Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe
Resource
win10v2004-20241007-en
General
-
Target
ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe
-
Size
79KB
-
MD5
73ae5a63a08725057c33ff0b8f461051
-
SHA1
fe08e7d1ba9e540b43609dc160eed8f74e9c8d1f
-
SHA256
ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0
-
SHA512
28aea43b167cb2e5c598daf6ff27872ea08bca7a8c72aced92fdf2e66797d0067280030b0b9a8ed1a508477cb575baa131637cbbda240fdcd9288d077b055637
-
SSDEEP
768:4vw9816vhKQLroUN4/wQzXOQ69zbjlAAX5e9zp:wEGh0oYlGizbR9Xwzp
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A04AB671-9BB9-470f-B99A-BA9370FA7628} {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A04AB671-9BB9-470f-B99A-BA9370FA7628}\stubpath = "C:\\Windows\\{A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe" {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C643405E-5DF1-4b46-A4EB-6CE5B436B619} {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81C70CFE-B5A3-4ed8-89FF-B29D971846D8} {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81C70CFE-B5A3-4ed8-89FF-B29D971846D8}\stubpath = "C:\\Windows\\{81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe" {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}\stubpath = "C:\\Windows\\{3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe" {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6831DC2-0ECD-4a45-99F7-90850D830CF2} {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6831DC2-0ECD-4a45-99F7-90850D830CF2}\stubpath = "C:\\Windows\\{B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe" {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07C8662C-3996-4ff7-A57A-5D4E660E5F03}\stubpath = "C:\\Windows\\{07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe" {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62E8032B-109C-401e-8D94-68184E677F5D}\stubpath = "C:\\Windows\\{62E8032B-109C-401e-8D94-68184E677F5D}.exe" {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E8AF286E-7B47-480a-AC91-3C819A7CEB1F}\stubpath = "C:\\Windows\\{E8AF286E-7B47-480a-AC91-3C819A7CEB1F}.exe" {62E8032B-109C-401e-8D94-68184E677F5D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDB8FA93-E636-424f-A688-AB9AF5A501F3} ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A6C8C6D-B853-4ad6-8D07-597ADE137DDA} {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07C8662C-3996-4ff7-A57A-5D4E660E5F03} {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDB8FA93-E636-424f-A688-AB9AF5A501F3}\stubpath = "C:\\Windows\\{BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe" ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C643405E-5DF1-4b46-A4EB-6CE5B436B619}\stubpath = "C:\\Windows\\{C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe" {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E8AF286E-7B47-480a-AC91-3C819A7CEB1F} {62E8032B-109C-401e-8D94-68184E677F5D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62E8032B-109C-401e-8D94-68184E677F5D} {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe -
Deletes itself 1 IoCs
pid Process 2180 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2076 {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe 2864 {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe 2684 {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe 2728 {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe 1572 {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe 436 {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe 2764 {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe 1176 {62E8032B-109C-401e-8D94-68184E677F5D}.exe 2164 {E8AF286E-7B47-480a-AC91-3C819A7CEB1F}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe File created C:\Windows\{B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe File created C:\Windows\{A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe File created C:\Windows\{07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe File created C:\Windows\{62E8032B-109C-401e-8D94-68184E677F5D}.exe {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe File created C:\Windows\{BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe File created C:\Windows\{C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe File created C:\Windows\{81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe File created C:\Windows\{E8AF286E-7B47-480a-AC91-3C819A7CEB1F}.exe {62E8032B-109C-401e-8D94-68184E677F5D}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {62E8032B-109C-401e-8D94-68184E677F5D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E8AF286E-7B47-480a-AC91-3C819A7CEB1F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2296 ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe Token: SeIncBasePriorityPrivilege 2076 {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe Token: SeIncBasePriorityPrivilege 2864 {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe Token: SeIncBasePriorityPrivilege 2684 {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe Token: SeIncBasePriorityPrivilege 2728 {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe Token: SeIncBasePriorityPrivilege 1572 {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe Token: SeIncBasePriorityPrivilege 436 {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe Token: SeIncBasePriorityPrivilege 2764 {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe Token: SeIncBasePriorityPrivilege 1176 {62E8032B-109C-401e-8D94-68184E677F5D}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2076 2296 ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe 30 PID 2296 wrote to memory of 2076 2296 ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe 30 PID 2296 wrote to memory of 2076 2296 ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe 30 PID 2296 wrote to memory of 2076 2296 ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe 30 PID 2296 wrote to memory of 2180 2296 ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe 31 PID 2296 wrote to memory of 2180 2296 ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe 31 PID 2296 wrote to memory of 2180 2296 ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe 31 PID 2296 wrote to memory of 2180 2296 ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe 31 PID 2076 wrote to memory of 2864 2076 {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe 32 PID 2076 wrote to memory of 2864 2076 {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe 32 PID 2076 wrote to memory of 2864 2076 {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe 32 PID 2076 wrote to memory of 2864 2076 {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe 32 PID 2076 wrote to memory of 1448 2076 {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe 33 PID 2076 wrote to memory of 1448 2076 {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe 33 PID 2076 wrote to memory of 1448 2076 {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe 33 PID 2076 wrote to memory of 1448 2076 {BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe 33 PID 2864 wrote to memory of 2684 2864 {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe 34 PID 2864 wrote to memory of 2684 2864 {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe 34 PID 2864 wrote to memory of 2684 2864 {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe 34 PID 2864 wrote to memory of 2684 2864 {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe 34 PID 2864 wrote to memory of 2832 2864 {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe 35 PID 2864 wrote to memory of 2832 2864 {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe 35 PID 2864 wrote to memory of 2832 2864 {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe 35 PID 2864 wrote to memory of 2832 2864 {3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe 35 PID 2684 wrote to memory of 2728 2684 {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe 36 PID 2684 wrote to memory of 2728 2684 {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe 36 PID 2684 wrote to memory of 2728 2684 {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe 36 PID 2684 wrote to memory of 2728 2684 {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe 36 PID 2684 wrote to memory of 1680 2684 {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe 37 PID 2684 wrote to memory of 1680 2684 {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe 37 PID 2684 wrote to memory of 1680 2684 {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe 37 PID 2684 wrote to memory of 1680 2684 {B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe 37 PID 2728 wrote to memory of 1572 2728 {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe 38 PID 2728 wrote to memory of 1572 2728 {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe 38 PID 2728 wrote to memory of 1572 2728 {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe 38 PID 2728 wrote to memory of 1572 2728 {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe 38 PID 2728 wrote to memory of 2264 2728 {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe 39 PID 2728 wrote to memory of 2264 2728 {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe 39 PID 2728 wrote to memory of 2264 2728 {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe 39 PID 2728 wrote to memory of 2264 2728 {A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe 39 PID 1572 wrote to memory of 436 1572 {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe 40 PID 1572 wrote to memory of 436 1572 {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe 40 PID 1572 wrote to memory of 436 1572 {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe 40 PID 1572 wrote to memory of 436 1572 {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe 40 PID 1572 wrote to memory of 2248 1572 {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe 41 PID 1572 wrote to memory of 2248 1572 {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe 41 PID 1572 wrote to memory of 2248 1572 {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe 41 PID 1572 wrote to memory of 2248 1572 {C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe 41 PID 436 wrote to memory of 2764 436 {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe 42 PID 436 wrote to memory of 2764 436 {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe 42 PID 436 wrote to memory of 2764 436 {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe 42 PID 436 wrote to memory of 2764 436 {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe 42 PID 436 wrote to memory of 2700 436 {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe 43 PID 436 wrote to memory of 2700 436 {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe 43 PID 436 wrote to memory of 2700 436 {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe 43 PID 436 wrote to memory of 2700 436 {81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe 43 PID 2764 wrote to memory of 1176 2764 {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe 45 PID 2764 wrote to memory of 1176 2764 {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe 45 PID 2764 wrote to memory of 1176 2764 {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe 45 PID 2764 wrote to memory of 1176 2764 {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe 45 PID 2764 wrote to memory of 616 2764 {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe 46 PID 2764 wrote to memory of 616 2764 {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe 46 PID 2764 wrote to memory of 616 2764 {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe 46 PID 2764 wrote to memory of 616 2764 {07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe"C:\Users\Admin\AppData\Local\Temp\ec3a0f3dc0ce49d09dfc77ebf9d80bf68279a0a7d16dafa41b2f4144072fd5a0.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\{BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exeC:\Windows\{BDB8FA93-E636-424f-A688-AB9AF5A501F3}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\{3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exeC:\Windows\{3A6C8C6D-B853-4ad6-8D07-597ADE137DDA}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\{B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exeC:\Windows\{B6831DC2-0ECD-4a45-99F7-90850D830CF2}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\{A04AB671-9BB9-470f-B99A-BA9370FA7628}.exeC:\Windows\{A04AB671-9BB9-470f-B99A-BA9370FA7628}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\{C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exeC:\Windows\{C643405E-5DF1-4b46-A4EB-6CE5B436B619}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\{81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exeC:\Windows\{81C70CFE-B5A3-4ed8-89FF-B29D971846D8}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\{07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exeC:\Windows\{07C8662C-3996-4ff7-A57A-5D4E660E5F03}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\{62E8032B-109C-401e-8D94-68184E677F5D}.exeC:\Windows\{62E8032B-109C-401e-8D94-68184E677F5D}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1176 -
C:\Windows\{E8AF286E-7B47-480a-AC91-3C819A7CEB1F}.exeC:\Windows\{E8AF286E-7B47-480a-AC91-3C819A7CEB1F}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{62E80~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{07C86~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81C70~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C6434~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A04AB~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6831~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3A6C8~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BDB8F~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\EC3A0F~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD53f0165ed7ae21856754fab0a8efd23c8
SHA11dec92891afc63c823004282641a8b04dfac6b59
SHA25643d6a4dc5fb4b081900fe4ee5225f103dbde3c32a7c8d8b836773b55b8d3143d
SHA5122ae406a64a26be68b540288704de3ad97e6e63133620e2f4e7b8944adb763a059e8012d0ebae60f19f1b88c7ab794d11d269d6f96727dcb06a010f7a4152aa3e
-
Filesize
79KB
MD5caf6dd219e30a1581d9359620f7f1e91
SHA1c96fa5db7078664cef3f8f1a6e31424e89786a12
SHA256cc0e79230624382755ef18a8ebed00f52435e4a814ced467061b1ceb2e772002
SHA512cf5d770f58abc7872bd3f6427151e3c5927103f61a889ba7a4fda2abd71801a4e3c5aa73325dcdda02a163de8d6ad8ab7f4311cb8b2305059c6d7b30234d7700
-
Filesize
79KB
MD51154e3028f33d02443c131b842a25881
SHA18ff449e993b91da5cc9311914e8ce5c6a26e46c5
SHA25606a6f61f0e79c4474e6631df362fe582bdfff681845c80d9251b78e87e07487b
SHA512e8bcfd173d8d63c1593a3a7b236f331dc5cd85b7c0cb3485813b3c5822cf63e8d1ccaf92fd1d80257306e2a3c257846305b9e2381934acf6ee173a8bf4562f0a
-
Filesize
79KB
MD59c910c41483334322fc6d978a490569c
SHA1d4f3b06b61b40414f4d782b5b6b14878b8936b97
SHA256874e3178675c08e34084df32aaff52ac8249290339de2406b9aac0fe942c8046
SHA5124c330fc267f9ea91a03e8288ddaa20b7b51c9233cdba85ab69c284597b715fce3eb747671bf2d8e8579ddc0fdc67d4800b85a57ea13280312d8f6dc7cc873e5c
-
Filesize
79KB
MD510d51a471bbe46a4c0ed04612c2de247
SHA1bdadab86677da5a1c107369ebe435d821151c7c4
SHA256c1765b39116b74adf13f2addf90ebb79f4f9c60dcd12f7e6a0cc6d75420fa57d
SHA512e0b8d214609a28f3439ac43c9f434d1bd02ce7346d8908af2df6321b3bd3aa664d6752024ef25e1d73adbc371b0f8d29faa0679bc4fe53f0a3a7d81ad5333e6b
-
Filesize
79KB
MD5921739065e7c81b1edabb3d3b4e076fa
SHA1b255ec15c1ef652e5caef0e93eeae7b7f0ff5ed7
SHA25626a10df43a28a417df0afbfa27e7c7ff0b9ca939839e0f69236e7eb3ba22ddbf
SHA51272d91075c1ec55ff667afb6d1a324288a0a9e3d3d9081ac0c57af172ce1c9636f7d3a4473873f5ce14a526fa12749b4c448aabab7d5f0352570001073ee2d502
-
Filesize
79KB
MD517a90f5bab0df1bc70201ec532e15e7a
SHA1ade4c083bd607ae7dba7d9c525cd84468c993b5e
SHA256bb0e1245247087f8af935750abbd8ebaeee08d1061198512a8ee32d469913984
SHA5124398a39cbc759f6319ff706e5b1536b78c3abaca20b97cad0d2c2b6604753583e39fb61c242d417b38ff6bee89dcb3314229d67c397a4d0e1f8c17f46c39b6a4
-
Filesize
79KB
MD555071f0236b7dac8910014bd83dd8f30
SHA1a25e2fede44432a645b28044e65c39349beff3b8
SHA256e4b2d23b38234fd3f2451f9cbc1c07b7a6b941f7c1facf67858c75c7d1ecc242
SHA512f8baef15a8905b63732518dbd6469e1013b94def0c0b41a3f29c929edfa8ce2e67691a5ff13fa4219a022261aaad77b981d7c74174f4dcd6d1a7d1a22d7b2716
-
Filesize
79KB
MD514cb784c78ca9391f1c2f8924bf9161d
SHA129caacf3d9ef9fa147c2e3778d86cbad38da0bd4
SHA256a57d21fc401e369cfa9f6ecbad5bf6b2f60f88414c8711b609f778c9b8268250
SHA512e54d5e9df3e88e083014bc22c706966ff66b17f28b0bbe0c1fb23716975b302b87f2c86a38f092ce7ee6216ff370bd6f4e21880e4b2324014fe4749ee786f27b