Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 19:50
Static task
static1
Behavioral task
behavioral1
Sample
277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe
Resource
win10v2004-20240802-en
General
-
Target
277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe
-
Size
91KB
-
MD5
37d23a1ae86ee32d90c30701c42ded78
-
SHA1
e9437c071279a58f2e2ba2c87b423526259e2a09
-
SHA256
277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947
-
SHA512
824158cb061dc0cce73c3ebed50784ee772d9dbd0db097ac15ec3e3cdf761b3a044c4a9312870e4ac5a345fcc3743b29a262dadba65afd86d4f25fa4bcf1f475
-
SSDEEP
768:5vw9816uhKiroP4/wQNNrfrunMxVFA3b7t:lEGkmoPlCunMxVS3Ht
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{449B4844-53EA-433c-9291-6C1648B1F3BF} 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1B76698F-18C3-4cba-9991-9E7C4052C64E} {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4965637-693D-42f4-91B4-037E9AE43E6D}\stubpath = "C:\\Windows\\{F4965637-693D-42f4-91B4-037E9AE43E6D}.exe" {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}\stubpath = "C:\\Windows\\{B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe" {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDAC877A-6555-4542-8EBA-60AADC4B11EA}\stubpath = "C:\\Windows\\{EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe" {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2BBD995F-9E65-4783-A0F1-9B9578495534} {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E43884B-AB28-490b-8AC3-F037A083E5AD}\stubpath = "C:\\Windows\\{9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe" {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1B76698F-18C3-4cba-9991-9E7C4052C64E}\stubpath = "C:\\Windows\\{1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe" {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2BBD995F-9E65-4783-A0F1-9B9578495534}\stubpath = "C:\\Windows\\{2BBD995F-9E65-4783-A0F1-9B9578495534}.exe" {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1CA257C0-6893-4af6-A44C-4D17CDB274C8}\stubpath = "C:\\Windows\\{1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe" {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0} {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE3B1C6C-B890-4c09-9EF2-9C54BB1CF4AD}\stubpath = "C:\\Windows\\{BE3B1C6C-B890-4c09-9EF2-9C54BB1CF4AD}.exe" {6446A884-AF62-4828-ACAA-9D3B8CB195FB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDAC877A-6555-4542-8EBA-60AADC4B11EA} {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FAA79358-06BB-48d2-A418-52BAAC9EE54F} {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}\stubpath = "C:\\Windows\\{4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe" {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE3B1C6C-B890-4c09-9EF2-9C54BB1CF4AD} {6446A884-AF62-4828-ACAA-9D3B8CB195FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6446A884-AF62-4828-ACAA-9D3B8CB195FB}\stubpath = "C:\\Windows\\{6446A884-AF62-4828-ACAA-9D3B8CB195FB}.exe" {4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{449B4844-53EA-433c-9291-6C1648B1F3BF}\stubpath = "C:\\Windows\\{449B4844-53EA-433c-9291-6C1648B1F3BF}.exe" 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4965637-693D-42f4-91B4-037E9AE43E6D} {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B89A80F7-CDD3-41a5-A5E5-C77C825F5D34} {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FAA79358-06BB-48d2-A418-52BAAC9EE54F}\stubpath = "C:\\Windows\\{FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe" {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1CA257C0-6893-4af6-A44C-4D17CDB274C8} {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E43884B-AB28-490b-8AC3-F037A083E5AD} {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6446A884-AF62-4828-ACAA-9D3B8CB195FB} {4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe -
Executes dropped EXE 12 IoCs
pid Process 964 {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe 2996 {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe 4228 {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe 3508 {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe 2180 {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe 1804 {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe 4356 {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe 3324 {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe 1480 {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe 1036 {4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe 3640 {6446A884-AF62-4828-ACAA-9D3B8CB195FB}.exe 4088 {BE3B1C6C-B890-4c09-9EF2-9C54BB1CF4AD}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe File created C:\Windows\{9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe File created C:\Windows\{1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe File created C:\Windows\{B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe File created C:\Windows\{EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe File created C:\Windows\{FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe File created C:\Windows\{2BBD995F-9E65-4783-A0F1-9B9578495534}.exe {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe File created C:\Windows\{4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe File created C:\Windows\{6446A884-AF62-4828-ACAA-9D3B8CB195FB}.exe {4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe File created C:\Windows\{BE3B1C6C-B890-4c09-9EF2-9C54BB1CF4AD}.exe {6446A884-AF62-4828-ACAA-9D3B8CB195FB}.exe File created C:\Windows\{449B4844-53EA-433c-9291-6C1648B1F3BF}.exe 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe File created C:\Windows\{F4965637-693D-42f4-91B4-037E9AE43E6D}.exe {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BE3B1C6C-B890-4c09-9EF2-9C54BB1CF4AD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6446A884-AF62-4828-ACAA-9D3B8CB195FB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3596 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe Token: SeIncBasePriorityPrivilege 964 {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe Token: SeIncBasePriorityPrivilege 2996 {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe Token: SeIncBasePriorityPrivilege 4228 {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe Token: SeIncBasePriorityPrivilege 3508 {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe Token: SeIncBasePriorityPrivilege 2180 {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe Token: SeIncBasePriorityPrivilege 1804 {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe Token: SeIncBasePriorityPrivilege 4356 {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe Token: SeIncBasePriorityPrivilege 3324 {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe Token: SeIncBasePriorityPrivilege 1480 {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe Token: SeIncBasePriorityPrivilege 1036 {4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe Token: SeIncBasePriorityPrivilege 3640 {6446A884-AF62-4828-ACAA-9D3B8CB195FB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 964 3596 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 94 PID 3596 wrote to memory of 964 3596 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 94 PID 3596 wrote to memory of 964 3596 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 94 PID 3596 wrote to memory of 64 3596 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 95 PID 3596 wrote to memory of 64 3596 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 95 PID 3596 wrote to memory of 64 3596 277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe 95 PID 964 wrote to memory of 2996 964 {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe 96 PID 964 wrote to memory of 2996 964 {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe 96 PID 964 wrote to memory of 2996 964 {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe 96 PID 964 wrote to memory of 4832 964 {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe 97 PID 964 wrote to memory of 4832 964 {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe 97 PID 964 wrote to memory of 4832 964 {449B4844-53EA-433c-9291-6C1648B1F3BF}.exe 97 PID 2996 wrote to memory of 4228 2996 {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe 100 PID 2996 wrote to memory of 4228 2996 {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe 100 PID 2996 wrote to memory of 4228 2996 {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe 100 PID 2996 wrote to memory of 2764 2996 {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe 101 PID 2996 wrote to memory of 2764 2996 {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe 101 PID 2996 wrote to memory of 2764 2996 {1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe 101 PID 4228 wrote to memory of 3508 4228 {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe 102 PID 4228 wrote to memory of 3508 4228 {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe 102 PID 4228 wrote to memory of 3508 4228 {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe 102 PID 4228 wrote to memory of 3460 4228 {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe 103 PID 4228 wrote to memory of 3460 4228 {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe 103 PID 4228 wrote to memory of 3460 4228 {F4965637-693D-42f4-91B4-037E9AE43E6D}.exe 103 PID 3508 wrote to memory of 2180 3508 {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe 104 PID 3508 wrote to memory of 2180 3508 {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe 104 PID 3508 wrote to memory of 2180 3508 {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe 104 PID 3508 wrote to memory of 4252 3508 {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe 105 PID 3508 wrote to memory of 4252 3508 {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe 105 PID 3508 wrote to memory of 4252 3508 {B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe 105 PID 2180 wrote to memory of 1804 2180 {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe 106 PID 2180 wrote to memory of 1804 2180 {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe 106 PID 2180 wrote to memory of 1804 2180 {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe 106 PID 2180 wrote to memory of 2720 2180 {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe 107 PID 2180 wrote to memory of 2720 2180 {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe 107 PID 2180 wrote to memory of 2720 2180 {EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe 107 PID 1804 wrote to memory of 4356 1804 {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe 108 PID 1804 wrote to memory of 4356 1804 {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe 108 PID 1804 wrote to memory of 4356 1804 {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe 108 PID 1804 wrote to memory of 1676 1804 {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe 109 PID 1804 wrote to memory of 1676 1804 {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe 109 PID 1804 wrote to memory of 1676 1804 {FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe 109 PID 4356 wrote to memory of 3324 4356 {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe 110 PID 4356 wrote to memory of 3324 4356 {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe 110 PID 4356 wrote to memory of 3324 4356 {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe 110 PID 4356 wrote to memory of 2220 4356 {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe 111 PID 4356 wrote to memory of 2220 4356 {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe 111 PID 4356 wrote to memory of 2220 4356 {2BBD995F-9E65-4783-A0F1-9B9578495534}.exe 111 PID 3324 wrote to memory of 1480 3324 {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe 112 PID 3324 wrote to memory of 1480 3324 {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe 112 PID 3324 wrote to memory of 1480 3324 {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe 112 PID 3324 wrote to memory of 5004 3324 {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe 113 PID 3324 wrote to memory of 5004 3324 {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe 113 PID 3324 wrote to memory of 5004 3324 {1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe 113 PID 1480 wrote to memory of 1036 1480 {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe 114 PID 1480 wrote to memory of 1036 1480 {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe 114 PID 1480 wrote to memory of 1036 1480 {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe 114 PID 1480 wrote to memory of 3332 1480 {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe 115 PID 1480 wrote to memory of 3332 1480 {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe 115 PID 1480 wrote to memory of 3332 1480 {9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe 115 PID 1036 wrote to memory of 3640 1036 {4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe 116 PID 1036 wrote to memory of 3640 1036 {4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe 116 PID 1036 wrote to memory of 3640 1036 {4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe 116 PID 1036 wrote to memory of 4492 1036 {4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe"C:\Users\Admin\AppData\Local\Temp\277e7f6c8a8b5604dcbb5466978b2a2f01b668653af39e89bbfd0d3c8b6b5947.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\{449B4844-53EA-433c-9291-6C1648B1F3BF}.exeC:\Windows\{449B4844-53EA-433c-9291-6C1648B1F3BF}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\{1B76698F-18C3-4cba-9991-9E7C4052C64E}.exeC:\Windows\{1B76698F-18C3-4cba-9991-9E7C4052C64E}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\{F4965637-693D-42f4-91B4-037E9AE43E6D}.exeC:\Windows\{F4965637-693D-42f4-91B4-037E9AE43E6D}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\{B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exeC:\Windows\{B89A80F7-CDD3-41a5-A5E5-C77C825F5D34}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\{EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exeC:\Windows\{EDAC877A-6555-4542-8EBA-60AADC4B11EA}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\{FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exeC:\Windows\{FAA79358-06BB-48d2-A418-52BAAC9EE54F}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\{2BBD995F-9E65-4783-A0F1-9B9578495534}.exeC:\Windows\{2BBD995F-9E65-4783-A0F1-9B9578495534}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\{1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exeC:\Windows\{1CA257C0-6893-4af6-A44C-4D17CDB274C8}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\{9E43884B-AB28-490b-8AC3-F037A083E5AD}.exeC:\Windows\{9E43884B-AB28-490b-8AC3-F037A083E5AD}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\{4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exeC:\Windows\{4A8DD3D9-1982-4b9b-9E8A-80D62FB5B7D0}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\{6446A884-AF62-4828-ACAA-9D3B8CB195FB}.exeC:\Windows\{6446A884-AF62-4828-ACAA-9D3B8CB195FB}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3640 -
C:\Windows\{BE3B1C6C-B890-4c09-9EF2-9C54BB1CF4AD}.exeC:\Windows\{BE3B1C6C-B890-4c09-9EF2-9C54BB1CF4AD}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6446A~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4A8DD~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E438~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1CA25~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2BBD9~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FAA79~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EDAC8~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B89A8~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4965~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1B766~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{449B4~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\277E7F~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:64
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5e04e6208d809a76af76c25ca56b55742
SHA119fa405a36826b1a29e64bbe7d478d14cd249136
SHA256ab6389ca7f676ab7df76f1916ed6730cc3869ba7b415060cdd9f90222d527aba
SHA512086440e5134ad4c40cb643cc4c5793019d7e6e1bdf7e06f324f3b6c02f5537e58f86455867d97ad8b9a09f6fbe9009996f939d26bc03ac41e3f0a65f935084ad
-
Filesize
91KB
MD578cc67cb100ce670f9eaed2314a47fd3
SHA1ff1bfff377f3b1d36943cc13918f611840671fad
SHA256991eded83e0c5ccd987a327640863ee8c30903c8e8a298d75791e6ebb43f6346
SHA512fea5e7f523cbc86ca3de086d1cf410ef8b5a5506b10eebcb102878f3d25e42968a9c92e747d937f90525c653e3d8c46367e1cdf9cb0344edc698b9212e49640e
-
Filesize
91KB
MD5ea4d659d60d04c9b82d694def6c6f301
SHA17208db19361494826b441de617a75e930439cdf8
SHA256b34e30d673d314eac976ddca50cd44e570dd519c7c6d693fb97cc8cce718f1bc
SHA5127035da1c439ce85c96a3ecc7a7ff62828f09346c033801d372a0a1efa11fb0340589cdcf157386c5fc0afffdc4a711aae8b5e8bbfcbac59ea6d068c6fba1adf5
-
Filesize
91KB
MD5798924a99279c4cdd858d22f93fe6b43
SHA1fb3a04a1095c227f82f7dd3fe2e3fdc65745f211
SHA2562847c23d85a84a2898ee4dbb34d23f59a3020deaf742bed7eefca308a8a255f1
SHA51298f0e9e4d4566ae224dfa9a80a186bcbc6db9b35ce6cb11f7f5d740c09e160b3c3dce21c4611ad0df40728842a486b5ccc2cf70091156b6f6933008fcfe5221f
-
Filesize
91KB
MD5c38bd287f75bd526ee6951d5ec1ea9da
SHA17140fd6be57dbfde5e2cf68e0ab959ea0d146a01
SHA256a595db51c5588b3af2603a33efbe296ce708e8b68cd104f941f738b44683f101
SHA5120ede3ac3e6321829220641a43dc430faf74ed415c0293aa164ada2aafd09ff88ecec126bb5c19824aa0a728e4940ac3e58704558e153d402cda967d81f756917
-
Filesize
91KB
MD535608d1137a3e02061729a22f54fec26
SHA115cac3fb75bd8a1e5441c4036002906f02200914
SHA256a2faea1b7c277fe12c9c34d165ab7178b3fc84ab6660d2411720ea60015e62c0
SHA5129f7d1bea118a525c88f2f42ef6ec43b4dfd9b727082d673bae3ae2942ee642cff43842a5e932b29ff0f92ee7388afac3a2f2ce040a1f21bbd406eb7f0baca41c
-
Filesize
91KB
MD5192987291c7f8b43aaf76771f5079446
SHA1dbf7f2cdf7534d2948460da3a353224abbfd9436
SHA2561afb539791ec815bdaa8438663bcab5e1b4b48126e9689e2dea9d87c2f09356a
SHA51209ec659079d89f3df4e452c8e7245636c88a3cce9fa41c6d241641e63b00221234fb25ad16e4c51345a0bdf70e9b54e338777227b0180f38919aeb5832fa4f43
-
Filesize
91KB
MD57536b7d816ff6bbdeba7a7297416c986
SHA12a7ee462f0e58bd1ea510684f0627448061d333f
SHA256f3a5d9abd317a433da3aec5770a5c14ce4c02910c4d0e0ed82fc129c9726ce1f
SHA512c00b08819369902f91c056fb8f48172b9e63a352acd3fc2ec8dfd5b3d78df442f255bcdb51dc4df1b395993a0890ebe1d221018a75e35cbaf258ea81a77b5136
-
Filesize
91KB
MD5520c18e396b4af61e92df3c244a9bc49
SHA1f1f6f59cd0c7d5638d2cde98e0109de60f18411c
SHA256347380efba4027daf423c1978547744ed7f4b01aa866773bc76e5926777c968a
SHA512db131a8b6eb59158c0da3307a0fef4c080cdc87c79175b05600e95100c42587b0fed37142ceb9e20bf15518d3b0cd3cf2bd21dd28bb572243d2f07bf7000ed86
-
Filesize
91KB
MD5ec1aba136ab96ba6868cb0b8a75e147a
SHA1c672b5f8d42e0840399709aaac0ecc91966f2e07
SHA2568e44ddbc5e09344cadfcb4ac45bdb39d9deef8f95f64c131a8520003c0511984
SHA51258999503d6cb1e1807082ebf39610128d11c6101ab3813e8879741c3e32ce638af6a7858e838986ae4e0d22349a8893220a85996c75185d77e49d17f7fe71e54
-
Filesize
91KB
MD5763722d27aea9fea2afe08a1fd3033cb
SHA139efdf7828d581e4376515834b14c5469676150e
SHA256292bfb9baee07d52e1c2ba4327d38b9fec715eafce909d2b368e9a9283ee5463
SHA5128fb4482cb8e3ea24929814a00c215aae4ba587d1bec5ea07f7fb035602faa88e8474919d17771a4396c84e35b3769cd6b0d03faff17ce3d050fbb5b6c5803beb
-
Filesize
91KB
MD5e42ba7a0bc53524827596b3accb18b6f
SHA1a830bedbd989ab0c64c279fdf7a7748a61b28c50
SHA256c88874bccb56e178b39fb635681562d2bf89f2d75e72ca9f060d9acbcb039b93
SHA5121777575ec72dd941a0c5bac98659b153080c596e25721409952d5c765315292968f00126f1da060f06df8581937e54d6ebc8747f0259c44fe5bafec789961d05