Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe
-
Size
408KB
-
MD5
d30e9d727e8c25cd0b4b0ce64144977a
-
SHA1
a5dd3a9dd2ba36fb23b9c4ce01db184965c14662
-
SHA256
b8ac347b2d8740f39d636c21c9b375a8d0005d22acf9c5263fde62b521017cf4
-
SHA512
6be0cab6e7d2299ce83b17afad97d5acbe963b2e77bb96c12d01b62937ea7aa3c45f8947ca38f3f79853ae59fd4832e26ec6b85883f8b5f88c244f955df024b0
-
SSDEEP
3072:CEGh0o9l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEG3ldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{470E5D21-E31B-4375-B3E6-C80233FB14B9} {3736E6E8-4567-4bea-844F-22B8CCFF6FB6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{366B5511-D5EA-47d5-8FEE-B2B6A8911153} 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1666886A-946C-459d-85B2-31CD8DF24F97} {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{50EB7241-FA31-4218-A0F4-104C1C51F76F}\stubpath = "C:\\Windows\\{50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe" {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{50EB7241-FA31-4218-A0F4-104C1C51F76F} {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C6A33397-D085-4d47-9A9B-E38D5B91B449}\stubpath = "C:\\Windows\\{C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe" {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{089A2A3C-DCEE-4f4f-9E7F-DE1B44090909} {470E5D21-E31B-4375-B3E6-C80233FB14B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB9A211D-7C7D-4d8a-9125-54D704177132} {089A2A3C-DCEE-4f4f-9E7F-DE1B44090909}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB9A211D-7C7D-4d8a-9125-54D704177132}\stubpath = "C:\\Windows\\{CB9A211D-7C7D-4d8a-9125-54D704177132}.exe" {089A2A3C-DCEE-4f4f-9E7F-DE1B44090909}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C7823D6E-46F2-436c-823E-41E6FE6A52D1}\stubpath = "C:\\Windows\\{C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe" {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1666886A-946C-459d-85B2-31CD8DF24F97}\stubpath = "C:\\Windows\\{1666886A-946C-459d-85B2-31CD8DF24F97}.exe" {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56B67979-EC28-498a-98BF-B096FF43F6D1}\stubpath = "C:\\Windows\\{56B67979-EC28-498a-98BF-B096FF43F6D1}.exe" {1666886A-946C-459d-85B2-31CD8DF24F97}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{366B5511-D5EA-47d5-8FEE-B2B6A8911153}\stubpath = "C:\\Windows\\{366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe" 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C6A33397-D085-4d47-9A9B-E38D5B91B449} {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3736E6E8-4567-4bea-844F-22B8CCFF6FB6} {37DB62D6-8039-4404-84A1-C12E85957408}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37DB62D6-8039-4404-84A1-C12E85957408}\stubpath = "C:\\Windows\\{37DB62D6-8039-4404-84A1-C12E85957408}.exe" {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3736E6E8-4567-4bea-844F-22B8CCFF6FB6}\stubpath = "C:\\Windows\\{3736E6E8-4567-4bea-844F-22B8CCFF6FB6}.exe" {37DB62D6-8039-4404-84A1-C12E85957408}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{470E5D21-E31B-4375-B3E6-C80233FB14B9}\stubpath = "C:\\Windows\\{470E5D21-E31B-4375-B3E6-C80233FB14B9}.exe" {3736E6E8-4567-4bea-844F-22B8CCFF6FB6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{089A2A3C-DCEE-4f4f-9E7F-DE1B44090909}\stubpath = "C:\\Windows\\{089A2A3C-DCEE-4f4f-9E7F-DE1B44090909}.exe" {470E5D21-E31B-4375-B3E6-C80233FB14B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C7823D6E-46F2-436c-823E-41E6FE6A52D1} {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56B67979-EC28-498a-98BF-B096FF43F6D1} {1666886A-946C-459d-85B2-31CD8DF24F97}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37DB62D6-8039-4404-84A1-C12E85957408} {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe -
Deletes itself 1 IoCs
pid Process 2936 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2848 {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe 2592 {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe 1204 {1666886A-946C-459d-85B2-31CD8DF24F97}.exe 2912 {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe 2888 {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe 2776 {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe 1800 {37DB62D6-8039-4404-84A1-C12E85957408}.exe 2380 {3736E6E8-4567-4bea-844F-22B8CCFF6FB6}.exe 2564 {470E5D21-E31B-4375-B3E6-C80233FB14B9}.exe 3068 {089A2A3C-DCEE-4f4f-9E7F-DE1B44090909}.exe 2396 {CB9A211D-7C7D-4d8a-9125-54D704177132}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{470E5D21-E31B-4375-B3E6-C80233FB14B9}.exe {3736E6E8-4567-4bea-844F-22B8CCFF6FB6}.exe File created C:\Windows\{089A2A3C-DCEE-4f4f-9E7F-DE1B44090909}.exe {470E5D21-E31B-4375-B3E6-C80233FB14B9}.exe File created C:\Windows\{366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe File created C:\Windows\{C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe File created C:\Windows\{1666886A-946C-459d-85B2-31CD8DF24F97}.exe {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe File created C:\Windows\{50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe File created C:\Windows\{C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe File created C:\Windows\{37DB62D6-8039-4404-84A1-C12E85957408}.exe {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe File created C:\Windows\{CB9A211D-7C7D-4d8a-9125-54D704177132}.exe {089A2A3C-DCEE-4f4f-9E7F-DE1B44090909}.exe File created C:\Windows\{56B67979-EC28-498a-98BF-B096FF43F6D1}.exe {1666886A-946C-459d-85B2-31CD8DF24F97}.exe File created C:\Windows\{3736E6E8-4567-4bea-844F-22B8CCFF6FB6}.exe {37DB62D6-8039-4404-84A1-C12E85957408}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2316 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe Token: SeIncBasePriorityPrivilege 2848 {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe Token: SeIncBasePriorityPrivilege 2592 {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe Token: SeIncBasePriorityPrivilege 1204 {1666886A-946C-459d-85B2-31CD8DF24F97}.exe Token: SeIncBasePriorityPrivilege 2912 {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe Token: SeIncBasePriorityPrivilege 2888 {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe Token: SeIncBasePriorityPrivilege 2776 {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe Token: SeIncBasePriorityPrivilege 1800 {37DB62D6-8039-4404-84A1-C12E85957408}.exe Token: SeIncBasePriorityPrivilege 2380 {3736E6E8-4567-4bea-844F-22B8CCFF6FB6}.exe Token: SeIncBasePriorityPrivilege 2564 {470E5D21-E31B-4375-B3E6-C80233FB14B9}.exe Token: SeIncBasePriorityPrivilege 3068 {089A2A3C-DCEE-4f4f-9E7F-DE1B44090909}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2848 2316 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe 28 PID 2316 wrote to memory of 2848 2316 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe 28 PID 2316 wrote to memory of 2848 2316 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe 28 PID 2316 wrote to memory of 2848 2316 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe 28 PID 2316 wrote to memory of 2936 2316 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe 29 PID 2316 wrote to memory of 2936 2316 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe 29 PID 2316 wrote to memory of 2936 2316 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe 29 PID 2316 wrote to memory of 2936 2316 2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe 29 PID 2848 wrote to memory of 2592 2848 {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe 32 PID 2848 wrote to memory of 2592 2848 {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe 32 PID 2848 wrote to memory of 2592 2848 {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe 32 PID 2848 wrote to memory of 2592 2848 {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe 32 PID 2848 wrote to memory of 2648 2848 {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe 33 PID 2848 wrote to memory of 2648 2848 {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe 33 PID 2848 wrote to memory of 2648 2848 {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe 33 PID 2848 wrote to memory of 2648 2848 {366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe 33 PID 2592 wrote to memory of 1204 2592 {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe 34 PID 2592 wrote to memory of 1204 2592 {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe 34 PID 2592 wrote to memory of 1204 2592 {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe 34 PID 2592 wrote to memory of 1204 2592 {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe 34 PID 2592 wrote to memory of 584 2592 {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe 35 PID 2592 wrote to memory of 584 2592 {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe 35 PID 2592 wrote to memory of 584 2592 {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe 35 PID 2592 wrote to memory of 584 2592 {C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe 35 PID 1204 wrote to memory of 2912 1204 {1666886A-946C-459d-85B2-31CD8DF24F97}.exe 36 PID 1204 wrote to memory of 2912 1204 {1666886A-946C-459d-85B2-31CD8DF24F97}.exe 36 PID 1204 wrote to memory of 2912 1204 {1666886A-946C-459d-85B2-31CD8DF24F97}.exe 36 PID 1204 wrote to memory of 2912 1204 {1666886A-946C-459d-85B2-31CD8DF24F97}.exe 36 PID 1204 wrote to memory of 2980 1204 {1666886A-946C-459d-85B2-31CD8DF24F97}.exe 37 PID 1204 wrote to memory of 2980 1204 {1666886A-946C-459d-85B2-31CD8DF24F97}.exe 37 PID 1204 wrote to memory of 2980 1204 {1666886A-946C-459d-85B2-31CD8DF24F97}.exe 37 PID 1204 wrote to memory of 2980 1204 {1666886A-946C-459d-85B2-31CD8DF24F97}.exe 37 PID 2912 wrote to memory of 2888 2912 {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe 38 PID 2912 wrote to memory of 2888 2912 {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe 38 PID 2912 wrote to memory of 2888 2912 {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe 38 PID 2912 wrote to memory of 2888 2912 {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe 38 PID 2912 wrote to memory of 2148 2912 {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe 39 PID 2912 wrote to memory of 2148 2912 {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe 39 PID 2912 wrote to memory of 2148 2912 {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe 39 PID 2912 wrote to memory of 2148 2912 {56B67979-EC28-498a-98BF-B096FF43F6D1}.exe 39 PID 2888 wrote to memory of 2776 2888 {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe 40 PID 2888 wrote to memory of 2776 2888 {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe 40 PID 2888 wrote to memory of 2776 2888 {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe 40 PID 2888 wrote to memory of 2776 2888 {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe 40 PID 2888 wrote to memory of 1276 2888 {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe 41 PID 2888 wrote to memory of 1276 2888 {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe 41 PID 2888 wrote to memory of 1276 2888 {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe 41 PID 2888 wrote to memory of 1276 2888 {50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe 41 PID 2776 wrote to memory of 1800 2776 {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe 42 PID 2776 wrote to memory of 1800 2776 {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe 42 PID 2776 wrote to memory of 1800 2776 {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe 42 PID 2776 wrote to memory of 1800 2776 {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe 42 PID 2776 wrote to memory of 2796 2776 {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe 43 PID 2776 wrote to memory of 2796 2776 {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe 43 PID 2776 wrote to memory of 2796 2776 {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe 43 PID 2776 wrote to memory of 2796 2776 {C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe 43 PID 1800 wrote to memory of 2380 1800 {37DB62D6-8039-4404-84A1-C12E85957408}.exe 44 PID 1800 wrote to memory of 2380 1800 {37DB62D6-8039-4404-84A1-C12E85957408}.exe 44 PID 1800 wrote to memory of 2380 1800 {37DB62D6-8039-4404-84A1-C12E85957408}.exe 44 PID 1800 wrote to memory of 2380 1800 {37DB62D6-8039-4404-84A1-C12E85957408}.exe 44 PID 1800 wrote to memory of 456 1800 {37DB62D6-8039-4404-84A1-C12E85957408}.exe 45 PID 1800 wrote to memory of 456 1800 {37DB62D6-8039-4404-84A1-C12E85957408}.exe 45 PID 1800 wrote to memory of 456 1800 {37DB62D6-8039-4404-84A1-C12E85957408}.exe 45 PID 1800 wrote to memory of 456 1800 {37DB62D6-8039-4404-84A1-C12E85957408}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_d30e9d727e8c25cd0b4b0ce64144977a_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\{366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exeC:\Windows\{366B5511-D5EA-47d5-8FEE-B2B6A8911153}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\{C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exeC:\Windows\{C7823D6E-46F2-436c-823E-41E6FE6A52D1}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\{1666886A-946C-459d-85B2-31CD8DF24F97}.exeC:\Windows\{1666886A-946C-459d-85B2-31CD8DF24F97}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\{56B67979-EC28-498a-98BF-B096FF43F6D1}.exeC:\Windows\{56B67979-EC28-498a-98BF-B096FF43F6D1}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\{50EB7241-FA31-4218-A0F4-104C1C51F76F}.exeC:\Windows\{50EB7241-FA31-4218-A0F4-104C1C51F76F}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\{C6A33397-D085-4d47-9A9B-E38D5B91B449}.exeC:\Windows\{C6A33397-D085-4d47-9A9B-E38D5B91B449}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\{37DB62D6-8039-4404-84A1-C12E85957408}.exeC:\Windows\{37DB62D6-8039-4404-84A1-C12E85957408}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\{3736E6E8-4567-4bea-844F-22B8CCFF6FB6}.exeC:\Windows\{3736E6E8-4567-4bea-844F-22B8CCFF6FB6}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Windows\{470E5D21-E31B-4375-B3E6-C80233FB14B9}.exeC:\Windows\{470E5D21-E31B-4375-B3E6-C80233FB14B9}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Windows\{089A2A3C-DCEE-4f4f-9E7F-DE1B44090909}.exeC:\Windows\{089A2A3C-DCEE-4f4f-9E7F-DE1B44090909}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{089A2~1.EXE > nul12⤵PID:1136
-
-
C:\Windows\{CB9A211D-7C7D-4d8a-9125-54D704177132}.exeC:\Windows\{CB9A211D-7C7D-4d8a-9125-54D704177132}.exe12⤵
- Executes dropped EXE
PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{470E5~1.EXE > nul11⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3736E~1.EXE > nul10⤵PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37DB6~1.EXE > nul9⤵PID:456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C6A33~1.EXE > nul8⤵PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{50EB7~1.EXE > nul7⤵PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56B67~1.EXE > nul6⤵PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16668~1.EXE > nul5⤵PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C7823~1.EXE > nul4⤵PID:584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{366B5~1.EXE > nul3⤵PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5be1951655c023b590e49dc401bb8ea74
SHA1f758464f175da917d1c82426049c9c1782492674
SHA2567c1dc20cf5f4e38105248201357b6617e338b0ecf6896906f74c98aeae4b5f9f
SHA5123e1e895e6011f6c35fdcee29e32a16494bd90356ec123193ed06d15bc4fea5d7cc35b9ea151179ead0fd15c2dd69b47847fefe95f6ccabcc87cb1524226c7ec0
-
Filesize
240KB
MD51f5fa1e2735aa8781fb8ecd86cb51b33
SHA1c3fb84ae0ccff759e9c726d6b3a0ab82d70ae4c9
SHA256f66b42ed3f7c2fa330b7e7ecabb9c590e02a8b62d153de00e9e5235c633557f2
SHA512d75fa6fe9346cafb4a08f0b936b6eb144ad5027fee659b21a4c855dc3e1fd766d7de96cf5e13b0398da899f69d8694b3cdd23340900b3b1d256f28724a460f64
-
Filesize
408KB
MD52c73b4eccbc318adcccfcc100423c933
SHA13303b870c2c4ff2818073c1ab7c8fe65f2f0e08a
SHA2567f56a34cb735d6b6a29b6c8f44ee7c897b66ac4025381620f8cc9eddfd1f55fa
SHA5122a1cefca509ddb1d17c91432b3fca9e16c93830bb68ac32fa43ac3522ca5fbca606e8e65969b2207add27824d85f594f13004aee71355599cf0c597afccee3bc
-
Filesize
384KB
MD5cf1df66162bbca329daca0d8393bce3c
SHA1d47f878285f7724bf9e64da168c8d6b00a73b6a5
SHA2563a976bd52b46c74977e0b8be1d7002eedca6c591a5b9acac34f2ed2105b47564
SHA512356bd965cc8508c52626b15771d39b216406b7c3b0dc193a88214ecbab2b7940bb852d006cdb8c0932e422c4e059ee0aed0bad7c090a60a3307e04a8143fcf85
-
Filesize
294KB
MD5d0cfe295c58e71a9f7cf37c83899eb5e
SHA184b33de41ad1bc255da3b8b02052af347feefa9f
SHA25621b6e78d44760a0282c219692d87a7c06513319d2a29fb4043d8be7769949006
SHA512a6fe1a4603a920bd088e1799fae343b55b6e7e7e729a47c14137a586199742e455239f70a63d3b42eaf24b989e1180d0740aa1e92b78fb2f623ba29da14e4269
-
Filesize
408KB
MD5295089cbbbef159a5b24691d139264b9
SHA17fba4344b295217e559ff9a198308ca9b3063962
SHA2569aad03c8333b793796a142b9fafd24a23680122f97810f8ae5768f0da3031186
SHA512016d64a9ec14d79ac72f485a6796d980a0521bd20cc729e95ab5b921ac55ba3cd7f7af264e35d6dea09ecdbf8d7ac18cfc2ddcae8450922971e6bba41a308de1
-
Filesize
408KB
MD56a0f94bd35129bfdc89564890640a2bf
SHA1b08f9eda053c827a8babf09b2e3f033b20b1b57f
SHA256247827ba668d9b391f2f8d1c3981060c027b9a5c01d79af0637ba554f360e3fd
SHA51269c8bb71339f98000e4df038944077c4f77544d7e601f84cd28848e4bb80cd653e5bf9cfa533ac35c42c9a55cd5f59a813cc25b391f765d3e3910fc8e1bda059
-
Filesize
408KB
MD54b62126ad78cc51048a347d2b5b039b1
SHA12b4ad5d33316a0973a0c29c6bf64b010d9f164c3
SHA2568a44f358f2fe96036dbceee4c0e867df62fcb8838ae2c4f5decc7234287b64e8
SHA512507bcb77b7df53e3c9e87c4f6f064d067e7fcd1a25aa233129fc9850c383fcf16d087554c84932f6096be8edf2bc22e9c40d039bca3b7bb5308a9f8da77e5608
-
Filesize
408KB
MD53a92381a8b405af70e0c1428c3e071a2
SHA1d24856740472873f79ac225e511a7eaaccdd2650
SHA2568f686b3fdbe4ebf6751ad5cf4a8df2785ff68b15dd3cf65dc3fad209f03ed4ae
SHA5124f88795a35bd831c4e8bb6c1af36df8b5190fbfc06d54423f109431e00249d82e0fe340b48a80ba48ac8e5477ad48ec622d9ad36b891d98a039c2b8c4f3a0dcb
-
Filesize
408KB
MD5bf2852cd2be13cdc4ec96b5a8a10aeaf
SHA1d67fb2ab3f13e6ade7c85950e67d7ceb1d7c171d
SHA25612177229180ad897fa72231c086f3185c979fe345b3848e4fa7162be97a8566c
SHA512b836887fe6c34e57121d4025d8812148c7a1cdc10feb80644f4d2879719197b51a2741700ed9c78015392e6ec20f7c74204547ba3d33825a06a684432ffdcec7
-
Filesize
408KB
MD5be17e1842f94dcd3d14b3671201a346e
SHA117a0f91b3ec7f609f977fe043deabd78c898589e
SHA256c75d9b345fbcbd30246728fab69ef4d1324e3e10014037c148ea82517952f727
SHA512206c5f4048fbeca2ed767bfc64a15a0ab27ed61ae34cc52398ad64f69d3099b39cf35dc5f8da27e7dbbfd7cd0abe27165c8b4fa2b8ac6ccab48ef69ef2a975e2
-
Filesize
408KB
MD526da470ed0cdc04cbff58848944398a4
SHA145af87837483cc285ef8c547eaa4439cfc203d1b
SHA256238a10c9ebd65b96870ec01f1d0fb67b434e79d98e74a037e9a616e2c9b0625d
SHA5124a9d8e874082e5aadda99040e13174e0dcb9536ace62e8192123f60798008f77d17d1809404cf06bcd101a749c36c745c6821a4e242ab9b8e2d868515acb78d1
-
Filesize
408KB
MD5739531c4e642332b91a883a9d3e2d6e1
SHA1a23f05561daa4979e96a1ecff845ccce1b4caeac
SHA2561cbfd2cddc2b5db33b0eb057ee07b681666925c86b6da57ed02706074ced9433
SHA51284b9d541d36034422ed7d63f071aaa0be689ac6604868b3b94664380c6dbd0720cdc6e683af18d4f9204ece5173912fc7c91bfe87f1e7b3feb5903b5d7dd7f37
-
Filesize
172KB
MD5b81cee1aeebb88cc70644d5ba0a199d3
SHA15a31f508e4651192f5daba6e7f98cef7cef4a24b
SHA256c067c0595f5207ac84a35ff758469999f39c836ee999126c49c584e6fd4b2bc4
SHA512f79cc05d753d6ee68016dca1463dacd9aafd09d6523e730538b32d2af7447fd15ccd5fd94198cd1b0cbe01bbeacaa86302840d1309685bc352f86e245d73a334