Analysis
-
max time kernel
118s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe
Resource
win10v2004-20241007-en
General
-
Target
eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe
-
Size
90KB
-
MD5
ccd44d9cf191c8ce2e496c321ee07d50
-
SHA1
7725bdcd91468f036ead971b347b096e46e31a00
-
SHA256
eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2a
-
SHA512
b915d53e94a01e862071f90bc7d2c5605a18a134e556b054d88c82a67785610989c7761072b261a5f40ca74019272c104ebb5875af1a606c45167869b8bbe762
-
SSDEEP
768:5vw9816thKQLroq4/wQkNrfrunMxVFA3bA:lEG/0oqlbunMxVS3c
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F61135EF-2B09-4950-B209-6EB94CDEF800} {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}\stubpath = "C:\\Windows\\{2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe" {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{845A8B0D-458B-486f-A39B-719939C14533} {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{114497AA-2CF8-4197-99EC-4DE76FA01447} {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F43AC086-F8A5-442d-BAD9-B09BE466B8FB} {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{703EE580-AA47-4e54-BD6E-D5A5D202E002} {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F61135EF-2B09-4950-B209-6EB94CDEF800}\stubpath = "C:\\Windows\\{F61135EF-2B09-4950-B209-6EB94CDEF800}.exe" {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{845A8B0D-458B-486f-A39B-719939C14533}\stubpath = "C:\\Windows\\{845A8B0D-458B-486f-A39B-719939C14533}.exe" {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D2FCC6CF-DCD3-46e9-9DAC-56C248014F64} {845A8B0D-458B-486f-A39B-719939C14533}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DFE212C-CE0A-4c7c-A4F1-EA30853D7E71}\stubpath = "C:\\Windows\\{6DFE212C-CE0A-4c7c-A4F1-EA30853D7E71}.exe" {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{703EE580-AA47-4e54-BD6E-D5A5D202E002}\stubpath = "C:\\Windows\\{703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe" {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E} {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}\stubpath = "C:\\Windows\\{D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe" {845A8B0D-458B-486f-A39B-719939C14533}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F43AC086-F8A5-442d-BAD9-B09BE466B8FB}\stubpath = "C:\\Windows\\{F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe" {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3061DDA5-7C98-4627-AF15-9CD11A6949CE} eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3061DDA5-7C98-4627-AF15-9CD11A6949CE}\stubpath = "C:\\Windows\\{3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe" eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{114497AA-2CF8-4197-99EC-4DE76FA01447}\stubpath = "C:\\Windows\\{114497AA-2CF8-4197-99EC-4DE76FA01447}.exe" {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DFE212C-CE0A-4c7c-A4F1-EA30853D7E71} {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe -
Executes dropped EXE 9 IoCs
pid Process 2372 {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe 4652 {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe 3680 {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe 3384 {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe 1660 {845A8B0D-458B-486f-A39B-719939C14533}.exe 2588 {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe 824 {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe 2304 {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe 4900 {6DFE212C-CE0A-4c7c-A4F1-EA30853D7E71}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe File created C:\Windows\{F61135EF-2B09-4950-B209-6EB94CDEF800}.exe {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe File created C:\Windows\{2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe File created C:\Windows\{114497AA-2CF8-4197-99EC-4DE76FA01447}.exe {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe File created C:\Windows\{703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe File created C:\Windows\{845A8B0D-458B-486f-A39B-719939C14533}.exe {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe File created C:\Windows\{D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe {845A8B0D-458B-486f-A39B-719939C14533}.exe File created C:\Windows\{F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe File created C:\Windows\{6DFE212C-CE0A-4c7c-A4F1-EA30853D7E71}.exe {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6DFE212C-CE0A-4c7c-A4F1-EA30853D7E71}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {845A8B0D-458B-486f-A39B-719939C14533}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1820 eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe Token: SeIncBasePriorityPrivilege 2372 {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe Token: SeIncBasePriorityPrivilege 4652 {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe Token: SeIncBasePriorityPrivilege 3680 {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe Token: SeIncBasePriorityPrivilege 3384 {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe Token: SeIncBasePriorityPrivilege 1660 {845A8B0D-458B-486f-A39B-719939C14533}.exe Token: SeIncBasePriorityPrivilege 2588 {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe Token: SeIncBasePriorityPrivilege 824 {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe Token: SeIncBasePriorityPrivilege 2304 {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2372 1820 eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe 86 PID 1820 wrote to memory of 2372 1820 eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe 86 PID 1820 wrote to memory of 2372 1820 eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe 86 PID 1820 wrote to memory of 3944 1820 eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe 87 PID 1820 wrote to memory of 3944 1820 eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe 87 PID 1820 wrote to memory of 3944 1820 eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe 87 PID 2372 wrote to memory of 4652 2372 {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe 88 PID 2372 wrote to memory of 4652 2372 {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe 88 PID 2372 wrote to memory of 4652 2372 {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe 88 PID 2372 wrote to memory of 3176 2372 {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe 89 PID 2372 wrote to memory of 3176 2372 {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe 89 PID 2372 wrote to memory of 3176 2372 {3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe 89 PID 4652 wrote to memory of 3680 4652 {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe 94 PID 4652 wrote to memory of 3680 4652 {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe 94 PID 4652 wrote to memory of 3680 4652 {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe 94 PID 4652 wrote to memory of 3984 4652 {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe 95 PID 4652 wrote to memory of 3984 4652 {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe 95 PID 4652 wrote to memory of 3984 4652 {703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe 95 PID 3680 wrote to memory of 3384 3680 {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe 96 PID 3680 wrote to memory of 3384 3680 {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe 96 PID 3680 wrote to memory of 3384 3680 {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe 96 PID 3680 wrote to memory of 1192 3680 {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe 97 PID 3680 wrote to memory of 1192 3680 {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe 97 PID 3680 wrote to memory of 1192 3680 {F61135EF-2B09-4950-B209-6EB94CDEF800}.exe 97 PID 3384 wrote to memory of 1660 3384 {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe 98 PID 3384 wrote to memory of 1660 3384 {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe 98 PID 3384 wrote to memory of 1660 3384 {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe 98 PID 3384 wrote to memory of 1576 3384 {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe 99 PID 3384 wrote to memory of 1576 3384 {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe 99 PID 3384 wrote to memory of 1576 3384 {2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe 99 PID 1660 wrote to memory of 2588 1660 {845A8B0D-458B-486f-A39B-719939C14533}.exe 100 PID 1660 wrote to memory of 2588 1660 {845A8B0D-458B-486f-A39B-719939C14533}.exe 100 PID 1660 wrote to memory of 2588 1660 {845A8B0D-458B-486f-A39B-719939C14533}.exe 100 PID 1660 wrote to memory of 2196 1660 {845A8B0D-458B-486f-A39B-719939C14533}.exe 101 PID 1660 wrote to memory of 2196 1660 {845A8B0D-458B-486f-A39B-719939C14533}.exe 101 PID 1660 wrote to memory of 2196 1660 {845A8B0D-458B-486f-A39B-719939C14533}.exe 101 PID 2588 wrote to memory of 824 2588 {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe 102 PID 2588 wrote to memory of 824 2588 {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe 102 PID 2588 wrote to memory of 824 2588 {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe 102 PID 2588 wrote to memory of 1428 2588 {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe 103 PID 2588 wrote to memory of 1428 2588 {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe 103 PID 2588 wrote to memory of 1428 2588 {D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe 103 PID 824 wrote to memory of 2304 824 {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe 104 PID 824 wrote to memory of 2304 824 {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe 104 PID 824 wrote to memory of 2304 824 {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe 104 PID 824 wrote to memory of 4336 824 {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe 105 PID 824 wrote to memory of 4336 824 {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe 105 PID 824 wrote to memory of 4336 824 {114497AA-2CF8-4197-99EC-4DE76FA01447}.exe 105 PID 2304 wrote to memory of 4900 2304 {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe 106 PID 2304 wrote to memory of 4900 2304 {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe 106 PID 2304 wrote to memory of 4900 2304 {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe 106 PID 2304 wrote to memory of 4608 2304 {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe 107 PID 2304 wrote to memory of 4608 2304 {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe 107 PID 2304 wrote to memory of 4608 2304 {F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe"C:\Users\Admin\AppData\Local\Temp\eb591fa865d5803ebf1e7fbcbc68d58be7038446e35608a3e6f2686be93a2a2aN.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\{3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exeC:\Windows\{3061DDA5-7C98-4627-AF15-9CD11A6949CE}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\{703EE580-AA47-4e54-BD6E-D5A5D202E002}.exeC:\Windows\{703EE580-AA47-4e54-BD6E-D5A5D202E002}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\{F61135EF-2B09-4950-B209-6EB94CDEF800}.exeC:\Windows\{F61135EF-2B09-4950-B209-6EB94CDEF800}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\{2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exeC:\Windows\{2EFDE4B6-E379-4eab-A3A9-D0CFE05EBC5E}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\{845A8B0D-458B-486f-A39B-719939C14533}.exeC:\Windows\{845A8B0D-458B-486f-A39B-719939C14533}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\{D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exeC:\Windows\{D2FCC6CF-DCD3-46e9-9DAC-56C248014F64}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\{114497AA-2CF8-4197-99EC-4DE76FA01447}.exeC:\Windows\{114497AA-2CF8-4197-99EC-4DE76FA01447}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\{F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exeC:\Windows\{F43AC086-F8A5-442d-BAD9-B09BE466B8FB}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\{6DFE212C-CE0A-4c7c-A4F1-EA30853D7E71}.exeC:\Windows\{6DFE212C-CE0A-4c7c-A4F1-EA30853D7E71}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F43AC~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11449~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2FCC~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{845A8~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2EFDE~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F6113~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{703EE~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3061D~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\EB591F~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD590446a1ddad54d008faf870ff3c285fe
SHA16fea1f95d9cc2632592e9ac9094b42c8da99cc65
SHA25634613afb3b2c7675051484697302709595ce7cf1dd0753f4212b31b56ff7306e
SHA5125a8f9a48309631675cb62de42fb551ef2dacea91493b6d276386ac016fb13abb20a38cca484dcec75c689f72cccd430549070bde3b2f26ee9de99ecdf55a2b7f
-
Filesize
90KB
MD52a3e29851a505ebb6d46b3073582f90d
SHA10319e3d5aaf85f962654a8e9399198ea2b27b4c0
SHA25650297daa6d397b683a7c6ae2e8e7dd4a7298f5b637f5c9e6a5d89efcdf2526d9
SHA512f01282822500b7e047531d8fe82313a1a4f6dffb8079afb11983faec3a00ad4daa82b21bc4e450b828b505398a164e0e650cded3b9e1f2fd3dfd32c1fcb60b55
-
Filesize
90KB
MD58dbe577a833e6f55911e99312d4cfd3a
SHA1136a7757033b5400dab37674ae581894e05c6b33
SHA2567ec632b71f3146313a8801e910215e0ab78464bece6a8966637430f28456bae0
SHA512be415156a94b7b90666c92d82a0ee859b6b5ccc6c7df3cd316479fd57baac0f305fe9a9a537bf4c3c60baf8495dd30b9a18bd36169afff2a6094a41fa58710e7
-
Filesize
90KB
MD5853e84b83fd48fac20a0d09381ace8ef
SHA1c1fbcc854dd23638866bcf5a9ea3ee061b7d369e
SHA25607c0e1380de92e29beab7da3f6870f7a7486a30d4274b9ec981dd219426194fd
SHA5121a6c88732e53bdd8aac8269b4ff79b73a030763c4b2de9a5f1b846cb5cfbd9a89a94770ebc6f41a6f89809d9b05bc706e4f22f48f1e700239ed3c101bb4bb468
-
Filesize
90KB
MD5079e1d5d208511a6270c624c74157231
SHA1f642074ed4ba2d9a95b98fda59d7321977bb22b7
SHA2561395fb6f99cabb7a6e6a1f9e06daaebd4bd6db489c439f8a3d9da9536215f135
SHA512d65df5ec2e9ed6fb499af1b6638403b532516d7cfd0ff9efb1dad3d6aa20e83a313a25dfc2352c8284ce2d38da2c8fa18ef924675aeffaf593742143a3847864
-
Filesize
90KB
MD5513b0066c0e1937df0cea9486d397cde
SHA1915efc10b3972986de63e04be82538142059cb1f
SHA25604b52b609b442562e82620fd391e344239c5f4c5ce00ad4814092b00da6ed8d6
SHA5124c98e75095d49adf75d2684b07e847c640fd410e60d7afedc0be93f4f3951040b7485e6e17de139a65bdc350ebe8ae7f38d1fefe91cf1210b20f6583aafed7ff
-
Filesize
90KB
MD568982fd635c1636ab3eb8034a0edc17e
SHA16249520943c7d935fa2f54eb534cc4b54eb3163d
SHA25667f946ba02d6a2b7efba23ecc53246474cc8a46e83fa1816a2d67ee618dbd813
SHA512fc9ce4adf5b8f005fa0f22723a4a2b1ca571b6d81bba7e110d9122920c4d8eb92d71b18088d81255c76ed89f431c629411d611e6d5601e878d00de4f69e62eb4
-
Filesize
90KB
MD566e91b5592afc75493baad8ba4bcfe3f
SHA1587aace588abd23dbbf4f14a327896a388672802
SHA2569c58d39f5da9f785f3d03b571346f892b88a6f9757d8878706ca37685087dd96
SHA512234008c824375fbd88f1d9b24eaf45bac9509e8c80feca18376feca4688eadafbfa7d3a9a96a9032cd00847db867f2d2f1b04d9586ee615312eaf3d8c229e4c6
-
Filesize
90KB
MD5677438fc3ff8c702d22dee9ffaeeee02
SHA1e0b471a53d8ba2ffa427ad1858682fe1f0bac4fe
SHA25635d94916460d3ea6586bea38d2fd0a09e8264e6b6cc18bd9fbd8958957948432
SHA512154b1f1dfbf8c4b7aeba580553413d2e71e7846d486eae60472b23368605c948ce749c14095ba822df0a7ebf3eedf30ac3c6a8c5fcc7dc7b8be4f28b2c5414d3