Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe
-
Size
408KB
-
MD5
f3f153babfdb8127df251173fc016ff9
-
SHA1
871209a8662b56d37e254b11cb0f4cbef3c4fcda
-
SHA256
d0f32660af95ac54a76c375e133697074c67367148a848f032a53993d5fa3d31
-
SHA512
5f8f937c68b2c3ac5b68fc28fb3e25259855d503accdbadc3ff1a449900e9be5013dbefece7ce85592312d8f0feda8977c84663068ae0b62c4384e2109221f3d
-
SSDEEP
3072:CEGh0oJZl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf:CEG5ldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A1A903F1-9F5D-4969-B492-ADF18D912702} {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A1A903F1-9F5D-4969-B492-ADF18D912702}\stubpath = "C:\\Windows\\{A1A903F1-9F5D-4969-B492-ADF18D912702}.exe" {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2D11798B-0F75-4784-98C4-1844DC5497DE}\stubpath = "C:\\Windows\\{2D11798B-0F75-4784-98C4-1844DC5497DE}.exe" {4BF6767B-62B7-4089-881E-A97D2844898C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21B970E3-627A-48d8-96BD-027A0CDB18AF}\stubpath = "C:\\Windows\\{21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe" {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}\stubpath = "C:\\Windows\\{7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe" {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0FE62036-B3EE-44a1-ADB0-307D5C5B39A4} {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}\stubpath = "C:\\Windows\\{0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe" {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C28434D-A331-4515-AAA0-D64992CAF32D} {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C28434D-A331-4515-AAA0-D64992CAF32D}\stubpath = "C:\\Windows\\{3C28434D-A331-4515-AAA0-D64992CAF32D}.exe" {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F63F18A-FE38-4898-B1CE-4BD107DC1B20} {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE8B77BA-8AFB-4672-817C-6E1E8B7C8D00}\stubpath = "C:\\Windows\\{CE8B77BA-8AFB-4672-817C-6E1E8B7C8D00}.exe" {E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{21B970E3-627A-48d8-96BD-027A0CDB18AF} {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F63F18A-FE38-4898-B1CE-4BD107DC1B20}\stubpath = "C:\\Windows\\{1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe" {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF} {A1A903F1-9F5D-4969-B492-ADF18D912702}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BF6767B-62B7-4089-881E-A97D2844898C} f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BF6767B-62B7-4089-881E-A97D2844898C}\stubpath = "C:\\Windows\\{4BF6767B-62B7-4089-881E-A97D2844898C}.exe" f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2E63DCE0-A215-47e4-B5CE-758883D3316C} {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2E63DCE0-A215-47e4-B5CE-758883D3316C}\stubpath = "C:\\Windows\\{2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe" {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F1D1857-5958-40ff-B2E2-3A6D09C35FE8} {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE8B77BA-8AFB-4672-817C-6E1E8B7C8D00} {E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2D11798B-0F75-4784-98C4-1844DC5497DE} {4BF6767B-62B7-4089-881E-A97D2844898C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}\stubpath = "C:\\Windows\\{3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe" {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A} {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF}\stubpath = "C:\\Windows\\{E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF}.exe" {A1A903F1-9F5D-4969-B492-ADF18D912702}.exe -
Executes dropped EXE 12 IoCs
pid Process 4708 {4BF6767B-62B7-4089-881E-A97D2844898C}.exe 1520 {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe 864 {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe 3036 {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe 944 {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe 1824 {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe 4372 {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe 1424 {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe 3356 {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe 4056 {A1A903F1-9F5D-4969-B492-ADF18D912702}.exe 3380 {E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF}.exe 2856 {CE8B77BA-8AFB-4672-817C-6E1E8B7C8D00}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{CE8B77BA-8AFB-4672-817C-6E1E8B7C8D00}.exe {E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF}.exe File created C:\Windows\{2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe File created C:\Windows\{3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe File created C:\Windows\{7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe File created C:\Windows\{0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe File created C:\Windows\{A1A903F1-9F5D-4969-B492-ADF18D912702}.exe {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe File created C:\Windows\{E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF}.exe {A1A903F1-9F5D-4969-B492-ADF18D912702}.exe File created C:\Windows\{4BF6767B-62B7-4089-881E-A97D2844898C}.exe f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe File created C:\Windows\{2D11798B-0F75-4784-98C4-1844DC5497DE}.exe {4BF6767B-62B7-4089-881E-A97D2844898C}.exe File created C:\Windows\{21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe File created C:\Windows\{3C28434D-A331-4515-AAA0-D64992CAF32D}.exe {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe File created C:\Windows\{1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5032 f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe Token: SeIncBasePriorityPrivilege 4708 {4BF6767B-62B7-4089-881E-A97D2844898C}.exe Token: SeIncBasePriorityPrivilege 1520 {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe Token: SeIncBasePriorityPrivilege 864 {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe Token: SeIncBasePriorityPrivilege 3036 {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe Token: SeIncBasePriorityPrivilege 944 {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe Token: SeIncBasePriorityPrivilege 1824 {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe Token: SeIncBasePriorityPrivilege 4372 {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe Token: SeIncBasePriorityPrivilege 1424 {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe Token: SeIncBasePriorityPrivilege 3356 {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe Token: SeIncBasePriorityPrivilege 4056 {A1A903F1-9F5D-4969-B492-ADF18D912702}.exe Token: SeIncBasePriorityPrivilege 3380 {E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4708 5032 f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe 86 PID 5032 wrote to memory of 4708 5032 f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe 86 PID 5032 wrote to memory of 4708 5032 f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe 86 PID 5032 wrote to memory of 4796 5032 f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe 87 PID 5032 wrote to memory of 4796 5032 f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe 87 PID 5032 wrote to memory of 4796 5032 f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe 87 PID 4708 wrote to memory of 1520 4708 {4BF6767B-62B7-4089-881E-A97D2844898C}.exe 91 PID 4708 wrote to memory of 1520 4708 {4BF6767B-62B7-4089-881E-A97D2844898C}.exe 91 PID 4708 wrote to memory of 1520 4708 {4BF6767B-62B7-4089-881E-A97D2844898C}.exe 91 PID 4708 wrote to memory of 2612 4708 {4BF6767B-62B7-4089-881E-A97D2844898C}.exe 92 PID 4708 wrote to memory of 2612 4708 {4BF6767B-62B7-4089-881E-A97D2844898C}.exe 92 PID 4708 wrote to memory of 2612 4708 {4BF6767B-62B7-4089-881E-A97D2844898C}.exe 92 PID 1520 wrote to memory of 864 1520 {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe 94 PID 1520 wrote to memory of 864 1520 {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe 94 PID 1520 wrote to memory of 864 1520 {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe 94 PID 1520 wrote to memory of 2788 1520 {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe 95 PID 1520 wrote to memory of 2788 1520 {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe 95 PID 1520 wrote to memory of 2788 1520 {2D11798B-0F75-4784-98C4-1844DC5497DE}.exe 95 PID 864 wrote to memory of 3036 864 {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe 96 PID 864 wrote to memory of 3036 864 {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe 96 PID 864 wrote to memory of 3036 864 {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe 96 PID 864 wrote to memory of 3508 864 {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe 97 PID 864 wrote to memory of 3508 864 {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe 97 PID 864 wrote to memory of 3508 864 {2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe 97 PID 3036 wrote to memory of 944 3036 {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe 99 PID 3036 wrote to memory of 944 3036 {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe 99 PID 3036 wrote to memory of 944 3036 {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe 99 PID 3036 wrote to memory of 4660 3036 {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe 98 PID 3036 wrote to memory of 4660 3036 {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe 98 PID 3036 wrote to memory of 4660 3036 {3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe 98 PID 944 wrote to memory of 1824 944 {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe 100 PID 944 wrote to memory of 1824 944 {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe 100 PID 944 wrote to memory of 1824 944 {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe 100 PID 944 wrote to memory of 2344 944 {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe 101 PID 944 wrote to memory of 2344 944 {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe 101 PID 944 wrote to memory of 2344 944 {21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe 101 PID 1824 wrote to memory of 4372 1824 {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe 102 PID 1824 wrote to memory of 4372 1824 {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe 102 PID 1824 wrote to memory of 4372 1824 {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe 102 PID 1824 wrote to memory of 4864 1824 {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe 103 PID 1824 wrote to memory of 4864 1824 {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe 103 PID 1824 wrote to memory of 4864 1824 {3C28434D-A331-4515-AAA0-D64992CAF32D}.exe 103 PID 4372 wrote to memory of 1424 4372 {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe 104 PID 4372 wrote to memory of 1424 4372 {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe 104 PID 4372 wrote to memory of 1424 4372 {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe 104 PID 4372 wrote to memory of 1148 4372 {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe 105 PID 4372 wrote to memory of 1148 4372 {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe 105 PID 4372 wrote to memory of 1148 4372 {7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe 105 PID 1424 wrote to memory of 3356 1424 {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe 106 PID 1424 wrote to memory of 3356 1424 {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe 106 PID 1424 wrote to memory of 3356 1424 {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe 106 PID 1424 wrote to memory of 3928 1424 {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe 107 PID 1424 wrote to memory of 3928 1424 {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe 107 PID 1424 wrote to memory of 3928 1424 {1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe 107 PID 3356 wrote to memory of 4056 3356 {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe 108 PID 3356 wrote to memory of 4056 3356 {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe 108 PID 3356 wrote to memory of 4056 3356 {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe 108 PID 3356 wrote to memory of 4088 3356 {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe 109 PID 3356 wrote to memory of 4088 3356 {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe 109 PID 3356 wrote to memory of 4088 3356 {0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe 109 PID 4056 wrote to memory of 3380 4056 {A1A903F1-9F5D-4969-B492-ADF18D912702}.exe 110 PID 4056 wrote to memory of 3380 4056 {A1A903F1-9F5D-4969-B492-ADF18D912702}.exe 110 PID 4056 wrote to memory of 3380 4056 {A1A903F1-9F5D-4969-B492-ADF18D912702}.exe 110 PID 4056 wrote to memory of 3092 4056 {A1A903F1-9F5D-4969-B492-ADF18D912702}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe"C:\Users\Admin\AppData\Local\Temp\f3f153babfdb8127df251173fc016ff9_goldeneye_JC.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\{4BF6767B-62B7-4089-881E-A97D2844898C}.exeC:\Windows\{4BF6767B-62B7-4089-881E-A97D2844898C}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\{2D11798B-0F75-4784-98C4-1844DC5497DE}.exeC:\Windows\{2D11798B-0F75-4784-98C4-1844DC5497DE}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\{2E63DCE0-A215-47e4-B5CE-758883D3316C}.exeC:\Windows\{2E63DCE0-A215-47e4-B5CE-758883D3316C}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\{3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exeC:\Windows\{3F1D1857-5958-40ff-B2E2-3A6D09C35FE8}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3F1D1~1.EXE > nul6⤵PID:4660
-
-
C:\Windows\{21B970E3-627A-48d8-96BD-027A0CDB18AF}.exeC:\Windows\{21B970E3-627A-48d8-96BD-027A0CDB18AF}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\{3C28434D-A331-4515-AAA0-D64992CAF32D}.exeC:\Windows\{3C28434D-A331-4515-AAA0-D64992CAF32D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\{7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exeC:\Windows\{7DF3BEA5-7F4E-4df5-A825-3A4C7F67615A}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\{1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exeC:\Windows\{1F63F18A-FE38-4898-B1CE-4BD107DC1B20}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\{0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exeC:\Windows\{0FE62036-B3EE-44a1-ADB0-307D5C5B39A4}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\{A1A903F1-9F5D-4969-B492-ADF18D912702}.exeC:\Windows\{A1A903F1-9F5D-4969-B492-ADF18D912702}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\{E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF}.exeC:\Windows\{E7BCFAD1-CC64-4da9-BC40-C2600ACF9EFF}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3380 -
C:\Windows\{CE8B77BA-8AFB-4672-817C-6E1E8B7C8D00}.exeC:\Windows\{CE8B77BA-8AFB-4672-817C-6E1E8B7C8D00}.exe13⤵
- Executes dropped EXE
PID:2856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E7BCF~1.EXE > nul13⤵PID:488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1A90~1.EXE > nul12⤵PID:3092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0FE62~1.EXE > nul11⤵PID:4088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1F63F~1.EXE > nul10⤵PID:3928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7DF3B~1.EXE > nul9⤵PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C284~1.EXE > nul8⤵PID:4864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{21B97~1.EXE > nul7⤵PID:2344
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2E63D~1.EXE > nul5⤵PID:3508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2D117~1.EXE > nul4⤵PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4BF67~1.EXE > nul3⤵PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\F3F153~1.EXE > nul2⤵PID:4796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5ef90f7ee3c9e5bcbf6d4b9b1e5954637
SHA1f11de9eb0333b9c3748a8c61dcedfa8ac33dc008
SHA256b6631ffc843b260e6e6cf569fc04fd0ffef25cc89c5fb8e407215ce16c2583cd
SHA512b87a11ca554a4cabacb3826d250da8cad4ee7f9eae4be6f027c875a6763343ea9bff30533a17c34c664038b2b9d4c73cbb6b609c00c1cd0bab517048f8486236
-
Filesize
408KB
MD5ef90f7ee3c9e5bcbf6d4b9b1e5954637
SHA1f11de9eb0333b9c3748a8c61dcedfa8ac33dc008
SHA256b6631ffc843b260e6e6cf569fc04fd0ffef25cc89c5fb8e407215ce16c2583cd
SHA512b87a11ca554a4cabacb3826d250da8cad4ee7f9eae4be6f027c875a6763343ea9bff30533a17c34c664038b2b9d4c73cbb6b609c00c1cd0bab517048f8486236
-
Filesize
408KB
MD5f205eae2017d41f86b8d810405a880c0
SHA13e9bd7367f7e41a92692714c0484626a98b5cedd
SHA256ebce81b767463e3695cd5264e451c775aa76182b1db4496f64b87b6f8bddc8ee
SHA51290aaf75f90ded2e0d38481412b4641532292b0d24a01779823f02960b23df7b2419b1e23b7fe25b92aac0c8be11189399e83ebdf6f52fd76af79f8611b72e87e
-
Filesize
408KB
MD5f205eae2017d41f86b8d810405a880c0
SHA13e9bd7367f7e41a92692714c0484626a98b5cedd
SHA256ebce81b767463e3695cd5264e451c775aa76182b1db4496f64b87b6f8bddc8ee
SHA51290aaf75f90ded2e0d38481412b4641532292b0d24a01779823f02960b23df7b2419b1e23b7fe25b92aac0c8be11189399e83ebdf6f52fd76af79f8611b72e87e
-
Filesize
408KB
MD5209dd860971489111d92d095fc975952
SHA160eb4ac261d120d8cd0fc77586125b4c890da445
SHA256bc56850002df0bc25583331620bae902d965209a980aaa31f93cbd4c7fccd874
SHA5127ad116198ac41ed715c6e5855f2da4ef04e8e94cf21b1d1ba58cb43ec3baf7b968e018ddcbd78ce437279fbf3c3eea6d77ec6af9a5cfea1d375bc6f5d380d74d
-
Filesize
408KB
MD5209dd860971489111d92d095fc975952
SHA160eb4ac261d120d8cd0fc77586125b4c890da445
SHA256bc56850002df0bc25583331620bae902d965209a980aaa31f93cbd4c7fccd874
SHA5127ad116198ac41ed715c6e5855f2da4ef04e8e94cf21b1d1ba58cb43ec3baf7b968e018ddcbd78ce437279fbf3c3eea6d77ec6af9a5cfea1d375bc6f5d380d74d
-
Filesize
408KB
MD54d5c809a4fcbe7d4e5473765a786ca8b
SHA161e3ae4fc497fd0207d7ac51aa7952ce8dc6a9d6
SHA256bc0e4a435bee81ad1645538009a1f1a755c1adee2fdd96f556fea523c2a474dd
SHA5120d9ac2be3261414cbe9caa790f6fa9cf26eb6cb8b71d42934de104e44445985b28ed0ef1650df07166780602a713e811b5da655601defa9d0aaca4fd13a79021
-
Filesize
408KB
MD54d5c809a4fcbe7d4e5473765a786ca8b
SHA161e3ae4fc497fd0207d7ac51aa7952ce8dc6a9d6
SHA256bc0e4a435bee81ad1645538009a1f1a755c1adee2fdd96f556fea523c2a474dd
SHA5120d9ac2be3261414cbe9caa790f6fa9cf26eb6cb8b71d42934de104e44445985b28ed0ef1650df07166780602a713e811b5da655601defa9d0aaca4fd13a79021
-
Filesize
408KB
MD5523d02df3a0b66d107ff4bd6e1e203e7
SHA1ef41985893ca0d0dd374a4b6e2a052fa6bd6fd15
SHA256a341b38dcb54eccdb86e564c7a572a96b97e80d5449bcbfa0215f336a4a4dec1
SHA512364d70769f0ad56ba1e1e4331d540f76f8dab5e4e8013d5a4ed2816120dedbc039a2302d5fcbab851b4e827170e1cfe70f329f5b16cfe92391c1c8acbb33972d
-
Filesize
408KB
MD5523d02df3a0b66d107ff4bd6e1e203e7
SHA1ef41985893ca0d0dd374a4b6e2a052fa6bd6fd15
SHA256a341b38dcb54eccdb86e564c7a572a96b97e80d5449bcbfa0215f336a4a4dec1
SHA512364d70769f0ad56ba1e1e4331d540f76f8dab5e4e8013d5a4ed2816120dedbc039a2302d5fcbab851b4e827170e1cfe70f329f5b16cfe92391c1c8acbb33972d
-
Filesize
408KB
MD5523d02df3a0b66d107ff4bd6e1e203e7
SHA1ef41985893ca0d0dd374a4b6e2a052fa6bd6fd15
SHA256a341b38dcb54eccdb86e564c7a572a96b97e80d5449bcbfa0215f336a4a4dec1
SHA512364d70769f0ad56ba1e1e4331d540f76f8dab5e4e8013d5a4ed2816120dedbc039a2302d5fcbab851b4e827170e1cfe70f329f5b16cfe92391c1c8acbb33972d
-
Filesize
408KB
MD5da7717bdcd88c2344d9092618f52d660
SHA1f6d5e0fcc1a441a56df52f67d7e7a29eacc2824d
SHA25676d05ecb778a249fc20879ecaeef34524f3806e2aaa4ff078300e30b3d48bc5b
SHA512133e09abac9bef1222ceb0ff75a306e7e6b909b6f27fcd6e057eecdb83a140525f8b69ffaa0c44e7e3f0f796f480f8257eba6e202adc76b95d693a6c2264ee74
-
Filesize
408KB
MD5da7717bdcd88c2344d9092618f52d660
SHA1f6d5e0fcc1a441a56df52f67d7e7a29eacc2824d
SHA25676d05ecb778a249fc20879ecaeef34524f3806e2aaa4ff078300e30b3d48bc5b
SHA512133e09abac9bef1222ceb0ff75a306e7e6b909b6f27fcd6e057eecdb83a140525f8b69ffaa0c44e7e3f0f796f480f8257eba6e202adc76b95d693a6c2264ee74
-
Filesize
408KB
MD59ca921a81e4574f7fb596b9d2e7e0dce
SHA17f0626fd9c7c88d5aeb813458d91adee36a1da38
SHA2567de2c417270978fa84478353557230b208c31075966ea45955d3368b80a2f030
SHA51236623532fd28788b6a296376dc588312b7f60fce711c94717ec7ba86c09b72481796b288b691af27bab0930a83252b29e21da295ead23866b88037ec32ddf5ce
-
Filesize
408KB
MD59ca921a81e4574f7fb596b9d2e7e0dce
SHA17f0626fd9c7c88d5aeb813458d91adee36a1da38
SHA2567de2c417270978fa84478353557230b208c31075966ea45955d3368b80a2f030
SHA51236623532fd28788b6a296376dc588312b7f60fce711c94717ec7ba86c09b72481796b288b691af27bab0930a83252b29e21da295ead23866b88037ec32ddf5ce
-
Filesize
408KB
MD54907a1b1aaf5c472c34496c80bc28411
SHA151d9248f823c07db711a2f833734a680f9186cac
SHA25601f3639b540a8955d207249ffb9ff21a43ecf4b94153aaca85fc9a29b89bbabd
SHA51243f76a845a1b36d1db85b2ceee291ee78b432c1908d73a3a7aaec6954d03e3ce19e2c2dc6fcf57d0454397af4989eef9a1236baafe21176e219db0b573a8186f
-
Filesize
408KB
MD54907a1b1aaf5c472c34496c80bc28411
SHA151d9248f823c07db711a2f833734a680f9186cac
SHA25601f3639b540a8955d207249ffb9ff21a43ecf4b94153aaca85fc9a29b89bbabd
SHA51243f76a845a1b36d1db85b2ceee291ee78b432c1908d73a3a7aaec6954d03e3ce19e2c2dc6fcf57d0454397af4989eef9a1236baafe21176e219db0b573a8186f
-
Filesize
408KB
MD5baa8d43e2fd4fc5d26de169bd2059b73
SHA15d07ab1d109127200690fb8db6e48d1503a0c556
SHA25683a9696151b9610225de8a6372ec1bce006d71b37481edcee6113ccda3283ee6
SHA512a3e0be72c607f339d63b1ea163f954e2f718b2054914a89eff488e5ca86f50e9ca39701ba0934bcedf001d426e91a0ac853a3344d164ff2bb7ea6ba13f2985b1
-
Filesize
408KB
MD5baa8d43e2fd4fc5d26de169bd2059b73
SHA15d07ab1d109127200690fb8db6e48d1503a0c556
SHA25683a9696151b9610225de8a6372ec1bce006d71b37481edcee6113ccda3283ee6
SHA512a3e0be72c607f339d63b1ea163f954e2f718b2054914a89eff488e5ca86f50e9ca39701ba0934bcedf001d426e91a0ac853a3344d164ff2bb7ea6ba13f2985b1
-
Filesize
408KB
MD5351887393e5c22e52d0ec4ff6977b5eb
SHA10094509a54b34bb39e2454f89a69802a540d81ef
SHA256fe22e74a695bcda7b9e7faa2b4d012367d8b467f9aa1f087b8b06c4026b8788a
SHA512cbef4572585b3e32ad78cda5c4aa6ab253fd65d03db8aed75775fbf03fb6013adf8ee16ec4f09c78012b93c499efa59f08ec882f9e33d037af70afd89c24e899
-
Filesize
408KB
MD5351887393e5c22e52d0ec4ff6977b5eb
SHA10094509a54b34bb39e2454f89a69802a540d81ef
SHA256fe22e74a695bcda7b9e7faa2b4d012367d8b467f9aa1f087b8b06c4026b8788a
SHA512cbef4572585b3e32ad78cda5c4aa6ab253fd65d03db8aed75775fbf03fb6013adf8ee16ec4f09c78012b93c499efa59f08ec882f9e33d037af70afd89c24e899
-
Filesize
408KB
MD57d74a5260589b332107a1664084896e7
SHA17ed45a6e72f51e0366db1ce346c8eefdef64335b
SHA2560353ebfb50376891cfa7f886573be79b5713fb1000d208dacc44a0237f90f948
SHA5129fec2f30b5f785a8006dfc4a422dcecfd405a916c8127d759f77e84b10fc4ef16d990a7cdef4256633b7d6c683d48e26cfa18d2fb4df0fe0749a18c756121e20
-
Filesize
408KB
MD57d74a5260589b332107a1664084896e7
SHA17ed45a6e72f51e0366db1ce346c8eefdef64335b
SHA2560353ebfb50376891cfa7f886573be79b5713fb1000d208dacc44a0237f90f948
SHA5129fec2f30b5f785a8006dfc4a422dcecfd405a916c8127d759f77e84b10fc4ef16d990a7cdef4256633b7d6c683d48e26cfa18d2fb4df0fe0749a18c756121e20
-
Filesize
408KB
MD5035a49b4c8fa93f8bd79b73c70198add
SHA19f90c9c0447ab57824e353fb3dcca16c210b07fc
SHA2560d27c6208c7ff2813c978836e50f72683080d3843a4d0214f120dd978c9146a7
SHA51237575dddb8229ae42fe9b210653b7c564f82952a7c942df12c9bde13c4070e976537e7b14e254e99f2bd83b1b8ec8b97df6c207f9a28cd527c142e068c80eb4f
-
Filesize
408KB
MD5035a49b4c8fa93f8bd79b73c70198add
SHA19f90c9c0447ab57824e353fb3dcca16c210b07fc
SHA2560d27c6208c7ff2813c978836e50f72683080d3843a4d0214f120dd978c9146a7
SHA51237575dddb8229ae42fe9b210653b7c564f82952a7c942df12c9bde13c4070e976537e7b14e254e99f2bd83b1b8ec8b97df6c207f9a28cd527c142e068c80eb4f