Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
b1c183d301c33f72866ef9071d8b2340N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1c183d301c33f72866ef9071d8b2340N.exe
Resource
win10v2004-20240802-en
General
-
Target
b1c183d301c33f72866ef9071d8b2340N.exe
-
Size
90KB
-
MD5
b1c183d301c33f72866ef9071d8b2340
-
SHA1
f6921d3e4f6a05c25ae3e30a2b91f58e2cfe423d
-
SHA256
1a9e3347bc52c529aa5d24dc71da2afacc46f8940a0ee4ee5ab0a1414c5736c0
-
SHA512
f63f6e6ca960060be7f097b0521a3245a858d6b65c0617946d85efb284a5605a3853f0418c63151609e78446b0e9a558c377bfc6c27e9acf32548b83323708e7
-
SSDEEP
768:Qvw9816vhKQLrot4/wQRNrfrunMxVFA3b7glw6:YEGh0otl2unMxVS3Hgl
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}\stubpath = "C:\\Windows\\{1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe" {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{10AEFB6E-B470-42ca-969F-858B7644C317} {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B03FB6C3-A26E-408c-8F26-ACF6AAFABCF0}\stubpath = "C:\\Windows\\{B03FB6C3-A26E-408c-8F26-ACF6AAFABCF0}.exe" {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F6DC59C-152D-450c-A148-147B9696FBFF} b1c183d301c33f72866ef9071d8b2340N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}\stubpath = "C:\\Windows\\{C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe" {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}\stubpath = "C:\\Windows\\{2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe" {10AEFB6E-B470-42ca-969F-858B7644C317}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5B71527-FC23-4f77-8E5F-38D82DB2722D} {65E64798-174A-40ae-812D-A30499B18ED9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F6DC59C-152D-450c-A148-147B9696FBFF}\stubpath = "C:\\Windows\\{9F6DC59C-152D-450c-A148-147B9696FBFF}.exe" b1c183d301c33f72866ef9071d8b2340N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C} {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{10AEFB6E-B470-42ca-969F-858B7644C317}\stubpath = "C:\\Windows\\{10AEFB6E-B470-42ca-969F-858B7644C317}.exe" {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3037D900-3140-43e7-8205-63AAE5E3AE96} {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3037D900-3140-43e7-8205-63AAE5E3AE96}\stubpath = "C:\\Windows\\{3037D900-3140-43e7-8205-63AAE5E3AE96}.exe" {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B03FB6C3-A26E-408c-8F26-ACF6AAFABCF0} {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B} {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49} {10AEFB6E-B470-42ca-969F-858B7644C317}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{65E64798-174A-40ae-812D-A30499B18ED9} {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{65E64798-174A-40ae-812D-A30499B18ED9}\stubpath = "C:\\Windows\\{65E64798-174A-40ae-812D-A30499B18ED9}.exe" {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5B71527-FC23-4f77-8E5F-38D82DB2722D}\stubpath = "C:\\Windows\\{B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe" {65E64798-174A-40ae-812D-A30499B18ED9}.exe -
Executes dropped EXE 9 IoCs
pid Process 4100 {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe 1188 {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe 3260 {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe 1548 {10AEFB6E-B470-42ca-969F-858B7644C317}.exe 884 {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe 3980 {65E64798-174A-40ae-812D-A30499B18ED9}.exe 4016 {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe 2664 {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe 4896 {B03FB6C3-A26E-408c-8F26-ACF6AAFABCF0}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{3037D900-3140-43e7-8205-63AAE5E3AE96}.exe {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe File created C:\Windows\{B03FB6C3-A26E-408c-8F26-ACF6AAFABCF0}.exe {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe File created C:\Windows\{C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe File created C:\Windows\{10AEFB6E-B470-42ca-969F-858B7644C317}.exe {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe File created C:\Windows\{65E64798-174A-40ae-812D-A30499B18ED9}.exe {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe File created C:\Windows\{B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe {65E64798-174A-40ae-812D-A30499B18ED9}.exe File created C:\Windows\{9F6DC59C-152D-450c-A148-147B9696FBFF}.exe b1c183d301c33f72866ef9071d8b2340N.exe File created C:\Windows\{1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe File created C:\Windows\{2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe {10AEFB6E-B470-42ca-969F-858B7644C317}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {10AEFB6E-B470-42ca-969F-858B7644C317}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {65E64798-174A-40ae-812D-A30499B18ED9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1c183d301c33f72866ef9071d8b2340N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B03FB6C3-A26E-408c-8F26-ACF6AAFABCF0}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4364 b1c183d301c33f72866ef9071d8b2340N.exe Token: SeIncBasePriorityPrivilege 4100 {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe Token: SeIncBasePriorityPrivilege 1188 {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe Token: SeIncBasePriorityPrivilege 3260 {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe Token: SeIncBasePriorityPrivilege 1548 {10AEFB6E-B470-42ca-969F-858B7644C317}.exe Token: SeIncBasePriorityPrivilege 884 {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe Token: SeIncBasePriorityPrivilege 3980 {65E64798-174A-40ae-812D-A30499B18ED9}.exe Token: SeIncBasePriorityPrivilege 4016 {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe Token: SeIncBasePriorityPrivilege 2664 {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4100 4364 b1c183d301c33f72866ef9071d8b2340N.exe 94 PID 4364 wrote to memory of 4100 4364 b1c183d301c33f72866ef9071d8b2340N.exe 94 PID 4364 wrote to memory of 4100 4364 b1c183d301c33f72866ef9071d8b2340N.exe 94 PID 4364 wrote to memory of 4744 4364 b1c183d301c33f72866ef9071d8b2340N.exe 95 PID 4364 wrote to memory of 4744 4364 b1c183d301c33f72866ef9071d8b2340N.exe 95 PID 4364 wrote to memory of 4744 4364 b1c183d301c33f72866ef9071d8b2340N.exe 95 PID 4100 wrote to memory of 1188 4100 {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe 96 PID 4100 wrote to memory of 1188 4100 {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe 96 PID 4100 wrote to memory of 1188 4100 {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe 96 PID 4100 wrote to memory of 680 4100 {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe 97 PID 4100 wrote to memory of 680 4100 {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe 97 PID 4100 wrote to memory of 680 4100 {9F6DC59C-152D-450c-A148-147B9696FBFF}.exe 97 PID 1188 wrote to memory of 3260 1188 {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe 100 PID 1188 wrote to memory of 3260 1188 {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe 100 PID 1188 wrote to memory of 3260 1188 {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe 100 PID 1188 wrote to memory of 4112 1188 {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe 101 PID 1188 wrote to memory of 4112 1188 {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe 101 PID 1188 wrote to memory of 4112 1188 {1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe 101 PID 3260 wrote to memory of 1548 3260 {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe 102 PID 3260 wrote to memory of 1548 3260 {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe 102 PID 3260 wrote to memory of 1548 3260 {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe 102 PID 3260 wrote to memory of 4124 3260 {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe 103 PID 3260 wrote to memory of 4124 3260 {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe 103 PID 3260 wrote to memory of 4124 3260 {C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe 103 PID 1548 wrote to memory of 884 1548 {10AEFB6E-B470-42ca-969F-858B7644C317}.exe 104 PID 1548 wrote to memory of 884 1548 {10AEFB6E-B470-42ca-969F-858B7644C317}.exe 104 PID 1548 wrote to memory of 884 1548 {10AEFB6E-B470-42ca-969F-858B7644C317}.exe 104 PID 1548 wrote to memory of 1840 1548 {10AEFB6E-B470-42ca-969F-858B7644C317}.exe 105 PID 1548 wrote to memory of 1840 1548 {10AEFB6E-B470-42ca-969F-858B7644C317}.exe 105 PID 1548 wrote to memory of 1840 1548 {10AEFB6E-B470-42ca-969F-858B7644C317}.exe 105 PID 884 wrote to memory of 3980 884 {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe 106 PID 884 wrote to memory of 3980 884 {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe 106 PID 884 wrote to memory of 3980 884 {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe 106 PID 884 wrote to memory of 4460 884 {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe 107 PID 884 wrote to memory of 4460 884 {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe 107 PID 884 wrote to memory of 4460 884 {2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe 107 PID 3980 wrote to memory of 4016 3980 {65E64798-174A-40ae-812D-A30499B18ED9}.exe 108 PID 3980 wrote to memory of 4016 3980 {65E64798-174A-40ae-812D-A30499B18ED9}.exe 108 PID 3980 wrote to memory of 4016 3980 {65E64798-174A-40ae-812D-A30499B18ED9}.exe 108 PID 3980 wrote to memory of 1124 3980 {65E64798-174A-40ae-812D-A30499B18ED9}.exe 109 PID 3980 wrote to memory of 1124 3980 {65E64798-174A-40ae-812D-A30499B18ED9}.exe 109 PID 3980 wrote to memory of 1124 3980 {65E64798-174A-40ae-812D-A30499B18ED9}.exe 109 PID 4016 wrote to memory of 2664 4016 {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe 110 PID 4016 wrote to memory of 2664 4016 {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe 110 PID 4016 wrote to memory of 2664 4016 {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe 110 PID 4016 wrote to memory of 2300 4016 {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe 111 PID 4016 wrote to memory of 2300 4016 {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe 111 PID 4016 wrote to memory of 2300 4016 {B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe 111 PID 2664 wrote to memory of 4896 2664 {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe 112 PID 2664 wrote to memory of 4896 2664 {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe 112 PID 2664 wrote to memory of 4896 2664 {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe 112 PID 2664 wrote to memory of 4184 2664 {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe 113 PID 2664 wrote to memory of 4184 2664 {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe 113 PID 2664 wrote to memory of 4184 2664 {3037D900-3140-43e7-8205-63AAE5E3AE96}.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1c183d301c33f72866ef9071d8b2340N.exe"C:\Users\Admin\AppData\Local\Temp\b1c183d301c33f72866ef9071d8b2340N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\{9F6DC59C-152D-450c-A148-147B9696FBFF}.exeC:\Windows\{9F6DC59C-152D-450c-A148-147B9696FBFF}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\{1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exeC:\Windows\{1AB712D9-A0AD-4d36-B9F0-57DF0D647E4B}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\{C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exeC:\Windows\{C0317FA2-AE02-465c-B4E0-BCC1C9A8D97C}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\{10AEFB6E-B470-42ca-969F-858B7644C317}.exeC:\Windows\{10AEFB6E-B470-42ca-969F-858B7644C317}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\{2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exeC:\Windows\{2FBBED4A-8CE2-4df9-9BB3-CC7802B44C49}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\{65E64798-174A-40ae-812D-A30499B18ED9}.exeC:\Windows\{65E64798-174A-40ae-812D-A30499B18ED9}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\{B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exeC:\Windows\{B5B71527-FC23-4f77-8E5F-38D82DB2722D}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\{3037D900-3140-43e7-8205-63AAE5E3AE96}.exeC:\Windows\{3037D900-3140-43e7-8205-63AAE5E3AE96}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\{B03FB6C3-A26E-408c-8F26-ACF6AAFABCF0}.exeC:\Windows\{B03FB6C3-A26E-408c-8F26-ACF6AAFABCF0}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3037D~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5B71~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{65E64~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2FBBE~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{10AEF~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0317~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1AB71~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9F6DC~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\B1C183~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5b2138e70adf8ae9905691d32e6e3cd2b
SHA197c640d97d8412f1924be1f9e50e2213a6b47e48
SHA256acfe8d2c883d207bef6403514a9d9c89bc4108cf738859fdc1c1e8d9de4f97a9
SHA5123824b6df88c4d273973ba5c792d1b336f9dc6b9de1c89632484bd67c7d8d77f303104459d52117de0fc7dcf82d8f1453ada17790cccec5bbf00d12bf5c3dcec7
-
Filesize
90KB
MD51cd33e6a984438316621b4523d8a39d0
SHA1dc6ce3f712bc742fb1020990006c92f5c2fc493b
SHA25661d54072686455b31f42158829cf45b99cb9105ed9b6f62a5059c8abc5f1c9c2
SHA512dd6011bbadf74a4f0276811236262be8b519dc44d2f4bd113b76a3fc184c88837329a2a89e537693819e7833ad3143893ac55623a94c1552186bb19cc282154c
-
Filesize
90KB
MD5d209aae39903551134d9a9cac1b1eea1
SHA11c7cab8e5c1ede82b157af9e527e71b20b98bda2
SHA25690b730da68e6a36e8fe856bc9aa20c7320a71854b663e904e1a80dcf5b3f7c9f
SHA512473a7b02ecbd97d38f63839a6316f5703a42f49d761e29d0b2896cec383f460495450fc3fbe59a46c58a490f8de7ced83cbc1d40e10533df65e873d0a1b69180
-
Filesize
90KB
MD5f3dd5301316f1ac49bb68472ac7e368f
SHA1e00db2d72173527242596cb0945cb1d6cbfae021
SHA256527e22b051dbd4fc8750afc86d7097e01be2d5554e76838dced172787a2db7a6
SHA51237de1daf9c8564bd9b261d2591cb56b93506bdcce602853e40f04d435e2710aada20b419a5703f7068c0e89ea811d7b63ddf84853e95e4b5bcabc25990959023
-
Filesize
90KB
MD519a6e3d3f90f55406190a6a370666f03
SHA1be33ee946d6f07d573e07590cdfe19da42ea4283
SHA2561c00aa849693c5d5c4f42050b40e770ab290f634058d6f19a2e204ad983b088b
SHA51202eba6a958d00d278e97b0046e8d832eb768eb01a8be03ae92e98d7467e1a5cd1eb2fc0761caf0b60ae6d41324482c4aacee5668621ce21ff09ffa2a32d0d325
-
Filesize
90KB
MD52f1d40e9ca11c1a2baa7ad18440a53ba
SHA1faf2e3f20a93502acf94964394b0105f1006d17c
SHA256c327a661f69bb4cc4130f9e7670077aab677f064d308b6c962f4229c82cc61a7
SHA5126cdeb0ec9f80772ab49ced50622a8593ac67f5e947da2b0c9641e6452e9c95b83ae941d3c87ae5650d8dc3706816bcb271f64728bf1cf9c812781dcb5380482d
-
Filesize
90KB
MD58bfb894af81c48eeafa56d3ea4db870e
SHA19df4a63f94f56d48d4be23368a81f3d2698b1a9c
SHA25670e724378fcec18593388b21ebe84460b5204d9fc66c334a4463358fe4657326
SHA512bd6e23d8db1075748d4db812c5aa9e77f4d68b7200a47c4dedf6036c7d9a6feae256d3ca550efc7ff02f433ae71af7e9b543da01acfd3d96b104dd7f28ce8e54
-
Filesize
90KB
MD551316e143d5b5c32cac9e81a7b096b57
SHA14d7c83c21972dfadeefa541b575e96f0bb6b1487
SHA256924adc21523d871476dec4242e0990eb827cccd52ccd857eedc092f107d622cb
SHA5129200cd1e42db259acf466362d70efc6f770656ffc80e2c495ae8353500d7280358a4aeb68e20438b259b05edac8fe6dfe935f99b7345c9195220023ad8f570f2
-
Filesize
90KB
MD5c1fe6e5817108c7e317d0f3d9b92579c
SHA1b58706c41bd901816cbe622317551ce5a5091030
SHA2565caae9b5e55782fa58fa30acde9ef692df1ecebc326696f09a0599d34062137d
SHA51278cc3c14e14608e94216b99dd83b06ef2dea6f25a1f37facf534974259febedffaee0156b55fc94ca19eb9d32baf07288871d9b7d2926f3e006b8db4b966a6aa