Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe
-
Size
372KB
-
MD5
ec8d9e7395c1c33e30a0ab8fd3934212
-
SHA1
8d0e6c39fbf03102a707ed5f4a990f040b1d66e9
-
SHA256
8d76a5cd7884cd50dbefc34d0d38cc1e60feb17b58aeff409a928948289ab0d0
-
SHA512
dc7efbdbeb639a96ea7e56ca8fb15335bb1d4d24168f21069ddf53f565a151e1619b81561c10b922229738cf2bb2f378d2bd17d5be34c9026e4aaffe4bb0e045
-
SSDEEP
3072:CEGh0oPlMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGNlkOe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}\stubpath = "C:\\Windows\\{D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe" {A017DFDE-A061-4f48-A592-C62582F07823}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5EACFB39-E341-48b3-9A4D-9E450D3D601F} 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}\stubpath = "C:\\Windows\\{5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe" {A391A3D3-7462-41ac-8B53-325ACC812042}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88644A01-76C6-4a85-AB0F-2C1250475C7C} {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88644A01-76C6-4a85-AB0F-2C1250475C7C}\stubpath = "C:\\Windows\\{88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe" {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3656450D-70F0-4e3a-B2FF-0BE330E80BFA}\stubpath = "C:\\Windows\\{3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe" {F9A360CB-4FE6-48da-8E86-813B69634208}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A391A3D3-7462-41ac-8B53-325ACC812042} {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9A360CB-4FE6-48da-8E86-813B69634208} {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3656450D-70F0-4e3a-B2FF-0BE330E80BFA} {F9A360CB-4FE6-48da-8E86-813B69634208}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4EE97DCC-E1F5-4f4f-B56D-9E2613E877D0} {D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4EE97DCC-E1F5-4f4f-B56D-9E2613E877D0}\stubpath = "C:\\Windows\\{4EE97DCC-E1F5-4f4f-B56D-9E2613E877D0}.exe" {D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A017DFDE-A061-4f48-A592-C62582F07823} {3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5EACFB39-E341-48b3-9A4D-9E450D3D601F}\stubpath = "C:\\Windows\\{5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe" 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7CE53478-F830-4ad3-93BD-779C6D75C5B8} {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5157420F-0B37-4ff6-9FC2-0B0389EFBEFA} {A391A3D3-7462-41ac-8B53-325ACC812042}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14FD7442-49DE-457b-9DF9-FB7E2E94EC81} {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9A360CB-4FE6-48da-8E86-813B69634208}\stubpath = "C:\\Windows\\{F9A360CB-4FE6-48da-8E86-813B69634208}.exe" {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7CE53478-F830-4ad3-93BD-779C6D75C5B8}\stubpath = "C:\\Windows\\{7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe" {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A391A3D3-7462-41ac-8B53-325ACC812042}\stubpath = "C:\\Windows\\{A391A3D3-7462-41ac-8B53-325ACC812042}.exe" {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14FD7442-49DE-457b-9DF9-FB7E2E94EC81}\stubpath = "C:\\Windows\\{14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe" {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A017DFDE-A061-4f48-A592-C62582F07823}\stubpath = "C:\\Windows\\{A017DFDE-A061-4f48-A592-C62582F07823}.exe" {3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7} {A017DFDE-A061-4f48-A592-C62582F07823}.exe -
Deletes itself 1 IoCs
pid Process 1696 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3020 {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe 2668 {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe 2732 {A391A3D3-7462-41ac-8B53-325ACC812042}.exe 2712 {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe 2788 {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe 2784 {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe 2780 {F9A360CB-4FE6-48da-8E86-813B69634208}.exe 1660 {3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe 2336 {A017DFDE-A061-4f48-A592-C62582F07823}.exe 1636 {D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe 1204 {4EE97DCC-E1F5-4f4f-B56D-9E2613E877D0}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe {F9A360CB-4FE6-48da-8E86-813B69634208}.exe File created C:\Windows\{D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe {A017DFDE-A061-4f48-A592-C62582F07823}.exe File created C:\Windows\{7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe File created C:\Windows\{14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe File created C:\Windows\{F9A360CB-4FE6-48da-8E86-813B69634208}.exe {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe File created C:\Windows\{88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe File created C:\Windows\{A017DFDE-A061-4f48-A592-C62582F07823}.exe {3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe File created C:\Windows\{4EE97DCC-E1F5-4f4f-B56D-9E2613E877D0}.exe {D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe File created C:\Windows\{5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe File created C:\Windows\{A391A3D3-7462-41ac-8B53-325ACC812042}.exe {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe File created C:\Windows\{5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe {A391A3D3-7462-41ac-8B53-325ACC812042}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1912 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe Token: SeIncBasePriorityPrivilege 3020 {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe Token: SeIncBasePriorityPrivilege 2668 {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe Token: SeIncBasePriorityPrivilege 2732 {A391A3D3-7462-41ac-8B53-325ACC812042}.exe Token: SeIncBasePriorityPrivilege 2712 {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe Token: SeIncBasePriorityPrivilege 2788 {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe Token: SeIncBasePriorityPrivilege 2784 {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe Token: SeIncBasePriorityPrivilege 2780 {F9A360CB-4FE6-48da-8E86-813B69634208}.exe Token: SeIncBasePriorityPrivilege 1660 {3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe Token: SeIncBasePriorityPrivilege 2336 {A017DFDE-A061-4f48-A592-C62582F07823}.exe Token: SeIncBasePriorityPrivilege 1636 {D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1912 wrote to memory of 3020 1912 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe 28 PID 1912 wrote to memory of 3020 1912 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe 28 PID 1912 wrote to memory of 3020 1912 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe 28 PID 1912 wrote to memory of 3020 1912 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe 28 PID 1912 wrote to memory of 1696 1912 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe 29 PID 1912 wrote to memory of 1696 1912 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe 29 PID 1912 wrote to memory of 1696 1912 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe 29 PID 1912 wrote to memory of 1696 1912 2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe 29 PID 3020 wrote to memory of 2668 3020 {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe 30 PID 3020 wrote to memory of 2668 3020 {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe 30 PID 3020 wrote to memory of 2668 3020 {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe 30 PID 3020 wrote to memory of 2668 3020 {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe 30 PID 3020 wrote to memory of 2652 3020 {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe 31 PID 3020 wrote to memory of 2652 3020 {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe 31 PID 3020 wrote to memory of 2652 3020 {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe 31 PID 3020 wrote to memory of 2652 3020 {5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe 31 PID 2668 wrote to memory of 2732 2668 {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe 32 PID 2668 wrote to memory of 2732 2668 {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe 32 PID 2668 wrote to memory of 2732 2668 {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe 32 PID 2668 wrote to memory of 2732 2668 {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe 32 PID 2668 wrote to memory of 2720 2668 {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe 33 PID 2668 wrote to memory of 2720 2668 {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe 33 PID 2668 wrote to memory of 2720 2668 {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe 33 PID 2668 wrote to memory of 2720 2668 {7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe 33 PID 2732 wrote to memory of 2712 2732 {A391A3D3-7462-41ac-8B53-325ACC812042}.exe 37 PID 2732 wrote to memory of 2712 2732 {A391A3D3-7462-41ac-8B53-325ACC812042}.exe 37 PID 2732 wrote to memory of 2712 2732 {A391A3D3-7462-41ac-8B53-325ACC812042}.exe 37 PID 2732 wrote to memory of 2712 2732 {A391A3D3-7462-41ac-8B53-325ACC812042}.exe 37 PID 2732 wrote to memory of 1132 2732 {A391A3D3-7462-41ac-8B53-325ACC812042}.exe 36 PID 2732 wrote to memory of 1132 2732 {A391A3D3-7462-41ac-8B53-325ACC812042}.exe 36 PID 2732 wrote to memory of 1132 2732 {A391A3D3-7462-41ac-8B53-325ACC812042}.exe 36 PID 2732 wrote to memory of 1132 2732 {A391A3D3-7462-41ac-8B53-325ACC812042}.exe 36 PID 2712 wrote to memory of 2788 2712 {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe 38 PID 2712 wrote to memory of 2788 2712 {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe 38 PID 2712 wrote to memory of 2788 2712 {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe 38 PID 2712 wrote to memory of 2788 2712 {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe 38 PID 2712 wrote to memory of 1260 2712 {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe 39 PID 2712 wrote to memory of 1260 2712 {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe 39 PID 2712 wrote to memory of 1260 2712 {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe 39 PID 2712 wrote to memory of 1260 2712 {5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe 39 PID 2788 wrote to memory of 2784 2788 {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe 40 PID 2788 wrote to memory of 2784 2788 {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe 40 PID 2788 wrote to memory of 2784 2788 {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe 40 PID 2788 wrote to memory of 2784 2788 {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe 40 PID 2788 wrote to memory of 1876 2788 {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe 41 PID 2788 wrote to memory of 1876 2788 {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe 41 PID 2788 wrote to memory of 1876 2788 {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe 41 PID 2788 wrote to memory of 1876 2788 {14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe 41 PID 2784 wrote to memory of 2780 2784 {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe 42 PID 2784 wrote to memory of 2780 2784 {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe 42 PID 2784 wrote to memory of 2780 2784 {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe 42 PID 2784 wrote to memory of 2780 2784 {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe 42 PID 2784 wrote to memory of 2816 2784 {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe 43 PID 2784 wrote to memory of 2816 2784 {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe 43 PID 2784 wrote to memory of 2816 2784 {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe 43 PID 2784 wrote to memory of 2816 2784 {88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe 43 PID 2780 wrote to memory of 1660 2780 {F9A360CB-4FE6-48da-8E86-813B69634208}.exe 44 PID 2780 wrote to memory of 1660 2780 {F9A360CB-4FE6-48da-8E86-813B69634208}.exe 44 PID 2780 wrote to memory of 1660 2780 {F9A360CB-4FE6-48da-8E86-813B69634208}.exe 44 PID 2780 wrote to memory of 1660 2780 {F9A360CB-4FE6-48da-8E86-813B69634208}.exe 44 PID 2780 wrote to memory of 1092 2780 {F9A360CB-4FE6-48da-8E86-813B69634208}.exe 45 PID 2780 wrote to memory of 1092 2780 {F9A360CB-4FE6-48da-8E86-813B69634208}.exe 45 PID 2780 wrote to memory of 1092 2780 {F9A360CB-4FE6-48da-8E86-813B69634208}.exe 45 PID 2780 wrote to memory of 1092 2780 {F9A360CB-4FE6-48da-8E86-813B69634208}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\{5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exeC:\Windows\{5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\{7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exeC:\Windows\{7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\{A391A3D3-7462-41ac-8B53-325ACC812042}.exeC:\Windows\{A391A3D3-7462-41ac-8B53-325ACC812042}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A391A~1.EXE > nul5⤵PID:1132
-
-
C:\Windows\{5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exeC:\Windows\{5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\{14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exeC:\Windows\{14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\{88644A01-76C6-4a85-AB0F-2C1250475C7C}.exeC:\Windows\{88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\{F9A360CB-4FE6-48da-8E86-813B69634208}.exeC:\Windows\{F9A360CB-4FE6-48da-8E86-813B69634208}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exeC:\Windows\{3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{36564~1.EXE > nul10⤵PID:2304
-
-
C:\Windows\{A017DFDE-A061-4f48-A592-C62582F07823}.exeC:\Windows\{A017DFDE-A061-4f48-A592-C62582F07823}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2336 -
C:\Windows\{D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exeC:\Windows\{D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2DDA~1.EXE > nul12⤵PID:1016
-
-
C:\Windows\{4EE97DCC-E1F5-4f4f-B56D-9E2613E877D0}.exeC:\Windows\{4EE97DCC-E1F5-4f4f-B56D-9E2613E877D0}.exe12⤵
- Executes dropped EXE
PID:1204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A017D~1.EXE > nul11⤵PID:488
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9A36~1.EXE > nul9⤵PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{88644~1.EXE > nul8⤵PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{14FD7~1.EXE > nul7⤵PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{51574~1.EXE > nul6⤵PID:1260
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7CE53~1.EXE > nul4⤵PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5EACF~1.EXE > nul3⤵PID:2652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD50a698f571d9073cb2e5843c759ee7b9e
SHA10804f64a9f3a971986a6b4ea88421081c629f4a9
SHA25639f7712f8937cc73846a175dc8bd91c3b2f5b346fc1f5c9a088f5535d59f469d
SHA512de12180bc24eb776fabe33d4ebe4133bdbbdbde4e6d9cee9d00fc190ee52937c9cd4770d3738edde246144bbc946c1d31a8c95a45b680152eda94dc07db77945
-
Filesize
372KB
MD535aa1753fa1d874e9016bb2b5c94ac16
SHA1196685b248d5249b05ba77587664d8e44d628036
SHA2569dad23d97955f818f166b7421eba37335ef3cfc881a80fa6c70ad55d2bb1df75
SHA51295733ce7766edad11bab250582e8482d3b5ce6476cc582ef075a637ec389c3f73ebd06d769a3b6b3ea10940a4b9bd9d429894934f592f127a4e2d6f236cc3f5f
-
Filesize
372KB
MD5fed61a57f95950114d782e47f654d0f2
SHA12698b6ea8fb67ff380a4d2beed659d0d9591c897
SHA256ea6187a1f94ff67d885336825e41aea9aee9b1708d6d7a31b30f24dfe3ae732b
SHA512184cb3ef9cd2932f7afc734801e9a4cc0cbf9c5935b539e35e7d8b8db9793545e116ee80ff4c3f9b9d79fbdaa26517d8b4ac93f66d738fb03b362cd4f1d5b86d
-
Filesize
372KB
MD5cc65c554195b560f218fab7ce15400e5
SHA1b020965f266999a7e43ad6cf01c76983147bdf80
SHA256571497c7bb06f47e9281867846b00e0844d0be4974f909769e477550865527dc
SHA51246454dce2b40e6153992949d05b983b53b4921b6579338c1c6523e2cfa1aaf361550695934b9aff0c7657b3ba33a13fccd935a7145ec6e9a97628d2172e1ec88
-
Filesize
372KB
MD57a3f7d513665d5d21f3c3d79fc9815a2
SHA1d4332aef8f643945561fa869b0d01b648c956e2c
SHA256083be23d493bb4a1105e63d523143aa8c3c159cb4c654ea7874b7ecea415b718
SHA5128d1f60cbdafe0bd5ae2f5d7b8791556f9b8d0911bebdd0c243be33cd7614b7d22f415c33c516ba7f5b83efe574b7d051a50718c612ad70bb3a01772276dcdddc
-
Filesize
372KB
MD5c0744e1538e2910e3f5a06da779e51f9
SHA11cc28c0603d74931385d77683956cbd612c8c551
SHA256515447d768dcba3da8fc01a641e660d527dac6df2dc78e67064fa981e3580173
SHA512a9ba995e5b2ec3ae5a9d42d869e89253b06f961a2253cbf734b8912772cdad43663800f600a2dc47fc27ff54f33af251d25381edfa374a65f4e4ec90dba5ba80
-
Filesize
372KB
MD5b7670eb36ae55975d3001cb9fa917efc
SHA132bdcdf327825de3d22eac910bc25bfbe269e212
SHA2564b459f4b84d15effcdcc95a37f322734114102eb5f337d53be23f8b6cc98b425
SHA512f62594d5ce176c9d74bfdc7c03ccf8f5fb89c599f1ac1c7cc0f730496f5574fafec5c295084276f089cf255dfb7a0c87c5753cde9337398114fe99d2883baf1d
-
Filesize
372KB
MD5ee546d28ef5bceb68cb238c5adf19959
SHA1f375fc3972ffaf51d40f9ba355b6bd468902b352
SHA2568d5023b5a2b8586cd7c37c10f6a5ced386143b369e5ba73b507271e3afd617bc
SHA5123f0138e51ead1c1eb760faa19a8828ca6c8f19fff022395724e0aaaafacc674702a5c370420fc62d77d5b29a4ee6763befb71b1e2bdc2422ecc76494e128e1ad
-
Filesize
372KB
MD56d5994397cdcdc45a7febc586a75c732
SHA178e8de3b0e989c366dee4f2bfe2f127aed47d9b5
SHA25652802c26914066e87ee0aa087305d27f4f32f3b722709de4f8ad3e94fca6acca
SHA5125a1341f5eb35308d96b5922c8c6fd05f486b9bdf2ecd6fff4ed50ae338fecdf29b58ad81196dcf246cca82e52a74650d04c0ca8ffeb559aa1287ba6258e3aa05
-
Filesize
372KB
MD5ed788f3ff58bbef71d8403c68f254695
SHA186d7bdacb78553567f25f7131a8527e6180d5b78
SHA256d67053a27fb143c302b3a3430a56b7667857e2e36d6a9bd2b82b67003aacb939
SHA51200224eb3965baa8d794c1c3ab3a733e5832f9683c8122220461a6d2f27448ede5bef8cd4650f9a0b21a8a325220de91a8a0a3d2984e890862baa6c8926eea135
-
Filesize
137KB
MD5da4862b1b2e36d60c623af4cfb441717
SHA15fd7ec61c4fd45a12fb2625f39231322c59f005a
SHA256e9a0511268dc1b7cb9179e20b21546c3f4c2719aeb60125134e71cc06a90fb1b
SHA51230835b63872bdd4bf8b4b6e7c69b6ebb82f349c073badbd265256bfe6329bd9b02710647b6f3968f8e24f8842b91d9ec0c18a3c708a2c8dd164f4b67b0e50c72