Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe
Resource
win10v2004-20240802-en
General
-
Target
8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe
-
Size
89KB
-
MD5
0d4682de41cf510e58b094be2decd860
-
SHA1
5d77d8cc0a3ddfeb5835e6a37c2154666121730a
-
SHA256
8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7
-
SHA512
64f0b82658e5770e4324e283ea09a3d9fa900ec5c7358f981629b6b7ac987df252413ab5e69f577733053d1f789af9c9b617d089987babe3a1460861fde48e09
-
SSDEEP
768:Qvw9816vhKQLrot4/wQRNrfrunMxVFA3b7glL:YEGh0otl2unMxVS3Hg9
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4EAB145-DACE-486a-A9B5-AAB0666BE401} {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B868E1A1-E2C8-431b-99A1-62CA5A489EBA}\stubpath = "C:\\Windows\\{B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe" {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53E3A40A-01B7-43c3-B37A-589CC5EB946A}\stubpath = "C:\\Windows\\{53E3A40A-01B7-43c3-B37A-589CC5EB946A}.exe" {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2F39CC71-3DFA-4c24-BF49-62E5EB6D71EB} {53E3A40A-01B7-43c3-B37A-589CC5EB946A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84AEA5E6-FD5F-46fe-AF33-A3B674E38682}\stubpath = "C:\\Windows\\{84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe" {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}\stubpath = "C:\\Windows\\{E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe" 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{50ED6670-FC90-4f3f-8632-BC80605A0812} {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{50ED6670-FC90-4f3f-8632-BC80605A0812}\stubpath = "C:\\Windows\\{50ED6670-FC90-4f3f-8632-BC80605A0812}.exe" {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}\stubpath = "C:\\Windows\\{98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe" {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{53E3A40A-01B7-43c3-B37A-589CC5EB946A} {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2F39CC71-3DFA-4c24-BF49-62E5EB6D71EB}\stubpath = "C:\\Windows\\{2F39CC71-3DFA-4c24-BF49-62E5EB6D71EB}.exe" {53E3A40A-01B7-43c3-B37A-589CC5EB946A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580} 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4EAB145-DACE-486a-A9B5-AAB0666BE401}\stubpath = "C:\\Windows\\{D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe" {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B868E1A1-E2C8-431b-99A1-62CA5A489EBA} {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3CD31DD9-A31A-45e8-94CA-E95F5B9F4252} {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED} {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84AEA5E6-FD5F-46fe-AF33-A3B674E38682} {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}\stubpath = "C:\\Windows\\{3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe" {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe -
Deletes itself 1 IoCs
pid Process 1888 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2344 {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe 2120 {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe 2596 {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe 1892 {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe 2340 {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe 1528 {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe 532 {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe 2780 {53E3A40A-01B7-43c3-B37A-589CC5EB946A}.exe 2920 {2F39CC71-3DFA-4c24-BF49-62E5EB6D71EB}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{50ED6670-FC90-4f3f-8632-BC80605A0812}.exe {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe File created C:\Windows\{B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe File created C:\Windows\{3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe File created C:\Windows\{98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe File created C:\Windows\{2F39CC71-3DFA-4c24-BF49-62E5EB6D71EB}.exe {53E3A40A-01B7-43c3-B37A-589CC5EB946A}.exe File created C:\Windows\{D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe File created C:\Windows\{84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe File created C:\Windows\{53E3A40A-01B7-43c3-B37A-589CC5EB946A}.exe {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe File created C:\Windows\{E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2F39CC71-3DFA-4c24-BF49-62E5EB6D71EB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {53E3A40A-01B7-43c3-B37A-589CC5EB946A}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1996 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe Token: SeIncBasePriorityPrivilege 2344 {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe Token: SeIncBasePriorityPrivilege 2120 {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe Token: SeIncBasePriorityPrivilege 2596 {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe Token: SeIncBasePriorityPrivilege 1892 {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe Token: SeIncBasePriorityPrivilege 2340 {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe Token: SeIncBasePriorityPrivilege 1528 {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe Token: SeIncBasePriorityPrivilege 532 {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe Token: SeIncBasePriorityPrivilege 2780 {53E3A40A-01B7-43c3-B37A-589CC5EB946A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2344 1996 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe 31 PID 1996 wrote to memory of 2344 1996 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe 31 PID 1996 wrote to memory of 2344 1996 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe 31 PID 1996 wrote to memory of 2344 1996 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe 31 PID 1996 wrote to memory of 1888 1996 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe 32 PID 1996 wrote to memory of 1888 1996 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe 32 PID 1996 wrote to memory of 1888 1996 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe 32 PID 1996 wrote to memory of 1888 1996 8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe 32 PID 2344 wrote to memory of 2120 2344 {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe 33 PID 2344 wrote to memory of 2120 2344 {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe 33 PID 2344 wrote to memory of 2120 2344 {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe 33 PID 2344 wrote to memory of 2120 2344 {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe 33 PID 2344 wrote to memory of 2852 2344 {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe 34 PID 2344 wrote to memory of 2852 2344 {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe 34 PID 2344 wrote to memory of 2852 2344 {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe 34 PID 2344 wrote to memory of 2852 2344 {E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe 34 PID 2120 wrote to memory of 2596 2120 {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe 35 PID 2120 wrote to memory of 2596 2120 {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe 35 PID 2120 wrote to memory of 2596 2120 {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe 35 PID 2120 wrote to memory of 2596 2120 {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe 35 PID 2120 wrote to memory of 2704 2120 {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe 36 PID 2120 wrote to memory of 2704 2120 {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe 36 PID 2120 wrote to memory of 2704 2120 {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe 36 PID 2120 wrote to memory of 2704 2120 {84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe 36 PID 2596 wrote to memory of 1892 2596 {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe 37 PID 2596 wrote to memory of 1892 2596 {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe 37 PID 2596 wrote to memory of 1892 2596 {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe 37 PID 2596 wrote to memory of 1892 2596 {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe 37 PID 2596 wrote to memory of 2636 2596 {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe 38 PID 2596 wrote to memory of 2636 2596 {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe 38 PID 2596 wrote to memory of 2636 2596 {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe 38 PID 2596 wrote to memory of 2636 2596 {D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe 38 PID 1892 wrote to memory of 2340 1892 {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe 39 PID 1892 wrote to memory of 2340 1892 {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe 39 PID 1892 wrote to memory of 2340 1892 {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe 39 PID 1892 wrote to memory of 2340 1892 {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe 39 PID 1892 wrote to memory of 2068 1892 {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe 40 PID 1892 wrote to memory of 2068 1892 {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe 40 PID 1892 wrote to memory of 2068 1892 {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe 40 PID 1892 wrote to memory of 2068 1892 {50ED6670-FC90-4f3f-8632-BC80605A0812}.exe 40 PID 2340 wrote to memory of 1528 2340 {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe 41 PID 2340 wrote to memory of 1528 2340 {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe 41 PID 2340 wrote to memory of 1528 2340 {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe 41 PID 2340 wrote to memory of 1528 2340 {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe 41 PID 2340 wrote to memory of 2648 2340 {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe 42 PID 2340 wrote to memory of 2648 2340 {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe 42 PID 2340 wrote to memory of 2648 2340 {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe 42 PID 2340 wrote to memory of 2648 2340 {B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe 42 PID 1528 wrote to memory of 532 1528 {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe 43 PID 1528 wrote to memory of 532 1528 {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe 43 PID 1528 wrote to memory of 532 1528 {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe 43 PID 1528 wrote to memory of 532 1528 {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe 43 PID 1528 wrote to memory of 1340 1528 {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe 44 PID 1528 wrote to memory of 1340 1528 {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe 44 PID 1528 wrote to memory of 1340 1528 {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe 44 PID 1528 wrote to memory of 1340 1528 {3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe 44 PID 532 wrote to memory of 2780 532 {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe 45 PID 532 wrote to memory of 2780 532 {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe 45 PID 532 wrote to memory of 2780 532 {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe 45 PID 532 wrote to memory of 2780 532 {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe 45 PID 532 wrote to memory of 2940 532 {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe 46 PID 532 wrote to memory of 2940 532 {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe 46 PID 532 wrote to memory of 2940 532 {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe 46 PID 532 wrote to memory of 2940 532 {98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe"C:\Users\Admin\AppData\Local\Temp\8c31df4aa571921a298c7021fa366d19a6603e3cacd692250ea552ce0050e7f7N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\{E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exeC:\Windows\{E9B4A457-4E1E-4f9a-B4A4-FE0CF81EE580}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\{84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exeC:\Windows\{84AEA5E6-FD5F-46fe-AF33-A3B674E38682}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\{D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exeC:\Windows\{D4EAB145-DACE-486a-A9B5-AAB0666BE401}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\{50ED6670-FC90-4f3f-8632-BC80605A0812}.exeC:\Windows\{50ED6670-FC90-4f3f-8632-BC80605A0812}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\{B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exeC:\Windows\{B868E1A1-E2C8-431b-99A1-62CA5A489EBA}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\{3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exeC:\Windows\{3CD31DD9-A31A-45e8-94CA-E95F5B9F4252}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\{98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exeC:\Windows\{98EB809C-1EB7-44c6-AC0A-D9FA4B2A32ED}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\{53E3A40A-01B7-43c3-B37A-589CC5EB946A}.exeC:\Windows\{53E3A40A-01B7-43c3-B37A-589CC5EB946A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Windows\{2F39CC71-3DFA-4c24-BF49-62E5EB6D71EB}.exeC:\Windows\{2F39CC71-3DFA-4c24-BF49-62E5EB6D71EB}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{53E3A~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98EB8~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3CD31~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B868E~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{50ED6~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4EAB~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{84AEA~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E9B4A~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\8C31DF~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD54a789b26507602c0b1557c494146746e
SHA1da07b44a20ea7e2797e8ed40da113dd69e152c15
SHA256895f7383d34c6aeed2586580137c243ca2aaeeee97d94a4fa10121630ddd5308
SHA512c9372585111854ce5cc90f477debf78475cadb5b888d85410fe0389e9c3bddf8fa3cf089f4f1721d2e7c2fefbf374768f75cc1f59c3a40b9e5dc92a59aca0dd9
-
Filesize
89KB
MD5798befa4cbe6eebbfcf8e09d6e80d200
SHA1cd8cdc53037c63404110c50a4b867410801b3943
SHA256fdec38f7b3a6d7f9ce3fc38097ffc279f9c428d6d8c669283b634c34aaf13cb1
SHA51203fe9419b3d8eadc17c928f9b4eb5c79461fdb026624c699cd257ca82cbf0497c4dfebcf4e9300c9da7b97f600bbadcf481b628e04c516009c08ac037f79b48b
-
Filesize
89KB
MD52e12bc99a85492550b9cc1785977fbba
SHA148113d764af85f87abb64a627f6518d05600f577
SHA25613828fa579cb8acdfda79fddf132f4c8baace9cbcb428d4749e5819acf00a85d
SHA512dedb18c564f3a0f1c3788eb301a06e63111c2c8dc29767751ffe4800ca05d76b3818c762e073b99a791c2c7f549d35da26e9dce01ec783fbae4599cf1776c16e
-
Filesize
89KB
MD5cd1a9a32f3519fe697b52ebc290b187f
SHA1b9e8d91a7a45d831e11d85ce5690ffa1f3907b5d
SHA256914e1380a46fb630a75db6a0654b742045c6bd7cd6229c57837865246b4c0211
SHA512b3fec0fee4c9271a643c00004c5e7a8488f6c98862be4dcb200b36fb400fbd3cd9d5b85e218b2887bdcdfd23b5c3ea290b14b1e58a2bc53b4dceb39b2b24abc5
-
Filesize
89KB
MD550037647b20cf40cf4456e28151b0564
SHA11d1fdabfbe45e6828881dbe8fd52de62672bc26e
SHA256e25b77e11efae31e7f17f3b08e5924926d3e66ccee6282074ae0b18108d701c9
SHA512d958ad74c48304ef947233e5161778e682c240985cfbe171404ffa818912202740d76eb45b296c54832215bcd3fddc076cb8c0c119193713a6cbc4d4723305c4
-
Filesize
89KB
MD553872677a60944a0ffa73aa5f4460040
SHA15555b8c50b638f21745b083215b97efc8d1ecbce
SHA256dc619c566f108fe436f5039b00934fe338462c22c03fddc831dd61c782ce3e26
SHA5123fbc0890fc96e57f6bebf403f082d3b59943e350b4ae1efea5746c87f8a559ee87147a1c05a2eef3766027537146163a323dfe2e7fe2c3fbae53c956dfe0950d
-
Filesize
89KB
MD55083a04ab3dc336d5a294f3ba36b3638
SHA1750cd86f0a9d82723fa70ea4ce9cd555ba0a44b8
SHA256ef826eda17cb2a7a179d1dcb7fadd286a3e3aa8cd04ce7f24fb212af205eede3
SHA51213d6dbf47abca01f9cef1dc50d6cb489c7bd413d9a4eb704d324caf23fc6179a38d76c8608f45384486e258d14c8a8f08af0508b7803b20c122d8d88a31178be
-
Filesize
89KB
MD5fa2af10ff84f3af947154569d0e406d2
SHA125fdfae7f3ca98219e566702d8827eaa4ee13e4d
SHA25638735d4d0fea2e7ff9dcd6537e6147a7cb2fe1127095b4436329d3eed75b962a
SHA512222c06ea1586fb7db9db1422bb92d1584c63b7c4be08187fecae3ed4860a4b0af7f0ef42c1c81c5fc914c367206f087fdae4b58467e47b8b6d83b5dfa0ee40d5
-
Filesize
89KB
MD58ad17b07ea1aee7885e8957144837b21
SHA104fafc05ebd4c7f18d000ca75cdd5a3ad752f8d1
SHA25696ccfe7b6c5d9c9baa1c988aa92e013622b521cdceeb4c94ce4a5173d3c7f28a
SHA51210202512dc91e7ddaebf27b6b426c47255079474c4710c628e0ab3e3ef230c8e0e1a7c9c0a477c266e1ab452525b46e3646ff5b0ee3c4efda6dd57a10ecbc3ae