Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
934e5fbc2d110b89156d066a6a9ea450N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
934e5fbc2d110b89156d066a6a9ea450N.exe
Resource
win10v2004-20240802-en
General
-
Target
934e5fbc2d110b89156d066a6a9ea450N.exe
-
Size
60KB
-
MD5
934e5fbc2d110b89156d066a6a9ea450
-
SHA1
f42f42ba628edd491d8321d4a27b2ed9a58e4d53
-
SHA256
b838db5d109117028a9c3ec8de1ad4f1f2dcf41524d71c400caee99100247ef7
-
SHA512
9e9356075192399935c7f1045d30af45781a5c1f7726ad941d3df2a8e35ac8c5c09bc8a8e5165f4e9a016c4a9f9cd0df42b8e8f3514e0d483f71d19167c332f7
-
SSDEEP
384:vbLwOs8AHsc4sMfwhKQLrom4/CFsrdHWMZ:vvw9816vhKQLrom4/wQpWMZ
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{14CB816D-03CB-4e96-9AD2-79C471FCF593}\stubpath = "C:\\Windows\\{14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe" {B8A8C703-7715-46e2-8425-8100114518D4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{392FAC6E-242E-4590-B52D-A4A8FE2175F0} {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3DE1EBC7-0910-48df-80FF-FBA476C36A99} {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3DE1EBC7-0910-48df-80FF-FBA476C36A99}\stubpath = "C:\\Windows\\{3DE1EBC7-0910-48df-80FF-FBA476C36A99}.exe" {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9688A85B-F01A-41cf-8AB8-CA2CEE66E663} {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{14CB816D-03CB-4e96-9AD2-79C471FCF593} {B8A8C703-7715-46e2-8425-8100114518D4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FDB88637-F35E-4160-BB38-2646E51C788B}\stubpath = "C:\\Windows\\{FDB88637-F35E-4160-BB38-2646E51C788B}.exe" {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{33DD9259-BCA8-48d2-A57B-31D1BDA167FF}\stubpath = "C:\\Windows\\{33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe" {FDB88637-F35E-4160-BB38-2646E51C788B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{29026B56-945A-4e2e-9E7E-A87F0C691667} {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{29026B56-945A-4e2e-9E7E-A87F0C691667}\stubpath = "C:\\Windows\\{29026B56-945A-4e2e-9E7E-A87F0C691667}.exe" {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}\stubpath = "C:\\Windows\\{3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe" 934e5fbc2d110b89156d066a6a9ea450N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FDB88637-F35E-4160-BB38-2646E51C788B} {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{33DD9259-BCA8-48d2-A57B-31D1BDA167FF} {FDB88637-F35E-4160-BB38-2646E51C788B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{392FAC6E-242E-4590-B52D-A4A8FE2175F0}\stubpath = "C:\\Windows\\{392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe" {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9688A85B-F01A-41cf-8AB8-CA2CEE66E663}\stubpath = "C:\\Windows\\{9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe" {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3FFB03F8-9F1C-403d-B256-E6B9BE312A1C} 934e5fbc2d110b89156d066a6a9ea450N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B8A8C703-7715-46e2-8425-8100114518D4} {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B8A8C703-7715-46e2-8425-8100114518D4}\stubpath = "C:\\Windows\\{B8A8C703-7715-46e2-8425-8100114518D4}.exe" {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe -
Executes dropped EXE 9 IoCs
pid Process 3588 {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe 3368 {B8A8C703-7715-46e2-8425-8100114518D4}.exe 2016 {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe 1052 {FDB88637-F35E-4160-BB38-2646E51C788B}.exe 2228 {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe 3520 {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe 3176 {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe 4328 {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe 4708 {3DE1EBC7-0910-48df-80FF-FBA476C36A99}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe {B8A8C703-7715-46e2-8425-8100114518D4}.exe File created C:\Windows\{33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe {FDB88637-F35E-4160-BB38-2646E51C788B}.exe File created C:\Windows\{392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe File created C:\Windows\{29026B56-945A-4e2e-9E7E-A87F0C691667}.exe {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe File created C:\Windows\{3DE1EBC7-0910-48df-80FF-FBA476C36A99}.exe {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe File created C:\Windows\{3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe 934e5fbc2d110b89156d066a6a9ea450N.exe File created C:\Windows\{B8A8C703-7715-46e2-8425-8100114518D4}.exe {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe File created C:\Windows\{FDB88637-F35E-4160-BB38-2646E51C788B}.exe {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe File created C:\Windows\{9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3DE1EBC7-0910-48df-80FF-FBA476C36A99}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B8A8C703-7715-46e2-8425-8100114518D4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 934e5fbc2d110b89156d066a6a9ea450N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FDB88637-F35E-4160-BB38-2646E51C788B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5056 934e5fbc2d110b89156d066a6a9ea450N.exe Token: SeIncBasePriorityPrivilege 3588 {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe Token: SeIncBasePriorityPrivilege 3368 {B8A8C703-7715-46e2-8425-8100114518D4}.exe Token: SeIncBasePriorityPrivilege 2016 {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe Token: SeIncBasePriorityPrivilege 1052 {FDB88637-F35E-4160-BB38-2646E51C788B}.exe Token: SeIncBasePriorityPrivilege 2228 {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe Token: SeIncBasePriorityPrivilege 3520 {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe Token: SeIncBasePriorityPrivilege 3176 {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe Token: SeIncBasePriorityPrivilege 4328 {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 5056 wrote to memory of 3588 5056 934e5fbc2d110b89156d066a6a9ea450N.exe 94 PID 5056 wrote to memory of 3588 5056 934e5fbc2d110b89156d066a6a9ea450N.exe 94 PID 5056 wrote to memory of 3588 5056 934e5fbc2d110b89156d066a6a9ea450N.exe 94 PID 5056 wrote to memory of 2704 5056 934e5fbc2d110b89156d066a6a9ea450N.exe 95 PID 5056 wrote to memory of 2704 5056 934e5fbc2d110b89156d066a6a9ea450N.exe 95 PID 5056 wrote to memory of 2704 5056 934e5fbc2d110b89156d066a6a9ea450N.exe 95 PID 3588 wrote to memory of 3368 3588 {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe 96 PID 3588 wrote to memory of 3368 3588 {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe 96 PID 3588 wrote to memory of 3368 3588 {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe 96 PID 3588 wrote to memory of 2496 3588 {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe 97 PID 3588 wrote to memory of 2496 3588 {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe 97 PID 3588 wrote to memory of 2496 3588 {3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe 97 PID 3368 wrote to memory of 2016 3368 {B8A8C703-7715-46e2-8425-8100114518D4}.exe 101 PID 3368 wrote to memory of 2016 3368 {B8A8C703-7715-46e2-8425-8100114518D4}.exe 101 PID 3368 wrote to memory of 2016 3368 {B8A8C703-7715-46e2-8425-8100114518D4}.exe 101 PID 3368 wrote to memory of 4812 3368 {B8A8C703-7715-46e2-8425-8100114518D4}.exe 102 PID 3368 wrote to memory of 4812 3368 {B8A8C703-7715-46e2-8425-8100114518D4}.exe 102 PID 3368 wrote to memory of 4812 3368 {B8A8C703-7715-46e2-8425-8100114518D4}.exe 102 PID 2016 wrote to memory of 1052 2016 {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe 103 PID 2016 wrote to memory of 1052 2016 {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe 103 PID 2016 wrote to memory of 1052 2016 {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe 103 PID 2016 wrote to memory of 4692 2016 {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe 104 PID 2016 wrote to memory of 4692 2016 {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe 104 PID 2016 wrote to memory of 4692 2016 {14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe 104 PID 1052 wrote to memory of 2228 1052 {FDB88637-F35E-4160-BB38-2646E51C788B}.exe 105 PID 1052 wrote to memory of 2228 1052 {FDB88637-F35E-4160-BB38-2646E51C788B}.exe 105 PID 1052 wrote to memory of 2228 1052 {FDB88637-F35E-4160-BB38-2646E51C788B}.exe 105 PID 1052 wrote to memory of 4256 1052 {FDB88637-F35E-4160-BB38-2646E51C788B}.exe 106 PID 1052 wrote to memory of 4256 1052 {FDB88637-F35E-4160-BB38-2646E51C788B}.exe 106 PID 1052 wrote to memory of 4256 1052 {FDB88637-F35E-4160-BB38-2646E51C788B}.exe 106 PID 2228 wrote to memory of 3520 2228 {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe 108 PID 2228 wrote to memory of 3520 2228 {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe 108 PID 2228 wrote to memory of 3520 2228 {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe 108 PID 2228 wrote to memory of 212 2228 {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe 109 PID 2228 wrote to memory of 212 2228 {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe 109 PID 2228 wrote to memory of 212 2228 {33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe 109 PID 3520 wrote to memory of 3176 3520 {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe 110 PID 3520 wrote to memory of 3176 3520 {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe 110 PID 3520 wrote to memory of 3176 3520 {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe 110 PID 3520 wrote to memory of 5024 3520 {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe 111 PID 3520 wrote to memory of 5024 3520 {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe 111 PID 3520 wrote to memory of 5024 3520 {392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe 111 PID 3176 wrote to memory of 4328 3176 {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe 116 PID 3176 wrote to memory of 4328 3176 {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe 116 PID 3176 wrote to memory of 4328 3176 {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe 116 PID 3176 wrote to memory of 5116 3176 {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe 117 PID 3176 wrote to memory of 5116 3176 {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe 117 PID 3176 wrote to memory of 5116 3176 {29026B56-945A-4e2e-9E7E-A87F0C691667}.exe 117 PID 4328 wrote to memory of 4708 4328 {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe 122 PID 4328 wrote to memory of 4708 4328 {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe 122 PID 4328 wrote to memory of 4708 4328 {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe 122 PID 4328 wrote to memory of 1180 4328 {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe 123 PID 4328 wrote to memory of 1180 4328 {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe 123 PID 4328 wrote to memory of 1180 4328 {9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\934e5fbc2d110b89156d066a6a9ea450N.exe"C:\Users\Admin\AppData\Local\Temp\934e5fbc2d110b89156d066a6a9ea450N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\{3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exeC:\Windows\{3FFB03F8-9F1C-403d-B256-E6B9BE312A1C}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\{B8A8C703-7715-46e2-8425-8100114518D4}.exeC:\Windows\{B8A8C703-7715-46e2-8425-8100114518D4}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\{14CB816D-03CB-4e96-9AD2-79C471FCF593}.exeC:\Windows\{14CB816D-03CB-4e96-9AD2-79C471FCF593}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\{FDB88637-F35E-4160-BB38-2646E51C788B}.exeC:\Windows\{FDB88637-F35E-4160-BB38-2646E51C788B}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\{33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exeC:\Windows\{33DD9259-BCA8-48d2-A57B-31D1BDA167FF}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\{392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exeC:\Windows\{392FAC6E-242E-4590-B52D-A4A8FE2175F0}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\{29026B56-945A-4e2e-9E7E-A87F0C691667}.exeC:\Windows\{29026B56-945A-4e2e-9E7E-A87F0C691667}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\{9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exeC:\Windows\{9688A85B-F01A-41cf-8AB8-CA2CEE66E663}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\{3DE1EBC7-0910-48df-80FF-FBA476C36A99}.exeC:\Windows\{3DE1EBC7-0910-48df-80FF-FBA476C36A99}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9688A~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{29026~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:5116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{392FA~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:5024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{33DD9~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FDB88~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{14CB8~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B8A8C~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3FFB0~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\934E5F~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5746da6aed2a8a6d8a87062447909e3d7
SHA19e136f12cc822e68479db2091680a49e4883fc83
SHA25600d5cbbc3a11d18e5fc3998b62fd0e763abe33f749e718eb8c43693d0eebaa37
SHA5128f6c28173492c8777f5acbbed04daf882b6ddf8ab9843601fd1418980e67776e75f37967ac9f0f4a49fa75c246f0c25e2c9dec9a591ddd0be0c3ef04c626a0c3
-
Filesize
60KB
MD59c4789949749c7b9c15784c7c4f48d7b
SHA1375a381353129934ba476da4afd796fc60fa42c3
SHA2564f131fc6ee6532c508d385d1e549298cb33efa7cb1dd1f088076c536f93a927e
SHA512d26fc08f434b341ae331d7a4fd60c39efadf8bc0e36623bd0ee3f5caa1e96bc84c7d3a3d305010672e2ecb7130000f3b0f58a3eb755aa2ac8934046f6a77a07e
-
Filesize
60KB
MD5ce001b56bb8da5b3e9b933ca73b7c77a
SHA1e8451d0e185d5db019637f70270b857811427e33
SHA256751ab2e4dcf6c94c987c835287af02c2dfa46b3a91429f3ec0ec7e94abbe6111
SHA512629bfbcab888222ec69975b39d4a3682dbe1a18c374dbc8fd421de5bf9714ed34f698d407126cdbb13e1ac8eadd1d347e6eff3cfa11a7fad7af6163a81a5f446
-
Filesize
60KB
MD586c3d23483a9edc4573cb22e59214973
SHA171b43b6c3e4aab0c1335b255bd488ebf52187a39
SHA256206ca6a208d6c00d0d0f347feb2ec5a64ec86fcb5e84e831a8c74ca85ac0b42c
SHA512e6805787c5b32de1636ee46188e1c7a45efed8869beda26a1014fffe1a73a87a350df1be2545398aa26b9b6ae699cdc22d3a96a8911557f5a5746c9179e506c2
-
Filesize
60KB
MD58ee8da4889879514f71a1ffad156c818
SHA1a2ee36f488215d6c81d642bc135968cfdda8221a
SHA256f1ead37053dcd82a54cae60959af578591d7a3c31f9cc6c121d6b485a4f8569c
SHA5124f849e8a0aa7d0ead320bc6bd5ad3ebe2460cb3de902a4f980f78ced612659224e2976af809b049db38d23a459afa92595e7280247cdeb3a6b838c98fda91f60
-
Filesize
60KB
MD56e7111fb7544b5672fdb673a21aa4d56
SHA1ff7a936260ff089eb07e8db23b71c0e71c6bf023
SHA256959ba2508495b8350fe324c3d2442bf02d6b625a1f89ee4e15fc463e625ea3c2
SHA51202164c13518f2be3ce3973f5c1dd36a8631ea4415c91dab467e0cd47dba6a4537afcb0ca41002811967f9950eceacb5b0f7839021140020a2d06007d006b1881
-
Filesize
60KB
MD5592c99054395b9f04929d0b066a90c54
SHA1ce918a722315e8d475e1cd85c43aa6acc83a945d
SHA256159ade70168ce466c2211de1ab6cee91b918bdc3d625f936184868d988e0b61f
SHA5123742f8637656c44dda6cee7e0bba9209436f0cd7682eb7f97d925fd175c8dded385b176644190a71be6e0a5d24a787ec60d8b08081070ee4b01a32ef27f5a819
-
Filesize
60KB
MD55925bb71e918a18ff810be037356b836
SHA1a1deda862d69bf63a254ae5bce480687628a2a90
SHA2564d713ecbb2225b08d01819d4b6245574a998b7e54941a786850ca26997d5e593
SHA512091077303c223e83388e0350a88b5175c81ee7eeff1640108fa2184952f4725145f438b71fcd44522a237b3a8b5280500f2964a644e7a818a9f11c30eac4068b
-
Filesize
60KB
MD5d561d3dbcf226e9be8a1fc1adcb826dd
SHA112784e2ddb0769cf278057027607633efe4b453b
SHA256934da96e16c3f331e0dd8a2f834d01f055a2382fcba7a36d475df623d49d4b82
SHA5122691497b622eff1a37b002faaff3837e4b74e0be40ee8e5bfd71dd3f61359eea1aa4dc6f4c8beb1d2dcf893fb4f8a78df48d01a2834be3f9bde9af35b12e42ec