Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe
Resource
win10v2004-20240802-en
General
-
Target
eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe
-
Size
88KB
-
MD5
10d976d8213afa0fc844f5f415bf2e38
-
SHA1
424a63ff49b73134c11f1ae2c9017bc9b251d2f8
-
SHA256
eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f
-
SHA512
d81cf205608da8d7dc50fd6d82fb1f11b8be70f61deada3d38c980f77f513042d316e7e8c9c45f81cfe4ee4418729cb34643eff85fcec65ce83ec4ce9ee67919
-
SSDEEP
768:5vw9816thKQLro2Z4/wQkNrfrunMxVFA3V:lEG/0o2ZlbunMxVS3V
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}\stubpath = "C:\\Windows\\{3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe" {C8120FDB-E641-40af-8EB5-577290D610D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E458751B-ABB9-4f2a-B784-B14AED2322CE} eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{029673D2-E53D-4e74-BAA4-610800F5D250} {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{029673D2-E53D-4e74-BAA4-610800F5D250}\stubpath = "C:\\Windows\\{029673D2-E53D-4e74-BAA4-610800F5D250}.exe" {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{52BE7B21-033D-448e-9C82-EC23D5B01E06}\stubpath = "C:\\Windows\\{52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe" {029673D2-E53D-4e74-BAA4-610800F5D250}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{112D7C4D-C371-44bf-8904-BB483BE53057} {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C8120FDB-E641-40af-8EB5-577290D610D2} {112D7C4D-C371-44bf-8904-BB483BE53057}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C8120FDB-E641-40af-8EB5-577290D610D2}\stubpath = "C:\\Windows\\{C8120FDB-E641-40af-8EB5-577290D610D2}.exe" {112D7C4D-C371-44bf-8904-BB483BE53057}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BBE57460-4E51-4a90-8F8F-84FF6D3D73B1} {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F56E843D-C424-4bf8-A4E8-CA36DAFC7F3A}\stubpath = "C:\\Windows\\{F56E843D-C424-4bf8-A4E8-CA36DAFC7F3A}.exe" {B0AE2390-9EEA-407f-8F3A-36AE07C7341B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E458751B-ABB9-4f2a-B784-B14AED2322CE}\stubpath = "C:\\Windows\\{E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe" eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32E8C178-FA18-48da-98C1-E74EF6B8F9A0}\stubpath = "C:\\Windows\\{32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe" {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}\stubpath = "C:\\Windows\\{BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}.exe" {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3FBC5327-A369-4d7a-BFCA-A87D577D0CA2} {C8120FDB-E641-40af-8EB5-577290D610D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F56E843D-C424-4bf8-A4E8-CA36DAFC7F3A} {B0AE2390-9EEA-407f-8F3A-36AE07C7341B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{52BE7B21-033D-448e-9C82-EC23D5B01E06} {029673D2-E53D-4e74-BAA4-610800F5D250}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32E8C178-FA18-48da-98C1-E74EF6B8F9A0} {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{112D7C4D-C371-44bf-8904-BB483BE53057}\stubpath = "C:\\Windows\\{112D7C4D-C371-44bf-8904-BB483BE53057}.exe" {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6568BBE-7F78-4175-80D9-EFFB3AB32B19} {BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6568BBE-7F78-4175-80D9-EFFB3AB32B19}\stubpath = "C:\\Windows\\{A6568BBE-7F78-4175-80D9-EFFB3AB32B19}.exe" {BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B0AE2390-9EEA-407f-8F3A-36AE07C7341B} {A6568BBE-7F78-4175-80D9-EFFB3AB32B19}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B0AE2390-9EEA-407f-8F3A-36AE07C7341B}\stubpath = "C:\\Windows\\{B0AE2390-9EEA-407f-8F3A-36AE07C7341B}.exe" {A6568BBE-7F78-4175-80D9-EFFB3AB32B19}.exe -
Deletes itself 1 IoCs
pid Process 2848 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2324 {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe 2760 {029673D2-E53D-4e74-BAA4-610800F5D250}.exe 2876 {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe 2192 {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe 1040 {112D7C4D-C371-44bf-8904-BB483BE53057}.exe 352 {C8120FDB-E641-40af-8EB5-577290D610D2}.exe 1440 {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe 2700 {BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}.exe 1016 {A6568BBE-7F78-4175-80D9-EFFB3AB32B19}.exe 972 {B0AE2390-9EEA-407f-8F3A-36AE07C7341B}.exe 1928 {F56E843D-C424-4bf8-A4E8-CA36DAFC7F3A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe {029673D2-E53D-4e74-BAA4-610800F5D250}.exe File created C:\Windows\{C8120FDB-E641-40af-8EB5-577290D610D2}.exe {112D7C4D-C371-44bf-8904-BB483BE53057}.exe File created C:\Windows\{3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe {C8120FDB-E641-40af-8EB5-577290D610D2}.exe File created C:\Windows\{A6568BBE-7F78-4175-80D9-EFFB3AB32B19}.exe {BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}.exe File created C:\Windows\{B0AE2390-9EEA-407f-8F3A-36AE07C7341B}.exe {A6568BBE-7F78-4175-80D9-EFFB3AB32B19}.exe File created C:\Windows\{F56E843D-C424-4bf8-A4E8-CA36DAFC7F3A}.exe {B0AE2390-9EEA-407f-8F3A-36AE07C7341B}.exe File created C:\Windows\{E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe File created C:\Windows\{029673D2-E53D-4e74-BAA4-610800F5D250}.exe {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe File created C:\Windows\{BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}.exe {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe File created C:\Windows\{32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe File created C:\Windows\{112D7C4D-C371-44bf-8904-BB483BE53057}.exe {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {029673D2-E53D-4e74-BAA4-610800F5D250}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C8120FDB-E641-40af-8EB5-577290D610D2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A6568BBE-7F78-4175-80D9-EFFB3AB32B19}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B0AE2390-9EEA-407f-8F3A-36AE07C7341B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {112D7C4D-C371-44bf-8904-BB483BE53057}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F56E843D-C424-4bf8-A4E8-CA36DAFC7F3A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2384 eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe Token: SeIncBasePriorityPrivilege 2324 {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe Token: SeIncBasePriorityPrivilege 2760 {029673D2-E53D-4e74-BAA4-610800F5D250}.exe Token: SeIncBasePriorityPrivilege 2876 {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe Token: SeIncBasePriorityPrivilege 2192 {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe Token: SeIncBasePriorityPrivilege 1040 {112D7C4D-C371-44bf-8904-BB483BE53057}.exe Token: SeIncBasePriorityPrivilege 352 {C8120FDB-E641-40af-8EB5-577290D610D2}.exe Token: SeIncBasePriorityPrivilege 1440 {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe Token: SeIncBasePriorityPrivilege 2700 {BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}.exe Token: SeIncBasePriorityPrivilege 1016 {A6568BBE-7F78-4175-80D9-EFFB3AB32B19}.exe Token: SeIncBasePriorityPrivilege 972 {B0AE2390-9EEA-407f-8F3A-36AE07C7341B}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2324 2384 eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe 31 PID 2384 wrote to memory of 2324 2384 eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe 31 PID 2384 wrote to memory of 2324 2384 eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe 31 PID 2384 wrote to memory of 2324 2384 eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe 31 PID 2384 wrote to memory of 2848 2384 eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe 32 PID 2384 wrote to memory of 2848 2384 eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe 32 PID 2384 wrote to memory of 2848 2384 eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe 32 PID 2384 wrote to memory of 2848 2384 eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe 32 PID 2324 wrote to memory of 2760 2324 {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe 33 PID 2324 wrote to memory of 2760 2324 {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe 33 PID 2324 wrote to memory of 2760 2324 {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe 33 PID 2324 wrote to memory of 2760 2324 {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe 33 PID 2324 wrote to memory of 880 2324 {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe 34 PID 2324 wrote to memory of 880 2324 {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe 34 PID 2324 wrote to memory of 880 2324 {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe 34 PID 2324 wrote to memory of 880 2324 {E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe 34 PID 2760 wrote to memory of 2876 2760 {029673D2-E53D-4e74-BAA4-610800F5D250}.exe 35 PID 2760 wrote to memory of 2876 2760 {029673D2-E53D-4e74-BAA4-610800F5D250}.exe 35 PID 2760 wrote to memory of 2876 2760 {029673D2-E53D-4e74-BAA4-610800F5D250}.exe 35 PID 2760 wrote to memory of 2876 2760 {029673D2-E53D-4e74-BAA4-610800F5D250}.exe 35 PID 2760 wrote to memory of 2652 2760 {029673D2-E53D-4e74-BAA4-610800F5D250}.exe 36 PID 2760 wrote to memory of 2652 2760 {029673D2-E53D-4e74-BAA4-610800F5D250}.exe 36 PID 2760 wrote to memory of 2652 2760 {029673D2-E53D-4e74-BAA4-610800F5D250}.exe 36 PID 2760 wrote to memory of 2652 2760 {029673D2-E53D-4e74-BAA4-610800F5D250}.exe 36 PID 2876 wrote to memory of 2192 2876 {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe 37 PID 2876 wrote to memory of 2192 2876 {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe 37 PID 2876 wrote to memory of 2192 2876 {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe 37 PID 2876 wrote to memory of 2192 2876 {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe 37 PID 2876 wrote to memory of 2464 2876 {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe 38 PID 2876 wrote to memory of 2464 2876 {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe 38 PID 2876 wrote to memory of 2464 2876 {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe 38 PID 2876 wrote to memory of 2464 2876 {52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe 38 PID 2192 wrote to memory of 1040 2192 {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe 39 PID 2192 wrote to memory of 1040 2192 {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe 39 PID 2192 wrote to memory of 1040 2192 {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe 39 PID 2192 wrote to memory of 1040 2192 {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe 39 PID 2192 wrote to memory of 2592 2192 {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe 40 PID 2192 wrote to memory of 2592 2192 {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe 40 PID 2192 wrote to memory of 2592 2192 {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe 40 PID 2192 wrote to memory of 2592 2192 {32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe 40 PID 1040 wrote to memory of 352 1040 {112D7C4D-C371-44bf-8904-BB483BE53057}.exe 41 PID 1040 wrote to memory of 352 1040 {112D7C4D-C371-44bf-8904-BB483BE53057}.exe 41 PID 1040 wrote to memory of 352 1040 {112D7C4D-C371-44bf-8904-BB483BE53057}.exe 41 PID 1040 wrote to memory of 352 1040 {112D7C4D-C371-44bf-8904-BB483BE53057}.exe 41 PID 1040 wrote to memory of 604 1040 {112D7C4D-C371-44bf-8904-BB483BE53057}.exe 42 PID 1040 wrote to memory of 604 1040 {112D7C4D-C371-44bf-8904-BB483BE53057}.exe 42 PID 1040 wrote to memory of 604 1040 {112D7C4D-C371-44bf-8904-BB483BE53057}.exe 42 PID 1040 wrote to memory of 604 1040 {112D7C4D-C371-44bf-8904-BB483BE53057}.exe 42 PID 352 wrote to memory of 1440 352 {C8120FDB-E641-40af-8EB5-577290D610D2}.exe 43 PID 352 wrote to memory of 1440 352 {C8120FDB-E641-40af-8EB5-577290D610D2}.exe 43 PID 352 wrote to memory of 1440 352 {C8120FDB-E641-40af-8EB5-577290D610D2}.exe 43 PID 352 wrote to memory of 1440 352 {C8120FDB-E641-40af-8EB5-577290D610D2}.exe 43 PID 352 wrote to memory of 1764 352 {C8120FDB-E641-40af-8EB5-577290D610D2}.exe 44 PID 352 wrote to memory of 1764 352 {C8120FDB-E641-40af-8EB5-577290D610D2}.exe 44 PID 352 wrote to memory of 1764 352 {C8120FDB-E641-40af-8EB5-577290D610D2}.exe 44 PID 352 wrote to memory of 1764 352 {C8120FDB-E641-40af-8EB5-577290D610D2}.exe 44 PID 1440 wrote to memory of 2700 1440 {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe 45 PID 1440 wrote to memory of 2700 1440 {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe 45 PID 1440 wrote to memory of 2700 1440 {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe 45 PID 1440 wrote to memory of 2700 1440 {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe 45 PID 1440 wrote to memory of 2548 1440 {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe 46 PID 1440 wrote to memory of 2548 1440 {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe 46 PID 1440 wrote to memory of 2548 1440 {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe 46 PID 1440 wrote to memory of 2548 1440 {3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe"C:\Users\Admin\AppData\Local\Temp\eee158e06d2852480bc71a3d6f393ac52077716bd882fb24d302c962e8cd054f.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\{E458751B-ABB9-4f2a-B784-B14AED2322CE}.exeC:\Windows\{E458751B-ABB9-4f2a-B784-B14AED2322CE}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\{029673D2-E53D-4e74-BAA4-610800F5D250}.exeC:\Windows\{029673D2-E53D-4e74-BAA4-610800F5D250}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\{52BE7B21-033D-448e-9C82-EC23D5B01E06}.exeC:\Windows\{52BE7B21-033D-448e-9C82-EC23D5B01E06}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\{32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exeC:\Windows\{32E8C178-FA18-48da-98C1-E74EF6B8F9A0}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\{112D7C4D-C371-44bf-8904-BB483BE53057}.exeC:\Windows\{112D7C4D-C371-44bf-8904-BB483BE53057}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\{C8120FDB-E641-40af-8EB5-577290D610D2}.exeC:\Windows\{C8120FDB-E641-40af-8EB5-577290D610D2}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\{3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exeC:\Windows\{3FBC5327-A369-4d7a-BFCA-A87D577D0CA2}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\{BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}.exeC:\Windows\{BBE57460-4E51-4a90-8F8F-84FF6D3D73B1}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Windows\{A6568BBE-7F78-4175-80D9-EFFB3AB32B19}.exeC:\Windows\{A6568BBE-7F78-4175-80D9-EFFB3AB32B19}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1016 -
C:\Windows\{B0AE2390-9EEA-407f-8F3A-36AE07C7341B}.exeC:\Windows\{B0AE2390-9EEA-407f-8F3A-36AE07C7341B}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:972 -
C:\Windows\{F56E843D-C424-4bf8-A4E8-CA36DAFC7F3A}.exeC:\Windows\{F56E843D-C424-4bf8-A4E8-CA36DAFC7F3A}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B0AE2~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6568~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BBE57~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3FBC5~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C8120~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{112D7~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{32E8C~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{52BE7~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{02967~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E4587~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\EEE158~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD54db03323a26533f7559988bd27cc1d47
SHA189f0a160b4f70bc52fb28a50dcba4e1c8cbc855f
SHA256720435b4586d96e71d5050c9d4b366eaee13ff9f355b2dffc46e9488b521f8f7
SHA512a2e1d75ead2798d2a9c17111b78fc343e64c30a3b1c438bd423cb6ad67e413c1e041e8a41eba1bc8bbaddefdca29de395075f20cfa7bf240e38b91ac488a4c3a
-
Filesize
88KB
MD5b2a91b1c867c7e802407ab1d4b1f5236
SHA1fb5022a6de59ad761d2cb03e4ea086535b2f93c9
SHA256d0c60f8433ecc75a015f62d771a369ba0cf490c78fafeed680c2826818e79a7f
SHA512ea466c3ca4c52f1a9ff529889262f954b3a70238b6166c8f5f24ccf71318a0aa2e783ac5ba79ccdb23dfc4156921c68ae705a7272bec62f5c6bad5adb4e64523
-
Filesize
88KB
MD5a64a10576b618da6ce774c2285006437
SHA16fbb4fa2b401ad359ebdb313b7febc8f5524bc65
SHA256cd5171f42bf987578b7992953f2892f74f0bef422f537cb9f6e92d6fdc7d60e6
SHA51288be0d159d59b14bf2cb104039ab8f2ac9ff7090d6faa45c2bf39d7e68f54d0f911bc0eebc3fb468ca4f2d853913db78cf25b17f1d25154dea1cfd67aacd3040
-
Filesize
88KB
MD5b21eaa7788960ea9ba2bf11d27515de8
SHA156bb912e93c62b367a1a4952e3cc490731f3891a
SHA256370bff3b620bf63877d62fc88ac22ad2267ab2bb2e45823d5091a66239860cc8
SHA512fbe6b417e1c74f5fe62abe3c6df34a8a18cb9e0c0e4317ba09602aa7b65a76d2a299dbacee999480ecadcca58a45f832a255fe16ec67d8e9b913f3321a3cbe8f
-
Filesize
88KB
MD5660e36b9bbc82188f9b28d29a0c71a18
SHA1713ed4cd86da28e438a2690ea449ed8027dfc2a0
SHA256b7758d9c7514dc39a76244d7f82fa5634a300d61ed4028dad97a7173cd0ac0c2
SHA51240ad89a8bb2511e8d22514f83505c192d076ef706ebfec15adca187770b98b993217d26633502e9004d9ceaad0f6226286faf678fd6ee0a6012f5fcff65a4b29
-
Filesize
88KB
MD5e2cede87257b4cfc0ce00a76d467a4f4
SHA1833f70e1c7a4b15767a8ff93f20a20f84873c603
SHA256c9bb226ca4c2645fb56b28d883cfe13473a8f51af9a1676162635bfbd1aa9b8d
SHA5124aaa3c1a71a84c3fe46c9ab4d668bd522961d9f170d7bc94388741756165efd28ec5722e66854c1a2ddecc61702f8edcc5ee80781f7e1e0e45b20c868593ce92
-
Filesize
88KB
MD508ab19802f99d1c6f30bd6adcd41b015
SHA13f2d9e405e9d3a5fd3d1cae5522fcebb545e412a
SHA2561614673ba17fdc748b097d3054a18c8ec100ca2ae3292855b68f0ddd9638459e
SHA512975bacec0205a553c3d36fb5c6cd89ee45af222ebb76bc01b73a4dd016d11cbae4ced290f4b3c3f5f92ca6457772cda36c826c40909e8f050a7dda512a57f754
-
Filesize
88KB
MD5210db933a5ef4de3169ee8a0d78bf66c
SHA131526cc8615ab882cb49fd7074a1027c40ed880b
SHA2561d5c7a339077ad01ceaf4a9a1e22ff5ddc98667f630b16d0d905f53a4fc9d74a
SHA5121f17afce693204eb904b1fdbff8c6b042ef511c375ec8e68116a423b89cf04ed6f6f502f2855a3ea59ed3e35afd72d5e5d9aaeef26f6f4c2649bfc03e82d96b7
-
Filesize
88KB
MD5e23e4d697a34b97728cd7e26a5ccaef4
SHA1d5830e79025781258b4dd1fb3800443b35d4dcb3
SHA256c24ac639a15dc73f936e8983a8d87e9233d817699f973257c50d63211f00c28c
SHA51253c105c9d6e0fb73bc73edc04255592d2ee6ad63531fce6b6f79433fa0f79772afdf119ac7f8591d0bece022b77fd7ec84391a08c1e0e138709d1e21ce85d59c
-
Filesize
88KB
MD5ada9bc4dc71933f9bf0c671d4db86e8d
SHA185859339a617d58464767349b67cdd3454490fdd
SHA25688fb9c51f24426a7fbdece788e5512c872d9341733d82b5bbb3f548cecf6ead0
SHA512338d25d2ed94d4445655f21fd237d79f73013787946c6145a95f9d18fd7b32950366030bdd890df4fc1fcc54d97bd6ced8b6751e9e2a552a0a60ebba93ff9241
-
Filesize
88KB
MD5753fcb111a691a2032511314bda38999
SHA1eac0cc868dccb035f5c618e53f5d2539ac4b44bc
SHA256847806639b5b99a96368a1a766b69ba70ffefdb71b4d3687523c44b08f5ffa84
SHA512ab468c995dda72bc4c7885ad7488b35671ab2b1468f596fe16bdafbb4b26b8abe39c8443bdd5d31ce0160ddc714ef346b90d5749909652afb9e2922b4f4c7878