Analysis
-
max time kernel
118s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe
Resource
win10v2004-20240802-en
General
-
Target
3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe
-
Size
89KB
-
MD5
0d0fbd64b0015e9a99e1462c9276c050
-
SHA1
1c2a60ec872e3aa7c79325748512bec390f1ffc2
-
SHA256
3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684
-
SHA512
4903f02c33fc27ab9e6619e8f6a8b02136c53f2c4343cd4fa6c0018d86765c13aef5897d4ea46a2476a8157b662878e78087d633aed6a64578a5b913b0b3a6d9
-
SSDEEP
768:Qvw9816vhKQLroH4/wQRNrfrunMxVFA3b7gl5:YEGh0oHl2unMxVS3HgX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{623332CC-07EE-4f81-98A4-22A28F64D7CA}\stubpath = "C:\\Windows\\{623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe" 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1146574D-9B30-45f1-9DAF-2C0C1D53880E} {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72D3C665-CC0D-4dfe-B817-0F089AD6F607} {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{99CC3B6B-2E80-44d9-A3DA-E516BB221174} {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B9118A9F-7B78-4e11-9CD2-8685196D1971} {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{39705BF6-6E57-418b-B824-D185ACD49DDE} {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BEB50F86-C4D7-492c-92FD-FCE5801C9A0C} {9E21709B-9762-4013-95DD-4F852A227B18}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}\stubpath = "C:\\Windows\\{BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe" {9E21709B-9762-4013-95DD-4F852A227B18}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E02B9B85-AA72-41f1-A383-A5748E342C6F} {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{39705BF6-6E57-418b-B824-D185ACD49DDE}\stubpath = "C:\\Windows\\{39705BF6-6E57-418b-B824-D185ACD49DDE}.exe" {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1146574D-9B30-45f1-9DAF-2C0C1D53880E}\stubpath = "C:\\Windows\\{1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe" {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{99CC3B6B-2E80-44d9-A3DA-E516BB221174}\stubpath = "C:\\Windows\\{99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe" {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B9118A9F-7B78-4e11-9CD2-8685196D1971}\stubpath = "C:\\Windows\\{B9118A9F-7B78-4e11-9CD2-8685196D1971}.exe" {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72D3C665-CC0D-4dfe-B817-0F089AD6F607}\stubpath = "C:\\Windows\\{72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe" {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{623332CC-07EE-4f81-98A4-22A28F64D7CA} 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E21709B-9762-4013-95DD-4F852A227B18} {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E21709B-9762-4013-95DD-4F852A227B18}\stubpath = "C:\\Windows\\{9E21709B-9762-4013-95DD-4F852A227B18}.exe" {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E02B9B85-AA72-41f1-A383-A5748E342C6F}\stubpath = "C:\\Windows\\{E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe" {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe -
Executes dropped EXE 9 IoCs
pid Process 4924 {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe 3096 {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe 4904 {9E21709B-9762-4013-95DD-4F852A227B18}.exe 2492 {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe 1480 {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe 3740 {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe 3100 {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe 3752 {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe 1924 {B9118A9F-7B78-4e11-9CD2-8685196D1971}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe {9E21709B-9762-4013-95DD-4F852A227B18}.exe File created C:\Windows\{72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe File created C:\Windows\{9E21709B-9762-4013-95DD-4F852A227B18}.exe {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe File created C:\Windows\{1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe File created C:\Windows\{E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe File created C:\Windows\{99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe File created C:\Windows\{B9118A9F-7B78-4e11-9CD2-8685196D1971}.exe {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe File created C:\Windows\{623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe File created C:\Windows\{39705BF6-6E57-418b-B824-D185ACD49DDE}.exe {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9E21709B-9762-4013-95DD-4F852A227B18}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B9118A9F-7B78-4e11-9CD2-8685196D1971}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4220 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe Token: SeIncBasePriorityPrivilege 4924 {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe Token: SeIncBasePriorityPrivilege 3096 {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe Token: SeIncBasePriorityPrivilege 4904 {9E21709B-9762-4013-95DD-4F852A227B18}.exe Token: SeIncBasePriorityPrivilege 2492 {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe Token: SeIncBasePriorityPrivilege 1480 {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe Token: SeIncBasePriorityPrivilege 3740 {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe Token: SeIncBasePriorityPrivilege 3100 {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe Token: SeIncBasePriorityPrivilege 3752 {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4220 wrote to memory of 4924 4220 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe 89 PID 4220 wrote to memory of 4924 4220 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe 89 PID 4220 wrote to memory of 4924 4220 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe 89 PID 4220 wrote to memory of 1444 4220 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe 90 PID 4220 wrote to memory of 1444 4220 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe 90 PID 4220 wrote to memory of 1444 4220 3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe 90 PID 4924 wrote to memory of 3096 4924 {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe 91 PID 4924 wrote to memory of 3096 4924 {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe 91 PID 4924 wrote to memory of 3096 4924 {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe 91 PID 4924 wrote to memory of 5052 4924 {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe 92 PID 4924 wrote to memory of 5052 4924 {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe 92 PID 4924 wrote to memory of 5052 4924 {623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe 92 PID 3096 wrote to memory of 4904 3096 {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe 95 PID 3096 wrote to memory of 4904 3096 {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe 95 PID 3096 wrote to memory of 4904 3096 {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe 95 PID 3096 wrote to memory of 5080 3096 {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe 96 PID 3096 wrote to memory of 5080 3096 {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe 96 PID 3096 wrote to memory of 5080 3096 {39705BF6-6E57-418b-B824-D185ACD49DDE}.exe 96 PID 4904 wrote to memory of 2492 4904 {9E21709B-9762-4013-95DD-4F852A227B18}.exe 97 PID 4904 wrote to memory of 2492 4904 {9E21709B-9762-4013-95DD-4F852A227B18}.exe 97 PID 4904 wrote to memory of 2492 4904 {9E21709B-9762-4013-95DD-4F852A227B18}.exe 97 PID 4904 wrote to memory of 4004 4904 {9E21709B-9762-4013-95DD-4F852A227B18}.exe 98 PID 4904 wrote to memory of 4004 4904 {9E21709B-9762-4013-95DD-4F852A227B18}.exe 98 PID 4904 wrote to memory of 4004 4904 {9E21709B-9762-4013-95DD-4F852A227B18}.exe 98 PID 2492 wrote to memory of 1480 2492 {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe 99 PID 2492 wrote to memory of 1480 2492 {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe 99 PID 2492 wrote to memory of 1480 2492 {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe 99 PID 2492 wrote to memory of 4656 2492 {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe 100 PID 2492 wrote to memory of 4656 2492 {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe 100 PID 2492 wrote to memory of 4656 2492 {BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe 100 PID 1480 wrote to memory of 3740 1480 {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe 101 PID 1480 wrote to memory of 3740 1480 {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe 101 PID 1480 wrote to memory of 3740 1480 {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe 101 PID 1480 wrote to memory of 2868 1480 {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe 102 PID 1480 wrote to memory of 2868 1480 {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe 102 PID 1480 wrote to memory of 2868 1480 {1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe 102 PID 3740 wrote to memory of 3100 3740 {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe 103 PID 3740 wrote to memory of 3100 3740 {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe 103 PID 3740 wrote to memory of 3100 3740 {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe 103 PID 3740 wrote to memory of 3312 3740 {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe 104 PID 3740 wrote to memory of 3312 3740 {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe 104 PID 3740 wrote to memory of 3312 3740 {E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe 104 PID 3100 wrote to memory of 3752 3100 {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe 105 PID 3100 wrote to memory of 3752 3100 {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe 105 PID 3100 wrote to memory of 3752 3100 {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe 105 PID 3100 wrote to memory of 2556 3100 {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe 106 PID 3100 wrote to memory of 2556 3100 {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe 106 PID 3100 wrote to memory of 2556 3100 {72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe 106 PID 3752 wrote to memory of 1924 3752 {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe 107 PID 3752 wrote to memory of 1924 3752 {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe 107 PID 3752 wrote to memory of 1924 3752 {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe 107 PID 3752 wrote to memory of 2560 3752 {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe 108 PID 3752 wrote to memory of 2560 3752 {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe 108 PID 3752 wrote to memory of 2560 3752 {99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe"C:\Users\Admin\AppData\Local\Temp\3fbcc5d5735daec411232bb5fcf468768abb48677def66d6737c531800e44684N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\{623332CC-07EE-4f81-98A4-22A28F64D7CA}.exeC:\Windows\{623332CC-07EE-4f81-98A4-22A28F64D7CA}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\{39705BF6-6E57-418b-B824-D185ACD49DDE}.exeC:\Windows\{39705BF6-6E57-418b-B824-D185ACD49DDE}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\{9E21709B-9762-4013-95DD-4F852A227B18}.exeC:\Windows\{9E21709B-9762-4013-95DD-4F852A227B18}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\{BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exeC:\Windows\{BEB50F86-C4D7-492c-92FD-FCE5801C9A0C}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\{1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exeC:\Windows\{1146574D-9B30-45f1-9DAF-2C0C1D53880E}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\{E02B9B85-AA72-41f1-A383-A5748E342C6F}.exeC:\Windows\{E02B9B85-AA72-41f1-A383-A5748E342C6F}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\{72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exeC:\Windows\{72D3C665-CC0D-4dfe-B817-0F089AD6F607}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\{99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exeC:\Windows\{99CC3B6B-2E80-44d9-A3DA-E516BB221174}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\{B9118A9F-7B78-4e11-9CD2-8685196D1971}.exeC:\Windows\{B9118A9F-7B78-4e11-9CD2-8685196D1971}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{99CC3~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72D3C~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E02B9~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11465~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BEB50~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E217~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39705~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{62333~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\3FBCC5~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD59b819b8fd28966ea5e3fa0ab36011841
SHA17ae017c0ff99f15a15f975051f151c8699d73cba
SHA2560e2c401db5c140cfd37d8edded1b13add4f72886537fbaed180c11aa5630c66f
SHA51296ae0ebd5cca5f1fb55f527b82c733b5d33e8af97ee5ccdc1bda83a5970c2fcd8f093b828234a80e305ea4dd8f5c7635b1344f19469ed9749d4477a404230588
-
Filesize
89KB
MD58812b3a67d814eb2ddc47e01bffbf592
SHA1817bfb47b76ae0d6796f1e5d8a24bf7d6256fdca
SHA25612489eb874786d0271bd1563921c900dabea31f1d946a49c853922aa267b43fa
SHA5121d8fe08923d3c352253255b1c9ee90adc1e17da3982c69956b09879077d436858a41cf74a8b20ebb2725655ce2d41a71759494b14cac4e2d29a0a97b0c01e10c
-
Filesize
89KB
MD52dcc4177c4a9bcbbc28083a3c5cfdaf1
SHA18f8ba40aa88824ea5ec00be2cd078ee34e04d8f6
SHA25679895804e2c7bbc013a0eb3ee8b7b2be21b332aa4b0c54eecd5bb8b5498a9ee6
SHA512914bea88076d1116ac16fe0aac10bf908b009ea8d62df2967fb0586f5e08b45d8b848ba4e46bc9bf57223faf8c22dc9a44abd6473b4e5f00edc9b01c86c4fd69
-
Filesize
89KB
MD5bc45b76ff4188572843806aa9a600cd0
SHA17d931c1ee821b8d576ab9b4292c774eaf404ebd6
SHA2567cbdc45fbc84d76291abca1730b2347c62a20e1f8287a6322a4a4feff2df4460
SHA51205db5ba32936189dab970761910ea95b1d2cdf44132649eab11e6188be4546c65ddcc3b1dd227f96f4a0df4b16f1a0803632377b4349d715c22892c74d34ef93
-
Filesize
89KB
MD5e0c60f1a4209aa885a8e5622d872d558
SHA162c85da628921559bd96718285d2d190e830714c
SHA256917ddda690c0efddfd1cb6e2066f00004da24577d42f089a5adbb8253c552c31
SHA5121d50cb6e90b6c8117fffa03d6512575e35982412d9df39895634064cbd979e4f4b8c79304d79a3724ae5826e009a7ab8f21eff797a01e95b84662d1d2d9e764f
-
Filesize
89KB
MD5db1c2b3f5492c1f07675411489b16b24
SHA1886536e881d1b47d1f85d687dc8d22360bf4d0da
SHA256da8a6a3b4bba1e9a96f0507e2a6576a98fcd6b95c8abe930a5cc039c7791274a
SHA5128a6748df5dd155ee910b9bfc29cb42105f9555cb57a1e4d81deee72c49252ea0b792d2fb401f858aae35f6e2680a496ed760f31dddceee6b646a6766dd97edd6
-
Filesize
89KB
MD551f3ed5ef854acae73d5d59b471ab3eb
SHA17970b21c179c5922cf6b3c9c79824497ee18f852
SHA2567479555d6769bb51bb677767f636a8e8888fa39dfd0dfcac5b972383a0002570
SHA512a46362c01f7c794317ffa69311a1de04b63f80eb9de06fd9faa4d64648dc5d249f81676a576d0754237850308dddf35a85700eef3616c5861b57d8c367a0616b
-
Filesize
89KB
MD50add3e7529de798e6e34c2895fd3ccc7
SHA1b939e2f59e7717665d50c47f96209591296b5433
SHA25618ab67b7211461f0294558d3b7e6ceee3b6ff120416b561977303eab78f918f8
SHA5127bc0f812f1a0f1fd7e365fff9b8f8af9b794c29611f1af6f6fecf6a037ad303010cd9e2b1227e72d7292c2332d04dccfc4a6ebafaa5bea9c6ac5ff017442591a
-
Filesize
89KB
MD5a000242a3b0d031ccd12411b204fe550
SHA10fae5782df4fe64564da58fb85023e96c8dd6c61
SHA2563808bbc6b29480854f46a3f8e6d822a8ff1339eca3f4618ab285eca6ede9eb2c
SHA5126ceb1c8a237d2ea13995c6081402103437b5c67e3f10f16a4e95f577b26a40b1780b16e0998a6b8ad95687ab79a0308a129d2101ed12027861b25fdc42b8aa73