Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe
Resource
win10v2004-20240802-en
General
-
Target
e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe
-
Size
168KB
-
MD5
98b3812735a48904638761327ff848b8
-
SHA1
f511727d79bedec88ac82c9ead318a97410a5ba4
-
SHA256
e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c
-
SHA512
97c3aa2d7695711a486d16104f56272f3e91549b2af7221a4d0300962387211c19f7e90c3f245eb6c974f3beb93d31085afb22eb16bbcfea1362d30337d4d81e
-
SSDEEP
1536:1EGh0oNlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oNlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4499218F-575C-4917-B92A-1476D3BD8A26} {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4499218F-575C-4917-B92A-1476D3BD8A26}\stubpath = "C:\\Windows\\{4499218F-575C-4917-B92A-1476D3BD8A26}.exe" {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A19750D7-61BD-4a08-AB51-F42BDE469602} {4499218F-575C-4917-B92A-1476D3BD8A26}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A19EB11-66CE-49f7-963A-2D72237853E8}\stubpath = "C:\\Windows\\{3A19EB11-66CE-49f7-963A-2D72237853E8}.exe" e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9A67670-A0FE-4ae9-95BF-A88430A1F50A} {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21} {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EC0823E-EB09-403f-BBA0-61975354C334} {83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3970548C-E76F-4a55-AB30-3502F026A7F3} {5119B931-801C-4552-A998-C5256CEF0F1A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF} {A19750D7-61BD-4a08-AB51-F42BDE469602}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}\stubpath = "C:\\Windows\\{83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}.exe" {A19750D7-61BD-4a08-AB51-F42BDE469602}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1B833B5D-CF77-4176-BABA-AEE19A253628}\stubpath = "C:\\Windows\\{1B833B5D-CF77-4176-BABA-AEE19A253628}.exe" {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A19750D7-61BD-4a08-AB51-F42BDE469602}\stubpath = "C:\\Windows\\{A19750D7-61BD-4a08-AB51-F42BDE469602}.exe" {4499218F-575C-4917-B92A-1476D3BD8A26}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D47D20A0-123E-4255-878C-83961F6B3A96}\stubpath = "C:\\Windows\\{D47D20A0-123E-4255-878C-83961F6B3A96}.exe" {7EC0823E-EB09-403f-BBA0-61975354C334}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A19EB11-66CE-49f7-963A-2D72237853E8} e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5119B931-801C-4552-A998-C5256CEF0F1A}\stubpath = "C:\\Windows\\{5119B931-801C-4552-A998-C5256CEF0F1A}.exe" {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1B833B5D-CF77-4176-BABA-AEE19A253628} {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3970548C-E76F-4a55-AB30-3502F026A7F3}\stubpath = "C:\\Windows\\{3970548C-E76F-4a55-AB30-3502F026A7F3}.exe" {5119B931-801C-4552-A998-C5256CEF0F1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EC0823E-EB09-403f-BBA0-61975354C334}\stubpath = "C:\\Windows\\{7EC0823E-EB09-403f-BBA0-61975354C334}.exe" {83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D47D20A0-123E-4255-878C-83961F6B3A96} {7EC0823E-EB09-403f-BBA0-61975354C334}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9A67670-A0FE-4ae9-95BF-A88430A1F50A}\stubpath = "C:\\Windows\\{D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe" {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}\stubpath = "C:\\Windows\\{53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe" {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5119B931-801C-4552-A998-C5256CEF0F1A} {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe -
Deletes itself 1 IoCs
pid Process 2484 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2104 {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe 3024 {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe 2704 {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe 2824 {5119B931-801C-4552-A998-C5256CEF0F1A}.exe 2552 {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe 2024 {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe 1644 {4499218F-575C-4917-B92A-1476D3BD8A26}.exe 1288 {A19750D7-61BD-4a08-AB51-F42BDE469602}.exe 1936 {83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}.exe 2228 {7EC0823E-EB09-403f-BBA0-61975354C334}.exe 860 {D47D20A0-123E-4255-878C-83961F6B3A96}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe File created C:\Windows\{1B833B5D-CF77-4176-BABA-AEE19A253628}.exe {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe File created C:\Windows\{4499218F-575C-4917-B92A-1476D3BD8A26}.exe {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe File created C:\Windows\{D47D20A0-123E-4255-878C-83961F6B3A96}.exe {7EC0823E-EB09-403f-BBA0-61975354C334}.exe File created C:\Windows\{3A19EB11-66CE-49f7-963A-2D72237853E8}.exe e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe File created C:\Windows\{D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe File created C:\Windows\{5119B931-801C-4552-A998-C5256CEF0F1A}.exe {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe File created C:\Windows\{3970548C-E76F-4a55-AB30-3502F026A7F3}.exe {5119B931-801C-4552-A998-C5256CEF0F1A}.exe File created C:\Windows\{A19750D7-61BD-4a08-AB51-F42BDE469602}.exe {4499218F-575C-4917-B92A-1476D3BD8A26}.exe File created C:\Windows\{83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}.exe {A19750D7-61BD-4a08-AB51-F42BDE469602}.exe File created C:\Windows\{7EC0823E-EB09-403f-BBA0-61975354C334}.exe {83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A19750D7-61BD-4a08-AB51-F42BDE469602}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D47D20A0-123E-4255-878C-83961F6B3A96}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4499218F-575C-4917-B92A-1476D3BD8A26}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7EC0823E-EB09-403f-BBA0-61975354C334}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5119B931-801C-4552-A998-C5256CEF0F1A}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2316 e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe Token: SeIncBasePriorityPrivilege 2104 {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe Token: SeIncBasePriorityPrivilege 3024 {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe Token: SeIncBasePriorityPrivilege 2704 {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe Token: SeIncBasePriorityPrivilege 2824 {5119B931-801C-4552-A998-C5256CEF0F1A}.exe Token: SeIncBasePriorityPrivilege 2552 {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe Token: SeIncBasePriorityPrivilege 2024 {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe Token: SeIncBasePriorityPrivilege 1644 {4499218F-575C-4917-B92A-1476D3BD8A26}.exe Token: SeIncBasePriorityPrivilege 1288 {A19750D7-61BD-4a08-AB51-F42BDE469602}.exe Token: SeIncBasePriorityPrivilege 1936 {83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}.exe Token: SeIncBasePriorityPrivilege 2228 {7EC0823E-EB09-403f-BBA0-61975354C334}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2104 2316 e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe 31 PID 2316 wrote to memory of 2104 2316 e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe 31 PID 2316 wrote to memory of 2104 2316 e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe 31 PID 2316 wrote to memory of 2104 2316 e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe 31 PID 2316 wrote to memory of 2484 2316 e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe 32 PID 2316 wrote to memory of 2484 2316 e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe 32 PID 2316 wrote to memory of 2484 2316 e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe 32 PID 2316 wrote to memory of 2484 2316 e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe 32 PID 2104 wrote to memory of 3024 2104 {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe 33 PID 2104 wrote to memory of 3024 2104 {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe 33 PID 2104 wrote to memory of 3024 2104 {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe 33 PID 2104 wrote to memory of 3024 2104 {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe 33 PID 2104 wrote to memory of 2692 2104 {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe 34 PID 2104 wrote to memory of 2692 2104 {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe 34 PID 2104 wrote to memory of 2692 2104 {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe 34 PID 2104 wrote to memory of 2692 2104 {3A19EB11-66CE-49f7-963A-2D72237853E8}.exe 34 PID 3024 wrote to memory of 2704 3024 {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe 35 PID 3024 wrote to memory of 2704 3024 {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe 35 PID 3024 wrote to memory of 2704 3024 {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe 35 PID 3024 wrote to memory of 2704 3024 {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe 35 PID 3024 wrote to memory of 2656 3024 {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe 36 PID 3024 wrote to memory of 2656 3024 {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe 36 PID 3024 wrote to memory of 2656 3024 {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe 36 PID 3024 wrote to memory of 2656 3024 {D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe 36 PID 2704 wrote to memory of 2824 2704 {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe 37 PID 2704 wrote to memory of 2824 2704 {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe 37 PID 2704 wrote to memory of 2824 2704 {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe 37 PID 2704 wrote to memory of 2824 2704 {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe 37 PID 2704 wrote to memory of 2576 2704 {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe 38 PID 2704 wrote to memory of 2576 2704 {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe 38 PID 2704 wrote to memory of 2576 2704 {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe 38 PID 2704 wrote to memory of 2576 2704 {53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe 38 PID 2824 wrote to memory of 2552 2824 {5119B931-801C-4552-A998-C5256CEF0F1A}.exe 39 PID 2824 wrote to memory of 2552 2824 {5119B931-801C-4552-A998-C5256CEF0F1A}.exe 39 PID 2824 wrote to memory of 2552 2824 {5119B931-801C-4552-A998-C5256CEF0F1A}.exe 39 PID 2824 wrote to memory of 2552 2824 {5119B931-801C-4552-A998-C5256CEF0F1A}.exe 39 PID 2824 wrote to memory of 2604 2824 {5119B931-801C-4552-A998-C5256CEF0F1A}.exe 40 PID 2824 wrote to memory of 2604 2824 {5119B931-801C-4552-A998-C5256CEF0F1A}.exe 40 PID 2824 wrote to memory of 2604 2824 {5119B931-801C-4552-A998-C5256CEF0F1A}.exe 40 PID 2824 wrote to memory of 2604 2824 {5119B931-801C-4552-A998-C5256CEF0F1A}.exe 40 PID 2552 wrote to memory of 2024 2552 {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe 41 PID 2552 wrote to memory of 2024 2552 {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe 41 PID 2552 wrote to memory of 2024 2552 {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe 41 PID 2552 wrote to memory of 2024 2552 {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe 41 PID 2552 wrote to memory of 1808 2552 {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe 42 PID 2552 wrote to memory of 1808 2552 {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe 42 PID 2552 wrote to memory of 1808 2552 {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe 42 PID 2552 wrote to memory of 1808 2552 {3970548C-E76F-4a55-AB30-3502F026A7F3}.exe 42 PID 2024 wrote to memory of 1644 2024 {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe 43 PID 2024 wrote to memory of 1644 2024 {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe 43 PID 2024 wrote to memory of 1644 2024 {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe 43 PID 2024 wrote to memory of 1644 2024 {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe 43 PID 2024 wrote to memory of 1324 2024 {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe 44 PID 2024 wrote to memory of 1324 2024 {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe 44 PID 2024 wrote to memory of 1324 2024 {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe 44 PID 2024 wrote to memory of 1324 2024 {1B833B5D-CF77-4176-BABA-AEE19A253628}.exe 44 PID 1644 wrote to memory of 1288 1644 {4499218F-575C-4917-B92A-1476D3BD8A26}.exe 45 PID 1644 wrote to memory of 1288 1644 {4499218F-575C-4917-B92A-1476D3BD8A26}.exe 45 PID 1644 wrote to memory of 1288 1644 {4499218F-575C-4917-B92A-1476D3BD8A26}.exe 45 PID 1644 wrote to memory of 1288 1644 {4499218F-575C-4917-B92A-1476D3BD8A26}.exe 45 PID 1644 wrote to memory of 1724 1644 {4499218F-575C-4917-B92A-1476D3BD8A26}.exe 46 PID 1644 wrote to memory of 1724 1644 {4499218F-575C-4917-B92A-1476D3BD8A26}.exe 46 PID 1644 wrote to memory of 1724 1644 {4499218F-575C-4917-B92A-1476D3BD8A26}.exe 46 PID 1644 wrote to memory of 1724 1644 {4499218F-575C-4917-B92A-1476D3BD8A26}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe"C:\Users\Admin\AppData\Local\Temp\e764d0cfdcfff4f78d6c4ba072bd01f4901a2e61e1154c64943f13f24882d08c.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\{3A19EB11-66CE-49f7-963A-2D72237853E8}.exeC:\Windows\{3A19EB11-66CE-49f7-963A-2D72237853E8}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\{D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exeC:\Windows\{D9A67670-A0FE-4ae9-95BF-A88430A1F50A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exeC:\Windows\{53D87E4B-CB89-4c7c-98DC-0B9A4DA58F21}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\{5119B931-801C-4552-A998-C5256CEF0F1A}.exeC:\Windows\{5119B931-801C-4552-A998-C5256CEF0F1A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\{3970548C-E76F-4a55-AB30-3502F026A7F3}.exeC:\Windows\{3970548C-E76F-4a55-AB30-3502F026A7F3}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\{1B833B5D-CF77-4176-BABA-AEE19A253628}.exeC:\Windows\{1B833B5D-CF77-4176-BABA-AEE19A253628}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\{4499218F-575C-4917-B92A-1476D3BD8A26}.exeC:\Windows\{4499218F-575C-4917-B92A-1476D3BD8A26}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\{A19750D7-61BD-4a08-AB51-F42BDE469602}.exeC:\Windows\{A19750D7-61BD-4a08-AB51-F42BDE469602}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1288 -
C:\Windows\{83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}.exeC:\Windows\{83AE38B2-23E6-4ca8-8FFD-BC7A96FFB6EF}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\{7EC0823E-EB09-403f-BBA0-61975354C334}.exeC:\Windows\{7EC0823E-EB09-403f-BBA0-61975354C334}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\{D47D20A0-123E-4255-878C-83961F6B3A96}.exeC:\Windows\{D47D20A0-123E-4255-878C-83961F6B3A96}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7EC08~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{83AE3~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1975~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{44992~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1B833~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39705~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5119B~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{53D87~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9A67~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3A19E~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\E764D0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD571c06b2e4cd28f6698b7417ce48588d0
SHA1fc669c346c7d0774b6aa37011e90167972e6c9bb
SHA2567ee188c85b3d652903f24a95970d4a30ef4c4e95924715a611300a22875e73d9
SHA51238767b91c465cb5c143f9809f337d31b2d71ae0f5c0c82694ba01c7292aa925c0a9ca1a43bd28ec2d69ef8481dc7a510f7e93da4ba3fbc83def262337bd40cef
-
Filesize
168KB
MD5860dbaa676daafa185c8a2a0089cb8a8
SHA1c2f1e44e88ddcdcd639bcffce223668257da42ee
SHA2564bf8f54c256fc4ba0dc4c4291c0bdb227686e36eee0e4a29181deece7d8346fd
SHA512d609a0dcfc4e515c1727e854ff706f43fae5c80039b4d85bede2ab831cb39795886eca382ad8060de7107031385068cd7f2ac4a87540e102d45f8e3d6ab148e4
-
Filesize
168KB
MD5f1bfac2f19a773af23f0e6735da5c6eb
SHA1f2b88309483b07cba6e24d9f832a4a07688c1fb7
SHA2565ee47ce875f70e39ea2643df6166916b75dd430e8fecaa500e784f65df54531b
SHA512b79ceebebbf4ceb4d6d4607941bdc8a83fbb6e87b20e794c86f51a165c852f9d93c2e30f93104259a4551149676e282828c20cb9e4f13910d81488c697597c32
-
Filesize
168KB
MD53f307837ce3c06237ad8d7b6b7809548
SHA17f470fdce6b53d24f7ff80d973e09a373f3a4ab7
SHA256fb1edde8d5bc62c9f3ac0f545a6013842548ce26d7415003f08cbb32962a991b
SHA512f1ebde4302e30b44478b0b87479633dca4be124633172eed790d895c4c71e9577d31a583c2a10c811cd0fb4d725baf3883fe87fe90f41a3d37e797d130588395
-
Filesize
168KB
MD52d34723b40625e96f281c0ded06bd926
SHA1204af9415a17d09ec0a592b304a34ac27d26acb1
SHA256660b1f6c1e781f9356d065026f4beb427b878650b9a1fb8728e66915e0f7441c
SHA512ca99ac303d1ea2fd61aa1cf22918543e9b6a884a5eb59daaca865f084ffa8559f88fca5fef7173472a6b5a1a11b14904cc55c70bd848a4183a0070d4c0106149
-
Filesize
168KB
MD510570a9ff841c446d5585a2e67344491
SHA1a6df4df48c41d41d362aa1d7f0b9a7f89889d766
SHA256b76fb46aa6f5ff0ce91a3318241392b6e4b3817f1599db154080ca0ce6a86b60
SHA512d489c6e76daad776413ff8f334e1915691f1a3db45536604441a1b958effb6c4d14184b793fb4fc1398fe6418a57be665e86ba1884f1aef06b013f3c59861baf
-
Filesize
168KB
MD5944932bb9c5ff36fe02a77d15a303ce2
SHA135af835c0c662efa7738840d09b15ecefbc3c653
SHA2565ae4aa08b183b2148c49cd8902095ca888ee683859abb6d6f57c3cc8a16759c2
SHA51258954d983ad71cbd77fabd41ff8358abd693283feddda943801d830588ac3ae6592f9fe8d38b749664d3b0e62e4660a906d43634ad9c301bd086b8faedd9dee6
-
Filesize
168KB
MD5ebffc6317f1c55603959a07f67b60288
SHA18b032241039f0c571081d85647b4dac997bd46f2
SHA256f00450a900502a2a614b2266fce3279936d4acc56ae7a90de12f4dad7d96dde7
SHA512e2305cf77d23b07fb33369fa0e485e25e0e557b01a91942968fb2d1d90affc19cf46a60ef2f1b8bd78670330c62319c328bb969cf8b03c854bec4759de041d65
-
Filesize
168KB
MD531dc6f6142f53f1404643416065f2ff4
SHA1f3348546758e769a5da6bdd15cd4004101c4f328
SHA256bc279ffd42b4b3b39d56da876d970737d33c4685243d7eb0c46f7ecfaca879db
SHA512f6441ae3edc7fea2ebecbe314bc3bfe091aa49911220aa8c1cd1d311f78c1332e89bbe8c3857937925c4bdb7762a87f7eaedfd8d0eee9aaf499d9155cedd7119
-
Filesize
168KB
MD592fe2dba04336660c88e783d2db3fd6c
SHA171d59b66aa17be269938feca11cc619eacd5f51a
SHA256e75ba2c85fc49189e3d64b6caa69a717ddcdbbb9ddd82c6868069ac6a309389c
SHA512ff9d5635b09fdeb60bf9ff7ec5886080edf86a32c503a4e1ab6ad68ff60d2d67901f8205ca6005b01f9715af2ad890b383617861d6b9141f6c02464d35a1cb74
-
Filesize
168KB
MD55e012719ba457112e52b6395298356ad
SHA1a0374f697f442117297d871c1e18aa198f390f77
SHA25674a4ad12b276bc5d227751da3a5f976000c4e5934d1c69bbb6157d960cd9f393
SHA5125b5e9b26fbf077e767eb9aca55616e8be5e9c3b087bf0bd1c543350cc76668eda903330588921548446bac074173c24a9f5b02ed7889fdd49ddcf6ea258ccdec