Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
d2bcbac35f41f5aded96daddeaf487c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d2bcbac35f41f5aded96daddeaf487c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d2bcbac35f41f5aded96daddeaf487c0N.exe
-
Size
90KB
-
MD5
d2bcbac35f41f5aded96daddeaf487c0
-
SHA1
f964f199df20967753dabffa6a79cbd3a77cd084
-
SHA256
a760075e88412733791beff8544b0fa177922633adf2a95e26c0c5ba0044bef7
-
SHA512
5a904cee1a5b60947574b217ca899d9b6857a3c56e679ef66fa858c44af7be733148ee0fad888cbd195380521de78e1bf38a49dd950df27a5dee7a18a8df3ed3
-
SSDEEP
768:Qvw9816vhKQLroO4/wQRNrfrunMxVFA3b7glw:YEGh0oOl2unMxVS3Hg
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E03D7939-81F0-4169-B7BB-5BA538E44460} {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{99F45009-CA36-47c6-9EAC-CD662B59EE3D}\stubpath = "C:\\Windows\\{99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe" {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54D2FF4A-D197-4ae2-B12E-32BD101CED31}\stubpath = "C:\\Windows\\{54D2FF4A-D197-4ae2-B12E-32BD101CED31}.exe" {FFC6E689-4FE9-4600-92B0-0DF07FF585C5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{24877D61-2D4F-4dd3-89C8-B319F525CB8A}\stubpath = "C:\\Windows\\{24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe" {96BFE688-B02D-427c-A983-62B159817E01}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D93EE03E-D070-46dc-B2AF-E33B42EEF0C9} {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{99F45009-CA36-47c6-9EAC-CD662B59EE3D} {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54D2FF4A-D197-4ae2-B12E-32BD101CED31} {FFC6E689-4FE9-4600-92B0-0DF07FF585C5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{96BFE688-B02D-427c-A983-62B159817E01}\stubpath = "C:\\Windows\\{96BFE688-B02D-427c-A983-62B159817E01}.exe" d2bcbac35f41f5aded96daddeaf487c0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{24877D61-2D4F-4dd3-89C8-B319F525CB8A} {96BFE688-B02D-427c-A983-62B159817E01}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CD96376B-B7AE-46fa-9270-B894A3D26ED9} {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CD96376B-B7AE-46fa-9270-B894A3D26ED9}\stubpath = "C:\\Windows\\{CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe" {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E03D7939-81F0-4169-B7BB-5BA538E44460}\stubpath = "C:\\Windows\\{E03D7939-81F0-4169-B7BB-5BA538E44460}.exe" {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FFC6E689-4FE9-4600-92B0-0DF07FF585C5}\stubpath = "C:\\Windows\\{FFC6E689-4FE9-4600-92B0-0DF07FF585C5}.exe" {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{96BFE688-B02D-427c-A983-62B159817E01} d2bcbac35f41f5aded96daddeaf487c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}\stubpath = "C:\\Windows\\{D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe" {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07C526AF-0FB0-4010-9E90-F5E3137A1D8D} {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07C526AF-0FB0-4010-9E90-F5E3137A1D8D}\stubpath = "C:\\Windows\\{07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe" {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FFC6E689-4FE9-4600-92B0-0DF07FF585C5} {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe -
Deletes itself 1 IoCs
pid Process 2532 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2692 {96BFE688-B02D-427c-A983-62B159817E01}.exe 2572 {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe 2760 {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe 2820 {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe 2648 {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe 1928 {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe 1620 {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe 1232 {FFC6E689-4FE9-4600-92B0-0DF07FF585C5}.exe 2244 {54D2FF4A-D197-4ae2-B12E-32BD101CED31}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe File created C:\Windows\{54D2FF4A-D197-4ae2-B12E-32BD101CED31}.exe {FFC6E689-4FE9-4600-92B0-0DF07FF585C5}.exe File created C:\Windows\{96BFE688-B02D-427c-A983-62B159817E01}.exe d2bcbac35f41f5aded96daddeaf487c0N.exe File created C:\Windows\{24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe {96BFE688-B02D-427c-A983-62B159817E01}.exe File created C:\Windows\{E03D7939-81F0-4169-B7BB-5BA538E44460}.exe {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe File created C:\Windows\{99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe File created C:\Windows\{FFC6E689-4FE9-4600-92B0-0DF07FF585C5}.exe {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe File created C:\Windows\{CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe File created C:\Windows\{D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {54D2FF4A-D197-4ae2-B12E-32BD101CED31}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2bcbac35f41f5aded96daddeaf487c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {96BFE688-B02D-427c-A983-62B159817E01}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FFC6E689-4FE9-4600-92B0-0DF07FF585C5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3004 d2bcbac35f41f5aded96daddeaf487c0N.exe Token: SeIncBasePriorityPrivilege 2692 {96BFE688-B02D-427c-A983-62B159817E01}.exe Token: SeIncBasePriorityPrivilege 2572 {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe Token: SeIncBasePriorityPrivilege 2760 {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe Token: SeIncBasePriorityPrivilege 2820 {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe Token: SeIncBasePriorityPrivilege 2648 {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe Token: SeIncBasePriorityPrivilege 1928 {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe Token: SeIncBasePriorityPrivilege 1620 {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe Token: SeIncBasePriorityPrivilege 1232 {FFC6E689-4FE9-4600-92B0-0DF07FF585C5}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2692 3004 d2bcbac35f41f5aded96daddeaf487c0N.exe 31 PID 3004 wrote to memory of 2692 3004 d2bcbac35f41f5aded96daddeaf487c0N.exe 31 PID 3004 wrote to memory of 2692 3004 d2bcbac35f41f5aded96daddeaf487c0N.exe 31 PID 3004 wrote to memory of 2692 3004 d2bcbac35f41f5aded96daddeaf487c0N.exe 31 PID 3004 wrote to memory of 2532 3004 d2bcbac35f41f5aded96daddeaf487c0N.exe 32 PID 3004 wrote to memory of 2532 3004 d2bcbac35f41f5aded96daddeaf487c0N.exe 32 PID 3004 wrote to memory of 2532 3004 d2bcbac35f41f5aded96daddeaf487c0N.exe 32 PID 3004 wrote to memory of 2532 3004 d2bcbac35f41f5aded96daddeaf487c0N.exe 32 PID 2692 wrote to memory of 2572 2692 {96BFE688-B02D-427c-A983-62B159817E01}.exe 33 PID 2692 wrote to memory of 2572 2692 {96BFE688-B02D-427c-A983-62B159817E01}.exe 33 PID 2692 wrote to memory of 2572 2692 {96BFE688-B02D-427c-A983-62B159817E01}.exe 33 PID 2692 wrote to memory of 2572 2692 {96BFE688-B02D-427c-A983-62B159817E01}.exe 33 PID 2692 wrote to memory of 3016 2692 {96BFE688-B02D-427c-A983-62B159817E01}.exe 34 PID 2692 wrote to memory of 3016 2692 {96BFE688-B02D-427c-A983-62B159817E01}.exe 34 PID 2692 wrote to memory of 3016 2692 {96BFE688-B02D-427c-A983-62B159817E01}.exe 34 PID 2692 wrote to memory of 3016 2692 {96BFE688-B02D-427c-A983-62B159817E01}.exe 34 PID 2572 wrote to memory of 2760 2572 {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe 35 PID 2572 wrote to memory of 2760 2572 {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe 35 PID 2572 wrote to memory of 2760 2572 {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe 35 PID 2572 wrote to memory of 2760 2572 {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe 35 PID 2572 wrote to memory of 2900 2572 {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe 36 PID 2572 wrote to memory of 2900 2572 {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe 36 PID 2572 wrote to memory of 2900 2572 {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe 36 PID 2572 wrote to memory of 2900 2572 {24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe 36 PID 2760 wrote to memory of 2820 2760 {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe 37 PID 2760 wrote to memory of 2820 2760 {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe 37 PID 2760 wrote to memory of 2820 2760 {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe 37 PID 2760 wrote to memory of 2820 2760 {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe 37 PID 2760 wrote to memory of 2880 2760 {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe 38 PID 2760 wrote to memory of 2880 2760 {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe 38 PID 2760 wrote to memory of 2880 2760 {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe 38 PID 2760 wrote to memory of 2880 2760 {CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe 38 PID 2820 wrote to memory of 2648 2820 {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe 39 PID 2820 wrote to memory of 2648 2820 {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe 39 PID 2820 wrote to memory of 2648 2820 {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe 39 PID 2820 wrote to memory of 2648 2820 {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe 39 PID 2820 wrote to memory of 2208 2820 {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe 40 PID 2820 wrote to memory of 2208 2820 {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe 40 PID 2820 wrote to memory of 2208 2820 {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe 40 PID 2820 wrote to memory of 2208 2820 {D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe 40 PID 2648 wrote to memory of 1928 2648 {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe 41 PID 2648 wrote to memory of 1928 2648 {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe 41 PID 2648 wrote to memory of 1928 2648 {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe 41 PID 2648 wrote to memory of 1928 2648 {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe 41 PID 2648 wrote to memory of 1236 2648 {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe 42 PID 2648 wrote to memory of 1236 2648 {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe 42 PID 2648 wrote to memory of 1236 2648 {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe 42 PID 2648 wrote to memory of 1236 2648 {07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe 42 PID 1928 wrote to memory of 1620 1928 {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe 43 PID 1928 wrote to memory of 1620 1928 {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe 43 PID 1928 wrote to memory of 1620 1928 {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe 43 PID 1928 wrote to memory of 1620 1928 {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe 43 PID 1928 wrote to memory of 2844 1928 {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe 44 PID 1928 wrote to memory of 2844 1928 {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe 44 PID 1928 wrote to memory of 2844 1928 {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe 44 PID 1928 wrote to memory of 2844 1928 {E03D7939-81F0-4169-B7BB-5BA538E44460}.exe 44 PID 1620 wrote to memory of 1232 1620 {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe 45 PID 1620 wrote to memory of 1232 1620 {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe 45 PID 1620 wrote to memory of 1232 1620 {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe 45 PID 1620 wrote to memory of 1232 1620 {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe 45 PID 1620 wrote to memory of 1372 1620 {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe 46 PID 1620 wrote to memory of 1372 1620 {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe 46 PID 1620 wrote to memory of 1372 1620 {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe 46 PID 1620 wrote to memory of 1372 1620 {99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2bcbac35f41f5aded96daddeaf487c0N.exe"C:\Users\Admin\AppData\Local\Temp\d2bcbac35f41f5aded96daddeaf487c0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\{96BFE688-B02D-427c-A983-62B159817E01}.exeC:\Windows\{96BFE688-B02D-427c-A983-62B159817E01}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\{24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exeC:\Windows\{24877D61-2D4F-4dd3-89C8-B319F525CB8A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\{CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exeC:\Windows\{CD96376B-B7AE-46fa-9270-B894A3D26ED9}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\{D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exeC:\Windows\{D93EE03E-D070-46dc-B2AF-E33B42EEF0C9}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\{07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exeC:\Windows\{07C526AF-0FB0-4010-9E90-F5E3137A1D8D}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\{E03D7939-81F0-4169-B7BB-5BA538E44460}.exeC:\Windows\{E03D7939-81F0-4169-B7BB-5BA538E44460}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\{99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exeC:\Windows\{99F45009-CA36-47c6-9EAC-CD662B59EE3D}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\{FFC6E689-4FE9-4600-92B0-0DF07FF585C5}.exeC:\Windows\{FFC6E689-4FE9-4600-92B0-0DF07FF585C5}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1232 -
C:\Windows\{54D2FF4A-D197-4ae2-B12E-32BD101CED31}.exeC:\Windows\{54D2FF4A-D197-4ae2-B12E-32BD101CED31}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FFC6E~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{99F45~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E03D7~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{07C52~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D93EE~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CD963~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{24877~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{96BFE~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\D2BCBA~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5e4ec3e349427784070315fcadfc7f671
SHA1f42cc2f17b1d1a5684ab5a0fdea508e0bc7dd164
SHA256a4eb48baafe584622cb6e1c6735b3ecc9507e998ec9b4be0b7efe7d6c73f3b1b
SHA512ccad4e3e0b00f08a23c3ce3ca7629834bee976fb6e9cc988a70f0f347c28a4ee1e8fadea7b8111e51714fd6a904ae4ce29b5ea29b4271e5dac7ed89e8e53dbc5
-
Filesize
90KB
MD53b0142dec494f29ab45e98c504879b9d
SHA1b3b6be2625353feb7229f47f102c7c0f293686a7
SHA256785b00424706fca00f18e81f0bea718e3c469810fef3ad83c9cdbc50f1138292
SHA51272f352f43e88e00f289331c766e9d138e9b581b6c76953497cf922b02c4811968f4671f622c135d6bb6e609728fbc03ad801df24388abad8e3f1f62a17ff0aa2
-
Filesize
90KB
MD57da166f96f635bd2dba13ff13391f922
SHA1ab313aad62bcd3d194baf6126535ef98be26095e
SHA2560c1b421a58e19b9a99d43aceaa7c168fa01dc1a2ed305ab889449a036e4a4af4
SHA51244577015e75426d16c7a897c22cf90fa8f339d75816f19bebaa13f7006b7d7211ad05802cbb9b30188923a36a69959ca13101427e47a5f82c547860163e01ca6
-
Filesize
90KB
MD526f881814e9df3f255354e8bcd43d619
SHA1634c4e17757b4914267968ff7a3f86d351a4a48b
SHA25628c1390bedd4fb206ae9a9dce99a175660cdaa1aa1a4aa82b9c9410c64de1d35
SHA512e1237b965f51fc1f8008a166b6568bee5e5eda24f02ebee34cdbe3519aad48d639ddd4dd3e6a7d2d042310d45d253d3c5360539f8a69c7bc580a12d721944620
-
Filesize
90KB
MD570512f4e2073bbb9702997456a325866
SHA1f5c862d5a5d84d78af35559e943d113957318ffc
SHA2566722b3511acfb457c1ae0e277025daf84078ba832298bb07ad9485664cebd589
SHA5125f24ce13cfa4c6aba7f6ee105f70c9a9e201cde8308b5d5f21468a840662e8ec145918421994c1c7032c1127b117d92fc40525dd77d6244f2a366aa44279bdaa
-
Filesize
90KB
MD5ab98cbc1df2fe02e4c1638472a89843a
SHA1fa88f525326cd5e5214b1ef6fbd0a081c9aaec4b
SHA256b7bc2e79f0717896f08ac9d82d9e10fe74ecfb85ab1748a9bf786ba7c97ec424
SHA512aac9a30d97a468d693304345f90e3998ae87a942da059c47e2e5f531952238d914c8871d06526ad8009cdf697bbde9ac40ce89b7c061d06978e579649c856ece
-
Filesize
90KB
MD5275062a6c6d752f29d1005ed4383728d
SHA17636dd20a5f425326a40b150246aa2d5e2bd60b3
SHA256585953b529a2fa228ac98f5a321a9c9f8589743c4d929ad47c857bea301d5f2a
SHA51234d5b10f88d927da1141bf695fffd03c54d5f6c71a0635ba1455237550f46a070a84facec030d805a7e401f1e71b830580396520f2f6fac021dd345eabd7f23e
-
Filesize
90KB
MD5083ebb30934c4b046dcaf54e19c91a0e
SHA1b3e031ff0e8f1f7aaa19cfbe544f9477e61bbce2
SHA256860c43cb73b37d2c2417acc193f9c348cce0f5c60f82278df8b256852e375058
SHA512166ad62f6b3ae978cbb6c3015b804541aa0bf60a4c36ca627095c55d3dcb59cd115a17a26d1cfa6a29f96131fea8c2fcd95e3a93f013e8756f08a42000738b19
-
Filesize
90KB
MD50c64ab66636263cf0039384bbd8d0442
SHA1202be29132c89bf004d480e379a0f6423f7fd35e
SHA256a33c5bfd7ece5a9841be3210a7403390fcce95cd47bece2e3328c937064b5d1e
SHA512622055597b129f9c40bd6852dc2dd475e3242b78c6fd7ce2e4bcad1da3307ef505b469cc8002d14ac6906219c05d73b0947eb8f6c41f13af0026aab4a90a2b6f