Analysis
-
max time kernel
144s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe
Resource
win10v2004-20240802-en
General
-
Target
2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe
-
Size
80KB
-
MD5
9a78d7c98cad77dc28204bf3ae7cee82
-
SHA1
9c3db91bb7c09836177b4640b89c10d1bf43fdc2
-
SHA256
2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0
-
SHA512
5152e062103c0b7fcf85cc532af51b976f4d45ec59aee22b1a3c067f7bdc65eaa72c513b3fc6740ee59197d5916095c29b2df5da3585f3162545f4ef7bbf947f
-
SSDEEP
384:vbLwOs8AHsc4sMfwhKQLroX4/CFsrdOI1Nb7g7FX7XYfruVDtM9tQ/FKlnVwUUOV:vvw9816vhKQLroX4/wQRNrfrunMxVFAi
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA6DECB7-C846-4fdb-AE02-2BF770771623}\stubpath = "C:\\Windows\\{DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe" 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AC0359AD-09BC-4ad4-868C-5D023E49E222} {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}\stubpath = "C:\\Windows\\{BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}.exe" {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D94C06D-D54B-4c23-8F3F-89E25155C6D0} {BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DACC110B-B92D-4661-A7F7-D9BA5ED2A107} {41D909C9-CC04-4a97-BA94-80265A208D6A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DACC110B-B92D-4661-A7F7-D9BA5ED2A107}\stubpath = "C:\\Windows\\{DACC110B-B92D-4661-A7F7-D9BA5ED2A107}.exe" {41D909C9-CC04-4a97-BA94-80265A208D6A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AC0359AD-09BC-4ad4-868C-5D023E49E222}\stubpath = "C:\\Windows\\{AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe" {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6BFB369-274B-4f74-8DFE-5922D41C9D12} {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56DE9949-3C80-4ebe-A1A2-FC09ADC69D40} {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BCC112C4-2340-4d8a-A91C-21A1EEEADBAC} {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{41D909C9-CC04-4a97-BA94-80265A208D6A}\stubpath = "C:\\Windows\\{41D909C9-CC04-4a97-BA94-80265A208D6A}.exe" {7D94C06D-D54B-4c23-8F3F-89E25155C6D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D94C06D-D54B-4c23-8F3F-89E25155C6D0}\stubpath = "C:\\Windows\\{7D94C06D-D54B-4c23-8F3F-89E25155C6D0}.exe" {BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{41D909C9-CC04-4a97-BA94-80265A208D6A} {7D94C06D-D54B-4c23-8F3F-89E25155C6D0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA6DECB7-C846-4fdb-AE02-2BF770771623} 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}\stubpath = "C:\\Windows\\{FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe" {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2} {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}\stubpath = "C:\\Windows\\{9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe" {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}\stubpath = "C:\\Windows\\{56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe" {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC} {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E06CCB4-2537-48a4-A9E1-7F7F5087DD04} {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}\stubpath = "C:\\Windows\\{7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe" {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6BFB369-274B-4f74-8DFE-5922D41C9D12}\stubpath = "C:\\Windows\\{A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe" {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe -
Deletes itself 1 IoCs
pid Process 2348 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2540 {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe 2076 {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe 3020 {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe 2692 {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe 944 {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe 572 {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe 3064 {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe 3036 {BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}.exe 872 {7D94C06D-D54B-4c23-8F3F-89E25155C6D0}.exe 1676 {41D909C9-CC04-4a97-BA94-80265A208D6A}.exe 2360 {DACC110B-B92D-4661-A7F7-D9BA5ED2A107}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe File created C:\Windows\{56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe File created C:\Windows\{7D94C06D-D54B-4c23-8F3F-89E25155C6D0}.exe {BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}.exe File created C:\Windows\{41D909C9-CC04-4a97-BA94-80265A208D6A}.exe {7D94C06D-D54B-4c23-8F3F-89E25155C6D0}.exe File created C:\Windows\{DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe File created C:\Windows\{FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe File created C:\Windows\{A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe File created C:\Windows\{BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}.exe {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe File created C:\Windows\{DACC110B-B92D-4661-A7F7-D9BA5ED2A107}.exe {41D909C9-CC04-4a97-BA94-80265A208D6A}.exe File created C:\Windows\{9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe File created C:\Windows\{7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7D94C06D-D54B-4c23-8F3F-89E25155C6D0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DACC110B-B92D-4661-A7F7-D9BA5ED2A107}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {41D909C9-CC04-4a97-BA94-80265A208D6A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2024 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe Token: SeIncBasePriorityPrivilege 2540 {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe Token: SeIncBasePriorityPrivilege 2076 {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe Token: SeIncBasePriorityPrivilege 3020 {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe Token: SeIncBasePriorityPrivilege 2692 {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe Token: SeIncBasePriorityPrivilege 944 {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe Token: SeIncBasePriorityPrivilege 572 {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe Token: SeIncBasePriorityPrivilege 3064 {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe Token: SeIncBasePriorityPrivilege 3036 {BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}.exe Token: SeIncBasePriorityPrivilege 872 {7D94C06D-D54B-4c23-8F3F-89E25155C6D0}.exe Token: SeIncBasePriorityPrivilege 1676 {41D909C9-CC04-4a97-BA94-80265A208D6A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2540 2024 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe 30 PID 2024 wrote to memory of 2540 2024 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe 30 PID 2024 wrote to memory of 2540 2024 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe 30 PID 2024 wrote to memory of 2540 2024 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe 30 PID 2024 wrote to memory of 2348 2024 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe 31 PID 2024 wrote to memory of 2348 2024 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe 31 PID 2024 wrote to memory of 2348 2024 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe 31 PID 2024 wrote to memory of 2348 2024 2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe 31 PID 2540 wrote to memory of 2076 2540 {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe 32 PID 2540 wrote to memory of 2076 2540 {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe 32 PID 2540 wrote to memory of 2076 2540 {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe 32 PID 2540 wrote to memory of 2076 2540 {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe 32 PID 2540 wrote to memory of 2796 2540 {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe 33 PID 2540 wrote to memory of 2796 2540 {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe 33 PID 2540 wrote to memory of 2796 2540 {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe 33 PID 2540 wrote to memory of 2796 2540 {DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe 33 PID 2076 wrote to memory of 3020 2076 {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe 34 PID 2076 wrote to memory of 3020 2076 {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe 34 PID 2076 wrote to memory of 3020 2076 {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe 34 PID 2076 wrote to memory of 3020 2076 {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe 34 PID 2076 wrote to memory of 2800 2076 {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe 35 PID 2076 wrote to memory of 2800 2076 {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe 35 PID 2076 wrote to memory of 2800 2076 {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe 35 PID 2076 wrote to memory of 2800 2076 {FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe 35 PID 3020 wrote to memory of 2692 3020 {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe 36 PID 3020 wrote to memory of 2692 3020 {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe 36 PID 3020 wrote to memory of 2692 3020 {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe 36 PID 3020 wrote to memory of 2692 3020 {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe 36 PID 3020 wrote to memory of 2784 3020 {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe 37 PID 3020 wrote to memory of 2784 3020 {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe 37 PID 3020 wrote to memory of 2784 3020 {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe 37 PID 3020 wrote to memory of 2784 3020 {9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe 37 PID 2692 wrote to memory of 944 2692 {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe 38 PID 2692 wrote to memory of 944 2692 {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe 38 PID 2692 wrote to memory of 944 2692 {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe 38 PID 2692 wrote to memory of 944 2692 {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe 38 PID 2692 wrote to memory of 1356 2692 {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe 39 PID 2692 wrote to memory of 1356 2692 {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe 39 PID 2692 wrote to memory of 1356 2692 {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe 39 PID 2692 wrote to memory of 1356 2692 {7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe 39 PID 944 wrote to memory of 572 944 {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe 40 PID 944 wrote to memory of 572 944 {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe 40 PID 944 wrote to memory of 572 944 {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe 40 PID 944 wrote to memory of 572 944 {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe 40 PID 944 wrote to memory of 2604 944 {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe 41 PID 944 wrote to memory of 2604 944 {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe 41 PID 944 wrote to memory of 2604 944 {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe 41 PID 944 wrote to memory of 2604 944 {AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe 41 PID 572 wrote to memory of 3064 572 {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe 42 PID 572 wrote to memory of 3064 572 {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe 42 PID 572 wrote to memory of 3064 572 {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe 42 PID 572 wrote to memory of 3064 572 {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe 42 PID 572 wrote to memory of 2648 572 {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe 43 PID 572 wrote to memory of 2648 572 {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe 43 PID 572 wrote to memory of 2648 572 {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe 43 PID 572 wrote to memory of 2648 572 {A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe 43 PID 3064 wrote to memory of 3036 3064 {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe 44 PID 3064 wrote to memory of 3036 3064 {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe 44 PID 3064 wrote to memory of 3036 3064 {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe 44 PID 3064 wrote to memory of 3036 3064 {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe 44 PID 3064 wrote to memory of 3040 3064 {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe 45 PID 3064 wrote to memory of 3040 3064 {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe 45 PID 3064 wrote to memory of 3040 3064 {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe 45 PID 3064 wrote to memory of 3040 3064 {56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe"C:\Users\Admin\AppData\Local\Temp\2812ff6d68ac7a3f47e09fc89c7fb6565093bd1ea3d1b1adfd8948eba724cdb0.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\{DA6DECB7-C846-4fdb-AE02-2BF770771623}.exeC:\Windows\{DA6DECB7-C846-4fdb-AE02-2BF770771623}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\{FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exeC:\Windows\{FB2E8682-D340-4d56-B5DB-47CA5BFDD5AC}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\{9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exeC:\Windows\{9E6CC7F0-DDDA-4ec5-8171-E7ED6FBCE3E2}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\{7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exeC:\Windows\{7E06CCB4-2537-48a4-A9E1-7F7F5087DD04}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\{AC0359AD-09BC-4ad4-868C-5D023E49E222}.exeC:\Windows\{AC0359AD-09BC-4ad4-868C-5D023E49E222}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\{A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exeC:\Windows\{A6BFB369-274B-4f74-8DFE-5922D41C9D12}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\{56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exeC:\Windows\{56DE9949-3C80-4ebe-A1A2-FC09ADC69D40}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\{BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}.exeC:\Windows\{BCC112C4-2340-4d8a-A91C-21A1EEEADBAC}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3036 -
C:\Windows\{7D94C06D-D54B-4c23-8F3F-89E25155C6D0}.exeC:\Windows\{7D94C06D-D54B-4c23-8F3F-89E25155C6D0}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:872 -
C:\Windows\{41D909C9-CC04-4a97-BA94-80265A208D6A}.exeC:\Windows\{41D909C9-CC04-4a97-BA94-80265A208D6A}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1676 -
C:\Windows\{DACC110B-B92D-4661-A7F7-D9BA5ED2A107}.exeC:\Windows\{DACC110B-B92D-4661-A7F7-D9BA5ED2A107}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41D90~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D94C~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BCC11~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56DE9~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6BFB~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AC035~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E06C~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E6CC~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FB2E8~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DA6DE~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2812FF~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD51728e92a24a30df843141a9f35a0469c
SHA12bcb454fc8d0fe26d7a3ed0d81b02e21602b9174
SHA256530d7131d2600e969cb244bc0f6a6e613042af39a5b765f0b239c3ef8a560515
SHA512003ca6e5308e2ceafd26dc076caa963fa9eea75bf164aa8e279aa25d19d793359fc26f9fe3ae2db34a2484f1d2c461a521bf954106403c51633550749f346ef1
-
Filesize
80KB
MD50edca3843f9a42d26d7ee14df8e08089
SHA1a51f771e35f87b5a55236503a7353e4f34c894d7
SHA2565952338c20a3a6cef0703164169edd9b14a2ac7d6c9efdfe508161d3c8fb626a
SHA512c9b40cc8a33932144a623caa57e9f45a9ea86790e0426f276e19bc0456aaab65f35cac26e6ceef85a927ed548ee0e967b2e64f94adf742ea5d1bb231f223cdf0
-
Filesize
80KB
MD554719c3ae7a3d8b682001b6042554a18
SHA11ef5e1e342fc66038bb119f04b38aa558945ef44
SHA2563f051b2174e7d3272c3bac640cee6fffc6792158f97125fe1859f4b812c8e006
SHA512a46ec94b294bcb43255a8b759f1f9f4224594e33f1d21cffa1c81cf8e120316d4305692690d10b0abf1adbc90cc47d0039d8cf0094e6e6830a4a0c9b145f82a5
-
Filesize
80KB
MD587deeff814a26526aa9a86e2b2344214
SHA1d9cbcc2ff25bf200b8f2b003649ef69bd7326139
SHA256c36d9d61eb61bb6015f53963c6857e3c105d3769f703e19cda7efffac4ce545e
SHA512bd868eb150781566235ed6dd6c7d36cdb2cb40eda21f146b34d2b78b2e4d3bde70c097de0b206e82d77e736ef90feb49a4012084d31a1a7097d98e39b4fd3b40
-
Filesize
80KB
MD53dc92f959bc1c616835440d7d33244dc
SHA191d93fc8e2add047ce6808588f52ef2d8b0f7a9c
SHA256197410b489d0578410625e8a2027138d9e6fa03eba06b161ca6c1ffcc37624d5
SHA5123ee084b4561cf0a05cffe61d10a7c25fbba12d9786f122d55f4431b837f1cbef4764a43d409a6c229fa18e50ecbc8c664c26285dafa7d103c7b147cd01a44362
-
Filesize
80KB
MD58c32a60d020f824e652a3413e6a94d7d
SHA17af642c3957975c0e7ead88f92b3faeea8a9edeb
SHA256d06a3486e4cb2a999050bced3d87fe850cc5e9d6fdc17cd14102a23950c9f95e
SHA5125149be345c09f52ee486e160eaa2523987a68ccfb267c6d164519313b2a82098b8573cfc6922743a7a55a49ca6557eff79d0ae131df3d9f272695726ffacea9e
-
Filesize
80KB
MD5c9edd580c73852ca5e736caec63ab0b6
SHA1284c5ede6afea91c5f2da58999dc3acb92643d20
SHA256e0d34d2ea0f1b035125ab2d8f469172d6e4bdacabccba93a67d2a9afb60d9e76
SHA512e7d9d0beb1b4eb9985f9910cbe0fff899cda9c07b3d19f73b780b012c82baf6862071de545afaf767aa8b01c3704f47b1d1cc39eecb281bce177c9d605153f43
-
Filesize
80KB
MD5da487551023472671e279789b6eb0ed2
SHA1a9a48ef419c73669faf88a8b2dedeb5845574744
SHA2562b551d33c78d12f034034c64dfb04f7087571e71445bddb5d859d5cf2329b9ba
SHA5120e13b45b7c355fad1e8e8c4caa41378cc6d60e2df89a2644a0d50ad4acfadd90e9bea72f1b726e4aa3540eaa6200421a0c912a8b841c544a719b65c9e1322781
-
Filesize
80KB
MD5d5d4f955721182eb569b43b1110eb1e4
SHA1c1ec8f605014c3099b1c95febf2fd3f17a5fa090
SHA256d43dd2216963862fb841e162c98d2426db323949b17dab113c01e6727810ef60
SHA51237d7cc9c00063bbe63ee8a0c0f760ad1f6e54e3b08dc3e0be09c746790532bdb15c212b690b4dc0a92fec9d4c46b3c4d7a23439452073df3c5936c0ca97c15a7
-
Filesize
80KB
MD51e408dd8e3920d92475a5633f1796083
SHA1ffd096927a77790618af2d15fa48982b263f6e4e
SHA2565643e60689eca8a45a0b2fc08fee2bc5052a5d027ee6ec137bd7c531d21c77e0
SHA5128cbe9d12beabe35956456e396602b8f3b71bf47cd49f8d3f03c38d7b25c21e495e3d66d3c181980e3867e2fe38f3ed50c0c40aa08ca4c00ec79907bfb9232eae
-
Filesize
80KB
MD5f42c421eea92cfed2b92236e0a42bde6
SHA1ffa4dd0367c61843fafdb9746f94ce47000fc0b4
SHA256268374c3ce97b38e360ee5e7962c48724cabf36add85bba205dc06fd32e3498f
SHA512733f7ab8951b6748c1a3f8aa452cc217191383e30c03c30e97717712bac29c8e7cb7fb2cf6d2b1450d563d0545d4f1cc3a008bf2d4cf3a1e65dd894036d782ee