Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe
-
Size
408KB
-
MD5
dd816c40ab071fe0b14936c3bf686693
-
SHA1
a37e43f7b5a4e1b7c60c6513eba806bb0c386690
-
SHA256
1c38a40040616f37e5e4110b97c39f499153a8df9b287ee5ed76fb253fb8c4bf
-
SHA512
9286dac0d146a115a33a8e26d11baa83df139213cd4fc208f06292ddd8cc5be69749de4092f7b48074460e30295e135daa3460481270643298c9174ee61ce157
-
SSDEEP
3072:CEGh0oIl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGCldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72} {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}\stubpath = "C:\\Windows\\{2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe" {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B} {F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12A198D1-54AC-4a78-B2BC-CBE993CDD241} 2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD90139F-0482-430f-A773-EBDF2363BE50}\stubpath = "C:\\Windows\\{FD90139F-0482-430f-A773-EBDF2363BE50}.exe" {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}\stubpath = "C:\\Windows\\{87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe" {9F500A2C-E371-40f5-97B1-7E873A106022}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E7258240-DB44-41de-AFF7-7399C0D94757} {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12A198D1-54AC-4a78-B2BC-CBE993CDD241}\stubpath = "C:\\Windows\\{12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe" 2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D97EB09-359C-48e5-9BD3-B987E2409143}\stubpath = "C:\\Windows\\{7D97EB09-359C-48e5-9BD3-B987E2409143}.exe" {E7258240-DB44-41de-AFF7-7399C0D94757}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FB029E33-0B21-4b8b-88AF-87E76EC8FED6} {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E7258240-DB44-41de-AFF7-7399C0D94757}\stubpath = "C:\\Windows\\{E7258240-DB44-41de-AFF7-7399C0D94757}.exe" {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D97EB09-359C-48e5-9BD3-B987E2409143} {E7258240-DB44-41de-AFF7-7399C0D94757}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FB029E33-0B21-4b8b-88AF-87E76EC8FED6}\stubpath = "C:\\Windows\\{FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe" {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B}\stubpath = "C:\\Windows\\{FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B}.exe" {F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A633A3FB-00C2-48b0-A257-AB54C71CAFE5} {FD90139F-0482-430f-A773-EBDF2363BE50}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F500A2C-E371-40f5-97B1-7E873A106022} {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F500A2C-E371-40f5-97B1-7E873A106022}\stubpath = "C:\\Windows\\{9F500A2C-E371-40f5-97B1-7E873A106022}.exe" {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{87F890C4-ED77-4bc3-8145-95EBB0E8ECF0} {9F500A2C-E371-40f5-97B1-7E873A106022}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C217AF59-3A8D-43bd-833B-357126025A75}\stubpath = "C:\\Windows\\{C217AF59-3A8D-43bd-833B-357126025A75}.exe" {FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C217AF59-3A8D-43bd-833B-357126025A75} {FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD90139F-0482-430f-A773-EBDF2363BE50} {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A633A3FB-00C2-48b0-A257-AB54C71CAFE5}\stubpath = "C:\\Windows\\{A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe" {FD90139F-0482-430f-A773-EBDF2363BE50}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F62C7921-BB5B-44eb-BC05-3C75164AB90E} {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F62C7921-BB5B-44eb-BC05-3C75164AB90E}\stubpath = "C:\\Windows\\{F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe" {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe -
Executes dropped EXE 12 IoCs
pid Process 1452 {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe 2568 {FD90139F-0482-430f-A773-EBDF2363BE50}.exe 4556 {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe 3344 {9F500A2C-E371-40f5-97B1-7E873A106022}.exe 3552 {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe 5112 {E7258240-DB44-41de-AFF7-7399C0D94757}.exe 4528 {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe 1296 {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe 3764 {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe 4876 {F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe 2808 {FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B}.exe 3920 {C217AF59-3A8D-43bd-833B-357126025A75}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{FD90139F-0482-430f-A773-EBDF2363BE50}.exe {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe File created C:\Windows\{E7258240-DB44-41de-AFF7-7399C0D94757}.exe {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe File created C:\Windows\{7D97EB09-359C-48e5-9BD3-B987E2409143}.exe {E7258240-DB44-41de-AFF7-7399C0D94757}.exe File created C:\Windows\{2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe File created C:\Windows\{FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B}.exe {F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe File created C:\Windows\{12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe 2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe File created C:\Windows\{A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe {FD90139F-0482-430f-A773-EBDF2363BE50}.exe File created C:\Windows\{9F500A2C-E371-40f5-97B1-7E873A106022}.exe {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe File created C:\Windows\{87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe {9F500A2C-E371-40f5-97B1-7E873A106022}.exe File created C:\Windows\{FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe File created C:\Windows\{F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe File created C:\Windows\{C217AF59-3A8D-43bd-833B-357126025A75}.exe {FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3520 2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe Token: SeIncBasePriorityPrivilege 1452 {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe Token: SeIncBasePriorityPrivilege 2568 {FD90139F-0482-430f-A773-EBDF2363BE50}.exe Token: SeIncBasePriorityPrivilege 4556 {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe Token: SeIncBasePriorityPrivilege 3344 {9F500A2C-E371-40f5-97B1-7E873A106022}.exe Token: SeIncBasePriorityPrivilege 3552 {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe Token: SeIncBasePriorityPrivilege 5112 {E7258240-DB44-41de-AFF7-7399C0D94757}.exe Token: SeIncBasePriorityPrivilege 4528 {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe Token: SeIncBasePriorityPrivilege 1296 {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe Token: SeIncBasePriorityPrivilege 3764 {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe Token: SeIncBasePriorityPrivilege 4876 {F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe Token: SeIncBasePriorityPrivilege 2808 {FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 1452 3520 2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe 98 PID 3520 wrote to memory of 1452 3520 2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe 98 PID 3520 wrote to memory of 1452 3520 2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe 98 PID 3520 wrote to memory of 1508 3520 2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe 97 PID 3520 wrote to memory of 1508 3520 2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe 97 PID 3520 wrote to memory of 1508 3520 2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe 97 PID 1452 wrote to memory of 2568 1452 {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe 102 PID 1452 wrote to memory of 2568 1452 {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe 102 PID 1452 wrote to memory of 2568 1452 {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe 102 PID 1452 wrote to memory of 3100 1452 {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe 101 PID 1452 wrote to memory of 3100 1452 {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe 101 PID 1452 wrote to memory of 3100 1452 {12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe 101 PID 2568 wrote to memory of 4556 2568 {FD90139F-0482-430f-A773-EBDF2363BE50}.exe 106 PID 2568 wrote to memory of 4556 2568 {FD90139F-0482-430f-A773-EBDF2363BE50}.exe 106 PID 2568 wrote to memory of 4556 2568 {FD90139F-0482-430f-A773-EBDF2363BE50}.exe 106 PID 2568 wrote to memory of 488 2568 {FD90139F-0482-430f-A773-EBDF2363BE50}.exe 107 PID 2568 wrote to memory of 488 2568 {FD90139F-0482-430f-A773-EBDF2363BE50}.exe 107 PID 2568 wrote to memory of 488 2568 {FD90139F-0482-430f-A773-EBDF2363BE50}.exe 107 PID 4556 wrote to memory of 3344 4556 {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe 108 PID 4556 wrote to memory of 3344 4556 {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe 108 PID 4556 wrote to memory of 3344 4556 {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe 108 PID 4556 wrote to memory of 4824 4556 {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe 109 PID 4556 wrote to memory of 4824 4556 {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe 109 PID 4556 wrote to memory of 4824 4556 {A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe 109 PID 3344 wrote to memory of 3552 3344 {9F500A2C-E371-40f5-97B1-7E873A106022}.exe 111 PID 3344 wrote to memory of 3552 3344 {9F500A2C-E371-40f5-97B1-7E873A106022}.exe 111 PID 3344 wrote to memory of 3552 3344 {9F500A2C-E371-40f5-97B1-7E873A106022}.exe 111 PID 3344 wrote to memory of 2272 3344 {9F500A2C-E371-40f5-97B1-7E873A106022}.exe 112 PID 3344 wrote to memory of 2272 3344 {9F500A2C-E371-40f5-97B1-7E873A106022}.exe 112 PID 3344 wrote to memory of 2272 3344 {9F500A2C-E371-40f5-97B1-7E873A106022}.exe 112 PID 3552 wrote to memory of 5112 3552 {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe 113 PID 3552 wrote to memory of 5112 3552 {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe 113 PID 3552 wrote to memory of 5112 3552 {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe 113 PID 3552 wrote to memory of 1128 3552 {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe 114 PID 3552 wrote to memory of 1128 3552 {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe 114 PID 3552 wrote to memory of 1128 3552 {87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe 114 PID 5112 wrote to memory of 4528 5112 {E7258240-DB44-41de-AFF7-7399C0D94757}.exe 115 PID 5112 wrote to memory of 4528 5112 {E7258240-DB44-41de-AFF7-7399C0D94757}.exe 115 PID 5112 wrote to memory of 4528 5112 {E7258240-DB44-41de-AFF7-7399C0D94757}.exe 115 PID 5112 wrote to memory of 4948 5112 {E7258240-DB44-41de-AFF7-7399C0D94757}.exe 116 PID 5112 wrote to memory of 4948 5112 {E7258240-DB44-41de-AFF7-7399C0D94757}.exe 116 PID 5112 wrote to memory of 4948 5112 {E7258240-DB44-41de-AFF7-7399C0D94757}.exe 116 PID 4528 wrote to memory of 1296 4528 {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe 121 PID 4528 wrote to memory of 1296 4528 {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe 121 PID 4528 wrote to memory of 1296 4528 {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe 121 PID 4528 wrote to memory of 4428 4528 {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe 120 PID 4528 wrote to memory of 4428 4528 {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe 120 PID 4528 wrote to memory of 4428 4528 {7D97EB09-359C-48e5-9BD3-B987E2409143}.exe 120 PID 1296 wrote to memory of 3764 1296 {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe 123 PID 1296 wrote to memory of 3764 1296 {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe 123 PID 1296 wrote to memory of 3764 1296 {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe 123 PID 1296 wrote to memory of 4656 1296 {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe 124 PID 1296 wrote to memory of 4656 1296 {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe 124 PID 1296 wrote to memory of 4656 1296 {2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe 124 PID 3764 wrote to memory of 4876 3764 {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe 125 PID 3764 wrote to memory of 4876 3764 {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe 125 PID 3764 wrote to memory of 4876 3764 {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe 125 PID 3764 wrote to memory of 2972 3764 {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe 126 PID 3764 wrote to memory of 2972 3764 {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe 126 PID 3764 wrote to memory of 2972 3764 {FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe 126 PID 4876 wrote to memory of 2808 4876 {F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe 128 PID 4876 wrote to memory of 2808 4876 {F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe 128 PID 4876 wrote to memory of 2808 4876 {F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe 128 PID 4876 wrote to memory of 3956 4876 {F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_dd816c40ab071fe0b14936c3bf686693_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1508
-
-
C:\Windows\{12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exeC:\Windows\{12A198D1-54AC-4a78-B2BC-CBE993CDD241}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{12A19~1.EXE > nul3⤵PID:3100
-
-
C:\Windows\{FD90139F-0482-430f-A773-EBDF2363BE50}.exeC:\Windows\{FD90139F-0482-430f-A773-EBDF2363BE50}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\{A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exeC:\Windows\{A633A3FB-00C2-48b0-A257-AB54C71CAFE5}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\{9F500A2C-E371-40f5-97B1-7E873A106022}.exeC:\Windows\{9F500A2C-E371-40f5-97B1-7E873A106022}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\{87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exeC:\Windows\{87F890C4-ED77-4bc3-8145-95EBB0E8ECF0}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\{E7258240-DB44-41de-AFF7-7399C0D94757}.exeC:\Windows\{E7258240-DB44-41de-AFF7-7399C0D94757}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\{7D97EB09-359C-48e5-9BD3-B987E2409143}.exeC:\Windows\{7D97EB09-359C-48e5-9BD3-B987E2409143}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D97E~1.EXE > nul9⤵PID:4428
-
-
C:\Windows\{2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exeC:\Windows\{2C2B277F-CB37-4aa4-8B0A-D2BF0B513C72}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\{FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exeC:\Windows\{FB029E33-0B21-4b8b-88AF-87E76EC8FED6}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\{F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exeC:\Windows\{F62C7921-BB5B-44eb-BC05-3C75164AB90E}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F62C7~1.EXE > nul12⤵PID:3956
-
-
C:\Windows\{FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B}.exeC:\Windows\{FD5183C4-EA8F-4b51-892B-8BBAB3DCC46B}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Windows\{C217AF59-3A8D-43bd-833B-357126025A75}.exeC:\Windows\{C217AF59-3A8D-43bd-833B-357126025A75}.exe13⤵
- Executes dropped EXE
PID:3920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD518~1.EXE > nul13⤵PID:4604
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FB029~1.EXE > nul11⤵PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2C2B2~1.EXE > nul10⤵PID:4656
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E7258~1.EXE > nul8⤵PID:4948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{87F89~1.EXE > nul7⤵PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9F500~1.EXE > nul6⤵PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A633A~1.EXE > nul5⤵PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD901~1.EXE > nul4⤵PID:488
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5e64ae9eefd1b952044fa8f9b58fae1f2
SHA1fc6dd6e7b954cd57c9470fbf20f7a1556656ac1a
SHA25699b09aac1872d1b1d9d78ff52b99be5f3d4536aadd4e5d0877689a37e80c42b7
SHA51254e883bf21b12cf6d6029364b35cf8cfa87533882dc3c8a23933bc908e269513b517b54aff05807573a5bcfe4883cf2634f801e17e8ae90ebb9a36e182e0cde1
-
Filesize
408KB
MD588df1f6fc8c06edd6735019487f82f90
SHA1d55ca07ae5c6ad3bdb7cca50b4b325177be5c7f4
SHA2560b7ab87723c56dacbda653a58030e5803d7ec1617b5e3ad57b0bb6aed0544eb4
SHA512c8a6f08af601a11da21e34a014ed2d600b5fedc899f301475af9120fdb4b83e0f969e92e5d8d54d1e47237bcdd74b09120b244996a95a0cbfe71cf4a327ca849
-
Filesize
408KB
MD5d902bc31dc13f17d98a876cc72463193
SHA1a2aa098f7592596fc83b36e43e6578e97d34fa8a
SHA256b918845ad72a6933ef798dd42e1c51e9d22efa95ee7c561080f5ec1ff38a2766
SHA5125f2b02b16aa606c4510c52de9f3f2f4550005534675bba285e7158173fcc0c980160786b70c9549bd8dc520ed2012cf868692d51979bcbb016c61c383c16ac56
-
Filesize
408KB
MD528d72209c7218a019f1bfd31696269d7
SHA16db35c6254fd379dbb5a9638010c91a16fa98501
SHA2563a7f06f6388544aa3a185877989feb2a198f09d6ee491b28244e364fad45c9df
SHA512b70d98e8c49cc59c7111811a672a4c00dc3ffb2104b5a22ef9a1919e3720231eb867d33390890642f1ede5825d705e054315a13a79cf298353ea43dab72c9d49
-
Filesize
408KB
MD564099f9420359ae3899c67ce98478319
SHA1535a60818325b624a2d47c128c1a9ea2c33bc258
SHA25692ca4dc7bac5111d455d73f80a61d259a401a9e38f8b32b1e9129593032210d9
SHA512a6a861bbd4a56053ec0b7762c39a11f0a3f0497a800d4677181590c357340aa74580117b24c02c89d7d5a5f133cca5944308fa7bbaeac3a224153836a95f4cb5
-
Filesize
408KB
MD5863cccd552352063de5dd7902a11b396
SHA14fa886dcee50858651cc978f2455b13d4f731215
SHA2563e2fa15c2df8ad15079e198e3bb062f40844f145f8cbe2d026928387f4d24278
SHA512aa575468554b2dbbedb4e6c87b19021f8c962d85f999868cb01693c20d3220e233acc984932f0f8ff7f28ff08846e98a69f7201e567c204a05a9a6400b1b3a88
-
Filesize
192KB
MD5b2ec24c0a51bd3457cac0972c90b7928
SHA18ff6f823a9b7773144ed7047bda049322c8597d1
SHA2563e12d7f51e32b4a48b5e4aa501648d9aee3b5da74cb83c6e8dd1da7e4b2f4931
SHA512b3de0a30d74a33231ca4a1e3b37922fcad93d552b6c9a980c6b7c8dddbc64038c3a59299f796baaa08248dd73a1d2f26a44b1ab1ae2c5bdc97bda16a1a59ac4f
-
Filesize
288KB
MD5d6775195d4b9d02bc5456fa3d4f6e97e
SHA1c196b4edd906de36eed6fd9152f4911c17886f3b
SHA256c10b19e0b3b4da305128f2e52d705e0fa796a5dfc4e2a0e162a881e3faa72bf7
SHA5123e22b9515a5a73c8995a8097dbf38146b096bc8ccd6200322d21321c05151d9e70d7b2608b0db68d0eaf9c9d2be4f8d89a4f5dc46129c8567928bf6553b55fba
-
Filesize
365KB
MD5de8d9c579810e2b10fb8ec7e4c3fdff0
SHA1527bff95de1748866eec9b651b42b307b9d2a0bf
SHA2562a91e657209d5474f0edd2a36cc1a914c4de610e985e48b84f3258c32f2bee09
SHA5129b64c94c00689bcdf98579ce32572247812bd9b86952824a1d7428482538cb61e0ef9f16dcc1a1866e856ff8717211ccfb318215b98cac815536843fca41364e
-
Filesize
339KB
MD5010970f3e394c1653059d1b15010a344
SHA1b3c640acef19c8a5542ffde790db5fade6fea38c
SHA25680b8a2684fb40d47fda10914bbea90f6d8304b4da2b0c7b1e76c7a8d596a928c
SHA512ec5bd0a2feb52528be952be3288fd354eb8216abb882c6bbfe013e9b5f3f5a4d1fccbf4179ff9b109fea34be78f38bea00c58cd1a596dba41daf7b750cc1ad5d
-
Filesize
408KB
MD52dc4d5baa7652f793d04ca89879bef3f
SHA1ea84db4ed1abeaaea8efbee923b6426527ba1135
SHA2564b2aa3592c19c1bcbd736dd00929ec073382dbc35cb3a1afb461ef0dbd609121
SHA512cf63e82c21e87e9bb0492ab7f72046201e72cd61b9b8e3e851b5a76f6ca7ecb150ac6c682fffa57c70849d4d15a4671075f725ae58bc2a3326a5301f219299f3
-
Filesize
408KB
MD50d7f47a7f49faca1fa69e96db082cabf
SHA142fb26bf1e2947ab4745018cfe9e5172e870fcf5
SHA2562684d4c1ecfa49d610513199d608611bf4c884a58c319887cb59aff79ff57221
SHA51264aef7e43bedecb66fefbddaf9aa04dc91dd7753a5e3ffb5a79d84b85cf9666f4a991c3eb35e50b2de45477286fe0aad5a2ab9d528f33171f1b328422b36de0d
-
Filesize
408KB
MD547223399414529dada1a9716a3a10552
SHA16dbe54781e088d7875298e64a0fcfee96db27b33
SHA256bbc37d1969626aaa9afed761f4baa3071b2614607e49c69413557249766d0d84
SHA5122e2ada03eb793aa0a23b7c1729c71f1b2445a353b9132d53b2e5de7815dd6f7570c3a7072b1cb2d9faeb72649eb504fcdbe53acbc41554f11a9ed140f1e8721e
-
Filesize
408KB
MD55d57bc5e70ce16818722fd4466bd46ab
SHA1c54c01c921c167d73eb2acf811a0ea2b8003ca6c
SHA256aee6163aca1a087ed2c8fc030a12b154a74d42b4728282457bbc704ad3e3ebe4
SHA512ff5aaada3e8fd31df505f22410c0e17f469da79ad4e2f1fcb23c7cf442e8bde92940903597a22f9b9da3b21b7f57e7e2ce9cb11311d68ca3eb94c3d1ca8ebaa9