Analysis
-
max time kernel
118s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe
Resource
win10v2004-20241007-en
General
-
Target
e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe
-
Size
90KB
-
MD5
92f93f3d3f753f6f405e50fed97daae0
-
SHA1
9d3babe310768384b0ef6c6b24fcf71137f69b19
-
SHA256
e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47d
-
SHA512
935d2c88664cea86bbbfd6e0b9928706f760e43615c917ae1883d469eb2bad6cc9872c12002cee19660cd438cfa43975c6d70794fe717fb02f09a48b70d232fc
-
SSDEEP
768:Qvw9816vhKQLroiL4/wQRNrfrunMxVFA3b7gl/:YEGh0oiLl2unMxVS3HgR
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{98C7E499-F765-4998-B358-5349EF321E6B}\stubpath = "C:\\Windows\\{98C7E499-F765-4998-B358-5349EF321E6B}.exe" e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A88080A-8E3D-49c7-A0F4-F3DF5E296A51} {98C7E499-F765-4998-B358-5349EF321E6B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7870E0E-18C4-4c40-B46B-E75E4FC33C72}\stubpath = "C:\\Windows\\{D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe" {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0625B39D-00A7-47ba-BE41-94EA9D5BE962} {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E} {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{206C455A-809A-4f79-8160-29F56E66807E} {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7870E0E-18C4-4c40-B46B-E75E4FC33C72} {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}\stubpath = "C:\\Windows\\{6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe" {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{206C455A-809A-4f79-8160-29F56E66807E}\stubpath = "C:\\Windows\\{206C455A-809A-4f79-8160-29F56E66807E}.exe" {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6D5C9C4-8353-4255-8BC3-AF502207BA76} {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}\stubpath = "C:\\Windows\\{DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe" {206C455A-809A-4f79-8160-29F56E66807E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6D5C9C4-8353-4255-8BC3-AF502207BA76}\stubpath = "C:\\Windows\\{A6D5C9C4-8353-4255-8BC3-AF502207BA76}.exe" {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{98C7E499-F765-4998-B358-5349EF321E6B} e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}\stubpath = "C:\\Windows\\{5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe" {98C7E499-F765-4998-B358-5349EF321E6B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FBBB402-E8A0-4a2d-95B7-916538FEB96A} {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FBBB402-E8A0-4a2d-95B7-916538FEB96A}\stubpath = "C:\\Windows\\{8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe" {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0625B39D-00A7-47ba-BE41-94EA9D5BE962}\stubpath = "C:\\Windows\\{0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe" {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DED36FE1-7A2B-4a4e-BEE9-C70F2B536564} {206C455A-809A-4f79-8160-29F56E66807E}.exe -
Executes dropped EXE 9 IoCs
pid Process 3020 {98C7E499-F765-4998-B358-5349EF321E6B}.exe 532 {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe 1268 {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe 5056 {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe 116 {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe 3124 {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe 3716 {206C455A-809A-4f79-8160-29F56E66807E}.exe 3420 {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe 2192 {A6D5C9C4-8353-4255-8BC3-AF502207BA76}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{98C7E499-F765-4998-B358-5349EF321E6B}.exe e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe File created C:\Windows\{5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe {98C7E499-F765-4998-B358-5349EF321E6B}.exe File created C:\Windows\{8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe File created C:\Windows\{0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe File created C:\Windows\{206C455A-809A-4f79-8160-29F56E66807E}.exe {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe File created C:\Windows\{D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe File created C:\Windows\{6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe File created C:\Windows\{DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe {206C455A-809A-4f79-8160-29F56E66807E}.exe File created C:\Windows\{A6D5C9C4-8353-4255-8BC3-AF502207BA76}.exe {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {206C455A-809A-4f79-8160-29F56E66807E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A6D5C9C4-8353-4255-8BC3-AF502207BA76}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {98C7E499-F765-4998-B358-5349EF321E6B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 100 e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe Token: SeIncBasePriorityPrivilege 3020 {98C7E499-F765-4998-B358-5349EF321E6B}.exe Token: SeIncBasePriorityPrivilege 532 {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe Token: SeIncBasePriorityPrivilege 1268 {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe Token: SeIncBasePriorityPrivilege 5056 {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe Token: SeIncBasePriorityPrivilege 116 {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe Token: SeIncBasePriorityPrivilege 3124 {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe Token: SeIncBasePriorityPrivilege 3716 {206C455A-809A-4f79-8160-29F56E66807E}.exe Token: SeIncBasePriorityPrivilege 3420 {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 100 wrote to memory of 3020 100 e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe 86 PID 100 wrote to memory of 3020 100 e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe 86 PID 100 wrote to memory of 3020 100 e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe 86 PID 100 wrote to memory of 3268 100 e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe 87 PID 100 wrote to memory of 3268 100 e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe 87 PID 100 wrote to memory of 3268 100 e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe 87 PID 3020 wrote to memory of 532 3020 {98C7E499-F765-4998-B358-5349EF321E6B}.exe 88 PID 3020 wrote to memory of 532 3020 {98C7E499-F765-4998-B358-5349EF321E6B}.exe 88 PID 3020 wrote to memory of 532 3020 {98C7E499-F765-4998-B358-5349EF321E6B}.exe 88 PID 3020 wrote to memory of 5012 3020 {98C7E499-F765-4998-B358-5349EF321E6B}.exe 89 PID 3020 wrote to memory of 5012 3020 {98C7E499-F765-4998-B358-5349EF321E6B}.exe 89 PID 3020 wrote to memory of 5012 3020 {98C7E499-F765-4998-B358-5349EF321E6B}.exe 89 PID 532 wrote to memory of 1268 532 {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe 92 PID 532 wrote to memory of 1268 532 {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe 92 PID 532 wrote to memory of 1268 532 {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe 92 PID 532 wrote to memory of 3196 532 {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe 93 PID 532 wrote to memory of 3196 532 {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe 93 PID 532 wrote to memory of 3196 532 {5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe 93 PID 1268 wrote to memory of 5056 1268 {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe 95 PID 1268 wrote to memory of 5056 1268 {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe 95 PID 1268 wrote to memory of 5056 1268 {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe 95 PID 1268 wrote to memory of 2444 1268 {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe 96 PID 1268 wrote to memory of 2444 1268 {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe 96 PID 1268 wrote to memory of 2444 1268 {8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe 96 PID 5056 wrote to memory of 116 5056 {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe 97 PID 5056 wrote to memory of 116 5056 {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe 97 PID 5056 wrote to memory of 116 5056 {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe 97 PID 5056 wrote to memory of 4240 5056 {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe 98 PID 5056 wrote to memory of 4240 5056 {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe 98 PID 5056 wrote to memory of 4240 5056 {D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe 98 PID 116 wrote to memory of 3124 116 {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe 99 PID 116 wrote to memory of 3124 116 {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe 99 PID 116 wrote to memory of 3124 116 {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe 99 PID 116 wrote to memory of 4984 116 {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe 100 PID 116 wrote to memory of 4984 116 {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe 100 PID 116 wrote to memory of 4984 116 {0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe 100 PID 3124 wrote to memory of 3716 3124 {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe 101 PID 3124 wrote to memory of 3716 3124 {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe 101 PID 3124 wrote to memory of 3716 3124 {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe 101 PID 3124 wrote to memory of 1604 3124 {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe 102 PID 3124 wrote to memory of 1604 3124 {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe 102 PID 3124 wrote to memory of 1604 3124 {6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe 102 PID 3716 wrote to memory of 3420 3716 {206C455A-809A-4f79-8160-29F56E66807E}.exe 103 PID 3716 wrote to memory of 3420 3716 {206C455A-809A-4f79-8160-29F56E66807E}.exe 103 PID 3716 wrote to memory of 3420 3716 {206C455A-809A-4f79-8160-29F56E66807E}.exe 103 PID 3716 wrote to memory of 3224 3716 {206C455A-809A-4f79-8160-29F56E66807E}.exe 104 PID 3716 wrote to memory of 3224 3716 {206C455A-809A-4f79-8160-29F56E66807E}.exe 104 PID 3716 wrote to memory of 3224 3716 {206C455A-809A-4f79-8160-29F56E66807E}.exe 104 PID 3420 wrote to memory of 2192 3420 {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe 105 PID 3420 wrote to memory of 2192 3420 {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe 105 PID 3420 wrote to memory of 2192 3420 {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe 105 PID 3420 wrote to memory of 5068 3420 {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe 106 PID 3420 wrote to memory of 5068 3420 {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe 106 PID 3420 wrote to memory of 5068 3420 {DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe"C:\Users\Admin\AppData\Local\Temp\e2ac578cae71dceb95ff01d68545369ea482ebaa887d5af3c7f34b193077c47dN.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\{98C7E499-F765-4998-B358-5349EF321E6B}.exeC:\Windows\{98C7E499-F765-4998-B358-5349EF321E6B}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\{5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exeC:\Windows\{5A88080A-8E3D-49c7-A0F4-F3DF5E296A51}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\{8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exeC:\Windows\{8FBBB402-E8A0-4a2d-95B7-916538FEB96A}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\{D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exeC:\Windows\{D7870E0E-18C4-4c40-B46B-E75E4FC33C72}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\{0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exeC:\Windows\{0625B39D-00A7-47ba-BE41-94EA9D5BE962}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\{6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exeC:\Windows\{6778B3F5-3345-4e6c-9ACE-1AC31D50DB3E}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\{206C455A-809A-4f79-8160-29F56E66807E}.exeC:\Windows\{206C455A-809A-4f79-8160-29F56E66807E}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\{DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exeC:\Windows\{DED36FE1-7A2B-4a4e-BEE9-C70F2B536564}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\{A6D5C9C4-8353-4255-8BC3-AF502207BA76}.exeC:\Windows\{A6D5C9C4-8353-4255-8BC3-AF502207BA76}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DED36~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{206C4~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6778B~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0625B~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D7870~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8FBBB~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A880~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98C7E~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:5012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\E2AC57~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5a44e396a47a02e8d1383e3ac9a84aa46
SHA1df28a8c38de6b0b5b918d280e9b91dc630fdccbc
SHA256bf6cdfaf8875eb93f469aa7723b95f490cc7d6b44a41d9d7fd529066a9083d1d
SHA512b71c0c9d2e93937cefa0bcb636c47cc290bea837ab1acba18780232058c3ee34e798ca2df7eed2a984b95a328e52bd30d0ee3c29057ce5315bc0f2fbd400a60f
-
Filesize
90KB
MD5a314824e22c74d9c5908a00658806835
SHA1705cba9fd7a45dd27f74f659e1a2656aa8f70e79
SHA2566550431cba01923bfbccaa238186dc9352c7e076ad12a32882572fa4861c7626
SHA512181e2b20a4b97ecca3e2e069e84575a17a93d58213e5e8fd5150daa8a597bf7ade22db85d688f8ad98f6e4143fb44398edf3f4992805b5fe0ce65c1ab8c90be9
-
Filesize
90KB
MD59c53c6b6fc48fb4dc5dac3b54601afb1
SHA113126935b36be8713ce21523b74eb91ab57c6287
SHA25699bbb97185e730124a1df5e4cc80ecf4f7fa9d4e3f885de6dbb907ff1917434e
SHA512bf1aef0c79386a50205bf96f726ad557bca10a95d928b3a22405a14fec6850f289351ded005ae2d1c4124bc4e666d8d8dbc2ea5d5015ceddfff7346fe0e29253
-
Filesize
90KB
MD523dedaf21466a70a027e34e2c9194a6b
SHA19b95d5c54eae704aaf3bdde0f002596bc90db41f
SHA256bbdf1dba15f712445a9e7b70bfe4d95a73b8c7cf5fdd0ccd9ef8914e3ddd4300
SHA512aa71f98297bc50720d780daa0840866c4174dd83afe8d3dee36bb8a6ad35736dc6fda4fefbf056c4fb273e2eecdf07d6bf83e3e8473fe71958fd489cf06bf29b
-
Filesize
90KB
MD5600108bfa7b5481b95671a2e2ac516ae
SHA1070f6dd817f0be028b791429155e7a8af21dd8c6
SHA25630d8f5b610de9018e1e6b29a819d08c32af11f1d44a3b7827f594e1d7a2b19ed
SHA512534a10762091b62f5b16e9c30c3eef1ab0d753a3d76e449c59da49ce7450158fe319c9bfd51084666eb32e6943df3cec1783c6f50b5f12333efef189412dc500
-
Filesize
90KB
MD54c86979880ee0866e6c4660d63532f55
SHA109ab15d8d1579b9cf16bc43ab601bf7609730a4d
SHA25619ba4e1a5537604c1042e17e6f454c8d4b24b9ece96aeb479d776aa312e256aa
SHA5124b9a631a3b668e493433d203bf0588743d5d9341231fa0143d8c7056c6b4dd11e53182b2c88f0963b25ecbc8b4e1626406238e38860d364e17f7d2f092dd3287
-
Filesize
90KB
MD5e4c6bd3d22eee7069c1dadd7936a6b49
SHA18387b34c416e27a75dfd324bef60730a0b551d96
SHA256601fd07fd04d40e54e5bed24c9c8edcb8f03c0179ba144715dbc717537ad7c34
SHA51261347b05b7ae2c4d4ec36e8d219fd67e2da17d12fa99932c94258348fa24047d7f41945ab7cfe466606be6574bb898594ef2ad17773ed8c54d135167c602d220
-
Filesize
90KB
MD5fc6702e3cca0ca3b9fbac2ab9786129a
SHA1bcd25bdf0f5ed6fd4f8c53acce3a2fd4a3774fd0
SHA25604630f3b9a2894595978759a7d61788e3316c718ef37b58f4f2c03dc11e05df5
SHA5124a253dab6d6a1e93cfc7d41286c4db9639fca3349657b16b362dbc93f7adb0a2f5655612a816915c37c1a96ca324c8fa1b56612a5afc4fe34118e4a4eaa886a7
-
Filesize
90KB
MD51c5789ba8067672346b6fcb1167da4d7
SHA1806db9d8c50148b35de9103ef12b817edac2662f
SHA2565740ee60ef806f0e65e11a966f5d52e1dd9404f89166d294d346664756d0d5b2
SHA512f14d3ffd3a184c1a0e1aad03fea2551e885a5e6842f87d8aeab9ce01d6dd470607e2f90dc81370bf4b33820d16642a5ba8cda5da2b09af58b4b88e04022750cb