Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
20eda244cb020a1ed13ce2226dea1040N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20eda244cb020a1ed13ce2226dea1040N.exe
Resource
win10v2004-20240802-en
General
-
Target
20eda244cb020a1ed13ce2226dea1040N.exe
-
Size
408KB
-
MD5
20eda244cb020a1ed13ce2226dea1040
-
SHA1
5dd1040a647322633ccf6baf4825f999e60b695e
-
SHA256
507427a0d30c910a287e4e77210cf03ae4da46d967f0d0d53a3f8b660d7571da
-
SHA512
75a95270839bf48e072b8356d55ed72080942f315d679545022ec7299ce6cb22c436c483693c7114f6ce299d4215488e9792764ec2a18da3751117a8103297ce
-
SSDEEP
3072:CEGh0oOl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGYldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DB3B0147-E1FD-430c-875F-47B45EA13836} {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BF27BA93-0437-47c3-AD08-94B9DB4FB959}\stubpath = "C:\\Windows\\{BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe" {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{94ED8E89-2D6A-4b16-8C79-40EE562755A7} {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}\stubpath = "C:\\Windows\\{9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe" {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E8757417-5C08-41e4-AA47-39BBC85A16BA}\stubpath = "C:\\Windows\\{E8757417-5C08-41e4-AA47-39BBC85A16BA}.exe" {51FE96A0-B081-4386-988F-515597560DBB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C5627192-F2DF-4536-9CE9-34F33D2E6AD2}\stubpath = "C:\\Windows\\{C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe" 20eda244cb020a1ed13ce2226dea1040N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AED0B5BA-3EDE-45ea-97BA-6587E280C36A} {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{51FE96A0-B081-4386-988F-515597560DBB} {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2057765-5EE9-4b8a-AEA1-EE630A683E32} {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AED0B5BA-3EDE-45ea-97BA-6587E280C36A}\stubpath = "C:\\Windows\\{AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe" {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DB3B0147-E1FD-430c-875F-47B45EA13836}\stubpath = "C:\\Windows\\{DB3B0147-E1FD-430c-875F-47B45EA13836}.exe" {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2057765-5EE9-4b8a-AEA1-EE630A683E32}\stubpath = "C:\\Windows\\{C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe" {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BF27BA93-0437-47c3-AD08-94B9DB4FB959} {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{94ED8E89-2D6A-4b16-8C79-40EE562755A7}\stubpath = "C:\\Windows\\{94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe" {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9DF08C9A-17D1-48d7-B94E-BD6C73C068F0} {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{51FE96A0-B081-4386-988F-515597560DBB}\stubpath = "C:\\Windows\\{51FE96A0-B081-4386-988F-515597560DBB}.exe" {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E8757417-5C08-41e4-AA47-39BBC85A16BA} {51FE96A0-B081-4386-988F-515597560DBB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C5627192-F2DF-4536-9CE9-34F33D2E6AD2} 20eda244cb020a1ed13ce2226dea1040N.exe -
Deletes itself 1 IoCs
pid Process 2284 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2700 {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe 2836 {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe 2656 {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe 2616 {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe 2328 {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe 3064 {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe 2196 {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe 1936 {51FE96A0-B081-4386-988F-515597560DBB}.exe 2480 {E8757417-5C08-41e4-AA47-39BBC85A16BA}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe File created C:\Windows\{51FE96A0-B081-4386-988F-515597560DBB}.exe {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe File created C:\Windows\{C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe 20eda244cb020a1ed13ce2226dea1040N.exe File created C:\Windows\{C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe File created C:\Windows\{BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe File created C:\Windows\{94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe File created C:\Windows\{E8757417-5C08-41e4-AA47-39BBC85A16BA}.exe {51FE96A0-B081-4386-988F-515597560DBB}.exe File created C:\Windows\{DB3B0147-E1FD-430c-875F-47B45EA13836}.exe {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe File created C:\Windows\{AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20eda244cb020a1ed13ce2226dea1040N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {51FE96A0-B081-4386-988F-515597560DBB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E8757417-5C08-41e4-AA47-39BBC85A16BA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2376 20eda244cb020a1ed13ce2226dea1040N.exe Token: SeIncBasePriorityPrivilege 2700 {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe Token: SeIncBasePriorityPrivilege 2836 {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe Token: SeIncBasePriorityPrivilege 2656 {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe Token: SeIncBasePriorityPrivilege 2616 {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe Token: SeIncBasePriorityPrivilege 2328 {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe Token: SeIncBasePriorityPrivilege 3064 {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe Token: SeIncBasePriorityPrivilege 2196 {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe Token: SeIncBasePriorityPrivilege 1936 {51FE96A0-B081-4386-988F-515597560DBB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2700 2376 20eda244cb020a1ed13ce2226dea1040N.exe 29 PID 2376 wrote to memory of 2700 2376 20eda244cb020a1ed13ce2226dea1040N.exe 29 PID 2376 wrote to memory of 2700 2376 20eda244cb020a1ed13ce2226dea1040N.exe 29 PID 2376 wrote to memory of 2700 2376 20eda244cb020a1ed13ce2226dea1040N.exe 29 PID 2376 wrote to memory of 2284 2376 20eda244cb020a1ed13ce2226dea1040N.exe 30 PID 2376 wrote to memory of 2284 2376 20eda244cb020a1ed13ce2226dea1040N.exe 30 PID 2376 wrote to memory of 2284 2376 20eda244cb020a1ed13ce2226dea1040N.exe 30 PID 2376 wrote to memory of 2284 2376 20eda244cb020a1ed13ce2226dea1040N.exe 30 PID 2700 wrote to memory of 2836 2700 {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe 31 PID 2700 wrote to memory of 2836 2700 {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe 31 PID 2700 wrote to memory of 2836 2700 {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe 31 PID 2700 wrote to memory of 2836 2700 {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe 31 PID 2700 wrote to memory of 2908 2700 {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe 32 PID 2700 wrote to memory of 2908 2700 {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe 32 PID 2700 wrote to memory of 2908 2700 {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe 32 PID 2700 wrote to memory of 2908 2700 {C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe 32 PID 2836 wrote to memory of 2656 2836 {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe 33 PID 2836 wrote to memory of 2656 2836 {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe 33 PID 2836 wrote to memory of 2656 2836 {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe 33 PID 2836 wrote to memory of 2656 2836 {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe 33 PID 2836 wrote to memory of 2868 2836 {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe 34 PID 2836 wrote to memory of 2868 2836 {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe 34 PID 2836 wrote to memory of 2868 2836 {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe 34 PID 2836 wrote to memory of 2868 2836 {C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe 34 PID 2656 wrote to memory of 2616 2656 {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe 35 PID 2656 wrote to memory of 2616 2656 {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe 35 PID 2656 wrote to memory of 2616 2656 {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe 35 PID 2656 wrote to memory of 2616 2656 {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe 35 PID 2656 wrote to memory of 2652 2656 {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe 36 PID 2656 wrote to memory of 2652 2656 {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe 36 PID 2656 wrote to memory of 2652 2656 {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe 36 PID 2656 wrote to memory of 2652 2656 {DB3B0147-E1FD-430c-875F-47B45EA13836}.exe 36 PID 2616 wrote to memory of 2328 2616 {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe 37 PID 2616 wrote to memory of 2328 2616 {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe 37 PID 2616 wrote to memory of 2328 2616 {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe 37 PID 2616 wrote to memory of 2328 2616 {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe 37 PID 2616 wrote to memory of 760 2616 {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe 38 PID 2616 wrote to memory of 760 2616 {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe 38 PID 2616 wrote to memory of 760 2616 {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe 38 PID 2616 wrote to memory of 760 2616 {AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe 38 PID 2328 wrote to memory of 3064 2328 {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe 39 PID 2328 wrote to memory of 3064 2328 {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe 39 PID 2328 wrote to memory of 3064 2328 {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe 39 PID 2328 wrote to memory of 3064 2328 {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe 39 PID 2328 wrote to memory of 1800 2328 {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe 40 PID 2328 wrote to memory of 1800 2328 {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe 40 PID 2328 wrote to memory of 1800 2328 {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe 40 PID 2328 wrote to memory of 1800 2328 {BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe 40 PID 3064 wrote to memory of 2196 3064 {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe 41 PID 3064 wrote to memory of 2196 3064 {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe 41 PID 3064 wrote to memory of 2196 3064 {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe 41 PID 3064 wrote to memory of 2196 3064 {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe 41 PID 3064 wrote to memory of 2856 3064 {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe 42 PID 3064 wrote to memory of 2856 3064 {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe 42 PID 3064 wrote to memory of 2856 3064 {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe 42 PID 3064 wrote to memory of 2856 3064 {94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe 42 PID 2196 wrote to memory of 1936 2196 {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe 43 PID 2196 wrote to memory of 1936 2196 {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe 43 PID 2196 wrote to memory of 1936 2196 {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe 43 PID 2196 wrote to memory of 1936 2196 {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe 43 PID 2196 wrote to memory of 2200 2196 {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe 44 PID 2196 wrote to memory of 2200 2196 {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe 44 PID 2196 wrote to memory of 2200 2196 {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe 44 PID 2196 wrote to memory of 2200 2196 {9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\20eda244cb020a1ed13ce2226dea1040N.exe"C:\Users\Admin\AppData\Local\Temp\20eda244cb020a1ed13ce2226dea1040N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\{C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exeC:\Windows\{C5627192-F2DF-4536-9CE9-34F33D2E6AD2}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\{C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exeC:\Windows\{C2057765-5EE9-4b8a-AEA1-EE630A683E32}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\{DB3B0147-E1FD-430c-875F-47B45EA13836}.exeC:\Windows\{DB3B0147-E1FD-430c-875F-47B45EA13836}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\{AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exeC:\Windows\{AED0B5BA-3EDE-45ea-97BA-6587E280C36A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\{BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exeC:\Windows\{BF27BA93-0437-47c3-AD08-94B9DB4FB959}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\{94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exeC:\Windows\{94ED8E89-2D6A-4b16-8C79-40EE562755A7}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\{9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exeC:\Windows\{9DF08C9A-17D1-48d7-B94E-BD6C73C068F0}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\{51FE96A0-B081-4386-988F-515597560DBB}.exeC:\Windows\{51FE96A0-B081-4386-988F-515597560DBB}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\{E8757417-5C08-41e4-AA47-39BBC85A16BA}.exeC:\Windows\{E8757417-5C08-41e4-AA47-39BBC85A16BA}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{51FE9~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9DF08~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{94ED8~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BF27B~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AED0B~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DB3B0~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2057~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C5627~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\20EDA2~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5c2ef96e6c1e11426223d171b76b1e3dc
SHA127cec08bf3536866324ca0a6a16b617a37d352a1
SHA256899c31a0ccb5b9e6a52c67b73e1109e0fd8589dbda3073d7228c96392e7f87ac
SHA51261cfa785e96a8f15909e587c51a2f658e92c1be28569cede6601208dc4d42271652dcc3cc694d44efbed80410d7608f55129134e813d4fec19d2ff5f9797218d
-
Filesize
408KB
MD5aa286c88123e2cb6e0d782194953e14e
SHA112d4591ec10809c2bdce4592c38c28b5cbeb9d21
SHA256ef6312f750bc1f2ac6f6ff54c82f484cb65b7bf8a87c49551c4a92351af76d70
SHA512dbf55aa64d8094398a832a8796f0932c8a0709049453a6d0488788ff73c366746c810a36ede6f45a6430b1ea51da672bdbaabfa17742cc14f17db8fd6fc76252
-
Filesize
408KB
MD5f31418358bb381c5147ba3592027cd8b
SHA141eaff6a3722a53be74769a8389172533c3247c6
SHA25691b98f6d0556a61786f4dd972712f88791c18021e77e5ebeb2d4e27bf402920e
SHA51299d59c6d0df2e9ed3492448805bd6cdef9ce91a26f668bebfa0a42c518d362be52abbf822fc3ececcfde32f9492dde48f3d03202855e5147515cc0ba3f24241c
-
Filesize
408KB
MD5372e56c8630ef2d7abd91961d8743e91
SHA195eb8b9ec2e045f4bc07c77100f2713b296bd67d
SHA2563fddc9ded4ce68ec1f7ee3f0b05ff5ae44f6151c387b2e1cc2676f083b7edeb8
SHA512bacec66af50ff0d7df5a4a781f4204f254ee2362a9d0e913a0e3897be073e629bb6f07e05119c80e76332555832d3ae2d94bd83cd9d668bf6ac9be1d115af1c7
-
Filesize
408KB
MD5378710e665ed5d2d34e29a8e8082c6be
SHA1cc0df4dcead987a7fc8da1cf43f9c234d4a0ad70
SHA256ad7cab675c3a52932a07f4a4abbcbaaade3fd95516b75698b243c8b6595d5639
SHA51284cf2354074c1e81fdafff489665bb154c9f4b786c6dcfd3d23050574dfe2d4e976c8603f1f75c68cc6d955ed8248fddced4cfe87c2a44f67fc34e29205e3abb
-
Filesize
408KB
MD53a012075a1d7d87d0de42ac80934b8f2
SHA17992a2cc3de3a8baea95f2696f8749f24fb52fdd
SHA2569f44afc8488f357616b2c294201003bb7467653b12635c6f4c513ce3b01acdf7
SHA5120fc823ae55fc64a2eb181a4fc871a6d0c6929eddb540e1982db2d5d1f213386121200d5cc5d0feeeeebe6a190f18fabf0c0196b072c6f8400322659c9a97ce3e
-
Filesize
408KB
MD569bb62ae0b5a8a95e3b82d4136a1e0b6
SHA19bcd788bb75a32849e28f315b65342fddb299ca0
SHA25616976867e8bc2186f2e63f10e32ec76e1f54f35e96e1a6682ef2600966e9ade7
SHA512ed27528a8ec87adaabe6da797cb2ab957101e05bfbd2bcd6f555303316e4ae4c53ce6c4457052658a1ae0412b3e4595a85899ce4d59eb74a322ce0a26db954bd
-
Filesize
408KB
MD5569e9756698d80167a075b302ef13804
SHA1e36a062eb5b815865b2ab72e66d1d0c20d433354
SHA2562b1467466e05d52e92efacd998e2a158f6249eaf9022780bfd6051d276506b36
SHA512e9e7a260c2f626ca324ef76758f669d41c8340a55b98ec18dfba290efe25d995c2abc4e89372e4207ac5915eadc309e34a6cd88e6fa02ab9f87b1eaaa70bc72c
-
Filesize
408KB
MD5808fb819a3cef59432a4e42ae521ea97
SHA199edeb4d8b26e689bc468defbb6afcaa745b088b
SHA2560b44763046ecaecd72984c638a9211dd0c727a525b6ffd211c9fa1648afd04d1
SHA5123c20d7c5a686e255b89c9615e34728322b3779ceb48079a3b2f49a48c17db8236d4720151291ae64cbb538c7c81e4622985184209a6cc6ed04f44707803cd233