Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe
-
Size
168KB
-
MD5
2c368aae5d8fa358c62036771c68d04d
-
SHA1
886d440b4a2d487a470cbe3361f41d6475241577
-
SHA256
2e68aeef0a75a6d7ac65ac664ab2f14460960fc80dd488774b0c8399205d5606
-
SHA512
c87a91a12fbbc6f7deb6be71eab4097d91e1cb7b05c377de9f62f9f1cfaabfa21173be7d2d399b9982c5028887e291d44bf963a20aec6bed83b210f106562ca9
-
SSDEEP
1536:1EGh0oQlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oQlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x0008000000012270-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000014bab-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000012270-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002900000000b1f4-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002a00000000b1f4-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002b00000000b1f4-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002c00000000b1f4-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0315706A-DF2D-4e95-A31D-B544B59D161A} {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34C6E81E-4613-43b8-B934-643356BA3DFD} {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DF496553-0875-4273-A72D-6CF5350A6D9F} {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DF496553-0875-4273-A72D-6CF5350A6D9F}\stubpath = "C:\\Windows\\{DF496553-0875-4273-A72D-6CF5350A6D9F}.exe" {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32EE5FF4-9C32-4ed0-A505-FC8A15277446} {DF496553-0875-4273-A72D-6CF5350A6D9F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A2439A6-48A9-4621-A70B-54FCF54EF7D2}\stubpath = "C:\\Windows\\{7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe" 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FB7C417-5594-4b5c-B8C9-B314A6C3525B}\stubpath = "C:\\Windows\\{9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe" {54222343-159F-4ae1-8977-F7A05DD686EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D38F61F2-581F-4b3a-B91B-3246FD34CA88}\stubpath = "C:\\Windows\\{D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe" {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D38F61F2-581F-4b3a-B91B-3246FD34CA88} {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D5FE4030-EBA5-4251-92A1-E6D021FE1E3A} {32EE5FF4-9C32-4ed0-A505-FC8A15277446}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34C6E81E-4613-43b8-B934-643356BA3DFD}\stubpath = "C:\\Windows\\{34C6E81E-4613-43b8-B934-643356BA3DFD}.exe" {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32EE5FF4-9C32-4ed0-A505-FC8A15277446}\stubpath = "C:\\Windows\\{32EE5FF4-9C32-4ed0-A505-FC8A15277446}.exe" {DF496553-0875-4273-A72D-6CF5350A6D9F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D5FE4030-EBA5-4251-92A1-E6D021FE1E3A}\stubpath = "C:\\Windows\\{D5FE4030-EBA5-4251-92A1-E6D021FE1E3A}.exe" {32EE5FF4-9C32-4ed0-A505-FC8A15277446}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03AE3887-5E38-401b-9084-D7AB49C787C3} {D5FE4030-EBA5-4251-92A1-E6D021FE1E3A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A2439A6-48A9-4621-A70B-54FCF54EF7D2} 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54222343-159F-4ae1-8977-F7A05DD686EC} {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54222343-159F-4ae1-8977-F7A05DD686EC}\stubpath = "C:\\Windows\\{54222343-159F-4ae1-8977-F7A05DD686EC}.exe" {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4375650-1D86-4320-ACE7-D3CE8360AFF6}\stubpath = "C:\\Windows\\{A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe" {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03AE3887-5E38-401b-9084-D7AB49C787C3}\stubpath = "C:\\Windows\\{03AE3887-5E38-401b-9084-D7AB49C787C3}.exe" {D5FE4030-EBA5-4251-92A1-E6D021FE1E3A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FB7C417-5594-4b5c-B8C9-B314A6C3525B} {54222343-159F-4ae1-8977-F7A05DD686EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0315706A-DF2D-4e95-A31D-B544B59D161A}\stubpath = "C:\\Windows\\{0315706A-DF2D-4e95-A31D-B544B59D161A}.exe" {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4375650-1D86-4320-ACE7-D3CE8360AFF6} {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe -
Deletes itself 1 IoCs
pid Process 2336 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1240 {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe 2804 {54222343-159F-4ae1-8977-F7A05DD686EC}.exe 1848 {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe 2608 {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe 1268 {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe 2828 {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe 1988 {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe 544 {DF496553-0875-4273-A72D-6CF5350A6D9F}.exe 1448 {32EE5FF4-9C32-4ed0-A505-FC8A15277446}.exe 1628 {D5FE4030-EBA5-4251-92A1-E6D021FE1E3A}.exe 1924 {03AE3887-5E38-401b-9084-D7AB49C787C3}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{54222343-159F-4ae1-8977-F7A05DD686EC}.exe {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe File created C:\Windows\{9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe {54222343-159F-4ae1-8977-F7A05DD686EC}.exe File created C:\Windows\{0315706A-DF2D-4e95-A31D-B544B59D161A}.exe {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe File created C:\Windows\{32EE5FF4-9C32-4ed0-A505-FC8A15277446}.exe {DF496553-0875-4273-A72D-6CF5350A6D9F}.exe File created C:\Windows\{D5FE4030-EBA5-4251-92A1-E6D021FE1E3A}.exe {32EE5FF4-9C32-4ed0-A505-FC8A15277446}.exe File created C:\Windows\{03AE3887-5E38-401b-9084-D7AB49C787C3}.exe {D5FE4030-EBA5-4251-92A1-E6D021FE1E3A}.exe File created C:\Windows\{7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe File created C:\Windows\{A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe File created C:\Windows\{34C6E81E-4613-43b8-B934-643356BA3DFD}.exe {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe File created C:\Windows\{DF496553-0875-4273-A72D-6CF5350A6D9F}.exe {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe File created C:\Windows\{D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3052 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe Token: SeIncBasePriorityPrivilege 1240 {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe Token: SeIncBasePriorityPrivilege 2804 {54222343-159F-4ae1-8977-F7A05DD686EC}.exe Token: SeIncBasePriorityPrivilege 1848 {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe Token: SeIncBasePriorityPrivilege 2608 {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe Token: SeIncBasePriorityPrivilege 1268 {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe Token: SeIncBasePriorityPrivilege 2828 {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe Token: SeIncBasePriorityPrivilege 1988 {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe Token: SeIncBasePriorityPrivilege 544 {DF496553-0875-4273-A72D-6CF5350A6D9F}.exe Token: SeIncBasePriorityPrivilege 1448 {32EE5FF4-9C32-4ed0-A505-FC8A15277446}.exe Token: SeIncBasePriorityPrivilege 1628 {D5FE4030-EBA5-4251-92A1-E6D021FE1E3A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1240 3052 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe 28 PID 3052 wrote to memory of 1240 3052 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe 28 PID 3052 wrote to memory of 1240 3052 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe 28 PID 3052 wrote to memory of 1240 3052 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe 28 PID 3052 wrote to memory of 2336 3052 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe 29 PID 3052 wrote to memory of 2336 3052 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe 29 PID 3052 wrote to memory of 2336 3052 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe 29 PID 3052 wrote to memory of 2336 3052 2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe 29 PID 1240 wrote to memory of 2804 1240 {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe 30 PID 1240 wrote to memory of 2804 1240 {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe 30 PID 1240 wrote to memory of 2804 1240 {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe 30 PID 1240 wrote to memory of 2804 1240 {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe 30 PID 1240 wrote to memory of 2548 1240 {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe 31 PID 1240 wrote to memory of 2548 1240 {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe 31 PID 1240 wrote to memory of 2548 1240 {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe 31 PID 1240 wrote to memory of 2548 1240 {7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe 31 PID 2804 wrote to memory of 1848 2804 {54222343-159F-4ae1-8977-F7A05DD686EC}.exe 32 PID 2804 wrote to memory of 1848 2804 {54222343-159F-4ae1-8977-F7A05DD686EC}.exe 32 PID 2804 wrote to memory of 1848 2804 {54222343-159F-4ae1-8977-F7A05DD686EC}.exe 32 PID 2804 wrote to memory of 1848 2804 {54222343-159F-4ae1-8977-F7A05DD686EC}.exe 32 PID 2804 wrote to memory of 2596 2804 {54222343-159F-4ae1-8977-F7A05DD686EC}.exe 33 PID 2804 wrote to memory of 2596 2804 {54222343-159F-4ae1-8977-F7A05DD686EC}.exe 33 PID 2804 wrote to memory of 2596 2804 {54222343-159F-4ae1-8977-F7A05DD686EC}.exe 33 PID 2804 wrote to memory of 2596 2804 {54222343-159F-4ae1-8977-F7A05DD686EC}.exe 33 PID 1848 wrote to memory of 2608 1848 {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe 36 PID 1848 wrote to memory of 2608 1848 {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe 36 PID 1848 wrote to memory of 2608 1848 {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe 36 PID 1848 wrote to memory of 2608 1848 {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe 36 PID 1848 wrote to memory of 2384 1848 {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe 37 PID 1848 wrote to memory of 2384 1848 {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe 37 PID 1848 wrote to memory of 2384 1848 {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe 37 PID 1848 wrote to memory of 2384 1848 {9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe 37 PID 2608 wrote to memory of 1268 2608 {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe 39 PID 2608 wrote to memory of 1268 2608 {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe 39 PID 2608 wrote to memory of 1268 2608 {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe 39 PID 2608 wrote to memory of 1268 2608 {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe 39 PID 2608 wrote to memory of 1444 2608 {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe 38 PID 2608 wrote to memory of 1444 2608 {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe 38 PID 2608 wrote to memory of 1444 2608 {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe 38 PID 2608 wrote to memory of 1444 2608 {D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe 38 PID 1268 wrote to memory of 2828 1268 {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe 40 PID 1268 wrote to memory of 2828 1268 {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe 40 PID 1268 wrote to memory of 2828 1268 {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe 40 PID 1268 wrote to memory of 2828 1268 {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe 40 PID 1268 wrote to memory of 2876 1268 {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe 41 PID 1268 wrote to memory of 2876 1268 {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe 41 PID 1268 wrote to memory of 2876 1268 {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe 41 PID 1268 wrote to memory of 2876 1268 {0315706A-DF2D-4e95-A31D-B544B59D161A}.exe 41 PID 2828 wrote to memory of 1988 2828 {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe 43 PID 2828 wrote to memory of 1988 2828 {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe 43 PID 2828 wrote to memory of 1988 2828 {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe 43 PID 2828 wrote to memory of 1988 2828 {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe 43 PID 2828 wrote to memory of 1804 2828 {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe 42 PID 2828 wrote to memory of 1804 2828 {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe 42 PID 2828 wrote to memory of 1804 2828 {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe 42 PID 2828 wrote to memory of 1804 2828 {A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe 42 PID 1988 wrote to memory of 544 1988 {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe 44 PID 1988 wrote to memory of 544 1988 {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe 44 PID 1988 wrote to memory of 544 1988 {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe 44 PID 1988 wrote to memory of 544 1988 {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe 44 PID 1988 wrote to memory of 2512 1988 {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe 45 PID 1988 wrote to memory of 2512 1988 {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe 45 PID 1988 wrote to memory of 2512 1988 {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe 45 PID 1988 wrote to memory of 2512 1988 {34C6E81E-4613-43b8-B934-643356BA3DFD}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_2c368aae5d8fa358c62036771c68d04d_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\{7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exeC:\Windows\{7A2439A6-48A9-4621-A70B-54FCF54EF7D2}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\{54222343-159F-4ae1-8977-F7A05DD686EC}.exeC:\Windows\{54222343-159F-4ae1-8977-F7A05DD686EC}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\{9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exeC:\Windows\{9FB7C417-5594-4b5c-B8C9-B314A6C3525B}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\{D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exeC:\Windows\{D38F61F2-581F-4b3a-B91B-3246FD34CA88}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D38F6~1.EXE > nul6⤵PID:1444
-
-
C:\Windows\{0315706A-DF2D-4e95-A31D-B544B59D161A}.exeC:\Windows\{0315706A-DF2D-4e95-A31D-B544B59D161A}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\{A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exeC:\Windows\{A4375650-1D86-4320-ACE7-D3CE8360AFF6}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A4375~1.EXE > nul8⤵PID:1804
-
-
C:\Windows\{34C6E81E-4613-43b8-B934-643356BA3DFD}.exeC:\Windows\{34C6E81E-4613-43b8-B934-643356BA3DFD}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\{DF496553-0875-4273-A72D-6CF5350A6D9F}.exeC:\Windows\{DF496553-0875-4273-A72D-6CF5350A6D9F}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:544 -
C:\Windows\{32EE5FF4-9C32-4ed0-A505-FC8A15277446}.exeC:\Windows\{32EE5FF4-9C32-4ed0-A505-FC8A15277446}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1448 -
C:\Windows\{D5FE4030-EBA5-4251-92A1-E6D021FE1E3A}.exeC:\Windows\{D5FE4030-EBA5-4251-92A1-E6D021FE1E3A}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D5FE4~1.EXE > nul12⤵PID:820
-
-
C:\Windows\{03AE3887-5E38-401b-9084-D7AB49C787C3}.exeC:\Windows\{03AE3887-5E38-401b-9084-D7AB49C787C3}.exe12⤵
- Executes dropped EXE
PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{32EE5~1.EXE > nul11⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DF496~1.EXE > nul10⤵PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34C6E~1.EXE > nul9⤵PID:2512
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03157~1.EXE > nul7⤵PID:2876
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9FB7C~1.EXE > nul5⤵PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{54222~1.EXE > nul4⤵PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7A243~1.EXE > nul3⤵PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD53d2a0b1ed078af6934d5a12550cba58e
SHA170e30b63dd0d77704b5b775f150dcc16fcc2555c
SHA25604fee66e82f71ace038f9667d5571ef7d7475b1e3e6081a8bdbb908c6cd2b1be
SHA512b4dbbb4ae8ccd6a290d60760f53df63ef1cbfc30a94785ac6ef1cad90361d504a79cb321e590ab98615c5e845ddcce5d130ceb89aa6600ef75f09ac0d183865c
-
Filesize
168KB
MD541cd483b00c9d3490fdd3797f2a3146a
SHA1058866fd7b399ba414a8600fb5a5bb43f7a941f5
SHA2565743e245af60d2e948e88db2e58d8cc3121a084797a7613351ca3a4a9cae2f2e
SHA512d789637529d5812f8d19d1d6c629982ce750ab8195d3fc50338d3b62b5acdf4704b4473510fe373685ba611ffd2c42d5ac57ac8e2616d28f0ab6b1005be01348
-
Filesize
168KB
MD5ec3427c3e5da95bc7c8a7cee1482dc3e
SHA19c4f48dc75461b2e34f4de05664ec7148061fd3d
SHA256d8fab8896ace5788d02d51cbf1ea899db191b52b8b9cefb7cd5e523582d1243b
SHA512ea39577f960d122c58f5fd10016d2dd72fc9c459643d8432b32debe905a5db9506ccbf5de7df9e4445d11bce41fb6e1b47f985baf42ed6db5073af07cc41f11f
-
Filesize
168KB
MD5ce8185b357b4f5fdbdd6096fef24c68b
SHA1627edc7db778a1dafe10244e76ebb81621494f67
SHA2562e96eb193c1da2bb2fc78780574bc1c8ab10d0883e9a24a13e196eddf2bb1af8
SHA5124034b8ad500dca5cbf42f01eea7f520610ab2168749006f70a891a2782d78a69b2d99aaef7c865cdb0483a22a8a73da7b26ffdc6bdeacb946da30fdb5effd33f
-
Filesize
168KB
MD5345a446f9eec0d9cb355b8eb8ab508e2
SHA10876a447204335f6cbe8de5280b1346f0d79b887
SHA2567c83d22cc9edf8c9025e032d9b422e01bb78cc5b8d150782db6785ab1206df60
SHA512733d5845848b943c85ec7ba2228ddd72d9e19c8ed3028780adc33e218693c292beeabff62f8ac71d299d1b58b7df370b11bdae8ba4bc1d23800c0118f139a968
-
Filesize
168KB
MD57256fe695becc648e63c2ffc5932911d
SHA144f269350367e5d5e6076200e55c90e00dc16b00
SHA256b4b19fa5d3db695e5f3b3e6b09eb028ea43d49430ae40f0c4dd5c344c9f1b3f5
SHA51214664c0ad5fda589e5986ae4f8dfd10deffe2c15f1a6ff1262558542aa8726c9e4de250e8e6320849fb8d435eccf1eb15164d0dbf6bf9652964a889bafcb64a5
-
Filesize
168KB
MD57d26980ba334500bffb3d30b558cb45f
SHA179a1234be2b670a9f26d8ca57111d3f36165f7a0
SHA256438eccfb14d536c603065ea5d515e4a13accfaff2e9bfa92181cb3dedf6ba18a
SHA5124ae8ea20f5ad3776c878ed9825cc80b491cc33ff9d996cb075cedeccde892471e40e3ee86edc2462001ab44d57b3cfe328e69d663b3fa0d974a1e50948c34c89
-
Filesize
168KB
MD5f8063c15c51a3097371dcc9c3e92abc5
SHA1f28d41ee5ad761adceb6d9cf685f9af253979537
SHA256689cd05b98153aab19223ad3895ef2cbbd2d670365800f0fe003d18ac5819ca0
SHA51259c313dd1ce20e09c3fe1cb8e3e61b2460352c2df0c3dba0af6f3100c9316f0b1682a790c5d2d1bf1943c1bba34ea6ba07461c45ccf3b2602c00dc01374f7d4f
-
Filesize
168KB
MD58b2cb82092370be0ec3894cb49b8f53c
SHA108a3e3b1994c87647b924645c93f0ba80e4fab80
SHA256073969dc7b711a993dfd84ae4ff82b42543cf6585d811043153e86582b1bf421
SHA512d965af9ffe0f3591aea9b220807557cf7262ecb5762c8cfd7ac82804019855e47dfa7c8eba25b758d1c60ed93bd264ff6b03745cb94530304df0c57ff8b8ea5e
-
Filesize
168KB
MD54f698e2c207085a2df678e4d7e7897db
SHA1148c3c1466d78166f092241d78714ad133b25ac1
SHA256f2f986ddb7bb540dd4a37f27192e5e8dd26f1d8b193d8262c1351bf7c788761e
SHA512af01cb0f7360f721e83b1aad6e1b33984a74f5626d9a5e8bfb3d0d4691347eb20875bbb7f4faa4958d36b305ee952e4936e1cee1f975118bea568040db7aed25
-
Filesize
168KB
MD541cf7c219fae6216c892d7b00bd547ec
SHA1d0de50b164bcd15fe6a69b409e0be3724eca0a0c
SHA256aed14e117277bb60fb3c09be033efd8f35bd1a8a94666274a487eff17b7c4d21
SHA512f5267701b135db806b07bf372ecff636fb50bfc2822a10e34751e8495833c6bcffdee46fc2981acd2b423a5bbb5454c77544e7a4c15444913b704ac7d9a18956