Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
d0dfc6b7211aafbc085a81fa9aa42870N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d0dfc6b7211aafbc085a81fa9aa42870N.exe
Resource
win10v2004-20240802-en
General
-
Target
d0dfc6b7211aafbc085a81fa9aa42870N.exe
-
Size
197KB
-
MD5
d0dfc6b7211aafbc085a81fa9aa42870
-
SHA1
970e6847a49945081ab60d508d9ac35835f88f52
-
SHA256
4d6c85079e15457656ffbfa8574d0996774dba41ad71fb7edfd6321205ec2ab0
-
SHA512
16f33a21ea47c8c64c31926d8cec60b39ddd8b0db0af99dab27bb504512969a55d3eb0f07b8960e4ede09225a102cbf1e653c85385945d7ae57d75a4d1a85152
-
SSDEEP
3072:jEGh0oVl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGblEeKcAEca
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7605EC01-4D3A-4ec6-8B09-8DB9B5DF455C} {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EAD5F48A-D5F2-441d-A029-2454C5CE5488} d0dfc6b7211aafbc085a81fa9aa42870N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F3A37D3-5825-42b1-AD54-2F2990831D9A}\stubpath = "C:\\Windows\\{5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe" {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B79D0078-734A-4300-ADA4-4B461681396D}\stubpath = "C:\\Windows\\{B79D0078-734A-4300-ADA4-4B461681396D}.exe" {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D600A1CA-CCAE-485c-99BE-0EB36611E2F6}\stubpath = "C:\\Windows\\{D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe" {B79D0078-734A-4300-ADA4-4B461681396D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3349231E-0D7A-4e5d-967C-4E61C2C1CF66} {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1864D24-923A-4b93-8FA7-C025023C9A78} {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}\stubpath = "C:\\Windows\\{23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe" {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7605EC01-4D3A-4ec6-8B09-8DB9B5DF455C}\stubpath = "C:\\Windows\\{7605EC01-4D3A-4ec6-8B09-8DB9B5DF455C}.exe" {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F3A37D3-5825-42b1-AD54-2F2990831D9A} {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D600A1CA-CCAE-485c-99BE-0EB36611E2F6} {B79D0078-734A-4300-ADA4-4B461681396D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E6051FA-43B0-4701-845D-F93FDF88DAEF} {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C} {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B79D0078-734A-4300-ADA4-4B461681396D} {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E6051FA-43B0-4701-845D-F93FDF88DAEF}\stubpath = "C:\\Windows\\{8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe" {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EAD5F48A-D5F2-441d-A029-2454C5CE5488}\stubpath = "C:\\Windows\\{EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe" d0dfc6b7211aafbc085a81fa9aa42870N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3349231E-0D7A-4e5d-967C-4E61C2C1CF66}\stubpath = "C:\\Windows\\{3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe" {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1864D24-923A-4b93-8FA7-C025023C9A78}\stubpath = "C:\\Windows\\{E1864D24-923A-4b93-8FA7-C025023C9A78}.exe" {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe -
Executes dropped EXE 9 IoCs
pid Process 1460 {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe 3444 {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe 4224 {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe 4324 {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe 2332 {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe 4712 {B79D0078-734A-4300-ADA4-4B461681396D}.exe 5080 {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe 4904 {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe 1436 {7605EC01-4D3A-4ec6-8B09-8DB9B5DF455C}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe File created C:\Windows\{B79D0078-734A-4300-ADA4-4B461681396D}.exe {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe File created C:\Windows\{D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe {B79D0078-734A-4300-ADA4-4B461681396D}.exe File created C:\Windows\{8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe File created C:\Windows\{7605EC01-4D3A-4ec6-8B09-8DB9B5DF455C}.exe {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe File created C:\Windows\{EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe d0dfc6b7211aafbc085a81fa9aa42870N.exe File created C:\Windows\{E1864D24-923A-4b93-8FA7-C025023C9A78}.exe {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe File created C:\Windows\{23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe File created C:\Windows\{5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0dfc6b7211aafbc085a81fa9aa42870N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7605EC01-4D3A-4ec6-8B09-8DB9B5DF455C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B79D0078-734A-4300-ADA4-4B461681396D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4484 d0dfc6b7211aafbc085a81fa9aa42870N.exe Token: SeIncBasePriorityPrivilege 1460 {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe Token: SeIncBasePriorityPrivilege 3444 {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe Token: SeIncBasePriorityPrivilege 4224 {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe Token: SeIncBasePriorityPrivilege 4324 {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe Token: SeIncBasePriorityPrivilege 2332 {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe Token: SeIncBasePriorityPrivilege 4712 {B79D0078-734A-4300-ADA4-4B461681396D}.exe Token: SeIncBasePriorityPrivilege 5080 {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe Token: SeIncBasePriorityPrivilege 4904 {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4484 wrote to memory of 1460 4484 d0dfc6b7211aafbc085a81fa9aa42870N.exe 95 PID 4484 wrote to memory of 1460 4484 d0dfc6b7211aafbc085a81fa9aa42870N.exe 95 PID 4484 wrote to memory of 1460 4484 d0dfc6b7211aafbc085a81fa9aa42870N.exe 95 PID 4484 wrote to memory of 3828 4484 d0dfc6b7211aafbc085a81fa9aa42870N.exe 96 PID 4484 wrote to memory of 3828 4484 d0dfc6b7211aafbc085a81fa9aa42870N.exe 96 PID 4484 wrote to memory of 3828 4484 d0dfc6b7211aafbc085a81fa9aa42870N.exe 96 PID 1460 wrote to memory of 3444 1460 {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe 97 PID 1460 wrote to memory of 3444 1460 {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe 97 PID 1460 wrote to memory of 3444 1460 {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe 97 PID 1460 wrote to memory of 1064 1460 {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe 98 PID 1460 wrote to memory of 1064 1460 {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe 98 PID 1460 wrote to memory of 1064 1460 {EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe 98 PID 3444 wrote to memory of 4224 3444 {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe 102 PID 3444 wrote to memory of 4224 3444 {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe 102 PID 3444 wrote to memory of 4224 3444 {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe 102 PID 3444 wrote to memory of 3556 3444 {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe 103 PID 3444 wrote to memory of 3556 3444 {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe 103 PID 3444 wrote to memory of 3556 3444 {3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe 103 PID 4224 wrote to memory of 4324 4224 {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe 104 PID 4224 wrote to memory of 4324 4224 {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe 104 PID 4224 wrote to memory of 4324 4224 {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe 104 PID 4224 wrote to memory of 2848 4224 {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe 105 PID 4224 wrote to memory of 2848 4224 {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe 105 PID 4224 wrote to memory of 2848 4224 {5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe 105 PID 4324 wrote to memory of 2332 4324 {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe 106 PID 4324 wrote to memory of 2332 4324 {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe 106 PID 4324 wrote to memory of 2332 4324 {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe 106 PID 4324 wrote to memory of 3456 4324 {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe 107 PID 4324 wrote to memory of 3456 4324 {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe 107 PID 4324 wrote to memory of 3456 4324 {E1864D24-923A-4b93-8FA7-C025023C9A78}.exe 107 PID 2332 wrote to memory of 4712 2332 {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe 109 PID 2332 wrote to memory of 4712 2332 {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe 109 PID 2332 wrote to memory of 4712 2332 {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe 109 PID 2332 wrote to memory of 1440 2332 {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe 110 PID 2332 wrote to memory of 1440 2332 {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe 110 PID 2332 wrote to memory of 1440 2332 {23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe 110 PID 4712 wrote to memory of 5080 4712 {B79D0078-734A-4300-ADA4-4B461681396D}.exe 111 PID 4712 wrote to memory of 5080 4712 {B79D0078-734A-4300-ADA4-4B461681396D}.exe 111 PID 4712 wrote to memory of 5080 4712 {B79D0078-734A-4300-ADA4-4B461681396D}.exe 111 PID 4712 wrote to memory of 4568 4712 {B79D0078-734A-4300-ADA4-4B461681396D}.exe 112 PID 4712 wrote to memory of 4568 4712 {B79D0078-734A-4300-ADA4-4B461681396D}.exe 112 PID 4712 wrote to memory of 4568 4712 {B79D0078-734A-4300-ADA4-4B461681396D}.exe 112 PID 5080 wrote to memory of 4904 5080 {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe 117 PID 5080 wrote to memory of 4904 5080 {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe 117 PID 5080 wrote to memory of 4904 5080 {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe 117 PID 5080 wrote to memory of 4448 5080 {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe 118 PID 5080 wrote to memory of 4448 5080 {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe 118 PID 5080 wrote to memory of 4448 5080 {D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe 118 PID 4904 wrote to memory of 1436 4904 {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe 123 PID 4904 wrote to memory of 1436 4904 {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe 123 PID 4904 wrote to memory of 1436 4904 {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe 123 PID 4904 wrote to memory of 4336 4904 {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe 124 PID 4904 wrote to memory of 4336 4904 {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe 124 PID 4904 wrote to memory of 4336 4904 {8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0dfc6b7211aafbc085a81fa9aa42870N.exe"C:\Users\Admin\AppData\Local\Temp\d0dfc6b7211aafbc085a81fa9aa42870N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\{EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exeC:\Windows\{EAD5F48A-D5F2-441d-A029-2454C5CE5488}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\{3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exeC:\Windows\{3349231E-0D7A-4e5d-967C-4E61C2C1CF66}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\{5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exeC:\Windows\{5F3A37D3-5825-42b1-AD54-2F2990831D9A}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\{E1864D24-923A-4b93-8FA7-C025023C9A78}.exeC:\Windows\{E1864D24-923A-4b93-8FA7-C025023C9A78}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\{23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exeC:\Windows\{23A69BA8-0D3F-4ed3-8EED-851CA42B6E9C}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\{B79D0078-734A-4300-ADA4-4B461681396D}.exeC:\Windows\{B79D0078-734A-4300-ADA4-4B461681396D}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\{D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exeC:\Windows\{D600A1CA-CCAE-485c-99BE-0EB36611E2F6}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\{8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exeC:\Windows\{8E6051FA-43B0-4701-845D-F93FDF88DAEF}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\{7605EC01-4D3A-4ec6-8B09-8DB9B5DF455C}.exeC:\Windows\{7605EC01-4D3A-4ec6-8B09-8DB9B5DF455C}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E605~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D600A~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:4448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B79D0~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{23A69~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1864~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5F3A3~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{33492~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EAD5F~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\D0DFC6~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD546fc053dda7fd8e89dfa67b90b18b91b
SHA1b5063c33f603755bda8cf79e00a783f0a981107b
SHA25658cbf8ef764672be9fa5c8d2baf94f26224a26deba6e6c4273b82e5a90eff08e
SHA5122a4627cd7f04dabb2af118efd6d9151c3c06bccd3d93cf87eeb69d995fd6cb71eefd4a2640d50e4324844c15fcf821c164a3bc0194eb02691b29e192ffe2382e
-
Filesize
197KB
MD547440e1a49d1486a250d3468bd3f00db
SHA1ea5ab9d98cf032b854b7ee9e29256d3c07fdcff6
SHA256849d7c70aba8c9f72028283ee52fcbf572e342044fb1d349bd8efa66334d1f9a
SHA51278cb3932a4e0191573ab12c0192ac92831ed431d617fad8236293830f03eccfa04e2be76859755343bde2ae0cd577f144ec6c1435b298d9d3de0f0da3380d939
-
Filesize
197KB
MD557ae22cb7420d522eadaec17d0047acc
SHA1fa70388a3b72057c449172c185b3bda8108fa0e8
SHA25622d7586bfb000bfaee98aa7d1e1293abfb904c4ae041d32122e269878f705751
SHA5123478475da4ca59f069e371b23464d6206d7797a4f0f065b0bda927dfb9938ee87bd794f618fe61a79fd192a8e3a57891c04f957d086ce4896ee02160ff1759fd
-
Filesize
197KB
MD5d4cb6a154bab1ce00804fc6efeb028f4
SHA1f8b22ce6127d60637e3321e9400414b98373a87a
SHA256ad254c74a779a836062d23722980daba128175a4b4382038b82bd004cb730cab
SHA512d9a0b94db0eea39cfd7078d299dbbec69dcb6c0f03306771c8945a86573f172fe43da2805172992fd320780f77874298bf77334d3d1c9a585fa9ef222d6131d4
-
Filesize
197KB
MD5b7299c218028e4823d1512594426dfa3
SHA14715450ed7ca023847ee54f25371fd58425931ca
SHA256624dfab4f1430f170951c5a23d7b424546186805f8255d821f6a7019af9991d4
SHA5123aef9663d400000897e3afb097d5feb89393722622fc8013af04c3c02d37bfc83a93dba9442978aec363a1e7197b7454b51ec83118e017d006b3e99913bf967a
-
Filesize
197KB
MD5d11ba6ed272075e4d6cc0d07546c1115
SHA1a9a684224173e6e7d3e3f41605f485ee72cd9a1f
SHA256ea6a93e902396a5d2ac061ee7d95510e1569c0e685eefa01d2b154e441688856
SHA5123d2e9c6bb47e25a662a7eb8eac48d4ee1dfb74ade0cc79f05f785508b836ee30a3dc49ae24309a78cf77cfa898cfdbc8b7f25ee64568356625a0d970e74330e4
-
Filesize
197KB
MD5595d6165526fbf37710624650910a71b
SHA1104a4f9d26a48a24f605fbf40e3c56036c3d9089
SHA25635a85b1400c69cba0ff21fbcfecc07453d4a8f671a4b7f6f922fbb854369aea1
SHA51202883d5c5a397d33d936adff82992c179551ea0763d1c53285eca728f9df6b3f2b99daee0a7959d809f5adceeb6ec9997aa3299c4d3edfce5f444dc50d3d4d2b
-
Filesize
197KB
MD5faf97f14dd0a9abdf0da89e9798131cf
SHA100a35dd06a24b67ade696c2f0e55045b72ac281e
SHA256856bab00b3485143a74697a78e25962a2f64d90c9131cb9cfb6b90926f4b6354
SHA5125a1cb5f2d342fccb9e90b0a2fb45e8e8eab42a0a52b323d732a1d04408e9573a3e360aef4c42c7f8f43dac896c79f78632521466cec235019c55ca9f465f5a39
-
Filesize
197KB
MD5a398413cf3db58d924a07824553f48b0
SHA1af14f7c96aeff684244d464535b07adc7a972736
SHA256bda6e43b3afc87adf2eb415a5ff5867ca76395c2d94ef2e06ee9bdbf15a17eb6
SHA5121d73c60cd11be04facc2fcd4a0e0bb97b025b6ef79bb375f816a0be4381ebf83b44526bcf207001ad519e5909080ab945fec61e0ad531602dcf385cff1250daa