C:\Windows\{D7E9F8EB-D824-4f56-B151-A8F0904F161A}.exe {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe File created C:\Windows\{594371B8-0A71-4e0c-80C0-8431F41AE066}.exe {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe File created C:\Windows\{8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95e2fa2fd0800c554e216fbc1e493e80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D7E9F8EB-D824-4f56-B151-A8F0904F161A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3268 95e2fa2fd0800c554e216fbc1e493e80N.exe Token: SeIncBasePriorityPrivilege 3152 {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe Token: SeIncBasePriorityPrivilege 4596 {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe Token: SeIncBasePriorityPrivilege 1632 {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe Token: SeIncBasePriorityPrivilege 4536 {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe Token: SeIncBasePriorityPrivilege 3928 {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe Token: SeIncBasePriorityPrivilege 528 {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe Token: SeIncBasePriorityPrivilege 2488 {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe Token: SeIncBasePriorityPrivilege 1848 {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3268 wrote to memory of 3152 3268 95e2fa2fd0800c554e216fbc1e493e80N.exe 87 PID 3268 wrote to memory of 3152 3268 95e2fa2fd0800c554e216fbc1e493e80N.exe 87 PID 3268 wrote to memory of 3152 3268 95e2fa2fd0800c554e216fbc1e493e80N.exe 87 PID 3268 wrote to memory of 1448 3268 95e2fa2fd0800c554e216fbc1e493e80N.exe 88 PID 3268 wrote to memory of 1448 3268 95e2fa2fd0800c554e216fbc1e493e80N.exe 88 PID 3268 wrote to memory of 1448 3268 95e2fa2fd0800c554e216fbc1e493e80N.exe 88 PID 3152 wrote to memory of 4596 3152 {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe 96 PID 3152 wrote to memory of 4596 3152 {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe 96 PID 3152 wrote to memory of 4596 3152 {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe 96 PID 3152 wrote to memory of 828 3152 {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe 97 PID 3152 wrote to memory of 828 3152 {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe 97 PID 3152 wrote to memory of 828 3152 {B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe 97 PID 4596 wrote to memory of 1632 4596 {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe 100 PID 4596 wrote to memory of 1632 4596 {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe 100 PID 4596 wrote to memory of 1632 4596 {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe 100 PID 4596 wrote to memory of 5028 4596 {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe 101 PID 4596 wrote to memory of 5028 4596 {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe 101 PID 4596 wrote to memory of 5028 4596 {22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe 101 PID 1632 wrote to memory of 4536 1632 {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe 105 PID 1632 wrote to memory of 4536 1632 {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe 105 PID 1632 wrote to memory of 4536 1632 {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe 105 PID 1632 wrote to memory of 432 1632 {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe 106 PID 1632 wrote to memory of 432 1632 {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe 106 PID 1632 wrote to memory of 432 1632 {033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe 106 PID 4536 wrote to memory of 3928 4536 {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe 107 PID 4536 wrote to memory of 3928 4536 {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe 107 PID 4536 wrote to memory of 3928 4536 {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe 107 PID 4536 wrote to memory of 916 4536 {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe 108 PID 4536 wrote to memory of 916 4536 {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe 108 PID 4536 wrote to memory of 916 4536 {594371B8-0A71-4e0c-80C0-8431F41AE066}.exe 108 PID 3928 wrote to memory of 528 3928 {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe 109 PID 3928 wrote to memory of 528 3928 {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe 109 PID 3928 wrote to memory of 528 3928 {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe 109 PID 3928 wrote to memory of 3660 3928 {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe 110 PID 3928 wrote to memory of 3660 3928 {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe 110 PID 3928 wrote to memory of 3660 3928 {8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe 110 PID 528 wrote to memory of 2488 528 {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe 112 PID 528 wrote to memory of 2488 528 {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe 112 PID 528 wrote to memory of 2488 528 {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe 112 PID 528 wrote to memory of 4276 528 {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe 113 PID 528 wrote to memory of 4276 528 {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe 113 PID 528 wrote to memory of 4276 528 {A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe 113 PID 2488 wrote to memory of 1848 2488 {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe 114 PID 2488 wrote to memory of 1848 2488 {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe 114 PID 2488 wrote to memory of 1848 2488 {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe 114 PID 2488 wrote to memory of 3512 2488 {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe 115 PID 2488 wrote to memory of 3512 2488 {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe 115 PID 2488 wrote to memory of 3512 2488 {0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe 115 PID 1848 wrote to memory of 4880 1848 {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe 118 PID 1848 wrote to memory of 4880 1848 {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe 118 PID 1848 wrote to memory of 4880 1848 {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe 118 PID 1848 wrote to memory of 1636 1848 {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe 119 PID 1848 wrote to memory of 1636 1848 {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe 119 PID 1848 wrote to memory of 1636 1848 {00E82F47-697F-42ef-84BA-890278CEB4AF}.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\95e2fa2fd0800c554e216fbc1e493e80N.exe"C:\Users\Admin\AppData\Local\Temp\95e2fa2fd0800c554e216fbc1e493e80N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\{B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exeC:\Windows\{B322EC3E-CC9B-4cbb-8D9E-34341641382E}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\{22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exeC:\Windows\{22B2432C-5FE0-4a02-9E63-5F06A5FC21F8}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\{033296C5-F32B-4394-8A1D-7F1A52F98B19}.exeC:\Windows\{033296C5-F32B-4394-8A1D-7F1A52F98B19}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\{594371B8-0A71-4e0c-80C0-8431F41AE066}.exeC:\Windows\{594371B8-0A71-4e0c-80C0-8431F41AE066}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\{8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exeC:\Windows\{8C8E5816-DBFE-46cb-82CE-C5153872E8AE}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\{A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exeC:\Windows\{A05FC017-C2A0-4e29-9B09-40E4B50DC852}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\{0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exeC:\Windows\{0D3F5155-7A18-4dc7-9E6E-F2EA81929717}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\{00E82F47-697F-42ef-84BA-890278CEB4AF}.exeC:\Windows\{00E82F47-697F-42ef-84BA-890278CEB4AF}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\{D7E9F8EB-D824-4f56-B151-A8F0904F161A}.exeC:\Windows\{D7E9F8EB-D824-4f56-B151-A8F0904F161A}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{00E82~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D3F5~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A05FC~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C8E5~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:3660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{59437~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03329~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{22B24~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B322E~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\95E2FA~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5c8dd3b300452d90c5d2e5dad88590207
SHA1d6162b774a0f0ab6a44eea783ee5282232a51aa8
SHA256dcda9eb1e54c341dce14be73490012c5889f9c55da68bf5b7365117d76dba8e9
SHA512dd540cf7378e2f46e257d33d929503449865229d27cad816c5e1489bdd606f5eae8f24eb1e9376459ca5ed9c09797168776578b55ee53ceb0b7aef6e33bcec4a
-
Filesize
91KB
MD536b9b1354cc02c381e3067004b424df7
SHA157223575eb91244f42596df3b34e0918122afef5
SHA2564875470c2fedd759348b94136bb86786e6e61c542a5d9c91d3a0a12b5c620276
SHA51228baaee0e67bee1da0f70c879d3f7b295f4abe4021f3e24831809efb917860beadc0a6bc9d5efb3fbdddfb9c550ae9c8223f545246e98ed08f04869ec48adb63
-
Filesize
91KB
MD5788bd91de016265be78c60478a0a23c6
SHA120e59c1b95cf4eeeeba05188c3d814207967c7e2
SHA2569ddfbb349f33c7a6f7a2d26bf0c4ab3b5c54ed3b93062f6ab27f3b4e76dbc1fe
SHA512645c5437473f7036752bfe3e153723c3bc7584c63a822253929794bf320880e79bbc9e9108409462a46192c8bbda882e6594771e4ef0a18bb6f59449eb6929a3
-
Filesize
91KB
MD5d3fe528b09b00e533f306d56ede0f3dc
SHA10dc802ee0e418c61e5f15ae1d7bb716b5de3db6d
SHA25663f2d18a98371cc4db076528285263dc7a291e0ff20f3eac4bf394ab6039545e
SHA512af9a67a50e5824ee1acf23a1887037ac538616c8ba8da22488bced0ae879c2491388b1afe36d96d517a47862c6431352193fd00b2201058ee7f8e96cd7e21c79
-
Filesize
91KB
MD5b0ac8826d566edad12e3cad7db1d2ec7
SHA17cb304217a9adf0269941d5692476b404941478f
SHA2564d737809eeb6eded5ae35604235d1f00f6b27a2f1f774347734a655cc952c691
SHA512329255ae1569f8e21326aa31cbe17d54d96e900a1d06e2817d004c35be5903311093fee8b97fd5713f09640b03a37575590b96ddc7b6e648b7122f1f9b071c3a
-
Filesize
91KB
MD5b41a059a8ad1e256ad847fc22da7ec08
SHA1cf4e7ecb6c83b5d67b36fad980a7be933bbc3184
SHA2561ee42e3ccde248cbc9efa89d90109ed5736db4b5d92aa8e24a2f6a386736757c
SHA512611e962b1d19a9149542a44ca7f389d4a372749682b42916a4dcb6238d3da12a2361a52cf685b0a8d629a04e582e01d7f9670a75c4a757b13efb1846ecbdd969
-
Filesize
91KB
MD51ace0c04534d70964e982af5b4c8d746
SHA140614fb64c5b398450e1c96274ad6097d67445d1
SHA2564965aa6248b33880dcd9c9cd1f85b70f093d3948cd832753bce783cc5a8e5180
SHA51294cdbae774391bd6074efd41b64107e82040edc41a37186ffa39388f694b709bf025b24b2123773e22a16b25bb4f6757909a32e66ef7f2352992ae3b9f3e65c0
-
Filesize
91KB
MD5f9da2c9d3572232f28ca018b9b359367
SHA14c6ea82b555cd05fdbbcfeb58b78f07b0e78441d
SHA256ba59515ed5cf1a357a21859b87594963845dffc8061fa43c19e137e21cd63be1
SHA512233d67eda4ddf18eea3d2a4bf325e43d75d662614b6b5b01e2bbc50d664b14fa68629fb950f73d5e5c04ad8c5e679332a9cf24d7032bdd5e9d9e4d8cbac02ad0
-
Filesize
91KB
MD5a97099ebfa4beed8a9a112e3f7d69d24
SHA1139a419d801998a92a6f543fae54d7118976e7f5
SHA25643391d058d279d75f818898ba375c75363f62e08439a027c06e75096440663a4
SHA5121969b5962a9bcd1fef7ba6642039a2a7dbc3fb0770496910de250b052e0425c11049356d986d63c7716dd6a4491df996f4fce8af8ebd465c976b8ea2ad9d7b4b