Analysis
-
max time kernel
118s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
6749f3a6a433c31fb6ab65e598eb1d00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6749f3a6a433c31fb6ab65e598eb1d00N.exe
Resource
win10v2004-20240802-en
General
-
Target
6749f3a6a433c31fb6ab65e598eb1d00N.exe
-
Size
64KB
-
MD5
6749f3a6a433c31fb6ab65e598eb1d00
-
SHA1
aea68d6871f0c95e3b9fbe611919f5b2b9293be7
-
SHA256
da9162c42d00d2c894c6ae45a8cda2e58fc694d1629da24aa8df76cd011264ee
-
SHA512
ae98904880d69526bd15b789fa82b63f86f506cd14c31638118fa39df4bcc80c953dac86e7a1debec73063f9fb91b74c6a1df52ec4e7575b5969fc933c0bdbbb
-
SSDEEP
192:ObOzawOs81elJHsc45ecRZOgtShcWaOT2QLrCqwERY04/CFxyNhoy5tF:ObLwOs8AHsc4QMfwhKQLroW4/CFsrdF
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{99968B7E-5A33-40c6-B2C7-94640B382D34} {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{99968B7E-5A33-40c6-B2C7-94640B382D34}\stubpath = "C:\\Windows\\{99968B7E-5A33-40c6-B2C7-94640B382D34}.exe" {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E870FD73-798B-43a0-9B99-EA1CB95ADF3B}\stubpath = "C:\\Windows\\{E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe" 6749f3a6a433c31fb6ab65e598eb1d00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{89AC63A7-946D-47d1-B04C-4FF29A98551D} {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{89AC63A7-946D-47d1-B04C-4FF29A98551D}\stubpath = "C:\\Windows\\{89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe" {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C701867-BCD1-41de-B6A9-F3C019DE5ACE}\stubpath = "C:\\Windows\\{8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe" {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{459FF8C6-889F-4847-BFE6-3BB22D8EE650}\stubpath = "C:\\Windows\\{459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe" {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22854050-92D3-4d52-BC0B-703B9C2874A8} {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{10821D35-0BE7-4ce1-BF72-26174DF9CCA9}\stubpath = "C:\\Windows\\{10821D35-0BE7-4ce1-BF72-26174DF9CCA9}.exe" {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E870FD73-798B-43a0-9B99-EA1CB95ADF3B} 6749f3a6a433c31fb6ab65e598eb1d00N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C701867-BCD1-41de-B6A9-F3C019DE5ACE} {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{459FF8C6-889F-4847-BFE6-3BB22D8EE650} {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{99451793-D36C-4d21-9136-B2ED56A4FD25} {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}\stubpath = "C:\\Windows\\{CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe" {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59} {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{10821D35-0BE7-4ce1-BF72-26174DF9CCA9} {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22854050-92D3-4d52-BC0B-703B9C2874A8}\stubpath = "C:\\Windows\\{22854050-92D3-4d52-BC0B-703B9C2874A8}.exe" {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{99451793-D36C-4d21-9136-B2ED56A4FD25}\stubpath = "C:\\Windows\\{99451793-D36C-4d21-9136-B2ED56A4FD25}.exe" {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe -
Executes dropped EXE 9 IoCs
pid Process 1660 {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe 848 {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe 3176 {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe 3244 {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe 548 {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe 2316 {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe 3384 {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe 1188 {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe 3416 {10821D35-0BE7-4ce1-BF72-26174DF9CCA9}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe File created C:\Windows\{459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe File created C:\Windows\{22854050-92D3-4d52-BC0B-703B9C2874A8}.exe {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe File created C:\Windows\{99968B7E-5A33-40c6-B2C7-94640B382D34}.exe {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe File created C:\Windows\{99451793-D36C-4d21-9136-B2ED56A4FD25}.exe {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe File created C:\Windows\{E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe 6749f3a6a433c31fb6ab65e598eb1d00N.exe File created C:\Windows\{8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe File created C:\Windows\{CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe File created C:\Windows\{10821D35-0BE7-4ce1-BF72-26174DF9CCA9}.exe {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6749f3a6a433c31fb6ab65e598eb1d00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {10821D35-0BE7-4ce1-BF72-26174DF9CCA9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2248 6749f3a6a433c31fb6ab65e598eb1d00N.exe Token: SeIncBasePriorityPrivilege 1660 {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe Token: SeIncBasePriorityPrivilege 848 {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe Token: SeIncBasePriorityPrivilege 3176 {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe Token: SeIncBasePriorityPrivilege 3244 {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe Token: SeIncBasePriorityPrivilege 548 {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe Token: SeIncBasePriorityPrivilege 2316 {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe Token: SeIncBasePriorityPrivilege 3384 {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe Token: SeIncBasePriorityPrivilege 1188 {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1660 2248 6749f3a6a433c31fb6ab65e598eb1d00N.exe 94 PID 2248 wrote to memory of 1660 2248 6749f3a6a433c31fb6ab65e598eb1d00N.exe 94 PID 2248 wrote to memory of 1660 2248 6749f3a6a433c31fb6ab65e598eb1d00N.exe 94 PID 2248 wrote to memory of 4416 2248 6749f3a6a433c31fb6ab65e598eb1d00N.exe 95 PID 2248 wrote to memory of 4416 2248 6749f3a6a433c31fb6ab65e598eb1d00N.exe 95 PID 2248 wrote to memory of 4416 2248 6749f3a6a433c31fb6ab65e598eb1d00N.exe 95 PID 1660 wrote to memory of 848 1660 {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe 96 PID 1660 wrote to memory of 848 1660 {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe 96 PID 1660 wrote to memory of 848 1660 {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe 96 PID 1660 wrote to memory of 4756 1660 {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe 97 PID 1660 wrote to memory of 4756 1660 {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe 97 PID 1660 wrote to memory of 4756 1660 {E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe 97 PID 848 wrote to memory of 3176 848 {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe 100 PID 848 wrote to memory of 3176 848 {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe 100 PID 848 wrote to memory of 3176 848 {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe 100 PID 848 wrote to memory of 3520 848 {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe 101 PID 848 wrote to memory of 3520 848 {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe 101 PID 848 wrote to memory of 3520 848 {89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe 101 PID 3176 wrote to memory of 3244 3176 {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe 102 PID 3176 wrote to memory of 3244 3176 {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe 102 PID 3176 wrote to memory of 3244 3176 {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe 102 PID 3176 wrote to memory of 1228 3176 {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe 103 PID 3176 wrote to memory of 1228 3176 {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe 103 PID 3176 wrote to memory of 1228 3176 {8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe 103 PID 3244 wrote to memory of 548 3244 {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe 104 PID 3244 wrote to memory of 548 3244 {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe 104 PID 3244 wrote to memory of 548 3244 {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe 104 PID 3244 wrote to memory of 2196 3244 {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe 105 PID 3244 wrote to memory of 2196 3244 {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe 105 PID 3244 wrote to memory of 2196 3244 {459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe 105 PID 548 wrote to memory of 2316 548 {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe 106 PID 548 wrote to memory of 2316 548 {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe 106 PID 548 wrote to memory of 2316 548 {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe 106 PID 548 wrote to memory of 4732 548 {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe 107 PID 548 wrote to memory of 4732 548 {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe 107 PID 548 wrote to memory of 4732 548 {22854050-92D3-4d52-BC0B-703B9C2874A8}.exe 107 PID 2316 wrote to memory of 3384 2316 {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe 108 PID 2316 wrote to memory of 3384 2316 {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe 108 PID 2316 wrote to memory of 3384 2316 {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe 108 PID 2316 wrote to memory of 1056 2316 {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe 109 PID 2316 wrote to memory of 1056 2316 {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe 109 PID 2316 wrote to memory of 1056 2316 {99968B7E-5A33-40c6-B2C7-94640B382D34}.exe 109 PID 3384 wrote to memory of 1188 3384 {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe 110 PID 3384 wrote to memory of 1188 3384 {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe 110 PID 3384 wrote to memory of 1188 3384 {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe 110 PID 3384 wrote to memory of 2788 3384 {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe 111 PID 3384 wrote to memory of 2788 3384 {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe 111 PID 3384 wrote to memory of 2788 3384 {99451793-D36C-4d21-9136-B2ED56A4FD25}.exe 111 PID 1188 wrote to memory of 3416 1188 {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe 112 PID 1188 wrote to memory of 3416 1188 {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe 112 PID 1188 wrote to memory of 3416 1188 {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe 112 PID 1188 wrote to memory of 2536 1188 {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe 113 PID 1188 wrote to memory of 2536 1188 {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe 113 PID 1188 wrote to memory of 2536 1188 {CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\6749f3a6a433c31fb6ab65e598eb1d00N.exe"C:\Users\Admin\AppData\Local\Temp\6749f3a6a433c31fb6ab65e598eb1d00N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\{E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exeC:\Windows\{E870FD73-798B-43a0-9B99-EA1CB95ADF3B}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\{89AC63A7-946D-47d1-B04C-4FF29A98551D}.exeC:\Windows\{89AC63A7-946D-47d1-B04C-4FF29A98551D}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\{8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exeC:\Windows\{8C701867-BCD1-41de-B6A9-F3C019DE5ACE}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\{459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exeC:\Windows\{459FF8C6-889F-4847-BFE6-3BB22D8EE650}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\{22854050-92D3-4d52-BC0B-703B9C2874A8}.exeC:\Windows\{22854050-92D3-4d52-BC0B-703B9C2874A8}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\{99968B7E-5A33-40c6-B2C7-94640B382D34}.exeC:\Windows\{99968B7E-5A33-40c6-B2C7-94640B382D34}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\{99451793-D36C-4d21-9136-B2ED56A4FD25}.exeC:\Windows\{99451793-D36C-4d21-9136-B2ED56A4FD25}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\{CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exeC:\Windows\{CB13DFEF-05FD-4960-B4ED-22D9A6FC6C59}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\{10821D35-0BE7-4ce1-BF72-26174DF9CCA9}.exeC:\Windows\{10821D35-0BE7-4ce1-BF72-26174DF9CCA9}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB13D~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{99451~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{99968~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{22854~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{459FF~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C701~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{89AC6~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E870F~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:4756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\6749F3~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5ac770add719b04a8c0e1039ed710f32e
SHA1c5269517fb9c406bbf5b11f32a5863510c13b27e
SHA2560a227861b2a8f5b5c2e48558af4a1e99d0a8b223c1a23289f70bad7c9f9dae24
SHA51224e810ec94f96285a6f90f2b3010ba6e69d6ee49af9cefb1ef83ae3149b6da7e31a27732afcce6bef71a3115fff441ff2f195fc95b869d656e03912cecfb3e13
-
Filesize
64KB
MD54a5be8ddd0cfda54b11d87931c703a03
SHA11bf5782d32b1834b928f8a61f5fbaee5bdb1e66a
SHA256f67fdf7e53bc211e06ed12ba7ed2decd0c28b5ffd3f9579fe72caadb77aae3b5
SHA512ed1060896f525936edde365551bf387c9c70a7e34a6c025431af93cb518dcca571596842814205d49b871b746d773840a4753ea02735b72c2bab9e3aa42f4d08
-
Filesize
64KB
MD54945cf1fe4bf1d596c606a4a65fa6706
SHA1a33121373597733eb8daca6ea6d5bda93e5e8f37
SHA25662966d4a5653d3461d263674039eb167fc9fee2110a3d131c31f3dbd6f639dec
SHA5123b8bf8eb9107df7fcbdad472b1076078d737402855ff7a44cbbee4ece29a243124b12b1f3d69e80d2b5fb6412e9c9390e00b2c94e755885ad824962f70f89541
-
Filesize
64KB
MD5390c502e4ff69473f82ed570b4582cbd
SHA183b0d70c6d048394fc83cd014feadbe8dd30ec5d
SHA256be52427cfc50e000927db683db5c609a684339adf139977b9b3fa3b77056fc7d
SHA5120e341962fee8e6cb7c82c9dc8fb825de51bebd388acee14bc795ec5c8f58fe28a8c96c2fb1642ba309037d9d33539918ac3ce2b2fc0f23a57b1e3e9c0b978be0
-
Filesize
64KB
MD5c43de6f96053f118ae417e2b0252273c
SHA15bd586336b127edabe90c3f3ca609a7dd688a1f8
SHA256d482c2e4cdffa46c660a5a27df31462251db37e6478e7fb6e2590a6a102d9c47
SHA512171d39b470cfe5b783540bc635d02f43aff2e2b3b82ad1543b284a3852544a702bd387b35cc28e41b3dcdcb23407dc6968ce8d8f73e3b67f8dea789e5cdfd3ea
-
Filesize
64KB
MD56a10a934d73f4f7c07fc5cfc1212d89b
SHA16f12d39953d2cb1cc74ace0ab6ec865feae2f5d8
SHA2560c70e17566f4d4117853d8c27365591bee71b3741f11ecf6bf945b93e85d8977
SHA51217927778667ff294600ea9fa591f25f13dfa999727ddff91d8c8e96c880b18f7c5888a80e84caaff2dc2f207da7069d9ff401b23567c6b46ff394df6cc882c3d
-
Filesize
64KB
MD5f78d08ff792c290746f44e8e6809eacc
SHA1e11c9c072a3ae3be3b62ee9cedf6342bd8ee5adf
SHA2569f68bcf6a308cdeae96a6023e32a0975d82c263105f424f6a9c4317397c4faf3
SHA512da710205471d9c5e6e8ba98993d933a9539ad842792f3660410fc15248239bc7a64dd68570d7a5a5429aa6f441d3e078b7579a75d366fb68f5850af2c6356b95
-
Filesize
64KB
MD57e2a779f528cda9c90fd09c5449bd992
SHA1a87d1cd9bac205c85cc8ab0280f8adff224805ae
SHA2565817ca2ecf24b054f36dd4889b098b1ba55780e9cb31525ff4ed93453da7e1a4
SHA51299bb80f7b63c386683021294c483f19fad16f731ea232c766e9be3733770b54c70dc0cc521fb96d64655fd141af0a005e0b7c1019409cb3282551bd8f574845e
-
Filesize
64KB
MD53e821e29bed74e2e12ebe1db1678a00e
SHA1e4303f151f324f4a1199f6a68cc8e3d7d47e88ef
SHA256643e5f66b799d5dc500bf3c732ebc137abfd186dea85bfbdea5a517a3decb27b
SHA51276a8b4f1b7b21103a39a21e923145e81f922521614256d7db8bd97674a882acc2cbb7c09c868299534da030fc486c7313cbf8ef996f1f90b740cf4941900dc00