Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
445e30045f080b95dc89bd25872be6d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
445e30045f080b95dc89bd25872be6d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
445e30045f080b95dc89bd25872be6d0N.exe
-
Size
89KB
-
MD5
445e30045f080b95dc89bd25872be6d0
-
SHA1
42a7b44c9921591719d7a8809724c252548c72c9
-
SHA256
b6426abedc38f91c789d592432db0dec5952565137662f84a2920d1986c2fe23
-
SHA512
3c6a3a4df4fa56ff045af504e530ba13b48b3ca104f0ea62042a071b79b7e1984fc0269b2b2cbc2ef8687c2951bbd1ffc4ea179e00253593830e940a997ab7f7
-
SSDEEP
768:5vw9816thKQLroD4/wQkNrfrunMxVFA3k:lEG/0oDlbunMxVS3k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26A1C6A4-12FB-4fdf-A570-1452AF56DE06} {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4813E667-BC62-4cab-9E93-FBFF1B043E55} {6741CE14-267B-40ed-8398-90B4569141B7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F4C5B626-99EF-40f5-B279-BC904B85A2F2} {E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F4C5B626-99EF-40f5-B279-BC904B85A2F2}\stubpath = "C:\\Windows\\{F4C5B626-99EF-40f5-B279-BC904B85A2F2}.exe" {E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26F053EE-1A62-4971-93E6-960C6E3EC0B2} 445e30045f080b95dc89bd25872be6d0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4A28884F-3CD2-4280-89BA-FB4158AD1A56} {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6741CE14-267B-40ed-8398-90B4569141B7}\stubpath = "C:\\Windows\\{6741CE14-267B-40ed-8398-90B4569141B7}.exe" {A8916572-C01F-4584-BC6C-19982B2535A9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4813E667-BC62-4cab-9E93-FBFF1B043E55}\stubpath = "C:\\Windows\\{4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe" {6741CE14-267B-40ed-8398-90B4569141B7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E78D1CF9-6F15-4f07-83A9-3BE61E347EF3} {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4A28884F-3CD2-4280-89BA-FB4158AD1A56}\stubpath = "C:\\Windows\\{4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe" {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26A1C6A4-12FB-4fdf-A570-1452AF56DE06}\stubpath = "C:\\Windows\\{26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe" {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7294A331-017F-433f-AA39-44F7F5057E4C} {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7294A331-017F-433f-AA39-44F7F5057E4C}\stubpath = "C:\\Windows\\{7294A331-017F-433f-AA39-44F7F5057E4C}.exe" {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8916572-C01F-4584-BC6C-19982B2535A9} {7294A331-017F-433f-AA39-44F7F5057E4C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8916572-C01F-4584-BC6C-19982B2535A9}\stubpath = "C:\\Windows\\{A8916572-C01F-4584-BC6C-19982B2535A9}.exe" {7294A331-017F-433f-AA39-44F7F5057E4C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26F053EE-1A62-4971-93E6-960C6E3EC0B2}\stubpath = "C:\\Windows\\{26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe" 445e30045f080b95dc89bd25872be6d0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6741CE14-267B-40ed-8398-90B4569141B7} {A8916572-C01F-4584-BC6C-19982B2535A9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}\stubpath = "C:\\Windows\\{E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}.exe" {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe -
Deletes itself 1 IoCs
pid Process 1956 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 1532 {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe 2372 {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe 2836 {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe 2544 {7294A331-017F-433f-AA39-44F7F5057E4C}.exe 1092 {A8916572-C01F-4584-BC6C-19982B2535A9}.exe 2424 {6741CE14-267B-40ed-8398-90B4569141B7}.exe 756 {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe 2628 {E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}.exe 2416 {F4C5B626-99EF-40f5-B279-BC904B85A2F2}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe 445e30045f080b95dc89bd25872be6d0N.exe File created C:\Windows\{4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe File created C:\Windows\{26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe File created C:\Windows\{A8916572-C01F-4584-BC6C-19982B2535A9}.exe {7294A331-017F-433f-AA39-44F7F5057E4C}.exe File created C:\Windows\{E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}.exe {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe File created C:\Windows\{7294A331-017F-433f-AA39-44F7F5057E4C}.exe {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe File created C:\Windows\{6741CE14-267B-40ed-8398-90B4569141B7}.exe {A8916572-C01F-4584-BC6C-19982B2535A9}.exe File created C:\Windows\{4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe {6741CE14-267B-40ed-8398-90B4569141B7}.exe File created C:\Windows\{F4C5B626-99EF-40f5-B279-BC904B85A2F2}.exe {E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A8916572-C01F-4584-BC6C-19982B2535A9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7294A331-017F-433f-AA39-44F7F5057E4C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6741CE14-267B-40ed-8398-90B4569141B7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 445e30045f080b95dc89bd25872be6d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F4C5B626-99EF-40f5-B279-BC904B85A2F2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2616 445e30045f080b95dc89bd25872be6d0N.exe Token: SeIncBasePriorityPrivilege 1532 {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe Token: SeIncBasePriorityPrivilege 2372 {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe Token: SeIncBasePriorityPrivilege 2836 {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe Token: SeIncBasePriorityPrivilege 2544 {7294A331-017F-433f-AA39-44F7F5057E4C}.exe Token: SeIncBasePriorityPrivilege 1092 {A8916572-C01F-4584-BC6C-19982B2535A9}.exe Token: SeIncBasePriorityPrivilege 2424 {6741CE14-267B-40ed-8398-90B4569141B7}.exe Token: SeIncBasePriorityPrivilege 756 {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe Token: SeIncBasePriorityPrivilege 2628 {E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1532 2616 445e30045f080b95dc89bd25872be6d0N.exe 31 PID 2616 wrote to memory of 1532 2616 445e30045f080b95dc89bd25872be6d0N.exe 31 PID 2616 wrote to memory of 1532 2616 445e30045f080b95dc89bd25872be6d0N.exe 31 PID 2616 wrote to memory of 1532 2616 445e30045f080b95dc89bd25872be6d0N.exe 31 PID 2616 wrote to memory of 1956 2616 445e30045f080b95dc89bd25872be6d0N.exe 32 PID 2616 wrote to memory of 1956 2616 445e30045f080b95dc89bd25872be6d0N.exe 32 PID 2616 wrote to memory of 1956 2616 445e30045f080b95dc89bd25872be6d0N.exe 32 PID 2616 wrote to memory of 1956 2616 445e30045f080b95dc89bd25872be6d0N.exe 32 PID 1532 wrote to memory of 2372 1532 {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe 33 PID 1532 wrote to memory of 2372 1532 {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe 33 PID 1532 wrote to memory of 2372 1532 {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe 33 PID 1532 wrote to memory of 2372 1532 {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe 33 PID 1532 wrote to memory of 2684 1532 {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe 34 PID 1532 wrote to memory of 2684 1532 {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe 34 PID 1532 wrote to memory of 2684 1532 {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe 34 PID 1532 wrote to memory of 2684 1532 {26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe 34 PID 2372 wrote to memory of 2836 2372 {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe 35 PID 2372 wrote to memory of 2836 2372 {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe 35 PID 2372 wrote to memory of 2836 2372 {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe 35 PID 2372 wrote to memory of 2836 2372 {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe 35 PID 2372 wrote to memory of 2816 2372 {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe 36 PID 2372 wrote to memory of 2816 2372 {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe 36 PID 2372 wrote to memory of 2816 2372 {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe 36 PID 2372 wrote to memory of 2816 2372 {4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe 36 PID 2836 wrote to memory of 2544 2836 {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe 37 PID 2836 wrote to memory of 2544 2836 {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe 37 PID 2836 wrote to memory of 2544 2836 {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe 37 PID 2836 wrote to memory of 2544 2836 {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe 37 PID 2836 wrote to memory of 2608 2836 {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe 38 PID 2836 wrote to memory of 2608 2836 {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe 38 PID 2836 wrote to memory of 2608 2836 {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe 38 PID 2836 wrote to memory of 2608 2836 {26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe 38 PID 2544 wrote to memory of 1092 2544 {7294A331-017F-433f-AA39-44F7F5057E4C}.exe 39 PID 2544 wrote to memory of 1092 2544 {7294A331-017F-433f-AA39-44F7F5057E4C}.exe 39 PID 2544 wrote to memory of 1092 2544 {7294A331-017F-433f-AA39-44F7F5057E4C}.exe 39 PID 2544 wrote to memory of 1092 2544 {7294A331-017F-433f-AA39-44F7F5057E4C}.exe 39 PID 2544 wrote to memory of 896 2544 {7294A331-017F-433f-AA39-44F7F5057E4C}.exe 40 PID 2544 wrote to memory of 896 2544 {7294A331-017F-433f-AA39-44F7F5057E4C}.exe 40 PID 2544 wrote to memory of 896 2544 {7294A331-017F-433f-AA39-44F7F5057E4C}.exe 40 PID 2544 wrote to memory of 896 2544 {7294A331-017F-433f-AA39-44F7F5057E4C}.exe 40 PID 1092 wrote to memory of 2424 1092 {A8916572-C01F-4584-BC6C-19982B2535A9}.exe 41 PID 1092 wrote to memory of 2424 1092 {A8916572-C01F-4584-BC6C-19982B2535A9}.exe 41 PID 1092 wrote to memory of 2424 1092 {A8916572-C01F-4584-BC6C-19982B2535A9}.exe 41 PID 1092 wrote to memory of 2424 1092 {A8916572-C01F-4584-BC6C-19982B2535A9}.exe 41 PID 1092 wrote to memory of 812 1092 {A8916572-C01F-4584-BC6C-19982B2535A9}.exe 42 PID 1092 wrote to memory of 812 1092 {A8916572-C01F-4584-BC6C-19982B2535A9}.exe 42 PID 1092 wrote to memory of 812 1092 {A8916572-C01F-4584-BC6C-19982B2535A9}.exe 42 PID 1092 wrote to memory of 812 1092 {A8916572-C01F-4584-BC6C-19982B2535A9}.exe 42 PID 2424 wrote to memory of 756 2424 {6741CE14-267B-40ed-8398-90B4569141B7}.exe 44 PID 2424 wrote to memory of 756 2424 {6741CE14-267B-40ed-8398-90B4569141B7}.exe 44 PID 2424 wrote to memory of 756 2424 {6741CE14-267B-40ed-8398-90B4569141B7}.exe 44 PID 2424 wrote to memory of 756 2424 {6741CE14-267B-40ed-8398-90B4569141B7}.exe 44 PID 2424 wrote to memory of 2788 2424 {6741CE14-267B-40ed-8398-90B4569141B7}.exe 45 PID 2424 wrote to memory of 2788 2424 {6741CE14-267B-40ed-8398-90B4569141B7}.exe 45 PID 2424 wrote to memory of 2788 2424 {6741CE14-267B-40ed-8398-90B4569141B7}.exe 45 PID 2424 wrote to memory of 2788 2424 {6741CE14-267B-40ed-8398-90B4569141B7}.exe 45 PID 756 wrote to memory of 2628 756 {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe 46 PID 756 wrote to memory of 2628 756 {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe 46 PID 756 wrote to memory of 2628 756 {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe 46 PID 756 wrote to memory of 2628 756 {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe 46 PID 756 wrote to memory of 2140 756 {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe 47 PID 756 wrote to memory of 2140 756 {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe 47 PID 756 wrote to memory of 2140 756 {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe 47 PID 756 wrote to memory of 2140 756 {4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\445e30045f080b95dc89bd25872be6d0N.exe"C:\Users\Admin\AppData\Local\Temp\445e30045f080b95dc89bd25872be6d0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\{26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exeC:\Windows\{26F053EE-1A62-4971-93E6-960C6E3EC0B2}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\{4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exeC:\Windows\{4A28884F-3CD2-4280-89BA-FB4158AD1A56}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\{26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exeC:\Windows\{26A1C6A4-12FB-4fdf-A570-1452AF56DE06}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\{7294A331-017F-433f-AA39-44F7F5057E4C}.exeC:\Windows\{7294A331-017F-433f-AA39-44F7F5057E4C}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\{A8916572-C01F-4584-BC6C-19982B2535A9}.exeC:\Windows\{A8916572-C01F-4584-BC6C-19982B2535A9}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\{6741CE14-267B-40ed-8398-90B4569141B7}.exeC:\Windows\{6741CE14-267B-40ed-8398-90B4569141B7}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\{4813E667-BC62-4cab-9E93-FBFF1B043E55}.exeC:\Windows\{4813E667-BC62-4cab-9E93-FBFF1B043E55}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\{E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}.exeC:\Windows\{E78D1CF9-6F15-4f07-83A9-3BE61E347EF3}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2628 -
C:\Windows\{F4C5B626-99EF-40f5-B279-BC904B85A2F2}.exeC:\Windows\{F4C5B626-99EF-40f5-B279-BC904B85A2F2}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E78D1~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4813E~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6741C~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8916~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7294A~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26A1C~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4A288~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26F05~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\445E30~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5009969231512f50ba9849aa8f0280482
SHA1c734774fba596da69316f2f91c3f8a2e79836fe8
SHA256f6c49d5e9d0958b227720729757af3396a8ef784e1e08cb41665bd3bc8c110f4
SHA512e00e98df44b24d098da82f4ea7e83656f5c14c3eb63e78eaf86b5cc2b20a03ad40b3de24a7110afd915b3f32bcccc0c54fe301d2570546dd901fb3b8a665122f
-
Filesize
89KB
MD5dbcce8d364e3494a3445a42ba868eb6c
SHA1fedb07658ce1735a6154fe3004a3276ae6c6723a
SHA256c9fda04d2080a08816dddce888abb84fab346095ff90fd5f76d29b9f3072a223
SHA512a3ad6ab9c5179329698ea6667231383cb81d0dbcffb1924afe5c4bd35613a6cc4d0d8f741fe84cd058afa63ec260eb6140d3a0ca2cc9343a1c77b8186b477b0d
-
Filesize
89KB
MD58327d5a84071b21cbb0bc7ebd117f027
SHA1edb8766ad683f536431657c97c0177578bdee552
SHA2560bba73b5cf70d182119c4bf4ef4ae0395178c9c0c60ee75325e2ac30c38c35aa
SHA512eee5b728f659b44105ce0e178b4a4c9a1b6779b66cd80a28ff519ef048d16cd46ecd8b5315ff10826c3a3a6796ddd4a5031b7e554826153da6d9c735226095dd
-
Filesize
89KB
MD518d0cdf8841ceb17860c384e3fabde85
SHA1253d510620d005cc08b91c3f04fe18f8ef8d9419
SHA2560c349f74dcf4c3ff1abeb6c3badb277f1e392ea78492ec4c2fb740178febf9be
SHA5120815d494ddccf4afe80b3a0bfaca2d840f34a868c33b19e9db3e4e275b8026c5a4e80c3b425836d4d9841243c9377cb818e6407c2648b35b7a06ec34f77ad7b1
-
Filesize
89KB
MD52ffb1149c5ddeaf510d8341c0ae2322b
SHA1c73e6a8e3ca0dafde02a2b135368f108e85def9c
SHA256b8f0f4a9afb85485c7326893fa1d1ac22a2d2da45c287fba8d5e9edcf3703c9f
SHA51294bf1bed407b0b4bee6f88ad3f403a605fa2f0374a04d05093c5eefaea2a33eaf414f6a0fb1f474df6684809cc71027eeac583fab3131ecfa6c0f0d65cc7c6b6
-
Filesize
89KB
MD5f10d3af79996f3fefdea6d270ae39985
SHA1b124a4ed978150a5e8a2661ccc42af287c11b008
SHA2567968690838aea680151ea8774044fdfdeec5248060ecd23a55173682086f5074
SHA512a0b8441d45e9b867c80405311418fb324b66331fe03cf5f04b1caddbc2c580bcdda9a61e3407b7dd393a737a16efa528a09b4a253ef44a10aafa0194941f3646
-
Filesize
89KB
MD5e0ea7890eb00482e31f1318c4f21360b
SHA11a9f70950947b1d94961d4ddda0782387db28cd8
SHA256f35471acaf3293b7eb7c9abf4c9e56a225d04220bd0c7911be039af1bd0ce700
SHA512faae479ecf8b1a00950421b7ebae405d85780adfbf615194a9d59c867127cd4b5e9e5487d91097aac5a6ac25e8fc5f85047c1eb21d62bbf5cbd63d15360dead0
-
Filesize
89KB
MD5d3c31ed1b07890e8f61e5c7d3d0b821e
SHA1385af166c565a66f319fe1fcad782c9d6b22c712
SHA256a2478fe2173438394020505f964674295fa51f1c914d34c41e73d6b91e52d6d7
SHA5120fd0ee2c2b26e6234e74947709e7120e16757faef932e94feb26dc45c087482f81d2259d7c4e8d972206ae1508c689ffc34286de1a9be416b3843fb42956970b
-
Filesize
89KB
MD5c6d0a0eb9f7a4d83465d9f36b9d5623a
SHA1503e20b02c9e886f4719f58fd9f273d7051cdf44
SHA256de0743e856a0b86cba179b7f65ab6c3af41f70586dad409afbc950943c93e33c
SHA5127e2063f6b7738d020dec58ced3abb3959fa39c37fb9a62ca123ff691207109d5b7e0dd73d5dd7c22335e190308587ef70639c158e270723f412eaf21e207e45e