Analysis
-
max time kernel
118s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe
Resource
win10v2004-20241007-en
General
-
Target
2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe
-
Size
87KB
-
MD5
0a8623d8641e2736a98eb0103891e46b
-
SHA1
2dd6b590078f60c94c4d121c42f84acc775063d8
-
SHA256
2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160
-
SHA512
b35a9f825be4103f6ec2593dd1536d82931003a7fb8b540202e408890f3a748c2b844aa6780de9f05e6d5ab37f7815baaa0023b772d628a7438b0f15eed3f9d5
-
SSDEEP
384:5bLwOs8AHsc4sM6whKiroQ4/CFsrdk5I1Nb7g7FX7XYfruVDtM9tQ/FKlnVwUUOa:5vw9816uhKiroQ4/wQNNrfrunMxVFm
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDC47BA6-901D-4e78-AF3D-86D9B3A60742}\stubpath = "C:\\Windows\\{EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe" {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D267684-83CB-422a-B73D-26F78B549E57}\stubpath = "C:\\Windows\\{1D267684-83CB-422a-B73D-26F78B549E57}.exe" {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FB00C808-9AFE-493f-9100-57C75FEC2A0B} {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9EA274DC-0015-4f55-8007-679660CEBAE0}\stubpath = "C:\\Windows\\{9EA274DC-0015-4f55-8007-679660CEBAE0}.exe" {98555321-18A0-42a5-8409-C93DFF99B774}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{98555321-18A0-42a5-8409-C93DFF99B774} {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{98555321-18A0-42a5-8409-C93DFF99B774}\stubpath = "C:\\Windows\\{98555321-18A0-42a5-8409-C93DFF99B774}.exe" {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}\stubpath = "C:\\Windows\\{F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe" {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D267684-83CB-422a-B73D-26F78B549E57} {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{300243A7-4D9A-4cf1-B5DE-BF69618E0DE6} {1D267684-83CB-422a-B73D-26F78B549E57}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FDD5091A-8D8B-4b6e-8840-2D0466B67388} {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FB00C808-9AFE-493f-9100-57C75FEC2A0B}\stubpath = "C:\\Windows\\{FB00C808-9AFE-493f-9100-57C75FEC2A0B}.exe" {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC8CC891-56E6-4380-ADD1-18269B7C03C3}\stubpath = "C:\\Windows\\{EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe" 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9EA274DC-0015-4f55-8007-679660CEBAE0} {98555321-18A0-42a5-8409-C93DFF99B774}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5} {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}\stubpath = "C:\\Windows\\{300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe" {1D267684-83CB-422a-B73D-26F78B549E57}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FDD5091A-8D8B-4b6e-8840-2D0466B67388}\stubpath = "C:\\Windows\\{FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe" {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDC47BA6-901D-4e78-AF3D-86D9B3A60742} {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC8CC891-56E6-4380-ADD1-18269B7C03C3} 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe -
Executes dropped EXE 9 IoCs
pid Process 1340 {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe 4172 {98555321-18A0-42a5-8409-C93DFF99B774}.exe 2584 {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe 1524 {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe 3820 {1D267684-83CB-422a-B73D-26F78B549E57}.exe 4508 {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe 3680 {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe 3296 {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe 2800 {FB00C808-9AFE-493f-9100-57C75FEC2A0B}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{FB00C808-9AFE-493f-9100-57C75FEC2A0B}.exe {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe File created C:\Windows\{EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe File created C:\Windows\{FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe File created C:\Windows\{EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe File created C:\Windows\{1D267684-83CB-422a-B73D-26F78B549E57}.exe {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe File created C:\Windows\{300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe {1D267684-83CB-422a-B73D-26F78B549E57}.exe File created C:\Windows\{98555321-18A0-42a5-8409-C93DFF99B774}.exe {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe File created C:\Windows\{9EA274DC-0015-4f55-8007-679660CEBAE0}.exe {98555321-18A0-42a5-8409-C93DFF99B774}.exe File created C:\Windows\{F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FB00C808-9AFE-493f-9100-57C75FEC2A0B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1D267684-83CB-422a-B73D-26F78B549E57}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {98555321-18A0-42a5-8409-C93DFF99B774}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3224 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe Token: SeIncBasePriorityPrivilege 1340 {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe Token: SeIncBasePriorityPrivilege 4172 {98555321-18A0-42a5-8409-C93DFF99B774}.exe Token: SeIncBasePriorityPrivilege 2584 {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe Token: SeIncBasePriorityPrivilege 1524 {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe Token: SeIncBasePriorityPrivilege 3820 {1D267684-83CB-422a-B73D-26F78B549E57}.exe Token: SeIncBasePriorityPrivilege 4508 {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe Token: SeIncBasePriorityPrivilege 3680 {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe Token: SeIncBasePriorityPrivilege 3296 {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1340 3224 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe 99 PID 3224 wrote to memory of 1340 3224 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe 99 PID 3224 wrote to memory of 1340 3224 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe 99 PID 3224 wrote to memory of 4788 3224 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe 100 PID 3224 wrote to memory of 4788 3224 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe 100 PID 3224 wrote to memory of 4788 3224 2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe 100 PID 1340 wrote to memory of 4172 1340 {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe 101 PID 1340 wrote to memory of 4172 1340 {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe 101 PID 1340 wrote to memory of 4172 1340 {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe 101 PID 1340 wrote to memory of 4072 1340 {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe 102 PID 1340 wrote to memory of 4072 1340 {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe 102 PID 1340 wrote to memory of 4072 1340 {EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe 102 PID 4172 wrote to memory of 2584 4172 {98555321-18A0-42a5-8409-C93DFF99B774}.exe 106 PID 4172 wrote to memory of 2584 4172 {98555321-18A0-42a5-8409-C93DFF99B774}.exe 106 PID 4172 wrote to memory of 2584 4172 {98555321-18A0-42a5-8409-C93DFF99B774}.exe 106 PID 4172 wrote to memory of 4060 4172 {98555321-18A0-42a5-8409-C93DFF99B774}.exe 107 PID 4172 wrote to memory of 4060 4172 {98555321-18A0-42a5-8409-C93DFF99B774}.exe 107 PID 4172 wrote to memory of 4060 4172 {98555321-18A0-42a5-8409-C93DFF99B774}.exe 107 PID 2584 wrote to memory of 1524 2584 {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe 108 PID 2584 wrote to memory of 1524 2584 {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe 108 PID 2584 wrote to memory of 1524 2584 {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe 108 PID 2584 wrote to memory of 432 2584 {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe 109 PID 2584 wrote to memory of 432 2584 {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe 109 PID 2584 wrote to memory of 432 2584 {9EA274DC-0015-4f55-8007-679660CEBAE0}.exe 109 PID 1524 wrote to memory of 3820 1524 {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe 110 PID 1524 wrote to memory of 3820 1524 {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe 110 PID 1524 wrote to memory of 3820 1524 {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe 110 PID 1524 wrote to memory of 4856 1524 {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe 111 PID 1524 wrote to memory of 4856 1524 {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe 111 PID 1524 wrote to memory of 4856 1524 {F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe 111 PID 3820 wrote to memory of 4508 3820 {1D267684-83CB-422a-B73D-26F78B549E57}.exe 112 PID 3820 wrote to memory of 4508 3820 {1D267684-83CB-422a-B73D-26F78B549E57}.exe 112 PID 3820 wrote to memory of 4508 3820 {1D267684-83CB-422a-B73D-26F78B549E57}.exe 112 PID 3820 wrote to memory of 4400 3820 {1D267684-83CB-422a-B73D-26F78B549E57}.exe 113 PID 3820 wrote to memory of 4400 3820 {1D267684-83CB-422a-B73D-26F78B549E57}.exe 113 PID 3820 wrote to memory of 4400 3820 {1D267684-83CB-422a-B73D-26F78B549E57}.exe 113 PID 4508 wrote to memory of 3680 4508 {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe 114 PID 4508 wrote to memory of 3680 4508 {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe 114 PID 4508 wrote to memory of 3680 4508 {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe 114 PID 4508 wrote to memory of 3688 4508 {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe 115 PID 4508 wrote to memory of 3688 4508 {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe 115 PID 4508 wrote to memory of 3688 4508 {300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe 115 PID 3680 wrote to memory of 3296 3680 {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe 116 PID 3680 wrote to memory of 3296 3680 {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe 116 PID 3680 wrote to memory of 3296 3680 {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe 116 PID 3680 wrote to memory of 3008 3680 {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe 117 PID 3680 wrote to memory of 3008 3680 {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe 117 PID 3680 wrote to memory of 3008 3680 {FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe 117 PID 3296 wrote to memory of 2800 3296 {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe 118 PID 3296 wrote to memory of 2800 3296 {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe 118 PID 3296 wrote to memory of 2800 3296 {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe 118 PID 3296 wrote to memory of 756 3296 {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe 119 PID 3296 wrote to memory of 756 3296 {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe 119 PID 3296 wrote to memory of 756 3296 {EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe"C:\Users\Admin\AppData\Local\Temp\2b663218f749b84a0a558518cbde1f7b38ca39f250bf4141b2f5f02b85e4d160.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\{EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exeC:\Windows\{EC8CC891-56E6-4380-ADD1-18269B7C03C3}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\{98555321-18A0-42a5-8409-C93DFF99B774}.exeC:\Windows\{98555321-18A0-42a5-8409-C93DFF99B774}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\{9EA274DC-0015-4f55-8007-679660CEBAE0}.exeC:\Windows\{9EA274DC-0015-4f55-8007-679660CEBAE0}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\{F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exeC:\Windows\{F2183D6F-9764-4000-9FE1-FF5FEA4ECDC5}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\{1D267684-83CB-422a-B73D-26F78B549E57}.exeC:\Windows\{1D267684-83CB-422a-B73D-26F78B549E57}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\{300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exeC:\Windows\{300243A7-4D9A-4cf1-B5DE-BF69618E0DE6}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\{FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exeC:\Windows\{FDD5091A-8D8B-4b6e-8840-2D0466B67388}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\{EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exeC:\Windows\{EDC47BA6-901D-4e78-AF3D-86D9B3A60742}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\{FB00C808-9AFE-493f-9100-57C75FEC2A0B}.exeC:\Windows\{FB00C808-9AFE-493f-9100-57C75FEC2A0B}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EDC47~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FDD50~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{30024~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1D267~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F2183~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9EA27~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98555~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EC8CC~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:4072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2B6632~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD535cd437e44bec6b199821ff3171c9c4c
SHA18ccd8d23e63c0edf7f60ee25068f1f1b59722481
SHA25671fdab5d6ac6725acfee80219b909222c463c9c134c5675e27dd6c628d9ee915
SHA512a627e903c6d3b14b8869c65a33e5d65300d06274ae854b483c4293a947b95e3f07acf550b12ba31c9c31b72748991d56bdedc8be968fcfecc10282c020c10257
-
Filesize
87KB
MD50e7a72f0c10436bbcd338e5fdfd58c4b
SHA134d06fa7a5f19b26ca9e8abb03261d93c1efa008
SHA2561ae197487209b5433ea38c7818e7db8ecee713f5d5527678d0643ce28d43bb0b
SHA512e88d9f1d6a6149089f1f1c5f7b6ab21cd71e4a5c195f8ab066c16853c6e5264ff844423053e39d21232aeb8428d4cddb0a6919371213bf323248ed82db3ccadd
-
Filesize
87KB
MD56811967da6a992f58280bf8a69ede622
SHA15205d98e39f6f6b41ff9ee5b39838bbf4c0e6a67
SHA2569fc0c9790c4c8a13a57bd735a80764970626480d14ab3f7e691951d0dc2a3cde
SHA51274745342097d43c0b0f3d305058c4fb0b4428073568fea737889572c4813808919568bdd34f36ac3f5ddb4827790ff93c9ea50ef115f1d518ccc24d134a192f3
-
Filesize
87KB
MD553e7a5344a6d4fa7523663fcc2e493d2
SHA1e93bfdb63ce0fff38896bd4581a24205dde0196f
SHA2565f6f13d2cd2d099ddcd27b602ecba234d42aae3166d5676365b9103f374d1704
SHA512b060bdbe7b9957be9a784dffa75193dbce4d57431a9e78c984ca10883eee2006bc13ecd942a50202916e587def7a620be86a817696bf64ae7658dae2c8e169d1
-
Filesize
87KB
MD5a5aca9a76546f27a40c074dd19fd5404
SHA1081c0a52a25c62807b777893d5ead47aaa27f075
SHA256b7d39c6c7f91750983899dcdc50299a4c3d5e5899f4f83059c63005f4e44f706
SHA51288d2fe31f66d97ab5ab2279a067e9a1cc45a0a6fa16e0fa2e75d5ef85b5b781bb07a2665cd8d38ccd20644cdd7dc8e7330d933de6123171a0ed9e92197642ffd
-
Filesize
87KB
MD5e034a6ec86370912513d7678eeba8aee
SHA1d87cf25d0b3a1115ac500ef50b1b883da8d45ac9
SHA256e7c2d31075693505f07e0b189626c82853037ab665d731d6c54b8337ddf83182
SHA5124a280ab2aa92709e48732277e16568aeb08537287179bff48b7040673b81c403b711b17c4949a3652a96bdfe02bd6c54b0b249d5efb0244fcc69763165cbcf3c
-
Filesize
87KB
MD5b31f13574886d150f00f09716441e0e5
SHA11c0bb23056a6ade2e1f07f5b358bc7c9c2a44ac3
SHA256a56338c8def2c0ab3bbb56d1ef955799944d61f2c08ae34e5b70176026cbf4cc
SHA512e030052333afedac3bfec4ca764890ae623fa22c908c4577ed3d46a670e45d520cb68144e9aabfde585634686b0175ce4b2ca1d59a63fc7f523cf5a9573e81c2
-
Filesize
87KB
MD5b0e4e1d2d7332bc0743796191e85354c
SHA10f87740a3b9a67bf0b8d6c8a8ea74116bad4879b
SHA25686a7f11a88d57579062563758db614c3d5cd82d8e02105323b8b1b2cb10a4fd3
SHA5120ab5f7aa19e8a5a33f028103130802eb4135a6265967bf17ddcc4814ed32d08d42ff8575696bdffa4726203841c2ef211cfdd19ccd7cdf8cd067c047bc59e9da
-
Filesize
87KB
MD580ca34d8b034fa542188921821452ca3
SHA1850982e585e3e3c2710315111a04e72afe18b8e7
SHA256c5baa8b3e89751aa33ca3f9f0507c6364a8b3236656c07e5a099a859a5b55e38
SHA512fd67e8fe39a8113d5629e8ba63e069a2028ab652a014020b353b1934f83a46eab4826e81c4dca61c109d065d864e9b471bccca93cc26524af8938aecf0587fc2