Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe
-
Size
192KB
-
MD5
30634a46d23d0e3566c4d1d8f7f20051
-
SHA1
4c82333b3930241598c80109c151419867d25ab6
-
SHA256
0186d0d7b1cc38f73485fa487f3b20803154f2312128725df2494a40a8b37d80
-
SHA512
55f50cabf246ba3c20cfae101ac1005306ef124dbd51d92008d965457bdfeed0868262d2051c8fa99e8593850bab66eac0bcdba1c71b72575fa7a1eb55e381d7
-
SSDEEP
1536:1EGh0oNl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oNl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38E88D67-9538-4d21-AE27-C7D22A64C0B9}\stubpath = "C:\\Windows\\{38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe" {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1141F645-60AB-4407-83BD-C1C84D5A02BF} {961F8FF2-47EC-459c-90B2-368A44586B62}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{175A8A4D-55A2-4362-BB49-0E5C39E610EB} {0A554E23-F28B-497f-A094-B1371A108E7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03A0D1A5-537C-4d4b-86F4-6059B7075FBA} {175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{35695E08-6D48-4103-B68F-7F48E4506414} 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0} {35695E08-6D48-4103-B68F-7F48E4506414}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CDC5E69D-D361-4f1e-9462-429718EBA1E8} {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CDC5E69D-D361-4f1e-9462-429718EBA1E8}\stubpath = "C:\\Windows\\{CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe" {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{961F8FF2-47EC-459c-90B2-368A44586B62} {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A554E23-F28B-497f-A094-B1371A108E7C} {1141F645-60AB-4407-83BD-C1C84D5A02BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A554E23-F28B-497f-A094-B1371A108E7C}\stubpath = "C:\\Windows\\{0A554E23-F28B-497f-A094-B1371A108E7C}.exe" {1141F645-60AB-4407-83BD-C1C84D5A02BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38E88D67-9538-4d21-AE27-C7D22A64C0B9} {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{175A8A4D-55A2-4362-BB49-0E5C39E610EB}\stubpath = "C:\\Windows\\{175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe" {0A554E23-F28B-497f-A094-B1371A108E7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03A0D1A5-537C-4d4b-86F4-6059B7075FBA}\stubpath = "C:\\Windows\\{03A0D1A5-537C-4d4b-86F4-6059B7075FBA}.exe" {175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1141F645-60AB-4407-83BD-C1C84D5A02BF}\stubpath = "C:\\Windows\\{1141F645-60AB-4407-83BD-C1C84D5A02BF}.exe" {961F8FF2-47EC-459c-90B2-368A44586B62}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{35695E08-6D48-4103-B68F-7F48E4506414}\stubpath = "C:\\Windows\\{35695E08-6D48-4103-B68F-7F48E4506414}.exe" 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}\stubpath = "C:\\Windows\\{0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe" {35695E08-6D48-4103-B68F-7F48E4506414}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDC003BE-A05E-40a6-916D-D715E8F0DEAE} {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDC003BE-A05E-40a6-916D-D715E8F0DEAE}\stubpath = "C:\\Windows\\{BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe" {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{83A5CB57-5154-4767-BB92-17106AA1EF8E} {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{83A5CB57-5154-4767-BB92-17106AA1EF8E}\stubpath = "C:\\Windows\\{83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe" {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{961F8FF2-47EC-459c-90B2-368A44586B62}\stubpath = "C:\\Windows\\{961F8FF2-47EC-459c-90B2-368A44586B62}.exe" {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe -
Deletes itself 1 IoCs
pid Process 1076 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2268 {35695E08-6D48-4103-B68F-7F48E4506414}.exe 2648 {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe 2484 {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe 2500 {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe 960 {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe 1896 {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe 2548 {961F8FF2-47EC-459c-90B2-368A44586B62}.exe 948 {1141F645-60AB-4407-83BD-C1C84D5A02BF}.exe 2964 {0A554E23-F28B-497f-A094-B1371A108E7C}.exe 2276 {175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe 1664 {03A0D1A5-537C-4d4b-86F4-6059B7075FBA}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe File created C:\Windows\{CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe File created C:\Windows\{0A554E23-F28B-497f-A094-B1371A108E7C}.exe {1141F645-60AB-4407-83BD-C1C84D5A02BF}.exe File created C:\Windows\{175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe {0A554E23-F28B-497f-A094-B1371A108E7C}.exe File created C:\Windows\{03A0D1A5-537C-4d4b-86F4-6059B7075FBA}.exe {175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe File created C:\Windows\{35695E08-6D48-4103-B68F-7F48E4506414}.exe 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe File created C:\Windows\{0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe {35695E08-6D48-4103-B68F-7F48E4506414}.exe File created C:\Windows\{BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe File created C:\Windows\{38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe File created C:\Windows\{961F8FF2-47EC-459c-90B2-368A44586B62}.exe {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe File created C:\Windows\{1141F645-60AB-4407-83BD-C1C84D5A02BF}.exe {961F8FF2-47EC-459c-90B2-368A44586B62}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1216 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe Token: SeIncBasePriorityPrivilege 2268 {35695E08-6D48-4103-B68F-7F48E4506414}.exe Token: SeIncBasePriorityPrivilege 2648 {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe Token: SeIncBasePriorityPrivilege 2484 {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe Token: SeIncBasePriorityPrivilege 2500 {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe Token: SeIncBasePriorityPrivilege 960 {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe Token: SeIncBasePriorityPrivilege 1896 {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe Token: SeIncBasePriorityPrivilege 2548 {961F8FF2-47EC-459c-90B2-368A44586B62}.exe Token: SeIncBasePriorityPrivilege 948 {1141F645-60AB-4407-83BD-C1C84D5A02BF}.exe Token: SeIncBasePriorityPrivilege 2964 {0A554E23-F28B-497f-A094-B1371A108E7C}.exe Token: SeIncBasePriorityPrivilege 2276 {175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2268 1216 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 28 PID 1216 wrote to memory of 2268 1216 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 28 PID 1216 wrote to memory of 2268 1216 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 28 PID 1216 wrote to memory of 2268 1216 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 28 PID 1216 wrote to memory of 1076 1216 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 29 PID 1216 wrote to memory of 1076 1216 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 29 PID 1216 wrote to memory of 1076 1216 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 29 PID 1216 wrote to memory of 1076 1216 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 29 PID 2268 wrote to memory of 2648 2268 {35695E08-6D48-4103-B68F-7F48E4506414}.exe 30 PID 2268 wrote to memory of 2648 2268 {35695E08-6D48-4103-B68F-7F48E4506414}.exe 30 PID 2268 wrote to memory of 2648 2268 {35695E08-6D48-4103-B68F-7F48E4506414}.exe 30 PID 2268 wrote to memory of 2648 2268 {35695E08-6D48-4103-B68F-7F48E4506414}.exe 30 PID 2268 wrote to memory of 2640 2268 {35695E08-6D48-4103-B68F-7F48E4506414}.exe 31 PID 2268 wrote to memory of 2640 2268 {35695E08-6D48-4103-B68F-7F48E4506414}.exe 31 PID 2268 wrote to memory of 2640 2268 {35695E08-6D48-4103-B68F-7F48E4506414}.exe 31 PID 2268 wrote to memory of 2640 2268 {35695E08-6D48-4103-B68F-7F48E4506414}.exe 31 PID 2648 wrote to memory of 2484 2648 {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe 32 PID 2648 wrote to memory of 2484 2648 {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe 32 PID 2648 wrote to memory of 2484 2648 {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe 32 PID 2648 wrote to memory of 2484 2648 {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe 32 PID 2648 wrote to memory of 2728 2648 {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe 33 PID 2648 wrote to memory of 2728 2648 {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe 33 PID 2648 wrote to memory of 2728 2648 {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe 33 PID 2648 wrote to memory of 2728 2648 {0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe 33 PID 2484 wrote to memory of 2500 2484 {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe 37 PID 2484 wrote to memory of 2500 2484 {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe 37 PID 2484 wrote to memory of 2500 2484 {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe 37 PID 2484 wrote to memory of 2500 2484 {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe 37 PID 2484 wrote to memory of 2068 2484 {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe 36 PID 2484 wrote to memory of 2068 2484 {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe 36 PID 2484 wrote to memory of 2068 2484 {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe 36 PID 2484 wrote to memory of 2068 2484 {BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe 36 PID 2500 wrote to memory of 960 2500 {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe 39 PID 2500 wrote to memory of 960 2500 {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe 39 PID 2500 wrote to memory of 960 2500 {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe 39 PID 2500 wrote to memory of 960 2500 {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe 39 PID 2500 wrote to memory of 2732 2500 {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe 38 PID 2500 wrote to memory of 2732 2500 {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe 38 PID 2500 wrote to memory of 2732 2500 {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe 38 PID 2500 wrote to memory of 2732 2500 {83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe 38 PID 960 wrote to memory of 1896 960 {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe 41 PID 960 wrote to memory of 1896 960 {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe 41 PID 960 wrote to memory of 1896 960 {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe 41 PID 960 wrote to memory of 1896 960 {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe 41 PID 960 wrote to memory of 780 960 {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe 40 PID 960 wrote to memory of 780 960 {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe 40 PID 960 wrote to memory of 780 960 {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe 40 PID 960 wrote to memory of 780 960 {38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe 40 PID 1896 wrote to memory of 2548 1896 {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe 43 PID 1896 wrote to memory of 2548 1896 {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe 43 PID 1896 wrote to memory of 2548 1896 {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe 43 PID 1896 wrote to memory of 2548 1896 {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe 43 PID 1896 wrote to memory of 2792 1896 {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe 42 PID 1896 wrote to memory of 2792 1896 {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe 42 PID 1896 wrote to memory of 2792 1896 {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe 42 PID 1896 wrote to memory of 2792 1896 {CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe 42 PID 2548 wrote to memory of 948 2548 {961F8FF2-47EC-459c-90B2-368A44586B62}.exe 45 PID 2548 wrote to memory of 948 2548 {961F8FF2-47EC-459c-90B2-368A44586B62}.exe 45 PID 2548 wrote to memory of 948 2548 {961F8FF2-47EC-459c-90B2-368A44586B62}.exe 45 PID 2548 wrote to memory of 948 2548 {961F8FF2-47EC-459c-90B2-368A44586B62}.exe 45 PID 2548 wrote to memory of 1604 2548 {961F8FF2-47EC-459c-90B2-368A44586B62}.exe 44 PID 2548 wrote to memory of 1604 2548 {961F8FF2-47EC-459c-90B2-368A44586B62}.exe 44 PID 2548 wrote to memory of 1604 2548 {961F8FF2-47EC-459c-90B2-368A44586B62}.exe 44 PID 2548 wrote to memory of 1604 2548 {961F8FF2-47EC-459c-90B2-368A44586B62}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\{35695E08-6D48-4103-B68F-7F48E4506414}.exeC:\Windows\{35695E08-6D48-4103-B68F-7F48E4506414}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\{0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exeC:\Windows\{0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\{BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exeC:\Windows\{BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BDC00~1.EXE > nul5⤵PID:2068
-
-
C:\Windows\{83A5CB57-5154-4767-BB92-17106AA1EF8E}.exeC:\Windows\{83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{83A5C~1.EXE > nul6⤵PID:2732
-
-
C:\Windows\{38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exeC:\Windows\{38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{38E88~1.EXE > nul7⤵PID:780
-
-
C:\Windows\{CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exeC:\Windows\{CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CDC5E~1.EXE > nul8⤵PID:2792
-
-
C:\Windows\{961F8FF2-47EC-459c-90B2-368A44586B62}.exeC:\Windows\{961F8FF2-47EC-459c-90B2-368A44586B62}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{961F8~1.EXE > nul9⤵PID:1604
-
-
C:\Windows\{1141F645-60AB-4407-83BD-C1C84D5A02BF}.exeC:\Windows\{1141F645-60AB-4407-83BD-C1C84D5A02BF}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1141F~1.EXE > nul10⤵PID:2144
-
-
C:\Windows\{0A554E23-F28B-497f-A094-B1371A108E7C}.exeC:\Windows\{0A554E23-F28B-497f-A094-B1371A108E7C}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0A554~1.EXE > nul11⤵PID:488
-
-
C:\Windows\{175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exeC:\Windows\{175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{175A8~1.EXE > nul12⤵PID:580
-
-
C:\Windows\{03A0D1A5-537C-4d4b-86F4-6059B7075FBA}.exeC:\Windows\{03A0D1A5-537C-4d4b-86F4-6059B7075FBA}.exe12⤵
- Executes dropped EXE
PID:1664
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0FA28~1.EXE > nul4⤵PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{35695~1.EXE > nul3⤵PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5f365e3949a30e1376d754b00ef008c78
SHA1ac33065fa3e84888d7d8c97923e6ce1a147e6dfa
SHA25626c50d2e84ba908d280d221e13c252a0e6a259e349e6880b9d90c5dc46d0d596
SHA5120d9345fc4e63374c7d0ed7fab72d50a8aa39a6930aaadf7614e7246883c88218e95b40ee0ef571ff4cf3eaa9f73617f29fac6ebb066b258d9d50fcf20886846d
-
Filesize
192KB
MD57f25b036e91ddf882482be3cfc477812
SHA1fd7c2a0c7b94a6e17a226c02c2b62f7b907f9fda
SHA25609996628e282b99a19318d12bf783fa821d2df1420868b57350fec9701e35b52
SHA5129e314a9233f50d47c44d7498b9297f51203be4491565eb1d9ba5d8f5771333a95693ee197522275a3b293b8cc0a5ee6f30fdc66094740ee3a4dd56b17d66d363
-
Filesize
192KB
MD5ffed0bbb61e4dbb3f67edab0f12a19fc
SHA1dad62209ed1b15080cff188b1020f1cf6a862b85
SHA2566fedeec407fbef9c82493d17b2ae1abeaac75d5c503bd95f42712d108b6c595f
SHA5129b4ee9fe85c9e4f52bb6e16eca35b2630799af3801e8a236331338d2b8489017f5b7fdb15a79afaecec6cf794588c0c890c314355ccfe911467a5b493494cd34
-
Filesize
192KB
MD5cba176642a7fa08a309045ba617d6eb5
SHA19fa8cecf2c4db04f898f6a9bf18bd5825850eee8
SHA256727841373dc4d359f973e963a7dc63a71dd80e73c28270b085663938cca8a9ba
SHA512fb6ff4d1d2a18508a3c45aac81d8b3027536252bb4a1d67cb4b181c5406becc4bc1ea9fb19015991c6cd79c9bd993c87ba58869f07fbbe40599919a3d2796491