Analysis
-
max time kernel
144s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe
Resource
win10v2004-20240802-en
General
-
Target
27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe
-
Size
89KB
-
MD5
c937a975abe84532ccacf5b372b3ad34
-
SHA1
88d6aab44403b303e21458c4a5881433c9aa7eb5
-
SHA256
27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71
-
SHA512
f53a91a9c184ac208a55103f9b14ab02c80d5b8fd0d56087d1f793d4091627a057589c6b57a384f88c6a248f80c6bf553dba73d0b98d0968aceb8bb5c5e8d4d9
-
SSDEEP
768:5vw9816thKQLrov4/wQkNrfrunMxVFA3k:lEG/0ovlbunMxVS3k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{625D4834-D22E-45b2-A5ED-367A967325EF} 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{967DB88A-4B09-4af2-8002-B17397CA05A6} {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{967DB88A-4B09-4af2-8002-B17397CA05A6}\stubpath = "C:\\Windows\\{967DB88A-4B09-4af2-8002-B17397CA05A6}.exe" {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}\stubpath = "C:\\Windows\\{13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}.exe" {3661AEAC-34D5-47d2-A5E7-4F184F1C6259}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{625D4834-D22E-45b2-A5ED-367A967325EF}\stubpath = "C:\\Windows\\{625D4834-D22E-45b2-A5ED-367A967325EF}.exe" 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}\stubpath = "C:\\Windows\\{16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe" {625D4834-D22E-45b2-A5ED-367A967325EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}\stubpath = "C:\\Windows\\{5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe" {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}\stubpath = "C:\\Windows\\{8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe" {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C77BD877-48FB-49c7-96FE-CA24EB099EFF} {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D704F2CD-F1DE-449a-AF59-F415DDEF02F3} {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4} {3661AEAC-34D5-47d2-A5E7-4F184F1C6259}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C} {625D4834-D22E-45b2-A5ED-367A967325EF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D2A82CD-3C09-4cc0-A94E-6E329AD887F8} {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F1C9DD0-BAC4-496e-AA3B-232F353D4C74} {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{09B8858C-6B59-4668-BFFB-DBCEB322C2D5} {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{09B8858C-6B59-4668-BFFB-DBCEB322C2D5}\stubpath = "C:\\Windows\\{09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe" {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{65CB81E5-BA40-4408-AB13-E12136B8273D} {13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{65CB81E5-BA40-4408-AB13-E12136B8273D}\stubpath = "C:\\Windows\\{65CB81E5-BA40-4408-AB13-E12136B8273D}.exe" {13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C77BD877-48FB-49c7-96FE-CA24EB099EFF}\stubpath = "C:\\Windows\\{C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe" {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D704F2CD-F1DE-449a-AF59-F415DDEF02F3}\stubpath = "C:\\Windows\\{D704F2CD-F1DE-449a-AF59-F415DDEF02F3}.exe" {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3661AEAC-34D5-47d2-A5E7-4F184F1C6259} {D704F2CD-F1DE-449a-AF59-F415DDEF02F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3661AEAC-34D5-47d2-A5E7-4F184F1C6259}\stubpath = "C:\\Windows\\{3661AEAC-34D5-47d2-A5E7-4F184F1C6259}.exe" {D704F2CD-F1DE-449a-AF59-F415DDEF02F3}.exe -
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 588 {625D4834-D22E-45b2-A5ED-367A967325EF}.exe 2880 {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe 2796 {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe 2248 {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe 3052 {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe 2948 {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe 540 {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe 1436 {D704F2CD-F1DE-449a-AF59-F415DDEF02F3}.exe 2064 {3661AEAC-34D5-47d2-A5E7-4F184F1C6259}.exe 556 {13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}.exe 2484 {65CB81E5-BA40-4408-AB13-E12136B8273D}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe {625D4834-D22E-45b2-A5ED-367A967325EF}.exe File created C:\Windows\{5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe File created C:\Windows\{8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe File created C:\Windows\{C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe File created C:\Windows\{D704F2CD-F1DE-449a-AF59-F415DDEF02F3}.exe {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe File created C:\Windows\{625D4834-D22E-45b2-A5ED-367A967325EF}.exe 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe File created C:\Windows\{09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe File created C:\Windows\{967DB88A-4B09-4af2-8002-B17397CA05A6}.exe {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe File created C:\Windows\{3661AEAC-34D5-47d2-A5E7-4F184F1C6259}.exe {D704F2CD-F1DE-449a-AF59-F415DDEF02F3}.exe File created C:\Windows\{13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}.exe {3661AEAC-34D5-47d2-A5E7-4F184F1C6259}.exe File created C:\Windows\{65CB81E5-BA40-4408-AB13-E12136B8273D}.exe {13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3661AEAC-34D5-47d2-A5E7-4F184F1C6259}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {625D4834-D22E-45b2-A5ED-367A967325EF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D704F2CD-F1DE-449a-AF59-F415DDEF02F3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {65CB81E5-BA40-4408-AB13-E12136B8273D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2220 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe Token: SeIncBasePriorityPrivilege 588 {625D4834-D22E-45b2-A5ED-367A967325EF}.exe Token: SeIncBasePriorityPrivilege 2880 {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe Token: SeIncBasePriorityPrivilege 2796 {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe Token: SeIncBasePriorityPrivilege 2248 {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe Token: SeIncBasePriorityPrivilege 3052 {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe Token: SeIncBasePriorityPrivilege 2948 {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe Token: SeIncBasePriorityPrivilege 540 {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe Token: SeIncBasePriorityPrivilege 1436 {D704F2CD-F1DE-449a-AF59-F415DDEF02F3}.exe Token: SeIncBasePriorityPrivilege 2064 {3661AEAC-34D5-47d2-A5E7-4F184F1C6259}.exe Token: SeIncBasePriorityPrivilege 556 {13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 588 2220 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe 30 PID 2220 wrote to memory of 588 2220 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe 30 PID 2220 wrote to memory of 588 2220 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe 30 PID 2220 wrote to memory of 588 2220 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe 30 PID 2220 wrote to memory of 2804 2220 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe 31 PID 2220 wrote to memory of 2804 2220 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe 31 PID 2220 wrote to memory of 2804 2220 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe 31 PID 2220 wrote to memory of 2804 2220 27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe 31 PID 588 wrote to memory of 2880 588 {625D4834-D22E-45b2-A5ED-367A967325EF}.exe 32 PID 588 wrote to memory of 2880 588 {625D4834-D22E-45b2-A5ED-367A967325EF}.exe 32 PID 588 wrote to memory of 2880 588 {625D4834-D22E-45b2-A5ED-367A967325EF}.exe 32 PID 588 wrote to memory of 2880 588 {625D4834-D22E-45b2-A5ED-367A967325EF}.exe 32 PID 588 wrote to memory of 2160 588 {625D4834-D22E-45b2-A5ED-367A967325EF}.exe 33 PID 588 wrote to memory of 2160 588 {625D4834-D22E-45b2-A5ED-367A967325EF}.exe 33 PID 588 wrote to memory of 2160 588 {625D4834-D22E-45b2-A5ED-367A967325EF}.exe 33 PID 588 wrote to memory of 2160 588 {625D4834-D22E-45b2-A5ED-367A967325EF}.exe 33 PID 2880 wrote to memory of 2796 2880 {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe 34 PID 2880 wrote to memory of 2796 2880 {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe 34 PID 2880 wrote to memory of 2796 2880 {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe 34 PID 2880 wrote to memory of 2796 2880 {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe 34 PID 2880 wrote to memory of 2772 2880 {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe 35 PID 2880 wrote to memory of 2772 2880 {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe 35 PID 2880 wrote to memory of 2772 2880 {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe 35 PID 2880 wrote to memory of 2772 2880 {16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe 35 PID 2796 wrote to memory of 2248 2796 {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe 36 PID 2796 wrote to memory of 2248 2796 {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe 36 PID 2796 wrote to memory of 2248 2796 {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe 36 PID 2796 wrote to memory of 2248 2796 {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe 36 PID 2796 wrote to memory of 236 2796 {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe 37 PID 2796 wrote to memory of 236 2796 {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe 37 PID 2796 wrote to memory of 236 2796 {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe 37 PID 2796 wrote to memory of 236 2796 {5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe 37 PID 2248 wrote to memory of 3052 2248 {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe 38 PID 2248 wrote to memory of 3052 2248 {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe 38 PID 2248 wrote to memory of 3052 2248 {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe 38 PID 2248 wrote to memory of 3052 2248 {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe 38 PID 2248 wrote to memory of 2136 2248 {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe 39 PID 2248 wrote to memory of 2136 2248 {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe 39 PID 2248 wrote to memory of 2136 2248 {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe 39 PID 2248 wrote to memory of 2136 2248 {8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe 39 PID 3052 wrote to memory of 2948 3052 {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe 40 PID 3052 wrote to memory of 2948 3052 {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe 40 PID 3052 wrote to memory of 2948 3052 {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe 40 PID 3052 wrote to memory of 2948 3052 {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe 40 PID 3052 wrote to memory of 1376 3052 {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe 41 PID 3052 wrote to memory of 1376 3052 {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe 41 PID 3052 wrote to memory of 1376 3052 {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe 41 PID 3052 wrote to memory of 1376 3052 {09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe 41 PID 2948 wrote to memory of 540 2948 {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe 42 PID 2948 wrote to memory of 540 2948 {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe 42 PID 2948 wrote to memory of 540 2948 {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe 42 PID 2948 wrote to memory of 540 2948 {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe 42 PID 2948 wrote to memory of 2728 2948 {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe 43 PID 2948 wrote to memory of 2728 2948 {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe 43 PID 2948 wrote to memory of 2728 2948 {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe 43 PID 2948 wrote to memory of 2728 2948 {C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe 43 PID 540 wrote to memory of 1436 540 {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe 44 PID 540 wrote to memory of 1436 540 {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe 44 PID 540 wrote to memory of 1436 540 {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe 44 PID 540 wrote to memory of 1436 540 {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe 44 PID 540 wrote to memory of 576 540 {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe 45 PID 540 wrote to memory of 576 540 {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe 45 PID 540 wrote to memory of 576 540 {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe 45 PID 540 wrote to memory of 576 540 {967DB88A-4B09-4af2-8002-B17397CA05A6}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe"C:\Users\Admin\AppData\Local\Temp\27f4eebace3c206c4e837623d3e58f2ba21b20e6e4e4bef5572ef5fc21e58a71.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\{625D4834-D22E-45b2-A5ED-367A967325EF}.exeC:\Windows\{625D4834-D22E-45b2-A5ED-367A967325EF}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\{16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exeC:\Windows\{16ECB017-2D1A-47bf-8BDF-10AD93CD6C3C}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\{5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exeC:\Windows\{5D2A82CD-3C09-4cc0-A94E-6E329AD887F8}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\{8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exeC:\Windows\{8F1C9DD0-BAC4-496e-AA3B-232F353D4C74}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\{09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exeC:\Windows\{09B8858C-6B59-4668-BFFB-DBCEB322C2D5}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\{C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exeC:\Windows\{C77BD877-48FB-49c7-96FE-CA24EB099EFF}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\{967DB88A-4B09-4af2-8002-B17397CA05A6}.exeC:\Windows\{967DB88A-4B09-4af2-8002-B17397CA05A6}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\{D704F2CD-F1DE-449a-AF59-F415DDEF02F3}.exeC:\Windows\{D704F2CD-F1DE-449a-AF59-F415DDEF02F3}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Windows\{3661AEAC-34D5-47d2-A5E7-4F184F1C6259}.exeC:\Windows\{3661AEAC-34D5-47d2-A5E7-4F184F1C6259}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\{13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}.exeC:\Windows\{13DE6EE1-BB83-43ea-BF15-EDB999AC6BC4}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:556 -
C:\Windows\{65CB81E5-BA40-4408-AB13-E12136B8273D}.exeC:\Windows\{65CB81E5-BA40-4408-AB13-E12136B8273D}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{13DE6~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3661A~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D704F~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{967DB~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C77BD~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{09B88~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F1C9~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D2A8~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16ECB~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{625D4~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\27F4EE~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5b7bfcdc72f494f7e2c131269ac89e766
SHA135503b8c5eea7e5a6b720333f29cc92ba1752886
SHA256bff6329f6a61b510f43ff8d9755b88d4dd8f2bcbf9d1de29e5c9fb0752a29c81
SHA512cef56185510d38ab8e9261748cf302f568c0e7afb825d9810f9d07accea96180487d5ffcfd29c4f3a334836d3c09e5414796136c8d8f4cd830dba91dc4a66573
-
Filesize
89KB
MD541b6b6d3626bb37c3adc5ea8a9560851
SHA198634d07c933c13a9f286ad9de2294b77d0b0477
SHA256daef4f647bdf47fe32c2495be9deece9783f045fd2647d40bba0ae5c53253ab2
SHA512f82596aa62726807e0c2eabc84e15ce1937be4f786cd0811c6207e4f26ed39e4b2787f7ca59ba64ae38cfde3bc0e07c52cc81c2184e95e023fae741a21bce74c
-
Filesize
89KB
MD5d1c6d75ec2210d130d482657d5c20474
SHA18c03d5654dfd8113ece565c0178805ed8393cd29
SHA256a3c2d9ab6e13f2a0ccc5ccfaa5ed1405835dacf4b87e28466ee40e3888797b2b
SHA5125b317f5d6a8e9e00f1ac379b3ebfd6f3d62b3562ed8894ce44e29626985b1ed7500a0d78f43c64f431316f4536f4241b8dce67c38f9f8c1bed1109266a18df8b
-
Filesize
89KB
MD53e4561a70d4e71762c69ee0a5a4ba2fb
SHA1c7175ce94d4901537b38aa529d3389fcd66356c2
SHA256dd14a619bad82bba6abb223119b60f7b8cd2d41d7e2c282b19b5d0470b971cac
SHA512c9ef9c23dc94a0b1131529e889d0c70c9905566ac643341517e5a0e0fb337dfc5f6257534e625cf112ee7f1f2709a2fc419272512833c1a8ccac8b64e323e456
-
Filesize
89KB
MD5d6a477a71f0786b4e64b565581d71d75
SHA1f897cae5841ca0f4dd2a3a85064cb4dd781477b8
SHA256f4bba18eece2baa5e2f509507e4de27c16d1a2a3c04e529443e73d60d96fdf47
SHA512a84cbbf21dbb1fc63bc62be3259f801928076b6bcd5de37cbf97d0c405aeebbb91673dc76fd71208b01d01703ce4f66c27e8bf1f7288c693639d3d641d5f7c3c
-
Filesize
89KB
MD55fcb2e76e1458f9bce21e739df7ffb2b
SHA1c2f21f5aaa28ad79c51888d40cfb627dca68cb0a
SHA2562db09616068ee455ca4eaded483203bd5eb38d46da6e57951cf5b7160c59075f
SHA5129186b10c33c525d31f80bcf1bad842fb39bc223457932f46eaec47b47745090ee5b0b2ead4674e188ad02dbfc54e399bf7ecb0b7015a55b02f767ac3ccc9a092
-
Filesize
89KB
MD5f3c67252e70dd928ec989a47d05b9a40
SHA1c17d2decab6563d5bd1c46a144c59ca3053e662a
SHA256bdcad9a3dce512839eaf9714ac5bb65813099adccec8276ca4e3b3d52a711a65
SHA512df4630222f9df59172e7e135f0acf260c154cd0d1a8b1c92e4ba54854a3af88a48ea3fb668afc4b3c41f4043c4a60c4e288e5ec1e748ab4276aa62e0a743d3b6
-
Filesize
89KB
MD590df7bc315b450d9af1347c5e84ccada
SHA1384511bcc3118a55f3a1984a15cbc71eeafad8be
SHA256267d1d907e4a9fb8595d755a0c928c1a22053bf07f444456df444f776f3e673d
SHA512183bf85c7fa0b48daf9d1b95ffcb7e081eda839b4891df7ce42de72911f08b24cae938f4189d72e5018a49b2e7c4f0f73eb205c457430c1ecee79452961b57e6
-
Filesize
89KB
MD59731ba92f309d5ac034bd5198ab89901
SHA14bb6b73a176b4dd9be099890075af58206d37167
SHA256d38b184b68613bfcf6a679d20f5e6501d652f8eac2f591d221758a6ff1bc0eca
SHA512716f5f5a8232a8324ccca81732156570b79f02402d3c40b9da1923c65c90069d0f1df37ef46db1972fdc6ef1afd437ea63ff3dd40184faedb99e42f23ec3bb20
-
Filesize
89KB
MD5a63c84b066b658f5a291545e6e344c31
SHA18044cf3adb85dc8819adadbb3942e56068c81908
SHA256a9636c3667bc8e83e07aca668ce8b51e5a1258516b67c5d94a8ac5e946b52ca6
SHA5122040dcf2c456f44ccbc6148a710c093cab1c02723f51c5faa377ba8577d23ede5e0bc65423eca78cb25f916c0eb80c9c22ea9eb181331ba3bbf93db2ea711602
-
Filesize
89KB
MD527a41df38a7b44ce81dccf3b9f0f6537
SHA1a0c3b44528a38979cd57764d95fa1b4356ffc9a0
SHA256d661b7080fa3ec6466e91cd1a3ffc8ad73d07107b22a94024a76a64eae5e6f71
SHA5128c658f64f872274cb9047792ff70f156f3b883dc15b7b29fa77ba0ef78527e4c9e54aeb7668732884b95d3d222a79de1f51d5fb896d97c66ec98b5eb0f4ecfda