Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22-10-2023 10:44
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe
-
Size
204KB
-
MD5
36c0c4d8061a8637cb14fb299617cac8
-
SHA1
de730ba958309f519e6058e82fa3d1a60dc04ec6
-
SHA256
bd5d5ca8a36a44d45661e93516de9a36b2f4d5e44be4896039272ad60fdc96e6
-
SHA512
97fe9bbb4a8dba5e2e47830e52ab60626e69dc1f320312d1c4ee5167c1f4935446bd06fbfc815f201f43e4c017eb2eb3ca1b0973f51bd5b9d0d8a521e5437004
-
SSDEEP
1536:1EGh0oBl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oBl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7D1F581-4AA3-4361-80C4-0D184E9032A2} {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DB07949-EACF-4180-A1DE-408119198CE5}\stubpath = "C:\\Windows\\{4DB07949-EACF-4180-A1DE-408119198CE5}.exe" {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7AA7FF82-09E7-4b47-B01B-D56A670D2E30}\stubpath = "C:\\Windows\\{7AA7FF82-09E7-4b47-B01B-D56A670D2E30}.exe" {4DB07949-EACF-4180-A1DE-408119198CE5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB} {89ECEB9C-2F09-4718-9450-96A7FD55E572}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AAA0A556-84B6-46af-861B-6408518520E4}\stubpath = "C:\\Windows\\{AAA0A556-84B6-46af-861B-6408518520E4}.exe" {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8A96AE3-7204-4bff-9EE0-69071B5042E1}\stubpath = "C:\\Windows\\{A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe" {AAA0A556-84B6-46af-861B-6408518520E4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B86741DA-523F-49f6-A2F6-0775A557CE83} {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{89ECEB9C-2F09-4718-9450-96A7FD55E572} {7AA7FF82-09E7-4b47-B01B-D56A670D2E30}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A9494DE2-4263-4f62-B78D-E70D5D7301E7} {BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DC40B019-2D41-427d-8BB7-6831EED5DBCA} {037712BB-708E-4bd0-AF19-CD5057757689}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{932E1B2E-88D5-463e-9874-C776CC087E7C} {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7D1F581-4AA3-4361-80C4-0D184E9032A2}\stubpath = "C:\\Windows\\{A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe" {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B86741DA-523F-49f6-A2F6-0775A557CE83}\stubpath = "C:\\Windows\\{B86741DA-523F-49f6-A2F6-0775A557CE83}.exe" {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7AA7FF82-09E7-4b47-B01B-D56A670D2E30} {4DB07949-EACF-4180-A1DE-408119198CE5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A9494DE2-4263-4f62-B78D-E70D5D7301E7}\stubpath = "C:\\Windows\\{A9494DE2-4263-4f62-B78D-E70D5D7301E7}.exe" {BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{037712BB-708E-4bd0-AF19-CD5057757689}\stubpath = "C:\\Windows\\{037712BB-708E-4bd0-AF19-CD5057757689}.exe" NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DC40B019-2D41-427d-8BB7-6831EED5DBCA}\stubpath = "C:\\Windows\\{DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe" {037712BB-708E-4bd0-AF19-CD5057757689}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AAA0A556-84B6-46af-861B-6408518520E4} {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DB07949-EACF-4180-A1DE-408119198CE5} {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{89ECEB9C-2F09-4718-9450-96A7FD55E572}\stubpath = "C:\\Windows\\{89ECEB9C-2F09-4718-9450-96A7FD55E572}.exe" {7AA7FF82-09E7-4b47-B01B-D56A670D2E30}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB}\stubpath = "C:\\Windows\\{BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB}.exe" {89ECEB9C-2F09-4718-9450-96A7FD55E572}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{037712BB-708E-4bd0-AF19-CD5057757689} NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{932E1B2E-88D5-463e-9874-C776CC087E7C}\stubpath = "C:\\Windows\\{932E1B2E-88D5-463e-9874-C776CC087E7C}.exe" {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8A96AE3-7204-4bff-9EE0-69071B5042E1} {AAA0A556-84B6-46af-861B-6408518520E4}.exe -
Deletes itself 1 IoCs
pid Process 2136 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2888 {037712BB-708E-4bd0-AF19-CD5057757689}.exe 2688 {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe 2716 {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe 2672 {AAA0A556-84B6-46af-861B-6408518520E4}.exe 2616 {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe 1624 {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe 536 {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe 2900 {4DB07949-EACF-4180-A1DE-408119198CE5}.exe 1044 {7AA7FF82-09E7-4b47-B01B-D56A670D2E30}.exe 2516 {89ECEB9C-2F09-4718-9450-96A7FD55E572}.exe 1656 {BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB}.exe 2184 {A9494DE2-4263-4f62-B78D-E70D5D7301E7}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{B86741DA-523F-49f6-A2F6-0775A557CE83}.exe {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe File created C:\Windows\{DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe {037712BB-708E-4bd0-AF19-CD5057757689}.exe File created C:\Windows\{932E1B2E-88D5-463e-9874-C776CC087E7C}.exe {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe File created C:\Windows\{AAA0A556-84B6-46af-861B-6408518520E4}.exe {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe File created C:\Windows\{A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe {AAA0A556-84B6-46af-861B-6408518520E4}.exe File created C:\Windows\{A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe File created C:\Windows\{4DB07949-EACF-4180-A1DE-408119198CE5}.exe {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe File created C:\Windows\{7AA7FF82-09E7-4b47-B01B-D56A670D2E30}.exe {4DB07949-EACF-4180-A1DE-408119198CE5}.exe File created C:\Windows\{037712BB-708E-4bd0-AF19-CD5057757689}.exe NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe File created C:\Windows\{BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB}.exe {89ECEB9C-2F09-4718-9450-96A7FD55E572}.exe File created C:\Windows\{A9494DE2-4263-4f62-B78D-E70D5D7301E7}.exe {BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB}.exe File created C:\Windows\{89ECEB9C-2F09-4718-9450-96A7FD55E572}.exe {7AA7FF82-09E7-4b47-B01B-D56A670D2E30}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2648 NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe Token: SeIncBasePriorityPrivilege 2888 {037712BB-708E-4bd0-AF19-CD5057757689}.exe Token: SeIncBasePriorityPrivilege 2688 {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe Token: SeIncBasePriorityPrivilege 2716 {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe Token: SeIncBasePriorityPrivilege 2672 {AAA0A556-84B6-46af-861B-6408518520E4}.exe Token: SeIncBasePriorityPrivilege 2616 {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe Token: SeIncBasePriorityPrivilege 1624 {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe Token: SeIncBasePriorityPrivilege 536 {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe Token: SeIncBasePriorityPrivilege 2900 {4DB07949-EACF-4180-A1DE-408119198CE5}.exe Token: SeIncBasePriorityPrivilege 1044 {7AA7FF82-09E7-4b47-B01B-D56A670D2E30}.exe Token: SeIncBasePriorityPrivilege 2516 {89ECEB9C-2F09-4718-9450-96A7FD55E572}.exe Token: SeIncBasePriorityPrivilege 1656 {BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2888 2648 NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe 28 PID 2648 wrote to memory of 2888 2648 NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe 28 PID 2648 wrote to memory of 2888 2648 NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe 28 PID 2648 wrote to memory of 2888 2648 NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe 28 PID 2648 wrote to memory of 2136 2648 NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe 29 PID 2648 wrote to memory of 2136 2648 NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe 29 PID 2648 wrote to memory of 2136 2648 NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe 29 PID 2648 wrote to memory of 2136 2648 NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe 29 PID 2888 wrote to memory of 2688 2888 {037712BB-708E-4bd0-AF19-CD5057757689}.exe 30 PID 2888 wrote to memory of 2688 2888 {037712BB-708E-4bd0-AF19-CD5057757689}.exe 30 PID 2888 wrote to memory of 2688 2888 {037712BB-708E-4bd0-AF19-CD5057757689}.exe 30 PID 2888 wrote to memory of 2688 2888 {037712BB-708E-4bd0-AF19-CD5057757689}.exe 30 PID 2888 wrote to memory of 2836 2888 {037712BB-708E-4bd0-AF19-CD5057757689}.exe 31 PID 2888 wrote to memory of 2836 2888 {037712BB-708E-4bd0-AF19-CD5057757689}.exe 31 PID 2888 wrote to memory of 2836 2888 {037712BB-708E-4bd0-AF19-CD5057757689}.exe 31 PID 2888 wrote to memory of 2836 2888 {037712BB-708E-4bd0-AF19-CD5057757689}.exe 31 PID 2688 wrote to memory of 2716 2688 {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe 32 PID 2688 wrote to memory of 2716 2688 {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe 32 PID 2688 wrote to memory of 2716 2688 {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe 32 PID 2688 wrote to memory of 2716 2688 {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe 32 PID 2688 wrote to memory of 2832 2688 {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe 33 PID 2688 wrote to memory of 2832 2688 {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe 33 PID 2688 wrote to memory of 2832 2688 {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe 33 PID 2688 wrote to memory of 2832 2688 {DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe 33 PID 2716 wrote to memory of 2672 2716 {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe 36 PID 2716 wrote to memory of 2672 2716 {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe 36 PID 2716 wrote to memory of 2672 2716 {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe 36 PID 2716 wrote to memory of 2672 2716 {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe 36 PID 2716 wrote to memory of 2564 2716 {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe 37 PID 2716 wrote to memory of 2564 2716 {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe 37 PID 2716 wrote to memory of 2564 2716 {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe 37 PID 2716 wrote to memory of 2564 2716 {932E1B2E-88D5-463e-9874-C776CC087E7C}.exe 37 PID 2672 wrote to memory of 2616 2672 {AAA0A556-84B6-46af-861B-6408518520E4}.exe 38 PID 2672 wrote to memory of 2616 2672 {AAA0A556-84B6-46af-861B-6408518520E4}.exe 38 PID 2672 wrote to memory of 2616 2672 {AAA0A556-84B6-46af-861B-6408518520E4}.exe 38 PID 2672 wrote to memory of 2616 2672 {AAA0A556-84B6-46af-861B-6408518520E4}.exe 38 PID 2672 wrote to memory of 1740 2672 {AAA0A556-84B6-46af-861B-6408518520E4}.exe 39 PID 2672 wrote to memory of 1740 2672 {AAA0A556-84B6-46af-861B-6408518520E4}.exe 39 PID 2672 wrote to memory of 1740 2672 {AAA0A556-84B6-46af-861B-6408518520E4}.exe 39 PID 2672 wrote to memory of 1740 2672 {AAA0A556-84B6-46af-861B-6408518520E4}.exe 39 PID 2616 wrote to memory of 1624 2616 {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe 41 PID 2616 wrote to memory of 1624 2616 {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe 41 PID 2616 wrote to memory of 1624 2616 {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe 41 PID 2616 wrote to memory of 1624 2616 {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe 41 PID 2616 wrote to memory of 2020 2616 {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe 40 PID 2616 wrote to memory of 2020 2616 {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe 40 PID 2616 wrote to memory of 2020 2616 {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe 40 PID 2616 wrote to memory of 2020 2616 {A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe 40 PID 1624 wrote to memory of 536 1624 {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe 42 PID 1624 wrote to memory of 536 1624 {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe 42 PID 1624 wrote to memory of 536 1624 {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe 42 PID 1624 wrote to memory of 536 1624 {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe 42 PID 1624 wrote to memory of 2756 1624 {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe 43 PID 1624 wrote to memory of 2756 1624 {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe 43 PID 1624 wrote to memory of 2756 1624 {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe 43 PID 1624 wrote to memory of 2756 1624 {B86741DA-523F-49f6-A2F6-0775A557CE83}.exe 43 PID 536 wrote to memory of 2900 536 {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe 44 PID 536 wrote to memory of 2900 536 {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe 44 PID 536 wrote to memory of 2900 536 {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe 44 PID 536 wrote to memory of 2900 536 {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe 44 PID 536 wrote to memory of 2904 536 {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe 45 PID 536 wrote to memory of 2904 536 {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe 45 PID 536 wrote to memory of 2904 536 {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe 45 PID 536 wrote to memory of 2904 536 {A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-04_36c0c4d8061a8637cb14fb299617cac8_goldeneye_JC.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\{037712BB-708E-4bd0-AF19-CD5057757689}.exeC:\Windows\{037712BB-708E-4bd0-AF19-CD5057757689}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\{DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exeC:\Windows\{DC40B019-2D41-427d-8BB7-6831EED5DBCA}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\{932E1B2E-88D5-463e-9874-C776CC087E7C}.exeC:\Windows\{932E1B2E-88D5-463e-9874-C776CC087E7C}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\{AAA0A556-84B6-46af-861B-6408518520E4}.exeC:\Windows\{AAA0A556-84B6-46af-861B-6408518520E4}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\{A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exeC:\Windows\{A8A96AE3-7204-4bff-9EE0-69071B5042E1}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8A96~1.EXE > nul7⤵PID:2020
-
-
C:\Windows\{B86741DA-523F-49f6-A2F6-0775A557CE83}.exeC:\Windows\{B86741DA-523F-49f6-A2F6-0775A557CE83}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\{A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exeC:\Windows\{A7D1F581-4AA3-4361-80C4-0D184E9032A2}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\{4DB07949-EACF-4180-A1DE-408119198CE5}.exeC:\Windows\{4DB07949-EACF-4180-A1DE-408119198CE5}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\{7AA7FF82-09E7-4b47-B01B-D56A670D2E30}.exeC:\Windows\{7AA7FF82-09E7-4b47-B01B-D56A670D2E30}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1044 -
C:\Windows\{89ECEB9C-2F09-4718-9450-96A7FD55E572}.exeC:\Windows\{89ECEB9C-2F09-4718-9450-96A7FD55E572}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2516 -
C:\Windows\{BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB}.exeC:\Windows\{BD5B7B43-5E7F-420d-ADD2-1F19C354D2CB}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Windows\{A9494DE2-4263-4f62-B78D-E70D5D7301E7}.exeC:\Windows\{A9494DE2-4263-4f62-B78D-E70D5D7301E7}.exe13⤵
- Executes dropped EXE
PID:2184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BD5B7~1.EXE > nul13⤵PID:1460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{89ECE~1.EXE > nul12⤵PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7AA7F~1.EXE > nul11⤵PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4DB07~1.EXE > nul10⤵PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A7D1F~1.EXE > nul9⤵PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B8674~1.EXE > nul8⤵PID:2756
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AAA0A~1.EXE > nul6⤵PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{932E1~1.EXE > nul5⤵PID:2564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DC40B~1.EXE > nul4⤵PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03771~1.EXE > nul3⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\NEAS20~1.EXE > nul2⤵
- Deletes itself
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD57e7e30d8c122153ce3f9259955c20b38
SHA1c4a51af2bd6976cd25b19392b282cc977ccdd820
SHA256ce6f1cab3362c97ea627ee026e76da60d11d6668e8cb712dfdd3708f9f0930d4
SHA512eb9fb5add496544d9b2fc70a2c4751476dee522a9319f794f15aa5a4382e97f0eb7419502cfccf6b8c69a9557239241f7574d0d30a18918c6e5b8f559566eb01
-
Filesize
204KB
MD57e7e30d8c122153ce3f9259955c20b38
SHA1c4a51af2bd6976cd25b19392b282cc977ccdd820
SHA256ce6f1cab3362c97ea627ee026e76da60d11d6668e8cb712dfdd3708f9f0930d4
SHA512eb9fb5add496544d9b2fc70a2c4751476dee522a9319f794f15aa5a4382e97f0eb7419502cfccf6b8c69a9557239241f7574d0d30a18918c6e5b8f559566eb01
-
Filesize
204KB
MD57e7e30d8c122153ce3f9259955c20b38
SHA1c4a51af2bd6976cd25b19392b282cc977ccdd820
SHA256ce6f1cab3362c97ea627ee026e76da60d11d6668e8cb712dfdd3708f9f0930d4
SHA512eb9fb5add496544d9b2fc70a2c4751476dee522a9319f794f15aa5a4382e97f0eb7419502cfccf6b8c69a9557239241f7574d0d30a18918c6e5b8f559566eb01
-
Filesize
204KB
MD58f322620cb458c03f2596aae95f06d93
SHA1d2aaecf95065ac735f03269dc357d736933429e0
SHA2564f6e4dc33f51e9712b38e4ec83ca06b771a20effb3f7caf42b4fb41146a1e915
SHA5127036c2b4fe38ab0eeb44d64582d8844a3c114ed36c53e075d014832272b51b93cc6cd8e561735488825ea62f00af4f9d1bfa4cdd5056c6400790ddb3b4b4058b
-
Filesize
204KB
MD58f322620cb458c03f2596aae95f06d93
SHA1d2aaecf95065ac735f03269dc357d736933429e0
SHA2564f6e4dc33f51e9712b38e4ec83ca06b771a20effb3f7caf42b4fb41146a1e915
SHA5127036c2b4fe38ab0eeb44d64582d8844a3c114ed36c53e075d014832272b51b93cc6cd8e561735488825ea62f00af4f9d1bfa4cdd5056c6400790ddb3b4b4058b
-
Filesize
204KB
MD550d33c1d841898bbb6ef27d6267f8866
SHA17b58eb5b6821dbdd84da49828bac8bbd46609103
SHA2567b3153e9507e16dcac6e71f7df43602763505c4777983898e618382ba7b4b84b
SHA512505b83fc2809e9220909270554acbd0e83442754725130c4c9d5601a68f94f1186d910dce01415a5b2532e9cf28565a35036f00e3d4dfdcdd12e088ae235fdd0
-
Filesize
204KB
MD550d33c1d841898bbb6ef27d6267f8866
SHA17b58eb5b6821dbdd84da49828bac8bbd46609103
SHA2567b3153e9507e16dcac6e71f7df43602763505c4777983898e618382ba7b4b84b
SHA512505b83fc2809e9220909270554acbd0e83442754725130c4c9d5601a68f94f1186d910dce01415a5b2532e9cf28565a35036f00e3d4dfdcdd12e088ae235fdd0
-
Filesize
204KB
MD55679875dedd414c7cbd42eaee62986a7
SHA1b193e010c9930bbe71e25d9f5bb2593055e39f36
SHA256d864c0a7590e71d7b20d7cb58951a02d66a3e72bd68738650cb22df08e813675
SHA5125c77a2e4d5dc027cb04534e60e4e01b1da81fc2ef668c6c76c7cfd21e5bad0f822fd0248213380365426a706359adc7ae5b5cb85c4c1db2593acad5d078cc48b
-
Filesize
204KB
MD55679875dedd414c7cbd42eaee62986a7
SHA1b193e010c9930bbe71e25d9f5bb2593055e39f36
SHA256d864c0a7590e71d7b20d7cb58951a02d66a3e72bd68738650cb22df08e813675
SHA5125c77a2e4d5dc027cb04534e60e4e01b1da81fc2ef668c6c76c7cfd21e5bad0f822fd0248213380365426a706359adc7ae5b5cb85c4c1db2593acad5d078cc48b
-
Filesize
204KB
MD58f31ad86c0845a91b6e9b58f36fc73f9
SHA1d75b6c48d05b4a44080127361012e107b29d7850
SHA256d4398214970cbf4bbb171b110bc4c48dd911d8a5efda16b527ac6df1e5476b89
SHA5125e34a81afd384928e3967b9d2248b65e0a1c0b1fa7a321606f60130de89e173c666440a51d70205a631b9866b1c651f1ee631094b7bd4ec853856553c6638896
-
Filesize
204KB
MD58f31ad86c0845a91b6e9b58f36fc73f9
SHA1d75b6c48d05b4a44080127361012e107b29d7850
SHA256d4398214970cbf4bbb171b110bc4c48dd911d8a5efda16b527ac6df1e5476b89
SHA5125e34a81afd384928e3967b9d2248b65e0a1c0b1fa7a321606f60130de89e173c666440a51d70205a631b9866b1c651f1ee631094b7bd4ec853856553c6638896
-
Filesize
204KB
MD549ce1e925be79ab6e8c3f66e8f397e6c
SHA12d644cd2eb126185617d2ca0b7a694652a681255
SHA2560feca7156b5f07a922114e8760386667082c586f1fb940d0c815bab6e9e2d319
SHA512e31d7fc3e4324d5b6b3c2b711c382f0f2206ea2d96f12ce54eb325b5f31a9f30e684f39e118d7daa7853ece166eaa6511270c0fa65306716dbe98f05a9bddba4
-
Filesize
204KB
MD549ce1e925be79ab6e8c3f66e8f397e6c
SHA12d644cd2eb126185617d2ca0b7a694652a681255
SHA2560feca7156b5f07a922114e8760386667082c586f1fb940d0c815bab6e9e2d319
SHA512e31d7fc3e4324d5b6b3c2b711c382f0f2206ea2d96f12ce54eb325b5f31a9f30e684f39e118d7daa7853ece166eaa6511270c0fa65306716dbe98f05a9bddba4
-
Filesize
204KB
MD50f5d382ab8c16e1a1a49ae4b0bedc8fb
SHA135956bde8d3063449a3dc42511c5317a72792b6d
SHA256afde956082caa0f8690e1f66bb2b9a2efe10d3313f83844add7a13fdd5ea940b
SHA512b289ec10a168d118efcb08838f3de218c86d121b71a3f60f88d72815f81b6b37be0717665504d886328c0d51fee7fd9f51d8240cf55606c492a10c06e596999d
-
Filesize
204KB
MD50f5d382ab8c16e1a1a49ae4b0bedc8fb
SHA135956bde8d3063449a3dc42511c5317a72792b6d
SHA256afde956082caa0f8690e1f66bb2b9a2efe10d3313f83844add7a13fdd5ea940b
SHA512b289ec10a168d118efcb08838f3de218c86d121b71a3f60f88d72815f81b6b37be0717665504d886328c0d51fee7fd9f51d8240cf55606c492a10c06e596999d
-
Filesize
204KB
MD54de66eb71964ce9e62475f1b541a3e4d
SHA16f341c8a1e934b6c811e883bfffc60d0ee96641e
SHA256af395d5136a3fbcd03972e5c216e9630301bf1df3cc905b3d5d418b384ed808f
SHA512339e661ad9d52578346d6853f467c190ca4b624654b8f1d49fff134e2528defc6d020fd50ca8387e62217a8c0f3ff4ae6950fb2ab1e3d6d66f55c48ae3e566e4
-
Filesize
204KB
MD546b1ac89c63a51cb589dec0b3c61fae7
SHA181e1727f3207f6b4194db2cfa4bb78aab5c25e3f
SHA25629be8d14f9873a7feeaa7e7528b38477f1f97fd403e8d4c8baf8a9657c548066
SHA512008b9ef04f0b16bb64f9d4aaa580a2e69dc6011824449d4f7df98cc91d29ec143d081ffbd64061802a4e665c9f018ba467f2ba064eb253ef570b01a7ab302a97
-
Filesize
204KB
MD546b1ac89c63a51cb589dec0b3c61fae7
SHA181e1727f3207f6b4194db2cfa4bb78aab5c25e3f
SHA25629be8d14f9873a7feeaa7e7528b38477f1f97fd403e8d4c8baf8a9657c548066
SHA512008b9ef04f0b16bb64f9d4aaa580a2e69dc6011824449d4f7df98cc91d29ec143d081ffbd64061802a4e665c9f018ba467f2ba064eb253ef570b01a7ab302a97
-
Filesize
204KB
MD5cdcdc0e480c33129a5bf5930c6eaaa01
SHA126dbbd5cdf18fa8f52d268f1fa1727016a4fa141
SHA2563389a223298157c31ef7e64da6b103a823ddb3b32179a89c6a4cbce914f6e8d3
SHA51245b6023eddb5e5394bac5038a17fbf7e28cf973d0a55711618841961387ec90f6ad2be8f34a99c7a108edaf3d24ec14ca7f1e9b879c7a967173ca6abc086fe15
-
Filesize
204KB
MD5cdcdc0e480c33129a5bf5930c6eaaa01
SHA126dbbd5cdf18fa8f52d268f1fa1727016a4fa141
SHA2563389a223298157c31ef7e64da6b103a823ddb3b32179a89c6a4cbce914f6e8d3
SHA51245b6023eddb5e5394bac5038a17fbf7e28cf973d0a55711618841961387ec90f6ad2be8f34a99c7a108edaf3d24ec14ca7f1e9b879c7a967173ca6abc086fe15
-
Filesize
204KB
MD51311dc84428f617779c1307599ec5569
SHA1daa76dd90da115d5cf3a3c6c046f324d97564f71
SHA256f2c7ed102b3d28254336fcef7f6321424ab47c0beb3ca193f9d0d059eee7a343
SHA51268e94a1d93af22128de78c76016846471f6d7124c4f2454a3a09d6259293badb1b30445f78142e18a7d8028901d504de7337a2ebd57336b9946b2fbb4142d2d1
-
Filesize
204KB
MD51311dc84428f617779c1307599ec5569
SHA1daa76dd90da115d5cf3a3c6c046f324d97564f71
SHA256f2c7ed102b3d28254336fcef7f6321424ab47c0beb3ca193f9d0d059eee7a343
SHA51268e94a1d93af22128de78c76016846471f6d7124c4f2454a3a09d6259293badb1b30445f78142e18a7d8028901d504de7337a2ebd57336b9946b2fbb4142d2d1
-
Filesize
204KB
MD5b5d35da474738bbbe94fd5372d73d089
SHA14a923cf553bba0b504f065ca6d48098e83cc29f1
SHA25680d91a5d10ff4cf914c932b6bb94409dc37128046b6d11c20b9db16f10a04b16
SHA5127baf4e20e8dd02e341ae1e7be49a1959e284210d27493cdb47899a80eb0e715f3386b134c1ecc747e07f4f70ef8e4e5ab4e026b359dc7d59b5049aff14bca43a
-
Filesize
204KB
MD5b5d35da474738bbbe94fd5372d73d089
SHA14a923cf553bba0b504f065ca6d48098e83cc29f1
SHA25680d91a5d10ff4cf914c932b6bb94409dc37128046b6d11c20b9db16f10a04b16
SHA5127baf4e20e8dd02e341ae1e7be49a1959e284210d27493cdb47899a80eb0e715f3386b134c1ecc747e07f4f70ef8e4e5ab4e026b359dc7d59b5049aff14bca43a