Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe
Resource
win10v2004-20240802-en
General
-
Target
5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe
-
Size
89KB
-
MD5
984808916af865a78d418efccb9d5190
-
SHA1
061fca3a3542bad674cbaaaac5d4b0a4cc37169b
-
SHA256
5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762
-
SHA512
45ba3d3b32af17f49e2ffe37077035b574edf1c63ef1e35f4dc7625cd86734d23f53e158303e5a3d187c2145f749b0a264291add13498242ebf400cb26a41ce2
-
SSDEEP
768:5vw9816thKQLrovb4/wQkNrfrunMxVFA3k:lEG/0oDlbunMxVS3k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{72E17C4C-59B7-47ee-9C8E-65833169CE4D} 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{852D05C4-C828-4efd-A811-D231767A0FA3} {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{24F37D9B-8733-4d23-9D7F-80BAE98DBFCE} {852D05C4-C828-4efd-A811-D231767A0FA3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32A586C0-3CB9-4f90-A58B-DC75ABCB462C}\stubpath = "C:\\Windows\\{32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe" {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E1755F6-3A83-48a5-B85B-AA22D46844B0} {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E1755F6-3A83-48a5-B85B-AA22D46844B0}\stubpath = "C:\\Windows\\{1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe" {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32A586C0-3CB9-4f90-A58B-DC75ABCB462C} {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9027BA76-8616-4c70-B1A8-3C552FB50698}\stubpath = "C:\\Windows\\{9027BA76-8616-4c70-B1A8-3C552FB50698}.exe" {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4} {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8942899C-27BF-4828-BAEB-8232B84734B2}\stubpath = "C:\\Windows\\{8942899C-27BF-4828-BAEB-8232B84734B2}.exe" {48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{72E17C4C-59B7-47ee-9C8E-65833169CE4D}\stubpath = "C:\\Windows\\{72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe" 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A8104DE-AF79-4446-ADBC-FB110867CF09}\stubpath = "C:\\Windows\\{0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe" {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{852D05C4-C828-4efd-A811-D231767A0FA3}\stubpath = "C:\\Windows\\{852D05C4-C828-4efd-A811-D231767A0FA3}.exe" {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}\stubpath = "C:\\Windows\\{24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe" {852D05C4-C828-4efd-A811-D231767A0FA3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A8104DE-AF79-4446-ADBC-FB110867CF09} {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9027BA76-8616-4c70-B1A8-3C552FB50698} {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}\stubpath = "C:\\Windows\\{48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}.exe" {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8942899C-27BF-4828-BAEB-8232B84734B2} {48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}.exe -
Deletes itself 1 IoCs
pid Process 1920 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2500 {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe 3008 {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe 2568 {852D05C4-C828-4efd-A811-D231767A0FA3}.exe 1508 {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe 2896 {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe 1496 {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe 1144 {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe 1984 {48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}.exe 2236 {8942899C-27BF-4828-BAEB-8232B84734B2}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{8942899C-27BF-4828-BAEB-8232B84734B2}.exe {48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}.exe File created C:\Windows\{0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe File created C:\Windows\{24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe {852D05C4-C828-4efd-A811-D231767A0FA3}.exe File created C:\Windows\{1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe File created C:\Windows\{9027BA76-8616-4c70-B1A8-3C552FB50698}.exe {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe File created C:\Windows\{48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}.exe {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe File created C:\Windows\{72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe File created C:\Windows\{852D05C4-C828-4efd-A811-D231767A0FA3}.exe {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe File created C:\Windows\{32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8942899C-27BF-4828-BAEB-8232B84734B2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {852D05C4-C828-4efd-A811-D231767A0FA3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2724 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe Token: SeIncBasePriorityPrivilege 2500 {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe Token: SeIncBasePriorityPrivilege 3008 {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe Token: SeIncBasePriorityPrivilege 2568 {852D05C4-C828-4efd-A811-D231767A0FA3}.exe Token: SeIncBasePriorityPrivilege 1508 {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe Token: SeIncBasePriorityPrivilege 2896 {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe Token: SeIncBasePriorityPrivilege 1496 {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe Token: SeIncBasePriorityPrivilege 1144 {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe Token: SeIncBasePriorityPrivilege 1984 {48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2500 2724 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe 30 PID 2724 wrote to memory of 2500 2724 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe 30 PID 2724 wrote to memory of 2500 2724 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe 30 PID 2724 wrote to memory of 2500 2724 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe 30 PID 2724 wrote to memory of 1920 2724 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe 31 PID 2724 wrote to memory of 1920 2724 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe 31 PID 2724 wrote to memory of 1920 2724 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe 31 PID 2724 wrote to memory of 1920 2724 5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe 31 PID 2500 wrote to memory of 3008 2500 {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe 32 PID 2500 wrote to memory of 3008 2500 {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe 32 PID 2500 wrote to memory of 3008 2500 {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe 32 PID 2500 wrote to memory of 3008 2500 {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe 32 PID 2500 wrote to memory of 2656 2500 {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe 33 PID 2500 wrote to memory of 2656 2500 {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe 33 PID 2500 wrote to memory of 2656 2500 {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe 33 PID 2500 wrote to memory of 2656 2500 {72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe 33 PID 3008 wrote to memory of 2568 3008 {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe 34 PID 3008 wrote to memory of 2568 3008 {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe 34 PID 3008 wrote to memory of 2568 3008 {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe 34 PID 3008 wrote to memory of 2568 3008 {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe 34 PID 3008 wrote to memory of 2536 3008 {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe 35 PID 3008 wrote to memory of 2536 3008 {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe 35 PID 3008 wrote to memory of 2536 3008 {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe 35 PID 3008 wrote to memory of 2536 3008 {0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe 35 PID 2568 wrote to memory of 1508 2568 {852D05C4-C828-4efd-A811-D231767A0FA3}.exe 36 PID 2568 wrote to memory of 1508 2568 {852D05C4-C828-4efd-A811-D231767A0FA3}.exe 36 PID 2568 wrote to memory of 1508 2568 {852D05C4-C828-4efd-A811-D231767A0FA3}.exe 36 PID 2568 wrote to memory of 1508 2568 {852D05C4-C828-4efd-A811-D231767A0FA3}.exe 36 PID 2568 wrote to memory of 428 2568 {852D05C4-C828-4efd-A811-D231767A0FA3}.exe 37 PID 2568 wrote to memory of 428 2568 {852D05C4-C828-4efd-A811-D231767A0FA3}.exe 37 PID 2568 wrote to memory of 428 2568 {852D05C4-C828-4efd-A811-D231767A0FA3}.exe 37 PID 2568 wrote to memory of 428 2568 {852D05C4-C828-4efd-A811-D231767A0FA3}.exe 37 PID 1508 wrote to memory of 2896 1508 {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe 38 PID 1508 wrote to memory of 2896 1508 {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe 38 PID 1508 wrote to memory of 2896 1508 {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe 38 PID 1508 wrote to memory of 2896 1508 {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe 38 PID 1508 wrote to memory of 2828 1508 {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe 39 PID 1508 wrote to memory of 2828 1508 {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe 39 PID 1508 wrote to memory of 2828 1508 {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe 39 PID 1508 wrote to memory of 2828 1508 {24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe 39 PID 2896 wrote to memory of 1496 2896 {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe 40 PID 2896 wrote to memory of 1496 2896 {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe 40 PID 2896 wrote to memory of 1496 2896 {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe 40 PID 2896 wrote to memory of 1496 2896 {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe 40 PID 2896 wrote to memory of 2020 2896 {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe 41 PID 2896 wrote to memory of 2020 2896 {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe 41 PID 2896 wrote to memory of 2020 2896 {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe 41 PID 2896 wrote to memory of 2020 2896 {32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe 41 PID 1496 wrote to memory of 1144 1496 {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe 42 PID 1496 wrote to memory of 1144 1496 {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe 42 PID 1496 wrote to memory of 1144 1496 {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe 42 PID 1496 wrote to memory of 1144 1496 {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe 42 PID 1496 wrote to memory of 2168 1496 {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe 43 PID 1496 wrote to memory of 2168 1496 {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe 43 PID 1496 wrote to memory of 2168 1496 {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe 43 PID 1496 wrote to memory of 2168 1496 {9027BA76-8616-4c70-B1A8-3C552FB50698}.exe 43 PID 1144 wrote to memory of 1984 1144 {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe 44 PID 1144 wrote to memory of 1984 1144 {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe 44 PID 1144 wrote to memory of 1984 1144 {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe 44 PID 1144 wrote to memory of 1984 1144 {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe 44 PID 1144 wrote to memory of 1972 1144 {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe 45 PID 1144 wrote to memory of 1972 1144 {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe 45 PID 1144 wrote to memory of 1972 1144 {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe 45 PID 1144 wrote to memory of 1972 1144 {1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe"C:\Users\Admin\AppData\Local\Temp\5c8504addb51ee4940a039fd4af5cdf50cc6a2bb98d218bce1932daa8c7a2762N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\{72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exeC:\Windows\{72E17C4C-59B7-47ee-9C8E-65833169CE4D}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\{0A8104DE-AF79-4446-ADBC-FB110867CF09}.exeC:\Windows\{0A8104DE-AF79-4446-ADBC-FB110867CF09}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\{852D05C4-C828-4efd-A811-D231767A0FA3}.exeC:\Windows\{852D05C4-C828-4efd-A811-D231767A0FA3}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\{24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exeC:\Windows\{24F37D9B-8733-4d23-9D7F-80BAE98DBFCE}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\{32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exeC:\Windows\{32A586C0-3CB9-4f90-A58B-DC75ABCB462C}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\{9027BA76-8616-4c70-B1A8-3C552FB50698}.exeC:\Windows\{9027BA76-8616-4c70-B1A8-3C552FB50698}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\{1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exeC:\Windows\{1E1755F6-3A83-48a5-B85B-AA22D46844B0}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\{48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}.exeC:\Windows\{48BE3D17-CC55-475c-BABD-0C6AAE4E4AF4}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\{8942899C-27BF-4828-BAEB-8232B84734B2}.exeC:\Windows\{8942899C-27BF-4828-BAEB-8232B84734B2}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{48BE3~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1E175~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9027B~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{32A58~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{24F37~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{852D0~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0A810~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72E17~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\5C8504~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5fb9be8c7d314fd6edc7477faa950268b
SHA133d33339693b07c9f67b80db6e0cd1430fb263d9
SHA256b7e111954719b732afe4983bc3bd373c78371dcc773a2f3e831c59a3f3a848ec
SHA51295f1536695e0037312851a2ef1f1d77f2135f24c0625dbbe7ba2b3b82ec4c352e944a87542badc23d13966bc4e787f3a6e30dbed6bcf5ed05e97b15fc710548f
-
Filesize
89KB
MD5075cb7ffadb8cda08cad3992ed854391
SHA1198616a33b5b72167404d3e8e6d22ef355fd7441
SHA25654675531832419d34e743588301a108f27b494cb267299878c45e09e4491f048
SHA51214322a911d33f57fde6042e5347fb4bd44cf472eef9f60540611579e361d797a2b7d207a3d198aa58b07738f17245f4290f6004e0c49d15062199731d8ab3924
-
Filesize
89KB
MD525ee9c04a03b6120ae02b41b3f4a4696
SHA1db8f9d55f0a43f9d1b6feec5b97737798a7d46fe
SHA256da6568a4c09c87724226b921dd2690ebef23389d98bd2f3f953c8ed5488be4ea
SHA5128488b1c980dc65250b0ed2e963740527fbfeb2ce93ecd31ed730697e8933597aa87df7daebf6442bf44c13aae92f5d5a80f528e777450aac3ef6b56ecc1cdc02
-
Filesize
89KB
MD5443dc81f7a5ef32b606f7afc44ed3052
SHA18a4968896bc58ad8449f53e068528b8036da2981
SHA25660a0c1649795cea525d42d24bd2341084a67d29da8d29826ece06bd5f536f588
SHA512de556f7eabecb8c36bf2b862a5056b904860bd6af59c22acabcfb689d2501ea68270636871fafdcc726fff038d9e872c49e9dc78e5247adba1ea8d8f36f71bfc
-
Filesize
89KB
MD588d5e6ebdfa9d11eeb15a4e8842561e5
SHA1eb1c8a237c34da2e422d6797ff093bf027271596
SHA2563c509bdf76594fa88deb2625cbd51598efac05023941a87a59409c1b1ae3ccf5
SHA512d845cc0be4cfec98e5d799f6508baf4ffa95198376b58f9ccbfb7e3499955f2a06a83a0abe787760da22312f11aef7f8b37d7663e395dc5480a0c1d92d8ae0ca
-
Filesize
89KB
MD5b27e1bd61f8a89ee943d457f22d72d12
SHA15fbf27d876e7b0c8e55fd924793b664642252072
SHA256c92d5e958a517bfd12c3bd33c13575687657c40e1eca8669a40d94926f11a93e
SHA512bda8fe4bbcf51a75c01da05eacfe472e988bf3133052ac0b4cbba0c0318d09f2ab0fc68fe0461ce6a0699945eb61bbb6a126183ba5374ec867a142586710c2c7
-
Filesize
89KB
MD5ea795c5c454a4bd92d7c68cba57efa0b
SHA17f75bab52141bccb4bb1696691c9467121a06ab0
SHA256db7de860e9b40db91a0bbd5f2ef7f537d9daaed8744b3d70e50367f653d08799
SHA512380a7607613628c8a5008be909b818e8a279b0cdd4f5ca57d1fe6da0c98d8267714626353ec7e34e5813c0e4e3186d2812ba4234470b08c6fca53d990016a29e
-
Filesize
89KB
MD5a444768bb49106a98230e098b295d39a
SHA18aa9ad9df175863578c633a889136b34d50b9a7e
SHA2561d090fe4da5ecd7c6daba750db2311b00b3e20ed3176beaeda9c5cb2bb52b866
SHA5127c667f332087d16bb4999d5a567e7301f4a82f9f0ddf8cab5e8bd2dcec9084eb0cdeae93fc089de9e723c90575245e92fb41c7182243d57d0ec2bdcd8da5908f
-
Filesize
89KB
MD51156e2f520f0044ccf989c39827c9254
SHA1095fbc9794427ecaa26a65cada12facc3bef1be2
SHA256ae1abace3d2d09d3a81a12eb5a8e77fb98827b88490f44ae6f2bb309f8e7aa2f
SHA5121eb3e1dfdaeb7fe2a36c2e84598bcca787fb8a88ec95cbe60711f93bb95b5e000758ebaf31dc80e19dd3da439d4cef473058fd69d4493e7af49fa6a6176135c3