Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
20b2db18fb06fba12487960d61359070N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
20b2db18fb06fba12487960d61359070N.exe
Resource
win10v2004-20240802-en
General
-
Target
20b2db18fb06fba12487960d61359070N.exe
-
Size
91KB
-
MD5
20b2db18fb06fba12487960d61359070
-
SHA1
e26f2a49f6975c727554a4be8256b86f0d6df859
-
SHA256
895e73ada2bbd57e122c9dffad787a84fddce5e4a132253f22c9c27cff3a96d4
-
SHA512
860be0f7c2f0c902721fc231234cadf17118ce2b04a5fce4aa9dab6f067cafea83e2f7d6b47e0592eac15f16d952c38347e89e7abb5fea73aa253b21c94107e6
-
SSDEEP
768:5vw9816uhKiro74/wQNNrfrunMxVFA3b7t:lEGkmo7lCunMxVS3Ht
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D6334427-2123-4092-A593-B02641DF71BB}\stubpath = "C:\\Windows\\{D6334427-2123-4092-A593-B02641DF71BB}.exe" {8756BB71-E75F-40b4-BCF7-67A451259070}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6029F528-1429-4443-A2BD-3EE5AE14B8B9}\stubpath = "C:\\Windows\\{6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe" {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DD07EEE7-C0D0-4b74-BF12-99B7524775C8} {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92667651-AF1F-4451-AFE2-85CA057F7425} {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92667651-AF1F-4451-AFE2-85CA057F7425}\stubpath = "C:\\Windows\\{92667651-AF1F-4451-AFE2-85CA057F7425}.exe" {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8756BB71-E75F-40b4-BCF7-67A451259070} {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}\stubpath = "C:\\Windows\\{EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe" {D6334427-2123-4092-A593-B02641DF71BB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}\stubpath = "C:\\Windows\\{BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe" {92667651-AF1F-4451-AFE2-85CA057F7425}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8756BB71-E75F-40b4-BCF7-67A451259070}\stubpath = "C:\\Windows\\{8756BB71-E75F-40b4-BCF7-67A451259070}.exe" {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D6334427-2123-4092-A593-B02641DF71BB} {8756BB71-E75F-40b4-BCF7-67A451259070}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E22B0C6-71EE-4810-89DA-90A39DD4C640} {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}\stubpath = "C:\\Windows\\{4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe" 20b2db18fb06fba12487960d61359070N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6029F528-1429-4443-A2BD-3EE5AE14B8B9} {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DD07EEE7-C0D0-4b74-BF12-99B7524775C8}\stubpath = "C:\\Windows\\{DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe" {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E22B0C6-71EE-4810-89DA-90A39DD4C640}\stubpath = "C:\\Windows\\{9E22B0C6-71EE-4810-89DA-90A39DD4C640}.exe" {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A2CF42C-E7B2-4722-82A8-E9538A11C2C6} 20b2db18fb06fba12487960d61359070N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BEA8AB3D-C32D-408f-9682-67CBAA10B1FF} {92667651-AF1F-4451-AFE2-85CA057F7425}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E} {D6334427-2123-4092-A593-B02641DF71BB}.exe -
Executes dropped EXE 9 IoCs
pid Process 2076 {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe 4460 {92667651-AF1F-4451-AFE2-85CA057F7425}.exe 3792 {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe 3380 {8756BB71-E75F-40b4-BCF7-67A451259070}.exe 3040 {D6334427-2123-4092-A593-B02641DF71BB}.exe 2688 {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe 724 {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe 2484 {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe 3708 {9E22B0C6-71EE-4810-89DA-90A39DD4C640}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe {92667651-AF1F-4451-AFE2-85CA057F7425}.exe File created C:\Windows\{8756BB71-E75F-40b4-BCF7-67A451259070}.exe {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe File created C:\Windows\{D6334427-2123-4092-A593-B02641DF71BB}.exe {8756BB71-E75F-40b4-BCF7-67A451259070}.exe File created C:\Windows\{6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe File created C:\Windows\{DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe File created C:\Windows\{4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe 20b2db18fb06fba12487960d61359070N.exe File created C:\Windows\{92667651-AF1F-4451-AFE2-85CA057F7425}.exe {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe File created C:\Windows\{EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe {D6334427-2123-4092-A593-B02641DF71BB}.exe File created C:\Windows\{9E22B0C6-71EE-4810-89DA-90A39DD4C640}.exe {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {92667651-AF1F-4451-AFE2-85CA057F7425}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8756BB71-E75F-40b4-BCF7-67A451259070}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D6334427-2123-4092-A593-B02641DF71BB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20b2db18fb06fba12487960d61359070N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9E22B0C6-71EE-4810-89DA-90A39DD4C640}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4592 20b2db18fb06fba12487960d61359070N.exe Token: SeIncBasePriorityPrivilege 2076 {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe Token: SeIncBasePriorityPrivilege 4460 {92667651-AF1F-4451-AFE2-85CA057F7425}.exe Token: SeIncBasePriorityPrivilege 3792 {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe Token: SeIncBasePriorityPrivilege 3380 {8756BB71-E75F-40b4-BCF7-67A451259070}.exe Token: SeIncBasePriorityPrivilege 3040 {D6334427-2123-4092-A593-B02641DF71BB}.exe Token: SeIncBasePriorityPrivilege 2688 {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe Token: SeIncBasePriorityPrivilege 724 {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe Token: SeIncBasePriorityPrivilege 2484 {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4592 wrote to memory of 2076 4592 20b2db18fb06fba12487960d61359070N.exe 93 PID 4592 wrote to memory of 2076 4592 20b2db18fb06fba12487960d61359070N.exe 93 PID 4592 wrote to memory of 2076 4592 20b2db18fb06fba12487960d61359070N.exe 93 PID 4592 wrote to memory of 1932 4592 20b2db18fb06fba12487960d61359070N.exe 94 PID 4592 wrote to memory of 1932 4592 20b2db18fb06fba12487960d61359070N.exe 94 PID 4592 wrote to memory of 1932 4592 20b2db18fb06fba12487960d61359070N.exe 94 PID 2076 wrote to memory of 4460 2076 {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe 95 PID 2076 wrote to memory of 4460 2076 {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe 95 PID 2076 wrote to memory of 4460 2076 {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe 95 PID 2076 wrote to memory of 4992 2076 {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe 96 PID 2076 wrote to memory of 4992 2076 {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe 96 PID 2076 wrote to memory of 4992 2076 {4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe 96 PID 4460 wrote to memory of 3792 4460 {92667651-AF1F-4451-AFE2-85CA057F7425}.exe 99 PID 4460 wrote to memory of 3792 4460 {92667651-AF1F-4451-AFE2-85CA057F7425}.exe 99 PID 4460 wrote to memory of 3792 4460 {92667651-AF1F-4451-AFE2-85CA057F7425}.exe 99 PID 4460 wrote to memory of 3108 4460 {92667651-AF1F-4451-AFE2-85CA057F7425}.exe 100 PID 4460 wrote to memory of 3108 4460 {92667651-AF1F-4451-AFE2-85CA057F7425}.exe 100 PID 4460 wrote to memory of 3108 4460 {92667651-AF1F-4451-AFE2-85CA057F7425}.exe 100 PID 3792 wrote to memory of 3380 3792 {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe 101 PID 3792 wrote to memory of 3380 3792 {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe 101 PID 3792 wrote to memory of 3380 3792 {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe 101 PID 3792 wrote to memory of 1696 3792 {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe 102 PID 3792 wrote to memory of 1696 3792 {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe 102 PID 3792 wrote to memory of 1696 3792 {BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe 102 PID 3380 wrote to memory of 3040 3380 {8756BB71-E75F-40b4-BCF7-67A451259070}.exe 103 PID 3380 wrote to memory of 3040 3380 {8756BB71-E75F-40b4-BCF7-67A451259070}.exe 103 PID 3380 wrote to memory of 3040 3380 {8756BB71-E75F-40b4-BCF7-67A451259070}.exe 103 PID 3380 wrote to memory of 1760 3380 {8756BB71-E75F-40b4-BCF7-67A451259070}.exe 104 PID 3380 wrote to memory of 1760 3380 {8756BB71-E75F-40b4-BCF7-67A451259070}.exe 104 PID 3380 wrote to memory of 1760 3380 {8756BB71-E75F-40b4-BCF7-67A451259070}.exe 104 PID 3040 wrote to memory of 2688 3040 {D6334427-2123-4092-A593-B02641DF71BB}.exe 105 PID 3040 wrote to memory of 2688 3040 {D6334427-2123-4092-A593-B02641DF71BB}.exe 105 PID 3040 wrote to memory of 2688 3040 {D6334427-2123-4092-A593-B02641DF71BB}.exe 105 PID 3040 wrote to memory of 1052 3040 {D6334427-2123-4092-A593-B02641DF71BB}.exe 106 PID 3040 wrote to memory of 1052 3040 {D6334427-2123-4092-A593-B02641DF71BB}.exe 106 PID 3040 wrote to memory of 1052 3040 {D6334427-2123-4092-A593-B02641DF71BB}.exe 106 PID 2688 wrote to memory of 724 2688 {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe 107 PID 2688 wrote to memory of 724 2688 {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe 107 PID 2688 wrote to memory of 724 2688 {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe 107 PID 2688 wrote to memory of 4816 2688 {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe 108 PID 2688 wrote to memory of 4816 2688 {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe 108 PID 2688 wrote to memory of 4816 2688 {EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe 108 PID 724 wrote to memory of 2484 724 {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe 109 PID 724 wrote to memory of 2484 724 {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe 109 PID 724 wrote to memory of 2484 724 {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe 109 PID 724 wrote to memory of 5004 724 {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe 110 PID 724 wrote to memory of 5004 724 {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe 110 PID 724 wrote to memory of 5004 724 {6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe 110 PID 2484 wrote to memory of 3708 2484 {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe 111 PID 2484 wrote to memory of 3708 2484 {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe 111 PID 2484 wrote to memory of 3708 2484 {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe 111 PID 2484 wrote to memory of 3536 2484 {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe 112 PID 2484 wrote to memory of 3536 2484 {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe 112 PID 2484 wrote to memory of 3536 2484 {DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\20b2db18fb06fba12487960d61359070N.exe"C:\Users\Admin\AppData\Local\Temp\20b2db18fb06fba12487960d61359070N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\{4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exeC:\Windows\{4A2CF42C-E7B2-4722-82A8-E9538A11C2C6}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\{92667651-AF1F-4451-AFE2-85CA057F7425}.exeC:\Windows\{92667651-AF1F-4451-AFE2-85CA057F7425}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\{BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exeC:\Windows\{BEA8AB3D-C32D-408f-9682-67CBAA10B1FF}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\{8756BB71-E75F-40b4-BCF7-67A451259070}.exeC:\Windows\{8756BB71-E75F-40b4-BCF7-67A451259070}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\{D6334427-2123-4092-A593-B02641DF71BB}.exeC:\Windows\{D6334427-2123-4092-A593-B02641DF71BB}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\{EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exeC:\Windows\{EA6F00E9-3B13-4b9d-9D48-53D1FA9F9E1E}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\{6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exeC:\Windows\{6029F528-1429-4443-A2BD-3EE5AE14B8B9}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\{DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exeC:\Windows\{DD07EEE7-C0D0-4b74-BF12-99B7524775C8}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\{9E22B0C6-71EE-4810-89DA-90A39DD4C640}.exeC:\Windows\{9E22B0C6-71EE-4810-89DA-90A39DD4C640}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DD07E~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6029F~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA6F0~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D6334~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8756B~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BEA8A~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{92667~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4A2CF~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\20B2DB~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5fe1d62c7c708c92230e60004e6ad0065
SHA12c62fac4f87f94d14a5810470c1a36877472f3e6
SHA256effaeb7460933bed08d39fafde01fcda73ea9e5e0f20c49967a729ceadeb3185
SHA5129cd5dfaefd684d9760be3d2b1f52a5725f9c062970dd1b216e616266242576bb2a451be75d024bf4d81be76f1c99557eff232f834085084e54f231d69be07f51
-
Filesize
91KB
MD5555d3ab277b9996bafa61bdcea0ff7cd
SHA1d26a7ed44405388f7d5aaa691f1fd584c0165048
SHA2564e43dd5ccb1a12a619407efd066d329ec2988367ad3c867c7f49a26731da2a8d
SHA512fb9ad48385dafea8887537e7bc9162a2db7bc4a1e53d8aa879345c623c4ef7883a0e187409e5eb3f3de1d5fbf190c1013b2c49b892a86407396c4087a2fb4da8
-
Filesize
91KB
MD5ea0455caa31803dc33201b197fc32c96
SHA1e72cff1aec3e3fd8e28a13e9b9fc62e01fa5219e
SHA2569adc8141d9fbfde4dfaf6db8cbab8a49982e8901a671233699f7f144d9420793
SHA5123a6f2b188a74577c0259c3b0cc7115d7f318130e43489255e6e7f3c82f061796ceba26075ef81ae96d84eb584e050464d0195b3798fb2123f9035196d1d3d6cb
-
Filesize
91KB
MD56f3777773a088381df54facb78824b2d
SHA1ff97ff4b28376526cbb720ad612673b6b11f955d
SHA2564efa082959a922630028188c12a1cc07672169d41b10410ddc7b7454ed4dcad7
SHA5120a99bd6fd8b5ac40581778341bcbeaea00dc7c7de78bd7e84dc7aa769d5053799c400b1a34309dae4247f59857bea39f99a5774f02bd26632ac2064deb5cfd8c
-
Filesize
91KB
MD5aba648f5e8dd0f5c9eb9fbafe2065913
SHA126e3ae5a409460b81e8be883e1e6f41a7e1e78d5
SHA256f5b70745b656224e35f648dd41b4db0abf421638b9b419ea5a33f1bae9466b9b
SHA51276dcf016de669d4ccd593b965d945e6291ab0bcc7570969d6de2032d57e55cb2e8e81b3181181567c4a9e731e1859070114f74b6f9104cc5987191bf5a1fbf8d
-
Filesize
91KB
MD57a62a3ab08a846babcf3b1c712432f69
SHA11e82f5b34cb0749c013b8c6361103a0ae721c914
SHA256be91c6cd4ba903d8e6f8ad6e8e95a59fba10dd89fa1919ea95017b97af9e2a05
SHA512fe596748696e2bff4e716cb457b251b2c0e071ec6131e1a28091e9239138d229c59a6d7ff364769ff8c3ac393046acca3c2227bc3495c32dbe164bde51f08999
-
Filesize
91KB
MD578dd4fdf6c3a9e23717104966816a7f7
SHA1c98b8bdaf6fa3521fd8d0f5696620a058991a5f0
SHA256101006242738ea1bf606644f80179f847aa797ec63957a6e0b71cd97f9673aa9
SHA5121537d1732c594b61cd32c401563261a80a8ce289fc18a4e6c2fa1a4970e569d3576479869e83b9d47e312071244312b6fbbf97364fa19d7e9b35675df8250276
-
Filesize
91KB
MD530590b5308ed44a9067c91ef9ee94b21
SHA12bb5adffd1ec8dd74c2d22f63b1284a17a7dc56d
SHA256be25d1e6437dc58a366870efae22361bda94233506e0e1ebf2e0d90aee634779
SHA512deaee36b45187d796bf315190bf5164c9e9fe675047b3e0a10eed635f5a23c15193223e9a8e728a5e668a002ca9197d3478b3281b5af145b12c1c13b1c0a6d3a
-
Filesize
91KB
MD5fceb62833dd5887073932ba7b6269e4f
SHA1a82dcb25e0322806e9ab511d14b3c696b234955c
SHA256e9ab2ea2a426ac28423dbfcda52c98a5572d1cffee1a7710cb73322196d161d5
SHA512019a6ce602dfb9b5d6c2b8dbabbe31fb952eea56dddab2087b5a579773a1397bd75ae35d4d3649aed4fccf724f20b2bf338d957028e9cdd63fb08f11868ce41f