Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe
Resource
win10v2004-20240802-en
General
-
Target
46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe
-
Size
60KB
-
MD5
9e4c3e23b2abbd529173c1abb64cfa30
-
SHA1
0e663f3dd90b46f5351edd2a859531d8a19e474b
-
SHA256
46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123d
-
SHA512
4032bf27b23fd1ee833b015a8e36a33f2ff5966effdec72a9a8d41b5e710364634ccd272d9e1221295c9bf261c36bb266059c03f16112e09a5df093384af97cd
-
SSDEEP
384:vbLwOs8AHsc4sMfwhKQLroBSKT4/CFsrd:vvw9816vhKQLroBN4/wQ
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}\stubpath = "C:\\Windows\\{D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}.exe" {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F8779B32-014D-4743-AE93-FBA53F179435}\stubpath = "C:\\Windows\\{F8779B32-014D-4743-AE93-FBA53F179435}.exe" {D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BF009984-EA4F-4e54-A7AA-B568FD85BE1F} 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E922862C-5411-471d-895C-640159FD2772} {E9AE4401-755C-435d-A977-EAB1A7382024}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{87BB2E58-4234-40ef-A1ED-18499E735664}\stubpath = "C:\\Windows\\{87BB2E58-4234-40ef-A1ED-18499E735664}.exe" {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}\stubpath = "C:\\Windows\\{5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe" {81497DEF-0847-425c-B23B-1748A1139697}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81497DEF-0847-425c-B23B-1748A1139697}\stubpath = "C:\\Windows\\{81497DEF-0847-425c-B23B-1748A1139697}.exe" {87BB2E58-4234-40ef-A1ED-18499E735664}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C} {81497DEF-0847-425c-B23B-1748A1139697}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9DDDD3E-09F2-46d7-86C4-CB3895AF338E} {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F8779B32-014D-4743-AE93-FBA53F179435} {D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E9AE4401-755C-435d-A977-EAB1A7382024} {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E9AE4401-755C-435d-A977-EAB1A7382024}\stubpath = "C:\\Windows\\{E9AE4401-755C-435d-A977-EAB1A7382024}.exe" {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{729C707E-B33B-4ff5-AC8F-E377FADC2454}\stubpath = "C:\\Windows\\{729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe" {E922862C-5411-471d-895C-640159FD2772}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81497DEF-0847-425c-B23B-1748A1139697} {87BB2E58-4234-40ef-A1ED-18499E735664}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BF009984-EA4F-4e54-A7AA-B568FD85BE1F}\stubpath = "C:\\Windows\\{BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe" 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E922862C-5411-471d-895C-640159FD2772}\stubpath = "C:\\Windows\\{E922862C-5411-471d-895C-640159FD2772}.exe" {E9AE4401-755C-435d-A977-EAB1A7382024}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{729C707E-B33B-4ff5-AC8F-E377FADC2454} {E922862C-5411-471d-895C-640159FD2772}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{87BB2E58-4234-40ef-A1ED-18499E735664} {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe -
Deletes itself 1 IoCs
pid Process 2352 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2584 {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe 2816 {E9AE4401-755C-435d-A977-EAB1A7382024}.exe 2700 {E922862C-5411-471d-895C-640159FD2772}.exe 2712 {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe 2936 {87BB2E58-4234-40ef-A1ED-18499E735664}.exe 2520 {81497DEF-0847-425c-B23B-1748A1139697}.exe 2044 {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe 2932 {D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}.exe 1852 {F8779B32-014D-4743-AE93-FBA53F179435}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{E9AE4401-755C-435d-A977-EAB1A7382024}.exe {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe File created C:\Windows\{E922862C-5411-471d-895C-640159FD2772}.exe {E9AE4401-755C-435d-A977-EAB1A7382024}.exe File created C:\Windows\{87BB2E58-4234-40ef-A1ED-18499E735664}.exe {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe File created C:\Windows\{81497DEF-0847-425c-B23B-1748A1139697}.exe {87BB2E58-4234-40ef-A1ED-18499E735664}.exe File created C:\Windows\{5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe {81497DEF-0847-425c-B23B-1748A1139697}.exe File created C:\Windows\{BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe File created C:\Windows\{D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}.exe {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe File created C:\Windows\{F8779B32-014D-4743-AE93-FBA53F179435}.exe {D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}.exe File created C:\Windows\{729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe {E922862C-5411-471d-895C-640159FD2772}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E9AE4401-755C-435d-A977-EAB1A7382024}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E922862C-5411-471d-895C-640159FD2772}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {87BB2E58-4234-40ef-A1ED-18499E735664}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F8779B32-014D-4743-AE93-FBA53F179435}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {81497DEF-0847-425c-B23B-1748A1139697}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1080 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe Token: SeIncBasePriorityPrivilege 2584 {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe Token: SeIncBasePriorityPrivilege 2816 {E9AE4401-755C-435d-A977-EAB1A7382024}.exe Token: SeIncBasePriorityPrivilege 2700 {E922862C-5411-471d-895C-640159FD2772}.exe Token: SeIncBasePriorityPrivilege 2712 {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe Token: SeIncBasePriorityPrivilege 2936 {87BB2E58-4234-40ef-A1ED-18499E735664}.exe Token: SeIncBasePriorityPrivilege 2520 {81497DEF-0847-425c-B23B-1748A1139697}.exe Token: SeIncBasePriorityPrivilege 2044 {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe Token: SeIncBasePriorityPrivilege 2932 {D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2584 1080 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe 30 PID 1080 wrote to memory of 2584 1080 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe 30 PID 1080 wrote to memory of 2584 1080 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe 30 PID 1080 wrote to memory of 2584 1080 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe 30 PID 1080 wrote to memory of 2352 1080 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe 31 PID 1080 wrote to memory of 2352 1080 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe 31 PID 1080 wrote to memory of 2352 1080 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe 31 PID 1080 wrote to memory of 2352 1080 46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe 31 PID 2584 wrote to memory of 2816 2584 {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe 32 PID 2584 wrote to memory of 2816 2584 {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe 32 PID 2584 wrote to memory of 2816 2584 {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe 32 PID 2584 wrote to memory of 2816 2584 {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe 32 PID 2584 wrote to memory of 828 2584 {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe 33 PID 2584 wrote to memory of 828 2584 {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe 33 PID 2584 wrote to memory of 828 2584 {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe 33 PID 2584 wrote to memory of 828 2584 {BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe 33 PID 2816 wrote to memory of 2700 2816 {E9AE4401-755C-435d-A977-EAB1A7382024}.exe 34 PID 2816 wrote to memory of 2700 2816 {E9AE4401-755C-435d-A977-EAB1A7382024}.exe 34 PID 2816 wrote to memory of 2700 2816 {E9AE4401-755C-435d-A977-EAB1A7382024}.exe 34 PID 2816 wrote to memory of 2700 2816 {E9AE4401-755C-435d-A977-EAB1A7382024}.exe 34 PID 2816 wrote to memory of 2836 2816 {E9AE4401-755C-435d-A977-EAB1A7382024}.exe 35 PID 2816 wrote to memory of 2836 2816 {E9AE4401-755C-435d-A977-EAB1A7382024}.exe 35 PID 2816 wrote to memory of 2836 2816 {E9AE4401-755C-435d-A977-EAB1A7382024}.exe 35 PID 2816 wrote to memory of 2836 2816 {E9AE4401-755C-435d-A977-EAB1A7382024}.exe 35 PID 2700 wrote to memory of 2712 2700 {E922862C-5411-471d-895C-640159FD2772}.exe 36 PID 2700 wrote to memory of 2712 2700 {E922862C-5411-471d-895C-640159FD2772}.exe 36 PID 2700 wrote to memory of 2712 2700 {E922862C-5411-471d-895C-640159FD2772}.exe 36 PID 2700 wrote to memory of 2712 2700 {E922862C-5411-471d-895C-640159FD2772}.exe 36 PID 2700 wrote to memory of 2832 2700 {E922862C-5411-471d-895C-640159FD2772}.exe 37 PID 2700 wrote to memory of 2832 2700 {E922862C-5411-471d-895C-640159FD2772}.exe 37 PID 2700 wrote to memory of 2832 2700 {E922862C-5411-471d-895C-640159FD2772}.exe 37 PID 2700 wrote to memory of 2832 2700 {E922862C-5411-471d-895C-640159FD2772}.exe 37 PID 2712 wrote to memory of 2936 2712 {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe 38 PID 2712 wrote to memory of 2936 2712 {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe 38 PID 2712 wrote to memory of 2936 2712 {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe 38 PID 2712 wrote to memory of 2936 2712 {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe 38 PID 2712 wrote to memory of 1708 2712 {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe 39 PID 2712 wrote to memory of 1708 2712 {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe 39 PID 2712 wrote to memory of 1708 2712 {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe 39 PID 2712 wrote to memory of 1708 2712 {729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe 39 PID 2936 wrote to memory of 2520 2936 {87BB2E58-4234-40ef-A1ED-18499E735664}.exe 40 PID 2936 wrote to memory of 2520 2936 {87BB2E58-4234-40ef-A1ED-18499E735664}.exe 40 PID 2936 wrote to memory of 2520 2936 {87BB2E58-4234-40ef-A1ED-18499E735664}.exe 40 PID 2936 wrote to memory of 2520 2936 {87BB2E58-4234-40ef-A1ED-18499E735664}.exe 40 PID 2936 wrote to memory of 1692 2936 {87BB2E58-4234-40ef-A1ED-18499E735664}.exe 41 PID 2936 wrote to memory of 1692 2936 {87BB2E58-4234-40ef-A1ED-18499E735664}.exe 41 PID 2936 wrote to memory of 1692 2936 {87BB2E58-4234-40ef-A1ED-18499E735664}.exe 41 PID 2936 wrote to memory of 1692 2936 {87BB2E58-4234-40ef-A1ED-18499E735664}.exe 41 PID 2520 wrote to memory of 2044 2520 {81497DEF-0847-425c-B23B-1748A1139697}.exe 42 PID 2520 wrote to memory of 2044 2520 {81497DEF-0847-425c-B23B-1748A1139697}.exe 42 PID 2520 wrote to memory of 2044 2520 {81497DEF-0847-425c-B23B-1748A1139697}.exe 42 PID 2520 wrote to memory of 2044 2520 {81497DEF-0847-425c-B23B-1748A1139697}.exe 42 PID 2520 wrote to memory of 2960 2520 {81497DEF-0847-425c-B23B-1748A1139697}.exe 43 PID 2520 wrote to memory of 2960 2520 {81497DEF-0847-425c-B23B-1748A1139697}.exe 43 PID 2520 wrote to memory of 2960 2520 {81497DEF-0847-425c-B23B-1748A1139697}.exe 43 PID 2520 wrote to memory of 2960 2520 {81497DEF-0847-425c-B23B-1748A1139697}.exe 43 PID 2044 wrote to memory of 2932 2044 {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe 44 PID 2044 wrote to memory of 2932 2044 {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe 44 PID 2044 wrote to memory of 2932 2044 {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe 44 PID 2044 wrote to memory of 2932 2044 {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe 44 PID 2044 wrote to memory of 3060 2044 {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe 45 PID 2044 wrote to memory of 3060 2044 {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe 45 PID 2044 wrote to memory of 3060 2044 {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe 45 PID 2044 wrote to memory of 3060 2044 {5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe"C:\Users\Admin\AppData\Local\Temp\46803e966d397456fdb5a44df154004e5388ab3f7843fc8bceffc0b06721123dN.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\{BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exeC:\Windows\{BF009984-EA4F-4e54-A7AA-B568FD85BE1F}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\{E9AE4401-755C-435d-A977-EAB1A7382024}.exeC:\Windows\{E9AE4401-755C-435d-A977-EAB1A7382024}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\{E922862C-5411-471d-895C-640159FD2772}.exeC:\Windows\{E922862C-5411-471d-895C-640159FD2772}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\{729C707E-B33B-4ff5-AC8F-E377FADC2454}.exeC:\Windows\{729C707E-B33B-4ff5-AC8F-E377FADC2454}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\{87BB2E58-4234-40ef-A1ED-18499E735664}.exeC:\Windows\{87BB2E58-4234-40ef-A1ED-18499E735664}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\{81497DEF-0847-425c-B23B-1748A1139697}.exeC:\Windows\{81497DEF-0847-425c-B23B-1748A1139697}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\{5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exeC:\Windows\{5C39FA7F-CBFF-45be-98EE-D271C3CCAC2C}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\{D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}.exeC:\Windows\{D9DDDD3E-09F2-46d7-86C4-CB3895AF338E}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2932 -
C:\Windows\{F8779B32-014D-4743-AE93-FBA53F179435}.exeC:\Windows\{F8779B32-014D-4743-AE93-FBA53F179435}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9DDD~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C39F~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81497~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{87BB2~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{729C7~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E9228~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E9AE4~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BF009~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\46803E~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD59043ed46b4b2ba533eff0bf726ee4e13
SHA1a118258fea6951f1b37b55fab0dce4618aa26efd
SHA2566d64420192d73ac1f334ad16d5e0a2f385f4d0c564e92e4e172ff4c44601a9ed
SHA5127ad29a10bf490e53b0681b8bca11d7893b041e73d086f33611b5fbe096b04db557775f268bdb8cdd533ddd78889f1010636fc05b4bd93c6c074d10e2d625f783
-
Filesize
60KB
MD51a9e682005a51376834c0b69da10fc92
SHA1cbfc1d5cdd6650620f1c8cc5f3d243a4c025c811
SHA2569d8cbef5f9594487669d4a6cc9f4eb6bb6f1ce77486c6a9d3f2e464b39ae6800
SHA512fe99d640394bc3d863b44ffceeb57f3e491d5ecae84d0e8c2832728e4df5ba58a557ee63fa53984c4a5cc9d18dbd133f37f52698ce8542ea6da7017963787594
-
Filesize
60KB
MD5c2c44bd9959094c8b6d5f6ac91174327
SHA162e557a084903c75723af96cbba5fe3e204e9a53
SHA256508b19dfca94a9eb2c4d2b5b20b65ef14337ad6a9b0b26be545e5cf8b3b7b613
SHA5128f371a353b2185abd99eac398203ae5a1c523db9de12509890506846d6b0938207b6664497e10215445accc7f52113a0af1ae6ff17b150228ddce5f8102e64c7
-
Filesize
60KB
MD56c0c2d4aa5789236de32a0cb7c513297
SHA12b3f517e94dbe96c27b556d8907793384151044e
SHA256fe94cd3b008e2f9c035d7e56b8f67146a1b39cd2aa00255c8868134bd6525b58
SHA512ac5d4bd7654655f2f6cb22709d83c637fcbc08e3c6c38b6a5ec804043417812af45dddc4a3a3fd9f1c27468437d2e6c2cb5ac31782fe067ce2144c5f0286dd89
-
Filesize
60KB
MD5eb757201856c319716f4dfec017c20bb
SHA1ab90d69dc1638d3b7c0b242aee6eb4bd475e75e1
SHA2564025dbd8620d316b1602cceb157b4b79c3c664e5f526565480ab5064ec395f30
SHA5125c41e1887a41a6b78203b238b10435651aa2a1ed477793711598e25a465ca43c99800004f5a56f493ad29ade85ecd0ecd332032edda491100df94187c21c1094
-
Filesize
60KB
MD569a8cc54e2199b47314769f59fdf8afe
SHA19797ae1e8b4a6ba66e519306c936991aca852608
SHA25676f220a3f603e9503f47e42e55de6ecdaef727a6f54724944787d63c7427b32f
SHA51232f1d681a29dbe7c425eae6a2bc7a71e86e3a5874f3d1ce1f1945ace0dd21d1bd4ff90482ed8bf0d8f76e15d2a2584c682783cbce787bfd689a3cfff579dbda2
-
Filesize
60KB
MD5e4ab1b0507504db863eb13f4b9d39c64
SHA13c68f7767454cef332b134be88541951ee4386a4
SHA256a0fb2c3ef409c95865ca025d80d6ac10db19422ecc35fc81953d096dff6298aa
SHA512ae6aa0a32f9da66bdcb2d71a1e45276d983c06aac139fcfb71d268942880135b60e8a06988fb4fc72bb7ed450687e169152399d5e9159f37dee1190645b5c1b0
-
Filesize
60KB
MD5f5c5a7694083989d9fb260712487e8f6
SHA16ad97f3d512da6ef4446ebca3b93a81e7eb9678e
SHA256f149bc842001c23db12732f2ce0de0a949b3535b9185a50265023d99dad160ad
SHA512db7fa6db95738ddbd3e935c4691c7e922884df3f5bd8481fd6cb5e24e1caa375cf799fb778ef9dce10b24d174784a5d21cc634e7a7d94110f7b5ebc9a4836123
-
Filesize
60KB
MD53faa1549de4969b7ebc95858e9436615
SHA15af94817948a5b833d679a4daf3df0122efc33fd
SHA256e4c383907c32efb833b33d31ba0ba1d505cce98ec90a5528970262e304b761c6
SHA5123d1704592a139297d542f801f8dcb5f46da41540ddbd4342f61563df90fbdfce0a1947db2765754945f6d8eb6560f0a977eb1f573a1050f74c81242c996f827c