Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe
Resource
win10v2004-20241007-en
General
-
Target
2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe
-
Size
89KB
-
MD5
c05a8446dcc91b9c87c86e34f050f460
-
SHA1
c3757d2958e9dd0efc9fed12f6b17b7d25d12e99
-
SHA256
2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187b
-
SHA512
fd05f3ce90b723e4c9663fc2bc84a15a4d842b25de9f6ab528342e6bf083a9ebba2a4e8a311761f85da2399f08b60803bae2b672ac12026f08bbf1d77dbc2823
-
SSDEEP
768:5vw9816thKQLrot4/wQkNrfrunMxVFA3k:lEG/0otlbunMxVS3k
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D3982315-FC8E-4bd9-8877-992D0B8C3A35}\stubpath = "C:\\Windows\\{D3982315-FC8E-4bd9-8877-992D0B8C3A35}.exe" {E363BF2D-78E4-451d-AA1F-42F52A878F9F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE9494EC-1F28-48a8-BC11-23A5C0603F30} {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0720615D-F398-4482-815A-3CD22CCAA0DA}\stubpath = "C:\\Windows\\{0720615D-F398-4482-815A-3CD22CCAA0DA}.exe" {B966B625-904F-401b-863E-9624CB84304F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13} {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E363BF2D-78E4-451d-AA1F-42F52A878F9F}\stubpath = "C:\\Windows\\{E363BF2D-78E4-451d-AA1F-42F52A878F9F}.exe" {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D3982315-FC8E-4bd9-8877-992D0B8C3A35} {E363BF2D-78E4-451d-AA1F-42F52A878F9F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{86021BB6-7B81-4d46-B8FC-A654B4513475} {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8DB067FC-912D-41c9-B1EA-6562F3F7C5BE} 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B966B625-904F-401b-863E-9624CB84304F} {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0720615D-F398-4482-815A-3CD22CCAA0DA} {B966B625-904F-401b-863E-9624CB84304F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}\stubpath = "C:\\Windows\\{FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe" {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}\stubpath = "C:\\Windows\\{4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe" {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE9494EC-1F28-48a8-BC11-23A5C0603F30}\stubpath = "C:\\Windows\\{AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe" {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B966B625-904F-401b-863E-9624CB84304F}\stubpath = "C:\\Windows\\{B966B625-904F-401b-863E-9624CB84304F}.exe" {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FE5276F5-8EBC-4d72-ACDA-CF3E758022A8} {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}\stubpath = "C:\\Windows\\{8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe" 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{86021BB6-7B81-4d46-B8FC-A654B4513475}\stubpath = "C:\\Windows\\{86021BB6-7B81-4d46-B8FC-A654B4513475}.exe" {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E363BF2D-78E4-451d-AA1F-42F52A878F9F} {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe -
Deletes itself 1 IoCs
pid Process 2252 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2028 {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe 2828 {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe 2804 {B966B625-904F-401b-863E-9624CB84304F}.exe 2612 {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe 1516 {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe 1252 {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe 2712 {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe 2648 {E363BF2D-78E4-451d-AA1F-42F52A878F9F}.exe 344 {D3982315-FC8E-4bd9-8877-992D0B8C3A35}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{86021BB6-7B81-4d46-B8FC-A654B4513475}.exe {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe File created C:\Windows\{E363BF2D-78E4-451d-AA1F-42F52A878F9F}.exe {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe File created C:\Windows\{D3982315-FC8E-4bd9-8877-992D0B8C3A35}.exe {E363BF2D-78E4-451d-AA1F-42F52A878F9F}.exe File created C:\Windows\{AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe File created C:\Windows\{FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe File created C:\Windows\{0720615D-F398-4482-815A-3CD22CCAA0DA}.exe {B966B625-904F-401b-863E-9624CB84304F}.exe File created C:\Windows\{4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe File created C:\Windows\{8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe File created C:\Windows\{B966B625-904F-401b-863E-9624CB84304F}.exe {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B966B625-904F-401b-863E-9624CB84304F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E363BF2D-78E4-451d-AA1F-42F52A878F9F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D3982315-FC8E-4bd9-8877-992D0B8C3A35}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2536 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe Token: SeIncBasePriorityPrivilege 2028 {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe Token: SeIncBasePriorityPrivilege 2828 {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe Token: SeIncBasePriorityPrivilege 2804 {B966B625-904F-401b-863E-9624CB84304F}.exe Token: SeIncBasePriorityPrivilege 2612 {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe Token: SeIncBasePriorityPrivilege 1516 {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe Token: SeIncBasePriorityPrivilege 1252 {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe Token: SeIncBasePriorityPrivilege 2712 {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe Token: SeIncBasePriorityPrivilege 2648 {E363BF2D-78E4-451d-AA1F-42F52A878F9F}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2028 2536 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe 31 PID 2536 wrote to memory of 2028 2536 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe 31 PID 2536 wrote to memory of 2028 2536 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe 31 PID 2536 wrote to memory of 2028 2536 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe 31 PID 2536 wrote to memory of 2252 2536 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe 32 PID 2536 wrote to memory of 2252 2536 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe 32 PID 2536 wrote to memory of 2252 2536 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe 32 PID 2536 wrote to memory of 2252 2536 2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe 32 PID 2028 wrote to memory of 2828 2028 {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe 33 PID 2028 wrote to memory of 2828 2028 {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe 33 PID 2028 wrote to memory of 2828 2028 {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe 33 PID 2028 wrote to memory of 2828 2028 {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe 33 PID 2028 wrote to memory of 2812 2028 {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe 34 PID 2028 wrote to memory of 2812 2028 {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe 34 PID 2028 wrote to memory of 2812 2028 {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe 34 PID 2028 wrote to memory of 2812 2028 {8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe 34 PID 2828 wrote to memory of 2804 2828 {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe 35 PID 2828 wrote to memory of 2804 2828 {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe 35 PID 2828 wrote to memory of 2804 2828 {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe 35 PID 2828 wrote to memory of 2804 2828 {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe 35 PID 2828 wrote to memory of 2936 2828 {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe 36 PID 2828 wrote to memory of 2936 2828 {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe 36 PID 2828 wrote to memory of 2936 2828 {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe 36 PID 2828 wrote to memory of 2936 2828 {AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe 36 PID 2804 wrote to memory of 2612 2804 {B966B625-904F-401b-863E-9624CB84304F}.exe 37 PID 2804 wrote to memory of 2612 2804 {B966B625-904F-401b-863E-9624CB84304F}.exe 37 PID 2804 wrote to memory of 2612 2804 {B966B625-904F-401b-863E-9624CB84304F}.exe 37 PID 2804 wrote to memory of 2612 2804 {B966B625-904F-401b-863E-9624CB84304F}.exe 37 PID 2804 wrote to memory of 2672 2804 {B966B625-904F-401b-863E-9624CB84304F}.exe 38 PID 2804 wrote to memory of 2672 2804 {B966B625-904F-401b-863E-9624CB84304F}.exe 38 PID 2804 wrote to memory of 2672 2804 {B966B625-904F-401b-863E-9624CB84304F}.exe 38 PID 2804 wrote to memory of 2672 2804 {B966B625-904F-401b-863E-9624CB84304F}.exe 38 PID 2612 wrote to memory of 1516 2612 {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe 39 PID 2612 wrote to memory of 1516 2612 {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe 39 PID 2612 wrote to memory of 1516 2612 {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe 39 PID 2612 wrote to memory of 1516 2612 {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe 39 PID 2612 wrote to memory of 1536 2612 {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe 40 PID 2612 wrote to memory of 1536 2612 {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe 40 PID 2612 wrote to memory of 1536 2612 {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe 40 PID 2612 wrote to memory of 1536 2612 {0720615D-F398-4482-815A-3CD22CCAA0DA}.exe 40 PID 1516 wrote to memory of 1252 1516 {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe 41 PID 1516 wrote to memory of 1252 1516 {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe 41 PID 1516 wrote to memory of 1252 1516 {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe 41 PID 1516 wrote to memory of 1252 1516 {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe 41 PID 1516 wrote to memory of 1136 1516 {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe 42 PID 1516 wrote to memory of 1136 1516 {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe 42 PID 1516 wrote to memory of 1136 1516 {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe 42 PID 1516 wrote to memory of 1136 1516 {FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe 42 PID 1252 wrote to memory of 2712 1252 {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe 43 PID 1252 wrote to memory of 2712 1252 {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe 43 PID 1252 wrote to memory of 2712 1252 {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe 43 PID 1252 wrote to memory of 2712 1252 {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe 43 PID 1252 wrote to memory of 1916 1252 {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe 44 PID 1252 wrote to memory of 1916 1252 {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe 44 PID 1252 wrote to memory of 1916 1252 {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe 44 PID 1252 wrote to memory of 1916 1252 {4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe 44 PID 2712 wrote to memory of 2648 2712 {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe 45 PID 2712 wrote to memory of 2648 2712 {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe 45 PID 2712 wrote to memory of 2648 2712 {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe 45 PID 2712 wrote to memory of 2648 2712 {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe 45 PID 2712 wrote to memory of 3068 2712 {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe 46 PID 2712 wrote to memory of 3068 2712 {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe 46 PID 2712 wrote to memory of 3068 2712 {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe 46 PID 2712 wrote to memory of 3068 2712 {86021BB6-7B81-4d46-B8FC-A654B4513475}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe"C:\Users\Admin\AppData\Local\Temp\2e6907f82f3b4aa336a98d9d1e959db38c9f9997f02f6720a7b4bf62697f187bN.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\{8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exeC:\Windows\{8DB067FC-912D-41c9-B1EA-6562F3F7C5BE}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\{AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exeC:\Windows\{AE9494EC-1F28-48a8-BC11-23A5C0603F30}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\{B966B625-904F-401b-863E-9624CB84304F}.exeC:\Windows\{B966B625-904F-401b-863E-9624CB84304F}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\{0720615D-F398-4482-815A-3CD22CCAA0DA}.exeC:\Windows\{0720615D-F398-4482-815A-3CD22CCAA0DA}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\{FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exeC:\Windows\{FE5276F5-8EBC-4d72-ACDA-CF3E758022A8}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\{4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exeC:\Windows\{4D590C9C-6DB7-4d41-90EF-3FD69D5BCE13}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\{86021BB6-7B81-4d46-B8FC-A654B4513475}.exeC:\Windows\{86021BB6-7B81-4d46-B8FC-A654B4513475}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\{E363BF2D-78E4-451d-AA1F-42F52A878F9F}.exeC:\Windows\{E363BF2D-78E4-451d-AA1F-42F52A878F9F}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\{D3982315-FC8E-4bd9-8877-992D0B8C3A35}.exeC:\Windows\{D3982315-FC8E-4bd9-8877-992D0B8C3A35}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E363B~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{86021~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4D590~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FE527~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{07206~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B966B~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AE949~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8DB06~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2E6907~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD55eb1d4f44990fcf579aa621fe0556069
SHA11c555b61b48b01cce653381b191cc0a5e55de489
SHA2566294dde047a8f7a50c3df98658320e2fcb5166e2ef03dab82853e8afa9991aa6
SHA512888ef1aeedf24ef13420d0ec11f6b48e8f3f74eb913b6bec883b6bb14fc5d865e7a5d69c0c72935354a3024011a8a5c749c6bb44867d0e3a74d6554a3d706189
-
Filesize
89KB
MD5752db4640b58572c56dd4f0bf38c5dd9
SHA19cde479b212382a0f9e9d4b954e16f083e1a3e76
SHA256e740f4568c9d526a7c818c3ee54c9e42461d29744c44bca4477d446ec4d87ca3
SHA5122bf3049bf15414a7736b1dea9f7acaca66db7d7da15bc27aad9e335e8515ea46de903fe4e84fc4b23ac4cd3002904614c0a5a757363932ff9a65b0ce6ff8c28f
-
Filesize
89KB
MD5c66ecf2d22b6df977e71edb232accfd4
SHA19cad428d558d0cfc11a4aae0b6f6f563d73cae99
SHA256b0d2d51e254e423ebdbe1ab899cb9c6d430cb4ddc047cfdefcadee580e5fbfb8
SHA512b3f664051d8c9b99cc770050633d88a5c39ff352cf9f35627dc101902f583a45e2408d0366919cb726a3194c1e7d16512b91f979965441512c5406f98167739d
-
Filesize
89KB
MD5a19b579105a909cfaa1312382152b8c7
SHA1c6eae98376f225f1dd834527e8541ddeccb5b90c
SHA256e781ee3c3232990df2c121e52062763a0565402f2fd92296410e219a658b6eda
SHA5129e3cb6fc57011b0c772741c43133ea9458f8a6d2060f60f3450e5ebf8723fff9846a9ffa8fcf8a9ae612d564fa56fe7ddf06187caa9d84da0528d940b84a986e
-
Filesize
89KB
MD5e7ad005f7aa1c4dabd62767f098f8f6a
SHA14454fe9b0819c65f46b910e3be976bb45627c825
SHA2569973bdb3e972b7b0987235fad1284184fd1a56fe70fc22f2eebaac9d995c0fe7
SHA512671b35ec06c6e20da5119148d8e35f20883d2936331baadfecf344372a32f5c393cbab05f322a914774649ae0602300973c1bd9f965a196df7a449e3c73f40b4
-
Filesize
89KB
MD547a7adce87ac09e780759b7f485aeebf
SHA18a041a928842e633ab5e01c06ff002675d580ed7
SHA256c4b3ea8303fc1ad481e5eb2a95d23d46176831aa5cd260a5f436b1a72cb38760
SHA512b5ca3479494aff5f2a9e1beb0570aedbe129140dc0c6c6ee37af617448d0edee3835fdc2a3095c56565698119bd5f727159144c688a8410c9dbee6398851d8b5
-
Filesize
89KB
MD54a9068d44f808d052f9e1d01bd1bcbfc
SHA105eb3f569a90d12e031eece68dc467db16203b7d
SHA2563b15f0ee6e94045d87a9e2f294207723fec43fc17193be27d8d02fdc5633d546
SHA51236ae9b882139a7f8d534cff5e9d08b1c007ed6783769eddc49e7da0bcd586f75b115f6872543186a83975cfadfefe9ece0e2058c1a570a01a9cc04f1762b97b7
-
Filesize
89KB
MD55cda6d702b76e2d4ebe9498d8dec5b56
SHA1bca3cad8e36899c5e3af43e6d7e6972bfa17e462
SHA256dd18aac03a0689c4bdfe93e6836c04b501b35bd75b268806630fb68724b3522e
SHA5123c4e183852948bd5c36e88a5ebaf41dbd56ebfd89f5a3c95cfbf0856bb0718232785abd2b7c943e96c1082cefd22c366ef1bd2d18b5205993540285c8938e7b1
-
Filesize
89KB
MD551fa810437a5f2b2baa261816696d89d
SHA165ea2197318e2c6d3037380dbd85b08dd7f68915
SHA256e8f3125b0973e5bbc8613779a448b9b1fc7a2cfc1aac62a2da509ce06d08c842
SHA5123124f2016b9a7c09a3a4ce6610723e5e79353d2f8a371b07850a0509a2ddd1438d10442e0d28be6ecac9f0f6fe977646941b668000958773964feadd4f427a25