Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe
Resource
win10v2004-20240802-en
General
-
Target
089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe
-
Size
90KB
-
MD5
036af28a3626935da0c91c6fb5330de0
-
SHA1
0592ebfd56003f59065eea1b10087021188c5447
-
SHA256
089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71ceb
-
SHA512
05feaec791bb54c847dd41d8501db632ff8d859dfb25e7655208f95336d5083aae75a0b28004ca385e5226aac12b2b7c82abba732d8c6e5c6172adfe88cfe7bc
-
SSDEEP
768:Qvw9816vhKQLroL4/wQRNrfrunMxVFA3b7glws:YEGh0oLl2unMxVS3Hgz
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F793CBF-651C-4930-AB3F-381573F43BD8} 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{43168434-64E0-4f35-8C02-7ABC3F5E16DC} {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1C86DCDE-E042-4a7f-AC49-179E7B751BC0} {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA25C917-AB30-4597-B67B-0C7F69A96D68} {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA25C917-AB30-4597-B67B-0C7F69A96D68}\stubpath = "C:\\Windows\\{AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe" {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{26BDA393-062C-47f8-9CB1-3FD35676BB85}\stubpath = "C:\\Windows\\{26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe" {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F793CBF-651C-4930-AB3F-381573F43BD8}\stubpath = "C:\\Windows\\{5F793CBF-651C-4930-AB3F-381573F43BD8}.exe" 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{26BDA393-062C-47f8-9CB1-3FD35676BB85} {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BEEB5FAA-66BA-4f54-941A-E63920789B86}\stubpath = "C:\\Windows\\{BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe" {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F56261F1-9F98-4058-8700-092FBFE641DF}\stubpath = "C:\\Windows\\{F56261F1-9F98-4058-8700-092FBFE641DF}.exe" {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2F4DB42-B958-45c2-BB90-56B1ADE7DE4E} {F56261F1-9F98-4058-8700-092FBFE641DF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2F4DB42-B958-45c2-BB90-56B1ADE7DE4E}\stubpath = "C:\\Windows\\{A2F4DB42-B958-45c2-BB90-56B1ADE7DE4E}.exe" {F56261F1-9F98-4058-8700-092FBFE641DF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1C86DCDE-E042-4a7f-AC49-179E7B751BC0}\stubpath = "C:\\Windows\\{1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe" {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4} {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F56261F1-9F98-4058-8700-092FBFE641DF} {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{43168434-64E0-4f35-8C02-7ABC3F5E16DC}\stubpath = "C:\\Windows\\{43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe" {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BEEB5FAA-66BA-4f54-941A-E63920789B86} {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}\stubpath = "C:\\Windows\\{5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe" {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe -
Executes dropped EXE 9 IoCs
pid Process 5036 {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe 4776 {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe 2688 {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe 2616 {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe 4888 {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe 804 {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe 4460 {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe 1580 {F56261F1-9F98-4058-8700-092FBFE641DF}.exe 672 {A2F4DB42-B958-45c2-BB90-56B1ADE7DE4E}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe File created C:\Windows\{5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe File created C:\Windows\{A2F4DB42-B958-45c2-BB90-56B1ADE7DE4E}.exe {F56261F1-9F98-4058-8700-092FBFE641DF}.exe File created C:\Windows\{43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe File created C:\Windows\{AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe File created C:\Windows\{26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe File created C:\Windows\{BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe File created C:\Windows\{F56261F1-9F98-4058-8700-092FBFE641DF}.exe {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe File created C:\Windows\{5F793CBF-651C-4930-AB3F-381573F43BD8}.exe 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F56261F1-9F98-4058-8700-092FBFE641DF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A2F4DB42-B958-45c2-BB90-56B1ADE7DE4E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4508 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe Token: SeIncBasePriorityPrivilege 5036 {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe Token: SeIncBasePriorityPrivilege 4776 {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe Token: SeIncBasePriorityPrivilege 2688 {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe Token: SeIncBasePriorityPrivilege 2616 {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe Token: SeIncBasePriorityPrivilege 4888 {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe Token: SeIncBasePriorityPrivilege 804 {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe Token: SeIncBasePriorityPrivilege 4460 {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe Token: SeIncBasePriorityPrivilege 1580 {F56261F1-9F98-4058-8700-092FBFE641DF}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4508 wrote to memory of 5036 4508 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe 87 PID 4508 wrote to memory of 5036 4508 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe 87 PID 4508 wrote to memory of 5036 4508 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe 87 PID 4508 wrote to memory of 4204 4508 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe 88 PID 4508 wrote to memory of 4204 4508 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe 88 PID 4508 wrote to memory of 4204 4508 089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe 88 PID 5036 wrote to memory of 4776 5036 {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe 91 PID 5036 wrote to memory of 4776 5036 {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe 91 PID 5036 wrote to memory of 4776 5036 {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe 91 PID 5036 wrote to memory of 3192 5036 {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe 92 PID 5036 wrote to memory of 3192 5036 {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe 92 PID 5036 wrote to memory of 3192 5036 {5F793CBF-651C-4930-AB3F-381573F43BD8}.exe 92 PID 4776 wrote to memory of 2688 4776 {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe 95 PID 4776 wrote to memory of 2688 4776 {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe 95 PID 4776 wrote to memory of 2688 4776 {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe 95 PID 4776 wrote to memory of 5016 4776 {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe 96 PID 4776 wrote to memory of 5016 4776 {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe 96 PID 4776 wrote to memory of 5016 4776 {43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe 96 PID 2688 wrote to memory of 2616 2688 {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe 97 PID 2688 wrote to memory of 2616 2688 {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe 97 PID 2688 wrote to memory of 2616 2688 {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe 97 PID 2688 wrote to memory of 2832 2688 {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe 98 PID 2688 wrote to memory of 2832 2688 {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe 98 PID 2688 wrote to memory of 2832 2688 {1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe 98 PID 2616 wrote to memory of 4888 2616 {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe 99 PID 2616 wrote to memory of 4888 2616 {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe 99 PID 2616 wrote to memory of 4888 2616 {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe 99 PID 2616 wrote to memory of 4592 2616 {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe 100 PID 2616 wrote to memory of 4592 2616 {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe 100 PID 2616 wrote to memory of 4592 2616 {AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe 100 PID 4888 wrote to memory of 804 4888 {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe 101 PID 4888 wrote to memory of 804 4888 {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe 101 PID 4888 wrote to memory of 804 4888 {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe 101 PID 4888 wrote to memory of 3824 4888 {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe 102 PID 4888 wrote to memory of 3824 4888 {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe 102 PID 4888 wrote to memory of 3824 4888 {26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe 102 PID 804 wrote to memory of 4460 804 {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe 103 PID 804 wrote to memory of 4460 804 {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe 103 PID 804 wrote to memory of 4460 804 {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe 103 PID 804 wrote to memory of 3488 804 {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe 104 PID 804 wrote to memory of 3488 804 {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe 104 PID 804 wrote to memory of 3488 804 {BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe 104 PID 4460 wrote to memory of 1580 4460 {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe 105 PID 4460 wrote to memory of 1580 4460 {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe 105 PID 4460 wrote to memory of 1580 4460 {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe 105 PID 4460 wrote to memory of 2896 4460 {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe 106 PID 4460 wrote to memory of 2896 4460 {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe 106 PID 4460 wrote to memory of 2896 4460 {5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe 106 PID 1580 wrote to memory of 672 1580 {F56261F1-9F98-4058-8700-092FBFE641DF}.exe 107 PID 1580 wrote to memory of 672 1580 {F56261F1-9F98-4058-8700-092FBFE641DF}.exe 107 PID 1580 wrote to memory of 672 1580 {F56261F1-9F98-4058-8700-092FBFE641DF}.exe 107 PID 1580 wrote to memory of 2912 1580 {F56261F1-9F98-4058-8700-092FBFE641DF}.exe 108 PID 1580 wrote to memory of 2912 1580 {F56261F1-9F98-4058-8700-092FBFE641DF}.exe 108 PID 1580 wrote to memory of 2912 1580 {F56261F1-9F98-4058-8700-092FBFE641DF}.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe"C:\Users\Admin\AppData\Local\Temp\089deaa7ae5b1feba6eae956d3e545b59e612bb15091ce02010fec5b62f71cebN.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\{5F793CBF-651C-4930-AB3F-381573F43BD8}.exeC:\Windows\{5F793CBF-651C-4930-AB3F-381573F43BD8}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\{43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exeC:\Windows\{43168434-64E0-4f35-8C02-7ABC3F5E16DC}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\{1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exeC:\Windows\{1C86DCDE-E042-4a7f-AC49-179E7B751BC0}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\{AA25C917-AB30-4597-B67B-0C7F69A96D68}.exeC:\Windows\{AA25C917-AB30-4597-B67B-0C7F69A96D68}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\{26BDA393-062C-47f8-9CB1-3FD35676BB85}.exeC:\Windows\{26BDA393-062C-47f8-9CB1-3FD35676BB85}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\{BEEB5FAA-66BA-4f54-941A-E63920789B86}.exeC:\Windows\{BEEB5FAA-66BA-4f54-941A-E63920789B86}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\{5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exeC:\Windows\{5A4C7176-44D5-48f8-A1FC-7DDE6F60ABD4}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\{F56261F1-9F98-4058-8700-092FBFE641DF}.exeC:\Windows\{F56261F1-9F98-4058-8700-092FBFE641DF}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\{A2F4DB42-B958-45c2-BB90-56B1ADE7DE4E}.exeC:\Windows\{A2F4DB42-B958-45c2-BB90-56B1ADE7DE4E}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F5626~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A4C7~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BEEB5~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26BDA~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:3824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA25C~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C86D~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{43168~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:5016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5F793~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\089DEA~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD568467f5ca5fa2ad11b7da0878a245dc3
SHA1693fe46593d4199032d68180073119eaf049deab
SHA2565f0a208c3206ee1770f25312cf6d8c0e918bf965249c09379bc692e71ab0098d
SHA512cc8b28497192dd2ac97a045d76e1bad4cf067ff8e317d6e3a72c22b5af9bf95af4b543a4c1e617f73b1532b619c8ac0529681d7231a62f387cb09741b8840491
-
Filesize
90KB
MD50f2bd7f789da430309b9c289c113610e
SHA1edd20f4e4651bc8f7144bdf22b57e4e11f5bb936
SHA25670c05bfa22b6cc7ed12a8941f16de0908ad3ebd6c22dfbd9b4c4400febcf45e9
SHA51276ad28350f13f3998639fcf21363adf2b5cd5a48a4407682490422e63616dfefd98f015d85ce54160cc61d68fa9ec62cc09373f36916940fe4f51ebf38359cd8
-
Filesize
90KB
MD5d4ed33a732805e87a534142a752d97ac
SHA1a4247b1cb04327fad28502071e249822647f9020
SHA256ac939531488a62028b45fdfa4b5dcc2927747c1808bd7c102fc44a282ec7ca17
SHA51218d9bd2cf0994bd5101b1151d91cbf362fdfef5b6b25a011c7337cada51924f2ea814d6306b5b2779d3b8c8f17b78fe6ff73942561e61e9749ddec4c5857b33c
-
Filesize
90KB
MD5b8d46f5d0c7942afd7a4bf4dadd7d5db
SHA14c3d687e13e0e6dd1e31acc6504b64223f4954bf
SHA2568ba085d4b3f181710b7bb1c7035e5f6e404454b13c65db620c2dc0174ba3ef42
SHA512cd85c5aa3aec684698d3341719ba2ae4a0320cfc2ac5e69245244e7b9ce78ad0c9cd09784f910f0a83aab4a580669429484ddde2779954a0873eb6e3e90b6c1f
-
Filesize
90KB
MD583ab6d3b45aaa6590bcfbcd4a0f273be
SHA1149eb7723b9484cd9679937cfd77086e5058f88e
SHA2567d31207aea288d031180bf53c22e92931e82cc9c3cb550962a71598879af3b22
SHA512b0e94ed2088549e5e6fdcb3568ca121b411980847b7d52b5a7d12039d3cffaeae94b51c2105e727782a36d73d5c96c05c27439e3b1bf3312c03a87f598ff3d30
-
Filesize
90KB
MD5ebdeef657c458558d3e1e666b9179d83
SHA1d2ab136043478b52f6393491a283637b9254abf9
SHA256eeae60b106650b1043ccee0bac6c8e87278000eef5be05e0be033810cdabdfad
SHA51247dadccbe1061ebff40585101b93c8944e7625f3f0bcb7d4dc0d9258687df1f1a0f621b7ec2905ab5cf3fe76d4242a73be0d14ed4ce048d0ada91c95d8e49883
-
Filesize
90KB
MD5ab2a8e6bf39e8ab503c0882729740eb4
SHA1093931bad037bb258822127414a83a12f13018f9
SHA256d0f28c6d7a242ab850a478bac57777906cd43830fc2323f3591d63f8fedc11b8
SHA51228936b66e4501b6ab2f0ab5df36c2e4a81a5d94267b3ef850da05fd4961fc2a85415f394a99c14169faaf105ca13b1e5fed8abaf017c3b7b4e05570aed4069d0
-
Filesize
90KB
MD5a900d59b11816d8bad05a077e591dd34
SHA16ce5d7c764f663b544aad8735aadae80ad9c579c
SHA256f6ee8de3ffdce26fbf2fa5179074f8d04e07811d4acf465f2034906cad1ef677
SHA512ebc3e30047947712a22431352ce1cb1ab5684b99ef924b96e02aad0471769d15dbbd9f9d0cf9a1edc385d29ac16840cdd6a455eb74c7996b78ade8d800484f27
-
Filesize
90KB
MD5c8b2e3c916b684aa6edea24dc2bb7daa
SHA13bfa854314b975ffe11a8ab9a29e0c79ba163fea
SHA2569d287790c9e377b61b91d62787cdc94c186fd6aefab91382de6a8e63af008bee
SHA512bd3edef3da33ac8fcc1105e31ea4ff779fe372a7e84e631a8b597c0cec38a3805961cf7c054c916531f924043527965fed499c9bc414c99e0a9ada6018589853