Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe
Resource
win10v2004-20241007-en
General
-
Target
60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe
-
Size
91KB
-
MD5
7269ab455c7b9a4a1057231f3d52de29
-
SHA1
99d3e9df99c784b1586b47d7cf9a25f3e29406ce
-
SHA256
60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d
-
SHA512
3304807af44bd1583e16fb4169620edd068ef0f054a90a902b2c6f37fddc53ba17dfbe56c46f153a2be8530127980bcc9f669998fdc89bc5387a0c70a2762282
-
SSDEEP
768:5vw9816uhKiroU4/wQNNrfrunMxVFA3b7H:lEGkmoUlCunMxVS3HH
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}\stubpath = "C:\\Windows\\{8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe" {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB} 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C68FDAB-BC1B-420f-9462-4499EC514B7A}\stubpath = "C:\\Windows\\{5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe" {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F6D1F918-02EC-4272-AA4E-7B6C3481605B} {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679} {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A85FAB86-968D-41cf-AAEF-8775861F4C33}\stubpath = "C:\\Windows\\{A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe" {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6ED15BF-AD52-495a-9C25-9FECCE06A38D} {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6ED15BF-AD52-495a-9C25-9FECCE06A38D}\stubpath = "C:\\Windows\\{D6ED15BF-AD52-495a-9C25-9FECCE06A38D}.exe" {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}\stubpath = "C:\\Windows\\{8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe" {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D37487F5-B7CD-41e0-B8B4-5B454033C0F8} {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C68FDAB-BC1B-420f-9462-4499EC514B7A} {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F6D1F918-02EC-4272-AA4E-7B6C3481605B}\stubpath = "C:\\Windows\\{F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe" {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7FFCA2A6-1AA7-40da-B70E-6AB2500613EB} {D6ED15BF-AD52-495a-9C25-9FECCE06A38D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7FFCA2A6-1AA7-40da-B70E-6AB2500613EB}\stubpath = "C:\\Windows\\{7FFCA2A6-1AA7-40da-B70E-6AB2500613EB}.exe" {D6ED15BF-AD52-495a-9C25-9FECCE06A38D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}\stubpath = "C:\\Windows\\{902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe" 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A85FAB86-968D-41cf-AAEF-8775861F4C33} {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C} {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D37487F5-B7CD-41e0-B8B4-5B454033C0F8}\stubpath = "C:\\Windows\\{D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe" {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe -
Deletes itself 1 IoCs
pid Process 2312 cmd.exe -
Executes dropped EXE 9 IoCs
pid Process 2056 {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe 2824 {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe 2872 {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe 308 {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe 272 {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe 2924 {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe 2148 {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe 532 {D6ED15BF-AD52-495a-9C25-9FECCE06A38D}.exe 1548 {7FFCA2A6-1AA7-40da-B70E-6AB2500613EB}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe File created C:\Windows\{5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe File created C:\Windows\{D6ED15BF-AD52-495a-9C25-9FECCE06A38D}.exe {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe File created C:\Windows\{902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe File created C:\Windows\{A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe File created C:\Windows\{D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe File created C:\Windows\{F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe File created C:\Windows\{8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe File created C:\Windows\{7FFCA2A6-1AA7-40da-B70E-6AB2500613EB}.exe {D6ED15BF-AD52-495a-9C25-9FECCE06A38D}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7FFCA2A6-1AA7-40da-B70E-6AB2500613EB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D6ED15BF-AD52-495a-9C25-9FECCE06A38D}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1964 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe Token: SeIncBasePriorityPrivilege 2056 {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe Token: SeIncBasePriorityPrivilege 2824 {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe Token: SeIncBasePriorityPrivilege 2872 {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe Token: SeIncBasePriorityPrivilege 308 {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe Token: SeIncBasePriorityPrivilege 272 {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe Token: SeIncBasePriorityPrivilege 2924 {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe Token: SeIncBasePriorityPrivilege 2148 {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe Token: SeIncBasePriorityPrivilege 532 {D6ED15BF-AD52-495a-9C25-9FECCE06A38D}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2056 1964 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe 30 PID 1964 wrote to memory of 2056 1964 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe 30 PID 1964 wrote to memory of 2056 1964 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe 30 PID 1964 wrote to memory of 2056 1964 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe 30 PID 1964 wrote to memory of 2312 1964 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe 31 PID 1964 wrote to memory of 2312 1964 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe 31 PID 1964 wrote to memory of 2312 1964 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe 31 PID 1964 wrote to memory of 2312 1964 60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe 31 PID 2056 wrote to memory of 2824 2056 {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe 33 PID 2056 wrote to memory of 2824 2056 {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe 33 PID 2056 wrote to memory of 2824 2056 {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe 33 PID 2056 wrote to memory of 2824 2056 {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe 33 PID 2056 wrote to memory of 2620 2056 {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe 34 PID 2056 wrote to memory of 2620 2056 {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe 34 PID 2056 wrote to memory of 2620 2056 {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe 34 PID 2056 wrote to memory of 2620 2056 {902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe 34 PID 2824 wrote to memory of 2872 2824 {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe 35 PID 2824 wrote to memory of 2872 2824 {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe 35 PID 2824 wrote to memory of 2872 2824 {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe 35 PID 2824 wrote to memory of 2872 2824 {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe 35 PID 2824 wrote to memory of 2724 2824 {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe 36 PID 2824 wrote to memory of 2724 2824 {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe 36 PID 2824 wrote to memory of 2724 2824 {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe 36 PID 2824 wrote to memory of 2724 2824 {A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe 36 PID 2872 wrote to memory of 308 2872 {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe 37 PID 2872 wrote to memory of 308 2872 {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe 37 PID 2872 wrote to memory of 308 2872 {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe 37 PID 2872 wrote to memory of 308 2872 {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe 37 PID 2872 wrote to memory of 2116 2872 {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe 38 PID 2872 wrote to memory of 2116 2872 {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe 38 PID 2872 wrote to memory of 2116 2872 {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe 38 PID 2872 wrote to memory of 2116 2872 {8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe 38 PID 308 wrote to memory of 272 308 {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe 39 PID 308 wrote to memory of 272 308 {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe 39 PID 308 wrote to memory of 272 308 {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe 39 PID 308 wrote to memory of 272 308 {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe 39 PID 308 wrote to memory of 2920 308 {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe 40 PID 308 wrote to memory of 2920 308 {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe 40 PID 308 wrote to memory of 2920 308 {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe 40 PID 308 wrote to memory of 2920 308 {D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe 40 PID 272 wrote to memory of 2924 272 {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe 41 PID 272 wrote to memory of 2924 272 {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe 41 PID 272 wrote to memory of 2924 272 {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe 41 PID 272 wrote to memory of 2924 272 {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe 41 PID 272 wrote to memory of 1796 272 {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe 42 PID 272 wrote to memory of 1796 272 {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe 42 PID 272 wrote to memory of 1796 272 {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe 42 PID 272 wrote to memory of 1796 272 {5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe 42 PID 2924 wrote to memory of 2148 2924 {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe 43 PID 2924 wrote to memory of 2148 2924 {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe 43 PID 2924 wrote to memory of 2148 2924 {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe 43 PID 2924 wrote to memory of 2148 2924 {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe 43 PID 2924 wrote to memory of 1876 2924 {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe 44 PID 2924 wrote to memory of 1876 2924 {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe 44 PID 2924 wrote to memory of 1876 2924 {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe 44 PID 2924 wrote to memory of 1876 2924 {F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe 44 PID 2148 wrote to memory of 532 2148 {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe 45 PID 2148 wrote to memory of 532 2148 {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe 45 PID 2148 wrote to memory of 532 2148 {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe 45 PID 2148 wrote to memory of 532 2148 {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe 45 PID 2148 wrote to memory of 1564 2148 {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe 46 PID 2148 wrote to memory of 1564 2148 {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe 46 PID 2148 wrote to memory of 1564 2148 {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe 46 PID 2148 wrote to memory of 1564 2148 {8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe"C:\Users\Admin\AppData\Local\Temp\60c2ddfb5e767336c30c27e9ecbfa747c13616ca5df5b92861ea6f088eea7e8d.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\{902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exeC:\Windows\{902AF67A-8FBB-4c62-86F3-A8D7E7C0B0FB}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\{A85FAB86-968D-41cf-AAEF-8775861F4C33}.exeC:\Windows\{A85FAB86-968D-41cf-AAEF-8775861F4C33}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\{8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exeC:\Windows\{8ECE86F9-CD7E-48a4-8FF9-E3A659B0A20C}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exeC:\Windows\{D37487F5-B7CD-41e0-B8B4-5B454033C0F8}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\{5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exeC:\Windows\{5C68FDAB-BC1B-420f-9462-4499EC514B7A}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\{F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exeC:\Windows\{F6D1F918-02EC-4272-AA4E-7B6C3481605B}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\{8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exeC:\Windows\{8B5CDD7F-D793-48d0-8A56-5F8CD8BB8679}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\{D6ED15BF-AD52-495a-9C25-9FECCE06A38D}.exeC:\Windows\{D6ED15BF-AD52-495a-9C25-9FECCE06A38D}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:532 -
C:\Windows\{7FFCA2A6-1AA7-40da-B70E-6AB2500613EB}.exeC:\Windows\{7FFCA2A6-1AA7-40da-B70E-6AB2500613EB}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D6ED1~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B5CD~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F6D1F~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C68F~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3748~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8ECE8~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A85FA~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{902AF~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\60C2DD~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5ceb3f081e33652d039a0bd69116f5e63
SHA1456cdcf2da74cd8720bdac386aa5a4375aad0b7f
SHA2564a624216e4ce1acf48577324e66e45b7d330543132e3e0f4178d03b3a0323045
SHA51212efa2b76fe4ba4d6347f7d5a9cf1c835d4efcd9840b8280324e5afadf4e4c2ac1f9b97c2476a9991405d7a2921c5ecc56722de3374cb0e4d5ad154ec10bdc04
-
Filesize
91KB
MD5564dad0d317cac748069600b7e0a6e44
SHA10b379522a2d8ddfacc43a6a549d2fde3f96c9338
SHA2566acff8d451cb28a81fbfb7402d34685352bc90c596ec5cba7e7a7ba270e63c06
SHA512ba854c0b10fcfdaeb6abe578628ffe42e27dfff70d62ceeb91ccfbc70f6781a652f43343b8ff8e087801fabb213f850816d8f4e3a6e824f9140e05ee8db90dec
-
Filesize
91KB
MD56b4d6c7beb2e0a954b549f18f5325166
SHA1bfdf043fa54b897f1c29be3a8b705dd29f56c572
SHA2566411e773bb7184f57bf33d80abd1c07ed68919de737a04832bad0250512b4642
SHA512be99705f351f2a7ee549b25e5350d321fb18e319e622ea0f1f001072a1cfb8c946b945bff683676411595fbe3d3f86f032c6b84c9427ae8db11d09eb021a71f6
-
Filesize
91KB
MD5b859b5bef2952cdfe54c65a0f45b888c
SHA1d8f45c47a88972bc60c366b471005c7fb6eeb7ee
SHA2569bc970bc9b10c38f39ca03de3df6e951eb4c646065c3f3dbf1bdb16b2c8c91f2
SHA5129e8d033d4eaf9094c55757ff7765d500e725712d849d0e466ae83e53ba07df93f4737370519bba46a48e26f94ef860dd65c2ac4f0f50e4f8004a1d08039e28fa
-
Filesize
91KB
MD5771ea350f0d210aa73c8ce5ea47add73
SHA116c9900d4c4212f3e93b2a9736a1678885f23ba8
SHA2561a0903c331361fecb8e4173d1d9684ad57f0bde15fa956e010b6a20035bce9a1
SHA512334be40f97a4c3a0163e69ece2e3df24f2de6f464ecace4b6ebe0e3edc19617c7a1f4790659ac317f2d724ff11c7d7975fa71cfdfe7ea4aff878b3b40b802cb8
-
Filesize
91KB
MD554ce53da4fbe956626395b8de36f834f
SHA1400ebab58026b5fc44281fd2b1a325cdb549d511
SHA25646ae8de1f2ca3650cc3e29edc8727cb251f8064545a74131476a8420fdada0a8
SHA512c7a32e60f0a1e7c3636825cef8bdc78406c218c091b57efa4d6fec1ea8318bff0f379c0908c376216767baa8ead434bc9c050cb4a738194ec8d1016b5e7cac76
-
Filesize
91KB
MD5a96229e6718de2044eff8f12c189dee2
SHA1c961c816aa6310b5f434a6f389c0a4d972ccd019
SHA2569f920dec332518a9ba63a1eea97806d6bd1f036f1bb8993de361e9e0af3c6771
SHA512e16df68433e1846f323851e20e3639be635a342d4981ae2d6801079f69a7023f05cc313b35b11d54ae7c34c28e45e8f69c098f935041ad1849e6058a78839d46
-
Filesize
91KB
MD53e9b07b1ae02d66eb1f66c93b9387d19
SHA19d24488c43eac033376106c9f66f7fdf704f807a
SHA2564b903db8ab6e8b7969d5d9ff408d0d6c8341b4e02336b97d3585dda8b45edf85
SHA5126e921de4cedd19cc9e56b3d2977e8c2b564e04961ae692464b3e0f027e7a130b4326f5694e0aa38625f32af11e1b59b5f34d6eb3aa4455b540390066ec5a4306
-
Filesize
91KB
MD5d2d09aa55f7b2942b3c447e138cf7204
SHA1666aa91db298866d2c3f30223bff239913be4e95
SHA2562f2dbc9e6f3090abca4f9b6dfb8d456a941ca39992edff89aed862333aaba4c1
SHA51205dbb3dca8b2aeba847be0bb5ba394e1bdc8a97b4e26cbac17d9666e8a8bc0aa9e79ce1818661a82ddb780e9f5a314175199387c0079ab9ce88b020fa7e4bb02