Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe
Resource
win10v2004-20240802-en
General
-
Target
c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe
-
Size
90KB
-
MD5
a19f1807122963e2331337a66e55cd86
-
SHA1
bde12bcb403ed6d409efa6a62f6dd0e2415498f2
-
SHA256
c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035
-
SHA512
7807e3a0f50e0b6e81d9bf80d51fcb8866f399329c3d793749e17e16a608adeb6e232f661c12789dbc6b9eb6a01f71e8b8f5e70b4485fb8ceffdc48b1d4d7d02
-
SSDEEP
768:Qvw9816vhKQLro/Z4/wQRNrfrunMxVFA3b7glws:YEGh0o/Zl2unMxVS3Hgz
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32A46B4D-C619-430b-ACB9-7BF6053E4B5D}\stubpath = "C:\\Windows\\{32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe" {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46D5C438-A95E-4b72-AB21-C7D47611D462}\stubpath = "C:\\Windows\\{46D5C438-A95E-4b72-AB21-C7D47611D462}.exe" {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A094B0CF-5B5C-456d-864C-2217233303DC} {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A094B0CF-5B5C-456d-864C-2217233303DC}\stubpath = "C:\\Windows\\{A094B0CF-5B5C-456d-864C-2217233303DC}.exe" {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9} {37F78D2A-1CCA-405d-BFE9-A20914EB7C31}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{41DC0AD3-6DB5-4573-9381-F319DB9FCECC}\stubpath = "C:\\Windows\\{41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe" {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32A46B4D-C619-430b-ACB9-7BF6053E4B5D} {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{89D32921-83C6-4a6e-9FB6-AA1915699B9D}\stubpath = "C:\\Windows\\{89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe" {A094B0CF-5B5C-456d-864C-2217233303DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F52C60D-6794-488c-A9BE-DEC7695BB2C4}\stubpath = "C:\\Windows\\{6F52C60D-6794-488c-A9BE-DEC7695BB2C4}.exe" {AA6DBF6D-93D0-42d4-8D4B-B8805F911426}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA6DBF6D-93D0-42d4-8D4B-B8805F911426} {B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA6DBF6D-93D0-42d4-8D4B-B8805F911426}\stubpath = "C:\\Windows\\{AA6DBF6D-93D0-42d4-8D4B-B8805F911426}.exe" {B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FCBC2B4F-E5F2-4559-887A-9C33618494FB} c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FCBC2B4F-E5F2-4559-887A-9C33618494FB}\stubpath = "C:\\Windows\\{FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe" c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{41DC0AD3-6DB5-4573-9381-F319DB9FCECC} {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}\stubpath = "C:\\Windows\\{6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe" {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37F78D2A-1CCA-405d-BFE9-A20914EB7C31} {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}\stubpath = "C:\\Windows\\{B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}.exe" {37F78D2A-1CCA-405d-BFE9-A20914EB7C31}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F52C60D-6794-488c-A9BE-DEC7695BB2C4} {AA6DBF6D-93D0-42d4-8D4B-B8805F911426}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A39FE85-0E11-4e71-ADDC-11B024EF3CC3} {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46D5C438-A95E-4b72-AB21-C7D47611D462} {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{89D32921-83C6-4a6e-9FB6-AA1915699B9D} {A094B0CF-5B5C-456d-864C-2217233303DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37F78D2A-1CCA-405d-BFE9-A20914EB7C31}\stubpath = "C:\\Windows\\{37F78D2A-1CCA-405d-BFE9-A20914EB7C31}.exe" {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe -
Deletes itself 1 IoCs
pid Process 2392 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2188 {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe 320 {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe 2752 {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe 2708 {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe 2624 {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe 1552 {A094B0CF-5B5C-456d-864C-2217233303DC}.exe 2092 {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe 1724 {37F78D2A-1CCA-405d-BFE9-A20914EB7C31}.exe 696 {B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}.exe 2504 {AA6DBF6D-93D0-42d4-8D4B-B8805F911426}.exe 1240 {6F52C60D-6794-488c-A9BE-DEC7695BB2C4}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe File created C:\Windows\{41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe File created C:\Windows\{32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe File created C:\Windows\{89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe {A094B0CF-5B5C-456d-864C-2217233303DC}.exe File created C:\Windows\{AA6DBF6D-93D0-42d4-8D4B-B8805F911426}.exe {B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}.exe File created C:\Windows\{6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe File created C:\Windows\{46D5C438-A95E-4b72-AB21-C7D47611D462}.exe {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe File created C:\Windows\{A094B0CF-5B5C-456d-864C-2217233303DC}.exe {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe File created C:\Windows\{37F78D2A-1CCA-405d-BFE9-A20914EB7C31}.exe {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe File created C:\Windows\{B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}.exe {37F78D2A-1CCA-405d-BFE9-A20914EB7C31}.exe File created C:\Windows\{6F52C60D-6794-488c-A9BE-DEC7695BB2C4}.exe {AA6DBF6D-93D0-42d4-8D4B-B8805F911426}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AA6DBF6D-93D0-42d4-8D4B-B8805F911426}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6F52C60D-6794-488c-A9BE-DEC7695BB2C4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {37F78D2A-1CCA-405d-BFE9-A20914EB7C31}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A094B0CF-5B5C-456d-864C-2217233303DC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1856 c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe Token: SeIncBasePriorityPrivilege 2188 {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe Token: SeIncBasePriorityPrivilege 320 {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe Token: SeIncBasePriorityPrivilege 2752 {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe Token: SeIncBasePriorityPrivilege 2708 {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe Token: SeIncBasePriorityPrivilege 2624 {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe Token: SeIncBasePriorityPrivilege 1552 {A094B0CF-5B5C-456d-864C-2217233303DC}.exe Token: SeIncBasePriorityPrivilege 2092 {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe Token: SeIncBasePriorityPrivilege 1724 {37F78D2A-1CCA-405d-BFE9-A20914EB7C31}.exe Token: SeIncBasePriorityPrivilege 696 {B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}.exe Token: SeIncBasePriorityPrivilege 2504 {AA6DBF6D-93D0-42d4-8D4B-B8805F911426}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2188 1856 c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe 31 PID 1856 wrote to memory of 2188 1856 c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe 31 PID 1856 wrote to memory of 2188 1856 c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe 31 PID 1856 wrote to memory of 2188 1856 c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe 31 PID 1856 wrote to memory of 2392 1856 c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe 32 PID 1856 wrote to memory of 2392 1856 c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe 32 PID 1856 wrote to memory of 2392 1856 c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe 32 PID 1856 wrote to memory of 2392 1856 c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe 32 PID 2188 wrote to memory of 320 2188 {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe 33 PID 2188 wrote to memory of 320 2188 {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe 33 PID 2188 wrote to memory of 320 2188 {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe 33 PID 2188 wrote to memory of 320 2188 {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe 33 PID 2188 wrote to memory of 2748 2188 {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe 34 PID 2188 wrote to memory of 2748 2188 {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe 34 PID 2188 wrote to memory of 2748 2188 {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe 34 PID 2188 wrote to memory of 2748 2188 {FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe 34 PID 320 wrote to memory of 2752 320 {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe 35 PID 320 wrote to memory of 2752 320 {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe 35 PID 320 wrote to memory of 2752 320 {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe 35 PID 320 wrote to memory of 2752 320 {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe 35 PID 320 wrote to memory of 2816 320 {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe 36 PID 320 wrote to memory of 2816 320 {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe 36 PID 320 wrote to memory of 2816 320 {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe 36 PID 320 wrote to memory of 2816 320 {41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe 36 PID 2752 wrote to memory of 2708 2752 {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe 37 PID 2752 wrote to memory of 2708 2752 {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe 37 PID 2752 wrote to memory of 2708 2752 {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe 37 PID 2752 wrote to memory of 2708 2752 {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe 37 PID 2752 wrote to memory of 3024 2752 {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe 38 PID 2752 wrote to memory of 3024 2752 {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe 38 PID 2752 wrote to memory of 3024 2752 {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe 38 PID 2752 wrote to memory of 3024 2752 {32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe 38 PID 2708 wrote to memory of 2624 2708 {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe 39 PID 2708 wrote to memory of 2624 2708 {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe 39 PID 2708 wrote to memory of 2624 2708 {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe 39 PID 2708 wrote to memory of 2624 2708 {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe 39 PID 2708 wrote to memory of 2680 2708 {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe 40 PID 2708 wrote to memory of 2680 2708 {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe 40 PID 2708 wrote to memory of 2680 2708 {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe 40 PID 2708 wrote to memory of 2680 2708 {6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe 40 PID 2624 wrote to memory of 1552 2624 {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe 41 PID 2624 wrote to memory of 1552 2624 {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe 41 PID 2624 wrote to memory of 1552 2624 {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe 41 PID 2624 wrote to memory of 1552 2624 {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe 41 PID 2624 wrote to memory of 1184 2624 {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe 42 PID 2624 wrote to memory of 1184 2624 {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe 42 PID 2624 wrote to memory of 1184 2624 {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe 42 PID 2624 wrote to memory of 1184 2624 {46D5C438-A95E-4b72-AB21-C7D47611D462}.exe 42 PID 1552 wrote to memory of 2092 1552 {A094B0CF-5B5C-456d-864C-2217233303DC}.exe 43 PID 1552 wrote to memory of 2092 1552 {A094B0CF-5B5C-456d-864C-2217233303DC}.exe 43 PID 1552 wrote to memory of 2092 1552 {A094B0CF-5B5C-456d-864C-2217233303DC}.exe 43 PID 1552 wrote to memory of 2092 1552 {A094B0CF-5B5C-456d-864C-2217233303DC}.exe 43 PID 1552 wrote to memory of 1864 1552 {A094B0CF-5B5C-456d-864C-2217233303DC}.exe 44 PID 1552 wrote to memory of 1864 1552 {A094B0CF-5B5C-456d-864C-2217233303DC}.exe 44 PID 1552 wrote to memory of 1864 1552 {A094B0CF-5B5C-456d-864C-2217233303DC}.exe 44 PID 1552 wrote to memory of 1864 1552 {A094B0CF-5B5C-456d-864C-2217233303DC}.exe 44 PID 2092 wrote to memory of 1724 2092 {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe 45 PID 2092 wrote to memory of 1724 2092 {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe 45 PID 2092 wrote to memory of 1724 2092 {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe 45 PID 2092 wrote to memory of 1724 2092 {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe 45 PID 2092 wrote to memory of 628 2092 {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe 46 PID 2092 wrote to memory of 628 2092 {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe 46 PID 2092 wrote to memory of 628 2092 {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe 46 PID 2092 wrote to memory of 628 2092 {89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe"C:\Users\Admin\AppData\Local\Temp\c937044b5ca8ff27ffd0c7f2531df6bb4583416a21d81809e14219808b0e9035.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\{FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exeC:\Windows\{FCBC2B4F-E5F2-4559-887A-9C33618494FB}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\{41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exeC:\Windows\{41DC0AD3-6DB5-4573-9381-F319DB9FCECC}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\{32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exeC:\Windows\{32A46B4D-C619-430b-ACB9-7BF6053E4B5D}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\{6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exeC:\Windows\{6A39FE85-0E11-4e71-ADDC-11B024EF3CC3}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\{46D5C438-A95E-4b72-AB21-C7D47611D462}.exeC:\Windows\{46D5C438-A95E-4b72-AB21-C7D47611D462}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\{A094B0CF-5B5C-456d-864C-2217233303DC}.exeC:\Windows\{A094B0CF-5B5C-456d-864C-2217233303DC}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\{89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exeC:\Windows\{89D32921-83C6-4a6e-9FB6-AA1915699B9D}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\{37F78D2A-1CCA-405d-BFE9-A20914EB7C31}.exeC:\Windows\{37F78D2A-1CCA-405d-BFE9-A20914EB7C31}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\{B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}.exeC:\Windows\{B1C4AB88-B246-42fe-AE8C-AB183ADA1FB9}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:696 -
C:\Windows\{AA6DBF6D-93D0-42d4-8D4B-B8805F911426}.exeC:\Windows\{AA6DBF6D-93D0-42d4-8D4B-B8805F911426}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Windows\{6F52C60D-6794-488c-A9BE-DEC7695BB2C4}.exeC:\Windows\{6F52C60D-6794-488c-A9BE-DEC7695BB2C4}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA6DB~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1C4A~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37F78~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{89D32~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A094B~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{46D5C~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6A39F~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{32A46~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41DC0~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FCBC2~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\C93704~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5cabaa9e315106dcff224b678bee4bda9
SHA10ac31d78c8028368bd3bb5ae4624436bee5dcbc1
SHA256466b76ed50a9fb3576a125e7bc9e0ea16e19b12b27430c9b944182286eea15f0
SHA51294c8d45838d255c6f2e05777d651bfd03398c60a67bc7f23200759717f96529bf9a64977fd981cc92ec8f0905dcfb5e64e8afe6b05901dd4bb32b29f7ddef1ca
-
Filesize
90KB
MD57edd6f82f89cc9775cab39602b1be56e
SHA19013fe40e1238c3b8fb7b3273dd906e4049a2b55
SHA256b114445d362af2179226e07aaffbf95f13b4c998a701c75a66e8ee718edca4b4
SHA51208a101af5ea38b6a7bd4eb6ab053dbb13328206d4ef9540cb6af2b57f9173649eb59e5fb81afd58cc46c07c9e30ee3b978a8b6d7e945cb97b11d26b0671a1b63
-
Filesize
90KB
MD5cdf99d1f89f7e80eefd014dc622db0be
SHA1c5397670d5b5db0945caebae2548c42f6a8e17fa
SHA256d92aa517da5cd21841814bc98215a019145d5a5721d1fb1fb718dc871522da24
SHA512a7a8331044033c822888ff5da017778fe1af202938919c808974ef70f09bf0a1517132529fe510901cf4f7f285272419ea021950301ed6064afca154bc0442a5
-
Filesize
90KB
MD5addb9571eb8a2f32b90b4ec95c83778a
SHA1afbaf4cbe99a7529556d5439c6b540d78d651766
SHA25616d363e0dc35c9aa9785289eb265568549c879ca418d000ddb8fa6359d8204c6
SHA512001bfc9a888ae204a5de265269f4108c94f34d618476941969dc273cfc1b8c97efa9e7a7c43dcfba0af487e31bae5910671f6503b1a9b086b786b1e61cb89c1f
-
Filesize
90KB
MD5a122293222a539119c629a2a07dcdc76
SHA194401d1a8f34715143a3868c0c646f85970eefb2
SHA2564fd6b47e229bdb17c56052fdf1429c2e966fc2e2fa52adaca36fe9a7ea67446a
SHA51215f0d9bdb342fff38729656d11be997e1f2cd3da763b73a8c57c3ab3a7657327da7e8c121c3fdfde35c59e0ec3b2c7514961fea37d6ec4529105470c2b2081f4
-
Filesize
90KB
MD5c7d65cd116129b5c3b49688f36a09f85
SHA196bfc124a1f37f6313e537ba3af6186d643c2472
SHA2560f2f56bc76e2bdf463c8a4c9260cee1550d7a1fa2726edf0b07b730d9b41aa82
SHA51237c7321c625fa5e87c7396802aa97b3ed848a89fbc647236ffed4e6d25fb788c148cb2a605b44b8292b754473d0bb7ef396b2e68f8a628743e76ef2580d68726
-
Filesize
90KB
MD5a1b3e062669871b01dfd06c8e5f3ae54
SHA1c5ec93c36a9be862697c03e3177bbf7d74f54976
SHA256e65ebdf5a2718f941bfff81d332629e7efe5559f924ae92e3c8f41f6d327061d
SHA512a1c394cdd01c342d733b30a9d36f74dbbb8722955c9a76707dbd702f4d4fa666af03d1bdae8d7629475599117990e7a73b9814a9ddd9947b28f8627612fb2fb2
-
Filesize
90KB
MD50fc41ce88700e019f8e3a966e3ef5aa9
SHA13e0202395c65668a8f5a7fecb493ddc42b48f17f
SHA2562486d6efa282b8dd8ff750566b5019757f09ff22eb6f0894620c0dcc04d86483
SHA5122133f1114c0b6037dcc71d6932dfa20bcd0a4838842d7f547799b92262e2e557411a964f04138562059a7a3baaafe356949e888d5951bce9f28b05e25bceb090
-
Filesize
90KB
MD58d956249712ee2f0f0380b5a7330e907
SHA11f5a15c517908504bd6df9c16fc71d15cd4d0387
SHA2560e172edcb08a329157a9484a5d47135232a2c261898c28c81201a3421d2118e9
SHA5127d16830ab66e5321a60f8d7795937f074722701f7b570a9fa3c5b566a35bd3e61c3361bcbc1887f9de258e25965adaade012863a1abcf2547a609ae738fc1e95
-
Filesize
90KB
MD5fc3cef514c08c0de8c98dde878e68bff
SHA1fc6c61eaf427eca79ae1e21baf2a148401ac7b97
SHA256a1452cea26fe9b01af8d34eced6e1f68433f2776a4cc51130db55cb832d4cd27
SHA512839c024e44497e23a831c9959ee0dc34140c0d03911435aef8edd5f7b9d6c304ab6175c2dc5f2b502cd4ea039943d23b0399b00001e3496e6d7c29c556961910
-
Filesize
90KB
MD557c63a535821b694ba91e5e6f2681d97
SHA148d66e178981a202bdcc3343f85b735e4049de70
SHA2566d35cbd12f1d02662e18f0b3589c922f14d0943d6143f953316081dcd39e223f
SHA51205d2fc9673071b44c12db3d7aa982f34f416fcc21884286763fe5386502102305ffcc15047fa2e6d51c6fa4b9e9a13dc6f0f64c231b658ad20c259e2b8b80d5c