Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 19:50
Static task
static1
Behavioral task
behavioral1
Sample
277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe
Resource
win10v2004-20240802-en
General
-
Target
277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe
-
Size
91KB
-
MD5
37d23a1ae86ee32d90c30701c42ded78
-
SHA1
e9437c071279a58f2e2ba2c87b423526259e2a09
-
SHA256
277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947
-
SHA512
824158cb061dc0cce73c3ebed50784ee772d9dbd0db097ac15ec3e3cdf761b3a044c4a9312870e4ac5a345fcc3743b29a262dadba65afd86d4f25fa4bcf1f475
-
SSDEEP
768:5vw9816uhKiroP4/wQNNrfrunMxVFA3b7t:lEGkmoPlCunMxVS3Ht
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C5576A4-6BA4-4c4b-9407-2614D3F17A22}\stubpath = "C:\\Windows\\{5C5576A4-6BA4-4c4b-9407-2614D3F17A22}.exe" {3C13388A-549A-4442-BF8D-9358B206BF7D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C1982D0E-343E-48fb-9E45-4FAB6F4D75F3} {00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A9F717F-318D-4592-B57F-BB413591E8BF}\stubpath = "C:\\Windows\\{3A9F717F-318D-4592-B57F-BB413591E8BF}.exe" {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{69286F13-61D4-4406-B025-B3C81642BE9B}\stubpath = "C:\\Windows\\{69286F13-61D4-4406-B025-B3C81642BE9B}.exe" {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33FC6791-A218-4f61-A472-07BE7C40BE66}\stubpath = "C:\\Windows\\{33FC6791-A218-4f61-A472-07BE7C40BE66}.exe" {69286F13-61D4-4406-B025-B3C81642BE9B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5DBABEF0-1C12-4302-A1F4-32918BDC3D46}\stubpath = "C:\\Windows\\{5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe" {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C13388A-549A-4442-BF8D-9358B206BF7D}\stubpath = "C:\\Windows\\{3C13388A-549A-4442-BF8D-9358B206BF7D}.exe" {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D} {5C5576A4-6BA4-4c4b-9407-2614D3F17A22}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9669237F-BF12-4d9f-9A67-928DF4181F16} 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9669237F-BF12-4d9f-9A67-928DF4181F16}\stubpath = "C:\\Windows\\{9669237F-BF12-4d9f-9A67-928DF4181F16}.exe" 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{69286F13-61D4-4406-B025-B3C81642BE9B} {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FB67E2C-8FE0-40ec-A305-A771144BC745} {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C5576A4-6BA4-4c4b-9407-2614D3F17A22} {3C13388A-549A-4442-BF8D-9358B206BF7D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}\stubpath = "C:\\Windows\\{00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}.exe" {5C5576A4-6BA4-4c4b-9407-2614D3F17A22}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C1982D0E-343E-48fb-9E45-4FAB6F4D75F3}\stubpath = "C:\\Windows\\{C1982D0E-343E-48fb-9E45-4FAB6F4D75F3}.exe" {00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54907826-A9A0-4c1d-AA84-4C57EA863D08} {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5DBABEF0-1C12-4302-A1F4-32918BDC3D46} {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FB67E2C-8FE0-40ec-A305-A771144BC745}\stubpath = "C:\\Windows\\{9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe" {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C13388A-549A-4442-BF8D-9358B206BF7D} {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A9F717F-318D-4592-B57F-BB413591E8BF} {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33FC6791-A218-4f61-A472-07BE7C40BE66} {69286F13-61D4-4406-B025-B3C81642BE9B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54907826-A9A0-4c1d-AA84-4C57EA863D08}\stubpath = "C:\\Windows\\{54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe" {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe -
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2480 {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe 2844 {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe 2908 {69286F13-61D4-4406-B025-B3C81642BE9B}.exe 2688 {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe 1492 {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe 328 {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe 108 {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe 2508 {3C13388A-549A-4442-BF8D-9358B206BF7D}.exe 1564 {5C5576A4-6BA4-4c4b-9407-2614D3F17A22}.exe 1592 {00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}.exe 1704 {C1982D0E-343E-48fb-9E45-4FAB6F4D75F3}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{3C13388A-549A-4442-BF8D-9358B206BF7D}.exe {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe File created C:\Windows\{33FC6791-A218-4f61-A472-07BE7C40BE66}.exe {69286F13-61D4-4406-B025-B3C81642BE9B}.exe File created C:\Windows\{9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe File created C:\Windows\{69286F13-61D4-4406-B025-B3C81642BE9B}.exe {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe File created C:\Windows\{54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe File created C:\Windows\{5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe File created C:\Windows\{5C5576A4-6BA4-4c4b-9407-2614D3F17A22}.exe {3C13388A-549A-4442-BF8D-9358B206BF7D}.exe File created C:\Windows\{00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}.exe {5C5576A4-6BA4-4c4b-9407-2614D3F17A22}.exe File created C:\Windows\{C1982D0E-343E-48fb-9E45-4FAB6F4D75F3}.exe {00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}.exe File created C:\Windows\{9669237F-BF12-4d9f-9A67-928DF4181F16}.exe 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe File created C:\Windows\{3A9F717F-318D-4592-B57F-BB413591E8BF}.exe {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3C13388A-549A-4442-BF8D-9358B206BF7D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5C5576A4-6BA4-4c4b-9407-2614D3F17A22}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C1982D0E-343E-48fb-9E45-4FAB6F4D75F3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {69286F13-61D4-4406-B025-B3C81642BE9B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2148 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe Token: SeIncBasePriorityPrivilege 2480 {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe Token: SeIncBasePriorityPrivilege 2844 {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe Token: SeIncBasePriorityPrivilege 2908 {69286F13-61D4-4406-B025-B3C81642BE9B}.exe Token: SeIncBasePriorityPrivilege 2688 {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe Token: SeIncBasePriorityPrivilege 1492 {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe Token: SeIncBasePriorityPrivilege 328 {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe Token: SeIncBasePriorityPrivilege 108 {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe Token: SeIncBasePriorityPrivilege 2508 {3C13388A-549A-4442-BF8D-9358B206BF7D}.exe Token: SeIncBasePriorityPrivilege 1564 {5C5576A4-6BA4-4c4b-9407-2614D3F17A22}.exe Token: SeIncBasePriorityPrivilege 1592 {00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2480 2148 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 31 PID 2148 wrote to memory of 2480 2148 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 31 PID 2148 wrote to memory of 2480 2148 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 31 PID 2148 wrote to memory of 2480 2148 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 31 PID 2148 wrote to memory of 2804 2148 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 32 PID 2148 wrote to memory of 2804 2148 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 32 PID 2148 wrote to memory of 2804 2148 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 32 PID 2148 wrote to memory of 2804 2148 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 32 PID 2480 wrote to memory of 2844 2480 {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe 33 PID 2480 wrote to memory of 2844 2480 {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe 33 PID 2480 wrote to memory of 2844 2480 {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe 33 PID 2480 wrote to memory of 2844 2480 {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe 33 PID 2480 wrote to memory of 3036 2480 {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe 34 PID 2480 wrote to memory of 3036 2480 {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe 34 PID 2480 wrote to memory of 3036 2480 {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe 34 PID 2480 wrote to memory of 3036 2480 {9669237F-BF12-4d9f-9A67-928DF4181F16}.exe 34 PID 2844 wrote to memory of 2908 2844 {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe 35 PID 2844 wrote to memory of 2908 2844 {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe 35 PID 2844 wrote to memory of 2908 2844 {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe 35 PID 2844 wrote to memory of 2908 2844 {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe 35 PID 2844 wrote to memory of 2764 2844 {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe 36 PID 2844 wrote to memory of 2764 2844 {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe 36 PID 2844 wrote to memory of 2764 2844 {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe 36 PID 2844 wrote to memory of 2764 2844 {3A9F717F-318D-4592-B57F-BB413591E8BF}.exe 36 PID 2908 wrote to memory of 2688 2908 {69286F13-61D4-4406-B025-B3C81642BE9B}.exe 37 PID 2908 wrote to memory of 2688 2908 {69286F13-61D4-4406-B025-B3C81642BE9B}.exe 37 PID 2908 wrote to memory of 2688 2908 {69286F13-61D4-4406-B025-B3C81642BE9B}.exe 37 PID 2908 wrote to memory of 2688 2908 {69286F13-61D4-4406-B025-B3C81642BE9B}.exe 37 PID 2908 wrote to memory of 2668 2908 {69286F13-61D4-4406-B025-B3C81642BE9B}.exe 38 PID 2908 wrote to memory of 2668 2908 {69286F13-61D4-4406-B025-B3C81642BE9B}.exe 38 PID 2908 wrote to memory of 2668 2908 {69286F13-61D4-4406-B025-B3C81642BE9B}.exe 38 PID 2908 wrote to memory of 2668 2908 {69286F13-61D4-4406-B025-B3C81642BE9B}.exe 38 PID 2688 wrote to memory of 1492 2688 {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe 39 PID 2688 wrote to memory of 1492 2688 {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe 39 PID 2688 wrote to memory of 1492 2688 {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe 39 PID 2688 wrote to memory of 1492 2688 {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe 39 PID 2688 wrote to memory of 2972 2688 {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe 40 PID 2688 wrote to memory of 2972 2688 {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe 40 PID 2688 wrote to memory of 2972 2688 {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe 40 PID 2688 wrote to memory of 2972 2688 {33FC6791-A218-4f61-A472-07BE7C40BE66}.exe 40 PID 1492 wrote to memory of 328 1492 {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe 41 PID 1492 wrote to memory of 328 1492 {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe 41 PID 1492 wrote to memory of 328 1492 {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe 41 PID 1492 wrote to memory of 328 1492 {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe 41 PID 1492 wrote to memory of 1880 1492 {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe 42 PID 1492 wrote to memory of 1880 1492 {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe 42 PID 1492 wrote to memory of 1880 1492 {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe 42 PID 1492 wrote to memory of 1880 1492 {54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe 42 PID 328 wrote to memory of 108 328 {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe 43 PID 328 wrote to memory of 108 328 {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe 43 PID 328 wrote to memory of 108 328 {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe 43 PID 328 wrote to memory of 108 328 {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe 43 PID 328 wrote to memory of 1968 328 {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe 44 PID 328 wrote to memory of 1968 328 {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe 44 PID 328 wrote to memory of 1968 328 {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe 44 PID 328 wrote to memory of 1968 328 {5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe 44 PID 108 wrote to memory of 2508 108 {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe 45 PID 108 wrote to memory of 2508 108 {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe 45 PID 108 wrote to memory of 2508 108 {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe 45 PID 108 wrote to memory of 2508 108 {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe 45 PID 108 wrote to memory of 1708 108 {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe 46 PID 108 wrote to memory of 1708 108 {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe 46 PID 108 wrote to memory of 1708 108 {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe 46 PID 108 wrote to memory of 1708 108 {9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe"C:\Users\Admin\AppData\Local\Temp\277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\{9669237F-BF12-4d9f-9A67-928DF4181F16}.exeC:\Windows\{9669237F-BF12-4d9f-9A67-928DF4181F16}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\{3A9F717F-318D-4592-B57F-BB413591E8BF}.exeC:\Windows\{3A9F717F-318D-4592-B57F-BB413591E8BF}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\{69286F13-61D4-4406-B025-B3C81642BE9B}.exeC:\Windows\{69286F13-61D4-4406-B025-B3C81642BE9B}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\{33FC6791-A218-4f61-A472-07BE7C40BE66}.exeC:\Windows\{33FC6791-A218-4f61-A472-07BE7C40BE66}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\{54907826-A9A0-4c1d-AA84-4C57EA863D08}.exeC:\Windows\{54907826-A9A0-4c1d-AA84-4C57EA863D08}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\{5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exeC:\Windows\{5DBABEF0-1C12-4302-A1F4-32918BDC3D46}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\{9FB67E2C-8FE0-40ec-A305-A771144BC745}.exeC:\Windows\{9FB67E2C-8FE0-40ec-A305-A771144BC745}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\{3C13388A-549A-4442-BF8D-9358B206BF7D}.exeC:\Windows\{3C13388A-549A-4442-BF8D-9358B206BF7D}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2508 -
C:\Windows\{5C5576A4-6BA4-4c4b-9407-2614D3F17A22}.exeC:\Windows\{5C5576A4-6BA4-4c4b-9407-2614D3F17A22}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\{00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}.exeC:\Windows\{00B0FE9D-8AF2-4abe-9FA9-6D618C0C8F6D}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\{C1982D0E-343E-48fb-9E45-4FAB6F4D75F3}.exeC:\Windows\{C1982D0E-343E-48fb-9E45-4FAB6F4D75F3}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{00B0F~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C557~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C133~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9FB67~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5DBAB~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{54907~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{33FC6~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69286~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3A9F7~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{96692~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\277E7F~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD53c439735cf6ea9fa8be26596213f118c
SHA15ec64f6f0272df19e072b39784138930ed2264d6
SHA2567dcc85d60fe4861d5ec3ba8610046fc61cf42129a05283286f4a3b8ed917c996
SHA512694c9333abffaa58e940428149d240ed2a8fa0e2559330a4e2a542d43dffba14fc6add3a6cd57c5845ea14977da72e8dcd3a536100dc674d49e92582d174d6db
-
Filesize
91KB
MD5f2b0b0d4dbacea0211e46a49779a7d50
SHA10cf1e174886d24c61d655016e7450fb9fabd755a
SHA256bdf1f426eb9445a75623aaaf2e913413d9e9e0b1e724937834415cd196689767
SHA512d6f67bc33ee0d42081af50d96599a08dd117b842218d1db6507170ed3e0ccb2128393f641249442f14b4bb303abec96d610bf6c1f259bdde9f5b2bddb185eeb1
-
Filesize
91KB
MD55d6abe4bd43dd28a54b2123a830deab3
SHA140a4c1a98470b37b9b5c15b067f54ef5f3d614ea
SHA256d4d4beef8529ff9f6e4937804603690c28a5af62e2ce4cbfe97508907ce0cda8
SHA512c9eeb286d6249b5d660d20f01399fa5cc979557a2a134fd664f461839b5ff5b6a0c34488bc13214d039ca3cb0f5d46567dc2a8dfae9eea0253abc8c337020f96
-
Filesize
91KB
MD557984a5e23312a666425410dfe082272
SHA17df10afb9beecee6d3db8a2bfdd334d18ee20429
SHA2569aebdd7eb2e46b066a954a29fc712320360167909a36134e28ca7a38643bea5f
SHA5125bb5627e955eabd33bfb04908d206e9279a44c87045bd75c1c35d17b85fe051adc4ebb1c801c143c4a2e7e8c2cf54e776ef83e986b12779de752d1fd244103e8
-
Filesize
91KB
MD52a83319dba7b41c589c5d5e407f9fcd9
SHA1134f8585b1c46bfbd5858237f99d8af3f8431c71
SHA25698fb6e6af39e7be6f50876a0c28a041624937578c4eb8983ed0c93d79c8d435b
SHA51285e53552054cd4ac02431177feee1a098fc904f5e49be4c0ec5eb3de63b29e59b14e8e51a9aaa317b3f27c5956eca46dcceb0b5590343df5ad63dbacb392543c
-
Filesize
91KB
MD5ba515e1ad20b063cdcb10a135a69819d
SHA17d60899284565a6ae20ccb8ee1529718180b1994
SHA256711b5fbf57d749c6fe112f1379923450977c57d10163fdc35a9888905ad607b1
SHA5129ee4cbbe02c00162f02a8bdbb9ec3c5f3cec6e1f412a1d23e413c6444d83a68987c940c8ac30368f6cce41a5fb34ac632b543108f3b576cd66c6c4e4ecec6795
-
Filesize
91KB
MD5362a09bc281814b323f8f7e92901067e
SHA15fc796a3202385b9eea5ff3ef9e8cbb07f8accd4
SHA256746d9a5cf03ec49271f2ba4bf46e476a8934ff34f53b0ed2485e4d2f328920a6
SHA5120a8d677032e48adec361bd32bb695186c9ac117517f82b9b1a64b675334b05678a4988e909ceb81e454bea0e8d9104315159235699afcdff5c1ad02eb511200d
-
Filesize
91KB
MD5d9e002272a7a651b7a8b18fd6d66b2cc
SHA1a5fccb0e7c353ab2dd7ef293ae2f33f79ca63b1a
SHA25617a67a7e1f5706f12997212be9e75e52e0a0359d59f65213588a61959f063bd9
SHA512cdf114644078dcdc8c533308901b9ba097d8ea3778567e9e8e6bbee14d568f2d076ce5c2126ad797602b5cbe351278b6c66157323e0daf26b28f69195413d93f
-
Filesize
91KB
MD51a25fcee56042adc9a2430d3899d6be0
SHA1ac040b073dd0ba9395e06f0b18dfcc8ed72d8156
SHA256f5b840ca7a26656efa4c3bc3b70af5d8d12955dd48f6085e3181b81ecfb16e62
SHA5123f5bdd701f1a82a4339a005e158446c1c86ec9aec725e123484de05e0684dd7c60dbb402d43f7a01dbe45359301f219afb8080494ced772927ea3e2cea4f7453
-
Filesize
91KB
MD55b5673edfd0c93da40be1806f0160070
SHA19551f3e2814f673b0064981360af2e6364a219a6
SHA256247b527d03de51e63bd9ed1e2a83348a7cca2f20c4bf7121db6eb03fee030607
SHA512c17416422b4ec5420bf4016f31134842d0f672099acff1d5043e35e1cb49b8b2fe0edb41891ab0b5a83b3052be01bd2e44ba15d53dae7136b114b709c7c371be
-
Filesize
91KB
MD5968f359fb288620e15d6fb252f5a59f8
SHA1049f2c2171cd2d9d06f3a3e5818e29058f079230
SHA2568b7d9b40dbad3c2022111803c10237d9a3c0744bf2bb502f1c906d9611a4629f
SHA512aa06e57d5cf54d1181daaa990ed1c271dd8b748f136c1c66bb2859cf09a683f780e1fffce346e2ee4b69ffbd6e44701d378fedfdfd2ef111cc855077ac4a9e75