Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-08-2023 09:53
Static task
static1
Behavioral task
behavioral1
Sample
4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe
-
Size
204KB
-
MD5
4e3a4dab1107babb8a340e5929eef324
-
SHA1
eb31afff833bdaad03332d1c3d60a3dc01fa1144
-
SHA256
43f4eb673f818a9033d80838793d8fceb9e82358a2d8f23d7a49d198b298dd30
-
SHA512
1d8c082710be88407b2557ac86ae37e49cb5ca740c1ae4c83ff219861b36b1eeb80b882c5488c4095b53417d09a921507758ccdc4127d91e24f9fddbff4df78f
-
SSDEEP
1536:1EGh0o3l15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0o3l1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{621DEFA5-AB7E-49c5-8C78-F7ED27922862}\stubpath = "C:\\Windows\\{621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe" 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A2E0793-E71A-401f-9101-E18FC75A8E09} {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0BF182A6-752F-4fcd-A9FD-56C3E4B842B8} {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1C63B27-5E87-42ed-943B-722E7E84B134}\stubpath = "C:\\Windows\\{E1C63B27-5E87-42ed-943B-722E7E84B134}.exe" {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F49CFD33-931F-46ae-830E-280AC1D52FB8} {718CC33B-3CA2-4898-AC3D-A8043DC64F8F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{918A4E3D-B2FC-413d-9C48-55F58FA6C144} {7D11A3D2-9807-4217-A541-4850F97AFE57}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{718CC33B-3CA2-4898-AC3D-A8043DC64F8F}\stubpath = "C:\\Windows\\{718CC33B-3CA2-4898-AC3D-A8043DC64F8F}.exe" {918A4E3D-B2FC-413d-9C48-55F58FA6C144}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F49CFD33-931F-46ae-830E-280AC1D52FB8}\stubpath = "C:\\Windows\\{F49CFD33-931F-46ae-830E-280AC1D52FB8}.exe" {718CC33B-3CA2-4898-AC3D-A8043DC64F8F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A2E0793-E71A-401f-9101-E18FC75A8E09}\stubpath = "C:\\Windows\\{5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe" {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F84BF2B-8508-46c9-9EAC-B62DC147C165} {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EDF8706F-3CB0-4680-990D-20AD3CF31F5D} {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D11A3D2-9807-4217-A541-4850F97AFE57} {12C373F3-B231-45fe-9913-39A35F4A72E1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D11A3D2-9807-4217-A541-4850F97AFE57}\stubpath = "C:\\Windows\\{7D11A3D2-9807-4217-A541-4850F97AFE57}.exe" {12C373F3-B231-45fe-9913-39A35F4A72E1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1EFB801E-833F-40f2-AC2F-0930E53E9546}\stubpath = "C:\\Windows\\{1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe" {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F84BF2B-8508-46c9-9EAC-B62DC147C165}\stubpath = "C:\\Windows\\{8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe" {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EDF8706F-3CB0-4680-990D-20AD3CF31F5D}\stubpath = "C:\\Windows\\{EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe" {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12C373F3-B231-45fe-9913-39A35F4A72E1} {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{718CC33B-3CA2-4898-AC3D-A8043DC64F8F} {918A4E3D-B2FC-413d-9C48-55F58FA6C144}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{918A4E3D-B2FC-413d-9C48-55F58FA6C144}\stubpath = "C:\\Windows\\{918A4E3D-B2FC-413d-9C48-55F58FA6C144}.exe" {7D11A3D2-9807-4217-A541-4850F97AFE57}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{621DEFA5-AB7E-49c5-8C78-F7ED27922862} 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1EFB801E-833F-40f2-AC2F-0930E53E9546} {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}\stubpath = "C:\\Windows\\{0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe" {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1C63B27-5E87-42ed-943B-722E7E84B134} {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12C373F3-B231-45fe-9913-39A35F4A72E1}\stubpath = "C:\\Windows\\{12C373F3-B231-45fe-9913-39A35F4A72E1}.exe" {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe -
Deletes itself 1 IoCs
pid Process 788 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2380 {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe 2300 {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe 3016 {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe 1196 {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe 2724 {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe 2432 {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe 1408 {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe 2180 {12C373F3-B231-45fe-9913-39A35F4A72E1}.exe 1984 {7D11A3D2-9807-4217-A541-4850F97AFE57}.exe 1244 {918A4E3D-B2FC-413d-9C48-55F58FA6C144}.exe 2904 {718CC33B-3CA2-4898-AC3D-A8043DC64F8F}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe File created C:\Windows\{EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe File created C:\Windows\{7D11A3D2-9807-4217-A541-4850F97AFE57}.exe {12C373F3-B231-45fe-9913-39A35F4A72E1}.exe File created C:\Windows\{918A4E3D-B2FC-413d-9C48-55F58FA6C144}.exe {7D11A3D2-9807-4217-A541-4850F97AFE57}.exe File created C:\Windows\{621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe File created C:\Windows\{1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe File created C:\Windows\{E1C63B27-5E87-42ed-943B-722E7E84B134}.exe {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe File created C:\Windows\{12C373F3-B231-45fe-9913-39A35F4A72E1}.exe {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe File created C:\Windows\{718CC33B-3CA2-4898-AC3D-A8043DC64F8F}.exe {918A4E3D-B2FC-413d-9C48-55F58FA6C144}.exe File created C:\Windows\{5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe File created C:\Windows\{0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2500 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe Token: SeIncBasePriorityPrivilege 2380 {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe Token: SeIncBasePriorityPrivilege 2300 {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe Token: SeIncBasePriorityPrivilege 3016 {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe Token: SeIncBasePriorityPrivilege 1196 {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe Token: SeIncBasePriorityPrivilege 2724 {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe Token: SeIncBasePriorityPrivilege 2432 {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe Token: SeIncBasePriorityPrivilege 1408 {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe Token: SeIncBasePriorityPrivilege 2180 {12C373F3-B231-45fe-9913-39A35F4A72E1}.exe Token: SeIncBasePriorityPrivilege 1984 {7D11A3D2-9807-4217-A541-4850F97AFE57}.exe Token: SeIncBasePriorityPrivilege 1244 {918A4E3D-B2FC-413d-9C48-55F58FA6C144}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2380 2500 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe 28 PID 2500 wrote to memory of 2380 2500 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe 28 PID 2500 wrote to memory of 2380 2500 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe 28 PID 2500 wrote to memory of 2380 2500 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe 28 PID 2500 wrote to memory of 788 2500 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe 29 PID 2500 wrote to memory of 788 2500 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe 29 PID 2500 wrote to memory of 788 2500 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe 29 PID 2500 wrote to memory of 788 2500 4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe 29 PID 2380 wrote to memory of 2300 2380 {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe 32 PID 2380 wrote to memory of 2300 2380 {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe 32 PID 2380 wrote to memory of 2300 2380 {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe 32 PID 2380 wrote to memory of 2300 2380 {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe 32 PID 2380 wrote to memory of 2712 2380 {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe 33 PID 2380 wrote to memory of 2712 2380 {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe 33 PID 2380 wrote to memory of 2712 2380 {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe 33 PID 2380 wrote to memory of 2712 2380 {621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe 33 PID 2300 wrote to memory of 3016 2300 {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe 34 PID 2300 wrote to memory of 3016 2300 {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe 34 PID 2300 wrote to memory of 3016 2300 {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe 34 PID 2300 wrote to memory of 3016 2300 {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe 34 PID 2300 wrote to memory of 2876 2300 {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe 35 PID 2300 wrote to memory of 2876 2300 {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe 35 PID 2300 wrote to memory of 2876 2300 {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe 35 PID 2300 wrote to memory of 2876 2300 {1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe 35 PID 3016 wrote to memory of 1196 3016 {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe 36 PID 3016 wrote to memory of 1196 3016 {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe 36 PID 3016 wrote to memory of 1196 3016 {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe 36 PID 3016 wrote to memory of 1196 3016 {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe 36 PID 3016 wrote to memory of 3012 3016 {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe 37 PID 3016 wrote to memory of 3012 3016 {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe 37 PID 3016 wrote to memory of 3012 3016 {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe 37 PID 3016 wrote to memory of 3012 3016 {5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe 37 PID 1196 wrote to memory of 2724 1196 {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe 38 PID 1196 wrote to memory of 2724 1196 {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe 38 PID 1196 wrote to memory of 2724 1196 {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe 38 PID 1196 wrote to memory of 2724 1196 {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe 38 PID 1196 wrote to memory of 1936 1196 {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe 39 PID 1196 wrote to memory of 1936 1196 {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe 39 PID 1196 wrote to memory of 1936 1196 {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe 39 PID 1196 wrote to memory of 1936 1196 {0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe 39 PID 2724 wrote to memory of 2432 2724 {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe 40 PID 2724 wrote to memory of 2432 2724 {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe 40 PID 2724 wrote to memory of 2432 2724 {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe 40 PID 2724 wrote to memory of 2432 2724 {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe 40 PID 2724 wrote to memory of 2068 2724 {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe 41 PID 2724 wrote to memory of 2068 2724 {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe 41 PID 2724 wrote to memory of 2068 2724 {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe 41 PID 2724 wrote to memory of 2068 2724 {8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe 41 PID 2432 wrote to memory of 1408 2432 {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe 42 PID 2432 wrote to memory of 1408 2432 {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe 42 PID 2432 wrote to memory of 1408 2432 {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe 42 PID 2432 wrote to memory of 1408 2432 {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe 42 PID 2432 wrote to memory of 1152 2432 {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe 43 PID 2432 wrote to memory of 1152 2432 {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe 43 PID 2432 wrote to memory of 1152 2432 {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe 43 PID 2432 wrote to memory of 1152 2432 {E1C63B27-5E87-42ed-943B-722E7E84B134}.exe 43 PID 1408 wrote to memory of 2180 1408 {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe 45 PID 1408 wrote to memory of 2180 1408 {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe 45 PID 1408 wrote to memory of 2180 1408 {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe 45 PID 1408 wrote to memory of 2180 1408 {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe 45 PID 1408 wrote to memory of 3040 1408 {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe 44 PID 1408 wrote to memory of 3040 1408 {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe 44 PID 1408 wrote to memory of 3040 1408 {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe 44 PID 1408 wrote to memory of 3040 1408 {EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe"C:\Users\Admin\AppData\Local\Temp\4e3a4dab1107babb8a340e5929eef324_goldeneye_JC.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\{621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exeC:\Windows\{621DEFA5-AB7E-49c5-8C78-F7ED27922862}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\{1EFB801E-833F-40f2-AC2F-0930E53E9546}.exeC:\Windows\{1EFB801E-833F-40f2-AC2F-0930E53E9546}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\{5A2E0793-E71A-401f-9101-E18FC75A8E09}.exeC:\Windows\{5A2E0793-E71A-401f-9101-E18FC75A8E09}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\{0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exeC:\Windows\{0BF182A6-752F-4fcd-A9FD-56C3E4B842B8}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\{8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exeC:\Windows\{8F84BF2B-8508-46c9-9EAC-B62DC147C165}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\{E1C63B27-5E87-42ed-943B-722E7E84B134}.exeC:\Windows\{E1C63B27-5E87-42ed-943B-722E7E84B134}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\{EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exeC:\Windows\{EDF8706F-3CB0-4680-990D-20AD3CF31F5D}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EDF87~1.EXE > nul9⤵PID:3040
-
-
C:\Windows\{12C373F3-B231-45fe-9913-39A35F4A72E1}.exeC:\Windows\{12C373F3-B231-45fe-9913-39A35F4A72E1}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\{7D11A3D2-9807-4217-A541-4850F97AFE57}.exeC:\Windows\{7D11A3D2-9807-4217-A541-4850F97AFE57}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\{918A4E3D-B2FC-413d-9C48-55F58FA6C144}.exeC:\Windows\{918A4E3D-B2FC-413d-9C48-55F58FA6C144}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Windows\{718CC33B-3CA2-4898-AC3D-A8043DC64F8F}.exeC:\Windows\{718CC33B-3CA2-4898-AC3D-A8043DC64F8F}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
PID:2904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{918A4~1.EXE > nul12⤵PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D11A~1.EXE > nul11⤵PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{12C37~1.EXE > nul10⤵PID:840
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1C63~1.EXE > nul8⤵PID:1152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F84B~1.EXE > nul7⤵PID:2068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0BF18~1.EXE > nul6⤵PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A2E0~1.EXE > nul5⤵PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1EFB8~1.EXE > nul4⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{621DE~1.EXE > nul3⤵PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\4E3A4D~1.EXE > nul2⤵
- Deletes itself
PID:788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5d8650eccb591982d53d9dca4370060f2
SHA1a3eae5b071982e749b49025ee2a97fa1348fe4fa
SHA256948ba4572b33f3d277c9c70b7c7945e2f3250bce19d8fc100367e39bf68f1a65
SHA5125988affdada1f611de35a4c919eff77a66b2525bff640920ac26cb1ed75e9fbc435bbb5f9f03676c66d55a12ff0bc3279be18c3475f5df0d8d4c1fbfeb55607e
-
Filesize
204KB
MD5d8650eccb591982d53d9dca4370060f2
SHA1a3eae5b071982e749b49025ee2a97fa1348fe4fa
SHA256948ba4572b33f3d277c9c70b7c7945e2f3250bce19d8fc100367e39bf68f1a65
SHA5125988affdada1f611de35a4c919eff77a66b2525bff640920ac26cb1ed75e9fbc435bbb5f9f03676c66d55a12ff0bc3279be18c3475f5df0d8d4c1fbfeb55607e
-
Filesize
204KB
MD5232aa86e947537cb0f93b77645ff4106
SHA1ceb53b22127aa338bdc800ff074b9428157cb156
SHA256fdc6101e63940443486638f709eebfcfc83a76243916e647abc148dc5dc9b425
SHA5129343a2829953e654ebca3c9bf99dacf59bf06e826e215e4f3b42f0f8d363c583fdcd2f67a7d32cd75d838a1599426a5fa8fb931ac671dc2ce33d935d832e3d31
-
Filesize
204KB
MD5232aa86e947537cb0f93b77645ff4106
SHA1ceb53b22127aa338bdc800ff074b9428157cb156
SHA256fdc6101e63940443486638f709eebfcfc83a76243916e647abc148dc5dc9b425
SHA5129343a2829953e654ebca3c9bf99dacf59bf06e826e215e4f3b42f0f8d363c583fdcd2f67a7d32cd75d838a1599426a5fa8fb931ac671dc2ce33d935d832e3d31
-
Filesize
204KB
MD5126473ac41e6bc927753f8b1839cc7a3
SHA1c079660161b11e8f99162b95c28732a78d5b4eb9
SHA256c93fc90b53c01332b5a1747f1624a8586b45497afd29ac88bcc1eb690b20b14c
SHA512a4a62fb34fa45adc7e5dcb308e5f4ff627ac5145cdccb52a7dce5cc62d2f2811e33d97040a5964eb2028043144a2c833e8b895eb6254c1252ca3c511e8a4539b
-
Filesize
204KB
MD5126473ac41e6bc927753f8b1839cc7a3
SHA1c079660161b11e8f99162b95c28732a78d5b4eb9
SHA256c93fc90b53c01332b5a1747f1624a8586b45497afd29ac88bcc1eb690b20b14c
SHA512a4a62fb34fa45adc7e5dcb308e5f4ff627ac5145cdccb52a7dce5cc62d2f2811e33d97040a5964eb2028043144a2c833e8b895eb6254c1252ca3c511e8a4539b
-
Filesize
204KB
MD5704b7c0f9373a7514acd17b5714c560c
SHA16212c4935a45ccc4d15d64ce3b4e3cca654fd4f9
SHA256de3b1790a10b373a088d9ee7d0fb372ae53a7959f1ffe00ea037dc896620d001
SHA512a1ccacd841b9c4a84d60e1b1096b516a49cf8a10557040773e9d160b99fb54451e30bea4fcfccb3eda0f241156a076a242806a280ce608a1b96326e2e660dc3c
-
Filesize
204KB
MD5704b7c0f9373a7514acd17b5714c560c
SHA16212c4935a45ccc4d15d64ce3b4e3cca654fd4f9
SHA256de3b1790a10b373a088d9ee7d0fb372ae53a7959f1ffe00ea037dc896620d001
SHA512a1ccacd841b9c4a84d60e1b1096b516a49cf8a10557040773e9d160b99fb54451e30bea4fcfccb3eda0f241156a076a242806a280ce608a1b96326e2e660dc3c
-
Filesize
204KB
MD53977ae2c4bf0a73bbb16d3d57f5e6f40
SHA1534b33ec2309c33a54268008028ffbe806f11857
SHA25673756c9efc1a9950f9180deee34386ac2f4a207410c138625155619ec36b90bc
SHA5124047f21bc06a24da16e6cedb8165d9fb249b9816df506cf011e72d8e459e3187da19c3bc14c4af0c1b4d5029bc6f80e367e7718369a223d297f387d7172aad97
-
Filesize
204KB
MD53977ae2c4bf0a73bbb16d3d57f5e6f40
SHA1534b33ec2309c33a54268008028ffbe806f11857
SHA25673756c9efc1a9950f9180deee34386ac2f4a207410c138625155619ec36b90bc
SHA5124047f21bc06a24da16e6cedb8165d9fb249b9816df506cf011e72d8e459e3187da19c3bc14c4af0c1b4d5029bc6f80e367e7718369a223d297f387d7172aad97
-
Filesize
204KB
MD53977ae2c4bf0a73bbb16d3d57f5e6f40
SHA1534b33ec2309c33a54268008028ffbe806f11857
SHA25673756c9efc1a9950f9180deee34386ac2f4a207410c138625155619ec36b90bc
SHA5124047f21bc06a24da16e6cedb8165d9fb249b9816df506cf011e72d8e459e3187da19c3bc14c4af0c1b4d5029bc6f80e367e7718369a223d297f387d7172aad97
-
Filesize
204KB
MD5935f749bba07fb41bd29b456afb46cda
SHA1dc43bd995db1a18c63accf2b516ca930adb4ba66
SHA256163ab69026e1bc789abe0bc8179c9e990c69cc1e668be31221022699c4b8d4aa
SHA512299eb17a9ed3a0464ff4fa8d2f1a3a71afd06a9f7b802b5d3fc9f78775532c6ba22b789e8aa54492c03a876389d38d0ef9fb4f4b850b02e81f22179d7b896ea8
-
Filesize
103KB
MD5ce050f8a7dc4e3bac98d3b577d8563ac
SHA1730332ffc8ef16fcbcde15509e12c3b37ab6ee4c
SHA256549d8daeb1e6e2e67baca6ae7ebd6ea2c5b44e84d7e605fe3032a92956a504cd
SHA5124b4ea03eedf39564d9a2f931f97a54dea06d5216dac7b3de7060c7e869a7bc3f381349de5d688f4ea3ed53c3c992df8931bed0071d7e45425118cad039856436
-
Filesize
204KB
MD5b11cda2769ccfaf5067492d5722c7b71
SHA1357d9351d3077f111ccd693a35c2479dc62f50b8
SHA25692c9cee5a7bc87aa77e00fa3426cdcfdf99d16da8e84fb05d5731df7b01f8401
SHA512e3669c536494d8937d2754053c4862299f79b7a6e7eb96604f05124707c21de876ab78bbbaeb04d4a396a3935e3abcbc65af1efa9d008492c03c06f47de85b0f
-
Filesize
204KB
MD5b11cda2769ccfaf5067492d5722c7b71
SHA1357d9351d3077f111ccd693a35c2479dc62f50b8
SHA25692c9cee5a7bc87aa77e00fa3426cdcfdf99d16da8e84fb05d5731df7b01f8401
SHA512e3669c536494d8937d2754053c4862299f79b7a6e7eb96604f05124707c21de876ab78bbbaeb04d4a396a3935e3abcbc65af1efa9d008492c03c06f47de85b0f
-
Filesize
204KB
MD55a56c68dd4e5091a9c0023445ee49f2c
SHA11417ec08d834e093633c3d2073d78939165f0887
SHA25622763c6e6f9e80aa2652148e633443de972351d446735d5f349b544b4068d98b
SHA5129b7d54f2b9c519569948a99f7db69d646c66f3aae679b4d03e2c6096399c43728942b1f9e5d5372be0c4485e7909419cf7a2c2c3e7d18c67a03bed01a0ba988a
-
Filesize
204KB
MD55a56c68dd4e5091a9c0023445ee49f2c
SHA11417ec08d834e093633c3d2073d78939165f0887
SHA25622763c6e6f9e80aa2652148e633443de972351d446735d5f349b544b4068d98b
SHA5129b7d54f2b9c519569948a99f7db69d646c66f3aae679b4d03e2c6096399c43728942b1f9e5d5372be0c4485e7909419cf7a2c2c3e7d18c67a03bed01a0ba988a
-
Filesize
204KB
MD51d62ed2f835bbed30e0006e20171e4f7
SHA1717e5ad008cabf463a8468a1f1fc84435f26065c
SHA2566f29fb4c3ebd61ea4bc0a009a2812f3cc3beb2306bfb598dde99170fe16e2544
SHA512afa103ea597222323355e7650e39a826b4537f4a447f40f2fb3a6ca81aa8e513ffb9afb2c56d8e1978df7cd53fdc6103267f9b615d5f3bd1a01c436c57483918
-
Filesize
204KB
MD51d62ed2f835bbed30e0006e20171e4f7
SHA1717e5ad008cabf463a8468a1f1fc84435f26065c
SHA2566f29fb4c3ebd61ea4bc0a009a2812f3cc3beb2306bfb598dde99170fe16e2544
SHA512afa103ea597222323355e7650e39a826b4537f4a447f40f2fb3a6ca81aa8e513ffb9afb2c56d8e1978df7cd53fdc6103267f9b615d5f3bd1a01c436c57483918
-
Filesize
204KB
MD5c609fd00020fda0f7d9ca5d4685ad870
SHA11ebf343a8b9d00dea03b0455b9bcd84ed5c4ba3e
SHA256a678f04200d3db26bdf78484c7d176893674111504080b9c3e45bf5ced484ef5
SHA512e9d7a7e054cc77a59cd4984be5ed4d5ebd85bd62acdb60fc3882c63d1f11382b80f024becf9a5b68f45f624ca8044d4becfa5aaf333aa395aaa02463d4d9834b
-
Filesize
204KB
MD5c609fd00020fda0f7d9ca5d4685ad870
SHA11ebf343a8b9d00dea03b0455b9bcd84ed5c4ba3e
SHA256a678f04200d3db26bdf78484c7d176893674111504080b9c3e45bf5ced484ef5
SHA512e9d7a7e054cc77a59cd4984be5ed4d5ebd85bd62acdb60fc3882c63d1f11382b80f024becf9a5b68f45f624ca8044d4becfa5aaf333aa395aaa02463d4d9834b
-
Filesize
204KB
MD5f227ecf3e40981cca58b8c33f6501c76
SHA1fc103b0404809afb131d62ef0e0ea51b42fce89c
SHA25686bd42ca6798395460ea1bc2b7663a09825a96240120f1d2bd7dc31b33c4a645
SHA512db8942fffae55a868288cab5fab20ecf3208150102f58241f13508175f72ac43e705f086971ee4353cc7ae9a4770cd703f3e4cb158817ade7ed1afe42bb5d5d1
-
Filesize
204KB
MD5f227ecf3e40981cca58b8c33f6501c76
SHA1fc103b0404809afb131d62ef0e0ea51b42fce89c
SHA25686bd42ca6798395460ea1bc2b7663a09825a96240120f1d2bd7dc31b33c4a645
SHA512db8942fffae55a868288cab5fab20ecf3208150102f58241f13508175f72ac43e705f086971ee4353cc7ae9a4770cd703f3e4cb158817ade7ed1afe42bb5d5d1