Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
d0dfc6b7211aafbc085a81fa9aa42870N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d0dfc6b7211aafbc085a81fa9aa42870N.exe
Resource
win10v2004-20240802-en
General
-
Target
d0dfc6b7211aafbc085a81fa9aa42870N.exe
-
Size
197KB
-
MD5
d0dfc6b7211aafbc085a81fa9aa42870
-
SHA1
970e6847a49945081ab60d508d9ac35835f88f52
-
SHA256
4d6c85079e15457656ffbfa8574d0996774dba41ad71fb7edfd6321205ec2ab0
-
SHA512
16f33a21ea47c8c64c31926d8cec60b39ddd8b0db0af99dab27bb504512969a55d3eb0f07b8960e4ede09225a102cbf1e653c85385945d7ae57d75a4d1a85152
-
SSDEEP
3072:jEGh0oVl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGblEeKcAEca
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8FC6F7AA-5165-4c99-A703-9A8FB2486654} {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FD0A1E4E-ED5D-4c83-85E9-946BB2997629} d0dfc6b7211aafbc085a81fa9aa42870N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E82C80E-88E3-4859-B507-8EA31755739C} {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DDEB8A74-2A41-4290-963D-29EDFF4389AD} {8E82C80E-88E3-4859-B507-8EA31755739C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DDEB8A74-2A41-4290-963D-29EDFF4389AD}\stubpath = "C:\\Windows\\{DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe" {8E82C80E-88E3-4859-B507-8EA31755739C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80925146-E1FC-4fc0-A2FF-9A7F1AC56332}\stubpath = "C:\\Windows\\{80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe" {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{35FAA0DE-9064-4e54-BF86-C5F52710870E}\stubpath = "C:\\Windows\\{35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe" {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}\stubpath = "C:\\Windows\\{7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe" {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80925146-E1FC-4fc0-A2FF-9A7F1AC56332} {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8FC6F7AA-5165-4c99-A703-9A8FB2486654}\stubpath = "C:\\Windows\\{8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe" {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{189AFDD8-5294-40f7-9DCA-D56F71155377}\stubpath = "C:\\Windows\\{189AFDD8-5294-40f7-9DCA-D56F71155377}.exe" {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{189AFDD8-5294-40f7-9DCA-D56F71155377} {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E2A39E4-549E-4648-BDB5-70F9B5F6E52B} {189AFDD8-5294-40f7-9DCA-D56F71155377}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E2A39E4-549E-4648-BDB5-70F9B5F6E52B}\stubpath = "C:\\Windows\\{6E2A39E4-549E-4648-BDB5-70F9B5F6E52B}.exe" {189AFDD8-5294-40f7-9DCA-D56F71155377}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FD0A1E4E-ED5D-4c83-85E9-946BB2997629}\stubpath = "C:\\Windows\\{FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe" d0dfc6b7211aafbc085a81fa9aa42870N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{35FAA0DE-9064-4e54-BF86-C5F52710870E} {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E82C80E-88E3-4859-B507-8EA31755739C}\stubpath = "C:\\Windows\\{8E82C80E-88E3-4859-B507-8EA31755739C}.exe" {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E982F5B-E4C8-4f6a-B494-F4581ED0CB47} {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe -
Deletes itself 1 IoCs
pid Process 2052 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2128 {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe 2384 {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe 2140 {8E82C80E-88E3-4859-B507-8EA31755739C}.exe 2724 {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe 3016 {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe 2648 {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe 1184 {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe 2880 {189AFDD8-5294-40f7-9DCA-D56F71155377}.exe 2988 {6E2A39E4-549E-4648-BDB5-70F9B5F6E52B}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe d0dfc6b7211aafbc085a81fa9aa42870N.exe File created C:\Windows\{8E82C80E-88E3-4859-B507-8EA31755739C}.exe {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe File created C:\Windows\{DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe {8E82C80E-88E3-4859-B507-8EA31755739C}.exe File created C:\Windows\{80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe File created C:\Windows\{8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe File created C:\Windows\{6E2A39E4-549E-4648-BDB5-70F9B5F6E52B}.exe {189AFDD8-5294-40f7-9DCA-D56F71155377}.exe File created C:\Windows\{35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe File created C:\Windows\{7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe File created C:\Windows\{189AFDD8-5294-40f7-9DCA-D56F71155377}.exe {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0dfc6b7211aafbc085a81fa9aa42870N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6E2A39E4-549E-4648-BDB5-70F9B5F6E52B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8E82C80E-88E3-4859-B507-8EA31755739C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {189AFDD8-5294-40f7-9DCA-D56F71155377}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2308 d0dfc6b7211aafbc085a81fa9aa42870N.exe Token: SeIncBasePriorityPrivilege 2128 {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe Token: SeIncBasePriorityPrivilege 2384 {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe Token: SeIncBasePriorityPrivilege 2140 {8E82C80E-88E3-4859-B507-8EA31755739C}.exe Token: SeIncBasePriorityPrivilege 2724 {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe Token: SeIncBasePriorityPrivilege 3016 {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe Token: SeIncBasePriorityPrivilege 2648 {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe Token: SeIncBasePriorityPrivilege 1184 {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe Token: SeIncBasePriorityPrivilege 2880 {189AFDD8-5294-40f7-9DCA-D56F71155377}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2128 2308 d0dfc6b7211aafbc085a81fa9aa42870N.exe 31 PID 2308 wrote to memory of 2128 2308 d0dfc6b7211aafbc085a81fa9aa42870N.exe 31 PID 2308 wrote to memory of 2128 2308 d0dfc6b7211aafbc085a81fa9aa42870N.exe 31 PID 2308 wrote to memory of 2128 2308 d0dfc6b7211aafbc085a81fa9aa42870N.exe 31 PID 2308 wrote to memory of 2052 2308 d0dfc6b7211aafbc085a81fa9aa42870N.exe 32 PID 2308 wrote to memory of 2052 2308 d0dfc6b7211aafbc085a81fa9aa42870N.exe 32 PID 2308 wrote to memory of 2052 2308 d0dfc6b7211aafbc085a81fa9aa42870N.exe 32 PID 2308 wrote to memory of 2052 2308 d0dfc6b7211aafbc085a81fa9aa42870N.exe 32 PID 2128 wrote to memory of 2384 2128 {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe 33 PID 2128 wrote to memory of 2384 2128 {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe 33 PID 2128 wrote to memory of 2384 2128 {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe 33 PID 2128 wrote to memory of 2384 2128 {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe 33 PID 2128 wrote to memory of 2820 2128 {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe 34 PID 2128 wrote to memory of 2820 2128 {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe 34 PID 2128 wrote to memory of 2820 2128 {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe 34 PID 2128 wrote to memory of 2820 2128 {FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe 34 PID 2384 wrote to memory of 2140 2384 {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe 35 PID 2384 wrote to memory of 2140 2384 {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe 35 PID 2384 wrote to memory of 2140 2384 {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe 35 PID 2384 wrote to memory of 2140 2384 {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe 35 PID 2384 wrote to memory of 2720 2384 {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe 36 PID 2384 wrote to memory of 2720 2384 {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe 36 PID 2384 wrote to memory of 2720 2384 {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe 36 PID 2384 wrote to memory of 2720 2384 {35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe 36 PID 2140 wrote to memory of 2724 2140 {8E82C80E-88E3-4859-B507-8EA31755739C}.exe 37 PID 2140 wrote to memory of 2724 2140 {8E82C80E-88E3-4859-B507-8EA31755739C}.exe 37 PID 2140 wrote to memory of 2724 2140 {8E82C80E-88E3-4859-B507-8EA31755739C}.exe 37 PID 2140 wrote to memory of 2724 2140 {8E82C80E-88E3-4859-B507-8EA31755739C}.exe 37 PID 2140 wrote to memory of 2828 2140 {8E82C80E-88E3-4859-B507-8EA31755739C}.exe 38 PID 2140 wrote to memory of 2828 2140 {8E82C80E-88E3-4859-B507-8EA31755739C}.exe 38 PID 2140 wrote to memory of 2828 2140 {8E82C80E-88E3-4859-B507-8EA31755739C}.exe 38 PID 2140 wrote to memory of 2828 2140 {8E82C80E-88E3-4859-B507-8EA31755739C}.exe 38 PID 2724 wrote to memory of 3016 2724 {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe 39 PID 2724 wrote to memory of 3016 2724 {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe 39 PID 2724 wrote to memory of 3016 2724 {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe 39 PID 2724 wrote to memory of 3016 2724 {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe 39 PID 2724 wrote to memory of 1664 2724 {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe 40 PID 2724 wrote to memory of 1664 2724 {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe 40 PID 2724 wrote to memory of 1664 2724 {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe 40 PID 2724 wrote to memory of 1664 2724 {DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe 40 PID 3016 wrote to memory of 2648 3016 {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe 41 PID 3016 wrote to memory of 2648 3016 {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe 41 PID 3016 wrote to memory of 2648 3016 {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe 41 PID 3016 wrote to memory of 2648 3016 {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe 41 PID 3016 wrote to memory of 1992 3016 {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe 42 PID 3016 wrote to memory of 1992 3016 {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe 42 PID 3016 wrote to memory of 1992 3016 {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe 42 PID 3016 wrote to memory of 1992 3016 {7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe 42 PID 2648 wrote to memory of 1184 2648 {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe 43 PID 2648 wrote to memory of 1184 2648 {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe 43 PID 2648 wrote to memory of 1184 2648 {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe 43 PID 2648 wrote to memory of 1184 2648 {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe 43 PID 2648 wrote to memory of 636 2648 {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe 44 PID 2648 wrote to memory of 636 2648 {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe 44 PID 2648 wrote to memory of 636 2648 {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe 44 PID 2648 wrote to memory of 636 2648 {80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe 44 PID 1184 wrote to memory of 2880 1184 {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe 45 PID 1184 wrote to memory of 2880 1184 {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe 45 PID 1184 wrote to memory of 2880 1184 {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe 45 PID 1184 wrote to memory of 2880 1184 {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe 45 PID 1184 wrote to memory of 2872 1184 {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe 46 PID 1184 wrote to memory of 2872 1184 {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe 46 PID 1184 wrote to memory of 2872 1184 {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe 46 PID 1184 wrote to memory of 2872 1184 {8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0dfc6b7211aafbc085a81fa9aa42870N.exe"C:\Users\Admin\AppData\Local\Temp\d0dfc6b7211aafbc085a81fa9aa42870N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\{FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exeC:\Windows\{FD0A1E4E-ED5D-4c83-85E9-946BB2997629}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\{35FAA0DE-9064-4e54-BF86-C5F52710870E}.exeC:\Windows\{35FAA0DE-9064-4e54-BF86-C5F52710870E}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\{8E82C80E-88E3-4859-B507-8EA31755739C}.exeC:\Windows\{8E82C80E-88E3-4859-B507-8EA31755739C}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\{DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exeC:\Windows\{DDEB8A74-2A41-4290-963D-29EDFF4389AD}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\{7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exeC:\Windows\{7E982F5B-E4C8-4f6a-B494-F4581ED0CB47}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\{80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exeC:\Windows\{80925146-E1FC-4fc0-A2FF-9A7F1AC56332}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\{8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exeC:\Windows\{8FC6F7AA-5165-4c99-A703-9A8FB2486654}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\{189AFDD8-5294-40f7-9DCA-D56F71155377}.exeC:\Windows\{189AFDD8-5294-40f7-9DCA-D56F71155377}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2880 -
C:\Windows\{6E2A39E4-549E-4648-BDB5-70F9B5F6E52B}.exeC:\Windows\{6E2A39E4-549E-4648-BDB5-70F9B5F6E52B}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{189AF~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8FC6F~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80925~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E982~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DDEB8~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E82C~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{35FAA~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD0A1~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\D0DFC6~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD51585033a4761b902662f3eba32fdcb27
SHA1cc55ca4cdd70666357af6fefdc22b4ef85b10598
SHA256e54d15ae74c3b0f158a21988b05be17d980d267ab6da7a9fd146cb0613e847c1
SHA51261ee66bddb5ae54fa4460a05befcd21cc02a397fdd46c92359017db5095a2ac637f8be759f8a2822f7ab69581ec6c4fc47c67f026bffde2dee73cf4bd65267eb
-
Filesize
197KB
MD578b84b84528a97477a13b60c67e7e16f
SHA11758fede9a88a2c958d24397339fae0cd45bf41b
SHA2567facc0f9178fa8612458299ad4daea52d250e01a73287ca215391176e0906ac7
SHA51274a114cfe3d5090b15add7456ae3989cb5958bd6a1cce04acf478713107caa790a5c9ab44ab1a0a3d099a142aecedc81a023e230bdd85536fad7baf40f567d76
-
Filesize
197KB
MD5e1d421173bc3c6b5ebc4372fce7d759c
SHA1f420a460bf77aa3b2826054bcd07f2b8af6660df
SHA2566bda06bb0b95405a7301ac6d91b06797b21817b6cb6ac5434dc1d5a58ea74f3d
SHA5122d5ad6ef202c01c7af4af0d68ddcef99306d215beabfb566ca1aaadb243ea461ba11f0944aea0fe11be7888466b2251a85994b22dbd5d2df3c65a3e31608f009
-
Filesize
197KB
MD5a36fba590611d49a067cc410c9b19662
SHA1479bdc05319ae4b91f4cbc346367b0b6f3d732c7
SHA2567458c2c90e83db2b020c06a6ab1172b4f768b86e0c3c70dce530d5f80392531f
SHA512c129e9226c73d7492eb9ac558c6593c25e4f0f1ce88f9186333f496668281513ffa801bcae2567c146cf732ef57a19beff5566da50c35f64fdba42f706e0c490
-
Filesize
197KB
MD5a483f9ca254eaacb82589af2839d7539
SHA1b782e58b569dace9ad12dbf3bbc275d2267458df
SHA256fe5b0c07b39966557a04454e9c0a0fdd64f3a3b94e1fbe909d462e86e6b90f68
SHA512d5b9516c9bf3b103ed92be7240d1508e481f10b1475f30e674d6d8261699f0f1f5acf2e913da811e153d55e68a778dadcfa6fdeb7fa9234622ce6e0fd741852c
-
Filesize
197KB
MD57b5db91362d533c02a94f27410b25e08
SHA17478131ff9bc6af57481ab1e043c0a01cdd6ea53
SHA2569cf9029623816e620dbbcf53ee685c47a8fd273bab068929c74cdea2544fd335
SHA512959713fab1c88e3bf93719eee746ff1b817ec8d5e84c3826177d4390fd83731c7f3ee66660d234b006d09fddaf8f6a050f3cb535225eb2c442723abb9e6ae162
-
Filesize
197KB
MD5ee0d2cb22089e9090ff6bd78cf8f4051
SHA1db0231bc10400b423ae9e5887d81082d37a9f54f
SHA256f329b6f062c47cc1e475ce5c1b8b9c038e3b3a0293b93c8d6bb72d11e0d9b6c6
SHA512fdd9e9eba07e5dc7707df01638152d929b6965ac0a8022da3da470aec380f7d7dcf4316ecb54c96e96f730457007122d250d9a14cf6042abd586e0d568366a71
-
Filesize
197KB
MD5b2e2e313c415f8598a247392d4bb6399
SHA12587d93b39be7c11c56b699635ef129f9c067a70
SHA256fa77adbe6273ee950f0a1902bcaeb25ea9d06fc492083c1e09d93ede35ea843a
SHA5125d43e9252b16c88556bdb1f3eb55ca8090b3456c96a9e8a9c7ad48df8056f746e74b9ecec3b7afdb651320f410a69c5d811fbbb2d41fc24b16b1893af6af34a1
-
Filesize
197KB
MD5e398290622770c20883721ff9dae2173
SHA1af5a55a264d8ac026c58adefd5ed418db0d320aa
SHA2563fe2c3b9a4d5e14d26c70060f99dd53acf7f9b31c4504a982503a055782f677f
SHA512d41bc41b624d9159016bc1e4cb1936093ab42d23f29ebc319496a8668df778d174232aa9acf46be2375f0d3068f7b66848adf268b887b9da214437a3cb884e3e