Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 22:36 UTC
Static task
static1
Behavioral task
behavioral1
Sample
1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe
Resource
win10v2004-20240802-en
General
-
Target
1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe
-
Size
90KB
-
MD5
1df7ffe2ae542144baeac76d85e0fa90
-
SHA1
d6c14814ae66f780b8990d1848f4716601553a45
-
SHA256
1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366
-
SHA512
160ee69201a43f850e51c96b61f614f4229fc8b50c9bcd7327000f324408c614ba31fe43c962af69ba4a319f2de0dd30f25e197f72b34081f0c8f5007c8fe40d
-
SSDEEP
768:Qvw9816vhKQLro84/wQRNrfrunMxVFA3b7glws:YEGh0o8l2unMxVS3Hgz
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}\stubpath = "C:\\Windows\\{98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe" {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0052B4B0-1468-4c5b-A404-3CE50C5D1277}\stubpath = "C:\\Windows\\{0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe" {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33886780-2458-4db2-B7C7-F2432A2DB82B} {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98BC9CEC-7E77-4426-ACA0-49FB8AB705B9} {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}\stubpath = "C:\\Windows\\{D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe" {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7CEEB615-8F7E-4df0-96B0-E5EABB4A3019} {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}\stubpath = "C:\\Windows\\{7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe" {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FD65747-821F-415a-81A9-692278E77193} {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53FFB160-AC80-426d-9DB0-B47912709A5F} 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8FC829A6-128F-4aab-9713-0F791FD0B0A6} {9FD65747-821F-415a-81A9-692278E77193}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3} {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33886780-2458-4db2-B7C7-F2432A2DB82B}\stubpath = "C:\\Windows\\{33886780-2458-4db2-B7C7-F2432A2DB82B}.exe" {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0052B4B0-1468-4c5b-A404-3CE50C5D1277} {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FD65747-821F-415a-81A9-692278E77193}\stubpath = "C:\\Windows\\{9FD65747-821F-415a-81A9-692278E77193}.exe" {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8FC829A6-128F-4aab-9713-0F791FD0B0A6}\stubpath = "C:\\Windows\\{8FC829A6-128F-4aab-9713-0F791FD0B0A6}.exe" {9FD65747-821F-415a-81A9-692278E77193}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3714690A-AE5B-4486-88DE-E8229CB64411} {8FC829A6-128F-4aab-9713-0F791FD0B0A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3714690A-AE5B-4486-88DE-E8229CB64411}\stubpath = "C:\\Windows\\{3714690A-AE5B-4486-88DE-E8229CB64411}.exe" {8FC829A6-128F-4aab-9713-0F791FD0B0A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53FFB160-AC80-426d-9DB0-B47912709A5F}\stubpath = "C:\\Windows\\{53FFB160-AC80-426d-9DB0-B47912709A5F}.exe" 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe -
Deletes itself 1 IoCs
pid Process 2684 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2804 {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe 2580 {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe 2632 {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe 2216 {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe 2952 {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe 1796 {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe 2900 {9FD65747-821F-415a-81A9-692278E77193}.exe 1788 {8FC829A6-128F-4aab-9713-0F791FD0B0A6}.exe 744 {3714690A-AE5B-4486-88DE-E8229CB64411}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{53FFB160-AC80-426d-9DB0-B47912709A5F}.exe 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe File created C:\Windows\{0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe File created C:\Windows\{D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe File created C:\Windows\{8FC829A6-128F-4aab-9713-0F791FD0B0A6}.exe {9FD65747-821F-415a-81A9-692278E77193}.exe File created C:\Windows\{3714690A-AE5B-4486-88DE-E8229CB64411}.exe {8FC829A6-128F-4aab-9713-0F791FD0B0A6}.exe File created C:\Windows\{33886780-2458-4db2-B7C7-F2432A2DB82B}.exe {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe File created C:\Windows\{98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe File created C:\Windows\{7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe File created C:\Windows\{9FD65747-821F-415a-81A9-692278E77193}.exe {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3714690A-AE5B-4486-88DE-E8229CB64411}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8FC829A6-128F-4aab-9713-0F791FD0B0A6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9FD65747-821F-415a-81A9-692278E77193}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 656 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe Token: SeIncBasePriorityPrivilege 2804 {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe Token: SeIncBasePriorityPrivilege 2580 {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe Token: SeIncBasePriorityPrivilege 2632 {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe Token: SeIncBasePriorityPrivilege 2216 {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe Token: SeIncBasePriorityPrivilege 2952 {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe Token: SeIncBasePriorityPrivilege 1796 {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe Token: SeIncBasePriorityPrivilege 2900 {9FD65747-821F-415a-81A9-692278E77193}.exe Token: SeIncBasePriorityPrivilege 1788 {8FC829A6-128F-4aab-9713-0F791FD0B0A6}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 656 wrote to memory of 2804 656 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe 30 PID 656 wrote to memory of 2804 656 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe 30 PID 656 wrote to memory of 2804 656 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe 30 PID 656 wrote to memory of 2804 656 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe 30 PID 656 wrote to memory of 2684 656 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe 31 PID 656 wrote to memory of 2684 656 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe 31 PID 656 wrote to memory of 2684 656 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe 31 PID 656 wrote to memory of 2684 656 1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe 31 PID 2804 wrote to memory of 2580 2804 {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe 32 PID 2804 wrote to memory of 2580 2804 {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe 32 PID 2804 wrote to memory of 2580 2804 {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe 32 PID 2804 wrote to memory of 2580 2804 {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe 32 PID 2804 wrote to memory of 2604 2804 {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe 33 PID 2804 wrote to memory of 2604 2804 {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe 33 PID 2804 wrote to memory of 2604 2804 {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe 33 PID 2804 wrote to memory of 2604 2804 {53FFB160-AC80-426d-9DB0-B47912709A5F}.exe 33 PID 2580 wrote to memory of 2632 2580 {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe 34 PID 2580 wrote to memory of 2632 2580 {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe 34 PID 2580 wrote to memory of 2632 2580 {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe 34 PID 2580 wrote to memory of 2632 2580 {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe 34 PID 2580 wrote to memory of 1044 2580 {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe 35 PID 2580 wrote to memory of 1044 2580 {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe 35 PID 2580 wrote to memory of 1044 2580 {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe 35 PID 2580 wrote to memory of 1044 2580 {33886780-2458-4db2-B7C7-F2432A2DB82B}.exe 35 PID 2632 wrote to memory of 2216 2632 {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe 36 PID 2632 wrote to memory of 2216 2632 {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe 36 PID 2632 wrote to memory of 2216 2632 {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe 36 PID 2632 wrote to memory of 2216 2632 {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe 36 PID 2632 wrote to memory of 1992 2632 {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe 37 PID 2632 wrote to memory of 1992 2632 {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe 37 PID 2632 wrote to memory of 1992 2632 {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe 37 PID 2632 wrote to memory of 1992 2632 {0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe 37 PID 2216 wrote to memory of 2952 2216 {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe 38 PID 2216 wrote to memory of 2952 2216 {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe 38 PID 2216 wrote to memory of 2952 2216 {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe 38 PID 2216 wrote to memory of 2952 2216 {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe 38 PID 2216 wrote to memory of 2736 2216 {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe 39 PID 2216 wrote to memory of 2736 2216 {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe 39 PID 2216 wrote to memory of 2736 2216 {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe 39 PID 2216 wrote to memory of 2736 2216 {98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe 39 PID 2952 wrote to memory of 1796 2952 {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe 40 PID 2952 wrote to memory of 1796 2952 {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe 40 PID 2952 wrote to memory of 1796 2952 {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe 40 PID 2952 wrote to memory of 1796 2952 {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe 40 PID 2952 wrote to memory of 2032 2952 {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe 41 PID 2952 wrote to memory of 2032 2952 {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe 41 PID 2952 wrote to memory of 2032 2952 {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe 41 PID 2952 wrote to memory of 2032 2952 {D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe 41 PID 1796 wrote to memory of 2900 1796 {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe 42 PID 1796 wrote to memory of 2900 1796 {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe 42 PID 1796 wrote to memory of 2900 1796 {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe 42 PID 1796 wrote to memory of 2900 1796 {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe 42 PID 1796 wrote to memory of 2744 1796 {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe 43 PID 1796 wrote to memory of 2744 1796 {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe 43 PID 1796 wrote to memory of 2744 1796 {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe 43 PID 1796 wrote to memory of 2744 1796 {7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe 43 PID 2900 wrote to memory of 1788 2900 {9FD65747-821F-415a-81A9-692278E77193}.exe 44 PID 2900 wrote to memory of 1788 2900 {9FD65747-821F-415a-81A9-692278E77193}.exe 44 PID 2900 wrote to memory of 1788 2900 {9FD65747-821F-415a-81A9-692278E77193}.exe 44 PID 2900 wrote to memory of 1788 2900 {9FD65747-821F-415a-81A9-692278E77193}.exe 44 PID 2900 wrote to memory of 2088 2900 {9FD65747-821F-415a-81A9-692278E77193}.exe 45 PID 2900 wrote to memory of 2088 2900 {9FD65747-821F-415a-81A9-692278E77193}.exe 45 PID 2900 wrote to memory of 2088 2900 {9FD65747-821F-415a-81A9-692278E77193}.exe 45 PID 2900 wrote to memory of 2088 2900 {9FD65747-821F-415a-81A9-692278E77193}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe"C:\Users\Admin\AppData\Local\Temp\1fa3ee19ae94ae6af5e16147c257e5e2e6cdc578d342b349043f99bffa284366N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\{53FFB160-AC80-426d-9DB0-B47912709A5F}.exeC:\Windows\{53FFB160-AC80-426d-9DB0-B47912709A5F}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\{33886780-2458-4db2-B7C7-F2432A2DB82B}.exeC:\Windows\{33886780-2458-4db2-B7C7-F2432A2DB82B}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\{0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exeC:\Windows\{0052B4B0-1468-4c5b-A404-3CE50C5D1277}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\{98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exeC:\Windows\{98BC9CEC-7E77-4426-ACA0-49FB8AB705B9}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\{D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exeC:\Windows\{D3CB93E0-D8B7-4dca-B5C6-B913E990ACD3}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\{7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exeC:\Windows\{7CEEB615-8F7E-4df0-96B0-E5EABB4A3019}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\{9FD65747-821F-415a-81A9-692278E77193}.exeC:\Windows\{9FD65747-821F-415a-81A9-692278E77193}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\{8FC829A6-128F-4aab-9713-0F791FD0B0A6}.exeC:\Windows\{8FC829A6-128F-4aab-9713-0F791FD0B0A6}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\{3714690A-AE5B-4486-88DE-E8229CB64411}.exeC:\Windows\{3714690A-AE5B-4486-88DE-E8229CB64411}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8FC82~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9FD65~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7CEEB~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3CB9~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98BC9~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0052B~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{33886~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{53FFB~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\1FA3EE~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD592334a502487647b79247dff631497fd
SHA165f2b72ec77353408fa55824a3d44bbd6397919a
SHA2563971955acf24bfdc854293dd6cdd22cfca202d90796dec94e00383f6c96f9b28
SHA512d0ca5fd472f164084ef5b75571b843137ed582042a9024a21e2c004c457401a8036563c7e64809f503a4cb353603ae6348372f10e911438c0431c130b8a73950
-
Filesize
90KB
MD573531c2b096207ca8101e2c7d2d9229b
SHA1433ed40eded38b59c656a074bb49b5f2f1b321b5
SHA2562430a4c1f40eab5485792d796cf58b691b796d36c5888be480514069d1ef06c2
SHA512f30f682364d1d3deb3ca61f8dd761b01bb556e185c817c3acb6ae413b429049f64d12086d3077479b4dc83777d6da0ccccd22b305be7ad66fd7a9113e22d695e
-
Filesize
90KB
MD53b6331846671276c39740e30b3e65c48
SHA1e4ebf01b089237fec11acb208a09bcfb55c79434
SHA2565d5bf12306c53a4d501a92e327fba75a8fe7583b5c159938430af240c0e7a733
SHA5127bd1ecd3c7121cbe08143dea7bd5c1c1dd4b741f5ee965acab9c287b9e70786c2a9333eb6dc6459c299e1424a200c5e7880b1b16ed5117a085a7b85d253f8b6c
-
Filesize
90KB
MD57d1446bfea59a40baa9a01a147e325ba
SHA1a0539e0e375d4cadb0d21b68d11b41c4a7579c62
SHA25627cdd1c6473bf77697cbe19ad4094574e4948cb1e7bc0786c9622384b76f8b16
SHA51296e0ecc9f8117b7bb5f16561caf93df20c70b560a4596693130921efd6a06f9b4db019aeee46cf71ea958255950ed7244adf5826f6578ced19f83feee27dc74f
-
Filesize
90KB
MD5621036829512d65ef2cec9200b292a14
SHA1318d68a5e2548594d3bfccb538ac3a56fd8db149
SHA256402e92b144c36a4923f616de8483c5ecac758c9bfb627458f5e09046fa367677
SHA512e6a96ca14b38abdfac46b89c56baaacfe77588b2701e44e87f8ef64c664490c3bbf887cb15b1e0be602b5fd72cc324ab3c492c4ae7bbfcd16f7148b85d398a77
-
Filesize
90KB
MD5d13eb79623e94b01ac9a8217c82e10c7
SHA10c8c17ed52f08b5fa40acd11c91788822ef3c622
SHA2569f8ba30a6bf82e4f6d0ad2c877c1112f3158943338557d9a3697d17d77d0a271
SHA512f6c5285867d406416d492f4f35cbbb672aef77e1b528694e194026a76763dc5e424f241782f4593af3f95e41e946608c6d0876d93a68313956c0cc186c96fde6
-
Filesize
90KB
MD5124ff9dda419d9615b4869d3fd20204f
SHA1e8175745028ee050bedc3fb03c2fd934b853e886
SHA2561ac85720ef9bb0a51129c26f5aaafe6a7361c9c230268b1026d8b4c2339f77a1
SHA5128102a466d97ba17533f8f274cdc96e85e72c149c00344912c98c15605fbd5c8d2c5289585cf34c7e5ebfb8a220fb3f56e4751f79d2b8b3ed3fc881df7ba21a6c
-
Filesize
90KB
MD55b26d9029fc2b10b0cdcfa63aafa5689
SHA130927cae230f4b1a5eea3a8bb5548b8f8094c25f
SHA2562af500d75021ed8a953ba725a8a43958607a2c1eb984512fada39b340f0fb2f4
SHA51251c1942f249391f6443fb3317b00029826ab0e708a268db521bf1540644e91d0948d8184cbe8d6327177269f9ce48ab2373b382da98b9dd2cfbae37ae6a0590b
-
Filesize
90KB
MD5a01d08349105ba9677e809bf15aa34a9
SHA179768cadee580da9009425791437e965d045a5d1
SHA256966a9bf700dd46b2bd12a4488cf8ef59b7587db38279dd090bd2a486151511e9
SHA512f6d2810fe39c9e20ed788d7050d07a6aeb4dc3161ebc318d6a0f7849992abec43d645d97225765483d507a01d8ff75b81f6dc87ef8ea565a9e7b3e09b2d80c7e