Analysis
-
max time kernel
118s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
ec59c17231ed8bd67caadc99a2e518f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec59c17231ed8bd67caadc99a2e518f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ec59c17231ed8bd67caadc99a2e518f0N.exe
-
Size
89KB
-
MD5
ec59c17231ed8bd67caadc99a2e518f0
-
SHA1
ef386acddf34d329b5d1e095f8f3ae2766ce25be
-
SHA256
5fe9d40215d42be9b27516622782cca0e10bd4b05695383411c7ef552551156f
-
SHA512
325b2ad76237df9c18fefc7b08556eadea5b45ebb107dba798d27371655c14ef54d4f7db8903b838c652dc6d8871ebc6e3b5815815d4636c034ea56b58308043
-
SSDEEP
768:5vw9816thKQLroq4/wQkNrfrunMxVFA3k:lEG/0oqlbunMxVS3k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{302FE9AC-0651-4db3-8EA8-8CAC1921BB25}\stubpath = "C:\\Windows\\{302FE9AC-0651-4db3-8EA8-8CAC1921BB25}.exe" {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2E9429EF-EA67-47e8-9A49-CD90759ED2DD}\stubpath = "C:\\Windows\\{2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe" ec59c17231ed8bd67caadc99a2e518f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{98A94D38-FF02-4eee-960C-A992F8D922D9}\stubpath = "C:\\Windows\\{98A94D38-FF02-4eee-960C-A992F8D922D9}.exe" {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21803E5C-5C8E-4435-A2F8-8EEF4026E743} {728F9E36-8036-4a88-958A-05C55B407604}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0974765C-A7D6-4d99-B4C0-DA0542641982} {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0BF7797-0605-4edc-B135-E7C6BAE026E5} {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0BF7797-0605-4edc-B135-E7C6BAE026E5}\stubpath = "C:\\Windows\\{D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe" {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{728F9E36-8036-4a88-958A-05C55B407604} {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{728F9E36-8036-4a88-958A-05C55B407604}\stubpath = "C:\\Windows\\{728F9E36-8036-4a88-958A-05C55B407604}.exe" {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2E9AFA76-4D33-4fec-911B-9F6716C7796A} {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2E9429EF-EA67-47e8-9A49-CD90759ED2DD} ec59c17231ed8bd67caadc99a2e518f0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F36715A-7819-47a2-998A-24BCB95BC4A7} {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{302FE9AC-0651-4db3-8EA8-8CAC1921BB25} {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{98A94D38-FF02-4eee-960C-A992F8D922D9} {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F36715A-7819-47a2-998A-24BCB95BC4A7}\stubpath = "C:\\Windows\\{2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe" {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21803E5C-5C8E-4435-A2F8-8EEF4026E743}\stubpath = "C:\\Windows\\{21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe" {728F9E36-8036-4a88-958A-05C55B407604}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0974765C-A7D6-4d99-B4C0-DA0542641982}\stubpath = "C:\\Windows\\{0974765C-A7D6-4d99-B4C0-DA0542641982}.exe" {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2E9AFA76-4D33-4fec-911B-9F6716C7796A}\stubpath = "C:\\Windows\\{2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe" {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe -
Executes dropped EXE 9 IoCs
pid Process 2404 {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe 3572 {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe 4276 {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe 3588 {728F9E36-8036-4a88-958A-05C55B407604}.exe 2148 {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe 3580 {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe 1576 {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe 3144 {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe 2640 {302FE9AC-0651-4db3-8EA8-8CAC1921BB25}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe {728F9E36-8036-4a88-958A-05C55B407604}.exe File created C:\Windows\{0974765C-A7D6-4d99-B4C0-DA0542641982}.exe {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe File created C:\Windows\{2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe File created C:\Windows\{2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe ec59c17231ed8bd67caadc99a2e518f0N.exe File created C:\Windows\{98A94D38-FF02-4eee-960C-A992F8D922D9}.exe {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe File created C:\Windows\{2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe File created C:\Windows\{728F9E36-8036-4a88-958A-05C55B407604}.exe {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe File created C:\Windows\{D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe File created C:\Windows\{302FE9AC-0651-4db3-8EA8-8CAC1921BB25}.exe {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {302FE9AC-0651-4db3-8EA8-8CAC1921BB25}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec59c17231ed8bd67caadc99a2e518f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {728F9E36-8036-4a88-958A-05C55B407604}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 408 ec59c17231ed8bd67caadc99a2e518f0N.exe Token: SeIncBasePriorityPrivilege 2404 {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe Token: SeIncBasePriorityPrivilege 3572 {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe Token: SeIncBasePriorityPrivilege 4276 {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe Token: SeIncBasePriorityPrivilege 3588 {728F9E36-8036-4a88-958A-05C55B407604}.exe Token: SeIncBasePriorityPrivilege 2148 {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe Token: SeIncBasePriorityPrivilege 3580 {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe Token: SeIncBasePriorityPrivilege 1576 {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe Token: SeIncBasePriorityPrivilege 3144 {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 408 wrote to memory of 2404 408 ec59c17231ed8bd67caadc99a2e518f0N.exe 94 PID 408 wrote to memory of 2404 408 ec59c17231ed8bd67caadc99a2e518f0N.exe 94 PID 408 wrote to memory of 2404 408 ec59c17231ed8bd67caadc99a2e518f0N.exe 94 PID 408 wrote to memory of 1416 408 ec59c17231ed8bd67caadc99a2e518f0N.exe 95 PID 408 wrote to memory of 1416 408 ec59c17231ed8bd67caadc99a2e518f0N.exe 95 PID 408 wrote to memory of 1416 408 ec59c17231ed8bd67caadc99a2e518f0N.exe 95 PID 2404 wrote to memory of 3572 2404 {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe 96 PID 2404 wrote to memory of 3572 2404 {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe 96 PID 2404 wrote to memory of 3572 2404 {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe 96 PID 2404 wrote to memory of 1828 2404 {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe 97 PID 2404 wrote to memory of 1828 2404 {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe 97 PID 2404 wrote to memory of 1828 2404 {2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe 97 PID 3572 wrote to memory of 4276 3572 {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe 100 PID 3572 wrote to memory of 4276 3572 {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe 100 PID 3572 wrote to memory of 4276 3572 {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe 100 PID 3572 wrote to memory of 4388 3572 {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe 101 PID 3572 wrote to memory of 4388 3572 {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe 101 PID 3572 wrote to memory of 4388 3572 {98A94D38-FF02-4eee-960C-A992F8D922D9}.exe 101 PID 4276 wrote to memory of 3588 4276 {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe 102 PID 4276 wrote to memory of 3588 4276 {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe 102 PID 4276 wrote to memory of 3588 4276 {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe 102 PID 4276 wrote to memory of 1372 4276 {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe 103 PID 4276 wrote to memory of 1372 4276 {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe 103 PID 4276 wrote to memory of 1372 4276 {2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe 103 PID 3588 wrote to memory of 2148 3588 {728F9E36-8036-4a88-958A-05C55B407604}.exe 104 PID 3588 wrote to memory of 2148 3588 {728F9E36-8036-4a88-958A-05C55B407604}.exe 104 PID 3588 wrote to memory of 2148 3588 {728F9E36-8036-4a88-958A-05C55B407604}.exe 104 PID 3588 wrote to memory of 4360 3588 {728F9E36-8036-4a88-958A-05C55B407604}.exe 105 PID 3588 wrote to memory of 4360 3588 {728F9E36-8036-4a88-958A-05C55B407604}.exe 105 PID 3588 wrote to memory of 4360 3588 {728F9E36-8036-4a88-958A-05C55B407604}.exe 105 PID 2148 wrote to memory of 3580 2148 {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe 106 PID 2148 wrote to memory of 3580 2148 {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe 106 PID 2148 wrote to memory of 3580 2148 {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe 106 PID 2148 wrote to memory of 952 2148 {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe 107 PID 2148 wrote to memory of 952 2148 {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe 107 PID 2148 wrote to memory of 952 2148 {21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe 107 PID 3580 wrote to memory of 1576 3580 {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe 108 PID 3580 wrote to memory of 1576 3580 {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe 108 PID 3580 wrote to memory of 1576 3580 {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe 108 PID 3580 wrote to memory of 3336 3580 {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe 109 PID 3580 wrote to memory of 3336 3580 {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe 109 PID 3580 wrote to memory of 3336 3580 {0974765C-A7D6-4d99-B4C0-DA0542641982}.exe 109 PID 1576 wrote to memory of 3144 1576 {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe 110 PID 1576 wrote to memory of 3144 1576 {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe 110 PID 1576 wrote to memory of 3144 1576 {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe 110 PID 1576 wrote to memory of 3712 1576 {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe 111 PID 1576 wrote to memory of 3712 1576 {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe 111 PID 1576 wrote to memory of 3712 1576 {D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe 111 PID 3144 wrote to memory of 2640 3144 {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe 112 PID 3144 wrote to memory of 2640 3144 {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe 112 PID 3144 wrote to memory of 2640 3144 {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe 112 PID 3144 wrote to memory of 3688 3144 {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe 113 PID 3144 wrote to memory of 3688 3144 {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe 113 PID 3144 wrote to memory of 3688 3144 {2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec59c17231ed8bd67caadc99a2e518f0N.exe"C:\Users\Admin\AppData\Local\Temp\ec59c17231ed8bd67caadc99a2e518f0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\{2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exeC:\Windows\{2E9429EF-EA67-47e8-9A49-CD90759ED2DD}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\{98A94D38-FF02-4eee-960C-A992F8D922D9}.exeC:\Windows\{98A94D38-FF02-4eee-960C-A992F8D922D9}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\{2F36715A-7819-47a2-998A-24BCB95BC4A7}.exeC:\Windows\{2F36715A-7819-47a2-998A-24BCB95BC4A7}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\{728F9E36-8036-4a88-958A-05C55B407604}.exeC:\Windows\{728F9E36-8036-4a88-958A-05C55B407604}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\{21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exeC:\Windows\{21803E5C-5C8E-4435-A2F8-8EEF4026E743}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\{0974765C-A7D6-4d99-B4C0-DA0542641982}.exeC:\Windows\{0974765C-A7D6-4d99-B4C0-DA0542641982}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\{D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exeC:\Windows\{D0BF7797-0605-4edc-B135-E7C6BAE026E5}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\{2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exeC:\Windows\{2E9AFA76-4D33-4fec-911B-9F6716C7796A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\{302FE9AC-0651-4db3-8EA8-8CAC1921BB25}.exeC:\Windows\{302FE9AC-0651-4db3-8EA8-8CAC1921BB25}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2E9AF~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D0BF7~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{09747~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{21803~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{728F9~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2F367~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98A94~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2E942~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\EC59C1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD536d063a9534f6a7aa71d0ca46cee7204
SHA110d7661751e6061659b01204b5278a4005048987
SHA2564812824ee8f6d4e33d3794d2f048a2adaeefba48b30433650ebe18dff37400ce
SHA512e0dcaae21bb494efa922e8b85942c6bc85a3303530e7cb1235f36d2e2588275d32cf8690e44b205375846ce6c5767f15ced7d21d044dfcc65889bfa2ddc3296e
-
Filesize
89KB
MD5270cc7da970162a695e5f77ca467711d
SHA11003e4777bdcabb626ca98bc92a4c4b0fd9a1158
SHA25618353a6889ca41ec8b208a1b2648d7d0b413676b5a5c8c07c32ce046a7abf7fc
SHA512615b81dc0865803682f2f56f4d1feed284469c594594d103dc52bd24f1fc1c7124a118b04b79d996a8b51d68f7ce248b492410758f743d6abdf2917f123c0360
-
Filesize
89KB
MD540053ebcdb5403f01017d1d124fa55e2
SHA1e81282f3176ff20bae4ef52ec467829057768361
SHA256880d2650fde189f59ad5cce44a14834920f93e31cda829686d7940b3d4d92a80
SHA5121390777d6cbe8aacad924b210c8583f4cecfe5ff50dbc548dcc8039161f882fa1b35d6563ca1c3532b761670ab80d60a8ac5ace87c954e0320a472d9bb060717
-
Filesize
89KB
MD522c885cbe0299bfde12164456f754242
SHA1e5b331ca128ad4ca32479e7c8c8efe07b9c1a200
SHA2565b5215ace3b9e34fc00a0280b9a9ba35456229d697d3cda18397438db0e295ad
SHA512330343324f00c821a8d4f7865b9ca30350210098f723b7525d491d2c5badacd8df1532812cb710fcbabff97a77b2852a01d446a3ac8eb25925f02e43e9b5e87f
-
Filesize
89KB
MD5dabcb5bea22b5e8f68067b6bb41403c0
SHA1197c773fc871ef1cf581e3fbbf89bbfe4147709e
SHA2564cbf36eb117f8c5af0bab5c1452b354cdf109d272b060a96883cc84bb44b49ac
SHA51268ec4341d367c4604c8cdb7e71369d0b91ddee11723cfe512bdbf0fb12b45bee914f823e9f7f8c3540c116f0365cc5f276847f7284fb1b09294d16265449e77f
-
Filesize
89KB
MD5e292663d84db7156f2ba72473c39c51c
SHA10dc204d15eef8df0ae65d495e4fbe8c662817bbd
SHA256d4e1709badd7b9b223fd555af89e690921985301b6d46390a9c6ca1e5fb79396
SHA512840b599dd8c7ce6ee282883ac685aca37a8ce45d88d3a5fb15b481fac83ab92425d56d0a78322677b10e684be33b96373d437c9ab4b3128121d454d8c3bde1c6
-
Filesize
89KB
MD51498389f27f24dcf796a9d3b9f5d9894
SHA19a458ac23f5d0d9befe3557083e34d8604473acc
SHA256a83de8b5f00d0a2f98e35d7e48b35d755519b416c05f420f17fe0d9576741b73
SHA512ed87c3439e9e517770515d2405e06e6a66db0213d37316855db0ad40dd2d99f589befd4e0ba845a1384acb1983912e067c4d0f50e84786916046ecd3b88e7bb6
-
Filesize
89KB
MD5b7dbb860ff95cb19dccb8346972a5813
SHA118525a6621f3a027fa698ce3d6b8b9e1e2602180
SHA25622e87610501691fb5ba09d87676a5f66e0a136be682aaff361332a081b6b333c
SHA512b04da9b9df116b35a83bbf5ccd0c42193eadc6ab4d55b217e4cd9ffc7a408d3c48977c9d7d6816ddd6a4d96f7c7f852aae005e0cd36c9013fc817f0ea2633625
-
Filesize
89KB
MD561614157c3ae6a7305fa7cd21092de04
SHA1ee58411f071d9c2b5b7475a95d43dc4f41232e72
SHA256af6ffab16ad83240aeba370b7a73528ddf8f08eec851e7bb7e395b280c5c10da
SHA512d71fa5b5490ad4c73734ae012fc9d02a8adeaa86ae7c850144eda7df164def7e494244fb8a4fc470f53ac634ff2258907ffdfa1d36baf0e2ef5ca705cb15a489