Analysis
-
max time kernel
151s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe
-
Size
168KB
-
MD5
a18e52bc0088450ee6731e39e2377d3c
-
SHA1
42c6944c31befd223f7969995a826969fcd26575
-
SHA256
508cd5b6b3c97484cd9f3af60164fe98488bd4dfed938808208f8abd4629042d
-
SHA512
58242fe09ac1261c17debaad6e3a9d6ec3e70b99d75a83566fb2354bc452d38afc3eec969ff8b4d1a29c420a98a1b740179dbeebc171f19fb768b9fb25e4cef4
-
SSDEEP
1536:1EGh0oelq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oelqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0AF478E3-74E1-4a4d-8157-68454E880F64}\stubpath = "C:\\Windows\\{0AF478E3-74E1-4a4d-8157-68454E880F64}.exe" {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D19421D-0D39-4512-A537-D46EF80BBAC7} {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D19421D-0D39-4512-A537-D46EF80BBAC7}\stubpath = "C:\\Windows\\{0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe" {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6AB34E71-0B0D-40c0-8E0E-24F226823332} {4C349E70-ACF6-485b-B226-A3C9447B265F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8}\stubpath = "C:\\Windows\\{A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8}.exe" {6AB34E71-0B0D-40c0-8E0E-24F226823332}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F14B131-D7FA-4575-A55F-CE3B337CD04A}\stubpath = "C:\\Windows\\{6F14B131-D7FA-4575-A55F-CE3B337CD04A}.exe" {A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B9106C-5B9F-4ac6-9744-F25432BF73A4} a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B9106C-5B9F-4ac6-9744-F25432BF73A4}\stubpath = "C:\\Windows\\{08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe" a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7CD2BD63-D4CB-4407-9460-1503673389B6} {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0} {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8} {6AB34E71-0B0D-40c0-8E0E-24F226823332}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26A36DB9-F0F3-4df6-AFFD-C05170F55DA7} {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0AF478E3-74E1-4a4d-8157-68454E880F64} {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{65D7305C-2014-47e3-A915-25803796446C} {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C} {65D7305C-2014-47e3-A915-25803796446C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}\stubpath = "C:\\Windows\\{0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe" {65D7305C-2014-47e3-A915-25803796446C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0}\stubpath = "C:\\Windows\\{10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0}.exe" {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4C349E70-ACF6-485b-B226-A3C9447B265F} {10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F14B131-D7FA-4575-A55F-CE3B337CD04A} {A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7CD2BD63-D4CB-4407-9460-1503673389B6}\stubpath = "C:\\Windows\\{7CD2BD63-D4CB-4407-9460-1503673389B6}.exe" {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}\stubpath = "C:\\Windows\\{26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe" {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{65D7305C-2014-47e3-A915-25803796446C}\stubpath = "C:\\Windows\\{65D7305C-2014-47e3-A915-25803796446C}.exe" {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4C349E70-ACF6-485b-B226-A3C9447B265F}\stubpath = "C:\\Windows\\{4C349E70-ACF6-485b-B226-A3C9447B265F}.exe" {10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6AB34E71-0B0D-40c0-8E0E-24F226823332}\stubpath = "C:\\Windows\\{6AB34E71-0B0D-40c0-8E0E-24F226823332}.exe" {4C349E70-ACF6-485b-B226-A3C9447B265F}.exe -
Deletes itself 1 IoCs
pid Process 2980 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2252 {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe 2824 {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe 1076 {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe 2848 {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe 2700 {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe 1636 {65D7305C-2014-47e3-A915-25803796446C}.exe 336 {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe 1196 {10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0}.exe 1480 {4C349E70-ACF6-485b-B226-A3C9447B265F}.exe 2428 {6AB34E71-0B0D-40c0-8E0E-24F226823332}.exe 2988 {A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8}.exe 1980 {6F14B131-D7FA-4575-A55F-CE3B337CD04A}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8}.exe {6AB34E71-0B0D-40c0-8E0E-24F226823332}.exe File created C:\Windows\{6F14B131-D7FA-4575-A55F-CE3B337CD04A}.exe {A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8}.exe File created C:\Windows\{08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe File created C:\Windows\{0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe File created C:\Windows\{0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe {65D7305C-2014-47e3-A915-25803796446C}.exe File created C:\Windows\{10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0}.exe {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe File created C:\Windows\{6AB34E71-0B0D-40c0-8E0E-24F226823332}.exe {4C349E70-ACF6-485b-B226-A3C9447B265F}.exe File created C:\Windows\{7CD2BD63-D4CB-4407-9460-1503673389B6}.exe {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe File created C:\Windows\{26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe File created C:\Windows\{0AF478E3-74E1-4a4d-8157-68454E880F64}.exe {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe File created C:\Windows\{65D7305C-2014-47e3-A915-25803796446C}.exe {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe File created C:\Windows\{4C349E70-ACF6-485b-B226-A3C9447B265F}.exe {10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1796 a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe Token: SeIncBasePriorityPrivilege 2252 {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe Token: SeIncBasePriorityPrivilege 2824 {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe Token: SeIncBasePriorityPrivilege 1076 {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe Token: SeIncBasePriorityPrivilege 2848 {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe Token: SeIncBasePriorityPrivilege 2700 {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe Token: SeIncBasePriorityPrivilege 1636 {65D7305C-2014-47e3-A915-25803796446C}.exe Token: SeIncBasePriorityPrivilege 336 {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe Token: SeIncBasePriorityPrivilege 1196 {10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0}.exe Token: SeIncBasePriorityPrivilege 1480 {4C349E70-ACF6-485b-B226-A3C9447B265F}.exe Token: SeIncBasePriorityPrivilege 2428 {6AB34E71-0B0D-40c0-8E0E-24F226823332}.exe Token: SeIncBasePriorityPrivilege 2988 {A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2252 1796 a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe 28 PID 1796 wrote to memory of 2252 1796 a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe 28 PID 1796 wrote to memory of 2252 1796 a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe 28 PID 1796 wrote to memory of 2252 1796 a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe 28 PID 1796 wrote to memory of 2980 1796 a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe 29 PID 1796 wrote to memory of 2980 1796 a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe 29 PID 1796 wrote to memory of 2980 1796 a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe 29 PID 1796 wrote to memory of 2980 1796 a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe 29 PID 2252 wrote to memory of 2824 2252 {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe 30 PID 2252 wrote to memory of 2824 2252 {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe 30 PID 2252 wrote to memory of 2824 2252 {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe 30 PID 2252 wrote to memory of 2824 2252 {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe 30 PID 2252 wrote to memory of 2932 2252 {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe 31 PID 2252 wrote to memory of 2932 2252 {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe 31 PID 2252 wrote to memory of 2932 2252 {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe 31 PID 2252 wrote to memory of 2932 2252 {08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe 31 PID 2824 wrote to memory of 1076 2824 {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe 34 PID 2824 wrote to memory of 1076 2824 {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe 34 PID 2824 wrote to memory of 1076 2824 {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe 34 PID 2824 wrote to memory of 1076 2824 {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe 34 PID 2824 wrote to memory of 2860 2824 {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe 35 PID 2824 wrote to memory of 2860 2824 {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe 35 PID 2824 wrote to memory of 2860 2824 {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe 35 PID 2824 wrote to memory of 2860 2824 {7CD2BD63-D4CB-4407-9460-1503673389B6}.exe 35 PID 1076 wrote to memory of 2848 1076 {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe 36 PID 1076 wrote to memory of 2848 1076 {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe 36 PID 1076 wrote to memory of 2848 1076 {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe 36 PID 1076 wrote to memory of 2848 1076 {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe 36 PID 1076 wrote to memory of 2744 1076 {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe 37 PID 1076 wrote to memory of 2744 1076 {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe 37 PID 1076 wrote to memory of 2744 1076 {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe 37 PID 1076 wrote to memory of 2744 1076 {26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe 37 PID 2848 wrote to memory of 2700 2848 {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe 38 PID 2848 wrote to memory of 2700 2848 {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe 38 PID 2848 wrote to memory of 2700 2848 {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe 38 PID 2848 wrote to memory of 2700 2848 {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe 38 PID 2848 wrote to memory of 2760 2848 {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe 39 PID 2848 wrote to memory of 2760 2848 {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe 39 PID 2848 wrote to memory of 2760 2848 {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe 39 PID 2848 wrote to memory of 2760 2848 {0AF478E3-74E1-4a4d-8157-68454E880F64}.exe 39 PID 2700 wrote to memory of 1636 2700 {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe 40 PID 2700 wrote to memory of 1636 2700 {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe 40 PID 2700 wrote to memory of 1636 2700 {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe 40 PID 2700 wrote to memory of 1636 2700 {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe 40 PID 2700 wrote to memory of 2156 2700 {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe 41 PID 2700 wrote to memory of 2156 2700 {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe 41 PID 2700 wrote to memory of 2156 2700 {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe 41 PID 2700 wrote to memory of 2156 2700 {0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe 41 PID 1636 wrote to memory of 336 1636 {65D7305C-2014-47e3-A915-25803796446C}.exe 42 PID 1636 wrote to memory of 336 1636 {65D7305C-2014-47e3-A915-25803796446C}.exe 42 PID 1636 wrote to memory of 336 1636 {65D7305C-2014-47e3-A915-25803796446C}.exe 42 PID 1636 wrote to memory of 336 1636 {65D7305C-2014-47e3-A915-25803796446C}.exe 42 PID 1636 wrote to memory of 984 1636 {65D7305C-2014-47e3-A915-25803796446C}.exe 43 PID 1636 wrote to memory of 984 1636 {65D7305C-2014-47e3-A915-25803796446C}.exe 43 PID 1636 wrote to memory of 984 1636 {65D7305C-2014-47e3-A915-25803796446C}.exe 43 PID 1636 wrote to memory of 984 1636 {65D7305C-2014-47e3-A915-25803796446C}.exe 43 PID 336 wrote to memory of 1196 336 {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe 44 PID 336 wrote to memory of 1196 336 {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe 44 PID 336 wrote to memory of 1196 336 {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe 44 PID 336 wrote to memory of 1196 336 {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe 44 PID 336 wrote to memory of 1632 336 {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe 45 PID 336 wrote to memory of 1632 336 {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe 45 PID 336 wrote to memory of 1632 336 {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe 45 PID 336 wrote to memory of 1632 336 {0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe"C:\Users\Admin\AppData\Local\Temp\a18e52bc0088450ee6731e39e2377d3c_goldeneye_JC.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\{08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exeC:\Windows\{08B9106C-5B9F-4ac6-9744-F25432BF73A4}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\{7CD2BD63-D4CB-4407-9460-1503673389B6}.exeC:\Windows\{7CD2BD63-D4CB-4407-9460-1503673389B6}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\{26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exeC:\Windows\{26A36DB9-F0F3-4df6-AFFD-C05170F55DA7}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\{0AF478E3-74E1-4a4d-8157-68454E880F64}.exeC:\Windows\{0AF478E3-74E1-4a4d-8157-68454E880F64}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\{0D19421D-0D39-4512-A537-D46EF80BBAC7}.exeC:\Windows\{0D19421D-0D39-4512-A537-D46EF80BBAC7}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\{65D7305C-2014-47e3-A915-25803796446C}.exeC:\Windows\{65D7305C-2014-47e3-A915-25803796446C}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\{0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exeC:\Windows\{0A9C1891-AF4B-4d6c-9C35-54D9E0E79B7C}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\{10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0}.exeC:\Windows\{10BC9050-2CD5-4b96-BC0C-4E6231F4CCF0}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Windows\{4C349E70-ACF6-485b-B226-A3C9447B265F}.exeC:\Windows\{4C349E70-ACF6-485b-B226-A3C9447B265F}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\{6AB34E71-0B0D-40c0-8E0E-24F226823332}.exeC:\Windows\{6AB34E71-0B0D-40c0-8E0E-24F226823332}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\{A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8}.exeC:\Windows\{A96CF706-52B1-4a9a-87F0-5F9F47A8E5A8}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\{6F14B131-D7FA-4575-A55F-CE3B337CD04A}.exeC:\Windows\{6F14B131-D7FA-4575-A55F-CE3B337CD04A}.exe13⤵
- Executes dropped EXE
PID:1980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A96CF~1.EXE > nul13⤵PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6AB34~1.EXE > nul12⤵PID:3056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4C349~1.EXE > nul11⤵PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{10BC9~1.EXE > nul10⤵PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0A9C1~1.EXE > nul9⤵PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{65D73~1.EXE > nul8⤵PID:984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D194~1.EXE > nul7⤵PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0AF47~1.EXE > nul6⤵PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26A36~1.EXE > nul5⤵PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7CD2B~1.EXE > nul4⤵PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{08B91~1.EXE > nul3⤵PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\A18E52~1.EXE > nul2⤵
- Deletes itself
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a4abd5a87389f9a52220ffa229d6142c
SHA13ef3d1fdf553ca1d70b50d2666edfb63b4447528
SHA2565bb678a0e57a3ea5d8d88f85cec8223cf41439bd237a1cb9c8acd32342296a9d
SHA512cdcd148c6bfd7b05f6aa1c68c48c189de230b34716cce4fe470ec8b81ddcedb0eb2e2314185dabd903a71ea23a0e1e7e807a5a21decf026509c2c2ea102f6386
-
Filesize
168KB
MD5a4abd5a87389f9a52220ffa229d6142c
SHA13ef3d1fdf553ca1d70b50d2666edfb63b4447528
SHA2565bb678a0e57a3ea5d8d88f85cec8223cf41439bd237a1cb9c8acd32342296a9d
SHA512cdcd148c6bfd7b05f6aa1c68c48c189de230b34716cce4fe470ec8b81ddcedb0eb2e2314185dabd903a71ea23a0e1e7e807a5a21decf026509c2c2ea102f6386
-
Filesize
168KB
MD5a4abd5a87389f9a52220ffa229d6142c
SHA13ef3d1fdf553ca1d70b50d2666edfb63b4447528
SHA2565bb678a0e57a3ea5d8d88f85cec8223cf41439bd237a1cb9c8acd32342296a9d
SHA512cdcd148c6bfd7b05f6aa1c68c48c189de230b34716cce4fe470ec8b81ddcedb0eb2e2314185dabd903a71ea23a0e1e7e807a5a21decf026509c2c2ea102f6386
-
Filesize
168KB
MD588e71f84d1bc32e55c9bd75423317b8a
SHA16f5736eef992253565fb71298f91cac44c5ca379
SHA2563d0ad614b0b90b693b99f5251dbf5d051c1923550174eeb446d61667ebb818b9
SHA5125a21fe72543dfef939c01aacf77fbde9d88b6c1a364b51fafff5b601b23dc3652c434571806f9152a64e7d57747a15a65eabb5030dcfc2f30bc666d68afb204f
-
Filesize
168KB
MD588e71f84d1bc32e55c9bd75423317b8a
SHA16f5736eef992253565fb71298f91cac44c5ca379
SHA2563d0ad614b0b90b693b99f5251dbf5d051c1923550174eeb446d61667ebb818b9
SHA5125a21fe72543dfef939c01aacf77fbde9d88b6c1a364b51fafff5b601b23dc3652c434571806f9152a64e7d57747a15a65eabb5030dcfc2f30bc666d68afb204f
-
Filesize
168KB
MD57cdf90fbd2aef3b69d381fb8e7f95ccd
SHA133afd23ccff289eb89340ae8cf8284f183488c29
SHA2567149202fa85a45d81fa7f0674bec95f73a3afc4d8a0dbebd5db3e6a36d1ca0d9
SHA512c41c7d50ee64943c36b696cbe49bfa48fef8c3904a822d6f2cdbdc2dd51f94cc9a61afa8cd75ba78694d3dbdd5b5cf76fdc1f126a20fda22fe273a12ec3b74ce
-
Filesize
168KB
MD57cdf90fbd2aef3b69d381fb8e7f95ccd
SHA133afd23ccff289eb89340ae8cf8284f183488c29
SHA2567149202fa85a45d81fa7f0674bec95f73a3afc4d8a0dbebd5db3e6a36d1ca0d9
SHA512c41c7d50ee64943c36b696cbe49bfa48fef8c3904a822d6f2cdbdc2dd51f94cc9a61afa8cd75ba78694d3dbdd5b5cf76fdc1f126a20fda22fe273a12ec3b74ce
-
Filesize
168KB
MD5d7bc9ee129bac33914c58c1c7426558d
SHA1d190314f637d7dff3da7ebddde78867590c111d3
SHA256baa1e50e2541a37068675ad0506ae0e0fef3cc431a988dc0b1ee12772a76b28b
SHA512549ff38a49b4a24b5ed1f44eb34cf87dffcea031cfb19b85ebe464467a1126bbe15052fd098be216a968c1f7a6716ec8d888da8ebd5fc393a1aaef1f19387ea3
-
Filesize
168KB
MD5d7bc9ee129bac33914c58c1c7426558d
SHA1d190314f637d7dff3da7ebddde78867590c111d3
SHA256baa1e50e2541a37068675ad0506ae0e0fef3cc431a988dc0b1ee12772a76b28b
SHA512549ff38a49b4a24b5ed1f44eb34cf87dffcea031cfb19b85ebe464467a1126bbe15052fd098be216a968c1f7a6716ec8d888da8ebd5fc393a1aaef1f19387ea3
-
Filesize
168KB
MD54338260224b7cc46c61e283e3fdc3322
SHA182dbdfa5f2983a4414c4dd4f2afbe7a908844141
SHA256ec42a2efe4e975a558a1ab05d87b41d5aea74712bd191cb00ed63aaf60e9ccb2
SHA512552896cbc0680474c653f38c22e8f76d64b5b55b86e485a567bd7a9e70fd5b824d04ecd0169d7fb5e1a43732e8edf91c54b6166d5a69acf0bc47df0a69b15044
-
Filesize
168KB
MD54338260224b7cc46c61e283e3fdc3322
SHA182dbdfa5f2983a4414c4dd4f2afbe7a908844141
SHA256ec42a2efe4e975a558a1ab05d87b41d5aea74712bd191cb00ed63aaf60e9ccb2
SHA512552896cbc0680474c653f38c22e8f76d64b5b55b86e485a567bd7a9e70fd5b824d04ecd0169d7fb5e1a43732e8edf91c54b6166d5a69acf0bc47df0a69b15044
-
Filesize
168KB
MD50a0f799a2e206edea0927b79511f9e5a
SHA107a38a140bb4059d6c37449a6b885948d6fcba56
SHA256a5692a5c118ee4920971ba09b24d542f80bd08277d20ce7405694d686e65aef6
SHA5126949220451106c746560a349ba3efbd9faefe859aaf4d64ba9c61907fb082597afb9c1ffabb04eaff6960bb97c9b61fb1c7d5ddacf256b2ddf3c729383f61a0d
-
Filesize
168KB
MD50a0f799a2e206edea0927b79511f9e5a
SHA107a38a140bb4059d6c37449a6b885948d6fcba56
SHA256a5692a5c118ee4920971ba09b24d542f80bd08277d20ce7405694d686e65aef6
SHA5126949220451106c746560a349ba3efbd9faefe859aaf4d64ba9c61907fb082597afb9c1ffabb04eaff6960bb97c9b61fb1c7d5ddacf256b2ddf3c729383f61a0d
-
Filesize
168KB
MD55b557ed8b2f9f7ec28fa767f7e083f10
SHA1dc184bb2f8e7e746c6ed56a65f0829e561ace5ae
SHA2562a913c8bca361ac36b08453284a2810249e66c69d3a6ee9caa069538d9e03d5f
SHA51276ae58dc765078aa96449a2d44ca75946c647bfe391a26cff5c914f718262e0998df25d737d28d87e325f12542ef19070c8572ee91c09c4fd83fd27c892ab311
-
Filesize
168KB
MD55b557ed8b2f9f7ec28fa767f7e083f10
SHA1dc184bb2f8e7e746c6ed56a65f0829e561ace5ae
SHA2562a913c8bca361ac36b08453284a2810249e66c69d3a6ee9caa069538d9e03d5f
SHA51276ae58dc765078aa96449a2d44ca75946c647bfe391a26cff5c914f718262e0998df25d737d28d87e325f12542ef19070c8572ee91c09c4fd83fd27c892ab311
-
Filesize
168KB
MD50ad78070c5f09f3e752fb0e0d4f61df2
SHA13538fb89dae8a984360937587a3a500f9b0ed3cc
SHA25682fbaf58276ab69fdce19c9f6458451a08a4e2281ff19f8a8f089587d449439d
SHA512994dc06786028e9f51500e9afa5ce8c844e665b3a0647e8c27c8ddd0dc78347e1eae86588c31bcdc30e39d8d13d3f5759d39dfe1de789aefbf907b1e1aa83133
-
Filesize
168KB
MD50ad78070c5f09f3e752fb0e0d4f61df2
SHA13538fb89dae8a984360937587a3a500f9b0ed3cc
SHA25682fbaf58276ab69fdce19c9f6458451a08a4e2281ff19f8a8f089587d449439d
SHA512994dc06786028e9f51500e9afa5ce8c844e665b3a0647e8c27c8ddd0dc78347e1eae86588c31bcdc30e39d8d13d3f5759d39dfe1de789aefbf907b1e1aa83133
-
Filesize
168KB
MD537d9183643e5e136831d3719c95c1f8e
SHA16ae15489f1927b0063e322a7d27ab2ec801d18c9
SHA2567d611614aa40173fac1708e4d5151b68d631d49528b55293bc0adf30e8c3335f
SHA5124e2dcbf6c6b3f28dd4a4f4615519e65f742c64b8b6c239a358981af8f7aebe12d3ff32dbcc141769d8fe2f1c89e92796e582016f9346326816cc41edbb735dcd
-
Filesize
168KB
MD537d9183643e5e136831d3719c95c1f8e
SHA16ae15489f1927b0063e322a7d27ab2ec801d18c9
SHA2567d611614aa40173fac1708e4d5151b68d631d49528b55293bc0adf30e8c3335f
SHA5124e2dcbf6c6b3f28dd4a4f4615519e65f742c64b8b6c239a358981af8f7aebe12d3ff32dbcc141769d8fe2f1c89e92796e582016f9346326816cc41edbb735dcd
-
Filesize
168KB
MD5e5f4cefe0beb606db956b320315e74cb
SHA16c0820a7d48f03fd174beae31344c19b33656791
SHA25671d0bd0fd0bdd467118e196e462b3fb50d47d1490e285f6b7d9001827a59bf23
SHA512b67ea32c42a6202c0e33a77436892d19fd7de1eec90898cee5eedd7c47c05ce78787f1d7ecc1e2f6ba0fd560a5087002dcdb0a7c86427f534e4293a1516848d1
-
Filesize
168KB
MD55ab49559b23c67b13dcab92eec8daa9a
SHA1a4ffa4ded1ac4d8e1e13561b587b73f3d7131e08
SHA256aaf67fe4f8786bf62ea89a9006ac6875414923237b27f763a28c360051b9752d
SHA51280d8c773c4f33f18337a81ef9b3f87bf6420fbc8007ef57197ef498d73eb90cf7d1a4b8dff84662f481e29acdac0114a0565f909de0e2210964b07b1c4b7990c
-
Filesize
168KB
MD55ab49559b23c67b13dcab92eec8daa9a
SHA1a4ffa4ded1ac4d8e1e13561b587b73f3d7131e08
SHA256aaf67fe4f8786bf62ea89a9006ac6875414923237b27f763a28c360051b9752d
SHA51280d8c773c4f33f18337a81ef9b3f87bf6420fbc8007ef57197ef498d73eb90cf7d1a4b8dff84662f481e29acdac0114a0565f909de0e2210964b07b1c4b7990c
-
Filesize
168KB
MD52e978e7cbdc4cabda3279cc693b70d3f
SHA1b1136ecf8762b837837f3e1974d6d97314b2ab4c
SHA2560afa944a673e99e0e3bbd86745e9da38787187643207577abb6a060be38730e2
SHA512767200cfb3979ef54ebbe533ffddc665c963977f1ed3da3328f7444dcfa17c4173b6e8d289d08eb05a1456fe3e202c56fbd96ddf778d5448aa2bf82abd0a5a62
-
Filesize
168KB
MD52e978e7cbdc4cabda3279cc693b70d3f
SHA1b1136ecf8762b837837f3e1974d6d97314b2ab4c
SHA2560afa944a673e99e0e3bbd86745e9da38787187643207577abb6a060be38730e2
SHA512767200cfb3979ef54ebbe533ffddc665c963977f1ed3da3328f7444dcfa17c4173b6e8d289d08eb05a1456fe3e202c56fbd96ddf778d5448aa2bf82abd0a5a62