Analysis
-
max time kernel
176s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17-08-2023 18:35
Static task
static1
Behavioral task
behavioral1
Sample
205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe
-
Size
216KB
-
MD5
205d912b9f32d457b53dd36243cd1f40
-
SHA1
fbfff73d4a6de5a0b942f811e7b133ea7f2cd765
-
SHA256
014080ec0aa8b9776f7e8b0f5e4caa9e984aa02b4c730e38954686458bbdde6b
-
SHA512
6e28870cdc37e584bb7ef57242c90ed0cebb1df3f05ad18e50101436fcf658fab9786a47b7c22c3e05a538d2d99461ea63dc152560bcc22f0349084a3ee69abd
-
SSDEEP
3072:jEGh0ohl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGblEeKcAEcGy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA674676-AB38-41cb-A557-A209C2C4BD14} {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2} {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1D6BD2D8-739A-48fa-A10E-5D1B78D54B79} {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F13AE097-F7BA-49d9-8708-64291FB75B4D}\stubpath = "C:\\Windows\\{F13AE097-F7BA-49d9-8708-64291FB75B4D}.exe" {D11899A9-FAA0-4831-B730-9F7F430EB149}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F959B46-FB81-4efa-AFB4-5A1ADAD846FD} {59A2E852-3032-4102-97DB-A9F8FFFE79EF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58269CD3-2538-44b0-9499-18A4F8E8760E} {F13AE097-F7BA-49d9-8708-64291FB75B4D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F959B46-FB81-4efa-AFB4-5A1ADAD846FD}\stubpath = "C:\\Windows\\{7F959B46-FB81-4efa-AFB4-5A1ADAD846FD}.exe" {59A2E852-3032-4102-97DB-A9F8FFFE79EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DBC412F-8EE2-4a37-BB4A-48CA890EED89}\stubpath = "C:\\Windows\\{4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe" 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}\stubpath = "C:\\Windows\\{0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe" {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}\stubpath = "C:\\Windows\\{2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe" {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{67679CF8-7D43-47d7-B2AF-42AAD70C14F4}\stubpath = "C:\\Windows\\{67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe" {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D11899A9-FAA0-4831-B730-9F7F430EB149} {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D11899A9-FAA0-4831-B730-9F7F430EB149}\stubpath = "C:\\Windows\\{D11899A9-FAA0-4831-B730-9F7F430EB149}.exe" {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59A2E852-3032-4102-97DB-A9F8FFFE79EF}\stubpath = "C:\\Windows\\{59A2E852-3032-4102-97DB-A9F8FFFE79EF}.exe" {58269CD3-2538-44b0-9499-18A4F8E8760E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DBC412F-8EE2-4a37-BB4A-48CA890EED89} 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA674676-AB38-41cb-A557-A209C2C4BD14}\stubpath = "C:\\Windows\\{AA674676-AB38-41cb-A557-A209C2C4BD14}.exe" {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12A6768D-9500-493b-BA04-F3D553A1B9BF} {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}\stubpath = "C:\\Windows\\{1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe" {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{67679CF8-7D43-47d7-B2AF-42AAD70C14F4} {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58269CD3-2538-44b0-9499-18A4F8E8760E}\stubpath = "C:\\Windows\\{58269CD3-2538-44b0-9499-18A4F8E8760E}.exe" {F13AE097-F7BA-49d9-8708-64291FB75B4D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12A6768D-9500-493b-BA04-F3D553A1B9BF}\stubpath = "C:\\Windows\\{12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe" {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916} {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F13AE097-F7BA-49d9-8708-64291FB75B4D} {D11899A9-FAA0-4831-B730-9F7F430EB149}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59A2E852-3032-4102-97DB-A9F8FFFE79EF} {58269CD3-2538-44b0-9499-18A4F8E8760E}.exe -
Deletes itself 1 IoCs
pid Process 2520 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2960 {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe 2736 {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe 2708 {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe 2348 {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe 524 {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe 2696 {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe 1508 {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe 3056 {D11899A9-FAA0-4831-B730-9F7F430EB149}.exe 2544 {F13AE097-F7BA-49d9-8708-64291FB75B4D}.exe 1864 {58269CD3-2538-44b0-9499-18A4F8E8760E}.exe 2012 {59A2E852-3032-4102-97DB-A9F8FFFE79EF}.exe 1496 {7F959B46-FB81-4efa-AFB4-5A1ADAD846FD}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{AA674676-AB38-41cb-A557-A209C2C4BD14}.exe {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe File created C:\Windows\{67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe File created C:\Windows\{F13AE097-F7BA-49d9-8708-64291FB75B4D}.exe {D11899A9-FAA0-4831-B730-9F7F430EB149}.exe File created C:\Windows\{7F959B46-FB81-4efa-AFB4-5A1ADAD846FD}.exe {59A2E852-3032-4102-97DB-A9F8FFFE79EF}.exe File created C:\Windows\{1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe File created C:\Windows\{D11899A9-FAA0-4831-B730-9F7F430EB149}.exe {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe File created C:\Windows\{58269CD3-2538-44b0-9499-18A4F8E8760E}.exe {F13AE097-F7BA-49d9-8708-64291FB75B4D}.exe File created C:\Windows\{59A2E852-3032-4102-97DB-A9F8FFFE79EF}.exe {58269CD3-2538-44b0-9499-18A4F8E8760E}.exe File created C:\Windows\{4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe File created C:\Windows\{12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe File created C:\Windows\{0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe File created C:\Windows\{2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2836 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe Token: SeIncBasePriorityPrivilege 2960 {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe Token: SeIncBasePriorityPrivilege 2736 {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe Token: SeIncBasePriorityPrivilege 2708 {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe Token: SeIncBasePriorityPrivilege 2348 {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe Token: SeIncBasePriorityPrivilege 524 {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe Token: SeIncBasePriorityPrivilege 2696 {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe Token: SeIncBasePriorityPrivilege 1508 {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe Token: SeIncBasePriorityPrivilege 3056 {D11899A9-FAA0-4831-B730-9F7F430EB149}.exe Token: SeIncBasePriorityPrivilege 2544 {F13AE097-F7BA-49d9-8708-64291FB75B4D}.exe Token: SeIncBasePriorityPrivilege 1864 {58269CD3-2538-44b0-9499-18A4F8E8760E}.exe Token: SeIncBasePriorityPrivilege 2012 {59A2E852-3032-4102-97DB-A9F8FFFE79EF}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2960 2836 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe 29 PID 2836 wrote to memory of 2960 2836 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe 29 PID 2836 wrote to memory of 2960 2836 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe 29 PID 2836 wrote to memory of 2960 2836 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe 29 PID 2836 wrote to memory of 2520 2836 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe 30 PID 2836 wrote to memory of 2520 2836 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe 30 PID 2836 wrote to memory of 2520 2836 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe 30 PID 2836 wrote to memory of 2520 2836 205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe 30 PID 2960 wrote to memory of 2736 2960 {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe 31 PID 2960 wrote to memory of 2736 2960 {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe 31 PID 2960 wrote to memory of 2736 2960 {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe 31 PID 2960 wrote to memory of 2736 2960 {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe 31 PID 2960 wrote to memory of 2824 2960 {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe 32 PID 2960 wrote to memory of 2824 2960 {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe 32 PID 2960 wrote to memory of 2824 2960 {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe 32 PID 2960 wrote to memory of 2824 2960 {4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe 32 PID 2736 wrote to memory of 2708 2736 {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe 33 PID 2736 wrote to memory of 2708 2736 {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe 33 PID 2736 wrote to memory of 2708 2736 {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe 33 PID 2736 wrote to memory of 2708 2736 {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe 33 PID 2736 wrote to memory of 2776 2736 {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe 34 PID 2736 wrote to memory of 2776 2736 {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe 34 PID 2736 wrote to memory of 2776 2736 {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe 34 PID 2736 wrote to memory of 2776 2736 {AA674676-AB38-41cb-A557-A209C2C4BD14}.exe 34 PID 2708 wrote to memory of 2348 2708 {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe 35 PID 2708 wrote to memory of 2348 2708 {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe 35 PID 2708 wrote to memory of 2348 2708 {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe 35 PID 2708 wrote to memory of 2348 2708 {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe 35 PID 2708 wrote to memory of 280 2708 {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe 36 PID 2708 wrote to memory of 280 2708 {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe 36 PID 2708 wrote to memory of 280 2708 {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe 36 PID 2708 wrote to memory of 280 2708 {12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe 36 PID 2348 wrote to memory of 524 2348 {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe 37 PID 2348 wrote to memory of 524 2348 {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe 37 PID 2348 wrote to memory of 524 2348 {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe 37 PID 2348 wrote to memory of 524 2348 {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe 37 PID 2348 wrote to memory of 472 2348 {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe 38 PID 2348 wrote to memory of 472 2348 {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe 38 PID 2348 wrote to memory of 472 2348 {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe 38 PID 2348 wrote to memory of 472 2348 {0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe 38 PID 524 wrote to memory of 2696 524 {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe 39 PID 524 wrote to memory of 2696 524 {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe 39 PID 524 wrote to memory of 2696 524 {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe 39 PID 524 wrote to memory of 2696 524 {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe 39 PID 524 wrote to memory of 2016 524 {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe 40 PID 524 wrote to memory of 2016 524 {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe 40 PID 524 wrote to memory of 2016 524 {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe 40 PID 524 wrote to memory of 2016 524 {2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe 40 PID 2696 wrote to memory of 1508 2696 {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe 41 PID 2696 wrote to memory of 1508 2696 {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe 41 PID 2696 wrote to memory of 1508 2696 {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe 41 PID 2696 wrote to memory of 1508 2696 {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe 41 PID 2696 wrote to memory of 340 2696 {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe 42 PID 2696 wrote to memory of 340 2696 {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe 42 PID 2696 wrote to memory of 340 2696 {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe 42 PID 2696 wrote to memory of 340 2696 {1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe 42 PID 1508 wrote to memory of 3056 1508 {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe 43 PID 1508 wrote to memory of 3056 1508 {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe 43 PID 1508 wrote to memory of 3056 1508 {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe 43 PID 1508 wrote to memory of 3056 1508 {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe 43 PID 1508 wrote to memory of 2372 1508 {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe 44 PID 1508 wrote to memory of 2372 1508 {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe 44 PID 1508 wrote to memory of 2372 1508 {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe 44 PID 1508 wrote to memory of 2372 1508 {67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe"C:\Users\Admin\AppData\Local\Temp\205d912b9f32d457b53dd36243cd1f40_goldeneye_JC.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\{4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exeC:\Windows\{4DBC412F-8EE2-4a37-BB4A-48CA890EED89}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\{AA674676-AB38-41cb-A557-A209C2C4BD14}.exeC:\Windows\{AA674676-AB38-41cb-A557-A209C2C4BD14}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{12A6768D-9500-493b-BA04-F3D553A1B9BF}.exeC:\Windows\{12A6768D-9500-493b-BA04-F3D553A1B9BF}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\{0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exeC:\Windows\{0BCA89A0-5BEA-47e1-818F-62A5F33DB5A2}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\{2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exeC:\Windows\{2B5E6FC7-20CC-4bce-A8C9-7BE36D2CF916}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\{1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exeC:\Windows\{1D6BD2D8-739A-48fa-A10E-5D1B78D54B79}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\{67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exeC:\Windows\{67679CF8-7D43-47d7-B2AF-42AAD70C14F4}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\{D11899A9-FAA0-4831-B730-9F7F430EB149}.exeC:\Windows\{D11899A9-FAA0-4831-B730-9F7F430EB149}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3056 -
C:\Windows\{F13AE097-F7BA-49d9-8708-64291FB75B4D}.exeC:\Windows\{F13AE097-F7BA-49d9-8708-64291FB75B4D}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\{58269CD3-2538-44b0-9499-18A4F8E8760E}.exeC:\Windows\{58269CD3-2538-44b0-9499-18A4F8E8760E}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\{59A2E852-3032-4102-97DB-A9F8FFFE79EF}.exeC:\Windows\{59A2E852-3032-4102-97DB-A9F8FFFE79EF}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\{7F959B46-FB81-4efa-AFB4-5A1ADAD846FD}.exeC:\Windows\{7F959B46-FB81-4efa-AFB4-5A1ADAD846FD}.exe13⤵
- Executes dropped EXE
PID:1496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{59A2E~1.EXE > nul13⤵PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{58269~1.EXE > nul12⤵PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F13AE~1.EXE > nul11⤵PID:864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D1189~1.EXE > nul10⤵PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67679~1.EXE > nul9⤵PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1D6BD~1.EXE > nul8⤵PID:340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2B5E6~1.EXE > nul7⤵PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0BCA8~1.EXE > nul6⤵PID:472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{12A67~1.EXE > nul5⤵PID:280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA674~1.EXE > nul4⤵PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4DBC4~1.EXE > nul3⤵PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\205D91~1.EXE > nul2⤵
- Deletes itself
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD52e331d106a9418a6dbf2956c85be7197
SHA12307444cb19a5604cd95470a49977380f70f08d5
SHA2562671494e81342b451708ae04022e7004312beb279605ced217685be21a8afbe7
SHA51243a95e1517e27a8004becaea4d770de5c7f8aa9f5c7b03fe35cd8e7fded756ce545c7f861317760a2879dae00e39003a299ad30004193ba8f74c33c6c1fc0fad
-
Filesize
216KB
MD52e331d106a9418a6dbf2956c85be7197
SHA12307444cb19a5604cd95470a49977380f70f08d5
SHA2562671494e81342b451708ae04022e7004312beb279605ced217685be21a8afbe7
SHA51243a95e1517e27a8004becaea4d770de5c7f8aa9f5c7b03fe35cd8e7fded756ce545c7f861317760a2879dae00e39003a299ad30004193ba8f74c33c6c1fc0fad
-
Filesize
216KB
MD521dd4077663acc23889e512b89777576
SHA1daadc65a49034edf5e5d66fb01984acd77b601e1
SHA25623d6b0d8ffc6b8fdb6c47c2cf88d96e7438d88d057b5b368c21e72e004ca15f2
SHA51222e05f5c99df2cdb456a31b53cf3650af939ee15cbaae206852191926860ebed165f3d6a315545a34ffa7a330cf69c86614f9d979915198e95b12f098978bd3a
-
Filesize
216KB
MD521dd4077663acc23889e512b89777576
SHA1daadc65a49034edf5e5d66fb01984acd77b601e1
SHA25623d6b0d8ffc6b8fdb6c47c2cf88d96e7438d88d057b5b368c21e72e004ca15f2
SHA51222e05f5c99df2cdb456a31b53cf3650af939ee15cbaae206852191926860ebed165f3d6a315545a34ffa7a330cf69c86614f9d979915198e95b12f098978bd3a
-
Filesize
216KB
MD56429df6db479c6db0ca97bad1e440870
SHA10f7c820c9898372fd1041d4c4331baf3ae6075a7
SHA2565e8aba450b09c25f042dacfe37e7ecf66a6ea1347bf1839e7d7f97460aebe57c
SHA512765d0850d6eeb378b58a449101801913edece29389c2a027e556ec0b6c1adf78386680f1eb94495339bc43d4e3adfe6ad33391beebe2c2f8e5dfab9d327b36a8
-
Filesize
216KB
MD56429df6db479c6db0ca97bad1e440870
SHA10f7c820c9898372fd1041d4c4331baf3ae6075a7
SHA2565e8aba450b09c25f042dacfe37e7ecf66a6ea1347bf1839e7d7f97460aebe57c
SHA512765d0850d6eeb378b58a449101801913edece29389c2a027e556ec0b6c1adf78386680f1eb94495339bc43d4e3adfe6ad33391beebe2c2f8e5dfab9d327b36a8
-
Filesize
216KB
MD579f1eb7ee4f69ae407dbd25d6216340c
SHA172f7e525c95f380a616cf3a371fe86ee0afef7e7
SHA2563ec26691889b92be531716fba46c43fedccaaec128d3da0b88af112971ee5f16
SHA51281d0cf3112407fced436d0271d754d6079409137942dcc7b7567e204964546cb512540f76052b1d734d3a3a66f1076fb8ce72a5354b49faaba2f66f2c260f879
-
Filesize
216KB
MD579f1eb7ee4f69ae407dbd25d6216340c
SHA172f7e525c95f380a616cf3a371fe86ee0afef7e7
SHA2563ec26691889b92be531716fba46c43fedccaaec128d3da0b88af112971ee5f16
SHA51281d0cf3112407fced436d0271d754d6079409137942dcc7b7567e204964546cb512540f76052b1d734d3a3a66f1076fb8ce72a5354b49faaba2f66f2c260f879
-
Filesize
216KB
MD5fd44d251c08e937183faaafe17c900b1
SHA12057e91786879fcb54902affdf4e76eda57e6433
SHA256a74d8e231918104c9079fc3a69acdd0b9dc37b533e62389b64aa30e0333f879f
SHA512f9c905e0b8b84056fefd116f8dc819486739fb655847d8545d00a4773363fa8572509ad2246c58eab60e1bb8836c76f5878924584618888592ef46eeeedc9e6e
-
Filesize
216KB
MD5fd44d251c08e937183faaafe17c900b1
SHA12057e91786879fcb54902affdf4e76eda57e6433
SHA256a74d8e231918104c9079fc3a69acdd0b9dc37b533e62389b64aa30e0333f879f
SHA512f9c905e0b8b84056fefd116f8dc819486739fb655847d8545d00a4773363fa8572509ad2246c58eab60e1bb8836c76f5878924584618888592ef46eeeedc9e6e
-
Filesize
216KB
MD5fd44d251c08e937183faaafe17c900b1
SHA12057e91786879fcb54902affdf4e76eda57e6433
SHA256a74d8e231918104c9079fc3a69acdd0b9dc37b533e62389b64aa30e0333f879f
SHA512f9c905e0b8b84056fefd116f8dc819486739fb655847d8545d00a4773363fa8572509ad2246c58eab60e1bb8836c76f5878924584618888592ef46eeeedc9e6e
-
Filesize
216KB
MD5cb5df8abe1bd680d1122f8134e22a97e
SHA15d5cc15cdff19e023709155c632cc63ed2a0c81c
SHA2564d41414f4869ea4899909a7f757534525ff7ab3f56f1e4cc8df044ea47d2043d
SHA5120074ae1749d826f8e0a549c5694fe8288c7d1856db20f07ee47bea9516d68903df1165fa657ee423fd15a4cf9cf88d0d70a5a929ca6855d459399a895fbe3589
-
Filesize
216KB
MD5cb5df8abe1bd680d1122f8134e22a97e
SHA15d5cc15cdff19e023709155c632cc63ed2a0c81c
SHA2564d41414f4869ea4899909a7f757534525ff7ab3f56f1e4cc8df044ea47d2043d
SHA5120074ae1749d826f8e0a549c5694fe8288c7d1856db20f07ee47bea9516d68903df1165fa657ee423fd15a4cf9cf88d0d70a5a929ca6855d459399a895fbe3589
-
Filesize
216KB
MD5d351ad5d5a075e39d7dd3b6c5c3c6b7e
SHA138f9b692ef4c47fa9f15a79d7bdac29bb398992d
SHA25605f1d2fbd75d97e97bdefc4a0c7e16985a694c0a374d2b667bdaf287ff4273bb
SHA5120200e54231d261b7b19e5587c32c4e753d835cb56b92c27641ef16b5c8a24910f7f7c4e113de642ebddc5fab08f6f23bc2afb65ca787d6262a22f25376506c06
-
Filesize
216KB
MD5d351ad5d5a075e39d7dd3b6c5c3c6b7e
SHA138f9b692ef4c47fa9f15a79d7bdac29bb398992d
SHA25605f1d2fbd75d97e97bdefc4a0c7e16985a694c0a374d2b667bdaf287ff4273bb
SHA5120200e54231d261b7b19e5587c32c4e753d835cb56b92c27641ef16b5c8a24910f7f7c4e113de642ebddc5fab08f6f23bc2afb65ca787d6262a22f25376506c06
-
Filesize
216KB
MD59817ee3ebf46ed52b8b91441efdd91fb
SHA1ea6c79088b369cdcf32ed91733051268a3f62ba2
SHA256afa147687e7252569b1bf9fea1a65f3022fdf4592cbd87f1b29217242e8ebe4e
SHA512fcbd240951d0171d49ec2ee2ee05049e92c977c523621023ce1fd1914f733ee234c24b2550b2f66e65e2a989d498815d3c7fbba77fbb1a88301bd3986daaec12
-
Filesize
216KB
MD59817ee3ebf46ed52b8b91441efdd91fb
SHA1ea6c79088b369cdcf32ed91733051268a3f62ba2
SHA256afa147687e7252569b1bf9fea1a65f3022fdf4592cbd87f1b29217242e8ebe4e
SHA512fcbd240951d0171d49ec2ee2ee05049e92c977c523621023ce1fd1914f733ee234c24b2550b2f66e65e2a989d498815d3c7fbba77fbb1a88301bd3986daaec12
-
Filesize
216KB
MD516fe07d7eee7eddcd84caadcfe115049
SHA1123276f04a0976ad1f209cc421d1bbc3211b64ad
SHA256a8a137b34356a54e87a0e106e147187f33caacce0b41a0c38d7063439e1dbff0
SHA5125d86da4169ed1882dc25a648dd22b3c7b90df2b15cda38ea87cddd592400d6aeba5d6dbc6d30c4210725aca427b1f2fd19a519df8726163498c8f183c4e9bdcd
-
Filesize
216KB
MD5c7446ce97dc464d25c3b5d1743e690c2
SHA155febd2501bbee768a0707bc3954758f01c78ccf
SHA2563a8277f64a03e3fb620957634527d06eb59c75d1d8f4f41568b3c51dd1814126
SHA512fb74770d6b01afa769926482eb40c260f362768c1794895e9941ba26e5033df7cfd50a2c8a50d75c3fefe6bf7d3b96dff9351a1be0ff038f363604e5e2778b7a
-
Filesize
216KB
MD5c7446ce97dc464d25c3b5d1743e690c2
SHA155febd2501bbee768a0707bc3954758f01c78ccf
SHA2563a8277f64a03e3fb620957634527d06eb59c75d1d8f4f41568b3c51dd1814126
SHA512fb74770d6b01afa769926482eb40c260f362768c1794895e9941ba26e5033df7cfd50a2c8a50d75c3fefe6bf7d3b96dff9351a1be0ff038f363604e5e2778b7a
-
Filesize
216KB
MD5264db810321846b206ba2d41d8283fa7
SHA16e9057885bb1e0a6578d9f92cf586e62708bfd63
SHA256e1fa38312040f6011cd7f072a9b57939bcd61552a1d35a4c6d5c1e6039d5f0be
SHA51284e269df09b028ce5e74feb3dfe4fb93acad3625f561a50cbb7241a671af3e9a3735132a9e082144460d25efbcc36c19866d3a7040522fb54bf56d1795640f50
-
Filesize
216KB
MD5264db810321846b206ba2d41d8283fa7
SHA16e9057885bb1e0a6578d9f92cf586e62708bfd63
SHA256e1fa38312040f6011cd7f072a9b57939bcd61552a1d35a4c6d5c1e6039d5f0be
SHA51284e269df09b028ce5e74feb3dfe4fb93acad3625f561a50cbb7241a671af3e9a3735132a9e082144460d25efbcc36c19866d3a7040522fb54bf56d1795640f50
-
Filesize
216KB
MD51018b50f9491fc016ac483d0a971d6fe
SHA1a00e3336dbe70a7d7214d1e83ba8e063ec8e8265
SHA2566171adc10101bc0082149028d516475727eaf4e49573efce093b9dc0fe54d487
SHA512efeeed465f1a5e5837e6c4bb6577787b90fdc4ee2bca98e8825de78688f68a0156eb3bc0fcbb084f55886084cc1941694a9def8e49eec372c55494a013b35b62
-
Filesize
216KB
MD51018b50f9491fc016ac483d0a971d6fe
SHA1a00e3336dbe70a7d7214d1e83ba8e063ec8e8265
SHA2566171adc10101bc0082149028d516475727eaf4e49573efce093b9dc0fe54d487
SHA512efeeed465f1a5e5837e6c4bb6577787b90fdc4ee2bca98e8825de78688f68a0156eb3bc0fcbb084f55886084cc1941694a9def8e49eec372c55494a013b35b62