Analysis
-
max time kernel
149s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 03:59
Static task
static1
Behavioral task
behavioral1
Sample
e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe
Resource
win10v2004-20240508-en
General
-
Target
e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe
-
Size
90KB
-
MD5
9c566323ba542ce27f53b09d52705558
-
SHA1
19635f373584e11f8a0504808e60ca0922e89adc
-
SHA256
e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae
-
SHA512
c6cafbc4abe5f7a0d0a325baf536bf64b28847bdfacc46d8a404b316a577497ce62e64e90208fecc27ffd15fab3a21f1fdcb54d85853cb2bc4377601f056ebf4
-
SSDEEP
768:Qvw9816vhKQLroE4/wQRNrfrunMxVFA3b7gl/:YEGh0oEl2unMxVS3HgR
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe{EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exee730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe{0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}\stubpath = "C:\\Windows\\{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe" {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}\stubpath = "C:\\Windows\\{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe" {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0F303856-DA6F-4bd5-BBF7-006167FF74DF}\stubpath = "C:\\Windows\\{0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe" {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E25813A4-8D15-4f1f-B2B6-9C5894574D2B} e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D} {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}\stubpath = "C:\\Windows\\{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe" {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE7A8979-6AB1-4dbc-95ED-3C448A894B57} {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DDD5480-A354-4595-88FB-FA16F9FDDA0E} {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}\stubpath = "C:\\Windows\\{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe" {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}\stubpath = "C:\\Windows\\{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe" {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2ED85575-0C00-45ae-8480-7A267452C735} {0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2ED85575-0C00-45ae-8480-7A267452C735}\stubpath = "C:\\Windows\\{2ED85575-0C00-45ae-8480-7A267452C735}.exe" {0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C873BCDC-36D8-4f40-A4D7-4ACFC143F414} {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}\stubpath = "C:\\Windows\\{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe" {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF75E865-E21E-4ea2-B84A-E88D53E59DAF} {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8} {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60325E9B-CAD2-4307-92D5-C50B1F96EEE8} {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}\stubpath = "C:\\Windows\\{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe" {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}\stubpath = "C:\\Windows\\{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe" e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}\stubpath = "C:\\Windows\\{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe" {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7} {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EE96E27A-C828-4418-AEC0-511C0FACBAD8} {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EE96E27A-C828-4418-AEC0-511C0FACBAD8}\stubpath = "C:\\Windows\\{EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe" {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0F303856-DA6F-4bd5-BBF7-006167FF74DF} {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe -
Executes dropped EXE 12 IoCs
Processes:
{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe{EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe{0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe{2ED85575-0C00-45ae-8480-7A267452C735}.exepid process 1708 {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe 4172 {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe 4048 {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe 624 {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe 1240 {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe 4304 {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe 3860 {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe 4284 {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe 4624 {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe 1220 {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe 3588 {0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe 4212 {2ED85575-0C00-45ae-8480-7A267452C735}.exe -
Drops file in Windows directory 12 IoCs
Processes:
{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe{0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exee730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe{EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exedescription ioc process File created C:\Windows\{EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe File created C:\Windows\{2ED85575-0C00-45ae-8480-7A267452C735}.exe {0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe File created C:\Windows\{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe File created C:\Windows\{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe File created C:\Windows\{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe File created C:\Windows\{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe File created C:\Windows\{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe File created C:\Windows\{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe File created C:\Windows\{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe File created C:\Windows\{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe File created C:\Windows\{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe File created C:\Windows\{0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe{EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe{0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exedescription pid process Token: SeIncBasePriorityPrivilege 1628 e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe Token: SeIncBasePriorityPrivilege 1708 {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe Token: SeIncBasePriorityPrivilege 4172 {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe Token: SeIncBasePriorityPrivilege 4048 {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe Token: SeIncBasePriorityPrivilege 624 {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe Token: SeIncBasePriorityPrivilege 1240 {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe Token: SeIncBasePriorityPrivilege 4304 {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe Token: SeIncBasePriorityPrivilege 3860 {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe Token: SeIncBasePriorityPrivilege 4284 {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe Token: SeIncBasePriorityPrivilege 4624 {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe Token: SeIncBasePriorityPrivilege 1220 {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe Token: SeIncBasePriorityPrivilege 3588 {0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe{EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exedescription pid process target process PID 1628 wrote to memory of 1708 1628 e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe PID 1628 wrote to memory of 1708 1628 e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe PID 1628 wrote to memory of 1708 1628 e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe PID 1628 wrote to memory of 3240 1628 e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe cmd.exe PID 1628 wrote to memory of 3240 1628 e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe cmd.exe PID 1628 wrote to memory of 3240 1628 e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe cmd.exe PID 1708 wrote to memory of 4172 1708 {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe PID 1708 wrote to memory of 4172 1708 {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe PID 1708 wrote to memory of 4172 1708 {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe PID 1708 wrote to memory of 4112 1708 {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe cmd.exe PID 1708 wrote to memory of 4112 1708 {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe cmd.exe PID 1708 wrote to memory of 4112 1708 {E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe cmd.exe PID 4172 wrote to memory of 4048 4172 {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe PID 4172 wrote to memory of 4048 4172 {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe PID 4172 wrote to memory of 4048 4172 {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe PID 4172 wrote to memory of 3420 4172 {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe cmd.exe PID 4172 wrote to memory of 3420 4172 {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe cmd.exe PID 4172 wrote to memory of 3420 4172 {C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe cmd.exe PID 4048 wrote to memory of 624 4048 {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe PID 4048 wrote to memory of 624 4048 {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe PID 4048 wrote to memory of 624 4048 {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe PID 4048 wrote to memory of 2364 4048 {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe cmd.exe PID 4048 wrote to memory of 2364 4048 {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe cmd.exe PID 4048 wrote to memory of 2364 4048 {FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe cmd.exe PID 624 wrote to memory of 1240 624 {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe PID 624 wrote to memory of 1240 624 {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe PID 624 wrote to memory of 1240 624 {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe PID 624 wrote to memory of 2860 624 {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe cmd.exe PID 624 wrote to memory of 2860 624 {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe cmd.exe PID 624 wrote to memory of 2860 624 {B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe cmd.exe PID 1240 wrote to memory of 4304 1240 {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe PID 1240 wrote to memory of 4304 1240 {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe PID 1240 wrote to memory of 4304 1240 {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe PID 1240 wrote to memory of 4404 1240 {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe cmd.exe PID 1240 wrote to memory of 4404 1240 {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe cmd.exe PID 1240 wrote to memory of 4404 1240 {BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe cmd.exe PID 4304 wrote to memory of 3860 4304 {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe PID 4304 wrote to memory of 3860 4304 {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe PID 4304 wrote to memory of 3860 4304 {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe PID 4304 wrote to memory of 3928 4304 {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe cmd.exe PID 4304 wrote to memory of 3928 4304 {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe cmd.exe PID 4304 wrote to memory of 3928 4304 {CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe cmd.exe PID 3860 wrote to memory of 4284 3860 {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe PID 3860 wrote to memory of 4284 3860 {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe PID 3860 wrote to memory of 4284 3860 {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe PID 3860 wrote to memory of 4808 3860 {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe cmd.exe PID 3860 wrote to memory of 4808 3860 {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe cmd.exe PID 3860 wrote to memory of 4808 3860 {6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe cmd.exe PID 4284 wrote to memory of 4624 4284 {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe PID 4284 wrote to memory of 4624 4284 {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe PID 4284 wrote to memory of 4624 4284 {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe PID 4284 wrote to memory of 3444 4284 {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe cmd.exe PID 4284 wrote to memory of 3444 4284 {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe cmd.exe PID 4284 wrote to memory of 3444 4284 {2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe cmd.exe PID 4624 wrote to memory of 1220 4624 {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe PID 4624 wrote to memory of 1220 4624 {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe PID 4624 wrote to memory of 1220 4624 {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe PID 4624 wrote to memory of 4932 4624 {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe cmd.exe PID 4624 wrote to memory of 4932 4624 {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe cmd.exe PID 4624 wrote to memory of 4932 4624 {60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe cmd.exe PID 1220 wrote to memory of 3588 1220 {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe {0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe PID 1220 wrote to memory of 3588 1220 {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe {0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe PID 1220 wrote to memory of 3588 1220 {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe {0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe PID 1220 wrote to memory of 224 1220 {EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe"C:\Users\Admin\AppData\Local\Temp\e730e972cc95e1f5f2092b4c63401ee491350b0560cb5c101d3bc0abefd1bbae.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exeC:\Windows\{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exeC:\Windows\{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exeC:\Windows\{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exeC:\Windows\{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exeC:\Windows\{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exeC:\Windows\{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exeC:\Windows\{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exeC:\Windows\{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exeC:\Windows\{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exeC:\Windows\{EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exeC:\Windows\{0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{2ED85575-0C00-45ae-8480-7A267452C735}.exeC:\Windows\{2ED85575-0C00-45ae-8480-7A267452C735}.exe13⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0F303~1.EXE > nul13⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EE96E~1.EXE > nul12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{60325~1.EXE > nul11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2394D~1.EXE > nul10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6DDD5~1.EXE > nul9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CE7A8~1.EXE > nul8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BF75E~1.EXE > nul7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B4EF6~1.EXE > nul6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FEFB9~1.EXE > nul5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C873B~1.EXE > nul4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E2581~1.EXE > nul3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\E730E9~1.EXE > nul2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\{0F303856-DA6F-4bd5-BBF7-006167FF74DF}.exeFilesize
90KB
MD595439b4fa42afbce875d5b7e35b1b1c8
SHA16c0a0f9786476b612baef0a7b915c4d09faa3a63
SHA2567d82cb84ba1f96ab9d678e051fddee47858cd9cf41aad420a3bace7d59c3c783
SHA51250afc9f82ab1eeca6bcfe1369ad069f4f514d315a65b79f65b1e930d9b2b2a160f3eaeb6e6c97f55f2ce715760e346e867883df40e07f5942cf7e2b44927f35d
-
C:\Windows\{2394DAEF-D1ED-42f2-B8DD-1497BCAB1AB8}.exeFilesize
90KB
MD5dd104addefbd6af9311d9823ff442edd
SHA1f9f10837d64b1a7b20eef52f3c953183ee1bf4f6
SHA256bd511eb6ea4512e72496a821f52b69601c4dfdc088dfcaded4c311126a9b743f
SHA512be27a0ac657a097911fcad5c2fb20f47fdd0f3723f171426e4359ded06659d2fc721692782534e84148af9caf0d0c53b4d08f8c0c390abdce54a664405f94ae5
-
C:\Windows\{2ED85575-0C00-45ae-8480-7A267452C735}.exeFilesize
90KB
MD54419004bd29f88919162993e3549d866
SHA1bb79e361f01649d8fda038d5ff47eecce42743ce
SHA2563e7131d7639d20326a017c1507352f4d9f46e505ba1fa3211b7397ba3131b83f
SHA512bf127da1e0cfcd9728f4b836a57ad4567d9755e12bcdf295dc84494c72ad22eff7aaae491e0ad484b06f8009318fbc8048708406b0a2833f8a8e67ece9311c5b
-
C:\Windows\{60325E9B-CAD2-4307-92D5-C50B1F96EEE8}.exeFilesize
90KB
MD59d6d7c679296d75edb240eaae8162460
SHA1aef0ea8022b3fc496da302ca390ae8af9bbc10ba
SHA2567a5144b3eada716cd482d486c3deb632b2942744a7637914c750593370a9318e
SHA5123dc7c0c4ebb232de17d31a358f4c02ffbfa1321afbafbc3e669cdf80f4d9b568feb9b3cb593a7b8daba8e6564e6701ea5280ce2ef63d137e1e5bd2b79fe031cb
-
C:\Windows\{6DDD5480-A354-4595-88FB-FA16F9FDDA0E}.exeFilesize
90KB
MD57e2244cd2214eff24d4d6b708c68bdf7
SHA1ec8b833c15d600a8b9fae209e7f9d51bcb417ffa
SHA256f9a71ef551d4b9b0ba59e9730d99b6526584bdb4a2a0cc3747e9b6deb609094e
SHA51206c829325bd4eac602583c925b3ca9816f6f53692f644794b3601164971d921741f8ad958872ac0cf46d22ae0e107b72845a9854fd1be0bdc4df4d639a7fdad1
-
C:\Windows\{B4EF6531-C0F0-4e9c-BBE0-A783F8D6C2F7}.exeFilesize
90KB
MD52a13dda86735159b53542896f1962f78
SHA17886f7f64be75fec25fef7959855c9ed5626f50b
SHA25633e2402ad8d06d93c22c0c00992e10601ca7c15074b8c7a08ac703d9ceb72e93
SHA512ac7855bbfec5bdc75d5a3b7b9c59d64408e4aa3024806e207c72776ec6b3ea6c42c1fdc6154ec146e411cbc5401b4730b3b511e203ed18a18a47f8a553134761
-
C:\Windows\{BF75E865-E21E-4ea2-B84A-E88D53E59DAF}.exeFilesize
90KB
MD567bfe56edb253488686277785240dcf9
SHA126e68d21bf2e31faf1a682102e85106a90789492
SHA256ead800aebe1b7199a48f4ea2b2612bc3775218517ba6b5728fe0ce9f57970d00
SHA5122cb7f2cd27cbfafc4345e62f04273cd5f39fdf50c748c73550a0f5104130dc7e68028b007befaadb4887fadc23cc77559fad076f11b6eabfae4cd312d303e5c4
-
C:\Windows\{C873BCDC-36D8-4f40-A4D7-4ACFC143F414}.exeFilesize
90KB
MD5ff4eea89ab4cca992aff17955e698849
SHA17c71ab75168312fd41553dbfa577a5533a3794a1
SHA256cf808fb2bf6992c1358d5e4384780169b43f4a245e91e2b8e2d2b3e9ee0427bb
SHA512c79d6b0b43652a5ce004f0efb66a5c6b7e299f336998a5f61cfd2485d4bbe781ff66edee4e478e5c819593b642845c5517044d946e251d163cd25f82deedc134
-
C:\Windows\{CE7A8979-6AB1-4dbc-95ED-3C448A894B57}.exeFilesize
90KB
MD5251602a427e79e76a3e80c596664affd
SHA1c3301da14b517418592da0f99e414464773ca56c
SHA256c21a00002aab14a22950a65c3c41fa22dd9f15ce549b8f0e282b8a7b1a2fb3f9
SHA5128c462f60b254c18d03124ba3a8c571b5d697534916976c181010e243a6e7f75c7f5b8985330aefaee514bfe117af3dcdc970748c98d8bef88a31f49b77965e2c
-
C:\Windows\{E25813A4-8D15-4f1f-B2B6-9C5894574D2B}.exeFilesize
90KB
MD54ba83d082b1f046d1a5507992715a850
SHA1f58358bfae628e74cf8c9084f39009bf5e75ee4c
SHA256f3ff6904ecd36dd41369cdfe96023d8b4a54b8d564e72d6e44bdf07dda58e0c5
SHA5129f1e23fd423102756a40b7e642741f7578f820718ae7eb5dd20f22003311739cd5b72b8e2938b0579f104865e3ca1a27de5d0108a8c121f7f413d7a55bac4c52
-
C:\Windows\{EE96E27A-C828-4418-AEC0-511C0FACBAD8}.exeFilesize
90KB
MD5f81b8e02983c50a13bd20a0bd2045c12
SHA1e907b90f3da7d9c42eea48ec5cbd28c40c5b2e17
SHA25697b64941af78afe0ccb4e488c7ea330a1fb1f4d55ff1a44ec9096a8a24235401
SHA5120112f4363c60956bc5688d0c71149a57c2246c21eea7a7f054a247e77d52b5e2311f9c89c1b83cd18e2bc07407ad2e6b2c7ce56ac2ada0e9357652258f40b043
-
C:\Windows\{FEFB994D-2FF8-4b78-B1F9-BE2BCF5E165D}.exeFilesize
90KB
MD53a560c5ba4307ef780ca6c1be0b7fcdd
SHA13ff063e8e0452405b00e9a7e16537eee34b5e8e7
SHA2566be7e9fb81da9059965acbab09c7dbdb32524e91ce46dfcc1d24c6b5031c3f16
SHA512e9be51aebbcbbd00e01d3444290435cb82c0539288b09fd41c19c2e3164d77b2f432af4ec51d76dfeb023945f526e5083bf0980297f451c851bb2bdb56230472