Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe
Resource
win10v2004-20241007-en
General
-
Target
e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe
-
Size
91KB
-
MD5
7c6930485cc997a45c0386f06506d6b8
-
SHA1
6a48ff03e3b5ab46e52f7bc81eb5535f9f66fd9f
-
SHA256
e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496
-
SHA512
f8245cc3c8ce0239c193cc4b0174820b00ed22f5af2d4af74e778f9a351387beb3f9cd72f7af666e6657231bffae07ce0702eb5d52e83d53ad6098885d1cf49e
-
SSDEEP
768:5vw9816uhKiroL4/wQNNrfrunMxVFA3b7t:lEGkmoLlCunMxVS3Ht
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{28B7879C-A450-4b44-B4CD-95AF49BD6B3A}\stubpath = "C:\\Windows\\{28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe" {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9} {338EB736-6085-4e5d-9136-B04540F8EE19}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}\stubpath = "C:\\Windows\\{8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe" {338EB736-6085-4e5d-9136-B04540F8EE19}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}\stubpath = "C:\\Windows\\{8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe" {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C070FF10-85B8-4767-A416-33FA0A8D42BC}\stubpath = "C:\\Windows\\{C070FF10-85B8-4767-A416-33FA0A8D42BC}.exe" {26829659-3731-4800-A550-71408EEA6688}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F76C666-870B-4c0f-B09F-0AC1BAF6CA48} e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}\stubpath = "C:\\Windows\\{6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe" e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0450FF96-70C5-4eee-8B8A-54057C0217C3}\stubpath = "C:\\Windows\\{0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe" {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8C3A8FF-A4A5-4320-B400-4A08E962DC9C} {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}\stubpath = "C:\\Windows\\{A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe" {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{63006FB1-24E3-4393-BE64-588F3C1760D7}\stubpath = "C:\\Windows\\{63006FB1-24E3-4393-BE64-588F3C1760D7}.exe" {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{338EB736-6085-4e5d-9136-B04540F8EE19}\stubpath = "C:\\Windows\\{338EB736-6085-4e5d-9136-B04540F8EE19}.exe" {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{26829659-3731-4800-A550-71408EEA6688}\stubpath = "C:\\Windows\\{26829659-3731-4800-A550-71408EEA6688}.exe" {8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0450FF96-70C5-4eee-8B8A-54057C0217C3} {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{28B7879C-A450-4b44-B4CD-95AF49BD6B3A} {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2956D4C0-29E0-42e8-87A8-3E22E2FD82FA} {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}\stubpath = "C:\\Windows\\{2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe" {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{670F9D85-6D15-453e-B7FD-93BFB96FC7B9}\stubpath = "C:\\Windows\\{670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe" {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C070FF10-85B8-4767-A416-33FA0A8D42BC} {26829659-3731-4800-A550-71408EEA6688}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{670F9D85-6D15-453e-B7FD-93BFB96FC7B9} {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{63006FB1-24E3-4393-BE64-588F3C1760D7} {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{338EB736-6085-4e5d-9136-B04540F8EE19} {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E} {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{26829659-3731-4800-A550-71408EEA6688} {8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe -
Executes dropped EXE 12 IoCs
pid Process 3944 {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe 1164 {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe 1428 {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe 1436 {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe 4828 {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe 4036 {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe 3920 {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe 4432 {338EB736-6085-4e5d-9136-B04540F8EE19}.exe 4156 {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe 4820 {8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe 3564 {26829659-3731-4800-A550-71408EEA6688}.exe 2232 {C070FF10-85B8-4767-A416-33FA0A8D42BC}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe File created C:\Windows\{0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe File created C:\Windows\{28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe File created C:\Windows\{2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe File created C:\Windows\{63006FB1-24E3-4393-BE64-588F3C1760D7}.exe {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe File created C:\Windows\{8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe File created C:\Windows\{26829659-3731-4800-A550-71408EEA6688}.exe {8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe File created C:\Windows\{670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe File created C:\Windows\{A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe File created C:\Windows\{338EB736-6085-4e5d-9136-B04540F8EE19}.exe {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe File created C:\Windows\{8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe {338EB736-6085-4e5d-9136-B04540F8EE19}.exe File created C:\Windows\{C070FF10-85B8-4767-A416-33FA0A8D42BC}.exe {26829659-3731-4800-A550-71408EEA6688}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {26829659-3731-4800-A550-71408EEA6688}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {338EB736-6085-4e5d-9136-B04540F8EE19}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C070FF10-85B8-4767-A416-33FA0A8D42BC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4204 e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe Token: SeIncBasePriorityPrivilege 3944 {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe Token: SeIncBasePriorityPrivilege 1164 {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe Token: SeIncBasePriorityPrivilege 1428 {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe Token: SeIncBasePriorityPrivilege 1436 {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe Token: SeIncBasePriorityPrivilege 4828 {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe Token: SeIncBasePriorityPrivilege 4036 {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe Token: SeIncBasePriorityPrivilege 3920 {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe Token: SeIncBasePriorityPrivilege 4432 {338EB736-6085-4e5d-9136-B04540F8EE19}.exe Token: SeIncBasePriorityPrivilege 4156 {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe Token: SeIncBasePriorityPrivilege 4820 {8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe Token: SeIncBasePriorityPrivilege 3564 {26829659-3731-4800-A550-71408EEA6688}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4204 wrote to memory of 3944 4204 e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe 93 PID 4204 wrote to memory of 3944 4204 e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe 93 PID 4204 wrote to memory of 3944 4204 e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe 93 PID 4204 wrote to memory of 1448 4204 e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe 94 PID 4204 wrote to memory of 1448 4204 e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe 94 PID 4204 wrote to memory of 1448 4204 e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe 94 PID 3944 wrote to memory of 1164 3944 {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe 95 PID 3944 wrote to memory of 1164 3944 {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe 95 PID 3944 wrote to memory of 1164 3944 {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe 95 PID 3944 wrote to memory of 5116 3944 {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe 96 PID 3944 wrote to memory of 5116 3944 {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe 96 PID 3944 wrote to memory of 5116 3944 {6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe 96 PID 1164 wrote to memory of 1428 1164 {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe 99 PID 1164 wrote to memory of 1428 1164 {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe 99 PID 1164 wrote to memory of 1428 1164 {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe 99 PID 1164 wrote to memory of 1584 1164 {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe 100 PID 1164 wrote to memory of 1584 1164 {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe 100 PID 1164 wrote to memory of 1584 1164 {0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe 100 PID 1428 wrote to memory of 1436 1428 {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe 101 PID 1428 wrote to memory of 1436 1428 {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe 101 PID 1428 wrote to memory of 1436 1428 {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe 101 PID 1428 wrote to memory of 540 1428 {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe 102 PID 1428 wrote to memory of 540 1428 {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe 102 PID 1428 wrote to memory of 540 1428 {28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe 102 PID 1436 wrote to memory of 4828 1436 {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe 103 PID 1436 wrote to memory of 4828 1436 {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe 103 PID 1436 wrote to memory of 4828 1436 {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe 103 PID 1436 wrote to memory of 2960 1436 {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe 104 PID 1436 wrote to memory of 2960 1436 {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe 104 PID 1436 wrote to memory of 2960 1436 {2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe 104 PID 4828 wrote to memory of 4036 4828 {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe 105 PID 4828 wrote to memory of 4036 4828 {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe 105 PID 4828 wrote to memory of 4036 4828 {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe 105 PID 4828 wrote to memory of 2856 4828 {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe 106 PID 4828 wrote to memory of 2856 4828 {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe 106 PID 4828 wrote to memory of 2856 4828 {670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe 106 PID 4036 wrote to memory of 3920 4036 {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe 107 PID 4036 wrote to memory of 3920 4036 {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe 107 PID 4036 wrote to memory of 3920 4036 {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe 107 PID 4036 wrote to memory of 4400 4036 {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe 108 PID 4036 wrote to memory of 4400 4036 {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe 108 PID 4036 wrote to memory of 4400 4036 {63006FB1-24E3-4393-BE64-588F3C1760D7}.exe 108 PID 3920 wrote to memory of 4432 3920 {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe 109 PID 3920 wrote to memory of 4432 3920 {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe 109 PID 3920 wrote to memory of 4432 3920 {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe 109 PID 3920 wrote to memory of 4524 3920 {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe 110 PID 3920 wrote to memory of 4524 3920 {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe 110 PID 3920 wrote to memory of 4524 3920 {A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe 110 PID 4432 wrote to memory of 4156 4432 {338EB736-6085-4e5d-9136-B04540F8EE19}.exe 111 PID 4432 wrote to memory of 4156 4432 {338EB736-6085-4e5d-9136-B04540F8EE19}.exe 111 PID 4432 wrote to memory of 4156 4432 {338EB736-6085-4e5d-9136-B04540F8EE19}.exe 111 PID 4432 wrote to memory of 2944 4432 {338EB736-6085-4e5d-9136-B04540F8EE19}.exe 112 PID 4432 wrote to memory of 2944 4432 {338EB736-6085-4e5d-9136-B04540F8EE19}.exe 112 PID 4432 wrote to memory of 2944 4432 {338EB736-6085-4e5d-9136-B04540F8EE19}.exe 112 PID 4156 wrote to memory of 4820 4156 {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe 113 PID 4156 wrote to memory of 4820 4156 {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe 113 PID 4156 wrote to memory of 4820 4156 {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe 113 PID 4156 wrote to memory of 3528 4156 {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe 114 PID 4156 wrote to memory of 3528 4156 {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe 114 PID 4156 wrote to memory of 3528 4156 {8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe 114 PID 4820 wrote to memory of 3564 4820 {8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe 115 PID 4820 wrote to memory of 3564 4820 {8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe 115 PID 4820 wrote to memory of 3564 4820 {8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe 115 PID 4820 wrote to memory of 3228 4820 {8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe"C:\Users\Admin\AppData\Local\Temp\e9f53677e9ccc5dbf25957b64a6655f96454eb6c72f20d680e4e07857d48a496.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\{6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exeC:\Windows\{6F76C666-870B-4c0f-B09F-0AC1BAF6CA48}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\{0450FF96-70C5-4eee-8B8A-54057C0217C3}.exeC:\Windows\{0450FF96-70C5-4eee-8B8A-54057C0217C3}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\{28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exeC:\Windows\{28B7879C-A450-4b44-B4CD-95AF49BD6B3A}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\{2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exeC:\Windows\{2956D4C0-29E0-42e8-87A8-3E22E2FD82FA}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\{670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exeC:\Windows\{670F9D85-6D15-453e-B7FD-93BFB96FC7B9}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\{63006FB1-24E3-4393-BE64-588F3C1760D7}.exeC:\Windows\{63006FB1-24E3-4393-BE64-588F3C1760D7}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\{A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exeC:\Windows\{A8C3A8FF-A4A5-4320-B400-4A08E962DC9C}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\{338EB736-6085-4e5d-9136-B04540F8EE19}.exeC:\Windows\{338EB736-6085-4e5d-9136-B04540F8EE19}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\{8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exeC:\Windows\{8FB3EE6F-0CC1-46e7-BF51-2BD29ECEB2C9}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\{8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exeC:\Windows\{8B17D2DF-43FB-4ae3-80AC-FFDE428FAC5E}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\{26829659-3731-4800-A550-71408EEA6688}.exeC:\Windows\{26829659-3731-4800-A550-71408EEA6688}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3564 -
C:\Windows\{C070FF10-85B8-4767-A416-33FA0A8D42BC}.exeC:\Windows\{C070FF10-85B8-4767-A416-33FA0A8D42BC}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26829~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:3288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B17D~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:3228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8FB3E~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{338EB~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8C3A~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{63006~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{670F9~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2956D~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{28B78~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0450F~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6F76C~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:5116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\E9F536~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5e7b6f17e980f78ecf7d1127a959ef536
SHA19d2570ee069bd40804c7b30dc563e3afb2873f70
SHA256bac96fc116aa6a416be979f92a75c0da8a7e627a16967284dc94df66b5974feb
SHA512311b806927c0caaaa0a17f169617bbd3ea0dbd950dfd05648a726ceccda6ad3ffde97c6643e1be92964a0a5c78eba35cfda374a419e1286a068138aa5a0de9b7
-
Filesize
91KB
MD5608c1281a8dba367042cb2517531bf5f
SHA10c7a66963d4e02cd455cfe8ff73bee42ca05f49d
SHA2567f6a1fac1f596b3269d37688e3ca5b9ea2b8863fc3cd7eddde41e38eb519e08c
SHA512e40d2076793302ad47f56497ad1f6f3b0bd8c1f6d27901f50a092bb6bcee7eb0a46eb99a2b488243319e2b00b3bce3f40870d0dfefce1266c4ffc1582cf85148
-
Filesize
91KB
MD5677a826f509d5af5d2828ea89182e733
SHA1b1dbde39cc04713bda9198e5c90366bcb3ce34c8
SHA2568b85e1451ebe8253ea2e6e35d7f28c6e2096c55e0cbb23ec0744fd2080fb438b
SHA5129a50b320f0ef7001b4d9e9c7d1a1d1cab74efb5883abdb67231cf9c4722eea6203342da850aca066215070a326ceed83b6ae447b990f3fecd03f86b777338f8a
-
Filesize
91KB
MD578d1941469cb9f65e061491be72b62f5
SHA19b34cc0a1b0443107f9468e4aa1edda1a4e43d00
SHA2560e55744df28570b50d16858bee44f443749ee8efe386cf28a0fbb3ad56100041
SHA5129264b754132930d7d04c0fec770897bc41b54fde0096d1324350dbde983007fbffc87b3f49e73fc025089804241e777466f9099cc321f03fb7df848ebe0faa11
-
Filesize
91KB
MD5db506cc93b533099d6c7bac0397df84d
SHA16f53ec330a9d868580f3a1e10de41fa250a46237
SHA256dbefedf6d49e5f56d30824e181f964b4ccb9f560d2a3fcabcdc2f29bc753c947
SHA5126eaf89cab4b722033859e69f6acddc2c73a9eda7bac73749fab216c1a438dd8f1de6186d8d87907a7abc61d6f2e3d93d42d438000cb4e828a379e76ae6e711f6
-
Filesize
91KB
MD51f6ceaa6c25e8cc018bc2d6a4c638caf
SHA1537ab040eb6169fc1b11e23a825d523375655ecd
SHA256057a48a35a0ec9f1938159a79bfbc433281cb5a450eba6c76eedf5ee7533d9ab
SHA5124fbdf95507a18f5c2144699b5d9fb674c66cfcd1de846523cc640b8b5096cc430a1b6b3b6fc780cd93823bebb6e1c2cd2d361157fe548d46a9e9783a2e1c8cda
-
Filesize
91KB
MD525eb70ea074d5a5d62345ed8d47c8833
SHA15c1f327a6089bcaa0e9f5d763be069982f1c9c08
SHA256ff23687d5ddc41fee968f99b78cb156e73efd617831efb17c97efb41f3e53073
SHA5125acb51d09f9aebabd73492fa7d5ef2b2bd914bc97ee87935a8df2a12a870614ca9cd896c95594611cc25a106593a228ed34f91183b53c38d4bd5c28829938eaf
-
Filesize
91KB
MD56d003dfed43a89616fc2ab8f3b7bc6ce
SHA11d2cafb0f607d34d89258ed9c4e38d7f00bdbcd4
SHA2568db88aab5c69b1026b38abe5528ffdb0a2292075275f4bc3dd3bb87fd510682a
SHA5129c2b52489f86097ceb1171f7c63c52d97e95155ea6442283e752b47d07962e0f44fd16865a65864e8239a0bba3bd76db0d7fdc99f29562cdf9cd3c8c507834cc
-
Filesize
91KB
MD55f7cdd9561fd96cc3da6a97e2b55935d
SHA14b18b28a338bc2398947315bed5593760db35fb5
SHA2561d85b603b53b26036c0a36f0755e66568f357b40fee3e9c36eef382993f5e1c1
SHA5120802491202e4e1ebe233f8d79c18ef5330e189ddee2d4f09eeb8b566ced3d42c658e35e7081ec180cbaad3cf70384fba94373bfddde1c021fe238ee799cb269f
-
Filesize
91KB
MD56af73862a18e7658ef509905ed5b1cf9
SHA1f9014fdeb70f490870fce22c9d156afcc7dec266
SHA256807bee29bf1e814da54d9082b7e2ab0f5a548c874bade9e6cfe20e3f09e49660
SHA512b3467cba6993206328ff2b41a37de842c68b9479d4c9b742aad8a83fc26626fb4570216c7403b4f3d44a71efff81465cd265616ca08d360d2daf121e3eca901b
-
Filesize
91KB
MD5a66a78503bbd99ce7da2c89bf5e37b81
SHA1e76fc18a621d58f46df9b767a3f0606a28f144c7
SHA256b1b2223e2b86ccdcf2d883c897303b9cb3b029cfd07d4422be577d8136ac698f
SHA512c0fc9e7a2e741c63a75f8f00b03d7ecb943671dc687659e91252c484e3adc7169ec3d48fea2a3f4d74674f34d21da6a61a4db4366dab4af6323b55c9b4881be5
-
Filesize
91KB
MD5ca767ba54dbca0e152d8c01540ff39e3
SHA1b17dff56e2cf9de6938d6d1bf2d7719d4e09a63d
SHA25607cbb50c8eadc6375936eb076845e23efefcd409efbb6222581bcd84d8aca178
SHA512abed43c23216d5c3b43a5146b40e523a4e7a154969f2c5d946024c2e5bc02a5c314cb80f36488fafbee6af6b19fc2f73ff512230f8e8c8e477e3564ec96ee3cc