Analysis
-
max time kernel
118s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
20eda244cb020a1ed13ce2226dea1040N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20eda244cb020a1ed13ce2226dea1040N.exe
Resource
win10v2004-20240802-en
General
-
Target
20eda244cb020a1ed13ce2226dea1040N.exe
-
Size
408KB
-
MD5
20eda244cb020a1ed13ce2226dea1040
-
SHA1
5dd1040a647322633ccf6baf4825f999e60b695e
-
SHA256
507427a0d30c910a287e4e77210cf03ae4da46d967f0d0d53a3f8b660d7571da
-
SHA512
75a95270839bf48e072b8356d55ed72080942f315d679545022ec7299ce6cb22c436c483693c7114f6ce299d4215488e9792764ec2a18da3751117a8103297ce
-
SSDEEP
3072:CEGh0oOl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGYldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{572AD497-0606-405a-A316-5BB3EC5CFCA3} 20eda244cb020a1ed13ce2226dea1040N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{572AD497-0606-405a-A316-5BB3EC5CFCA3}\stubpath = "C:\\Windows\\{572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe" 20eda244cb020a1ed13ce2226dea1040N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1BAE1575-564E-4c03-904F-7565D4B8E442} {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}\stubpath = "C:\\Windows\\{E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe" {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836} {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}\stubpath = "C:\\Windows\\{41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe" {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A} {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03} {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BD8D079F-3818-4c9d-8D58-17E9B3776341} {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BD8D079F-3818-4c9d-8D58-17E9B3776341}\stubpath = "C:\\Windows\\{BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe" {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59ECFD4A-EC43-4a44-885C-AE29B697D662}\stubpath = "C:\\Windows\\{59ECFD4A-EC43-4a44-885C-AE29B697D662}.exe" {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59ECFD4A-EC43-4a44-885C-AE29B697D662} {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CAD40C8A-4D68-4823-A36A-4D4A4A39FF74} {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}\stubpath = "C:\\Windows\\{CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe" {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}\stubpath = "C:\\Windows\\{9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe" {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1BAE1575-564E-4c03-904F-7565D4B8E442}\stubpath = "C:\\Windows\\{1BAE1575-564E-4c03-904F-7565D4B8E442}.exe" {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}\stubpath = "C:\\Windows\\{06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe" {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E2BACBD0-C7FA-46c4-8A9B-A892B73515E6} {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe -
Executes dropped EXE 9 IoCs
pid Process 2968 {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe 3408 {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe 3952 {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe 3244 {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe 2952 {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe 1968 {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe 4916 {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe 3880 {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe 3664 {59ECFD4A-EC43-4a44-885C-AE29B697D662}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe File created C:\Windows\{E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe File created C:\Windows\{BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe File created C:\Windows\{572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe 20eda244cb020a1ed13ce2226dea1040N.exe File created C:\Windows\{CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe File created C:\Windows\{9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe File created C:\Windows\{1BAE1575-564E-4c03-904F-7565D4B8E442}.exe {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe File created C:\Windows\{41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe File created C:\Windows\{59ECFD4A-EC43-4a44-885C-AE29B697D662}.exe {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20eda244cb020a1ed13ce2226dea1040N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {59ECFD4A-EC43-4a44-885C-AE29B697D662}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1056 20eda244cb020a1ed13ce2226dea1040N.exe Token: SeIncBasePriorityPrivilege 2968 {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe Token: SeIncBasePriorityPrivilege 3408 {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe Token: SeIncBasePriorityPrivilege 3952 {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe Token: SeIncBasePriorityPrivilege 3244 {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe Token: SeIncBasePriorityPrivilege 2952 {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe Token: SeIncBasePriorityPrivilege 1968 {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe Token: SeIncBasePriorityPrivilege 4916 {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe Token: SeIncBasePriorityPrivilege 3880 {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2968 1056 20eda244cb020a1ed13ce2226dea1040N.exe 90 PID 1056 wrote to memory of 2968 1056 20eda244cb020a1ed13ce2226dea1040N.exe 90 PID 1056 wrote to memory of 2968 1056 20eda244cb020a1ed13ce2226dea1040N.exe 90 PID 1056 wrote to memory of 2112 1056 20eda244cb020a1ed13ce2226dea1040N.exe 91 PID 1056 wrote to memory of 2112 1056 20eda244cb020a1ed13ce2226dea1040N.exe 91 PID 1056 wrote to memory of 2112 1056 20eda244cb020a1ed13ce2226dea1040N.exe 91 PID 2968 wrote to memory of 3408 2968 {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe 96 PID 2968 wrote to memory of 3408 2968 {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe 96 PID 2968 wrote to memory of 3408 2968 {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe 96 PID 2968 wrote to memory of 2972 2968 {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe 97 PID 2968 wrote to memory of 2972 2968 {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe 97 PID 2968 wrote to memory of 2972 2968 {572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe 97 PID 3408 wrote to memory of 3952 3408 {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe 103 PID 3408 wrote to memory of 3952 3408 {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe 103 PID 3408 wrote to memory of 3952 3408 {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe 103 PID 3408 wrote to memory of 4036 3408 {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe 104 PID 3408 wrote to memory of 4036 3408 {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe 104 PID 3408 wrote to memory of 4036 3408 {41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe 104 PID 3952 wrote to memory of 3244 3952 {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe 105 PID 3952 wrote to memory of 3244 3952 {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe 105 PID 3952 wrote to memory of 3244 3952 {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe 105 PID 3952 wrote to memory of 3680 3952 {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe 106 PID 3952 wrote to memory of 3680 3952 {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe 106 PID 3952 wrote to memory of 3680 3952 {CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe 106 PID 3244 wrote to memory of 2952 3244 {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe 107 PID 3244 wrote to memory of 2952 3244 {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe 107 PID 3244 wrote to memory of 2952 3244 {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe 107 PID 3244 wrote to memory of 3544 3244 {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe 108 PID 3244 wrote to memory of 3544 3244 {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe 108 PID 3244 wrote to memory of 3544 3244 {9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe 108 PID 2952 wrote to memory of 1968 2952 {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe 109 PID 2952 wrote to memory of 1968 2952 {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe 109 PID 2952 wrote to memory of 1968 2952 {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe 109 PID 2952 wrote to memory of 1164 2952 {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe 110 PID 2952 wrote to memory of 1164 2952 {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe 110 PID 2952 wrote to memory of 1164 2952 {1BAE1575-564E-4c03-904F-7565D4B8E442}.exe 110 PID 1968 wrote to memory of 4916 1968 {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe 111 PID 1968 wrote to memory of 4916 1968 {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe 111 PID 1968 wrote to memory of 4916 1968 {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe 111 PID 1968 wrote to memory of 2880 1968 {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe 112 PID 1968 wrote to memory of 2880 1968 {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe 112 PID 1968 wrote to memory of 2880 1968 {06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe 112 PID 4916 wrote to memory of 3880 4916 {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe 113 PID 4916 wrote to memory of 3880 4916 {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe 113 PID 4916 wrote to memory of 3880 4916 {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe 113 PID 4916 wrote to memory of 3052 4916 {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe 114 PID 4916 wrote to memory of 3052 4916 {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe 114 PID 4916 wrote to memory of 3052 4916 {E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe 114 PID 3880 wrote to memory of 3664 3880 {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe 115 PID 3880 wrote to memory of 3664 3880 {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe 115 PID 3880 wrote to memory of 3664 3880 {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe 115 PID 3880 wrote to memory of 4476 3880 {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe 116 PID 3880 wrote to memory of 4476 3880 {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe 116 PID 3880 wrote to memory of 4476 3880 {BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\20eda244cb020a1ed13ce2226dea1040N.exe"C:\Users\Admin\AppData\Local\Temp\20eda244cb020a1ed13ce2226dea1040N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\{572AD497-0606-405a-A316-5BB3EC5CFCA3}.exeC:\Windows\{572AD497-0606-405a-A316-5BB3EC5CFCA3}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\{41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exeC:\Windows\{41D2C4A6-8D02-4926-9C7C-4CD7A9FDF836}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\{CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exeC:\Windows\{CAD40C8A-4D68-4823-A36A-4D4A4A39FF74}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\{9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exeC:\Windows\{9AFAC9FB-1792-4ca1-85A7-0B38FAD00D7A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\{1BAE1575-564E-4c03-904F-7565D4B8E442}.exeC:\Windows\{1BAE1575-564E-4c03-904F-7565D4B8E442}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\{06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exeC:\Windows\{06D91EC9-EFFD-43e3-80AB-A58ACAEF5B03}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\{E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exeC:\Windows\{E2BACBD0-C7FA-46c4-8A9B-A892B73515E6}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\{BD8D079F-3818-4c9d-8D58-17E9B3776341}.exeC:\Windows\{BD8D079F-3818-4c9d-8D58-17E9B3776341}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\{59ECFD4A-EC43-4a44-885C-AE29B697D662}.exeC:\Windows\{59ECFD4A-EC43-4a44-885C-AE29B697D662}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BD8D0~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E2BAC~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06D91~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1BAE1~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9AFAC~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CAD40~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41D2C~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{572AD~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\20EDA2~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD531f498a812258f51716e68efe6337094
SHA1da8ebfe218cb8ea338ee29ce6e18646ba7d2035e
SHA256709b3f3dbe2c38e072b366b1273bbfa7528ebea66eea603d0cf5ab14e880be85
SHA51265a9693813e66b8d83542e49ce6155a7b8f44e295eff58a5d6513ade1b222c01694855da101bb0799e6b31bc98bf74b2bb7fff1f423a951ab307b9a2fb1953bb
-
Filesize
408KB
MD5867de1e3500c23fbf43792bee684cbf5
SHA13a1e6de56e63d699a74ea802340545c6525e946d
SHA25621e6bb32ae89daa19ac54eed34cda5f09ff741115d01b6a08b9b88654aba51ce
SHA512aa0206bf9dcc6800b994bb8acfe8a07534707a22329402baf3b69650bdb65fed3957e3eb29dbbedcafe7b0e68f55841fce1aba6f7ad116f473d59524980fe301
-
Filesize
408KB
MD567fd903ff6514f7cb6fa0b56f575d79f
SHA1416735a74521fda86f79fbfea93879cdcecabd43
SHA25638414be6ac7de86eef1cc87a388670619d3f19fa1ca8d8f616a03311e97a2237
SHA512d5a78f44d06c9952ac1a3a0512e90539f61cd06c17508f4e3a322c9fde2b451b72808edd297d1823031ff38c4f5c8685ba15c698534e72195cc5666df03ad096
-
Filesize
408KB
MD54bc3d5ddc1147d4475d37a95cfeb828b
SHA13690e69e92e8599804a276e666303117626e4ec1
SHA256888302cad551d78bf9a263cbdeea3aa35916ef9ef11736efb20c248eda8f7fe4
SHA512ee97fc03320ac584cd67a71edaa8f74f45307a02f1cdfe33a011cf5918cf9b09060c8cc4a2c94ae77b43a6a28e14f63285a9f0d64e79e2bcc0bbe49b9776d983
-
Filesize
408KB
MD56639c4b4087d7eba21fb52e3b05141bf
SHA101ed3114c8c67174bffaf6aa5349436f16742688
SHA25658dfbcf9b4ba48452907b5525d3a36b85b6a8bcd02e0b3ca5f62a87021777ed9
SHA5126539e7c66bcc8742753eff4e7ce961ecb2589802ce885e229d2d84410d3a7f5cac57727216526f695023ef39ec3eaeb8e7b37bfb31c2b2e9594d70d1690393d8
-
Filesize
408KB
MD551a829a6764f2b984fd4e8e27e129ab3
SHA1e1586ddb0a07fd837e824a725e18d5310dd0e1c5
SHA256051ddbd1ecb8e5d5a9a150cb9304f530f517edf96d13be8c0a46e4220610ed4e
SHA512424b0e02d84d1427e8f504aa0e8eced576541b4a759ffec342f28686d2996ab23734e09ae2d5e02e5956e9dbcfc9e3b765340937966afa4b49aab01737a948e4
-
Filesize
408KB
MD508b803917a8e7128f87a30f71f78a8bf
SHA17dd0eef8c15d7617fee29ae70ea881534aa19e02
SHA256c2e876e98a0dc41be6217bb5b3ee1903f9fe4a859824ee28cddd713606e0db6f
SHA512b5f9c82b94694922325d9118f9a527eaa9988e6fc4a31d3f9be476137ac78bb17ccdf834908ec06942e6ac79e2d36ff3133beee410ba67549f93e81902dcf391
-
Filesize
408KB
MD5c72b3f936b3357154f54de9828ed0adb
SHA1fdc9184f40eb70e0143862cf70f5f52ae66a28e7
SHA2565cf8b8ccd832efb893b55602c3e5cbe83152e8adee79792afeb1f55545b2731c
SHA512afc2f4de6179ea1cc734a1d67ae6654b93f329dd0a2f8e9c7eef8f21af28a2abc08adaf0a396a46b8eaf9992b963eb89755f66436d76499e30d1aa99369ef718
-
Filesize
408KB
MD5c305f161057d46c462e4f9cf9579393e
SHA1082727e98a2350a7292066fb3c2fa45a4f4ab7bb
SHA256016779d1aed8933c14fd5794640f94626e0308daabdf93f3d3b58c5260552f26
SHA5121d5da8474ebb69614a10e6fa24d6aad6a76a9caeb01c2177fa194fb84cb9058b9a4562c39aac61d2918220eff49b9ffc866c066df1a2a899f1a15a13a8e8f9dd