Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe
Resource
win10v2004-20241007-en
General
-
Target
317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe
-
Size
79KB
-
MD5
9c83ecead24ac45cc0bc23f31be146b7
-
SHA1
7459ba28d5f1d36f8e7cee27a3c884e2d7a8857a
-
SHA256
317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a
-
SHA512
f14454dafb37d97a2ae39817c413d7944e84bddc39436b779e3d701d465cf09df01addc25490514e9aa3410b046bd38b12dee337b6e2c1df5a5b06cf11c602da
-
SSDEEP
768:4vw9816vhKQLro64/wQpWMZ3XOQ69zbjlAAX5e9zp:wEGh0o6loWMZ3izbR9Xwzp
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4} 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{083DF34C-059C-4c57-B0BE-4A546A07C3BF}\stubpath = "C:\\Windows\\{083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe" {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63F40E0F-543F-45af-84A4-6E14056AB921} {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E12EA555-67F5-4540-9739-76E1C837C539} {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F53D677-12A2-4114-929C-F827F0908B9C} {E12EA555-67F5-4540-9739-76E1C837C539}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C0EF714-DCAD-4858-AE56-F034E60FC2EB}\stubpath = "C:\\Windows\\{1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe" {7F53D677-12A2-4114-929C-F827F0908B9C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57339CE6-7361-47e6-AAC3-F2F2288B3671} {63F40E0F-543F-45af-84A4-6E14056AB921}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938} {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63F40E0F-543F-45af-84A4-6E14056AB921}\stubpath = "C:\\Windows\\{63F40E0F-543F-45af-84A4-6E14056AB921}.exe" {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E12EA555-67F5-4540-9739-76E1C837C539}\stubpath = "C:\\Windows\\{E12EA555-67F5-4540-9739-76E1C837C539}.exe" {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F53D677-12A2-4114-929C-F827F0908B9C}\stubpath = "C:\\Windows\\{7F53D677-12A2-4114-929C-F827F0908B9C}.exe" {E12EA555-67F5-4540-9739-76E1C837C539}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C0EF714-DCAD-4858-AE56-F034E60FC2EB} {7F53D677-12A2-4114-929C-F827F0908B9C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{083DF34C-059C-4c57-B0BE-4A546A07C3BF} {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0525E678-8E2E-4911-ABBA-1FD8617196C5} {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0525E678-8E2E-4911-ABBA-1FD8617196C5}\stubpath = "C:\\Windows\\{0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe" {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}\stubpath = "C:\\Windows\\{8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe" 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}\stubpath = "C:\\Windows\\{F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe" {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57339CE6-7361-47e6-AAC3-F2F2288B3671}\stubpath = "C:\\Windows\\{57339CE6-7361-47e6-AAC3-F2F2288B3671}.exe" {63F40E0F-543F-45af-84A4-6E14056AB921}.exe -
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 1548 {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe 2784 {E12EA555-67F5-4540-9739-76E1C837C539}.exe 3028 {7F53D677-12A2-4114-929C-F827F0908B9C}.exe 1040 {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe 2812 {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe 1728 {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe 1112 {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe 1856 {63F40E0F-543F-45af-84A4-6E14056AB921}.exe 2268 {57339CE6-7361-47e6-AAC3-F2F2288B3671}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe File created C:\Windows\{57339CE6-7361-47e6-AAC3-F2F2288B3671}.exe {63F40E0F-543F-45af-84A4-6E14056AB921}.exe File created C:\Windows\{8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe File created C:\Windows\{E12EA555-67F5-4540-9739-76E1C837C539}.exe {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe File created C:\Windows\{1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe {7F53D677-12A2-4114-929C-F827F0908B9C}.exe File created C:\Windows\{63F40E0F-543F-45af-84A4-6E14056AB921}.exe {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe File created C:\Windows\{7F53D677-12A2-4114-929C-F827F0908B9C}.exe {E12EA555-67F5-4540-9739-76E1C837C539}.exe File created C:\Windows\{083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe File created C:\Windows\{F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {57339CE6-7361-47e6-AAC3-F2F2288B3671}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E12EA555-67F5-4540-9739-76E1C837C539}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7F53D677-12A2-4114-929C-F827F0908B9C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {63F40E0F-543F-45af-84A4-6E14056AB921}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2100 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe Token: SeIncBasePriorityPrivilege 1548 {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe Token: SeIncBasePriorityPrivilege 2784 {E12EA555-67F5-4540-9739-76E1C837C539}.exe Token: SeIncBasePriorityPrivilege 3028 {7F53D677-12A2-4114-929C-F827F0908B9C}.exe Token: SeIncBasePriorityPrivilege 1040 {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe Token: SeIncBasePriorityPrivilege 2812 {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe Token: SeIncBasePriorityPrivilege 1728 {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe Token: SeIncBasePriorityPrivilege 1112 {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe Token: SeIncBasePriorityPrivilege 1856 {63F40E0F-543F-45af-84A4-6E14056AB921}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1548 2100 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe 28 PID 2100 wrote to memory of 1548 2100 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe 28 PID 2100 wrote to memory of 1548 2100 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe 28 PID 2100 wrote to memory of 1548 2100 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe 28 PID 2100 wrote to memory of 2768 2100 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe 29 PID 2100 wrote to memory of 2768 2100 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe 29 PID 2100 wrote to memory of 2768 2100 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe 29 PID 2100 wrote to memory of 2768 2100 317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe 29 PID 1548 wrote to memory of 2784 1548 {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe 30 PID 1548 wrote to memory of 2784 1548 {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe 30 PID 1548 wrote to memory of 2784 1548 {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe 30 PID 1548 wrote to memory of 2784 1548 {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe 30 PID 1548 wrote to memory of 2816 1548 {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe 31 PID 1548 wrote to memory of 2816 1548 {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe 31 PID 1548 wrote to memory of 2816 1548 {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe 31 PID 1548 wrote to memory of 2816 1548 {8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe 31 PID 2784 wrote to memory of 3028 2784 {E12EA555-67F5-4540-9739-76E1C837C539}.exe 34 PID 2784 wrote to memory of 3028 2784 {E12EA555-67F5-4540-9739-76E1C837C539}.exe 34 PID 2784 wrote to memory of 3028 2784 {E12EA555-67F5-4540-9739-76E1C837C539}.exe 34 PID 2784 wrote to memory of 3028 2784 {E12EA555-67F5-4540-9739-76E1C837C539}.exe 34 PID 2784 wrote to memory of 2988 2784 {E12EA555-67F5-4540-9739-76E1C837C539}.exe 35 PID 2784 wrote to memory of 2988 2784 {E12EA555-67F5-4540-9739-76E1C837C539}.exe 35 PID 2784 wrote to memory of 2988 2784 {E12EA555-67F5-4540-9739-76E1C837C539}.exe 35 PID 2784 wrote to memory of 2988 2784 {E12EA555-67F5-4540-9739-76E1C837C539}.exe 35 PID 3028 wrote to memory of 1040 3028 {7F53D677-12A2-4114-929C-F827F0908B9C}.exe 36 PID 3028 wrote to memory of 1040 3028 {7F53D677-12A2-4114-929C-F827F0908B9C}.exe 36 PID 3028 wrote to memory of 1040 3028 {7F53D677-12A2-4114-929C-F827F0908B9C}.exe 36 PID 3028 wrote to memory of 1040 3028 {7F53D677-12A2-4114-929C-F827F0908B9C}.exe 36 PID 3028 wrote to memory of 604 3028 {7F53D677-12A2-4114-929C-F827F0908B9C}.exe 37 PID 3028 wrote to memory of 604 3028 {7F53D677-12A2-4114-929C-F827F0908B9C}.exe 37 PID 3028 wrote to memory of 604 3028 {7F53D677-12A2-4114-929C-F827F0908B9C}.exe 37 PID 3028 wrote to memory of 604 3028 {7F53D677-12A2-4114-929C-F827F0908B9C}.exe 37 PID 1040 wrote to memory of 2812 1040 {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe 38 PID 1040 wrote to memory of 2812 1040 {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe 38 PID 1040 wrote to memory of 2812 1040 {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe 38 PID 1040 wrote to memory of 2812 1040 {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe 38 PID 1040 wrote to memory of 2848 1040 {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe 39 PID 1040 wrote to memory of 2848 1040 {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe 39 PID 1040 wrote to memory of 2848 1040 {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe 39 PID 1040 wrote to memory of 2848 1040 {1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe 39 PID 2812 wrote to memory of 1728 2812 {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe 40 PID 2812 wrote to memory of 1728 2812 {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe 40 PID 2812 wrote to memory of 1728 2812 {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe 40 PID 2812 wrote to memory of 1728 2812 {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe 40 PID 2812 wrote to memory of 2176 2812 {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe 41 PID 2812 wrote to memory of 2176 2812 {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe 41 PID 2812 wrote to memory of 2176 2812 {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe 41 PID 2812 wrote to memory of 2176 2812 {083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe 41 PID 1728 wrote to memory of 1112 1728 {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe 42 PID 1728 wrote to memory of 1112 1728 {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe 42 PID 1728 wrote to memory of 1112 1728 {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe 42 PID 1728 wrote to memory of 1112 1728 {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe 42 PID 1728 wrote to memory of 2016 1728 {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe 43 PID 1728 wrote to memory of 2016 1728 {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe 43 PID 1728 wrote to memory of 2016 1728 {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe 43 PID 1728 wrote to memory of 2016 1728 {0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe 43 PID 1112 wrote to memory of 1856 1112 {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe 44 PID 1112 wrote to memory of 1856 1112 {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe 44 PID 1112 wrote to memory of 1856 1112 {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe 44 PID 1112 wrote to memory of 1856 1112 {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe 44 PID 1112 wrote to memory of 1828 1112 {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe 45 PID 1112 wrote to memory of 1828 1112 {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe 45 PID 1112 wrote to memory of 1828 1112 {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe 45 PID 1112 wrote to memory of 1828 1112 {F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe"C:\Users\Admin\AppData\Local\Temp\317fddd53bce84cfb47a1c1eeb54dbc23e250af42f2e26ef51b3e6a09602b94a.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\{8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exeC:\Windows\{8BE2301D-51A7-4fdd-AD12-EBD7F0259EA4}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\{E12EA555-67F5-4540-9739-76E1C837C539}.exeC:\Windows\{E12EA555-67F5-4540-9739-76E1C837C539}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\{7F53D677-12A2-4114-929C-F827F0908B9C}.exeC:\Windows\{7F53D677-12A2-4114-929C-F827F0908B9C}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\{1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exeC:\Windows\{1C0EF714-DCAD-4858-AE56-F034E60FC2EB}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\{083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exeC:\Windows\{083DF34C-059C-4c57-B0BE-4A546A07C3BF}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\{0525E678-8E2E-4911-ABBA-1FD8617196C5}.exeC:\Windows\{0525E678-8E2E-4911-ABBA-1FD8617196C5}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\{F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exeC:\Windows\{F1ADB3E3-F4ED-4e03-ACA1-37869B7FF938}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\{63F40E0F-543F-45af-84A4-6E14056AB921}.exeC:\Windows\{63F40E0F-543F-45af-84A4-6E14056AB921}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\{57339CE6-7361-47e6-AAC3-F2F2288B3671}.exeC:\Windows\{57339CE6-7361-47e6-AAC3-F2F2288B3671}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{63F40~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1ADB~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0525E~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{083DF~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C0EF~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7F53D~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E12EA~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8BE23~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\317FDD~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5a9361c58d7422a1fbff8682c111ec2e9
SHA16b2085aea9b6b00d0f1f01a59d9683984bd4a04b
SHA256268f8bbdcf4144f6281afca710de945b8f9fe33ad402acbe397d034772417df6
SHA5124da49ad22d71ab9a1555249c442ec10e72a7c2ee105abb15d3fa87b1a5412d66550f7caca6686b05e16b5a7c5ea97659d257538355025b9c1d0ec03f6e32b9a7
-
Filesize
79KB
MD5e59269e446d6a642bfac7d4bf701e858
SHA111f7abf45b59ecbb4b68ab0da359b363c67f7eb5
SHA256e09bea974419319e4b9e670425b1dc38fd737a4fced7e3cf0c3bfa382425004b
SHA51262fb1588c8906ce055f4936f012ba90ec0ec8eac038edccd0fd2517a5484282c5b95b64d275ce97159ec83e0722fcbb06d67168906ce0a110f15f5ea7cc38a1a
-
Filesize
79KB
MD5e6b47d642a826f6f9706d12afc7f7af5
SHA168058fdc20c6b3a6acdc1530cbe0462ced1078ec
SHA256e929d77187e34113a83adbb39ff5ca67d84bd1df1aedd4265f0ecb2a36b20a52
SHA512237e0dd1b29671698b0cb56161d1f3ec52380b6a388420bec9b44bb756b7c2b094fe8b8908d8db9bd1a5818e4de908e1148775d13baf43fa7f8f6110f7c81bda
-
Filesize
79KB
MD518473d59668857512218a214880f5103
SHA1d049c06dd436dba5f4350b5c35ab31eced31a5e9
SHA256af9f386a8e1121b33f6d823529c39dc5a73c2a080145bbf3531b068b4a152d3b
SHA512326cfb6115d2615f08362f614aa9fc8e181524a292c278e49f651f72d7af5a25538cca6043204f194116cbc6ea371e3b55275ecc72eaad1733079b867abf613c
-
Filesize
79KB
MD512c032e3134b2c0e2fb04e9ac55faa16
SHA145f051f78358563380daeb01ad7c2a16efca1043
SHA256fe6caacb192ea80b71af728f54efc5486cc85b5489dd85dbb3a3c7658648b598
SHA512f5d3ab18c746b97d62331db87f9a62457b3a888b56a8edc77413e6a1698986b519e208f113e1926703449417565f207e080b687ad702e3f74bdd34f08c1e162b
-
Filesize
79KB
MD5da120aac61483050f73007a18738273e
SHA12135f442f81d9d406b91ee1f3cd9e65db60485f6
SHA2568a1741a444b0d894705f7717b3e385bd48c350c6cf5d23dfda520e171457116d
SHA5126cf7b2cdc1e8d3d20c255ce7f67e32de3b717385b12c9d55646793a7d7df116a9c1792256d0e1e7e7cfb044523f3540edfc133211abf9ed7432d019de029d525
-
Filesize
79KB
MD5a18b958415d76b9a060a6552b0c034fe
SHA1c51a02faa6055c15f19b04c30c7ea0d4339efdf0
SHA2563b9ed41f9b3ab0395e4451c945b4e6f032aff0e6470e6c6d2c2315fd01914ba7
SHA512c66b94dfc86738861de021df517f69ebed99d0b281ca28758c0dc9beee2f7e2635c38d3b0e45e38580542030c15669baf96a54a8bbcf24cb9ba793a3cce88b34
-
Filesize
79KB
MD5bccf3cd964ea7673e126722de9535a24
SHA17e8dddbe971ced9e1b334ebecd7be1d32e6f1fc9
SHA2569b2782da7a88ef84177d0a0b49e199d9eca1ca0d08f398641f1cf5c292f6ebcf
SHA51258b37e1af54c682eb2b0f11350c2265dcaeacf032469d7cf67d5e2344ccf51a41d42b4aed2296a6cb279c6f70b596be41e91e9f63c0b0d4c7d31a69100bae4a8
-
Filesize
79KB
MD5a3387b59074acebb68f3551e75d1dba5
SHA1d1a3e3add0e74ac11c0fd357b83e0e755538400b
SHA256955b29e4acdb00917f44fbc9a0a20134d67f24a01da325910c85727bf9b54cd1
SHA51201274f0289c6cc021943d060400b7156a562011ce9abb6046690c7179bddaf14c41e6f7869ac5d6ff15aa03f98afb78a1b4833539a6d7edea7b0d322d38f8916