Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe
Resource
win10v2004-20241007-en
General
-
Target
d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe
-
Size
64KB
-
MD5
73a0bad04b0af52e433ef384de21ddd7
-
SHA1
3e96465da02d594a0851ad47f04013eb4956f49f
-
SHA256
d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc
-
SHA512
5b37b9251a537fb1876217117a2fe995db7beaa9bee4c648758885cbcc830a5fc0e7aee96d794ed35aa6c9cf80f7b2d189aa0db651a878333e6f0dae9d7ee07e
-
SSDEEP
192:ObOzawOs81elJHsc45ecRZOgtShcWaOT2QLrCqwXY04/CFxyNhoy5t1:ObLwOs8AHsc4QMfwhKQLrop4/CFsrd1
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C543BD6-096F-4763-9875-B9E57998084D} {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D} {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F568169D-47A2-40ef-9011-5171101D5731}\stubpath = "C:\\Windows\\{F568169D-47A2-40ef-9011-5171101D5731}.exe" {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E8764C74-1B36-428f-9C4D-BC729C945918} {F568169D-47A2-40ef-9011-5171101D5731}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C79C6579-3E7B-4684-B14C-28EB99BAF008} {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C79C6579-3E7B-4684-B14C-28EB99BAF008}\stubpath = "C:\\Windows\\{C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe" {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{740D5CE7-5574-48a9-8413-8DC3DC872A0C}\stubpath = "C:\\Windows\\{740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe" {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F568169D-47A2-40ef-9011-5171101D5731} {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{66724789-DE3C-4b72-B8BE-C48BD1FE3F8A}\stubpath = "C:\\Windows\\{66724789-DE3C-4b72-B8BE-C48BD1FE3F8A}.exe" {AC340DE0-B4E5-494b-A360-371BF8958C1D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C543BD6-096F-4763-9875-B9E57998084D}\stubpath = "C:\\Windows\\{5C543BD6-096F-4763-9875-B9E57998084D}.exe" {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{740D5CE7-5574-48a9-8413-8DC3DC872A0C} {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C6AC1D3-273E-4dcd-8E05-3909A5C22727} {5C543BD6-096F-4763-9875-B9E57998084D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}\stubpath = "C:\\Windows\\{2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe" {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AC340DE0-B4E5-494b-A360-371BF8958C1D}\stubpath = "C:\\Windows\\{AC340DE0-B4E5-494b-A360-371BF8958C1D}.exe" {E8764C74-1B36-428f-9C4D-BC729C945918}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{64D6E383-ACDB-4aab-BBF1-2C3256DC40B2} d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}\stubpath = "C:\\Windows\\{64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe" d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C6AC1D3-273E-4dcd-8E05-3909A5C22727}\stubpath = "C:\\Windows\\{6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe" {5C543BD6-096F-4763-9875-B9E57998084D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E8764C74-1B36-428f-9C4D-BC729C945918}\stubpath = "C:\\Windows\\{E8764C74-1B36-428f-9C4D-BC729C945918}.exe" {F568169D-47A2-40ef-9011-5171101D5731}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AC340DE0-B4E5-494b-A360-371BF8958C1D} {E8764C74-1B36-428f-9C4D-BC729C945918}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{66724789-DE3C-4b72-B8BE-C48BD1FE3F8A} {AC340DE0-B4E5-494b-A360-371BF8958C1D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5} {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}\stubpath = "C:\\Windows\\{88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe" {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe -
Deletes itself 1 IoCs
pid Process 468 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2576 {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe 2756 {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe 2900 {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe 2824 {5C543BD6-096F-4763-9875-B9E57998084D}.exe 2120 {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe 1916 {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe 288 {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe 2196 {F568169D-47A2-40ef-9011-5171101D5731}.exe 2228 {E8764C74-1B36-428f-9C4D-BC729C945918}.exe 1260 {AC340DE0-B4E5-494b-A360-371BF8958C1D}.exe 1152 {66724789-DE3C-4b72-B8BE-C48BD1FE3F8A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe File created C:\Windows\{88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe File created C:\Windows\{2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe File created C:\Windows\{F568169D-47A2-40ef-9011-5171101D5731}.exe {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe File created C:\Windows\{AC340DE0-B4E5-494b-A360-371BF8958C1D}.exe {E8764C74-1B36-428f-9C4D-BC729C945918}.exe File created C:\Windows\{66724789-DE3C-4b72-B8BE-C48BD1FE3F8A}.exe {AC340DE0-B4E5-494b-A360-371BF8958C1D}.exe File created C:\Windows\{C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe File created C:\Windows\{5C543BD6-096F-4763-9875-B9E57998084D}.exe {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe File created C:\Windows\{6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe {5C543BD6-096F-4763-9875-B9E57998084D}.exe File created C:\Windows\{740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe File created C:\Windows\{E8764C74-1B36-428f-9C4D-BC729C945918}.exe {F568169D-47A2-40ef-9011-5171101D5731}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F568169D-47A2-40ef-9011-5171101D5731}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E8764C74-1B36-428f-9C4D-BC729C945918}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5C543BD6-096F-4763-9875-B9E57998084D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {66724789-DE3C-4b72-B8BE-C48BD1FE3F8A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AC340DE0-B4E5-494b-A360-371BF8958C1D}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2096 d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe Token: SeIncBasePriorityPrivilege 2576 {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe Token: SeIncBasePriorityPrivilege 2756 {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe Token: SeIncBasePriorityPrivilege 2900 {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe Token: SeIncBasePriorityPrivilege 2824 {5C543BD6-096F-4763-9875-B9E57998084D}.exe Token: SeIncBasePriorityPrivilege 2120 {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe Token: SeIncBasePriorityPrivilege 1916 {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe Token: SeIncBasePriorityPrivilege 288 {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe Token: SeIncBasePriorityPrivilege 2196 {F568169D-47A2-40ef-9011-5171101D5731}.exe Token: SeIncBasePriorityPrivilege 2228 {E8764C74-1B36-428f-9C4D-BC729C945918}.exe Token: SeIncBasePriorityPrivilege 1260 {AC340DE0-B4E5-494b-A360-371BF8958C1D}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2576 2096 d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe 31 PID 2096 wrote to memory of 2576 2096 d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe 31 PID 2096 wrote to memory of 2576 2096 d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe 31 PID 2096 wrote to memory of 2576 2096 d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe 31 PID 2096 wrote to memory of 468 2096 d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe 32 PID 2096 wrote to memory of 468 2096 d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe 32 PID 2096 wrote to memory of 468 2096 d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe 32 PID 2096 wrote to memory of 468 2096 d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe 32 PID 2576 wrote to memory of 2756 2576 {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe 33 PID 2576 wrote to memory of 2756 2576 {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe 33 PID 2576 wrote to memory of 2756 2576 {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe 33 PID 2576 wrote to memory of 2756 2576 {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe 33 PID 2576 wrote to memory of 2856 2576 {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe 34 PID 2576 wrote to memory of 2856 2576 {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe 34 PID 2576 wrote to memory of 2856 2576 {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe 34 PID 2576 wrote to memory of 2856 2576 {64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe 34 PID 2756 wrote to memory of 2900 2756 {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe 35 PID 2756 wrote to memory of 2900 2756 {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe 35 PID 2756 wrote to memory of 2900 2756 {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe 35 PID 2756 wrote to memory of 2900 2756 {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe 35 PID 2756 wrote to memory of 2928 2756 {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe 36 PID 2756 wrote to memory of 2928 2756 {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe 36 PID 2756 wrote to memory of 2928 2756 {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe 36 PID 2756 wrote to memory of 2928 2756 {88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe 36 PID 2900 wrote to memory of 2824 2900 {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe 37 PID 2900 wrote to memory of 2824 2900 {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe 37 PID 2900 wrote to memory of 2824 2900 {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe 37 PID 2900 wrote to memory of 2824 2900 {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe 37 PID 2900 wrote to memory of 2648 2900 {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe 38 PID 2900 wrote to memory of 2648 2900 {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe 38 PID 2900 wrote to memory of 2648 2900 {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe 38 PID 2900 wrote to memory of 2648 2900 {C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe 38 PID 2824 wrote to memory of 2120 2824 {5C543BD6-096F-4763-9875-B9E57998084D}.exe 39 PID 2824 wrote to memory of 2120 2824 {5C543BD6-096F-4763-9875-B9E57998084D}.exe 39 PID 2824 wrote to memory of 2120 2824 {5C543BD6-096F-4763-9875-B9E57998084D}.exe 39 PID 2824 wrote to memory of 2120 2824 {5C543BD6-096F-4763-9875-B9E57998084D}.exe 39 PID 2824 wrote to memory of 2280 2824 {5C543BD6-096F-4763-9875-B9E57998084D}.exe 40 PID 2824 wrote to memory of 2280 2824 {5C543BD6-096F-4763-9875-B9E57998084D}.exe 40 PID 2824 wrote to memory of 2280 2824 {5C543BD6-096F-4763-9875-B9E57998084D}.exe 40 PID 2824 wrote to memory of 2280 2824 {5C543BD6-096F-4763-9875-B9E57998084D}.exe 40 PID 2120 wrote to memory of 1916 2120 {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe 41 PID 2120 wrote to memory of 1916 2120 {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe 41 PID 2120 wrote to memory of 1916 2120 {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe 41 PID 2120 wrote to memory of 1916 2120 {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe 41 PID 2120 wrote to memory of 2548 2120 {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe 42 PID 2120 wrote to memory of 2548 2120 {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe 42 PID 2120 wrote to memory of 2548 2120 {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe 42 PID 2120 wrote to memory of 2548 2120 {6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe 42 PID 1916 wrote to memory of 288 1916 {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe 43 PID 1916 wrote to memory of 288 1916 {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe 43 PID 1916 wrote to memory of 288 1916 {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe 43 PID 1916 wrote to memory of 288 1916 {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe 43 PID 1916 wrote to memory of 1396 1916 {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe 44 PID 1916 wrote to memory of 1396 1916 {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe 44 PID 1916 wrote to memory of 1396 1916 {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe 44 PID 1916 wrote to memory of 1396 1916 {2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe 44 PID 288 wrote to memory of 2196 288 {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe 45 PID 288 wrote to memory of 2196 288 {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe 45 PID 288 wrote to memory of 2196 288 {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe 45 PID 288 wrote to memory of 2196 288 {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe 45 PID 288 wrote to memory of 2708 288 {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe 46 PID 288 wrote to memory of 2708 288 {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe 46 PID 288 wrote to memory of 2708 288 {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe 46 PID 288 wrote to memory of 2708 288 {740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe"C:\Users\Admin\AppData\Local\Temp\d8c5e4dd5d8dd55a68c8ff754e6f7a64468861e3db20d91f7885061d2840aadc.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\{64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exeC:\Windows\{64D6E383-ACDB-4aab-BBF1-2C3256DC40B2}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\{88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exeC:\Windows\{88A7B90F-A27B-4fb6-B7D3-49BCC914E0C5}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\{C79C6579-3E7B-4684-B14C-28EB99BAF008}.exeC:\Windows\{C79C6579-3E7B-4684-B14C-28EB99BAF008}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\{5C543BD6-096F-4763-9875-B9E57998084D}.exeC:\Windows\{5C543BD6-096F-4763-9875-B9E57998084D}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\{6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exeC:\Windows\{6C6AC1D3-273E-4dcd-8E05-3909A5C22727}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\{2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exeC:\Windows\{2D2D1E96-5BFD-490d-BDC4-10A54FC49C3D}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\{740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exeC:\Windows\{740D5CE7-5574-48a9-8413-8DC3DC872A0C}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\{F568169D-47A2-40ef-9011-5171101D5731}.exeC:\Windows\{F568169D-47A2-40ef-9011-5171101D5731}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Windows\{E8764C74-1B36-428f-9C4D-BC729C945918}.exeC:\Windows\{E8764C74-1B36-428f-9C4D-BC729C945918}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\{AC340DE0-B4E5-494b-A360-371BF8958C1D}.exeC:\Windows\{AC340DE0-B4E5-494b-A360-371BF8958C1D}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1260 -
C:\Windows\{66724789-DE3C-4b72-B8BE-C48BD1FE3F8A}.exeC:\Windows\{66724789-DE3C-4b72-B8BE-C48BD1FE3F8A}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AC340~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E8764~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F5681~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{740D5~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2D2D1~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C6AC~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C543~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C79C6~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{88A7B~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{64D6E~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\D8C5E4~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD52d160d5c5442c07d388494c450da7a1e
SHA18e8844b1fd40a171cda70e85aafe122d7c09e180
SHA256cbde35225e75c89aba43b6df9963f54e9adbfce4362a6bf23ea21e4309f072c0
SHA5125f2d162d69bcc3433fd84b1a89c1ef2438acfcb607d4d283d82ddfac2b42a660ee7a39395447011372d87afdd86a9df0ae4ae90262c329169564106652cb4d24
-
Filesize
64KB
MD5597a30dd0f903f0990c33fd62a6fe4b1
SHA137f430c082bff204adb9d6ee2f14d154b6387bb2
SHA25653ee8a542cbe405f03bc26965587c2e21e70ef4c9a259f7423f8f469d7ce94e3
SHA512180481a933b294ca75112ef5deab25e2c866df09139fc2145937545938827a5d3789bc1a7927f8a8a6934b3546f58d9205fb2725dbe62a7349aa189a3bcc00a0
-
Filesize
64KB
MD5a51c5d09c6b40a68708745aa52f04054
SHA194762c846bc58f8ba5b0a1caeee9a7c41367d761
SHA25673e386a2fa466f65b2a7ef56710e8709dc1402d6e594a2d5b21e6eea4b524d55
SHA512a7417926acba0cf679895fb0b258eb9ba3ffb4525b0796aa70d1fcde93f300a31bffe96a512b091e1fcbf4c803799f8a87e454c735b5b2cb215313aef2dfe81c
-
Filesize
64KB
MD58f406fccd5279a6f88bc9b0ab3c02b7b
SHA1334d2c9d5c018a8bf54c5f917cfc2ae1995570f2
SHA2566a2f1c248c6bbbe8c828af22fe725c172657e80b81e0fab923170eb8ba7644f7
SHA512f1f238cf57c1bcce8c89968a9bcdcb0c620b05d63fb09cb9acc9e7ef40c1df605598aa9e19a51ea5140d64b2ea28a43fc6866d2f005c26f76c129c12a60daba4
-
Filesize
64KB
MD500a822c7be866f6920b28f5ec5e64e64
SHA10da8c066102012b0fccbcb6b9ff48d6ee3f5deb4
SHA2567bfc23db48bd0cf08e1f9989d2baea0db3955ffda1fb31c7e6ba5d186472c854
SHA5121f64fa338aa0dd20e85d350008df5e0802ecdadf7d7505e063981ff96f9d20de51f00b0814f10e92a87fb9031427f1255ae32888267b6098bfa7ef3fc789b99b
-
Filesize
64KB
MD5e5de45365c568bcd7c7b8bd1530df97e
SHA149f94a63b006ac768bca81d01e39887e36524432
SHA2561002cc09af07f5d46238941a57bf74641aae4d5aaa2daef897ad0e9861f1a2eb
SHA51299daf881f57d26ec986a370fd6626635d469c202aefa6218a34a6cc0215d689d676493f2816a3a2bb28a3c86eb9fe32ada7e7f11e473e60a7d5850a4008b872e
-
Filesize
64KB
MD5d2da004041d477b4db8a3bcaebf1e161
SHA13bcf4b220ce520ee8d2d66b442b90ca0880306b0
SHA256feb46c50317e8f6547f337e900a512845776ead36020046d342ca5b848222842
SHA512512ae3fb9167ece820517d6355d83df59e73abcdaf0b5a576230d6ddfd0d7e58d9d072b2c5126af7e9fe07231f420cd9852bec485ac6ead92d1c1234339771e5
-
Filesize
64KB
MD5a6012b1aba23cc9c17007ee828cb0b62
SHA120578e916dce9f67fbeb65f1ba714514bb765ade
SHA256dd77fe8ac9afe8ffdb5185050b7ce2d888c711ead471aaf36e764dd1c60e7486
SHA512c5a2a22f3a678cea334e769f2d528f4afa175dfd0660daebff892ce15ce91854296e9fc32dc23d29d009401b00dc8f4a97d788965338c0436ca4e9ff281f802d
-
Filesize
64KB
MD5fe5b18207c78704b47f5f688379d53d0
SHA14f65dbffca58698e3dbe5e74d102e5f8c08e0c76
SHA2562d2a5866956d236f0127c07d243e308abc4c49114fa4faa43288c07872f5f74a
SHA5123e8993b988f438124c9e16769d28574552c490337f5c3349bf731675d807d3e3c245aaeffc1a2ea38a3b4f17925f9a2e1763ada6d6f2a4ae16b149bbdb047e58
-
Filesize
64KB
MD5b4b3afea33dd8f7e2bf86a2806d861eb
SHA1bfb5dbbf745561ba78409e645ea7b730a0357894
SHA256cd9fa2a88643a5c0586bd1ad9723b953e817f905c9271ca0c2f1ceb4c156ed75
SHA512e5e451756600a4f6ebe9bfefc82974adcf5178c58566b7e338907d04b7632c7bf7accaf5df404fbbc9585ef87ba406124e4ca08539ba5f14b51793b5948236b4
-
Filesize
64KB
MD5381ff1f0cad0847b066024b019aa8ba1
SHA17cfa1a73fbe73f35faea176bc5511d9f6b0264a1
SHA256d3e8e75752d78bd11e54527d666e20ab4a2dcec2585cfe72d35229c8d6a42436
SHA5124857f20d0f7745599d91e30f8dd1e4d2f08e1ac33cbf4621cff7ff141460ffcc42b37e9582aebcc7bff3eca0c899a7255116306dc76b749cc0d4f9ed7a5640d2