Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
9b4c06cf64096a7c45046ed4c55d4fa0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9b4c06cf64096a7c45046ed4c55d4fa0N.exe
Resource
win10v2004-20240802-en
General
-
Target
9b4c06cf64096a7c45046ed4c55d4fa0N.exe
-
Size
90KB
-
MD5
9b4c06cf64096a7c45046ed4c55d4fa0
-
SHA1
d4ad7f11adbaf79eeb80eb5979eec591f331db32
-
SHA256
8b5ada69b7a5ba5519c4e18611115ef8948c94d74e4e0aa531a0f0812f4e6dc7
-
SHA512
5833a8afa64c5e50a5aeb102176ea16dd28aea14545930860e44f6243faa09e67e8a58a46c2eb36548317f2cf41c0708d09827f75ef0da13e11b2eb495f00f28
-
SSDEEP
768:5vw9816thKQLroR4/wQkNrfrunMxVFA3bA:lEG/0oRlbunMxVS3c
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F0C135D-4196-4f4f-A2E7-90C3FC613116} 9b4c06cf64096a7c45046ed4c55d4fa0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EE93A24D-5235-496a-9F86-AAA8BF627944}\stubpath = "C:\\Windows\\{EE93A24D-5235-496a-9F86-AAA8BF627944}.exe" {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA2699D7-7092-438d-A032-362EDE9C1DFD}\stubpath = "C:\\Windows\\{AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe" {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C5B90B3-4A27-4de2-ADCA-4406164489E5} {861C7AB6-4967-4066-93E7-45194FDD580D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E706CC9D-51A6-46b5-994B-BCBD6542564A}\stubpath = "C:\\Windows\\{E706CC9D-51A6-46b5-994B-BCBD6542564A}.exe" {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{19A0A877-95FB-466c-9E2E-6144B9861B87}\stubpath = "C:\\Windows\\{19A0A877-95FB-466c-9E2E-6144B9861B87}.exe" {E706CC9D-51A6-46b5-994B-BCBD6542564A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA2699D7-7092-438d-A032-362EDE9C1DFD} {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{861C7AB6-4967-4066-93E7-45194FDD580D} {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0} {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E706CC9D-51A6-46b5-994B-BCBD6542564A} {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{861C7AB6-4967-4066-93E7-45194FDD580D}\stubpath = "C:\\Windows\\{861C7AB6-4967-4066-93E7-45194FDD580D}.exe" {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C5B90B3-4A27-4de2-ADCA-4406164489E5}\stubpath = "C:\\Windows\\{1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe" {861C7AB6-4967-4066-93E7-45194FDD580D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}\stubpath = "C:\\Windows\\{0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe" {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{19A0A877-95FB-466c-9E2E-6144B9861B87} {E706CC9D-51A6-46b5-994B-BCBD6542564A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F0C135D-4196-4f4f-A2E7-90C3FC613116}\stubpath = "C:\\Windows\\{0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe" 9b4c06cf64096a7c45046ed4c55d4fa0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EE93A24D-5235-496a-9F86-AAA8BF627944} {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B} {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}\stubpath = "C:\\Windows\\{1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe" {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe -
Deletes itself 1 IoCs
pid Process 2900 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2552 {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe 2836 {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe 2860 {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe 2628 {861C7AB6-4967-4066-93E7-45194FDD580D}.exe 856 {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe 2144 {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe 468 {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe 2856 {E706CC9D-51A6-46b5-994B-BCBD6542564A}.exe 1700 {19A0A877-95FB-466c-9E2E-6144B9861B87}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe 9b4c06cf64096a7c45046ed4c55d4fa0N.exe File created C:\Windows\{EE93A24D-5235-496a-9F86-AAA8BF627944}.exe {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe File created C:\Windows\{861C7AB6-4967-4066-93E7-45194FDD580D}.exe {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe File created C:\Windows\{1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe File created C:\Windows\{E706CC9D-51A6-46b5-994B-BCBD6542564A}.exe {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe File created C:\Windows\{AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe File created C:\Windows\{1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe {861C7AB6-4967-4066-93E7-45194FDD580D}.exe File created C:\Windows\{0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe File created C:\Windows\{19A0A877-95FB-466c-9E2E-6144B9861B87}.exe {E706CC9D-51A6-46b5-994B-BCBD6542564A}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {19A0A877-95FB-466c-9E2E-6144B9861B87}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b4c06cf64096a7c45046ed4c55d4fa0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E706CC9D-51A6-46b5-994B-BCBD6542564A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {861C7AB6-4967-4066-93E7-45194FDD580D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2252 9b4c06cf64096a7c45046ed4c55d4fa0N.exe Token: SeIncBasePriorityPrivilege 2552 {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe Token: SeIncBasePriorityPrivilege 2836 {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe Token: SeIncBasePriorityPrivilege 2860 {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe Token: SeIncBasePriorityPrivilege 2628 {861C7AB6-4967-4066-93E7-45194FDD580D}.exe Token: SeIncBasePriorityPrivilege 856 {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe Token: SeIncBasePriorityPrivilege 2144 {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe Token: SeIncBasePriorityPrivilege 468 {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe Token: SeIncBasePriorityPrivilege 2856 {E706CC9D-51A6-46b5-994B-BCBD6542564A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2552 2252 9b4c06cf64096a7c45046ed4c55d4fa0N.exe 31 PID 2252 wrote to memory of 2552 2252 9b4c06cf64096a7c45046ed4c55d4fa0N.exe 31 PID 2252 wrote to memory of 2552 2252 9b4c06cf64096a7c45046ed4c55d4fa0N.exe 31 PID 2252 wrote to memory of 2552 2252 9b4c06cf64096a7c45046ed4c55d4fa0N.exe 31 PID 2252 wrote to memory of 2900 2252 9b4c06cf64096a7c45046ed4c55d4fa0N.exe 32 PID 2252 wrote to memory of 2900 2252 9b4c06cf64096a7c45046ed4c55d4fa0N.exe 32 PID 2252 wrote to memory of 2900 2252 9b4c06cf64096a7c45046ed4c55d4fa0N.exe 32 PID 2252 wrote to memory of 2900 2252 9b4c06cf64096a7c45046ed4c55d4fa0N.exe 32 PID 2552 wrote to memory of 2836 2552 {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe 33 PID 2552 wrote to memory of 2836 2552 {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe 33 PID 2552 wrote to memory of 2836 2552 {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe 33 PID 2552 wrote to memory of 2836 2552 {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe 33 PID 2552 wrote to memory of 2948 2552 {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe 34 PID 2552 wrote to memory of 2948 2552 {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe 34 PID 2552 wrote to memory of 2948 2552 {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe 34 PID 2552 wrote to memory of 2948 2552 {0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe 34 PID 2836 wrote to memory of 2860 2836 {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe 35 PID 2836 wrote to memory of 2860 2836 {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe 35 PID 2836 wrote to memory of 2860 2836 {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe 35 PID 2836 wrote to memory of 2860 2836 {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe 35 PID 2836 wrote to memory of 484 2836 {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe 36 PID 2836 wrote to memory of 484 2836 {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe 36 PID 2836 wrote to memory of 484 2836 {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe 36 PID 2836 wrote to memory of 484 2836 {EE93A24D-5235-496a-9F86-AAA8BF627944}.exe 36 PID 2860 wrote to memory of 2628 2860 {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe 37 PID 2860 wrote to memory of 2628 2860 {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe 37 PID 2860 wrote to memory of 2628 2860 {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe 37 PID 2860 wrote to memory of 2628 2860 {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe 37 PID 2860 wrote to memory of 2680 2860 {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe 38 PID 2860 wrote to memory of 2680 2860 {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe 38 PID 2860 wrote to memory of 2680 2860 {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe 38 PID 2860 wrote to memory of 2680 2860 {AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe 38 PID 2628 wrote to memory of 856 2628 {861C7AB6-4967-4066-93E7-45194FDD580D}.exe 39 PID 2628 wrote to memory of 856 2628 {861C7AB6-4967-4066-93E7-45194FDD580D}.exe 39 PID 2628 wrote to memory of 856 2628 {861C7AB6-4967-4066-93E7-45194FDD580D}.exe 39 PID 2628 wrote to memory of 856 2628 {861C7AB6-4967-4066-93E7-45194FDD580D}.exe 39 PID 2628 wrote to memory of 1072 2628 {861C7AB6-4967-4066-93E7-45194FDD580D}.exe 40 PID 2628 wrote to memory of 1072 2628 {861C7AB6-4967-4066-93E7-45194FDD580D}.exe 40 PID 2628 wrote to memory of 1072 2628 {861C7AB6-4967-4066-93E7-45194FDD580D}.exe 40 PID 2628 wrote to memory of 1072 2628 {861C7AB6-4967-4066-93E7-45194FDD580D}.exe 40 PID 856 wrote to memory of 2144 856 {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe 41 PID 856 wrote to memory of 2144 856 {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe 41 PID 856 wrote to memory of 2144 856 {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe 41 PID 856 wrote to memory of 2144 856 {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe 41 PID 856 wrote to memory of 1220 856 {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe 42 PID 856 wrote to memory of 1220 856 {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe 42 PID 856 wrote to memory of 1220 856 {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe 42 PID 856 wrote to memory of 1220 856 {1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe 42 PID 2144 wrote to memory of 468 2144 {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe 43 PID 2144 wrote to memory of 468 2144 {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe 43 PID 2144 wrote to memory of 468 2144 {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe 43 PID 2144 wrote to memory of 468 2144 {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe 43 PID 2144 wrote to memory of 1728 2144 {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe 44 PID 2144 wrote to memory of 1728 2144 {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe 44 PID 2144 wrote to memory of 1728 2144 {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe 44 PID 2144 wrote to memory of 1728 2144 {0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe 44 PID 468 wrote to memory of 2856 468 {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe 45 PID 468 wrote to memory of 2856 468 {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe 45 PID 468 wrote to memory of 2856 468 {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe 45 PID 468 wrote to memory of 2856 468 {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe 45 PID 468 wrote to memory of 608 468 {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe 46 PID 468 wrote to memory of 608 468 {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe 46 PID 468 wrote to memory of 608 468 {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe 46 PID 468 wrote to memory of 608 468 {1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b4c06cf64096a7c45046ed4c55d4fa0N.exe"C:\Users\Admin\AppData\Local\Temp\9b4c06cf64096a7c45046ed4c55d4fa0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\{0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exeC:\Windows\{0F0C135D-4196-4f4f-A2E7-90C3FC613116}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\{EE93A24D-5235-496a-9F86-AAA8BF627944}.exeC:\Windows\{EE93A24D-5235-496a-9F86-AAA8BF627944}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\{AA2699D7-7092-438d-A032-362EDE9C1DFD}.exeC:\Windows\{AA2699D7-7092-438d-A032-362EDE9C1DFD}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\{861C7AB6-4967-4066-93E7-45194FDD580D}.exeC:\Windows\{861C7AB6-4967-4066-93E7-45194FDD580D}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\{1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exeC:\Windows\{1C5B90B3-4A27-4de2-ADCA-4406164489E5}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\{0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exeC:\Windows\{0FF0DBC4-9AE5-4ecd-9CB6-2695A0BF646B}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\{1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exeC:\Windows\{1E4FF6F5-BDA1-49fe-94BE-FDEE0BD797D0}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\{E706CC9D-51A6-46b5-994B-BCBD6542564A}.exeC:\Windows\{E706CC9D-51A6-46b5-994B-BCBD6542564A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\Windows\{19A0A877-95FB-466c-9E2E-6144B9861B87}.exeC:\Windows\{19A0A877-95FB-466c-9E2E-6144B9861B87}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E706C~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1E4FF~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0FF0D~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C5B9~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{861C7~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA269~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EE93A~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0F0C1~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\9B4C06~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD50e78d706992f761cc1213889f5ba9de1
SHA1493fc60942aabd1382e9fa4fda24f78bb6bdd762
SHA2568fd89f7d445938193b106dde5b7446d98841de364fbc3ce76a2dabc5e83461e7
SHA512502f2f3c5e40eeb8f35922dc48be899032e38226946864f7c01671e6d1a6604483cecb8b3ffa247ae0ef1cf7bad539380d27c4f040b93cb7464bb06ba2d4b820
-
Filesize
90KB
MD544488685c1521816e9d3c0d8e2abfd70
SHA1d8dc2dfdc845c4156883af026214e07ba5b669a8
SHA25639f7564c76bd45763beba47478b8647e4feea8c7b549c781603de2af45ff75e1
SHA512710adb522971ce5d7b42ff5b628173392bfdbd767f9d41e0abd46d4c9a08bad8fcadb9c6d470734da64feec26b9f07a16dbd08834df1cc2d618ecc4594ff0d89
-
Filesize
90KB
MD5282175347b60334ba9ca250a5c7dd2b1
SHA1121ee95472891ec236e4e4a8294db8bd890a79ad
SHA256042672edb64924e64ad99ad4889d14b35495e6955390e9178ed7ca53474eee03
SHA512ea7d72c0b0d7d0de7710a0836131b35e8adece367379189d2df23fee408fc88d01152ed42d8b330b1f708cb8edf15466931461259d7160c0d354887d8234aa40
-
Filesize
90KB
MD521beca6732662f066622864b2d5eaba4
SHA10a7c51818be315ec6f483bf0b49d7db3ac567fb5
SHA256f24c3b0064bb386ce65195dd084214dad8aeae54e7a3027f05c24e86c57c8b7c
SHA5122409a7627218e4f0e565265f34310f82a62529fa6b70f0f816e04df5be864120888c098731950c99b13fe17add137c66eb68a364fefcc2af71d8e8a29b3cf27c
-
Filesize
90KB
MD5af956a4ae1aa7b5f0a4f04f888f432ac
SHA1d08c47ffe93429449249457a925c3a38e97b17b4
SHA2563ad4d6c84c567395e12f3d205df3f0200d2591fb9cd140df1204aa0ecd613672
SHA51254904fb08568ec62e5817e89c94424d4e1df6ffa2befc66c46b30343151654e0bb959092241a7e355ea1355441e405ea7149a309aded2aa036ea25e7eaaca04e
-
Filesize
90KB
MD598957946c8fe4cd68b8adcf75114f828
SHA15880ba57848702995589665ef2a8b2626d43db52
SHA256f97fcf8f211b23d4be92d907fb4e542ababf67561eef52e9639707bec4a6f0d7
SHA512703f3c5d74987f48c9d275e4ed9c5ef53b3bc84bdf31154bbcdf6796b9b40de88a92278072f74c07584e93ff209b99017daa1fadf79f311c16b33ead4b0206bb
-
Filesize
90KB
MD5adc25255680edd98b129671d48e75f8a
SHA10339487109383587b42ba339d2a52b64dbc94c77
SHA25643cdb2d405ff83025a73383e6eb29aec9395fd5cdab61af645c3bde5c57c23cf
SHA512e7c3ba4268840f268b49ff05b6df6ba22185bca4c6ef88fa0a299fafb3fca77f0050d520e3e77f29b876b8471f2d26b37d15f5922b9849455cc2f818cda9d7e9
-
Filesize
90KB
MD55417cac900b0f354ebccb422a1deabb2
SHA1bcfb3852103426495cf911a11859f6679f062cc0
SHA256900d6088f95876cb179cc656ca25eb7fbcc32d0ea6f9e09c15c5afe636e7d399
SHA5128baf49b0b7b3330186ce21ae98c8e5e81ea6b86555ce051c8bdaa4a6a57ddd09f949a9e9ec5482ce6c31a308ad6f2f081bdbd7c9f21b3c7d6d93d7d624db849d
-
Filesize
90KB
MD59dc0cefe54a4735521467dd177c09be1
SHA160c4f43572ff942ab82d1801caa0340f92a1901f
SHA2560e3996a05c86649d46d74358bbde87d742084428b40ccdf1615d71a050c0ed09
SHA512112fe97426862217375b558c2f6c437feaa6879793550af849d7f2890780eded5d9a80fee1590179a3d6663a0bac0293a6bbeec485b16c94e323de9d2ea38cc2