Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe
Resource
win10v2004-20240802-en
General
-
Target
16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe
-
Size
91KB
-
MD5
5adfa797cd97ee2f3924b87c460bfd00
-
SHA1
850e5aef7b17b918f87c1550fc91a667af059f79
-
SHA256
16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121
-
SHA512
99c63e4901cac34986608b05872f266f419a7b327d659e4e19f086f0413f32b99a99523964c62cb66b0923e64d46aaefe080cc0af9c165cc647531abcdc4743e
-
SSDEEP
768:5vw9816uhKiroX4/wQNNrfrunMxVFA3b7t:lEGkmoXlCunMxVS3Ht
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0353BFAA-B3E9-46f4-A964-2E555D7180BB} {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6BC3B677-0442-4c06-A693-02933DD8BAA5}\stubpath = "C:\\Windows\\{6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe" {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7F3D00C3-A8F3-483a-8C23-E82EB35D377D}\stubpath = "C:\\Windows\\{7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe" {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721} {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{64D483A7-11F5-47d6-805C-9D8BDB1BA88B} {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF58D879-5839-493a-8FC3-B55310A98F83} {64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B}\stubpath = "C:\\Windows\\{6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B}.exe" {BF58D879-5839-493a-8FC3-B55310A98F83}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A106FB3-4801-4d5f-A60C-AD79B162D11A} 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}\stubpath = "C:\\Windows\\{762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe" {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7F3D00C3-A8F3-483a-8C23-E82EB35D377D} {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}\stubpath = "C:\\Windows\\{9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe" {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{75635B13-0D58-4ffe-9FDA-7DF188021238} {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C0A8382B-2B64-4692-858F-38FCAE82A732} {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{75635B13-0D58-4ffe-9FDA-7DF188021238}\stubpath = "C:\\Windows\\{75635B13-0D58-4ffe-9FDA-7DF188021238}.exe" {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF58D879-5839-493a-8FC3-B55310A98F83}\stubpath = "C:\\Windows\\{BF58D879-5839-493a-8FC3-B55310A98F83}.exe" {64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B} {BF58D879-5839-493a-8FC3-B55310A98F83}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A106FB3-4801-4d5f-A60C-AD79B162D11A}\stubpath = "C:\\Windows\\{1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe" 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}\stubpath = "C:\\Windows\\{4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe" {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C0A8382B-2B64-4692-858F-38FCAE82A732}\stubpath = "C:\\Windows\\{C0A8382B-2B64-4692-858F-38FCAE82A732}.exe" {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0353BFAA-B3E9-46f4-A964-2E555D7180BB}\stubpath = "C:\\Windows\\{0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe" {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6BC3B677-0442-4c06-A693-02933DD8BAA5} {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B} {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{64D483A7-11F5-47d6-805C-9D8BDB1BA88B}\stubpath = "C:\\Windows\\{64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe" {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4B138C25-D09D-4f83-8F1B-E3442AAA0AFD} {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe -
Executes dropped EXE 12 IoCs
pid Process 3580 {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe 1172 {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe 756 {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe 3056 {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe 4832 {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe 3428 {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe 824 {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe 1152 {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe 4960 {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe 1420 {64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe 4652 {BF58D879-5839-493a-8FC3-B55310A98F83}.exe 4760 {6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe File created C:\Windows\{BF58D879-5839-493a-8FC3-B55310A98F83}.exe {64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe File created C:\Windows\{1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe File created C:\Windows\{4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe File created C:\Windows\{C0A8382B-2B64-4692-858F-38FCAE82A732}.exe {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe File created C:\Windows\{0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe File created C:\Windows\{6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe File created C:\Windows\{7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe File created C:\Windows\{75635B13-0D58-4ffe-9FDA-7DF188021238}.exe {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe File created C:\Windows\{762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe File created C:\Windows\{64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe File created C:\Windows\{6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B}.exe {BF58D879-5839-493a-8FC3-B55310A98F83}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BF58D879-5839-493a-8FC3-B55310A98F83}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4792 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe Token: SeIncBasePriorityPrivilege 3580 {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe Token: SeIncBasePriorityPrivilege 1172 {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe Token: SeIncBasePriorityPrivilege 756 {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe Token: SeIncBasePriorityPrivilege 3056 {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe Token: SeIncBasePriorityPrivilege 4832 {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe Token: SeIncBasePriorityPrivilege 3428 {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe Token: SeIncBasePriorityPrivilege 824 {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe Token: SeIncBasePriorityPrivilege 1152 {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe Token: SeIncBasePriorityPrivilege 4960 {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe Token: SeIncBasePriorityPrivilege 1420 {64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe Token: SeIncBasePriorityPrivilege 4652 {BF58D879-5839-493a-8FC3-B55310A98F83}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 3580 4792 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe 94 PID 4792 wrote to memory of 3580 4792 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe 94 PID 4792 wrote to memory of 3580 4792 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe 94 PID 4792 wrote to memory of 4156 4792 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe 95 PID 4792 wrote to memory of 4156 4792 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe 95 PID 4792 wrote to memory of 4156 4792 16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe 95 PID 3580 wrote to memory of 1172 3580 {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe 96 PID 3580 wrote to memory of 1172 3580 {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe 96 PID 3580 wrote to memory of 1172 3580 {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe 96 PID 3580 wrote to memory of 3572 3580 {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe 97 PID 3580 wrote to memory of 3572 3580 {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe 97 PID 3580 wrote to memory of 3572 3580 {1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe 97 PID 1172 wrote to memory of 756 1172 {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe 100 PID 1172 wrote to memory of 756 1172 {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe 100 PID 1172 wrote to memory of 756 1172 {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe 100 PID 1172 wrote to memory of 404 1172 {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe 101 PID 1172 wrote to memory of 404 1172 {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe 101 PID 1172 wrote to memory of 404 1172 {4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe 101 PID 756 wrote to memory of 3056 756 {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe 102 PID 756 wrote to memory of 3056 756 {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe 102 PID 756 wrote to memory of 3056 756 {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe 102 PID 756 wrote to memory of 2900 756 {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe 103 PID 756 wrote to memory of 2900 756 {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe 103 PID 756 wrote to memory of 2900 756 {C0A8382B-2B64-4692-858F-38FCAE82A732}.exe 103 PID 3056 wrote to memory of 4832 3056 {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe 104 PID 3056 wrote to memory of 4832 3056 {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe 104 PID 3056 wrote to memory of 4832 3056 {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe 104 PID 3056 wrote to memory of 3172 3056 {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe 105 PID 3056 wrote to memory of 3172 3056 {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe 105 PID 3056 wrote to memory of 3172 3056 {0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe 105 PID 4832 wrote to memory of 3428 4832 {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe 106 PID 4832 wrote to memory of 3428 4832 {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe 106 PID 4832 wrote to memory of 3428 4832 {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe 106 PID 4832 wrote to memory of 2584 4832 {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe 107 PID 4832 wrote to memory of 2584 4832 {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe 107 PID 4832 wrote to memory of 2584 4832 {6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe 107 PID 3428 wrote to memory of 824 3428 {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe 108 PID 3428 wrote to memory of 824 3428 {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe 108 PID 3428 wrote to memory of 824 3428 {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe 108 PID 3428 wrote to memory of 1800 3428 {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe 109 PID 3428 wrote to memory of 1800 3428 {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe 109 PID 3428 wrote to memory of 1800 3428 {75635B13-0D58-4ffe-9FDA-7DF188021238}.exe 109 PID 824 wrote to memory of 1152 824 {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe 110 PID 824 wrote to memory of 1152 824 {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe 110 PID 824 wrote to memory of 1152 824 {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe 110 PID 824 wrote to memory of 1880 824 {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe 111 PID 824 wrote to memory of 1880 824 {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe 111 PID 824 wrote to memory of 1880 824 {762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe 111 PID 1152 wrote to memory of 4960 1152 {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe 112 PID 1152 wrote to memory of 4960 1152 {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe 112 PID 1152 wrote to memory of 4960 1152 {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe 112 PID 1152 wrote to memory of 4916 1152 {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe 113 PID 1152 wrote to memory of 4916 1152 {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe 113 PID 1152 wrote to memory of 4916 1152 {7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe 113 PID 4960 wrote to memory of 1420 4960 {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe 114 PID 4960 wrote to memory of 1420 4960 {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe 114 PID 4960 wrote to memory of 1420 4960 {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe 114 PID 4960 wrote to memory of 3920 4960 {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe 115 PID 4960 wrote to memory of 3920 4960 {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe 115 PID 4960 wrote to memory of 3920 4960 {9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe 115 PID 1420 wrote to memory of 4652 1420 {64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe 116 PID 1420 wrote to memory of 4652 1420 {64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe 116 PID 1420 wrote to memory of 4652 1420 {64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe 116 PID 1420 wrote to memory of 2960 1420 {64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe"C:\Users\Admin\AppData\Local\Temp\16549f99e4ce4640f150d4a7fad50d6b109fbeff4d6c5a4aa8b6c95efa6e6121.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\{1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exeC:\Windows\{1A106FB3-4801-4d5f-A60C-AD79B162D11A}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\{4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exeC:\Windows\{4B138C25-D09D-4f83-8F1B-E3442AAA0AFD}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\{C0A8382B-2B64-4692-858F-38FCAE82A732}.exeC:\Windows\{C0A8382B-2B64-4692-858F-38FCAE82A732}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\{0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exeC:\Windows\{0353BFAA-B3E9-46f4-A964-2E555D7180BB}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\{6BC3B677-0442-4c06-A693-02933DD8BAA5}.exeC:\Windows\{6BC3B677-0442-4c06-A693-02933DD8BAA5}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\{75635B13-0D58-4ffe-9FDA-7DF188021238}.exeC:\Windows\{75635B13-0D58-4ffe-9FDA-7DF188021238}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\{762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exeC:\Windows\{762FDAB1-8E42-45ca-BB5C-6E492A2A9F0B}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\{7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exeC:\Windows\{7F3D00C3-A8F3-483a-8C23-E82EB35D377D}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\{9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exeC:\Windows\{9BA86F72-F0BD-4f2f-A2AD-AA3EEDE7C721}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\{64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exeC:\Windows\{64D483A7-11F5-47d6-805C-9D8BDB1BA88B}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\{BF58D879-5839-493a-8FC3-B55310A98F83}.exeC:\Windows\{BF58D879-5839-493a-8FC3-B55310A98F83}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4652 -
C:\Windows\{6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B}.exeC:\Windows\{6AB4A70A-8FCF-4b00-AA9B-A02B9B02032B}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BF58D~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{64D48~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9BA86~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7F3D0~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{762FD~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{75635~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6BC3B~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0353B~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0A83~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4B138~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1A106~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\16549F~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD520740f9b6a11dfcfa3a4e91b0919b283
SHA17aa75dbcfaad21d81bc6a33132fc4c8421498b05
SHA256aa4d20cdd8230ea04ad402a64a0af9352afed5bb206567d42fa8c25a7e047bcb
SHA5122746fed853a08112a0e84e3edd81af6c27d1a50ab38640f397efd16d2c327334048b4435608576ad7a21a03d76c13e17a38f7517293de1198818e6c8cdbd7cb2
-
Filesize
91KB
MD5d5a93174ffad58f5454b7beebb668c15
SHA1a8400460fa5684c1d1bb8a442c9b8f0fa5874e10
SHA2562b7643ae3320907e1b91a2574cba78d7f19c241eee086a9ae3747656adfc02dc
SHA512ccd0e55477b14e868931ae566bd2cef2963b87c5289cda62cd6e49908afbc21fc45254a8c9b74cee46e211e0808da90d4a63fdfd9315cf9293dbab1ced96e17b
-
Filesize
91KB
MD5c27b49034f6859fbeee0c5c333153569
SHA17aef1815303928c79bbbb96651cbfa2ea330f02d
SHA25616735f569ee6016c0b685e5f5386972859040e74af6a839ee93ba07dc602d923
SHA5129a4607a3b7aa1962b8adae0a898b36d7f60077dc3b3c79ffff035e22ee491362a64275772c8321cad13fa04764b10077916085c68a76a090df9c10f40115768f
-
Filesize
91KB
MD562c8b1e8e4c00f92d0cadef083e1c64e
SHA1aa60b9f8f6a07d6f150122e9327a1d9541a29af6
SHA2564969af3cb3323f9eb3584bf12553962c9da219fe0d1ff23bbd6ac8867afc4ad8
SHA5120fddf931aefe8a75aff6c26568e1c9d70fd0c13242137b8d7ec68696623cfbcd0700d603dc097a351e700aff8d56327b1827b8fa88c016f28e45bcaab18b805d
-
Filesize
91KB
MD5e6544dc804b7a411f3ae0be28e5dc0f0
SHA10dd4a0d630fdbb22ecf3217ef685b8b4cb3d53c6
SHA25634c19648d2ab9ff0ac92dd81d5a9266c4e997eea8e005555c9fc82d200636f18
SHA512be925c3cfd317901b6f59105cfe3166ab78a35b9c0faa1b8932a25d894da1ff74bf602a1eddf43b159382cdba179de70f8f66e8f3acca0df50c0552ed15922d1
-
Filesize
91KB
MD5ab62dab8b8cb9e78930afa88b81c600c
SHA1ae21c39932b52e18978542e131b597e39345832f
SHA256ad1ec6ee11acadfcb865933c31af427a454046b500451d2d27952f1f42eee359
SHA512c16ade45f8daa36419f3ab790da6ac6bdab5b7f2f554f12cde30bd2f82e9cd52d318ad886f157cc90e8337f180f413071fe0529d9fccfd245334429f6062c579
-
Filesize
91KB
MD5884716cdbe34211a3d770a18c0743e47
SHA1533641af050de454977e522282f2c8cd96503fc7
SHA256e1571408839a3f3badaf49a7faba832ffbca334ffff140b960085cad0f6649dd
SHA51274a6b6f0cd52304f26df9176a953418499beedb4669b0eb5a497fca87d3f79f0c1b61f9e847c63ceb22858b1ed5d6402af30e6be113f8a4080483266bc0b7b3d
-
Filesize
91KB
MD5e325e85e33953cdd4c25c68ad6b3d890
SHA112ac6dc67351ff6bbf6492a714d07a0edae19aee
SHA2562fbdcbb2b1f879fd5b434371b0033beff5a83bbbfb36c673d8fbc64b576df030
SHA5122a9dea126b05077e87a56d9d1e74092a0d2879cfd3b1e112672e3534750ce8a18e5f825a0176a2bd5a992930a354f0141bf1ddc881d8c4446b83d2fe05b53e99
-
Filesize
91KB
MD5cd9a90a2429b7d707fe7c7a17a3b8816
SHA17b7dd438f8860e83532a2ff63be5e925720f4192
SHA256f65b231a5cce6a2fec4bef54bcbd15e98eeb51aad50ccf47c75aaf140af30cd2
SHA51201230f6b0c76d25b289b40699941aae00ec0a63e68c34d682904aac53d03def009fbdc78e0365a691d22126036c90eee0236ad72402faff78e1f67427ff285d4
-
Filesize
91KB
MD518c4e2e246665c17893408d0fec6e4c3
SHA159b82fde931491fb3d60a872885287c2bca11117
SHA2562814dbb1b1eedc87974b4a8d47c691d1e8030ce5a4268b65740f77c1b84b2641
SHA5126a1b9a9788221b681df4ca03dae86b67b99b9a95351fb9dbe7d24d70e22424faca55007e296317eae752f2a1104e3b12a11f7eec72c0b457e20ad1029cbb43b5
-
Filesize
91KB
MD5d6600f974315c50fb1ecba6e7fa6b11c
SHA1e6b56148f02ffefce11b057f7bb8222e491fb1ef
SHA256c8bbcd4435b89e1318f4ecc783f097885ebc14772034edf2fdd45916fdb5d1e2
SHA512240136218f566ff571134dd9fb84f1e9ecc3827ba1534d5bf3839ee60ad4d93399331bb84f1af64ddf1b6c3d9fabec9b612e19d392a6530278772bbf273f239b
-
Filesize
91KB
MD5d44fea045037472f1513d5e5f7d004da
SHA100f16cc12219ccbca4808fb887f32a910164b031
SHA256205c571f097265aaca4642840fe5dd41ef248994c437eadc9744075a1ed245e4
SHA5125b656961b3548d65cd4c2e76b7dc7cbad3bcd9e7db46f67dc087c90ca75e195b67c57c5919b6e6d8603dfb06ac94d15f9a43f6a80b8feb3a0355d5af1797d74e