Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
03d01744fec2852ae75a0ed49292ec40N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
03d01744fec2852ae75a0ed49292ec40N.exe
Resource
win10v2004-20240802-en
General
-
Target
03d01744fec2852ae75a0ed49292ec40N.exe
-
Size
76KB
-
MD5
03d01744fec2852ae75a0ed49292ec40
-
SHA1
8ff036840927a847b31a2212dc455ac52629cf21
-
SHA256
c6578de95df5f9c03987e5780543b4c10ca1235bfe304bce9f01cc4c2e9d26eb
-
SHA512
c53460563f8aec06b8b3b34f5007cb93a69bd1085d7ab0c5ea0501840cba7c2ef61994b8caeeccfb5cdb32720a2a3298a0f42c96850c83f0953801323254b49c
-
SSDEEP
384:vbLwOs8AHsc4sMfwhKQLrok4/CFsrdOI1Nb7g7FX7XYfruVDtM9tQ/FKlnVwU1:vvw9816vhKQLrok4/wQRNrfrunMxVD
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D25B781-5C2D-44fa-A1E4-BF45C2535154} {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2E823E3D-01A9-45b0-83FD-CC5C9F25775A} {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AD2A63FB-7C4F-486f-B52E-2054F30323A8}\stubpath = "C:\\Windows\\{AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe" {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{195BF46C-49F8-4fc2-BA3D-5627B3B43FC3} {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{036A8C69-B5DA-442b-9CE6-3AE729C5B77D} {024D459B-7801-42e6-9257-FD1B626D01CE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C} 03d01744fec2852ae75a0ed49292ec40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D25B781-5C2D-44fa-A1E4-BF45C2535154}\stubpath = "C:\\Windows\\{7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe" {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2E823E3D-01A9-45b0-83FD-CC5C9F25775A}\stubpath = "C:\\Windows\\{2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe" {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AD2A63FB-7C4F-486f-B52E-2054F30323A8} {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB} {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}\stubpath = "C:\\Windows\\{A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}.exe" {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3CB71EB5-99A4-45b0-80E8-68074E5219BA}\stubpath = "C:\\Windows\\{3CB71EB5-99A4-45b0-80E8-68074E5219BA}.exe" {A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{024D459B-7801-42e6-9257-FD1B626D01CE}\stubpath = "C:\\Windows\\{024D459B-7801-42e6-9257-FD1B626D01CE}.exe" {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{036A8C69-B5DA-442b-9CE6-3AE729C5B77D}\stubpath = "C:\\Windows\\{036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe" {024D459B-7801-42e6-9257-FD1B626D01CE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}\stubpath = "C:\\Windows\\{6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe" 03d01744fec2852ae75a0ed49292ec40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}\stubpath = "C:\\Windows\\{195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe" {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{024D459B-7801-42e6-9257-FD1B626D01CE} {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3CB71EB5-99A4-45b0-80E8-68074E5219BA} {A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}.exe -
Deletes itself 1 IoCs
pid Process 2588 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2440 {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe 2952 {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe 2612 {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe 2608 {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe 2860 {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe 2548 {024D459B-7801-42e6-9257-FD1B626D01CE}.exe 2280 {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe 536 {A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}.exe 2028 {3CB71EB5-99A4-45b0-80E8-68074E5219BA}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe File created C:\Windows\{036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe {024D459B-7801-42e6-9257-FD1B626D01CE}.exe File created C:\Windows\{3CB71EB5-99A4-45b0-80E8-68074E5219BA}.exe {A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}.exe File created C:\Windows\{6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe 03d01744fec2852ae75a0ed49292ec40N.exe File created C:\Windows\{7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe File created C:\Windows\{AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe File created C:\Windows\{195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe File created C:\Windows\{024D459B-7801-42e6-9257-FD1B626D01CE}.exe {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe File created C:\Windows\{A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}.exe {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03d01744fec2852ae75a0ed49292ec40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {024D459B-7801-42e6-9257-FD1B626D01CE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3CB71EB5-99A4-45b0-80E8-68074E5219BA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 848 03d01744fec2852ae75a0ed49292ec40N.exe Token: SeIncBasePriorityPrivilege 2440 {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe Token: SeIncBasePriorityPrivilege 2952 {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe Token: SeIncBasePriorityPrivilege 2612 {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe Token: SeIncBasePriorityPrivilege 2608 {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe Token: SeIncBasePriorityPrivilege 2860 {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe Token: SeIncBasePriorityPrivilege 2548 {024D459B-7801-42e6-9257-FD1B626D01CE}.exe Token: SeIncBasePriorityPrivilege 2280 {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe Token: SeIncBasePriorityPrivilege 536 {A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 2440 848 03d01744fec2852ae75a0ed49292ec40N.exe 28 PID 848 wrote to memory of 2440 848 03d01744fec2852ae75a0ed49292ec40N.exe 28 PID 848 wrote to memory of 2440 848 03d01744fec2852ae75a0ed49292ec40N.exe 28 PID 848 wrote to memory of 2440 848 03d01744fec2852ae75a0ed49292ec40N.exe 28 PID 848 wrote to memory of 2588 848 03d01744fec2852ae75a0ed49292ec40N.exe 29 PID 848 wrote to memory of 2588 848 03d01744fec2852ae75a0ed49292ec40N.exe 29 PID 848 wrote to memory of 2588 848 03d01744fec2852ae75a0ed49292ec40N.exe 29 PID 848 wrote to memory of 2588 848 03d01744fec2852ae75a0ed49292ec40N.exe 29 PID 2440 wrote to memory of 2952 2440 {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe 30 PID 2440 wrote to memory of 2952 2440 {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe 30 PID 2440 wrote to memory of 2952 2440 {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe 30 PID 2440 wrote to memory of 2952 2440 {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe 30 PID 2440 wrote to memory of 1136 2440 {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe 31 PID 2440 wrote to memory of 1136 2440 {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe 31 PID 2440 wrote to memory of 1136 2440 {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe 31 PID 2440 wrote to memory of 1136 2440 {6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe 31 PID 2952 wrote to memory of 2612 2952 {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe 32 PID 2952 wrote to memory of 2612 2952 {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe 32 PID 2952 wrote to memory of 2612 2952 {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe 32 PID 2952 wrote to memory of 2612 2952 {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe 32 PID 2952 wrote to memory of 2660 2952 {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe 33 PID 2952 wrote to memory of 2660 2952 {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe 33 PID 2952 wrote to memory of 2660 2952 {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe 33 PID 2952 wrote to memory of 2660 2952 {7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe 33 PID 2612 wrote to memory of 2608 2612 {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe 34 PID 2612 wrote to memory of 2608 2612 {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe 34 PID 2612 wrote to memory of 2608 2612 {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe 34 PID 2612 wrote to memory of 2608 2612 {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe 34 PID 2612 wrote to memory of 2512 2612 {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe 35 PID 2612 wrote to memory of 2512 2612 {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe 35 PID 2612 wrote to memory of 2512 2612 {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe 35 PID 2612 wrote to memory of 2512 2612 {2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe 35 PID 2608 wrote to memory of 2860 2608 {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe 36 PID 2608 wrote to memory of 2860 2608 {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe 36 PID 2608 wrote to memory of 2860 2608 {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe 36 PID 2608 wrote to memory of 2860 2608 {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe 36 PID 2608 wrote to memory of 2640 2608 {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe 37 PID 2608 wrote to memory of 2640 2608 {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe 37 PID 2608 wrote to memory of 2640 2608 {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe 37 PID 2608 wrote to memory of 2640 2608 {AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe 37 PID 2860 wrote to memory of 2548 2860 {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe 38 PID 2860 wrote to memory of 2548 2860 {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe 38 PID 2860 wrote to memory of 2548 2860 {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe 38 PID 2860 wrote to memory of 2548 2860 {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe 38 PID 2860 wrote to memory of 2672 2860 {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe 39 PID 2860 wrote to memory of 2672 2860 {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe 39 PID 2860 wrote to memory of 2672 2860 {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe 39 PID 2860 wrote to memory of 2672 2860 {195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe 39 PID 2548 wrote to memory of 2280 2548 {024D459B-7801-42e6-9257-FD1B626D01CE}.exe 40 PID 2548 wrote to memory of 2280 2548 {024D459B-7801-42e6-9257-FD1B626D01CE}.exe 40 PID 2548 wrote to memory of 2280 2548 {024D459B-7801-42e6-9257-FD1B626D01CE}.exe 40 PID 2548 wrote to memory of 2280 2548 {024D459B-7801-42e6-9257-FD1B626D01CE}.exe 40 PID 2548 wrote to memory of 2772 2548 {024D459B-7801-42e6-9257-FD1B626D01CE}.exe 41 PID 2548 wrote to memory of 2772 2548 {024D459B-7801-42e6-9257-FD1B626D01CE}.exe 41 PID 2548 wrote to memory of 2772 2548 {024D459B-7801-42e6-9257-FD1B626D01CE}.exe 41 PID 2548 wrote to memory of 2772 2548 {024D459B-7801-42e6-9257-FD1B626D01CE}.exe 41 PID 2280 wrote to memory of 536 2280 {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe 42 PID 2280 wrote to memory of 536 2280 {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe 42 PID 2280 wrote to memory of 536 2280 {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe 42 PID 2280 wrote to memory of 536 2280 {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe 42 PID 2280 wrote to memory of 468 2280 {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe 43 PID 2280 wrote to memory of 468 2280 {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe 43 PID 2280 wrote to memory of 468 2280 {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe 43 PID 2280 wrote to memory of 468 2280 {036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\03d01744fec2852ae75a0ed49292ec40N.exe"C:\Users\Admin\AppData\Local\Temp\03d01744fec2852ae75a0ed49292ec40N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\{6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exeC:\Windows\{6832A1C5-F9BB-47b1-9B5B-224A23BF5A7C}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\{7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exeC:\Windows\{7D25B781-5C2D-44fa-A1E4-BF45C2535154}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\{2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exeC:\Windows\{2E823E3D-01A9-45b0-83FD-CC5C9F25775A}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\{AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exeC:\Windows\{AD2A63FB-7C4F-486f-B52E-2054F30323A8}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\{195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exeC:\Windows\{195BF46C-49F8-4fc2-BA3D-5627B3B43FC3}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\{024D459B-7801-42e6-9257-FD1B626D01CE}.exeC:\Windows\{024D459B-7801-42e6-9257-FD1B626D01CE}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\{036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exeC:\Windows\{036A8C69-B5DA-442b-9CE6-3AE729C5B77D}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\{A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}.exeC:\Windows\{A6A04355-0F06-4d2c-9D59-C7DED9EF9DFB}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\{3CB71EB5-99A4-45b0-80E8-68074E5219BA}.exeC:\Windows\{3CB71EB5-99A4-45b0-80E8-68074E5219BA}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6A04~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{036A8~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{024D4~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{195BF~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AD2A6~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2E823~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D25B~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6832A~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\03D017~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5e37c71e7f66d9fa0b126eb14605e8fb1
SHA1ad7eee9f762638415f10ff4e613427ac76f13bd5
SHA256769da25d3de93c4b3e6d5499b6d7cf6c035c326bd5252902ecef3d4712c5052f
SHA5120b231dce20ba4d8e0b8b00ea2850f6f0896fbcb743dcc070f8f0bb68693c9e8e549b86130e31cd7a0569c69cc38c98cc7944d0f10e1d3d8f7e74b318a70246f7
-
Filesize
76KB
MD5597cba31be9aa40130d146abe80d7bef
SHA19ba45c0d869e521c0997a82777ff81ab2787a2bc
SHA256a3eb1e87adf4b59f67cd8f0ac6ad67cc653b7ff40d461bf074a772b6f43b68f3
SHA512a9215214657590ed81d883f41312add0d19a1080b13b5a37de151ffedf694bf5811b9771f076620825ec691938698658d8e5dac1f5f5c44be308ccb5de4b0227
-
Filesize
76KB
MD52deae89cedd3f6cbf7894ec341f5871e
SHA11755707698707bf7d116daaecab936c45c455553
SHA256c18531dc17e7b7843c39034cfbbf3aa8bd599ddc6bab40ab7af33df8fac18dec
SHA5127396323f9a166741404ae26216f5264609e619f9e4a3366b9c878504967a7f95dca5551398f280727faee649ff2c49c54d3addf86689444e6f811ab1e6ad7c05
-
Filesize
76KB
MD520ac39955e0d4ff77bf61aabb3fcf4bc
SHA18417e103a753dce16c664b9661938509f7482759
SHA2564e537c0a84eea60624caf54034b5cb3d8295dc4732ea4aced2c8075e9c72cf6e
SHA5120a3b45e2ce93ddc9d86a185d2715679c29070b5613d0340da4d15547fe81e724a5b4bce47274d9f07761242c29eb5e4e52191d9569d4a5a6e387a36479f0c046
-
Filesize
76KB
MD527b49854eef9c5c92b378eaf5fe935ef
SHA13f129a61d17efdba291fc7b9f0abbe90f562b06a
SHA2568f05500d82813f1b75e76f3b03754cae741347e8eea4ec40523032b65ce83dda
SHA5129e606a9e5d5e94f4fd464b6078144c250c30dd0e60dd33e74dfff9e29c6c26b0cd819db2583543f7add85b0f379fa008fc99e3db8974374a1839acab972d964e
-
Filesize
76KB
MD5aaede7f9d037b46f56c2fbbecf1c10e4
SHA1a76b500fe1a748f196c65882c4330035b340c150
SHA256aeb0a07ef01ded67f83f9733f47ae366ae4253c19887e06ce703a59046eb1f4c
SHA512619c0dc581d0da34fab5c6727dd303c35b1a657c513cdc25b486a8c0adfa8258c3696f17714b70ec2ed629de4272ff4b74e09bdaf9e05d096b686ef9fb120ae2
-
Filesize
76KB
MD54303f5657ed8566933a574b4eaf8c59c
SHA17a04a41d82f27e5c088d774f431687975cb23c67
SHA25693c649e448fa74603ee6d3efa29cbcab6c48b2786f8246a38643b91abb49513c
SHA512ce24de0e91b704d4dbcd81e496bfa7fc358f42ee0c5ae6be8932424b8519262ef49dcc584a9cf0d251a791e930640736603e75a100ad6f0a2ff377fc798d5450
-
Filesize
76KB
MD530829946a2211366e58c2044c39ae1a0
SHA107416020b784a3c9c53f949173130a1ac41ab1e1
SHA256bff04b8e14f33860603db6175e5a9427301358352e071f9694afaedfe1a0a10d
SHA5127b880a4f86643554361b59f18887219bfc6156f66a1240781c76eb4733e47c599945e53ebfe1ed0e6ee4f52df0f68736b5c2d16972a71cb6a8e1e8f5af2d034b
-
Filesize
76KB
MD56254bdf794933b5ffac10c3ecccf6304
SHA12b7d3b81374ee525f70253f377a655317c451cd9
SHA2569803c8e8fd127901149613b8b3ebfcb5714866a59f65b6bf0c90882df1a1051e
SHA512e6eef58e0a273f3f2fa0846a280a9f23dea881362861e37346dde79cf2484bb5b1c4b4c84b38b4b406b428d26ef970a90f74b1bb4b66fc40211e518316096710