Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2023 14:45
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe
Resource
win10v2004-20230703-en
General
-
Target
2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe
-
Size
204KB
-
MD5
21c7814c95e5a510c2e6e538e62dba15
-
SHA1
e57d1312d10c43a981299c12af06d54fda5ac902
-
SHA256
bedda55a233c9dff70e80311718207465dd17795b582f3b73bef45de9f5eac1e
-
SHA512
e02466efd77a6412dd16732fa958234e552a7e20a5e5f8c732c6b101b00c1e159c12658711ea95fbcaeb987e14d766b5b64749740a8ae276373a369188ffd55e
-
SSDEEP
1536:1EGh0oTl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oTl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6BCF8150-1F25-4549-B7F6-02241EEFE950} {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{137267BB-2FF0-48f2-888B-21E0A14F044A}\stubpath = "C:\\Windows\\{137267BB-2FF0-48f2-888B-21E0A14F044A}.exe" {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D183FA62-8932-4dd0-8A3F-4B8A44E39A01}\stubpath = "C:\\Windows\\{D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe" {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1B28B13-7457-47cd-A3D3-CB6E27573BF7} {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D25A143-B325-4893-BA18-CD5CC28FCE02} {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDC339BB-3861-4655-8AE0-DD5D4D0E7A28} {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}\stubpath = "C:\\Windows\\{EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe" {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{04DE6960-46A4-4a5a-BE00-2FC260768AA6} {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D183FA62-8932-4dd0-8A3F-4B8A44E39A01} {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1B28B13-7457-47cd-A3D3-CB6E27573BF7}\stubpath = "C:\\Windows\\{E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe" {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69B48385-D92E-4902-9F1E-2C13FA22EA67}\stubpath = "C:\\Windows\\{69B48385-D92E-4902-9F1E-2C13FA22EA67}.exe" {E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92B4FE32-7B4A-4165-864C-262D96853E32} {69B48385-D92E-4902-9F1E-2C13FA22EA67}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C05A55C-24A5-4cb2-A9B4-CA363FE427AA} 2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}\stubpath = "C:\\Windows\\{0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe" 2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D25A143-B325-4893-BA18-CD5CC28FCE02}\stubpath = "C:\\Windows\\{8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe" {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{04DE6960-46A4-4a5a-BE00-2FC260768AA6}\stubpath = "C:\\Windows\\{04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe" {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6BCF8150-1F25-4549-B7F6-02241EEFE950}\stubpath = "C:\\Windows\\{6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe" {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69B48385-D92E-4902-9F1E-2C13FA22EA67} {E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C290A7A0-CE28-4b4e-965A-6B8BA9105616}\stubpath = "C:\\Windows\\{C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe" {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F24F816-6EDE-441f-8023-BA52394CC1C8} {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{137267BB-2FF0-48f2-888B-21E0A14F044A} {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92B4FE32-7B4A-4165-864C-262D96853E32}\stubpath = "C:\\Windows\\{92B4FE32-7B4A-4165-864C-262D96853E32}.exe" {69B48385-D92E-4902-9F1E-2C13FA22EA67}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C290A7A0-CE28-4b4e-965A-6B8BA9105616} {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F24F816-6EDE-441f-8023-BA52394CC1C8}\stubpath = "C:\\Windows\\{3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe" {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe -
Executes dropped EXE 12 IoCs
pid Process 1152 {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe 1204 {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe 2608 {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe 4888 {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe 1180 {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe 4316 {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe 3380 {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe 4860 {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe 2268 {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe 2696 {E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe 4164 {69B48385-D92E-4902-9F1E-2C13FA22EA67}.exe 4576 {92B4FE32-7B4A-4165-864C-262D96853E32}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{92B4FE32-7B4A-4165-864C-262D96853E32}.exe {69B48385-D92E-4902-9F1E-2C13FA22EA67}.exe File created C:\Windows\{8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe File created C:\Windows\{EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe File created C:\Windows\{6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe File created C:\Windows\{137267BB-2FF0-48f2-888B-21E0A14F044A}.exe {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe File created C:\Windows\{D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe File created C:\Windows\{69B48385-D92E-4902-9F1E-2C13FA22EA67}.exe {E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe File created C:\Windows\{0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe 2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe File created C:\Windows\{C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe File created C:\Windows\{3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe File created C:\Windows\{04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe File created C:\Windows\{E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4392 2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe Token: SeIncBasePriorityPrivilege 1152 {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe Token: SeIncBasePriorityPrivilege 1204 {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe Token: SeIncBasePriorityPrivilege 2608 {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe Token: SeIncBasePriorityPrivilege 4888 {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe Token: SeIncBasePriorityPrivilege 1180 {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe Token: SeIncBasePriorityPrivilege 4316 {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe Token: SeIncBasePriorityPrivilege 3380 {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe Token: SeIncBasePriorityPrivilege 4860 {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe Token: SeIncBasePriorityPrivilege 2268 {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe Token: SeIncBasePriorityPrivilege 2696 {E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe Token: SeIncBasePriorityPrivilege 4164 {69B48385-D92E-4902-9F1E-2C13FA22EA67}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 1152 4392 2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe 90 PID 4392 wrote to memory of 1152 4392 2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe 90 PID 4392 wrote to memory of 1152 4392 2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe 90 PID 4392 wrote to memory of 1828 4392 2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe 91 PID 4392 wrote to memory of 1828 4392 2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe 91 PID 4392 wrote to memory of 1828 4392 2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe 91 PID 1152 wrote to memory of 1204 1152 {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe 92 PID 1152 wrote to memory of 1204 1152 {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe 92 PID 1152 wrote to memory of 1204 1152 {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe 92 PID 1152 wrote to memory of 212 1152 {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe 93 PID 1152 wrote to memory of 212 1152 {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe 93 PID 1152 wrote to memory of 212 1152 {0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe 93 PID 1204 wrote to memory of 2608 1204 {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe 96 PID 1204 wrote to memory of 2608 1204 {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe 96 PID 1204 wrote to memory of 2608 1204 {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe 96 PID 1204 wrote to memory of 4620 1204 {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe 95 PID 1204 wrote to memory of 4620 1204 {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe 95 PID 1204 wrote to memory of 4620 1204 {C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe 95 PID 2608 wrote to memory of 4888 2608 {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe 97 PID 2608 wrote to memory of 4888 2608 {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe 97 PID 2608 wrote to memory of 4888 2608 {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe 97 PID 2608 wrote to memory of 5108 2608 {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe 98 PID 2608 wrote to memory of 5108 2608 {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe 98 PID 2608 wrote to memory of 5108 2608 {3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe 98 PID 4888 wrote to memory of 1180 4888 {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe 99 PID 4888 wrote to memory of 1180 4888 {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe 99 PID 4888 wrote to memory of 1180 4888 {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe 99 PID 4888 wrote to memory of 1648 4888 {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe 100 PID 4888 wrote to memory of 1648 4888 {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe 100 PID 4888 wrote to memory of 1648 4888 {8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe 100 PID 1180 wrote to memory of 4316 1180 {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe 101 PID 1180 wrote to memory of 4316 1180 {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe 101 PID 1180 wrote to memory of 4316 1180 {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe 101 PID 1180 wrote to memory of 3184 1180 {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe 102 PID 1180 wrote to memory of 3184 1180 {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe 102 PID 1180 wrote to memory of 3184 1180 {EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe 102 PID 4316 wrote to memory of 3380 4316 {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe 103 PID 4316 wrote to memory of 3380 4316 {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe 103 PID 4316 wrote to memory of 3380 4316 {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe 103 PID 4316 wrote to memory of 5096 4316 {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe 104 PID 4316 wrote to memory of 5096 4316 {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe 104 PID 4316 wrote to memory of 5096 4316 {04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe 104 PID 3380 wrote to memory of 4860 3380 {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe 105 PID 3380 wrote to memory of 4860 3380 {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe 105 PID 3380 wrote to memory of 4860 3380 {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe 105 PID 3380 wrote to memory of 3840 3380 {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe 106 PID 3380 wrote to memory of 3840 3380 {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe 106 PID 3380 wrote to memory of 3840 3380 {6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe 106 PID 4860 wrote to memory of 2268 4860 {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe 107 PID 4860 wrote to memory of 2268 4860 {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe 107 PID 4860 wrote to memory of 2268 4860 {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe 107 PID 4860 wrote to memory of 3104 4860 {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe 108 PID 4860 wrote to memory of 3104 4860 {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe 108 PID 4860 wrote to memory of 3104 4860 {137267BB-2FF0-48f2-888B-21E0A14F044A}.exe 108 PID 2268 wrote to memory of 2696 2268 {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe 109 PID 2268 wrote to memory of 2696 2268 {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe 109 PID 2268 wrote to memory of 2696 2268 {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe 109 PID 2268 wrote to memory of 1992 2268 {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe 110 PID 2268 wrote to memory of 1992 2268 {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe 110 PID 2268 wrote to memory of 1992 2268 {D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe 110 PID 2696 wrote to memory of 4164 2696 {E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe 111 PID 2696 wrote to memory of 4164 2696 {E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe 111 PID 2696 wrote to memory of 4164 2696 {E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe 111 PID 2696 wrote to memory of 3288 2696 {E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-22_21c7814c95e5a510c2e6e538e62dba15_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\{0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exeC:\Windows\{0C05A55C-24A5-4cb2-A9B4-CA363FE427AA}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\{C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exeC:\Windows\{C290A7A0-CE28-4b4e-965A-6B8BA9105616}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C290A~1.EXE > nul4⤵PID:4620
-
-
C:\Windows\{3F24F816-6EDE-441f-8023-BA52394CC1C8}.exeC:\Windows\{3F24F816-6EDE-441f-8023-BA52394CC1C8}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\{8D25A143-B325-4893-BA18-CD5CC28FCE02}.exeC:\Windows\{8D25A143-B325-4893-BA18-CD5CC28FCE02}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\{EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exeC:\Windows\{EDC339BB-3861-4655-8AE0-DD5D4D0E7A28}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\{04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exeC:\Windows\{04DE6960-46A4-4a5a-BE00-2FC260768AA6}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\{6BCF8150-1F25-4549-B7F6-02241EEFE950}.exeC:\Windows\{6BCF8150-1F25-4549-B7F6-02241EEFE950}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\{137267BB-2FF0-48f2-888B-21E0A14F044A}.exeC:\Windows\{137267BB-2FF0-48f2-888B-21E0A14F044A}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\{D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exeC:\Windows\{D183FA62-8932-4dd0-8A3F-4B8A44E39A01}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\{E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exeC:\Windows\{E1B28B13-7457-47cd-A3D3-CB6E27573BF7}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\{69B48385-D92E-4902-9F1E-2C13FA22EA67}.exeC:\Windows\{69B48385-D92E-4902-9F1E-2C13FA22EA67}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4164 -
C:\Windows\{92B4FE32-7B4A-4165-864C-262D96853E32}.exeC:\Windows\{92B4FE32-7B4A-4165-864C-262D96853E32}.exe13⤵
- Executes dropped EXE
PID:4576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69B48~1.EXE > nul13⤵PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1B28~1.EXE > nul12⤵PID:3288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D183F~1.EXE > nul11⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{13726~1.EXE > nul10⤵PID:3104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6BCF8~1.EXE > nul9⤵PID:3840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{04DE6~1.EXE > nul8⤵PID:5096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EDC33~1.EXE > nul7⤵PID:3184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D25A~1.EXE > nul6⤵PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3F24F~1.EXE > nul5⤵PID:5108
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0C05A~1.EXE > nul3⤵PID:212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2023-0~1.EXE > nul2⤵PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5ab920fc381b22d1aa2d7a40ac0f9bb8a
SHA19860e80a87703c70ab670a9f968c08d5f0394ebc
SHA2566862c879d3acc286cee60f35876e9bfb704356453db15a8a6937c9a7837ebb0d
SHA5121db29ac3734aaa637cab298fb9f5483531368ef96bb2aedfc69d3829141678a1a5534052b89a81d59c045a52b0dc7c3bc7476c836431d813621feb1a443717d1
-
Filesize
204KB
MD5ab920fc381b22d1aa2d7a40ac0f9bb8a
SHA19860e80a87703c70ab670a9f968c08d5f0394ebc
SHA2566862c879d3acc286cee60f35876e9bfb704356453db15a8a6937c9a7837ebb0d
SHA5121db29ac3734aaa637cab298fb9f5483531368ef96bb2aedfc69d3829141678a1a5534052b89a81d59c045a52b0dc7c3bc7476c836431d813621feb1a443717d1
-
Filesize
204KB
MD5ae82f9d3ef1ac6f41b22ebc59c0eaad3
SHA13f2a1c430e4a1b31098f899662391f32e9ecd8ae
SHA256630234650eff013d7f14f12a43bf49cc08060818a96a2444685e0f8be7fe2ef8
SHA5123fa8173c71a4ec2b5c8815c2322f80424662d83c8f347eacbb13174a9dfe292d368098a7eb8adaef90aece37228bd61723b8e31b5c8934e48a2e437a88bfb2df
-
Filesize
204KB
MD5ae82f9d3ef1ac6f41b22ebc59c0eaad3
SHA13f2a1c430e4a1b31098f899662391f32e9ecd8ae
SHA256630234650eff013d7f14f12a43bf49cc08060818a96a2444685e0f8be7fe2ef8
SHA5123fa8173c71a4ec2b5c8815c2322f80424662d83c8f347eacbb13174a9dfe292d368098a7eb8adaef90aece37228bd61723b8e31b5c8934e48a2e437a88bfb2df
-
Filesize
204KB
MD5dd3474c58befdcf04a0acaf7f24cd6e9
SHA1b8d603a9f654e41ea7bc5f77c8c7ba4b396e82e5
SHA256a8d6211365cd20a96d61f6e13e2dcda04d6a7f618893336586f5adaae87b03f4
SHA5123f03a28a4fc2b760f5f72ebdbddd048327d1aa3b77c2bf428680ce330f423e23a11e2b92b41870c8bd991ea061a8ae6e3e7d13aa542797888ff528cf303a1429
-
Filesize
204KB
MD5dd3474c58befdcf04a0acaf7f24cd6e9
SHA1b8d603a9f654e41ea7bc5f77c8c7ba4b396e82e5
SHA256a8d6211365cd20a96d61f6e13e2dcda04d6a7f618893336586f5adaae87b03f4
SHA5123f03a28a4fc2b760f5f72ebdbddd048327d1aa3b77c2bf428680ce330f423e23a11e2b92b41870c8bd991ea061a8ae6e3e7d13aa542797888ff528cf303a1429
-
Filesize
204KB
MD58c0ccede8ac7dd3e4026c7dade18aa83
SHA1be202c0afd7c98f3f8ad6cd3e314477e24271fdf
SHA2564022f08ba9fe8ad713e4529413056d2c596a6edf5d7113d81a990b9633e0f6c9
SHA5127dd856c06787b81b7f325a5c1da955f41efa6f3b51beff0d6542e7488f69924af72517489c10dbd8c832bf8380235ebc3fe18b8d4aa6415d867e56b288abf3e4
-
Filesize
204KB
MD58c0ccede8ac7dd3e4026c7dade18aa83
SHA1be202c0afd7c98f3f8ad6cd3e314477e24271fdf
SHA2564022f08ba9fe8ad713e4529413056d2c596a6edf5d7113d81a990b9633e0f6c9
SHA5127dd856c06787b81b7f325a5c1da955f41efa6f3b51beff0d6542e7488f69924af72517489c10dbd8c832bf8380235ebc3fe18b8d4aa6415d867e56b288abf3e4
-
Filesize
204KB
MD58c0ccede8ac7dd3e4026c7dade18aa83
SHA1be202c0afd7c98f3f8ad6cd3e314477e24271fdf
SHA2564022f08ba9fe8ad713e4529413056d2c596a6edf5d7113d81a990b9633e0f6c9
SHA5127dd856c06787b81b7f325a5c1da955f41efa6f3b51beff0d6542e7488f69924af72517489c10dbd8c832bf8380235ebc3fe18b8d4aa6415d867e56b288abf3e4
-
Filesize
204KB
MD56f5871403ea018cd9090b65a8acb203f
SHA120f1ce29a122f9f79cef41dce5e909a786aa1f14
SHA256cd63960e67aec42730ae0a004ce4e127fdc7e18d21133c95882ef8e27c619d33
SHA512e9e0a8faf91509a4276cd747fd50b6be593d97d272b280124090fa8062e2194450819a1034646a33b8ace25ee876ae8275c47b31881197b45b4ae8c77354cab0
-
Filesize
204KB
MD56f5871403ea018cd9090b65a8acb203f
SHA120f1ce29a122f9f79cef41dce5e909a786aa1f14
SHA256cd63960e67aec42730ae0a004ce4e127fdc7e18d21133c95882ef8e27c619d33
SHA512e9e0a8faf91509a4276cd747fd50b6be593d97d272b280124090fa8062e2194450819a1034646a33b8ace25ee876ae8275c47b31881197b45b4ae8c77354cab0
-
Filesize
204KB
MD5d8b0c342b520920c8285c162bb3771cf
SHA1e5f06361c2d6163312fd7aad66d25aa9d7997e80
SHA256284c73013b0792079b6905dbcbc748fe246ff6beb620f6d9f2d7eafd561ade16
SHA512388c65a796d74ed883b38f0bb751a85b99aba6b012f43a78fa47bc3a675bf4218781fc27dfc2016b59b0a2557f301d36515b71c04b254b3a1b64d9d224364168
-
Filesize
204KB
MD5d8b0c342b520920c8285c162bb3771cf
SHA1e5f06361c2d6163312fd7aad66d25aa9d7997e80
SHA256284c73013b0792079b6905dbcbc748fe246ff6beb620f6d9f2d7eafd561ade16
SHA512388c65a796d74ed883b38f0bb751a85b99aba6b012f43a78fa47bc3a675bf4218781fc27dfc2016b59b0a2557f301d36515b71c04b254b3a1b64d9d224364168
-
Filesize
204KB
MD5d57066bc16ec75fd75864a38c45528e7
SHA11d6d96357320dbb1bf87ef1d3cf7cba2517a8d45
SHA25683ed60aaef84050cf4995ef6a6e56ea1aa0ad94afe5a8b6976a460c9ee743c93
SHA51273d82765e2a3575f574136d0dfc5f94c7fbaa0dabb183f7d722676cce6542ff842898adaa9732db359818d902ccd8d334c0670d46c85584a8ce191051b5de569
-
Filesize
204KB
MD5d57066bc16ec75fd75864a38c45528e7
SHA11d6d96357320dbb1bf87ef1d3cf7cba2517a8d45
SHA25683ed60aaef84050cf4995ef6a6e56ea1aa0ad94afe5a8b6976a460c9ee743c93
SHA51273d82765e2a3575f574136d0dfc5f94c7fbaa0dabb183f7d722676cce6542ff842898adaa9732db359818d902ccd8d334c0670d46c85584a8ce191051b5de569
-
Filesize
204KB
MD52c99c6df7b825f364b29dd1957fab043
SHA15039ddad9d4d45a66040fae3487fe4cbdade72ec
SHA2560759340b0ab316b7c0f6f359a0bdfa56108818f6eede39574467a917809cdaa0
SHA512ef8dde1fbe5958e39953bf7a75ea6b0f6aae8624ed538f79002217f2b05946e3fa95d24e4c0b1cbb1c3b5c66c961bac2a141fab8f5119aeeb04347f2ec6b296c
-
Filesize
204KB
MD52c99c6df7b825f364b29dd1957fab043
SHA15039ddad9d4d45a66040fae3487fe4cbdade72ec
SHA2560759340b0ab316b7c0f6f359a0bdfa56108818f6eede39574467a917809cdaa0
SHA512ef8dde1fbe5958e39953bf7a75ea6b0f6aae8624ed538f79002217f2b05946e3fa95d24e4c0b1cbb1c3b5c66c961bac2a141fab8f5119aeeb04347f2ec6b296c
-
Filesize
204KB
MD562bd0e3745ca313cf941bd32003891ec
SHA141525b611fba516f55ed04dec32a6e6147c268fb
SHA256135ea9c4cfda16e90cd63b1178f5416723b325cb36996be6ae99a0ae35b1dd43
SHA5129489a0d24161e3404b4cd388e9a9f575d4f7fb17af4edd16c989a2a64ea7d098757b44c1b76da04a60df1cae26d6ff8ce4ac479be29afdbcc85c2fc6fb4eb53b
-
Filesize
204KB
MD562bd0e3745ca313cf941bd32003891ec
SHA141525b611fba516f55ed04dec32a6e6147c268fb
SHA256135ea9c4cfda16e90cd63b1178f5416723b325cb36996be6ae99a0ae35b1dd43
SHA5129489a0d24161e3404b4cd388e9a9f575d4f7fb17af4edd16c989a2a64ea7d098757b44c1b76da04a60df1cae26d6ff8ce4ac479be29afdbcc85c2fc6fb4eb53b
-
Filesize
204KB
MD5688b4f46bf360386853615ddcdc5b35f
SHA1fa7d8c1503b0b54dba0fef07df2b8017b784bc79
SHA256b92b6c3f1229811e7613cd001bc113cef980981c35891ed95a948a97eb3e88b4
SHA5120cfd283fed059dfb053e030159645fd817d473ed4172c3553f95ff6e1eed0865d888a1d326c3f0a80cbab4e3ac9782903ed44ad50884814869085dbd4c86bb7b
-
Filesize
204KB
MD5688b4f46bf360386853615ddcdc5b35f
SHA1fa7d8c1503b0b54dba0fef07df2b8017b784bc79
SHA256b92b6c3f1229811e7613cd001bc113cef980981c35891ed95a948a97eb3e88b4
SHA5120cfd283fed059dfb053e030159645fd817d473ed4172c3553f95ff6e1eed0865d888a1d326c3f0a80cbab4e3ac9782903ed44ad50884814869085dbd4c86bb7b
-
Filesize
204KB
MD587d23ce29d587a04b64a1f0c7b955060
SHA1f66dd54800c71e8a567168d56ee528ec4fda8a65
SHA25619da63418d33e643bf68bdec52cceab4e1039a8c774524c3439a92d76080ae05
SHA51281d514769bf70958589577f8fb24bf2c295840499b58198da6691c1ff1046382ee9b60f729108b49c62fefed86762e47f108e67a7c3379220db6abbf7d7c0ca8
-
Filesize
204KB
MD587d23ce29d587a04b64a1f0c7b955060
SHA1f66dd54800c71e8a567168d56ee528ec4fda8a65
SHA25619da63418d33e643bf68bdec52cceab4e1039a8c774524c3439a92d76080ae05
SHA51281d514769bf70958589577f8fb24bf2c295840499b58198da6691c1ff1046382ee9b60f729108b49c62fefed86762e47f108e67a7c3379220db6abbf7d7c0ca8
-
Filesize
204KB
MD5d76527d6bf8f01f3d98694a69f226acb
SHA1d4ead74dee646f23b8e51b9a44902a2faa68ded6
SHA256342ccac869346748b77e6d15ef19bbabed0b76997bf83fbd631977c0a7c3d158
SHA512f1aa6a86210e0212ea22b19c900f30e2faa961e68e4d54f2311c07a2f60a4c4dc3d104eef740d908c7060fa37f2479b4973cfd08d968cf1dc4496f6b3be2d63b
-
Filesize
204KB
MD5d76527d6bf8f01f3d98694a69f226acb
SHA1d4ead74dee646f23b8e51b9a44902a2faa68ded6
SHA256342ccac869346748b77e6d15ef19bbabed0b76997bf83fbd631977c0a7c3d158
SHA512f1aa6a86210e0212ea22b19c900f30e2faa961e68e4d54f2311c07a2f60a4c4dc3d104eef740d908c7060fa37f2479b4973cfd08d968cf1dc4496f6b3be2d63b