Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe
Resource
win10v2004-20240802-en
General
-
Target
8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe
-
Size
88KB
-
MD5
0c177329844006ca35f6b047b04b47a0
-
SHA1
9b46f040e4e49822d7fabacfd848947eef34f546
-
SHA256
8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7
-
SHA512
3d54a6c15c97852ec7735972fcf373f4e1012fba7110b34f80e5e6aa0dc29873aec6983a2810995493e35f03b3fb6a9badac17632dae3d823d3fedf6f021aa19
-
SSDEEP
768:5vw9816thKQLrob/4/wQkNrfrunMxVFA3V:lEG/0ojlbunMxVS3V
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8297B712-9A0B-4015-882C-13B3D09B5933} {995950C3-9DA6-4348-9796-08D682687EFD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3B1236BF-00CC-43f8-8602-943BB98C8637} {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A} {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}\stubpath = "C:\\Windows\\{3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}.exe" {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{020B22ED-6D58-4096-9B93-8354F760C11F} 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8297B712-9A0B-4015-882C-13B3D09B5933}\stubpath = "C:\\Windows\\{8297B712-9A0B-4015-882C-13B3D09B5933}.exe" {995950C3-9DA6-4348-9796-08D682687EFD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81054105-450F-43ff-98E6-5108E02D711A} {020B22ED-6D58-4096-9B93-8354F760C11F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81054105-450F-43ff-98E6-5108E02D711A}\stubpath = "C:\\Windows\\{81054105-450F-43ff-98E6-5108E02D711A}.exe" {020B22ED-6D58-4096-9B93-8354F760C11F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C8F35E74-9179-49ca-9D92-3D7F837B0EEF} {81054105-450F-43ff-98E6-5108E02D711A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C8F35E74-9179-49ca-9D92-3D7F837B0EEF}\stubpath = "C:\\Windows\\{C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe" {81054105-450F-43ff-98E6-5108E02D711A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{995950C3-9DA6-4348-9796-08D682687EFD} {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{995950C3-9DA6-4348-9796-08D682687EFD}\stubpath = "C:\\Windows\\{995950C3-9DA6-4348-9796-08D682687EFD}.exe" {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E10A209C-BD80-4036-B7E9-8458F5523F5C}\stubpath = "C:\\Windows\\{E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe" {8297B712-9A0B-4015-882C-13B3D09B5933}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3B1236BF-00CC-43f8-8602-943BB98C8637}\stubpath = "C:\\Windows\\{3B1236BF-00CC-43f8-8602-943BB98C8637}.exe" {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F3DB44A9-4713-45f3-8DD3-DCDD49D6F3AD} {3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{020B22ED-6D58-4096-9B93-8354F760C11F}\stubpath = "C:\\Windows\\{020B22ED-6D58-4096-9B93-8354F760C11F}.exe" 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E10A209C-BD80-4036-B7E9-8458F5523F5C} {8297B712-9A0B-4015-882C-13B3D09B5933}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F3DB44A9-4713-45f3-8DD3-DCDD49D6F3AD}\stubpath = "C:\\Windows\\{F3DB44A9-4713-45f3-8DD3-DCDD49D6F3AD}.exe" {3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}.exe -
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 1716 {020B22ED-6D58-4096-9B93-8354F760C11F}.exe 2760 {81054105-450F-43ff-98E6-5108E02D711A}.exe 2136 {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe 3044 {995950C3-9DA6-4348-9796-08D682687EFD}.exe 2924 {8297B712-9A0B-4015-882C-13B3D09B5933}.exe 3040 {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe 1200 {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe 2072 {3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}.exe 1692 {F3DB44A9-4713-45f3-8DD3-DCDD49D6F3AD}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{020B22ED-6D58-4096-9B93-8354F760C11F}.exe 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe File created C:\Windows\{C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe {81054105-450F-43ff-98E6-5108E02D711A}.exe File created C:\Windows\{995950C3-9DA6-4348-9796-08D682687EFD}.exe {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe File created C:\Windows\{8297B712-9A0B-4015-882C-13B3D09B5933}.exe {995950C3-9DA6-4348-9796-08D682687EFD}.exe File created C:\Windows\{E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe {8297B712-9A0B-4015-882C-13B3D09B5933}.exe File created C:\Windows\{3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}.exe {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe File created C:\Windows\{F3DB44A9-4713-45f3-8DD3-DCDD49D6F3AD}.exe {3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}.exe File created C:\Windows\{81054105-450F-43ff-98E6-5108E02D711A}.exe {020B22ED-6D58-4096-9B93-8354F760C11F}.exe File created C:\Windows\{3B1236BF-00CC-43f8-8602-943BB98C8637}.exe {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8297B712-9A0B-4015-882C-13B3D09B5933}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F3DB44A9-4713-45f3-8DD3-DCDD49D6F3AD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {020B22ED-6D58-4096-9B93-8354F760C11F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {81054105-450F-43ff-98E6-5108E02D711A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {995950C3-9DA6-4348-9796-08D682687EFD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2960 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe Token: SeIncBasePriorityPrivilege 1716 {020B22ED-6D58-4096-9B93-8354F760C11F}.exe Token: SeIncBasePriorityPrivilege 2760 {81054105-450F-43ff-98E6-5108E02D711A}.exe Token: SeIncBasePriorityPrivilege 2136 {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe Token: SeIncBasePriorityPrivilege 3044 {995950C3-9DA6-4348-9796-08D682687EFD}.exe Token: SeIncBasePriorityPrivilege 2924 {8297B712-9A0B-4015-882C-13B3D09B5933}.exe Token: SeIncBasePriorityPrivilege 3040 {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe Token: SeIncBasePriorityPrivilege 1200 {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe Token: SeIncBasePriorityPrivilege 2072 {3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1716 2960 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe 30 PID 2960 wrote to memory of 1716 2960 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe 30 PID 2960 wrote to memory of 1716 2960 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe 30 PID 2960 wrote to memory of 1716 2960 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe 30 PID 2960 wrote to memory of 2744 2960 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe 31 PID 2960 wrote to memory of 2744 2960 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe 31 PID 2960 wrote to memory of 2744 2960 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe 31 PID 2960 wrote to memory of 2744 2960 8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe 31 PID 1716 wrote to memory of 2760 1716 {020B22ED-6D58-4096-9B93-8354F760C11F}.exe 33 PID 1716 wrote to memory of 2760 1716 {020B22ED-6D58-4096-9B93-8354F760C11F}.exe 33 PID 1716 wrote to memory of 2760 1716 {020B22ED-6D58-4096-9B93-8354F760C11F}.exe 33 PID 1716 wrote to memory of 2760 1716 {020B22ED-6D58-4096-9B93-8354F760C11F}.exe 33 PID 1716 wrote to memory of 2424 1716 {020B22ED-6D58-4096-9B93-8354F760C11F}.exe 34 PID 1716 wrote to memory of 2424 1716 {020B22ED-6D58-4096-9B93-8354F760C11F}.exe 34 PID 1716 wrote to memory of 2424 1716 {020B22ED-6D58-4096-9B93-8354F760C11F}.exe 34 PID 1716 wrote to memory of 2424 1716 {020B22ED-6D58-4096-9B93-8354F760C11F}.exe 34 PID 2760 wrote to memory of 2136 2760 {81054105-450F-43ff-98E6-5108E02D711A}.exe 35 PID 2760 wrote to memory of 2136 2760 {81054105-450F-43ff-98E6-5108E02D711A}.exe 35 PID 2760 wrote to memory of 2136 2760 {81054105-450F-43ff-98E6-5108E02D711A}.exe 35 PID 2760 wrote to memory of 2136 2760 {81054105-450F-43ff-98E6-5108E02D711A}.exe 35 PID 2760 wrote to memory of 2672 2760 {81054105-450F-43ff-98E6-5108E02D711A}.exe 36 PID 2760 wrote to memory of 2672 2760 {81054105-450F-43ff-98E6-5108E02D711A}.exe 36 PID 2760 wrote to memory of 2672 2760 {81054105-450F-43ff-98E6-5108E02D711A}.exe 36 PID 2760 wrote to memory of 2672 2760 {81054105-450F-43ff-98E6-5108E02D711A}.exe 36 PID 2136 wrote to memory of 3044 2136 {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe 37 PID 2136 wrote to memory of 3044 2136 {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe 37 PID 2136 wrote to memory of 3044 2136 {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe 37 PID 2136 wrote to memory of 3044 2136 {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe 37 PID 2136 wrote to memory of 2148 2136 {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe 38 PID 2136 wrote to memory of 2148 2136 {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe 38 PID 2136 wrote to memory of 2148 2136 {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe 38 PID 2136 wrote to memory of 2148 2136 {C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe 38 PID 3044 wrote to memory of 2924 3044 {995950C3-9DA6-4348-9796-08D682687EFD}.exe 39 PID 3044 wrote to memory of 2924 3044 {995950C3-9DA6-4348-9796-08D682687EFD}.exe 39 PID 3044 wrote to memory of 2924 3044 {995950C3-9DA6-4348-9796-08D682687EFD}.exe 39 PID 3044 wrote to memory of 2924 3044 {995950C3-9DA6-4348-9796-08D682687EFD}.exe 39 PID 3044 wrote to memory of 2912 3044 {995950C3-9DA6-4348-9796-08D682687EFD}.exe 40 PID 3044 wrote to memory of 2912 3044 {995950C3-9DA6-4348-9796-08D682687EFD}.exe 40 PID 3044 wrote to memory of 2912 3044 {995950C3-9DA6-4348-9796-08D682687EFD}.exe 40 PID 3044 wrote to memory of 2912 3044 {995950C3-9DA6-4348-9796-08D682687EFD}.exe 40 PID 2924 wrote to memory of 3040 2924 {8297B712-9A0B-4015-882C-13B3D09B5933}.exe 41 PID 2924 wrote to memory of 3040 2924 {8297B712-9A0B-4015-882C-13B3D09B5933}.exe 41 PID 2924 wrote to memory of 3040 2924 {8297B712-9A0B-4015-882C-13B3D09B5933}.exe 41 PID 2924 wrote to memory of 3040 2924 {8297B712-9A0B-4015-882C-13B3D09B5933}.exe 41 PID 2924 wrote to memory of 2548 2924 {8297B712-9A0B-4015-882C-13B3D09B5933}.exe 42 PID 2924 wrote to memory of 2548 2924 {8297B712-9A0B-4015-882C-13B3D09B5933}.exe 42 PID 2924 wrote to memory of 2548 2924 {8297B712-9A0B-4015-882C-13B3D09B5933}.exe 42 PID 2924 wrote to memory of 2548 2924 {8297B712-9A0B-4015-882C-13B3D09B5933}.exe 42 PID 3040 wrote to memory of 1200 3040 {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe 43 PID 3040 wrote to memory of 1200 3040 {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe 43 PID 3040 wrote to memory of 1200 3040 {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe 43 PID 3040 wrote to memory of 1200 3040 {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe 43 PID 3040 wrote to memory of 1884 3040 {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe 44 PID 3040 wrote to memory of 1884 3040 {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe 44 PID 3040 wrote to memory of 1884 3040 {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe 44 PID 3040 wrote to memory of 1884 3040 {E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe 44 PID 1200 wrote to memory of 2072 1200 {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe 45 PID 1200 wrote to memory of 2072 1200 {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe 45 PID 1200 wrote to memory of 2072 1200 {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe 45 PID 1200 wrote to memory of 2072 1200 {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe 45 PID 1200 wrote to memory of 716 1200 {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe 46 PID 1200 wrote to memory of 716 1200 {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe 46 PID 1200 wrote to memory of 716 1200 {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe 46 PID 1200 wrote to memory of 716 1200 {3B1236BF-00CC-43f8-8602-943BB98C8637}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe"C:\Users\Admin\AppData\Local\Temp\8c4a7c014f0ae1c77b675632631b6c822c4cbe5c52eb85c1a5894397dbfd40f7N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\{020B22ED-6D58-4096-9B93-8354F760C11F}.exeC:\Windows\{020B22ED-6D58-4096-9B93-8354F760C11F}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\{81054105-450F-43ff-98E6-5108E02D711A}.exeC:\Windows\{81054105-450F-43ff-98E6-5108E02D711A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\{C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exeC:\Windows\{C8F35E74-9179-49ca-9D92-3D7F837B0EEF}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\{995950C3-9DA6-4348-9796-08D682687EFD}.exeC:\Windows\{995950C3-9DA6-4348-9796-08D682687EFD}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\{8297B712-9A0B-4015-882C-13B3D09B5933}.exeC:\Windows\{8297B712-9A0B-4015-882C-13B3D09B5933}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\{E10A209C-BD80-4036-B7E9-8458F5523F5C}.exeC:\Windows\{E10A209C-BD80-4036-B7E9-8458F5523F5C}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\{3B1236BF-00CC-43f8-8602-943BB98C8637}.exeC:\Windows\{3B1236BF-00CC-43f8-8602-943BB98C8637}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\{3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}.exeC:\Windows\{3C10CC4C-CD46-4fe0-BBCD-4D4DA584F85A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Windows\{F3DB44A9-4713-45f3-8DD3-DCDD49D6F3AD}.exeC:\Windows\{F3DB44A9-4713-45f3-8DD3-DCDD49D6F3AD}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C10C~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3B123~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E10A2~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8297B~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{99595~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C8F35~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81054~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{020B2~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\8C4A7C~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD520f8f81a2927d042f8872c968ca67b69
SHA15100cfd566a99465159dc90d69211ebad94aef27
SHA25643f79e8562eea4761482b239561b00fe6fcd4c14d807af05244365c512c86f2e
SHA512ef571e539c89d45c512a8b7d220d05c73b0c39a4d2a409b67a0960420ba2bac413d4268166332c5daeea48732110bdafeb90be60524fea6bd291b4f5f928353c
-
Filesize
88KB
MD5d1fad32f921959bdf111f2c60cb39a95
SHA138e7b142375875a13306d16ceeba7aac9e07f7c8
SHA2565ca27b9d3cf38a0071f6822abd1d2bf820b2242a836f5a761d4ef08c6c943927
SHA512337c4676f8fe7d9e10724c223786fdb5ed3042ba19d2c32e49a42b139884ed916f55edf92d58af3b9558352a27765a93440031e3d0d963eb29bf19438724c93d
-
Filesize
88KB
MD54421b53bfa8cab74efed0719d7a3dada
SHA18f6c9e384b097c816bf817abdf9226486014c4be
SHA2562f2f3150071b6494fb2b0f9b72b4a7d1b5291fc729948f8d2faeaa8a4ffd0e34
SHA512dd810ecb8c1751627b4477bff52bd15d52bc5696a00e88c44c88424e01015891ba0fc6dc3c5dde81916983e63e6b3f8050da628a2074d910356e7a24003aba30
-
Filesize
88KB
MD52934bea9cd597df48c75437490f36835
SHA17b33257147f4fc0e2bdcb73c2628e8c82fbc3d3f
SHA256d61e6be738d12be9cfe8aa4eefdda68666b604ac46743b379bae13964fcd4754
SHA512bdffe7f0bc8c54786f0f8176f35900ead0d1e811c7d3f478f5df23bf0ddc20dfbdcde1239453d0d2b32e58cdb3a306fe963f43a83ca83e29391232ed9666883c
-
Filesize
88KB
MD5001a66302469a3b647a102161e3527c0
SHA15f3db912e8242cfe3d32534abad948f512adafb0
SHA25635b5379a8ccd1f0811a8054d96960007a1360603e46e09d1d2cdbe893a724354
SHA5124eb60f7099020a24bbed90dfb5f750e4a836fa664b517b3bbb1fa7684c60c934df39fc81647ae6e4ba199d340b85414ee359a79e1d08a2a675774b4a1971476a
-
Filesize
88KB
MD540a23625565cf4980f6f46fba37c7c12
SHA1922afecf9107d685f4206fc6836b5d75168057c2
SHA2568cd87594ab7487bfa232c450fea5070cc1c79beeec4fc0c99c24a5a8f040d0b2
SHA512619804645b0d5a27964b300b042c192e552f273b9ed808dc1a520977b04724c04bc0deec91fe5870540b98af7a24ff85fff74caedcb8f648b0fb7b8eb8c691f6
-
Filesize
88KB
MD552877124f05d996769adc445448e29e4
SHA1e3aa2d3923c0a2ee341965a6faf2ed1bd03771fc
SHA2563f3d200f86c4773eb519cf65c04035356b43d8c4246a6824477184a3c1eef27b
SHA512998359695d32dc8b260d5b1343349995c256ad26cefdabab69e5748ce8f44ce0cc630429b39fcd2048c392fb89cf5418c1896017083cb0ae0864641d5a39854d
-
Filesize
88KB
MD5d40f19535c06079b125639ef4fc49f83
SHA14ac497474eac1f197656d3d32b7af678acd37269
SHA256e56250e53e10154d0c947aed4a3d2366a9cbadedf5e339db14b883ea3f1ac401
SHA512d2ce377f157c8042826622e3966eee9f14f4662d7ec2488864fd7063be911b443d0dc3a38cb3df56a822b891e03b39088010fa5e58a7919e4fa3226a550987f0
-
Filesize
88KB
MD562aa5cbc2ceca031612d951fb399447b
SHA10b22ef0a690e4670497156b3e96cdeebead13112
SHA25698a608762bbf659a9fa99c52ccaf1ad621bc5291d19a8c18aaeb07f09d255d26
SHA51290d322f628c93313a1ea6d76f27a50a899607963b9cc0559f289587ca8b96edbc6a0dafc75bd600d397d8d466a96f0a2a95d268a3a87786bca46624b859d25cd