Analysis
-
max time kernel
118s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
4b44797f9ba623cccbe5041c9dd0fb40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b44797f9ba623cccbe5041c9dd0fb40N.exe
Resource
win10v2004-20240802-en
General
-
Target
4b44797f9ba623cccbe5041c9dd0fb40N.exe
-
Size
91KB
-
MD5
4b44797f9ba623cccbe5041c9dd0fb40
-
SHA1
5e1a8d221a6c69e2a6491739332f8808acd28a38
-
SHA256
654289647bb122e15c3a8ed16274169109be4077d9b630662ad998203280051a
-
SHA512
39fc02e4ec7669cfd2a2fa9237e18a85036b94fd2f7051f196c9330dda2f40bb353d90bc53046467784b99b39055efd9ece274b926c1053c4b2fe8adb68c9619
-
SSDEEP
768:5vw9816uhKiroK4/wQNNrfrunMxVFA3b7t:lEGkmoKlCunMxVS3Ht
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{77D4BDEC-02DF-41e8-BA65-CC2984637689} 4b44797f9ba623cccbe5041c9dd0fb40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F04F89D1-4443-4bf9-AD48-A49870216852}\stubpath = "C:\\Windows\\{F04F89D1-4443-4bf9-AD48-A49870216852}.exe" {9EF381F7-3617-4266-AE96-0994865E11AD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{318FC896-3FAC-425d-AF28-475380F6923F} {42E4ADD4-8009-476d-9423-96A94812E862}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A7C6F83C-0B8B-452f-996B-F030A7791048}\stubpath = "C:\\Windows\\{A7C6F83C-0B8B-452f-996B-F030A7791048}.exe" {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{67277E68-86CF-4cee-80D4-0BF95AFC58A2} {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9EF381F7-3617-4266-AE96-0994865E11AD} {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F04F89D1-4443-4bf9-AD48-A49870216852} {9EF381F7-3617-4266-AE96-0994865E11AD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{42E4ADD4-8009-476d-9423-96A94812E862} {F04F89D1-4443-4bf9-AD48-A49870216852}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{42E4ADD4-8009-476d-9423-96A94812E862}\stubpath = "C:\\Windows\\{42E4ADD4-8009-476d-9423-96A94812E862}.exe" {F04F89D1-4443-4bf9-AD48-A49870216852}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}\stubpath = "C:\\Windows\\{CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe" {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{67277E68-86CF-4cee-80D4-0BF95AFC58A2}\stubpath = "C:\\Windows\\{67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe" {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9EF381F7-3617-4266-AE96-0994865E11AD}\stubpath = "C:\\Windows\\{9EF381F7-3617-4266-AE96-0994865E11AD}.exe" {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{77D4BDEC-02DF-41e8-BA65-CC2984637689}\stubpath = "C:\\Windows\\{77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe" 4b44797f9ba623cccbe5041c9dd0fb40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB5A34B0-A6E8-4c14-AE72-34BA31F023C1} {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{318FC896-3FAC-425d-AF28-475380F6923F}\stubpath = "C:\\Windows\\{318FC896-3FAC-425d-AF28-475380F6923F}.exe" {42E4ADD4-8009-476d-9423-96A94812E862}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0D43F7A-42D7-40b5-8E22-2DB55FFA394C} {318FC896-3FAC-425d-AF28-475380F6923F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}\stubpath = "C:\\Windows\\{A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe" {318FC896-3FAC-425d-AF28-475380F6923F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A7C6F83C-0B8B-452f-996B-F030A7791048} {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe -
Executes dropped EXE 9 IoCs
pid Process 2392 {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe 5104 {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe 3232 {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe 1660 {9EF381F7-3617-4266-AE96-0994865E11AD}.exe 2296 {F04F89D1-4443-4bf9-AD48-A49870216852}.exe 1656 {42E4ADD4-8009-476d-9423-96A94812E862}.exe 116 {318FC896-3FAC-425d-AF28-475380F6923F}.exe 404 {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe 3628 {A7C6F83C-0B8B-452f-996B-F030A7791048}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe 4b44797f9ba623cccbe5041c9dd0fb40N.exe File created C:\Windows\{F04F89D1-4443-4bf9-AD48-A49870216852}.exe {9EF381F7-3617-4266-AE96-0994865E11AD}.exe File created C:\Windows\{42E4ADD4-8009-476d-9423-96A94812E862}.exe {F04F89D1-4443-4bf9-AD48-A49870216852}.exe File created C:\Windows\{CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe File created C:\Windows\{67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe File created C:\Windows\{9EF381F7-3617-4266-AE96-0994865E11AD}.exe {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe File created C:\Windows\{318FC896-3FAC-425d-AF28-475380F6923F}.exe {42E4ADD4-8009-476d-9423-96A94812E862}.exe File created C:\Windows\{A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe {318FC896-3FAC-425d-AF28-475380F6923F}.exe File created C:\Windows\{A7C6F83C-0B8B-452f-996B-F030A7791048}.exe {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A7C6F83C-0B8B-452f-996B-F030A7791048}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F04F89D1-4443-4bf9-AD48-A49870216852}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b44797f9ba623cccbe5041c9dd0fb40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9EF381F7-3617-4266-AE96-0994865E11AD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {42E4ADD4-8009-476d-9423-96A94812E862}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {318FC896-3FAC-425d-AF28-475380F6923F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4860 4b44797f9ba623cccbe5041c9dd0fb40N.exe Token: SeIncBasePriorityPrivilege 2392 {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe Token: SeIncBasePriorityPrivilege 5104 {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe Token: SeIncBasePriorityPrivilege 3232 {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe Token: SeIncBasePriorityPrivilege 1660 {9EF381F7-3617-4266-AE96-0994865E11AD}.exe Token: SeIncBasePriorityPrivilege 2296 {F04F89D1-4443-4bf9-AD48-A49870216852}.exe Token: SeIncBasePriorityPrivilege 1656 {42E4ADD4-8009-476d-9423-96A94812E862}.exe Token: SeIncBasePriorityPrivilege 116 {318FC896-3FAC-425d-AF28-475380F6923F}.exe Token: SeIncBasePriorityPrivilege 404 {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4860 wrote to memory of 2392 4860 4b44797f9ba623cccbe5041c9dd0fb40N.exe 93 PID 4860 wrote to memory of 2392 4860 4b44797f9ba623cccbe5041c9dd0fb40N.exe 93 PID 4860 wrote to memory of 2392 4860 4b44797f9ba623cccbe5041c9dd0fb40N.exe 93 PID 4860 wrote to memory of 3260 4860 4b44797f9ba623cccbe5041c9dd0fb40N.exe 94 PID 4860 wrote to memory of 3260 4860 4b44797f9ba623cccbe5041c9dd0fb40N.exe 94 PID 4860 wrote to memory of 3260 4860 4b44797f9ba623cccbe5041c9dd0fb40N.exe 94 PID 2392 wrote to memory of 5104 2392 {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe 95 PID 2392 wrote to memory of 5104 2392 {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe 95 PID 2392 wrote to memory of 5104 2392 {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe 95 PID 2392 wrote to memory of 1380 2392 {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe 96 PID 2392 wrote to memory of 1380 2392 {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe 96 PID 2392 wrote to memory of 1380 2392 {77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe 96 PID 5104 wrote to memory of 3232 5104 {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe 99 PID 5104 wrote to memory of 3232 5104 {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe 99 PID 5104 wrote to memory of 3232 5104 {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe 99 PID 5104 wrote to memory of 824 5104 {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe 100 PID 5104 wrote to memory of 824 5104 {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe 100 PID 5104 wrote to memory of 824 5104 {CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe 100 PID 3232 wrote to memory of 1660 3232 {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe 101 PID 3232 wrote to memory of 1660 3232 {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe 101 PID 3232 wrote to memory of 1660 3232 {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe 101 PID 3232 wrote to memory of 3116 3232 {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe 102 PID 3232 wrote to memory of 3116 3232 {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe 102 PID 3232 wrote to memory of 3116 3232 {67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe 102 PID 1660 wrote to memory of 2296 1660 {9EF381F7-3617-4266-AE96-0994865E11AD}.exe 103 PID 1660 wrote to memory of 2296 1660 {9EF381F7-3617-4266-AE96-0994865E11AD}.exe 103 PID 1660 wrote to memory of 2296 1660 {9EF381F7-3617-4266-AE96-0994865E11AD}.exe 103 PID 1660 wrote to memory of 4496 1660 {9EF381F7-3617-4266-AE96-0994865E11AD}.exe 104 PID 1660 wrote to memory of 4496 1660 {9EF381F7-3617-4266-AE96-0994865E11AD}.exe 104 PID 1660 wrote to memory of 4496 1660 {9EF381F7-3617-4266-AE96-0994865E11AD}.exe 104 PID 2296 wrote to memory of 1656 2296 {F04F89D1-4443-4bf9-AD48-A49870216852}.exe 105 PID 2296 wrote to memory of 1656 2296 {F04F89D1-4443-4bf9-AD48-A49870216852}.exe 105 PID 2296 wrote to memory of 1656 2296 {F04F89D1-4443-4bf9-AD48-A49870216852}.exe 105 PID 2296 wrote to memory of 2148 2296 {F04F89D1-4443-4bf9-AD48-A49870216852}.exe 106 PID 2296 wrote to memory of 2148 2296 {F04F89D1-4443-4bf9-AD48-A49870216852}.exe 106 PID 2296 wrote to memory of 2148 2296 {F04F89D1-4443-4bf9-AD48-A49870216852}.exe 106 PID 1656 wrote to memory of 116 1656 {42E4ADD4-8009-476d-9423-96A94812E862}.exe 107 PID 1656 wrote to memory of 116 1656 {42E4ADD4-8009-476d-9423-96A94812E862}.exe 107 PID 1656 wrote to memory of 116 1656 {42E4ADD4-8009-476d-9423-96A94812E862}.exe 107 PID 1656 wrote to memory of 3568 1656 {42E4ADD4-8009-476d-9423-96A94812E862}.exe 108 PID 1656 wrote to memory of 3568 1656 {42E4ADD4-8009-476d-9423-96A94812E862}.exe 108 PID 1656 wrote to memory of 3568 1656 {42E4ADD4-8009-476d-9423-96A94812E862}.exe 108 PID 116 wrote to memory of 404 116 {318FC896-3FAC-425d-AF28-475380F6923F}.exe 109 PID 116 wrote to memory of 404 116 {318FC896-3FAC-425d-AF28-475380F6923F}.exe 109 PID 116 wrote to memory of 404 116 {318FC896-3FAC-425d-AF28-475380F6923F}.exe 109 PID 116 wrote to memory of 1916 116 {318FC896-3FAC-425d-AF28-475380F6923F}.exe 110 PID 116 wrote to memory of 1916 116 {318FC896-3FAC-425d-AF28-475380F6923F}.exe 110 PID 116 wrote to memory of 1916 116 {318FC896-3FAC-425d-AF28-475380F6923F}.exe 110 PID 404 wrote to memory of 3628 404 {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe 111 PID 404 wrote to memory of 3628 404 {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe 111 PID 404 wrote to memory of 3628 404 {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe 111 PID 404 wrote to memory of 4804 404 {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe 112 PID 404 wrote to memory of 4804 404 {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe 112 PID 404 wrote to memory of 4804 404 {A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b44797f9ba623cccbe5041c9dd0fb40N.exe"C:\Users\Admin\AppData\Local\Temp\4b44797f9ba623cccbe5041c9dd0fb40N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\{77D4BDEC-02DF-41e8-BA65-CC2984637689}.exeC:\Windows\{77D4BDEC-02DF-41e8-BA65-CC2984637689}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\{CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exeC:\Windows\{CB5A34B0-A6E8-4c14-AE72-34BA31F023C1}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\{67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exeC:\Windows\{67277E68-86CF-4cee-80D4-0BF95AFC58A2}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\{9EF381F7-3617-4266-AE96-0994865E11AD}.exeC:\Windows\{9EF381F7-3617-4266-AE96-0994865E11AD}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\{F04F89D1-4443-4bf9-AD48-A49870216852}.exeC:\Windows\{F04F89D1-4443-4bf9-AD48-A49870216852}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\{42E4ADD4-8009-476d-9423-96A94812E862}.exeC:\Windows\{42E4ADD4-8009-476d-9423-96A94812E862}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\{318FC896-3FAC-425d-AF28-475380F6923F}.exeC:\Windows\{318FC896-3FAC-425d-AF28-475380F6923F}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\{A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exeC:\Windows\{A0D43F7A-42D7-40b5-8E22-2DB55FFA394C}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\{A7C6F83C-0B8B-452f-996B-F030A7791048}.exeC:\Windows\{A7C6F83C-0B8B-452f-996B-F030A7791048}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A0D43~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{318FC~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{42E4A~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F04F8~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9EF38~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67277~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB5A3~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{77D4B~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\4B4479~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5ae09b1cdaab0f8ec3c8383d8e3fc7d99
SHA1f8628598f14afbdfc7cbd07957fc1dea99f4801e
SHA256ddfe7cad36d55e68889ceae5e5164b98ecb2e57be8f2af520af39a5e6c066610
SHA512e635cff966d2272cf7666c3adb174117cbb45aafa7e1d0c167f63298baf8c0b894a0d19c81217244de12df6864b040e7124657cc1d2f9caebe6984dfbebc6da9
-
Filesize
91KB
MD5ddfc3122ab6e819cd975979bad790fc6
SHA1a941c51a42304abf897416f8a560c111b7aca973
SHA256052d258064f9589536273aad4e4b70414b8964ad5126addf16fa1dcd37c567fa
SHA512255a8e73cd9fe99b9772d1d1743ce0f3687b129f0ce3cb9e6b137620a90aad2ad0d71389583fc8cbcd36f20b67ba690e57fc189cc51844935030e583752eb8bd
-
Filesize
91KB
MD58358561445453a765ef0546aa1ec38d6
SHA13ac58dfcf9194cbfbd39b1236590271ab55d19e7
SHA256f2e71807a864a28830e97fff7af6ca93d5dd2ecb4ff7f2a1a9dd4b5fc1036ed4
SHA512476c15e5407076e478e5915cb85dc2adb6389d60352132a233cf7a5f104b6927d626d17329d0754aec49025d67629e5b7e118f333be0698b8d53c1511eca040b
-
Filesize
91KB
MD5c7ae8043db74ed9ea5c1003e58c9e819
SHA143013c0cabd6881b06a98f120189181acf559a3c
SHA2560e4bf1fef9dbb2590e5d569219dfcee9eb540f88b49736649c7edd70c47db943
SHA5124035a1f364c1af4b83ddf3215e640678e43023dd8a3bdf02edca327dd5c43728451f70badb18c975b53e3c49e3e95ec980931d331da9b98c8a742c372e7a8086
-
Filesize
91KB
MD52ecc0c80c2f7a60ae94b883af201fbe3
SHA160825662b4fc0c8dfdad423de30364102cd7811c
SHA2566749b933b4bfc99290bc6aac5cb5d4b51a86cc983b3fd28cb6cca857aa4c894f
SHA5126ba4fb47f5ee24d2a1c2df27e49b2e5c56eba8b3af31145a73995ffea87bedd796b35ba2b6d1a990ec76d73b5223fb177da1669b86629aeeda5a4ff22ac6ecc3
-
Filesize
91KB
MD5cc694ba8690d96b6f47889e5903e0c72
SHA134b8d5edabce0a616718d41a98403c790ccbf4a6
SHA256f98f916abb477a1b5ea13f05b09f622daf12649cc4abe71c11abaf19f5b06759
SHA512909adf084ca798dc1242e015b6270a26bdb317bffd14b28475263cdc94afa35c14d5603d8a7a959c1d829a8dd3fe0a6608d3fa19f09aa5ec67b2ce81067a812d
-
Filesize
91KB
MD59a3c666571b8c26a2555bcb66abfbb49
SHA17cbdf5c918f592a4adcd43b601df09de41148e5c
SHA256ea8db02e3fdc25200d9073ccfbdf4c9da5d24c94d5eddd8a3f47390f7f22e9bc
SHA5128db595a573ad04310919f9f52b28bd3b8cf07656831674d5d464b8ed26b28607f45ab2c03c6c352cf1a6d7d1f4098673de173190ab973b71a875d8706e26b4c2
-
Filesize
91KB
MD522aa0375739bade31b3b23a55a4c8647
SHA1d4aefbda302950c1110c77159d1def88967aec30
SHA25617a375eb3717a6324f395c66d19cef479628b551c3dbab76ea70617bc09b5f87
SHA51207c90e3f3087832d731890a83b0ecac5beae5d67b54cb8c84df1914bc637338883b5d5dde47ca7c14a53f6d1d31a61fa2250cb5a2e9f274fa424a5abf44157cf
-
Filesize
91KB
MD509428f675d0a79d53b9083d62230d0e7
SHA1b4f158562036008eee0abf84f4faab9cf78528de
SHA256aa044dcba5a49bae4e84cf7ec00f232ef5fa11f632f026cfc7450b7dfaab92b2
SHA512b06e1aba742fe5276bbfa9005bc887ae9b864d09a16b14c7374e384ae44a5c23049335db7d90d34ba306c1e4920c3edbac41a8e7c9c82b61745e45e9d516ac23