Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe
Resource
win10v2004-20240802-en
General
-
Target
66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe
-
Size
408KB
-
MD5
884f1c01db76673c60583c64fcb3d720
-
SHA1
029e80fe9f7a8464da0888e5d00cb73fb72d6dba
-
SHA256
66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135f
-
SHA512
0a5b20a98d9c9982edb310f2a387e7eb2e993cff8d2ff683d6d83e3938a8c6d8d51c64aba0e65b6208fc559ede3d24478f957c0b85808ee59684d09fc9b469e8
-
SSDEEP
3072:CEGh0oVl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGTldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{999278E0-921D-49ef-8AA0-BDAFEE7B711A}\stubpath = "C:\\Windows\\{999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe" 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}\stubpath = "C:\\Windows\\{BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe" {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4C73D4EE-7158-4500-A24D-9436F184C4CE} {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{301572E2-E8D3-4558-AEC8-4AFFD2822875} {61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{999278E0-921D-49ef-8AA0-BDAFEE7B711A} 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}\stubpath = "C:\\Windows\\{413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe" {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9348B883-9869-4da8-B60F-BD5406425C05}\stubpath = "C:\\Windows\\{9348B883-9869-4da8-B60F-BD5406425C05}.exe" {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}\stubpath = "C:\\Windows\\{61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}.exe" {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{301572E2-E8D3-4558-AEC8-4AFFD2822875}\stubpath = "C:\\Windows\\{301572E2-E8D3-4558-AEC8-4AFFD2822875}.exe" {61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8} {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BFE22F42-9B85-4d65-9A1E-31B3F9135ABA} {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4C73D4EE-7158-4500-A24D-9436F184C4CE}\stubpath = "C:\\Windows\\{4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe" {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9348B883-9869-4da8-B60F-BD5406425C05} {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{377614CD-B5FA-4be9-806F-2AF1EAA21104} {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2AE553E-526F-45fb-AB48-5DE787A494B8} {9348B883-9869-4da8-B60F-BD5406425C05}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2AE553E-526F-45fb-AB48-5DE787A494B8}\stubpath = "C:\\Windows\\{D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe" {9348B883-9869-4da8-B60F-BD5406425C05}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{377614CD-B5FA-4be9-806F-2AF1EAA21104}\stubpath = "C:\\Windows\\{377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe" {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{61D27477-FA8A-4d7c-A1B9-BDF5A892D86A} {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe -
Deletes itself 1 IoCs
pid Process 1492 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2372 {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe 2852 {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe 2812 {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe 2652 {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe 2224 {9348B883-9869-4da8-B60F-BD5406425C05}.exe 2876 {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe 2784 {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe 2912 {61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}.exe 2916 {301572E2-E8D3-4558-AEC8-4AFFD2822875}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe File created C:\Windows\{9348B883-9869-4da8-B60F-BD5406425C05}.exe {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe File created C:\Windows\{61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}.exe {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe File created C:\Windows\{301572E2-E8D3-4558-AEC8-4AFFD2822875}.exe {61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}.exe File created C:\Windows\{413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe File created C:\Windows\{BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe File created C:\Windows\{D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe {9348B883-9869-4da8-B60F-BD5406425C05}.exe File created C:\Windows\{377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe File created C:\Windows\{999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9348B883-9869-4da8-B60F-BD5406425C05}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {301572E2-E8D3-4558-AEC8-4AFFD2822875}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2508 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe Token: SeIncBasePriorityPrivilege 2372 {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe Token: SeIncBasePriorityPrivilege 2852 {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe Token: SeIncBasePriorityPrivilege 2812 {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe Token: SeIncBasePriorityPrivilege 2652 {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe Token: SeIncBasePriorityPrivilege 2224 {9348B883-9869-4da8-B60F-BD5406425C05}.exe Token: SeIncBasePriorityPrivilege 2876 {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe Token: SeIncBasePriorityPrivilege 2784 {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe Token: SeIncBasePriorityPrivilege 2912 {61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2372 2508 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe 31 PID 2508 wrote to memory of 2372 2508 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe 31 PID 2508 wrote to memory of 2372 2508 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe 31 PID 2508 wrote to memory of 2372 2508 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe 31 PID 2508 wrote to memory of 1492 2508 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe 32 PID 2508 wrote to memory of 1492 2508 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe 32 PID 2508 wrote to memory of 1492 2508 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe 32 PID 2508 wrote to memory of 1492 2508 66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe 32 PID 2372 wrote to memory of 2852 2372 {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe 33 PID 2372 wrote to memory of 2852 2372 {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe 33 PID 2372 wrote to memory of 2852 2372 {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe 33 PID 2372 wrote to memory of 2852 2372 {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe 33 PID 2372 wrote to memory of 2884 2372 {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe 34 PID 2372 wrote to memory of 2884 2372 {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe 34 PID 2372 wrote to memory of 2884 2372 {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe 34 PID 2372 wrote to memory of 2884 2372 {999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe 34 PID 2852 wrote to memory of 2812 2852 {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe 35 PID 2852 wrote to memory of 2812 2852 {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe 35 PID 2852 wrote to memory of 2812 2852 {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe 35 PID 2852 wrote to memory of 2812 2852 {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe 35 PID 2852 wrote to memory of 2408 2852 {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe 36 PID 2852 wrote to memory of 2408 2852 {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe 36 PID 2852 wrote to memory of 2408 2852 {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe 36 PID 2852 wrote to memory of 2408 2852 {413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe 36 PID 2812 wrote to memory of 2652 2812 {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe 37 PID 2812 wrote to memory of 2652 2812 {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe 37 PID 2812 wrote to memory of 2652 2812 {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe 37 PID 2812 wrote to memory of 2652 2812 {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe 37 PID 2812 wrote to memory of 2612 2812 {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe 38 PID 2812 wrote to memory of 2612 2812 {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe 38 PID 2812 wrote to memory of 2612 2812 {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe 38 PID 2812 wrote to memory of 2612 2812 {BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe 38 PID 2652 wrote to memory of 2224 2652 {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe 39 PID 2652 wrote to memory of 2224 2652 {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe 39 PID 2652 wrote to memory of 2224 2652 {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe 39 PID 2652 wrote to memory of 2224 2652 {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe 39 PID 2652 wrote to memory of 1428 2652 {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe 40 PID 2652 wrote to memory of 1428 2652 {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe 40 PID 2652 wrote to memory of 1428 2652 {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe 40 PID 2652 wrote to memory of 1428 2652 {4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe 40 PID 2224 wrote to memory of 2876 2224 {9348B883-9869-4da8-B60F-BD5406425C05}.exe 41 PID 2224 wrote to memory of 2876 2224 {9348B883-9869-4da8-B60F-BD5406425C05}.exe 41 PID 2224 wrote to memory of 2876 2224 {9348B883-9869-4da8-B60F-BD5406425C05}.exe 41 PID 2224 wrote to memory of 2876 2224 {9348B883-9869-4da8-B60F-BD5406425C05}.exe 41 PID 2224 wrote to memory of 2656 2224 {9348B883-9869-4da8-B60F-BD5406425C05}.exe 42 PID 2224 wrote to memory of 2656 2224 {9348B883-9869-4da8-B60F-BD5406425C05}.exe 42 PID 2224 wrote to memory of 2656 2224 {9348B883-9869-4da8-B60F-BD5406425C05}.exe 42 PID 2224 wrote to memory of 2656 2224 {9348B883-9869-4da8-B60F-BD5406425C05}.exe 42 PID 2876 wrote to memory of 2784 2876 {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe 43 PID 2876 wrote to memory of 2784 2876 {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe 43 PID 2876 wrote to memory of 2784 2876 {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe 43 PID 2876 wrote to memory of 2784 2876 {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe 43 PID 2876 wrote to memory of 316 2876 {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe 44 PID 2876 wrote to memory of 316 2876 {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe 44 PID 2876 wrote to memory of 316 2876 {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe 44 PID 2876 wrote to memory of 316 2876 {D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe 44 PID 2784 wrote to memory of 2912 2784 {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe 45 PID 2784 wrote to memory of 2912 2784 {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe 45 PID 2784 wrote to memory of 2912 2784 {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe 45 PID 2784 wrote to memory of 2912 2784 {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe 45 PID 2784 wrote to memory of 1424 2784 {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe 46 PID 2784 wrote to memory of 1424 2784 {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe 46 PID 2784 wrote to memory of 1424 2784 {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe 46 PID 2784 wrote to memory of 1424 2784 {377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe"C:\Users\Admin\AppData\Local\Temp\66d703abd497256f999f352293002aa925aa931cf782063b9cd8f8db9113135fN.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\{999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exeC:\Windows\{999278E0-921D-49ef-8AA0-BDAFEE7B711A}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\{413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exeC:\Windows\{413D4F87-ACB0-4ec1-A72D-DFF5AC0540C8}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\{BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exeC:\Windows\{BFE22F42-9B85-4d65-9A1E-31B3F9135ABA}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\{4C73D4EE-7158-4500-A24D-9436F184C4CE}.exeC:\Windows\{4C73D4EE-7158-4500-A24D-9436F184C4CE}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\{9348B883-9869-4da8-B60F-BD5406425C05}.exeC:\Windows\{9348B883-9869-4da8-B60F-BD5406425C05}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\{D2AE553E-526F-45fb-AB48-5DE787A494B8}.exeC:\Windows\{D2AE553E-526F-45fb-AB48-5DE787A494B8}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\{377614CD-B5FA-4be9-806F-2AF1EAA21104}.exeC:\Windows\{377614CD-B5FA-4be9-806F-2AF1EAA21104}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\{61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}.exeC:\Windows\{61D27477-FA8A-4d7c-A1B9-BDF5A892D86A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Windows\{301572E2-E8D3-4558-AEC8-4AFFD2822875}.exeC:\Windows\{301572E2-E8D3-4558-AEC8-4AFFD2822875}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{61D27~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37761~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2AE5~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9348B~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4C73D~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BFE22~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{413D4~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{99927~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\66D703~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD50250bc96c0fb130fcf0c05beae68b46d
SHA1f006cc41acca6c77714d3cdef209665e0ff15ca7
SHA256c4337460370b20346f726fcbecb3e253747630d328d35bbc46e236f91f3b7570
SHA5125eec067354478b4774003442a64128084966ae1b1221b5625b48fe972f8ff189a7114672684f1f2afec1aad6238f61cd54d25a65b498e9c00af02c358e9c2efe
-
Filesize
408KB
MD58c2c31898a5738abe0a29a0669739975
SHA15c061cad16e3793b52dbf30d5324cf2e2f059982
SHA25628f868f57cd84af7f74686d065b4b43aa50cbd54c9e824a7669dcde1e0e627d4
SHA512409cb3ed9e3092714b0844e53140f2714727b298cfe8f81a008ece59bef97f053c12b1a0102a83e665e92072498cc3a182c2e9cc66ca4e2b5a796335b03a6fee
-
Filesize
408KB
MD5f864043d5e9d53f27eaf55e0f74fa21a
SHA1e939c95ce0603dbea12b0a2a6dc9b4ce824ac6ac
SHA256fc6a53e69e452462e6a323d7ee91232cfb5367c3e26b4755ec888539097c2d1c
SHA512f9d60f32a8fab45fa496a9eaf85749fb72e8a36e947a2f3e16a5cbd5c8fe26aacbcf9da0673ad167adf94f91401ca2063bc156c3f463c38a2ce7fd70d0fe0294
-
Filesize
408KB
MD5f0ae19024a842b64f034fe779d4b94fa
SHA1800d056e4453a2a1a77eb4e871c2ca1ded51656c
SHA256c83ad9add7ee7672feb9c686440969fd199e27c00c541f291cb55532a73a9a3b
SHA512683d484ddaf816bafdfd0264938107e9981e9f9551ed123a11194735859a5322b3e58a41df804080001b8b6f10b625ee0e7269ce9660e1bf27cd2aca6bd481b4
-
Filesize
408KB
MD5c3d439c800cb6e36fbfe9aaa9872bea8
SHA12e7504c945d79be8810643ba93694c038a8e54e1
SHA256f6bef55c8f3c4796eae6c9e1fbae9bdb69c60de0eb116bdef9a4d3d2bfdbe66e
SHA51226cb341ca72f0eb38c5a8280d382a66139da26a75a4d9baeefa6bd9ce76cdf6cdd71d8124435e2f3375088dbb9da1a090febd925e8d4c01199f8c483c6d4f3a9
-
Filesize
408KB
MD5ef265cf1e601edbaa90a865edb5db9f8
SHA1ee8ecdcdc5c21d63675bc76bad427204d47c0bb0
SHA256f161457dc5cd2d0780edeecef112633c47cd88ee52b3e256e183dfefd41f7127
SHA512305303766b1a91c8ea0e4dc254c014551d8c96842357694fa41505241a7a4d98189dad883f0744c5acbdddcc9b5fbde9691f1f6cff55255540470f6bd91b2faf
-
Filesize
408KB
MD5f9a77a1d4e4c9f2d00ef8aaea81a0e1f
SHA1b9567f52e9a6256f5f3d6391d64de2043d4a9b64
SHA2564e451d7ad20493069ee9a8f12732ef41461105757f0ee4fa107864d11ef5f03f
SHA512f1d1dd852041ef90e206d2d36f67739e3515d93b2e9d97afc82890481426b5c4567324a75ccac33968a4bc7a9a943333e072cea7930c4c473481dafba834ff3d
-
Filesize
408KB
MD53f5a85235c1303b9be140a2177eb3cc8
SHA1d3c395ee99b384606871068d308126cc556ebe9a
SHA2566949bcd85ea36cbe6074f7f8479010e44e508c10d63fc1a470893605d98357dd
SHA5120a35b2144c4b202d91580b67b83754a231d75ab391aeee41f9dbe9ea8a5eabb79bd34c1ed00cdc9744e7020129715540a681d30aecf942c2758dc76f862439d1
-
Filesize
408KB
MD5e9ca7a1aa203c28fbf30ced64dec0fde
SHA1cac62350f8301e97c22882ade4f47649f1911c14
SHA2568f05d406582f7591dfa55ffdeb31afc880e95361a164278b097f5c1358194893
SHA512ce9f48125abe2967a5341c5be6566f50c654f8b46f48c6d8f96bfbb6109bb00ac8a12e0fd874f80904355052473d3b40d51622cb8950992bbd6c9693d4c41a58