Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe
Resource
win10v2004-20240802-en
General
-
Target
6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe
-
Size
89KB
-
MD5
20706fd3835359fc7fd032bc41f8050c
-
SHA1
27a15cd5b3359f743d21b2dc789478c4d0c81c2c
-
SHA256
6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6
-
SHA512
bff23b3c830c77487a385308260512235e59baad06f1c303de5ece12bb73d7c4cb19066e9e7873454a3ef279f8648fb03bb6d2452c0acd329dd6819d848bbc7c
-
SSDEEP
768:Qvw9816vhKQLrov4/wQRNrfrunMxVFA3b7glL:YEGh0ovl2unMxVS3Hg9
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}\stubpath = "C:\\Windows\\{1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe" {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBEF717A-9053-4881-943F-2CF8BAF24C17} {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBEF717A-9053-4881-943F-2CF8BAF24C17}\stubpath = "C:\\Windows\\{BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe" {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B48E475-39D4-4012-8F74-A0A72622F7BE} {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7CC49266-F927-432b-8E8B-377508CF3EF7}\stubpath = "C:\\Windows\\{7CC49266-F927-432b-8E8B-377508CF3EF7}.exe" 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{89441A56-4B5A-47de-97B6-53FE7BB7965F} {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28} {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}\stubpath = "C:\\Windows\\{E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe" {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7CC49266-F927-432b-8E8B-377508CF3EF7} 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}\stubpath = "C:\\Windows\\{4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe" {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3ACB4B94-322E-4256-A2DD-186714B127C0} {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B48E475-39D4-4012-8F74-A0A72622F7BE}\stubpath = "C:\\Windows\\{7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe" {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD52E026-BD64-4979-ABBA-D162980E5C94} {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{89441A56-4B5A-47de-97B6-53FE7BB7965F}\stubpath = "C:\\Windows\\{89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe" {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70} {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7561216D-3045-4076-A7E4-05A4C6D27EB2} {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4A5D9F2-025D-4c02-AA22-68E2FB442B3A} {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C123A9E-3901-430a-BA86-4F3498D611AC} {E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C123A9E-3901-430a-BA86-4F3498D611AC}\stubpath = "C:\\Windows\\{3C123A9E-3901-430a-BA86-4F3498D611AC}.exe" {E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1EBD5F39-CF94-4c48-AD1C-EF6BC277CA6C} {3C123A9E-3901-430a-BA86-4F3498D611AC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1EBD5F39-CF94-4c48-AD1C-EF6BC277CA6C}\stubpath = "C:\\Windows\\{1EBD5F39-CF94-4c48-AD1C-EF6BC277CA6C}.exe" {3C123A9E-3901-430a-BA86-4F3498D611AC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3ACB4B94-322E-4256-A2DD-186714B127C0}\stubpath = "C:\\Windows\\{3ACB4B94-322E-4256-A2DD-186714B127C0}.exe" {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7561216D-3045-4076-A7E4-05A4C6D27EB2}\stubpath = "C:\\Windows\\{7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe" {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD52E026-BD64-4979-ABBA-D162980E5C94}\stubpath = "C:\\Windows\\{CD52E026-BD64-4979-ABBA-D162980E5C94}.exe" {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe -
Executes dropped EXE 12 IoCs
pid Process 3300 {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe 1680 {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe 1080 {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe 3224 {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe 2508 {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe 4048 {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe 4336 {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe 4020 {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe 1576 {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe 3788 {E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe 212 {3C123A9E-3901-430a-BA86-4F3498D611AC}.exe 928 {1EBD5F39-CF94-4c48-AD1C-EF6BC277CA6C}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe File created C:\Windows\{3ACB4B94-322E-4256-A2DD-186714B127C0}.exe {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe File created C:\Windows\{1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe File created C:\Windows\{7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe File created C:\Windows\{1EBD5F39-CF94-4c48-AD1C-EF6BC277CA6C}.exe {3C123A9E-3901-430a-BA86-4F3498D611AC}.exe File created C:\Windows\{89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe File created C:\Windows\{BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe File created C:\Windows\{7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe File created C:\Windows\{CD52E026-BD64-4979-ABBA-D162980E5C94}.exe {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe File created C:\Windows\{E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe File created C:\Windows\{3C123A9E-3901-430a-BA86-4F3498D611AC}.exe {E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe File created C:\Windows\{7CC49266-F927-432b-8E8B-377508CF3EF7}.exe 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3C123A9E-3901-430a-BA86-4F3498D611AC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1EBD5F39-CF94-4c48-AD1C-EF6BC277CA6C}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1644 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe Token: SeIncBasePriorityPrivilege 3300 {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe Token: SeIncBasePriorityPrivilege 1680 {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe Token: SeIncBasePriorityPrivilege 1080 {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe Token: SeIncBasePriorityPrivilege 3224 {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe Token: SeIncBasePriorityPrivilege 2508 {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe Token: SeIncBasePriorityPrivilege 4048 {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe Token: SeIncBasePriorityPrivilege 4336 {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe Token: SeIncBasePriorityPrivilege 4020 {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe Token: SeIncBasePriorityPrivilege 1576 {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe Token: SeIncBasePriorityPrivilege 3788 {E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe Token: SeIncBasePriorityPrivilege 212 {3C123A9E-3901-430a-BA86-4F3498D611AC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 3300 1644 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe 94 PID 1644 wrote to memory of 3300 1644 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe 94 PID 1644 wrote to memory of 3300 1644 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe 94 PID 1644 wrote to memory of 2340 1644 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe 95 PID 1644 wrote to memory of 2340 1644 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe 95 PID 1644 wrote to memory of 2340 1644 6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe 95 PID 3300 wrote to memory of 1680 3300 {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe 96 PID 3300 wrote to memory of 1680 3300 {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe 96 PID 3300 wrote to memory of 1680 3300 {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe 96 PID 3300 wrote to memory of 2568 3300 {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe 97 PID 3300 wrote to memory of 2568 3300 {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe 97 PID 3300 wrote to memory of 2568 3300 {7CC49266-F927-432b-8E8B-377508CF3EF7}.exe 97 PID 1680 wrote to memory of 1080 1680 {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe 100 PID 1680 wrote to memory of 1080 1680 {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe 100 PID 1680 wrote to memory of 1080 1680 {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe 100 PID 1680 wrote to memory of 3584 1680 {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe 101 PID 1680 wrote to memory of 3584 1680 {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe 101 PID 1680 wrote to memory of 3584 1680 {89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe 101 PID 1080 wrote to memory of 3224 1080 {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe 102 PID 1080 wrote to memory of 3224 1080 {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe 102 PID 1080 wrote to memory of 3224 1080 {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe 102 PID 1080 wrote to memory of 2308 1080 {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe 103 PID 1080 wrote to memory of 2308 1080 {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe 103 PID 1080 wrote to memory of 2308 1080 {4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe 103 PID 3224 wrote to memory of 2508 3224 {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe 104 PID 3224 wrote to memory of 2508 3224 {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe 104 PID 3224 wrote to memory of 2508 3224 {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe 104 PID 3224 wrote to memory of 4304 3224 {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe 105 PID 3224 wrote to memory of 4304 3224 {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe 105 PID 3224 wrote to memory of 4304 3224 {3ACB4B94-322E-4256-A2DD-186714B127C0}.exe 105 PID 2508 wrote to memory of 4048 2508 {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe 106 PID 2508 wrote to memory of 4048 2508 {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe 106 PID 2508 wrote to memory of 4048 2508 {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe 106 PID 2508 wrote to memory of 4724 2508 {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe 107 PID 2508 wrote to memory of 4724 2508 {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe 107 PID 2508 wrote to memory of 4724 2508 {1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe 107 PID 4048 wrote to memory of 4336 4048 {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe 108 PID 4048 wrote to memory of 4336 4048 {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe 108 PID 4048 wrote to memory of 4336 4048 {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe 108 PID 4048 wrote to memory of 3292 4048 {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe 109 PID 4048 wrote to memory of 3292 4048 {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe 109 PID 4048 wrote to memory of 3292 4048 {BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe 109 PID 4336 wrote to memory of 4020 4336 {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe 110 PID 4336 wrote to memory of 4020 4336 {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe 110 PID 4336 wrote to memory of 4020 4336 {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe 110 PID 4336 wrote to memory of 1704 4336 {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe 111 PID 4336 wrote to memory of 1704 4336 {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe 111 PID 4336 wrote to memory of 1704 4336 {7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe 111 PID 4020 wrote to memory of 1576 4020 {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe 112 PID 4020 wrote to memory of 1576 4020 {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe 112 PID 4020 wrote to memory of 1576 4020 {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe 112 PID 4020 wrote to memory of 3700 4020 {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe 113 PID 4020 wrote to memory of 3700 4020 {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe 113 PID 4020 wrote to memory of 3700 4020 {7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe 113 PID 1576 wrote to memory of 3788 1576 {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe 114 PID 1576 wrote to memory of 3788 1576 {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe 114 PID 1576 wrote to memory of 3788 1576 {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe 114 PID 1576 wrote to memory of 912 1576 {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe 115 PID 1576 wrote to memory of 912 1576 {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe 115 PID 1576 wrote to memory of 912 1576 {CD52E026-BD64-4979-ABBA-D162980E5C94}.exe 115 PID 3788 wrote to memory of 212 3788 {E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe 116 PID 3788 wrote to memory of 212 3788 {E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe 116 PID 3788 wrote to memory of 212 3788 {E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe 116 PID 3788 wrote to memory of 2480 3788 {E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe"C:\Users\Admin\AppData\Local\Temp\6d2168a577cfac4c1190477d89c0beddae501f0dd231d5358016671085c093a6.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\{7CC49266-F927-432b-8E8B-377508CF3EF7}.exeC:\Windows\{7CC49266-F927-432b-8E8B-377508CF3EF7}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\{89441A56-4B5A-47de-97B6-53FE7BB7965F}.exeC:\Windows\{89441A56-4B5A-47de-97B6-53FE7BB7965F}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\{4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exeC:\Windows\{4BBF52B5-ED99-4e11-BDDA-DE9B7FF5DD28}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\{3ACB4B94-322E-4256-A2DD-186714B127C0}.exeC:\Windows\{3ACB4B94-322E-4256-A2DD-186714B127C0}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\{1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exeC:\Windows\{1C5A9D5A-1CF1-4a9e-B30C-A862D3E66A70}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\{BBEF717A-9053-4881-943F-2CF8BAF24C17}.exeC:\Windows\{BBEF717A-9053-4881-943F-2CF8BAF24C17}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\{7561216D-3045-4076-A7E4-05A4C6D27EB2}.exeC:\Windows\{7561216D-3045-4076-A7E4-05A4C6D27EB2}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\{7B48E475-39D4-4012-8F74-A0A72622F7BE}.exeC:\Windows\{7B48E475-39D4-4012-8F74-A0A72622F7BE}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\{CD52E026-BD64-4979-ABBA-D162980E5C94}.exeC:\Windows\{CD52E026-BD64-4979-ABBA-D162980E5C94}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\{E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exeC:\Windows\{E4A5D9F2-025D-4c02-AA22-68E2FB442B3A}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\{3C123A9E-3901-430a-BA86-4F3498D611AC}.exeC:\Windows\{3C123A9E-3901-430a-BA86-4F3498D611AC}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:212 -
C:\Windows\{1EBD5F39-CF94-4c48-AD1C-EF6BC277CA6C}.exeC:\Windows\{1EBD5F39-CF94-4c48-AD1C-EF6BC277CA6C}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C123~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E4A5D~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CD52E~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7B48E~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{75612~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BBEF7~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C5A9~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3ACB4~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4BBF5~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{89441~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7CC49~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\6D2168~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD575890bbd94b90a21e3ed463fc26fcbf0
SHA11c5e7bb61ebb1a1a7f1a78f0d4d000223ebced0e
SHA2567afde4a53f49e1af65f69f47f37c505dcfddaaf8e2a9c56723d577bed3409c2f
SHA5122547a1bd633d12dad854109a1609cb0f0a453052f4935992e3ef39614ec482721b7725ea3abd1f3271b164856c6b152d14cc804094b9fa5a324454ae0820e965
-
Filesize
89KB
MD5230aa272524dfd6349d9cacb3cebb218
SHA108130c7dcb9fafb328c85e3a572392609039b6cf
SHA2564ea92858ec846e0d53f1c3f5aee537974ec429212b866b11fb1714ba95e13fa7
SHA5121191c901f72e56f655aeeffb1d4e26d7d770f575cbb5dbf8a6aca20b12525abf395a50cb1af01066d4fb362fe560f83597b06c46503a4a30a38a7e80f4d0913c
-
Filesize
89KB
MD54ebb4cbfe0618e85e22353086ee30157
SHA1422d01eb386cd5c04a48c7b1fd2f1c95b1ca2589
SHA25674ebc7799fbc490124269ddc6f8f0a638859ce91390d1842f8d007436c2b838c
SHA51237d3f49d3913e632f45e3d7a9f0e6d59ac76ee2d95dd1908e10e05a944e80eed2b090d388c75ee37c6347e854c796230043068f8a68332037e413691f7d63477
-
Filesize
89KB
MD5e897196bc71a64c9ecea8c48480020d6
SHA1d4a2acad3c12c113533137feb653b2ff05d0bc2f
SHA2561b41eef5a720486f4fa1f99b6a59099d7bc52168ed626a8d488a52bdc0933502
SHA51215e2c2d49569b6d17d058ba42543985721563cc916d5e77a9a300035e4b08307dbfcaaafacae1c798b5f1c160b7137edd7c562ad14fdb83d322f306219408c04
-
Filesize
89KB
MD5b90359c56eb450159497c817b8364a00
SHA15a6f98fb856be9eba1628c2bca56677e7e5aabd7
SHA256b68e0bcf1d0b705e486db37fa8851a4f91f3d74c92b644b0af8d97ecfbda849f
SHA51217ef6a837be88a66e39a783c76a3cb219696d5ee845943f324a09eed66f216c26d16a6a522a744513e07832c7e20e5e9b5bf0abc18382817411cf4cbcbe37bbb
-
Filesize
89KB
MD5f68ba2853cf607de57ff691285cca031
SHA19625b517b327d860e9fb9f7f64475969655c58e7
SHA2564ebb165a0be841f3715c8b95f4a6b67e33973aea299597353602dea6404b6ed4
SHA512af9dda87d361448c0a6160bb85e684f33411f0ed56c8c23380fbf808416795952f70657168de4aaa0873a2c136a01b76a7969169b2c51d3fead11cb1ae7e6c61
-
Filesize
89KB
MD5d2cc21a18ecf6bd3210a47967a6169ab
SHA1f3e0945422299f84d0e5c1e8509230e83610c09e
SHA256a39ddc29ec58db4f8951a7df995a77d4473b20409992c43f0b35132d9ea0aaf4
SHA5121dd536f139064a5581ca3214124755b28ba05e086295593686fc9edb2a93c92587decda05cf308badb9e0e99479de42406c3fc4bf372f14673568e87d9b27aba
-
Filesize
89KB
MD52fd1f7c96274025180f04148fc460374
SHA197d4912356a21c0c9de8f30a2f3d0ce0f3fda5f6
SHA25609d40cbbf1ec05b47df721ff6ec3ee5273850c52617737830401048f6b7ad0bd
SHA512aee6d508ece4af1d323cf65a507144355b778e935372e883d5fc3e8e8d2570eeebeedee183e76797ca7a1eda36d8392673f992a8f19972db5f94bc823b850834
-
Filesize
89KB
MD59da10fad7f0a2d50c90a87d86e42903b
SHA109cf1b3872b4f68a9d5b3ee82ccbaf57f06f70dc
SHA256bd86a4c284f92e7f565338bef37c2d466077560bea3d20997c4efd619e161b2d
SHA512bf83461696e44a1cc27455bf9d447e483a510c87c277bd85b2b4a1a6465330ee2bb28bafe27bc1723f0df017f68557fbacfd8325d2e9019d36988fab4102a81c
-
Filesize
89KB
MD582396366e89761b344e3ac7152a4e3f7
SHA11df03a6fb03f3db8605d8689c028cc976722bfec
SHA256a8c42fdac3eec49c5668513008d79bb159c9129ef0875d93baeea921b6d23a6f
SHA512317732b9778f523107f767f6563504686258f7a21408718b5a8993febb6656160de55dad896c2ec5b6b56f293ba3995dc26a5607d33e0fb9ad7cc755f04b7e4c
-
Filesize
89KB
MD53a39f061ab0299d25a9248af59b00f5c
SHA1a3ba309afe7804406d948f533bf7129033e6eb85
SHA2567c24454b0eab9b43193a11f6a50f26b28b1129d90b30244b8b8734a442a27838
SHA512d19769d773071a3f355c13402bf4149787e52ef8ce8449d458fb8cbcd02d92375d69ef30030289298c289e2bd7aa948e9433896cd5fac2d43db95b5358b9be9a
-
Filesize
89KB
MD52d94c1bc99e47cfac7a47fee752310d6
SHA1f9978949af76c6169bfd577632fdd65010fc24a6
SHA256b2f89845171b32cbe2ad8d50264e029905393b24877ace9e4449764329c53572
SHA512f18edddf4e0a15cf8a2bce2ca48dcd4598809792691443b2e0ee136d56fb493ed239da6047ce9ab0dbda5c0576f1f063067a5aefa07f57f85aac8e12b72849c7