Analysis
-
max time kernel
118s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe
Resource
win10v2004-20240802-en
General
-
Target
ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe
-
Size
89KB
-
MD5
a6b0ffdfe2bdf1a125eda532f3020ac0
-
SHA1
09bd0cfbf4c7684a5f49cf973c213265a975c33f
-
SHA256
ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91
-
SHA512
6ccd3e075377c31e4324d865fdc95130e98c9836e1afc3c7ca99a1f7cbee0e516507d573d67b3fbdf81deae9e4e878d6aab18dbf1868ebc70db43c392d6e15af
-
SSDEEP
768:5vw9816thKQLroL4/wQkNrfrunMxVFA3k:lEG/0oLlbunMxVS3k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9CAE7883-660F-4ffa-8674-CA6BDF1E3C04} {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B5F8691-F6CF-486a-9E59-F06DB1EE5C56} {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FE22140-20F4-4967-B3BE-1EAE67F03823} {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FE22140-20F4-4967-B3BE-1EAE67F03823}\stubpath = "C:\\Windows\\{8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe" {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{537F31C0-9636-4c67-A142-7574CE198E90} {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3CD55C33-151A-4bd5-A0BC-A7503C9B77DC} ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}\stubpath = "C:\\Windows\\{F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe" {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}\stubpath = "C:\\Windows\\{3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe" ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1E50CB8-81F1-430e-9CD0-D29137F7A7B7} {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{537F31C0-9636-4c67-A142-7574CE198E90}\stubpath = "C:\\Windows\\{537F31C0-9636-4c67-A142-7574CE198E90}.exe" {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F41DC8B-11AD-4d03-A4BC-9458B70958F3}\stubpath = "C:\\Windows\\{5F41DC8B-11AD-4d03-A4BC-9458B70958F3}.exe" {537F31C0-9636-4c67-A142-7574CE198E90}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F41DC8B-11AD-4d03-A4BC-9458B70958F3} {537F31C0-9636-4c67-A142-7574CE198E90}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{37F1370E-2077-4fa2-8EF4-6BE20038F408} {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{37F1370E-2077-4fa2-8EF4-6BE20038F408}\stubpath = "C:\\Windows\\{37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe" {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}\stubpath = "C:\\Windows\\{9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe" {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}\stubpath = "C:\\Windows\\{7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe" {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E66C454B-E50F-4f8c-963E-99E33409E7AD} {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E66C454B-E50F-4f8c-963E-99E33409E7AD}\stubpath = "C:\\Windows\\{E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe" {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe -
Executes dropped EXE 9 IoCs
pid Process 564 {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe 216 {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe 4184 {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe 4964 {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe 3588 {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe 2108 {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe 552 {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe 3496 {537F31C0-9636-4c67-A142-7574CE198E90}.exe 4144 {5F41DC8B-11AD-4d03-A4BC-9458B70958F3}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe File created C:\Windows\{37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe File created C:\Windows\{7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe File created C:\Windows\{E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe File created C:\Windows\{8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe File created C:\Windows\{9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe File created C:\Windows\{F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe File created C:\Windows\{537F31C0-9636-4c67-A142-7574CE198E90}.exe {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe File created C:\Windows\{5F41DC8B-11AD-4d03-A4BC-9458B70958F3}.exe {537F31C0-9636-4c67-A142-7574CE198E90}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {537F31C0-9636-4c67-A142-7574CE198E90}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5F41DC8B-11AD-4d03-A4BC-9458B70958F3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 968 ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe Token: SeIncBasePriorityPrivilege 564 {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe Token: SeIncBasePriorityPrivilege 216 {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe Token: SeIncBasePriorityPrivilege 4184 {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe Token: SeIncBasePriorityPrivilege 4964 {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe Token: SeIncBasePriorityPrivilege 3588 {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe Token: SeIncBasePriorityPrivilege 2108 {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe Token: SeIncBasePriorityPrivilege 552 {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe Token: SeIncBasePriorityPrivilege 3496 {537F31C0-9636-4c67-A142-7574CE198E90}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 968 wrote to memory of 564 968 ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe 87 PID 968 wrote to memory of 564 968 ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe 87 PID 968 wrote to memory of 564 968 ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe 87 PID 968 wrote to memory of 2704 968 ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe 88 PID 968 wrote to memory of 2704 968 ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe 88 PID 968 wrote to memory of 2704 968 ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe 88 PID 564 wrote to memory of 216 564 {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe 91 PID 564 wrote to memory of 216 564 {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe 91 PID 564 wrote to memory of 216 564 {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe 91 PID 564 wrote to memory of 3988 564 {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe 92 PID 564 wrote to memory of 3988 564 {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe 92 PID 564 wrote to memory of 3988 564 {3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe 92 PID 216 wrote to memory of 4184 216 {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe 95 PID 216 wrote to memory of 4184 216 {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe 95 PID 216 wrote to memory of 4184 216 {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe 95 PID 216 wrote to memory of 1484 216 {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe 96 PID 216 wrote to memory of 1484 216 {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe 96 PID 216 wrote to memory of 1484 216 {37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe 96 PID 4184 wrote to memory of 4964 4184 {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe 97 PID 4184 wrote to memory of 4964 4184 {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe 97 PID 4184 wrote to memory of 4964 4184 {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe 97 PID 4184 wrote to memory of 3116 4184 {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe 98 PID 4184 wrote to memory of 3116 4184 {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe 98 PID 4184 wrote to memory of 3116 4184 {9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe 98 PID 4964 wrote to memory of 3588 4964 {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe 99 PID 4964 wrote to memory of 3588 4964 {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe 99 PID 4964 wrote to memory of 3588 4964 {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe 99 PID 4964 wrote to memory of 4376 4964 {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe 100 PID 4964 wrote to memory of 4376 4964 {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe 100 PID 4964 wrote to memory of 4376 4964 {F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe 100 PID 3588 wrote to memory of 2108 3588 {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe 101 PID 3588 wrote to memory of 2108 3588 {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe 101 PID 3588 wrote to memory of 2108 3588 {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe 101 PID 3588 wrote to memory of 5084 3588 {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe 102 PID 3588 wrote to memory of 5084 3588 {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe 102 PID 3588 wrote to memory of 5084 3588 {7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe 102 PID 2108 wrote to memory of 552 2108 {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe 103 PID 2108 wrote to memory of 552 2108 {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe 103 PID 2108 wrote to memory of 552 2108 {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe 103 PID 2108 wrote to memory of 3752 2108 {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe 104 PID 2108 wrote to memory of 3752 2108 {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe 104 PID 2108 wrote to memory of 3752 2108 {E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe 104 PID 552 wrote to memory of 3496 552 {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe 105 PID 552 wrote to memory of 3496 552 {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe 105 PID 552 wrote to memory of 3496 552 {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe 105 PID 552 wrote to memory of 2432 552 {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe 106 PID 552 wrote to memory of 2432 552 {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe 106 PID 552 wrote to memory of 2432 552 {8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe 106 PID 3496 wrote to memory of 4144 3496 {537F31C0-9636-4c67-A142-7574CE198E90}.exe 107 PID 3496 wrote to memory of 4144 3496 {537F31C0-9636-4c67-A142-7574CE198E90}.exe 107 PID 3496 wrote to memory of 4144 3496 {537F31C0-9636-4c67-A142-7574CE198E90}.exe 107 PID 3496 wrote to memory of 1500 3496 {537F31C0-9636-4c67-A142-7574CE198E90}.exe 108 PID 3496 wrote to memory of 1500 3496 {537F31C0-9636-4c67-A142-7574CE198E90}.exe 108 PID 3496 wrote to memory of 1500 3496 {537F31C0-9636-4c67-A142-7574CE198E90}.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe"C:\Users\Admin\AppData\Local\Temp\ab9d3fdc8a97b7f8d5fb328bcf293e42a5be889666422d7011f44a4d31843e91N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\{3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exeC:\Windows\{3CD55C33-151A-4bd5-A0BC-A7503C9B77DC}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\{37F1370E-2077-4fa2-8EF4-6BE20038F408}.exeC:\Windows\{37F1370E-2077-4fa2-8EF4-6BE20038F408}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\{9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exeC:\Windows\{9CAE7883-660F-4ffa-8674-CA6BDF1E3C04}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\{F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exeC:\Windows\{F1E50CB8-81F1-430e-9CD0-D29137F7A7B7}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\{7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exeC:\Windows\{7B5F8691-F6CF-486a-9E59-F06DB1EE5C56}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\{E66C454B-E50F-4f8c-963E-99E33409E7AD}.exeC:\Windows\{E66C454B-E50F-4f8c-963E-99E33409E7AD}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\{8FE22140-20F4-4967-B3BE-1EAE67F03823}.exeC:\Windows\{8FE22140-20F4-4967-B3BE-1EAE67F03823}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\{537F31C0-9636-4c67-A142-7574CE198E90}.exeC:\Windows\{537F31C0-9636-4c67-A142-7574CE198E90}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\{5F41DC8B-11AD-4d03-A4BC-9458B70958F3}.exeC:\Windows\{5F41DC8B-11AD-4d03-A4BC-9458B70958F3}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{537F3~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8FE22~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E66C4~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7B5F8~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:5084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1E50~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9CAE7~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37F13~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3CD55~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\AB9D3F~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5a9914d663955ae773ffda1dc81a2713d
SHA1d4688a33310a5e88b60b1cfde3fe0667f10d429b
SHA2566213f369b3c786e7b3a145c663de73596124f891654d05f77388cfec2c375968
SHA5124bbb8e2db0c3905255128c33a5a585874e7ea8cad2503629bcb39052e3ced6c89d0167f05aaaf3e05406b2cf2a6062ed35ac825236d229d2295f9dee604ebcec
-
Filesize
89KB
MD5af4be744db677b61a03e8e76f5aefc99
SHA161e7e379df192aee5974e5cdf2574038123e04f2
SHA25622c59ff8aa0943e6772351207b51277d81c123d63241eb16ddab9adb2aa61af4
SHA5128c5b38faea579f6b9b7da41c0032e064c9afecd4e25157208ea60ff1736661e5fbca9f9f5f006dcabbfe5f57a333090db91fce445544adc525aa08511ab364e6
-
Filesize
89KB
MD5c9ef13ef7f8600ec9c0d9483339ac1d5
SHA147490a0c7c830eae6248d3b944d8f25913471b46
SHA256b166a35f357e0e4647e9aabf465f0005aa1f8116241d12e1a0655b6695966d6f
SHA5129e7733ec94f2c2f92f79e1bfc190ba270cb8bbb55dfe212594758908206b1efc3823750c94824184f327403dfb32a23cd6608e604948e8d095fbcbd16e4a44f5
-
Filesize
89KB
MD515f680418e56141f90201a251f47b85f
SHA18838c20049c3abf95c1706fad3edfd558fc87bdf
SHA256032238c02b674987e26b6cebc548c5442081431aaf5bf26c6f733f974bb1b864
SHA512b248c3b5e41cc5046bd21187e35e1455e98cc7c69183539e01bf5db79d0a0fcc6215dac541c9848ac8cd20195dd3f195b87e4ad9e85fc964233d962df8dd3dbf
-
Filesize
89KB
MD5bcb8c028bf5d208d0bb365442b95f4c7
SHA1d0829fbd717b2369bc5bed6ceff92797122aad15
SHA256cba40a04c16b80466edab2b52fda13c0195689b6e100e78ae628c745bf7f3064
SHA512db621f07735f741b59e96563f684a6ee8d45d3e48b9e55ed34c0ad9e0a58098c4e23e904b1079a5e9948c2714a134916a7d42ddb97ac090c4037cc8aa6e32109
-
Filesize
89KB
MD57e11c5b194d868539b2b4bbfb0513d59
SHA1b3ebd899a8ae9da7ab1d3fb2ae435ce0dc1329c3
SHA25634ea9741d465b01ab9444ada615393efb3b6a03d7699c785bd31f6d5a1f348dd
SHA512ff0aa931529bf5d16e563b19a3cadcbda512089adae3ec5bbcf2fb60ee8624806d1b1204cd01fb222ab68165bc73e8537387efafda14c8c2718856350608ef75
-
Filesize
89KB
MD5ad1e955b20a5d36d0ea408af006fc316
SHA1f5c1cc4f168389ef2b046bfd4ef20e23b91a7312
SHA256557ce73548082b7aa2255b6c65fb82320ca0351324e9d02a6a7a88eb1b32ce47
SHA5120f8e71ee5e3a4d4705a5e21a9fe309d1a04475e034fa2f2b71ba55187b7c593103fb7d60189bed20d9a53f5a0ceb4a3a11d494b70fe2576c675ebabaad670361
-
Filesize
89KB
MD52580e190e7f8b412f2aa12fa42b77ba5
SHA1df6045b022b50a89dc07c86119d374d06901433b
SHA256e4def3eceb09737835f10a7a3e1b3039ff89538850b4a165e47a666477f62c3e
SHA51234604fbea67f1def892d8c4ff9e6eabd755cdcfb7a5038f239ff1f15c593c6cafb3569abda8288a67d8be821902a21833d481dd2180443437f1c0f5e9ff91574
-
Filesize
89KB
MD5ba98e1002a119e8ebd98ee4cc8b9f1d0
SHA1172b588a327776e22fb25f4fcc5a30803b28b7ab
SHA256a88db4f17346f1e3ff21117bccbc0f183a4e8c59ef8baee5b52842851ca77389
SHA51209f4ee09a93ff5e866093e7207da15eaefb042ed3421e0486b31e81a61ec844d8a227baf6460917a3560aaa6fedba911d7ae59d1a1979d6d13f543f7135e3cd8