Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe
-
Size
180KB
-
MD5
66ecaaa2fef6957e6cdcd20f836eb509
-
SHA1
dec2b132dd0f5d1aaddbfdc2a6f517d662699787
-
SHA256
700a789183d05343bd8184ae0acd3b8ce3cdb8f657f513e8616f18c8aa9ec37c
-
SHA512
08d1d47c28f3013f3a9392a29cebe496df0ca36f8c095eb1d38cef3ad94d7fa6488be65e61c8ea58863747861efa7de4f1e3f720ff0c072318248d7b98e2b4ba
-
SSDEEP
3072:jEGh0ovlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGhl5eKcAEc
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B9E97CD-3856-4fb0-9533-FAE81E16120D} {1B4C28D4-D6C2-4137-BFAE-4F825ED856A7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{844F8C0F-D720-41af-A610-B7A84C4A1B6A} {8B9E97CD-3856-4fb0-9533-FAE81E16120D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{844F8C0F-D720-41af-A610-B7A84C4A1B6A}\stubpath = "C:\\Windows\\{844F8C0F-D720-41af-A610-B7A84C4A1B6A}.exe" {8B9E97CD-3856-4fb0-9533-FAE81E16120D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E09E19A-293F-46d0-A162-423B74D4E3E9} NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}\stubpath = "C:\\Windows\\{BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe" {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46CDE81C-E94D-4928-81F1-EB4CD869E102}\stubpath = "C:\\Windows\\{46CDE81C-E94D-4928-81F1-EB4CD869E102}.exe" {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1B4C28D4-D6C2-4137-BFAE-4F825ED856A7} {46CDE81C-E94D-4928-81F1-EB4CD869E102}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1B4C28D4-D6C2-4137-BFAE-4F825ED856A7}\stubpath = "C:\\Windows\\{1B4C28D4-D6C2-4137-BFAE-4F825ED856A7}.exe" {46CDE81C-E94D-4928-81F1-EB4CD869E102}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E09E19A-293F-46d0-A162-423B74D4E3E9}\stubpath = "C:\\Windows\\{8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe" NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A0698A2-13C8-48bc-A75C-665A885BFE88}\stubpath = "C:\\Windows\\{9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe" {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}\stubpath = "C:\\Windows\\{5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe" {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BF57511D-9FDE-48df-BFA2-E35ADF75E0BF} {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E287B7D5-1CEE-415d-BF4B-62E36138D3D9} {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46C0999B-B6A3-41cc-ACE4-1F26B24141A4} {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B9E97CD-3856-4fb0-9533-FAE81E16120D}\stubpath = "C:\\Windows\\{8B9E97CD-3856-4fb0-9533-FAE81E16120D}.exe" {1B4C28D4-D6C2-4137-BFAE-4F825ED856A7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A0698A2-13C8-48bc-A75C-665A885BFE88} {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4} {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E287B7D5-1CEE-415d-BF4B-62E36138D3D9}\stubpath = "C:\\Windows\\{E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe" {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{85643409-DFA5-4df1-A48D-BCE11C97D21A} {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{85643409-DFA5-4df1-A48D-BCE11C97D21A}\stubpath = "C:\\Windows\\{85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe" {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46C0999B-B6A3-41cc-ACE4-1F26B24141A4}\stubpath = "C:\\Windows\\{46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe" {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46CDE81C-E94D-4928-81F1-EB4CD869E102} {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe -
Deletes itself 1 IoCs
pid Process 2336 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3024 {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe 2776 {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe 2536 {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe 2648 {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe 2540 {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe 2972 {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe 2492 {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe 1672 {46CDE81C-E94D-4928-81F1-EB4CD869E102}.exe 2568 {1B4C28D4-D6C2-4137-BFAE-4F825ED856A7}.exe 2752 {8B9E97CD-3856-4fb0-9533-FAE81E16120D}.exe 2000 {844F8C0F-D720-41af-A610-B7A84C4A1B6A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe File created C:\Windows\{46CDE81C-E94D-4928-81F1-EB4CD869E102}.exe {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe File created C:\Windows\{1B4C28D4-D6C2-4137-BFAE-4F825ED856A7}.exe {46CDE81C-E94D-4928-81F1-EB4CD869E102}.exe File created C:\Windows\{8B9E97CD-3856-4fb0-9533-FAE81E16120D}.exe {1B4C28D4-D6C2-4137-BFAE-4F825ED856A7}.exe File created C:\Windows\{844F8C0F-D720-41af-A610-B7A84C4A1B6A}.exe {8B9E97CD-3856-4fb0-9533-FAE81E16120D}.exe File created C:\Windows\{8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe File created C:\Windows\{5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe File created C:\Windows\{BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe File created C:\Windows\{9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe File created C:\Windows\{85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe File created C:\Windows\{46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2340 NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe Token: SeIncBasePriorityPrivilege 3024 {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe Token: SeIncBasePriorityPrivilege 2776 {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe Token: SeIncBasePriorityPrivilege 2536 {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe Token: SeIncBasePriorityPrivilege 2648 {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe Token: SeIncBasePriorityPrivilege 2540 {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe Token: SeIncBasePriorityPrivilege 2972 {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe Token: SeIncBasePriorityPrivilege 2492 {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe Token: SeIncBasePriorityPrivilege 1672 {46CDE81C-E94D-4928-81F1-EB4CD869E102}.exe Token: SeIncBasePriorityPrivilege 2568 {1B4C28D4-D6C2-4137-BFAE-4F825ED856A7}.exe Token: SeIncBasePriorityPrivilege 2752 {8B9E97CD-3856-4fb0-9533-FAE81E16120D}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 3024 2340 NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe 28 PID 2340 wrote to memory of 3024 2340 NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe 28 PID 2340 wrote to memory of 3024 2340 NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe 28 PID 2340 wrote to memory of 3024 2340 NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe 28 PID 2340 wrote to memory of 2336 2340 NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe 29 PID 2340 wrote to memory of 2336 2340 NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe 29 PID 2340 wrote to memory of 2336 2340 NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe 29 PID 2340 wrote to memory of 2336 2340 NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe 29 PID 3024 wrote to memory of 2776 3024 {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe 32 PID 3024 wrote to memory of 2776 3024 {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe 32 PID 3024 wrote to memory of 2776 3024 {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe 32 PID 3024 wrote to memory of 2776 3024 {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe 32 PID 3024 wrote to memory of 2784 3024 {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe 33 PID 3024 wrote to memory of 2784 3024 {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe 33 PID 3024 wrote to memory of 2784 3024 {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe 33 PID 3024 wrote to memory of 2784 3024 {8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe 33 PID 2776 wrote to memory of 2536 2776 {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe 34 PID 2776 wrote to memory of 2536 2776 {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe 34 PID 2776 wrote to memory of 2536 2776 {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe 34 PID 2776 wrote to memory of 2536 2776 {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe 34 PID 2776 wrote to memory of 2532 2776 {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe 35 PID 2776 wrote to memory of 2532 2776 {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe 35 PID 2776 wrote to memory of 2532 2776 {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe 35 PID 2776 wrote to memory of 2532 2776 {9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe 35 PID 2536 wrote to memory of 2648 2536 {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe 36 PID 2536 wrote to memory of 2648 2536 {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe 36 PID 2536 wrote to memory of 2648 2536 {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe 36 PID 2536 wrote to memory of 2648 2536 {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe 36 PID 2536 wrote to memory of 2428 2536 {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe 37 PID 2536 wrote to memory of 2428 2536 {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe 37 PID 2536 wrote to memory of 2428 2536 {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe 37 PID 2536 wrote to memory of 2428 2536 {5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe 37 PID 2648 wrote to memory of 2540 2648 {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe 38 PID 2648 wrote to memory of 2540 2648 {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe 38 PID 2648 wrote to memory of 2540 2648 {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe 38 PID 2648 wrote to memory of 2540 2648 {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe 38 PID 2648 wrote to memory of 2632 2648 {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe 39 PID 2648 wrote to memory of 2632 2648 {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe 39 PID 2648 wrote to memory of 2632 2648 {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe 39 PID 2648 wrote to memory of 2632 2648 {BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe 39 PID 2540 wrote to memory of 2972 2540 {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe 40 PID 2540 wrote to memory of 2972 2540 {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe 40 PID 2540 wrote to memory of 2972 2540 {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe 40 PID 2540 wrote to memory of 2972 2540 {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe 40 PID 2540 wrote to memory of 2984 2540 {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe 41 PID 2540 wrote to memory of 2984 2540 {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe 41 PID 2540 wrote to memory of 2984 2540 {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe 41 PID 2540 wrote to memory of 2984 2540 {E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe 41 PID 2972 wrote to memory of 2492 2972 {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe 42 PID 2972 wrote to memory of 2492 2972 {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe 42 PID 2972 wrote to memory of 2492 2972 {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe 42 PID 2972 wrote to memory of 2492 2972 {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe 42 PID 2972 wrote to memory of 956 2972 {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe 43 PID 2972 wrote to memory of 956 2972 {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe 43 PID 2972 wrote to memory of 956 2972 {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe 43 PID 2972 wrote to memory of 956 2972 {85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe 43 PID 2492 wrote to memory of 1672 2492 {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe 44 PID 2492 wrote to memory of 1672 2492 {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe 44 PID 2492 wrote to memory of 1672 2492 {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe 44 PID 2492 wrote to memory of 1672 2492 {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe 44 PID 2492 wrote to memory of 852 2492 {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe 45 PID 2492 wrote to memory of 852 2492 {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe 45 PID 2492 wrote to memory of 852 2492 {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe 45 PID 2492 wrote to memory of 852 2492 {46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-07_66ecaaa2fef6957e6cdcd20f836eb509_goldeneye_JC.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\{8E09E19A-293F-46d0-A162-423B74D4E3E9}.exeC:\Windows\{8E09E19A-293F-46d0-A162-423B74D4E3E9}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{9A0698A2-13C8-48bc-A75C-665A885BFE88}.exeC:\Windows\{9A0698A2-13C8-48bc-A75C-665A885BFE88}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\{5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exeC:\Windows\{5ACBA68E-D806-4fa0-BD0B-1A6FA9369DE4}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\{BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exeC:\Windows\{BF57511D-9FDE-48df-BFA2-E35ADF75E0BF}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\{E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exeC:\Windows\{E287B7D5-1CEE-415d-BF4B-62E36138D3D9}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\{85643409-DFA5-4df1-A48D-BCE11C97D21A}.exeC:\Windows\{85643409-DFA5-4df1-A48D-BCE11C97D21A}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exeC:\Windows\{46C0999B-B6A3-41cc-ACE4-1F26B24141A4}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\{46CDE81C-E94D-4928-81F1-EB4CD869E102}.exeC:\Windows\{46CDE81C-E94D-4928-81F1-EB4CD869E102}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\{1B4C28D4-D6C2-4137-BFAE-4F825ED856A7}.exeC:\Windows\{1B4C28D4-D6C2-4137-BFAE-4F825ED856A7}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1B4C2~1.EXE > nul11⤵PID:2864
-
-
C:\Windows\{8B9E97CD-3856-4fb0-9533-FAE81E16120D}.exeC:\Windows\{8B9E97CD-3856-4fb0-9533-FAE81E16120D}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Windows\{844F8C0F-D720-41af-A610-B7A84C4A1B6A}.exeC:\Windows\{844F8C0F-D720-41af-A610-B7A84C4A1B6A}.exe12⤵
- Executes dropped EXE
PID:2000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B9E9~1.EXE > nul12⤵PID:2056
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{46CDE~1.EXE > nul10⤵PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{46C09~1.EXE > nul9⤵PID:852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{85643~1.EXE > nul8⤵PID:956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E287B~1.EXE > nul7⤵PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BF575~1.EXE > nul6⤵PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5ACBA~1.EXE > nul5⤵PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9A069~1.EXE > nul4⤵PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E09E~1.EXE > nul3⤵PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\NEAS20~1.EXE > nul2⤵
- Deletes itself
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD59fd887df2019ea8fdb6984df3e3c16db
SHA132d4c2ae0e393c8f730c36073f6df036e90b285b
SHA256e765fb85aaf773ad8212a10cbd9f1a9cf1ed033fe1774aade36bc7ac74c95efc
SHA51255a739515b1d02b17d930994faabc51306b59d026047b329dc4aef08639d0ddba97319b9676531f3cd8012834d38e2fa9ff7bcbb914577b6158251bdca97b8e3
-
Filesize
180KB
MD59fd887df2019ea8fdb6984df3e3c16db
SHA132d4c2ae0e393c8f730c36073f6df036e90b285b
SHA256e765fb85aaf773ad8212a10cbd9f1a9cf1ed033fe1774aade36bc7ac74c95efc
SHA51255a739515b1d02b17d930994faabc51306b59d026047b329dc4aef08639d0ddba97319b9676531f3cd8012834d38e2fa9ff7bcbb914577b6158251bdca97b8e3
-
Filesize
180KB
MD5862101e4ce816460e3ec3e844dca6a4d
SHA150a3be3bda4dc9b9569f888d5454927bd5cd824c
SHA256e191974fc26501c9fd7ef1bf54561920d3edf20e829640fce3e6e0ee2113b096
SHA5127e8c160b9c2e9dc8ff7aa9739c83f609bc5ba050b79fe2070fffd142e8e2bfefaf44624c632d762c670b6555449d0cffcb237b3b85d8518b14559520ffa757b5
-
Filesize
180KB
MD5862101e4ce816460e3ec3e844dca6a4d
SHA150a3be3bda4dc9b9569f888d5454927bd5cd824c
SHA256e191974fc26501c9fd7ef1bf54561920d3edf20e829640fce3e6e0ee2113b096
SHA5127e8c160b9c2e9dc8ff7aa9739c83f609bc5ba050b79fe2070fffd142e8e2bfefaf44624c632d762c670b6555449d0cffcb237b3b85d8518b14559520ffa757b5
-
Filesize
180KB
MD583ff3241d58002cacbe82801414f99d9
SHA1209089517055cac51744707f1f5272dfdfe2fffe
SHA2564932ffac3a7abe82f8d7098677d41836375558badbcdfc16da36adc3c3e2e7a2
SHA512c5540d690f0016624ebdf4fbb5f04e778a8564fdd0be992b0e29c55a565e58f699301adaf854135a3d032b4effe48bdc0813e43de10a59443cd599993fe93de3
-
Filesize
180KB
MD583ff3241d58002cacbe82801414f99d9
SHA1209089517055cac51744707f1f5272dfdfe2fffe
SHA2564932ffac3a7abe82f8d7098677d41836375558badbcdfc16da36adc3c3e2e7a2
SHA512c5540d690f0016624ebdf4fbb5f04e778a8564fdd0be992b0e29c55a565e58f699301adaf854135a3d032b4effe48bdc0813e43de10a59443cd599993fe93de3
-
Filesize
180KB
MD5d641af428f573799d1bba07e849ad93b
SHA18c0da6acb64257703bdfc405b79b96779091e2d2
SHA256e6c12ecf28f7f2317f43970e1119f862ebe9bf70a45dd1310832853df0c76390
SHA512412c52923a5239a8deaa87787dbe312192b3ce9442a71185a61059370b4232616f1067a3aae0760e8df484667eeeb026f0de14b1227e379a928e2d5a93608ee3
-
Filesize
180KB
MD5d641af428f573799d1bba07e849ad93b
SHA18c0da6acb64257703bdfc405b79b96779091e2d2
SHA256e6c12ecf28f7f2317f43970e1119f862ebe9bf70a45dd1310832853df0c76390
SHA512412c52923a5239a8deaa87787dbe312192b3ce9442a71185a61059370b4232616f1067a3aae0760e8df484667eeeb026f0de14b1227e379a928e2d5a93608ee3
-
Filesize
180KB
MD5128053110303191691d315d5ccaf8a63
SHA1dbda5d69c8e64a05e29d5b552a6f3092c917c593
SHA256f2850abb0435f56aa33481af1ad8e39add4cbb488eb6656d4920686b1029d077
SHA5122f5a4dc4dfd9f5bcb701032455b8bd41a3291cae3f0e4ec0e79bfa4530fefde101bbc01777f484672d155ea7f4e71466d987a09abc3ed1c9464c5095e01b2e08
-
Filesize
180KB
MD5a2e3a68c1c591a1cd35b6f08b8e95cc1
SHA1865b467e03cd2b56fb2bc91d1589812f98d05c32
SHA256c2589a57ec317f0042fb30ac56f6583d4d2db3bdd5fd17977b0255fee77f50b8
SHA512ee2148cb96219512a2a86608cb250f5a9750da27825141e54e457350ca5818bf8c2273bf63c305da271841ba099689d95d20e6912eac38cd674987bc127f5630
-
Filesize
180KB
MD5a2e3a68c1c591a1cd35b6f08b8e95cc1
SHA1865b467e03cd2b56fb2bc91d1589812f98d05c32
SHA256c2589a57ec317f0042fb30ac56f6583d4d2db3bdd5fd17977b0255fee77f50b8
SHA512ee2148cb96219512a2a86608cb250f5a9750da27825141e54e457350ca5818bf8c2273bf63c305da271841ba099689d95d20e6912eac38cd674987bc127f5630
-
Filesize
180KB
MD57f4ef559c51f8daa1f040a89677ddda1
SHA194a5c7bd58f7e40482fbd5f664244ac387528783
SHA256b8a3c73abc251dd47a73a2a2991489ad76cc4942060dde6ee895dfc04eeed19b
SHA512bc65481d9c78751ca41e2d6003b0f0bae46fd8c8baa3577ef4cfbd6ef30729428147cb933cb59b2c63c76add4b636deaeef64e2218aca8cbe201c9933d6ec2e9
-
Filesize
180KB
MD57f4ef559c51f8daa1f040a89677ddda1
SHA194a5c7bd58f7e40482fbd5f664244ac387528783
SHA256b8a3c73abc251dd47a73a2a2991489ad76cc4942060dde6ee895dfc04eeed19b
SHA512bc65481d9c78751ca41e2d6003b0f0bae46fd8c8baa3577ef4cfbd6ef30729428147cb933cb59b2c63c76add4b636deaeef64e2218aca8cbe201c9933d6ec2e9
-
Filesize
180KB
MD5dbb0cc0b5757f6a6384b20a5c8cb38cc
SHA1ff089d77b163404429b6bec84cc5143590a85a7e
SHA256bb31185136b43fc703c42d93d1c99af1bf1779e2eccd9eda71892a46906bc05a
SHA512bbc188a964f23ef58c15f0ec03e9ec99f193a8461d17b8594f81cb30abcfc4beb6d88e6ccda8c7ca00dd82bf45465062f7e8f76a341ee6e4764de0a43d306442
-
Filesize
180KB
MD5dbb0cc0b5757f6a6384b20a5c8cb38cc
SHA1ff089d77b163404429b6bec84cc5143590a85a7e
SHA256bb31185136b43fc703c42d93d1c99af1bf1779e2eccd9eda71892a46906bc05a
SHA512bbc188a964f23ef58c15f0ec03e9ec99f193a8461d17b8594f81cb30abcfc4beb6d88e6ccda8c7ca00dd82bf45465062f7e8f76a341ee6e4764de0a43d306442
-
Filesize
180KB
MD5dbb0cc0b5757f6a6384b20a5c8cb38cc
SHA1ff089d77b163404429b6bec84cc5143590a85a7e
SHA256bb31185136b43fc703c42d93d1c99af1bf1779e2eccd9eda71892a46906bc05a
SHA512bbc188a964f23ef58c15f0ec03e9ec99f193a8461d17b8594f81cb30abcfc4beb6d88e6ccda8c7ca00dd82bf45465062f7e8f76a341ee6e4764de0a43d306442
-
Filesize
180KB
MD543a6aef2681a57432814938c0094ada4
SHA1769a615f2d63e555e0275f0cec6e03b6c726b995
SHA256bd7c7805378468430ead85b64ba9ae5845b642ae3c5c989f264d843d0787e183
SHA512375918694047f416a8d1f5cbc5982ab93a6d2c1de4d4d23191618f1b15a8e69b7829fe2aa1c11a32d00c98cb20df0fb91b0753cf45db1b5a9797a3780b982242
-
Filesize
180KB
MD543a6aef2681a57432814938c0094ada4
SHA1769a615f2d63e555e0275f0cec6e03b6c726b995
SHA256bd7c7805378468430ead85b64ba9ae5845b642ae3c5c989f264d843d0787e183
SHA512375918694047f416a8d1f5cbc5982ab93a6d2c1de4d4d23191618f1b15a8e69b7829fe2aa1c11a32d00c98cb20df0fb91b0753cf45db1b5a9797a3780b982242
-
Filesize
180KB
MD568caea20d21a3913c5880b7308a3928d
SHA1d5c11c1a85e8028c4460bc80d09cfeeb2b44220d
SHA25664eb98490f64129d3230f4ef2689c6bdd46442378b980503185f9d75177e1f08
SHA512c400f27bb23c1ce5d01e92c6a2ffd2ff3e731326c2684bfc83f1194e92bd20ed70d6d98dd6f4440fda9b417654e37471ca0b40583c46daa640fe7ea8d5227b34
-
Filesize
180KB
MD568caea20d21a3913c5880b7308a3928d
SHA1d5c11c1a85e8028c4460bc80d09cfeeb2b44220d
SHA25664eb98490f64129d3230f4ef2689c6bdd46442378b980503185f9d75177e1f08
SHA512c400f27bb23c1ce5d01e92c6a2ffd2ff3e731326c2684bfc83f1194e92bd20ed70d6d98dd6f4440fda9b417654e37471ca0b40583c46daa640fe7ea8d5227b34
-
Filesize
180KB
MD596438673cf6302f2186bb028052edc3e
SHA16df7fed5d577c1c671b3b603d44935ff1a00bb80
SHA256cf665a1724b20710ede5c90985d83cf7a94992858d47125650c7fda99bf3caa8
SHA512691e149279df2769126d5bdae05915928dcfbf5dc265f5a3794eb19be672917c2ff22d5db90a2c72818a39aafea3a5286bbc97e885e7089c1cc40850b7f03b8e
-
Filesize
180KB
MD596438673cf6302f2186bb028052edc3e
SHA16df7fed5d577c1c671b3b603d44935ff1a00bb80
SHA256cf665a1724b20710ede5c90985d83cf7a94992858d47125650c7fda99bf3caa8
SHA512691e149279df2769126d5bdae05915928dcfbf5dc265f5a3794eb19be672917c2ff22d5db90a2c72818a39aafea3a5286bbc97e885e7089c1cc40850b7f03b8e