Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe
Resource
win10v2004-20240802-en
General
-
Target
1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe
-
Size
89KB
-
MD5
32b303ede20868b12edeb8608645087a
-
SHA1
f788286ccadff96d48d137b63c006e1bcc754412
-
SHA256
1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b
-
SHA512
64866008249c27915c861fd21c5afee8641f046e36a48f81da922df10411ab1aa86f6ea6c85a24799e89eb14115ba9eec4eab68cd23dc3b4978e825ed57e466e
-
SSDEEP
768:5vw9816thKQLron4/wQkNrfrunMxVFA3k:lEG/0onlbunMxVS3k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3BC4CA7F-300F-4b8d-9589-05648B1976A4} {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AFE2448B-9052-4a61-ABB4-847487A30F02} {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{408DBCD1-434F-4030-98FD-CAB2DFDA354F} {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C9D77923-AF14-4574-A8DC-E7CC1848A04C} {D4E9CFDF-20FA-4bc6-8371-57F4E2128676}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C9D77923-AF14-4574-A8DC-E7CC1848A04C}\stubpath = "C:\\Windows\\{C9D77923-AF14-4574-A8DC-E7CC1848A04C}.exe" {D4E9CFDF-20FA-4bc6-8371-57F4E2128676}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFF74FA5-52FC-49f5-A08A-9B8F8D0EA06E}\stubpath = "C:\\Windows\\{CFF74FA5-52FC-49f5-A08A-9B8F8D0EA06E}.exe" {5E1648E9-D0B7-43d4-9031-8785A4826702}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A80399D5-AB69-4c15-ACB0-C24B7048A886}\stubpath = "C:\\Windows\\{A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe" 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AFE2448B-9052-4a61-ABB4-847487A30F02}\stubpath = "C:\\Windows\\{AFE2448B-9052-4a61-ABB4-847487A30F02}.exe" {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4E9CFDF-20FA-4bc6-8371-57F4E2128676}\stubpath = "C:\\Windows\\{D4E9CFDF-20FA-4bc6-8371-57F4E2128676}.exe" {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E1648E9-D0B7-43d4-9031-8785A4826702}\stubpath = "C:\\Windows\\{5E1648E9-D0B7-43d4-9031-8785A4826702}.exe" {C9D77923-AF14-4574-A8DC-E7CC1848A04C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFF74FA5-52FC-49f5-A08A-9B8F8D0EA06E} {5E1648E9-D0B7-43d4-9031-8785A4826702}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A80399D5-AB69-4c15-ACB0-C24B7048A886} 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E99127B-F502-4e50-A906-14DBE90719E9}\stubpath = "C:\\Windows\\{5E99127B-F502-4e50-A906-14DBE90719E9}.exe" {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81D64FBC-170D-4551-A1C9-6555ACE2336C}\stubpath = "C:\\Windows\\{81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe" {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E1648E9-D0B7-43d4-9031-8785A4826702} {C9D77923-AF14-4574-A8DC-E7CC1848A04C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E99127B-F502-4e50-A906-14DBE90719E9} {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E1182E1-7EC4-4d8e-AE9D-32FED55C672B} {5E99127B-F502-4e50-A906-14DBE90719E9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}\stubpath = "C:\\Windows\\{7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe" {5E99127B-F502-4e50-A906-14DBE90719E9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3BC4CA7F-300F-4b8d-9589-05648B1976A4}\stubpath = "C:\\Windows\\{3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe" {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81D64FBC-170D-4551-A1C9-6555ACE2336C} {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{408DBCD1-434F-4030-98FD-CAB2DFDA354F}\stubpath = "C:\\Windows\\{408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe" {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4E9CFDF-20FA-4bc6-8371-57F4E2128676} {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe -
Deletes itself 1 IoCs
pid Process 2688 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2932 {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe 2816 {5E99127B-F502-4e50-A906-14DBE90719E9}.exe 3008 {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe 1988 {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe 2124 {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe 2448 {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe 2616 {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe 480 {D4E9CFDF-20FA-4bc6-8371-57F4E2128676}.exe 2004 {C9D77923-AF14-4574-A8DC-E7CC1848A04C}.exe 2260 {5E1648E9-D0B7-43d4-9031-8785A4826702}.exe 908 {CFF74FA5-52FC-49f5-A08A-9B8F8D0EA06E}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe File created C:\Windows\{5E99127B-F502-4e50-A906-14DBE90719E9}.exe {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe File created C:\Windows\{C9D77923-AF14-4574-A8DC-E7CC1848A04C}.exe {D4E9CFDF-20FA-4bc6-8371-57F4E2128676}.exe File created C:\Windows\{408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe File created C:\Windows\{D4E9CFDF-20FA-4bc6-8371-57F4E2128676}.exe {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe File created C:\Windows\{5E1648E9-D0B7-43d4-9031-8785A4826702}.exe {C9D77923-AF14-4574-A8DC-E7CC1848A04C}.exe File created C:\Windows\{CFF74FA5-52FC-49f5-A08A-9B8F8D0EA06E}.exe {5E1648E9-D0B7-43d4-9031-8785A4826702}.exe File created C:\Windows\{7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe {5E99127B-F502-4e50-A906-14DBE90719E9}.exe File created C:\Windows\{3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe File created C:\Windows\{AFE2448B-9052-4a61-ABB4-847487A30F02}.exe {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe File created C:\Windows\{81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C9D77923-AF14-4574-A8DC-E7CC1848A04C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CFF74FA5-52FC-49f5-A08A-9B8F8D0EA06E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5E99127B-F502-4e50-A906-14DBE90719E9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5E1648E9-D0B7-43d4-9031-8785A4826702}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D4E9CFDF-20FA-4bc6-8371-57F4E2128676}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2152 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe Token: SeIncBasePriorityPrivilege 2932 {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe Token: SeIncBasePriorityPrivilege 2816 {5E99127B-F502-4e50-A906-14DBE90719E9}.exe Token: SeIncBasePriorityPrivilege 3008 {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe Token: SeIncBasePriorityPrivilege 1988 {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe Token: SeIncBasePriorityPrivilege 2124 {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe Token: SeIncBasePriorityPrivilege 2448 {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe Token: SeIncBasePriorityPrivilege 2616 {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe Token: SeIncBasePriorityPrivilege 480 {D4E9CFDF-20FA-4bc6-8371-57F4E2128676}.exe Token: SeIncBasePriorityPrivilege 2004 {C9D77923-AF14-4574-A8DC-E7CC1848A04C}.exe Token: SeIncBasePriorityPrivilege 2260 {5E1648E9-D0B7-43d4-9031-8785A4826702}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2932 2152 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe 30 PID 2152 wrote to memory of 2932 2152 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe 30 PID 2152 wrote to memory of 2932 2152 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe 30 PID 2152 wrote to memory of 2932 2152 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe 30 PID 2152 wrote to memory of 2688 2152 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe 31 PID 2152 wrote to memory of 2688 2152 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe 31 PID 2152 wrote to memory of 2688 2152 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe 31 PID 2152 wrote to memory of 2688 2152 1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe 31 PID 2932 wrote to memory of 2816 2932 {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe 32 PID 2932 wrote to memory of 2816 2932 {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe 32 PID 2932 wrote to memory of 2816 2932 {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe 32 PID 2932 wrote to memory of 2816 2932 {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe 32 PID 2932 wrote to memory of 2600 2932 {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe 33 PID 2932 wrote to memory of 2600 2932 {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe 33 PID 2932 wrote to memory of 2600 2932 {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe 33 PID 2932 wrote to memory of 2600 2932 {A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe 33 PID 2816 wrote to memory of 3008 2816 {5E99127B-F502-4e50-A906-14DBE90719E9}.exe 34 PID 2816 wrote to memory of 3008 2816 {5E99127B-F502-4e50-A906-14DBE90719E9}.exe 34 PID 2816 wrote to memory of 3008 2816 {5E99127B-F502-4e50-A906-14DBE90719E9}.exe 34 PID 2816 wrote to memory of 3008 2816 {5E99127B-F502-4e50-A906-14DBE90719E9}.exe 34 PID 2816 wrote to memory of 2028 2816 {5E99127B-F502-4e50-A906-14DBE90719E9}.exe 35 PID 2816 wrote to memory of 2028 2816 {5E99127B-F502-4e50-A906-14DBE90719E9}.exe 35 PID 2816 wrote to memory of 2028 2816 {5E99127B-F502-4e50-A906-14DBE90719E9}.exe 35 PID 2816 wrote to memory of 2028 2816 {5E99127B-F502-4e50-A906-14DBE90719E9}.exe 35 PID 3008 wrote to memory of 1988 3008 {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe 36 PID 3008 wrote to memory of 1988 3008 {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe 36 PID 3008 wrote to memory of 1988 3008 {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe 36 PID 3008 wrote to memory of 1988 3008 {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe 36 PID 3008 wrote to memory of 1540 3008 {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe 37 PID 3008 wrote to memory of 1540 3008 {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe 37 PID 3008 wrote to memory of 1540 3008 {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe 37 PID 3008 wrote to memory of 1540 3008 {7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe 37 PID 1988 wrote to memory of 2124 1988 {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe 38 PID 1988 wrote to memory of 2124 1988 {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe 38 PID 1988 wrote to memory of 2124 1988 {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe 38 PID 1988 wrote to memory of 2124 1988 {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe 38 PID 1988 wrote to memory of 2108 1988 {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe 39 PID 1988 wrote to memory of 2108 1988 {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe 39 PID 1988 wrote to memory of 2108 1988 {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe 39 PID 1988 wrote to memory of 2108 1988 {3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe 39 PID 2124 wrote to memory of 2448 2124 {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe 40 PID 2124 wrote to memory of 2448 2124 {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe 40 PID 2124 wrote to memory of 2448 2124 {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe 40 PID 2124 wrote to memory of 2448 2124 {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe 40 PID 2124 wrote to memory of 916 2124 {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe 41 PID 2124 wrote to memory of 916 2124 {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe 41 PID 2124 wrote to memory of 916 2124 {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe 41 PID 2124 wrote to memory of 916 2124 {AFE2448B-9052-4a61-ABB4-847487A30F02}.exe 41 PID 2448 wrote to memory of 2616 2448 {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe 42 PID 2448 wrote to memory of 2616 2448 {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe 42 PID 2448 wrote to memory of 2616 2448 {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe 42 PID 2448 wrote to memory of 2616 2448 {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe 42 PID 2448 wrote to memory of 2144 2448 {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe 43 PID 2448 wrote to memory of 2144 2448 {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe 43 PID 2448 wrote to memory of 2144 2448 {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe 43 PID 2448 wrote to memory of 2144 2448 {81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe 43 PID 2616 wrote to memory of 480 2616 {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe 44 PID 2616 wrote to memory of 480 2616 {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe 44 PID 2616 wrote to memory of 480 2616 {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe 44 PID 2616 wrote to memory of 480 2616 {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe 44 PID 2616 wrote to memory of 532 2616 {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe 45 PID 2616 wrote to memory of 532 2616 {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe 45 PID 2616 wrote to memory of 532 2616 {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe 45 PID 2616 wrote to memory of 532 2616 {408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe"C:\Users\Admin\AppData\Local\Temp\1ebc3ec1ade020c5c11557b640653636a44c83a74a5fce66e399666e1c66014b.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\{A80399D5-AB69-4c15-ACB0-C24B7048A886}.exeC:\Windows\{A80399D5-AB69-4c15-ACB0-C24B7048A886}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\{5E99127B-F502-4e50-A906-14DBE90719E9}.exeC:\Windows\{5E99127B-F502-4e50-A906-14DBE90719E9}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\{7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exeC:\Windows\{7E1182E1-7EC4-4d8e-AE9D-32FED55C672B}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\{3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exeC:\Windows\{3BC4CA7F-300F-4b8d-9589-05648B1976A4}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\{AFE2448B-9052-4a61-ABB4-847487A30F02}.exeC:\Windows\{AFE2448B-9052-4a61-ABB4-847487A30F02}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\{81D64FBC-170D-4551-A1C9-6555ACE2336C}.exeC:\Windows\{81D64FBC-170D-4551-A1C9-6555ACE2336C}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\{408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exeC:\Windows\{408DBCD1-434F-4030-98FD-CAB2DFDA354F}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\{D4E9CFDF-20FA-4bc6-8371-57F4E2128676}.exeC:\Windows\{D4E9CFDF-20FA-4bc6-8371-57F4E2128676}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:480 -
C:\Windows\{C9D77923-AF14-4574-A8DC-E7CC1848A04C}.exeC:\Windows\{C9D77923-AF14-4574-A8DC-E7CC1848A04C}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\{5E1648E9-D0B7-43d4-9031-8785A4826702}.exeC:\Windows\{5E1648E9-D0B7-43d4-9031-8785A4826702}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2260 -
C:\Windows\{CFF74FA5-52FC-49f5-A08A-9B8F8D0EA06E}.exeC:\Windows\{CFF74FA5-52FC-49f5-A08A-9B8F8D0EA06E}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5E164~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C9D77~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4E9C~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{408DB~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81D64~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AFE24~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3BC4C~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E118~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5E991~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8039~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\1EBC3E~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD54563247521d080e91974e106624700a5
SHA1a6b75c68edeba2a52c8f310a2f5de00be18cf26f
SHA2561a1fe7d1ab46954b4d7fb0c8e976db1aed686047e06d4d785d4ca74061d2bd9c
SHA512b26f622634462d12629a329d1a834e72ab3a6dd1bb89190f33326d455b56c0fb2c561dacc032e991a6ca01cefa0f64330f4ccc0ab1bf9f617f3dd79a95cae434
-
Filesize
89KB
MD51cf777c841c85d0e419707f0a09fd288
SHA1bada696bcaf1bc221c5b82726a8a2bbf86f0d209
SHA256fc93925b5fde9493a6396e031fda199e5493bed72fd3cafb31bc42ad96c77b73
SHA51237ef9512d758b0f04221f61e5684084e50a092798c4f5e09984330e40c4e301f36990e26a11a3ccd7c516e7fc9d657dd14e1c73a4e73c9ab22dd038a96c778c8
-
Filesize
89KB
MD5a629239eb95b0710059468847320fe7b
SHA12f5f27ab9196ef013504979d4c1891a68c260f14
SHA256f8091da9207a3a3b9cdbf672122144f7aedac73018a34eeb36811d15fd75aae0
SHA5123a56a1472fd6e52cacd94a14e12777fc7f20baf6c78d63b04ba4fcf9a3500df090876f19921d6f20ac59a92b9e94189f7d615a970b7fa44a54fcc29dd1ac00ad
-
Filesize
89KB
MD5d8dd60690b050170b5857f2794b9cce1
SHA153604488365ebec051b49bfd6fe50c29db29a189
SHA256baa95d89b5db464c3579d03fe5462578a9d2e92ce00a9f15301efa24147221ec
SHA5127192a42ead9d4d6bedb0d99c54607d5b5d95c992d450ed5029b34ddf3e4c6ee3584fd45a81803c4262519e06d85dfcf8eb64259b75e8b33126361d144749e9c0
-
Filesize
89KB
MD5e03fd2d5e0305b141ea1cca6723aefdf
SHA126ddca38529ac89a2c5fa7e94b7fe12567f66db2
SHA2567c06ce4a91ba296057263646d6ed3769f825c38b8ac18bfdd700df0264f26028
SHA512727f5550e55d9745825e25f427aa5adbeef4d925b1e26241853ba184e02af508442a1746e4c13956e110b748e024dde37e421b30b1e43c786864779305f584e6
-
Filesize
89KB
MD539d42741588cb029870b7105eed0ff4b
SHA1198de2cfd0764b970ea7c23e2c2f336b334ab493
SHA2562dc425b5b9c87a9561d6ed8245ff986ba848b8dece852fe2c05a95aeee763f74
SHA512125214afb8ebd3fac81638f8d5066dd727a309c7c21c5b498e688c807ee92fe5c09672d86170466de29e9e36aa3f982142187ab37e587abb35be7831bc371889
-
Filesize
89KB
MD5bc4242fc50efb4347968c0bf64534cc9
SHA1dac8a2f4b3d45206366aedf68d0ec28d449098e4
SHA2566a87e37622b86f99a7837de42c65a04b71950db76373dcf7bc4188d6b14e9b54
SHA51205b0f347d3f5307f6ab44cb278b1acd3a75201ad27b87cc598dd9c18f2899137b3e139f33a7bddd4077715af8a2a2cdad247af730dba1762cd9e24d79706f489
-
Filesize
89KB
MD5668810fd5e77efec7602d64ccae14c1b
SHA11826875e5fcfb2ffdf69db95b66037281e5040c3
SHA25659af970f822878368597afd54f47893a0403c34f5a015fd84324d4b8f833b142
SHA512dce43be240bb53ac5dc78929a76df18be7ee95e6665ba2948367b72d782fa98d4c5cf5caa96b0016dfef4cbca169c13a5e7bf26447a52cd33c622a0fe7cbf1de
-
Filesize
89KB
MD59a49d20ca7c5e9983d91a8b6a160ec3e
SHA192aef25c1416e546136dfbfad4d6ff36134bcd24
SHA2566e96d2eed01c42fca0e54c1fcfcddfce588503a3379a88672271b68fbed076b0
SHA512970a3d6a0ac7d439ffe993a54eee4e3d25169d36d03826835577666ea041913f122973e190f0d42f3e2bcbcb1cf35d9392233d4c96bd00f0a78acf3c7eca5072
-
Filesize
89KB
MD53d67f5f26869082f834fcaa6acf0703c
SHA19702a3d584a29f89e03be2c76f18aee05b5bf70d
SHA25639d2f721f49ac72b65d79877d9ce7e0910e8dd4633e83d01fa0bbb3570228587
SHA512ede243a440d1bdd6d771822a8d49a8b5418a6b88e9349dd316d1a8d8d0a0996d922861eb3897a0baf2d7bcaf248b09274869c9e94014ff2e15e89b818e47c38b
-
Filesize
89KB
MD5fb7dc04bd067a77860eaec7e02707a2b
SHA14c4dd880e1edd49b70632854a5b978d3fed1c1ca
SHA256e76db7034fcb353af38ee470b3fd5daf558c53da87e4923b399cec25b91f72a8
SHA512ca3657f5f24e2486a2751996ead84d77c2503d049fb08d23d9ae85a55e7e8ae84fce91e3e06601e789bc4b46fd83f5475386deeac1f7b444d0abc0559f372ff6