Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe
Resource
win10v2004-20240802-en
General
-
Target
11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe
-
Size
90KB
-
MD5
a33799b4413ca558fefbd2815dd58d70
-
SHA1
4254fbb8eae91c7be70323de60a0bd32023d54b4
-
SHA256
11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53
-
SHA512
2a82fee977e72c4040ae93c0dd75c71fc6e5caa32d853179b270b45ed3c168fd180b6dfdeacba999046735fac2beb105b8b7daf4346a06cb9cfadb52e26aca9d
-
SSDEEP
768:Qvw9816vhKQLroY4/wQRNrfrunMxVFA3b7glw:YEGh0oYl2unMxVS3Hg
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED} 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{011F2BD5-5B66-4425-BE02-A335DDBE20E1}\stubpath = "C:\\Windows\\{011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe" {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A464D94-2319-4c39-8F5F-E4E576269C71}\stubpath = "C:\\Windows\\{9A464D94-2319-4c39-8F5F-E4E576269C71}.exe" {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A464D94-2319-4c39-8F5F-E4E576269C71} {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EF470168-616D-41cd-87B5-223CBE56C894}\stubpath = "C:\\Windows\\{EF470168-616D-41cd-87B5-223CBE56C894}.exe" {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F689424-7D49-4632-97AF-09DDCB519D66} {EF470168-616D-41cd-87B5-223CBE56C894}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{011F2BD5-5B66-4425-BE02-A335DDBE20E1} {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A20AAF6-4589-4ad8-A559-DAA06BF4487A} {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F689424-7D49-4632-97AF-09DDCB519D66}\stubpath = "C:\\Windows\\{5F689424-7D49-4632-97AF-09DDCB519D66}.exe" {EF470168-616D-41cd-87B5-223CBE56C894}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06BAC080-ABD2-4901-9383-7269C1F9E012} {5F689424-7D49-4632-97AF-09DDCB519D66}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EB9BF7B5-E01D-4832-BF37-324758E393EB} {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D3F4F06-57D3-4344-B4A1-A27931E2EAED} {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D3F4F06-57D3-4344-B4A1-A27931E2EAED}\stubpath = "C:\\Windows\\{8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe" {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EF470168-616D-41cd-87B5-223CBE56C894} {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06BAC080-ABD2-4901-9383-7269C1F9E012}\stubpath = "C:\\Windows\\{06BAC080-ABD2-4901-9383-7269C1F9E012}.exe" {5F689424-7D49-4632-97AF-09DDCB519D66}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}\stubpath = "C:\\Windows\\{6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe" 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EB9BF7B5-E01D-4832-BF37-324758E393EB}\stubpath = "C:\\Windows\\{EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe" {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A20AAF6-4589-4ad8-A559-DAA06BF4487A}\stubpath = "C:\\Windows\\{9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe" {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe -
Executes dropped EXE 9 IoCs
pid Process 2016 {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe 2092 {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe 2780 {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe 2124 {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe 1668 {EF470168-616D-41cd-87B5-223CBE56C894}.exe 2896 {5F689424-7D49-4632-97AF-09DDCB519D66}.exe 3016 {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe 5040 {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe 4648 {9A464D94-2319-4c39-8F5F-E4E576269C71}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{9A464D94-2319-4c39-8F5F-E4E576269C71}.exe {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe File created C:\Windows\{6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe File created C:\Windows\{EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe File created C:\Windows\{8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe File created C:\Windows\{5F689424-7D49-4632-97AF-09DDCB519D66}.exe {EF470168-616D-41cd-87B5-223CBE56C894}.exe File created C:\Windows\{011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe File created C:\Windows\{9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe File created C:\Windows\{EF470168-616D-41cd-87B5-223CBE56C894}.exe {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe File created C:\Windows\{06BAC080-ABD2-4901-9383-7269C1F9E012}.exe {5F689424-7D49-4632-97AF-09DDCB519D66}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EF470168-616D-41cd-87B5-223CBE56C894}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5F689424-7D49-4632-97AF-09DDCB519D66}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9A464D94-2319-4c39-8F5F-E4E576269C71}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4212 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe Token: SeIncBasePriorityPrivilege 2016 {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe Token: SeIncBasePriorityPrivilege 2092 {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe Token: SeIncBasePriorityPrivilege 2780 {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe Token: SeIncBasePriorityPrivilege 2124 {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe Token: SeIncBasePriorityPrivilege 1668 {EF470168-616D-41cd-87B5-223CBE56C894}.exe Token: SeIncBasePriorityPrivilege 2896 {5F689424-7D49-4632-97AF-09DDCB519D66}.exe Token: SeIncBasePriorityPrivilege 3016 {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe Token: SeIncBasePriorityPrivilege 5040 {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4212 wrote to memory of 2016 4212 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe 89 PID 4212 wrote to memory of 2016 4212 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe 89 PID 4212 wrote to memory of 2016 4212 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe 89 PID 4212 wrote to memory of 4944 4212 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe 90 PID 4212 wrote to memory of 4944 4212 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe 90 PID 4212 wrote to memory of 4944 4212 11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe 90 PID 2016 wrote to memory of 2092 2016 {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe 91 PID 2016 wrote to memory of 2092 2016 {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe 91 PID 2016 wrote to memory of 2092 2016 {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe 91 PID 2016 wrote to memory of 5100 2016 {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe 92 PID 2016 wrote to memory of 5100 2016 {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe 92 PID 2016 wrote to memory of 5100 2016 {6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe 92 PID 2092 wrote to memory of 2780 2092 {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe 95 PID 2092 wrote to memory of 2780 2092 {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe 95 PID 2092 wrote to memory of 2780 2092 {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe 95 PID 2092 wrote to memory of 2336 2092 {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe 96 PID 2092 wrote to memory of 2336 2092 {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe 96 PID 2092 wrote to memory of 2336 2092 {EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe 96 PID 2780 wrote to memory of 2124 2780 {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe 97 PID 2780 wrote to memory of 2124 2780 {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe 97 PID 2780 wrote to memory of 2124 2780 {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe 97 PID 2780 wrote to memory of 3432 2780 {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe 98 PID 2780 wrote to memory of 3432 2780 {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe 98 PID 2780 wrote to memory of 3432 2780 {8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe 98 PID 2124 wrote to memory of 1668 2124 {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe 99 PID 2124 wrote to memory of 1668 2124 {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe 99 PID 2124 wrote to memory of 1668 2124 {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe 99 PID 2124 wrote to memory of 2904 2124 {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe 100 PID 2124 wrote to memory of 2904 2124 {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe 100 PID 2124 wrote to memory of 2904 2124 {9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe 100 PID 1668 wrote to memory of 2896 1668 {EF470168-616D-41cd-87B5-223CBE56C894}.exe 101 PID 1668 wrote to memory of 2896 1668 {EF470168-616D-41cd-87B5-223CBE56C894}.exe 101 PID 1668 wrote to memory of 2896 1668 {EF470168-616D-41cd-87B5-223CBE56C894}.exe 101 PID 1668 wrote to memory of 2168 1668 {EF470168-616D-41cd-87B5-223CBE56C894}.exe 102 PID 1668 wrote to memory of 2168 1668 {EF470168-616D-41cd-87B5-223CBE56C894}.exe 102 PID 1668 wrote to memory of 2168 1668 {EF470168-616D-41cd-87B5-223CBE56C894}.exe 102 PID 2896 wrote to memory of 3016 2896 {5F689424-7D49-4632-97AF-09DDCB519D66}.exe 103 PID 2896 wrote to memory of 3016 2896 {5F689424-7D49-4632-97AF-09DDCB519D66}.exe 103 PID 2896 wrote to memory of 3016 2896 {5F689424-7D49-4632-97AF-09DDCB519D66}.exe 103 PID 2896 wrote to memory of 1848 2896 {5F689424-7D49-4632-97AF-09DDCB519D66}.exe 104 PID 2896 wrote to memory of 1848 2896 {5F689424-7D49-4632-97AF-09DDCB519D66}.exe 104 PID 2896 wrote to memory of 1848 2896 {5F689424-7D49-4632-97AF-09DDCB519D66}.exe 104 PID 3016 wrote to memory of 5040 3016 {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe 105 PID 3016 wrote to memory of 5040 3016 {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe 105 PID 3016 wrote to memory of 5040 3016 {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe 105 PID 3016 wrote to memory of 1608 3016 {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe 106 PID 3016 wrote to memory of 1608 3016 {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe 106 PID 3016 wrote to memory of 1608 3016 {06BAC080-ABD2-4901-9383-7269C1F9E012}.exe 106 PID 5040 wrote to memory of 4648 5040 {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe 107 PID 5040 wrote to memory of 4648 5040 {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe 107 PID 5040 wrote to memory of 4648 5040 {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe 107 PID 5040 wrote to memory of 1664 5040 {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe 108 PID 5040 wrote to memory of 1664 5040 {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe 108 PID 5040 wrote to memory of 1664 5040 {011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe"C:\Users\Admin\AppData\Local\Temp\11cc40e757387625da40e4ae6c1e7e53fdd36ca32613096d5bf7b17a02022c53N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\{6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exeC:\Windows\{6C47BBD5-DA2C-4dc3-AD25-9F58BC8A3CED}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\{EB9BF7B5-E01D-4832-BF37-324758E393EB}.exeC:\Windows\{EB9BF7B5-E01D-4832-BF37-324758E393EB}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\{8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exeC:\Windows\{8D3F4F06-57D3-4344-B4A1-A27931E2EAED}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exeC:\Windows\{9A20AAF6-4589-4ad8-A559-DAA06BF4487A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\{EF470168-616D-41cd-87B5-223CBE56C894}.exeC:\Windows\{EF470168-616D-41cd-87B5-223CBE56C894}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\{5F689424-7D49-4632-97AF-09DDCB519D66}.exeC:\Windows\{5F689424-7D49-4632-97AF-09DDCB519D66}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\{06BAC080-ABD2-4901-9383-7269C1F9E012}.exeC:\Windows\{06BAC080-ABD2-4901-9383-7269C1F9E012}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\{011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exeC:\Windows\{011F2BD5-5B66-4425-BE02-A335DDBE20E1}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\{9A464D94-2319-4c39-8F5F-E4E576269C71}.exeC:\Windows\{9A464D94-2319-4c39-8F5F-E4E576269C71}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{011F2~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06BAC~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5F689~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EF470~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9A20A~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D3F4~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EB9BF~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C47B~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\11CC40~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD57e4b2ce95444418a2637b502e39aad56
SHA12cf7af1edd19e9a6e2e03e3e50f8ad8dd156e28c
SHA25678a16724bfb553ee539f9e912395787a0ea1c9a63cbc09eb2cda469926eae322
SHA5128180b20a485680b5dd11578b6943a0a44022198f78348fcb273dee4e4452dfdf9b8e582fa7840044cd7c8b553036ac4599b020433b875951ac02e8cd3a1d144c
-
Filesize
90KB
MD56f3663cfb1d6825dbc4c9da90fd3c1c4
SHA11fb0cc08f27352ef622b1209fb143edf3f14b872
SHA25654a2a2c363e17ab0b39d0ce85c428e4add610ad254e88847ab7291e7bf27e030
SHA512f8ca659abfa138bd4d41e89833b66deecf134f3c5564d40e7cd79adad9ec5a2de6c66f7bd954dcfa65930510fc80dac7ccc94e3646411b06f102aa0db24b6c5f
-
Filesize
90KB
MD556852ce00f2aecc0a71684fe43d2ece9
SHA17e33c31910cf937164edb911cd0b5538b7d96a78
SHA256c262379bbb39a7eb48956f31fcc198a8127ca2d510023afda2b813ebc6502c4b
SHA5126cbf87f94f9ee8d406effc17a737943d43dcb901a67977be6c314d8290d8a65cfe9c1459b8f081e88e789b09c37a2ac6a45ebfb02101fb1165b41cc3dd563343
-
Filesize
90KB
MD567191ab37c5ef8dc3b17fa8f37652fee
SHA19e9f150a6ec88ee855a5f9a120bca3b5991d38aa
SHA25653b70e7bc5f505733dbca079d82ec3649850a0b28b3c5e37d07d243d326aa0ba
SHA5129fa2e8d778633e463236fb98cc9f2f0556faa3d40995de69f10daaf0786e2154536fdab763f19bfc75eddacd0bd8d245e50c2dc2fc860948ac27ce7d1693fd05
-
Filesize
90KB
MD5d4b00eed7195065348d474af090fd037
SHA10505171b91941bec9fa0ea60e331e2110c616d1d
SHA2564ed51d9641c3c449a7b09424e114ea24a9478485a597350eb55d175d54a6ff67
SHA512cc34cbcadd4c1ce29847b8336b3a9113fad19265adc295ef56fcec0a5d6139b1548fe1e4d858406d6508ae1e4529e7bfaa0b92168bffa4ed2b2083d014a4298e
-
Filesize
90KB
MD5bd52c6f5580fabd6020e9d03ffa08fc1
SHA17317cc6f1ca0c73663aca3f90f4d6bfa21ac711a
SHA256552db01dc853206786e5a37d500f6917eb503df9563b32b3753406dd2544d738
SHA512eb6e1ee0f025ed1dc7faf8a87dfc0221df57222b9c14de353e8de54907f840b653f100ad7b9f7cd30cfd30496c5ce7c46ec50cdb1496f1e1ce85b5e05fab3b97
-
Filesize
90KB
MD584476f8f2f83215ed7e84868ec718bbb
SHA1bb7c5793c410172c803af66e3929205e00dbe25e
SHA256c8c2e0a9894b9a247600d5921fee2e86a11582bc9220509ab6aa6011966a17d1
SHA512f7a1a7eb1cb4ecb594c6db323ce203d924270edf3b0f701b318acf75a6986025f40cc63230338a12480b8535b31d966f0df183a768540b4081887af1583ad6e7
-
Filesize
90KB
MD5dfcd4fc76323859c3250697b7cfc0c73
SHA10cead5fb94e530bf0cbf3e20597f0879af4a8cfd
SHA2563becbce97a078f72a8919ecdff59fd897e6b3e6e3b81be73d89f3bfb2ca31b2b
SHA51255bd588053c3bbf203d0b609a54f1ddf29e4b8501106df84da8df9e33d24779030124525e645354cf85f94bbd75e9fde9213f55ed3079a56aef47f0cfc8a2295
-
Filesize
90KB
MD5c5bda861b350285883690c1b6a69ab4c
SHA19d2507fc811f68b847bfdb1081d19e2b89b14124
SHA25608976dfee5c52151ebf59cb63f1bb3ed20a800afa9ca91aee3048d4a3f8def50
SHA512ee6268a5628ca4154dfeaece274ce6205c3b6f4fa25524ea26aa32b447ec16e6e3bb35885c80ee4bacecea341de049cedf3864e194a921110982ae0f0ed073b4