Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
175s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe
-
Size
180KB
-
MD5
3cd7da474f975728c7a6858e88bbc988
-
SHA1
67462fb564581df2b43a5c34b5a32ddbf098e53f
-
SHA256
c2112cafa52cf87e7ae0ee50ec0539b87fc154a04c9b2070fef51fbf7e22204f
-
SHA512
99a94411e15648f18ad4faa61ce20e6a7603e7df358a980578639b0ee1c958fc3c3659774342995a5153a49a8e8e3e7232bdaa13e8968874af51af8de067a81f
-
SSDEEP
3072:jEGh0odlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG3l5eKcAEc
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}\stubpath = "C:\\Windows\\{4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe" {B9025081-D37A-4e75-A9EE-0041EF923710}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5} {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6304329F-6831-48fe-BCCA-A384C7D21DB9}\stubpath = "C:\\Windows\\{6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe" {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{450DB8E7-49D9-4d6d-832A-66D2624ED71B}\stubpath = "C:\\Windows\\{450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe" {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F1AE724E-983E-497c-BE37-E569914DC03C} {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A24A206-DEC4-4367-AF58-5C37D14669CC} {5655268C-DCBB-4594-874B-691326FE4CC5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E17A4C5A-823D-41b6-B519-9CBDADE01C7D} {4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D8FBA087-2813-4e30-8D17-057939B8B41A} {E17A4C5A-823D-41b6-B519-9CBDADE01C7D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4BA1E780-9B5F-4dab-89D2-C3C87D9BE098} {B9025081-D37A-4e75-A9EE-0041EF923710}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}\stubpath = "C:\\Windows\\{5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe" {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6304329F-6831-48fe-BCCA-A384C7D21DB9} {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{450DB8E7-49D9-4d6d-832A-66D2624ED71B} {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5655268C-DCBB-4594-874B-691326FE4CC5}\stubpath = "C:\\Windows\\{5655268C-DCBB-4594-874B-691326FE4CC5}.exe" {F1AE724E-983E-497c-BE37-E569914DC03C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B}\stubpath = "C:\\Windows\\{4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B}.exe" {9A24A206-DEC4-4367-AF58-5C37D14669CC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E17A4C5A-823D-41b6-B519-9CBDADE01C7D}\stubpath = "C:\\Windows\\{E17A4C5A-823D-41b6-B519-9CBDADE01C7D}.exe" {4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D8FBA087-2813-4e30-8D17-057939B8B41A}\stubpath = "C:\\Windows\\{D8FBA087-2813-4e30-8D17-057939B8B41A}.exe" {E17A4C5A-823D-41b6-B519-9CBDADE01C7D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9025081-D37A-4e75-A9EE-0041EF923710} 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9025081-D37A-4e75-A9EE-0041EF923710}\stubpath = "C:\\Windows\\{B9025081-D37A-4e75-A9EE-0041EF923710}.exe" 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F1AE724E-983E-497c-BE37-E569914DC03C}\stubpath = "C:\\Windows\\{F1AE724E-983E-497c-BE37-E569914DC03C}.exe" {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5655268C-DCBB-4594-874B-691326FE4CC5} {F1AE724E-983E-497c-BE37-E569914DC03C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A24A206-DEC4-4367-AF58-5C37D14669CC}\stubpath = "C:\\Windows\\{9A24A206-DEC4-4367-AF58-5C37D14669CC}.exe" {5655268C-DCBB-4594-874B-691326FE4CC5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3E151235-7D4C-40be-9014-AFE7987EE5E2} {D8FBA087-2813-4e30-8D17-057939B8B41A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3E151235-7D4C-40be-9014-AFE7987EE5E2}\stubpath = "C:\\Windows\\{3E151235-7D4C-40be-9014-AFE7987EE5E2}.exe" {D8FBA087-2813-4e30-8D17-057939B8B41A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B} {9A24A206-DEC4-4367-AF58-5C37D14669CC}.exe -
Deletes itself 1 IoCs
pid Process 2792 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2216 {B9025081-D37A-4e75-A9EE-0041EF923710}.exe 3004 {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe 2872 {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe 1568 {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe 1528 {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe 2824 {F1AE724E-983E-497c-BE37-E569914DC03C}.exe 1328 {5655268C-DCBB-4594-874B-691326FE4CC5}.exe 3024 {9A24A206-DEC4-4367-AF58-5C37D14669CC}.exe 2068 {4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B}.exe 2268 {E17A4C5A-823D-41b6-B519-9CBDADE01C7D}.exe 1964 {D8FBA087-2813-4e30-8D17-057939B8B41A}.exe 1176 {3E151235-7D4C-40be-9014-AFE7987EE5E2}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe File created C:\Windows\{F1AE724E-983E-497c-BE37-E569914DC03C}.exe {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe File created C:\Windows\{3E151235-7D4C-40be-9014-AFE7987EE5E2}.exe {D8FBA087-2813-4e30-8D17-057939B8B41A}.exe File created C:\Windows\{9A24A206-DEC4-4367-AF58-5C37D14669CC}.exe {5655268C-DCBB-4594-874B-691326FE4CC5}.exe File created C:\Windows\{4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B}.exe {9A24A206-DEC4-4367-AF58-5C37D14669CC}.exe File created C:\Windows\{E17A4C5A-823D-41b6-B519-9CBDADE01C7D}.exe {4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B}.exe File created C:\Windows\{B9025081-D37A-4e75-A9EE-0041EF923710}.exe 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe File created C:\Windows\{4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe {B9025081-D37A-4e75-A9EE-0041EF923710}.exe File created C:\Windows\{5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe File created C:\Windows\{450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe File created C:\Windows\{5655268C-DCBB-4594-874B-691326FE4CC5}.exe {F1AE724E-983E-497c-BE37-E569914DC03C}.exe File created C:\Windows\{D8FBA087-2813-4e30-8D17-057939B8B41A}.exe {E17A4C5A-823D-41b6-B519-9CBDADE01C7D}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2332 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe Token: SeIncBasePriorityPrivilege 2216 {B9025081-D37A-4e75-A9EE-0041EF923710}.exe Token: SeIncBasePriorityPrivilege 3004 {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe Token: SeIncBasePriorityPrivilege 2872 {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe Token: SeIncBasePriorityPrivilege 1568 {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe Token: SeIncBasePriorityPrivilege 1528 {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe Token: SeIncBasePriorityPrivilege 2824 {F1AE724E-983E-497c-BE37-E569914DC03C}.exe Token: SeIncBasePriorityPrivilege 1328 {5655268C-DCBB-4594-874B-691326FE4CC5}.exe Token: SeIncBasePriorityPrivilege 3024 {9A24A206-DEC4-4367-AF58-5C37D14669CC}.exe Token: SeIncBasePriorityPrivilege 2068 {4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B}.exe Token: SeIncBasePriorityPrivilege 2268 {E17A4C5A-823D-41b6-B519-9CBDADE01C7D}.exe Token: SeIncBasePriorityPrivilege 1964 {D8FBA087-2813-4e30-8D17-057939B8B41A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2216 2332 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe 29 PID 2332 wrote to memory of 2216 2332 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe 29 PID 2332 wrote to memory of 2216 2332 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe 29 PID 2332 wrote to memory of 2216 2332 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe 29 PID 2332 wrote to memory of 2792 2332 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe 30 PID 2332 wrote to memory of 2792 2332 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe 30 PID 2332 wrote to memory of 2792 2332 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe 30 PID 2332 wrote to memory of 2792 2332 2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe 30 PID 2216 wrote to memory of 3004 2216 {B9025081-D37A-4e75-A9EE-0041EF923710}.exe 31 PID 2216 wrote to memory of 3004 2216 {B9025081-D37A-4e75-A9EE-0041EF923710}.exe 31 PID 2216 wrote to memory of 3004 2216 {B9025081-D37A-4e75-A9EE-0041EF923710}.exe 31 PID 2216 wrote to memory of 3004 2216 {B9025081-D37A-4e75-A9EE-0041EF923710}.exe 31 PID 2216 wrote to memory of 2104 2216 {B9025081-D37A-4e75-A9EE-0041EF923710}.exe 32 PID 2216 wrote to memory of 2104 2216 {B9025081-D37A-4e75-A9EE-0041EF923710}.exe 32 PID 2216 wrote to memory of 2104 2216 {B9025081-D37A-4e75-A9EE-0041EF923710}.exe 32 PID 2216 wrote to memory of 2104 2216 {B9025081-D37A-4e75-A9EE-0041EF923710}.exe 32 PID 3004 wrote to memory of 2872 3004 {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe 33 PID 3004 wrote to memory of 2872 3004 {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe 33 PID 3004 wrote to memory of 2872 3004 {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe 33 PID 3004 wrote to memory of 2872 3004 {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe 33 PID 3004 wrote to memory of 2892 3004 {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe 34 PID 3004 wrote to memory of 2892 3004 {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe 34 PID 3004 wrote to memory of 2892 3004 {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe 34 PID 3004 wrote to memory of 2892 3004 {4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe 34 PID 2872 wrote to memory of 1568 2872 {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe 35 PID 2872 wrote to memory of 1568 2872 {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe 35 PID 2872 wrote to memory of 1568 2872 {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe 35 PID 2872 wrote to memory of 1568 2872 {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe 35 PID 2872 wrote to memory of 2380 2872 {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe 36 PID 2872 wrote to memory of 2380 2872 {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe 36 PID 2872 wrote to memory of 2380 2872 {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe 36 PID 2872 wrote to memory of 2380 2872 {5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe 36 PID 1568 wrote to memory of 1528 1568 {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe 37 PID 1568 wrote to memory of 1528 1568 {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe 37 PID 1568 wrote to memory of 1528 1568 {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe 37 PID 1568 wrote to memory of 1528 1568 {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe 37 PID 1568 wrote to memory of 1648 1568 {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe 38 PID 1568 wrote to memory of 1648 1568 {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe 38 PID 1568 wrote to memory of 1648 1568 {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe 38 PID 1568 wrote to memory of 1648 1568 {6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe 38 PID 1528 wrote to memory of 2824 1528 {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe 39 PID 1528 wrote to memory of 2824 1528 {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe 39 PID 1528 wrote to memory of 2824 1528 {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe 39 PID 1528 wrote to memory of 2824 1528 {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe 39 PID 1528 wrote to memory of 668 1528 {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe 40 PID 1528 wrote to memory of 668 1528 {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe 40 PID 1528 wrote to memory of 668 1528 {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe 40 PID 1528 wrote to memory of 668 1528 {450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe 40 PID 2824 wrote to memory of 1328 2824 {F1AE724E-983E-497c-BE37-E569914DC03C}.exe 41 PID 2824 wrote to memory of 1328 2824 {F1AE724E-983E-497c-BE37-E569914DC03C}.exe 41 PID 2824 wrote to memory of 1328 2824 {F1AE724E-983E-497c-BE37-E569914DC03C}.exe 41 PID 2824 wrote to memory of 1328 2824 {F1AE724E-983E-497c-BE37-E569914DC03C}.exe 41 PID 2824 wrote to memory of 1296 2824 {F1AE724E-983E-497c-BE37-E569914DC03C}.exe 42 PID 2824 wrote to memory of 1296 2824 {F1AE724E-983E-497c-BE37-E569914DC03C}.exe 42 PID 2824 wrote to memory of 1296 2824 {F1AE724E-983E-497c-BE37-E569914DC03C}.exe 42 PID 2824 wrote to memory of 1296 2824 {F1AE724E-983E-497c-BE37-E569914DC03C}.exe 42 PID 1328 wrote to memory of 3024 1328 {5655268C-DCBB-4594-874B-691326FE4CC5}.exe 43 PID 1328 wrote to memory of 3024 1328 {5655268C-DCBB-4594-874B-691326FE4CC5}.exe 43 PID 1328 wrote to memory of 3024 1328 {5655268C-DCBB-4594-874B-691326FE4CC5}.exe 43 PID 1328 wrote to memory of 3024 1328 {5655268C-DCBB-4594-874B-691326FE4CC5}.exe 43 PID 1328 wrote to memory of 1308 1328 {5655268C-DCBB-4594-874B-691326FE4CC5}.exe 44 PID 1328 wrote to memory of 1308 1328 {5655268C-DCBB-4594-874B-691326FE4CC5}.exe 44 PID 1328 wrote to memory of 1308 1328 {5655268C-DCBB-4594-874B-691326FE4CC5}.exe 44 PID 1328 wrote to memory of 1308 1328 {5655268C-DCBB-4594-874B-691326FE4CC5}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_3cd7da474f975728c7a6858e88bbc988_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\{B9025081-D37A-4e75-A9EE-0041EF923710}.exeC:\Windows\{B9025081-D37A-4e75-A9EE-0041EF923710}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\{4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exeC:\Windows\{4BA1E780-9B5F-4dab-89D2-C3C87D9BE098}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\{5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exeC:\Windows\{5C15239F-24A9-48a0-B8A9-DAC9E2F92EE5}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{6304329F-6831-48fe-BCCA-A384C7D21DB9}.exeC:\Windows\{6304329F-6831-48fe-BCCA-A384C7D21DB9}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\{450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exeC:\Windows\{450DB8E7-49D9-4d6d-832A-66D2624ED71B}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\{F1AE724E-983E-497c-BE37-E569914DC03C}.exeC:\Windows\{F1AE724E-983E-497c-BE37-E569914DC03C}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\{5655268C-DCBB-4594-874B-691326FE4CC5}.exeC:\Windows\{5655268C-DCBB-4594-874B-691326FE4CC5}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\{9A24A206-DEC4-4367-AF58-5C37D14669CC}.exeC:\Windows\{9A24A206-DEC4-4367-AF58-5C37D14669CC}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3024 -
C:\Windows\{4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B}.exeC:\Windows\{4F323E6B-45DF-409f-A0A8-6E45C2C0FC8B}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2068 -
C:\Windows\{E17A4C5A-823D-41b6-B519-9CBDADE01C7D}.exeC:\Windows\{E17A4C5A-823D-41b6-B519-9CBDADE01C7D}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Windows\{D8FBA087-2813-4e30-8D17-057939B8B41A}.exeC:\Windows\{D8FBA087-2813-4e30-8D17-057939B8B41A}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\{3E151235-7D4C-40be-9014-AFE7987EE5E2}.exeC:\Windows\{3E151235-7D4C-40be-9014-AFE7987EE5E2}.exe13⤵
- Executes dropped EXE
PID:1176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D8FBA~1.EXE > nul13⤵PID:284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E17A4~1.EXE > nul12⤵PID:2452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4F323~1.EXE > nul11⤵PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9A24A~1.EXE > nul10⤵PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56552~1.EXE > nul9⤵PID:1308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1AE7~1.EXE > nul8⤵PID:1296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{450DB~1.EXE > nul7⤵PID:668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{63043~1.EXE > nul6⤵PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C152~1.EXE > nul5⤵PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4BA1E~1.EXE > nul4⤵PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B9025~1.EXE > nul3⤵PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD56f6ab60124d1d7da30dd9f982285fa3d
SHA192b0ae9525873cd6d3cf20e86fdae6c0bba53a15
SHA2569b89037ca57900390db23e6167b1166a9339e55b900acf3fd8460f5bd885c25c
SHA51278a04774f947185668136dbb820bcdbae8b123e859b897a4100958ea99988ccc55ad7ac4c318c682d64ea953024d9d3a598b1172167cb1f75abcf755e967a742
-
Filesize
180KB
MD5d92f4a76793860f24fc15af46f191d98
SHA1dc20f830d103297a28ad121adf66fe3ac7065bf3
SHA256ed1992f52b4309b8b9621a9ffb30ee12efa6796369958e372df41326ed5da446
SHA5127444c082e58fdc82435c5cd945759d77d50406fd10d1af9bd911af04558efc1be4c49d8945c11076dbe82372e1a6a53793d15ad068b8ac79d1221b9e2a6c690d
-
Filesize
180KB
MD522f068060558cf92508af475a8644909
SHA1b779fa2de4dd2fb2f1f9ab01efe5d5c9e1d1f073
SHA2565a8833df048e6627a17337e8110394400244b5bd641fa9a053632d90be1d5740
SHA5124696155b2fe324b54258684d3486b4e126fab2d31b7303d5f59fc23670be044ccff7d36b860284a4079184245f098017889edac8a0c25fa804445a68bfad29a1
-
Filesize
180KB
MD5d65d18d728223d6407977375b16ede4b
SHA1cf1cf35ad203fd31d1b27de0603f2f876a5c8138
SHA25603420a0cef51e120693f71f98c09cc1aef8e0f1a6d6c791d0536d49f25786772
SHA5122a5abfed8e3a1af8a71d6d0a5e37f392fa613476f42c89a102a076d26fea69b31c5b4db3230d4d14a4ca4e794fd798cc34c6e2605008640ceccef3a6c91f05a6
-
Filesize
180KB
MD51853ef50e2253a0489dca1094bd1d41a
SHA15fff2dac2f593180636029ea8604315ab9bdb8b0
SHA256bb532f3b81cf74802a75b44f067ee20efc467844236374723d2cd2a441630a54
SHA512b96d97bd772b3caa1de7a418b5fea31c22b91b5fc9a291e3483a45706f8f9afdc23d0e05c5dec219b75ae2cf0109b901f3caada60ae1d233a46b6bb5b07c0913
-
Filesize
180KB
MD5788e22c69963ceccc1750f7563f0f91e
SHA130ecc2e81576be596a4a937680a07f406dc45eec
SHA2565fc8acff01d439e6162a55a516c0df62d4e4edd234a45006844b2ea79c43508c
SHA5129a341f6e4911b4e39c0f93fc7363e90cc880bf41a4f9906ffba9f29949f950daffc0f225529bc8cd55bbfe9dcb8ebae1d3eb418cd589cfcc0c88285d90cc8e8d
-
Filesize
180KB
MD5816fc2f5858bfa4178ea247da004d204
SHA1aa08fd234d26c022252ecff1d70590458c2f373e
SHA256f5af37a551102498adf1bc0d559bba3b22bbabb65fb402858086a1aed8d6e385
SHA51274a06fdaf833bf8504c819f3139e33f3a900605d9052c9fc44f82350841420915e722a860333985c40289be6462fd947f59f0a8f59f36a1e9852a523c513f92d
-
Filesize
180KB
MD52b3d4d98a142dc4979a024f01a09d49f
SHA13373689c4d0c39387c50ba647bdfc1bc5949d459
SHA25602ec58a4a20dcf967a15309598c59a809a5b830747c7ab035e64a8b8eeb9ec13
SHA512282e90eb1b7f116bd62c597d195202692379542558183d75901ec961becb3bb411f4627b06a009f193c3923273cf96408b06e278d821036b17097506486f3a66
-
Filesize
180KB
MD57e3d1123403643ad5a1fe5729a6f08f1
SHA14ea92da6eaa8418a285528ea0e725b4b7332ad1b
SHA256b07886f6482e093e45f297a7891e0ed0db8985671abf00a8b7af5f14b9ae55cf
SHA5122fd11ae9c7bac45696c7ad7a3e31866a85223aac40a877ad6646b20a90681418a0adfbe30e1fca56d5fee6b1e16f287d3039c1baacc7fe9133370f2842a2afdc
-
Filesize
180KB
MD50d4448e3d7d8f0e9d50f484e9c33fa97
SHA13a8e81ca6109bc4804c5fc07d6c0fe31955b0b02
SHA25693fce93959cd96058b25dc066c33abba90dd9d524670dacfb57db6896ea52ed1
SHA51258a54283204775a08b12b9b4ed4c8c069c66ba08bf85ca8545df786792d8a67d8feb9395ddea6b2ca6f8c4fa2b212a39e336c3fcea0cad901fc1660eb97e717c
-
Filesize
180KB
MD55a2b461265935eee9bf2c31beb82f5fe
SHA1a16cdb44cfc47f3af5be1062bb98cfa757e4c225
SHA256e69cc4efa360263dc0e262892e13e6843e43fb7644c583c0b38c49fc073ab56e
SHA51290c41677428ac18b1673cf66caf643e8e49722cc8bd98517f5e5d0ee3e22d384c0c0695ed5e630732d299976d34d07cde86e87eba86fb16fe00f6179d27d3e32
-
Filesize
180KB
MD581d6c3f8677aed067ce3506ccd35a32f
SHA19cf3999b6f854c7b3c5698e98d2b23ed9ba8d631
SHA2561e4d82d970d16f104afc7db1b477bf4b78a591e1adcda6e2a931f33b959f6aac
SHA5123f6f072ed233a0b79e939ff74e0fb6d4289f0ad96baf9e7877e64d57a736e333ba3e4dde7ec27244c1eb12a5be7f32cb70e2d2905b48d46feaefad77fc737600