Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe
-
Size
408KB
-
MD5
314820ef246082ebce4ff9f674de1a2b
-
SHA1
dc9e418b7dc4e35e399b119e5eba71c566988713
-
SHA256
5f19a960f57e36a662008f4ce4f226e250d494382f37a1b89a4dffec38ac86eb
-
SHA512
893124adafcfc9e3f7eeb8ad129bdebf06163cf92e0f9dd2daaff611fbcc7067fec9ce3f122319992140bc8287496b44a55933c9b6bd608ae7b561d7fdc98e5b
-
SSDEEP
3072:CEGh0oil3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGEldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral1/files/0x0009000000012266-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00320000000155f7-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x003300000000b1f4-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00330000000155f7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00330000000155f7-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00340000000155f7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0032000000015855-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00350000000155f7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0033000000015855-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00360000000155f7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA03F710-2AD7-44bf-8351-BB976119A82A}\stubpath = "C:\\Windows\\{AA03F710-2AD7-44bf-8351-BB976119A82A}.exe" {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B42B33CF-D593-48df-869E-193F401EAD9E} {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B42B33CF-D593-48df-869E-193F401EAD9E}\stubpath = "C:\\Windows\\{B42B33CF-D593-48df-869E-193F401EAD9E}.exe" {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECE737E7-A26A-4931-B50E-D970BCE14DEA}\stubpath = "C:\\Windows\\{ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe" {B42B33CF-D593-48df-869E-193F401EAD9E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03CFCFA0-3EEB-41e9-9729-0884AE031923} {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03CFCFA0-3EEB-41e9-9729-0884AE031923}\stubpath = "C:\\Windows\\{03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe" {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{64F11729-7FAC-486a-A3B0-C0286BD07881}\stubpath = "C:\\Windows\\{64F11729-7FAC-486a-A3B0-C0286BD07881}.exe" {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}\stubpath = "C:\\Windows\\{93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe" {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F8BFD90B-191B-4509-9A60-5B30A9C9C61A} {1963611B-72B7-47f8-8942-A3C908D7D666}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F8BFD90B-191B-4509-9A60-5B30A9C9C61A}\stubpath = "C:\\Windows\\{F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe" {1963611B-72B7-47f8-8942-A3C908D7D666}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B3C109DB-3238-4842-AB90-DDC66E01FF8A} {F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECE737E7-A26A-4931-B50E-D970BCE14DEA} {B42B33CF-D593-48df-869E-193F401EAD9E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{64F11729-7FAC-486a-A3B0-C0286BD07881} {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4232E9E-AD5D-4b32-84D2-F91BBCA3703D} {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}\stubpath = "C:\\Windows\\{D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe" {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1963611B-72B7-47f8-8942-A3C908D7D666}\stubpath = "C:\\Windows\\{1963611B-72B7-47f8-8942-A3C908D7D666}.exe" {93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93DC4B34-C5F4-42ca-8556-6F3E3DFC0865} {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B3C109DB-3238-4842-AB90-DDC66E01FF8A}\stubpath = "C:\\Windows\\{B3C109DB-3238-4842-AB90-DDC66E01FF8A}.exe" {F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FE06601-EAEF-4897-8795-A909B9B291DE} 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FE06601-EAEF-4897-8795-A909B9B291DE}\stubpath = "C:\\Windows\\{0FE06601-EAEF-4897-8795-A909B9B291DE}.exe" 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA03F710-2AD7-44bf-8351-BB976119A82A} {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1963611B-72B7-47f8-8942-A3C908D7D666} {93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe -
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2160 {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe 2840 {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe 2232 {B42B33CF-D593-48df-869E-193F401EAD9E}.exe 2208 {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe 1500 {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe 1964 {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe 2524 {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe 2924 {93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe 784 {1963611B-72B7-47f8-8942-A3C908D7D666}.exe 2076 {F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe 1676 {B3C109DB-3238-4842-AB90-DDC66E01FF8A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{0FE06601-EAEF-4897-8795-A909B9B291DE}.exe 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe File created C:\Windows\{AA03F710-2AD7-44bf-8351-BB976119A82A}.exe {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe File created C:\Windows\{B42B33CF-D593-48df-869E-193F401EAD9E}.exe {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe File created C:\Windows\{ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe {B42B33CF-D593-48df-869E-193F401EAD9E}.exe File created C:\Windows\{03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe File created C:\Windows\{B3C109DB-3238-4842-AB90-DDC66E01FF8A}.exe {F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe File created C:\Windows\{64F11729-7FAC-486a-A3B0-C0286BD07881}.exe {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe File created C:\Windows\{D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe File created C:\Windows\{93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe File created C:\Windows\{1963611B-72B7-47f8-8942-A3C908D7D666}.exe {93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe File created C:\Windows\{F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe {1963611B-72B7-47f8-8942-A3C908D7D666}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2188 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe Token: SeIncBasePriorityPrivilege 2160 {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe Token: SeIncBasePriorityPrivilege 2840 {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe Token: SeIncBasePriorityPrivilege 2232 {B42B33CF-D593-48df-869E-193F401EAD9E}.exe Token: SeIncBasePriorityPrivilege 2208 {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe Token: SeIncBasePriorityPrivilege 1500 {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe Token: SeIncBasePriorityPrivilege 1964 {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe Token: SeIncBasePriorityPrivilege 2524 {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe Token: SeIncBasePriorityPrivilege 2924 {93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe Token: SeIncBasePriorityPrivilege 784 {1963611B-72B7-47f8-8942-A3C908D7D666}.exe Token: SeIncBasePriorityPrivilege 2076 {F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2160 2188 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe 28 PID 2188 wrote to memory of 2160 2188 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe 28 PID 2188 wrote to memory of 2160 2188 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe 28 PID 2188 wrote to memory of 2160 2188 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe 28 PID 2188 wrote to memory of 2780 2188 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe 29 PID 2188 wrote to memory of 2780 2188 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe 29 PID 2188 wrote to memory of 2780 2188 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe 29 PID 2188 wrote to memory of 2780 2188 2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe 29 PID 2160 wrote to memory of 2840 2160 {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe 30 PID 2160 wrote to memory of 2840 2160 {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe 30 PID 2160 wrote to memory of 2840 2160 {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe 30 PID 2160 wrote to memory of 2840 2160 {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe 30 PID 2160 wrote to memory of 2836 2160 {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe 31 PID 2160 wrote to memory of 2836 2160 {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe 31 PID 2160 wrote to memory of 2836 2160 {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe 31 PID 2160 wrote to memory of 2836 2160 {0FE06601-EAEF-4897-8795-A909B9B291DE}.exe 31 PID 2840 wrote to memory of 2232 2840 {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe 34 PID 2840 wrote to memory of 2232 2840 {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe 34 PID 2840 wrote to memory of 2232 2840 {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe 34 PID 2840 wrote to memory of 2232 2840 {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe 34 PID 2840 wrote to memory of 2148 2840 {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe 35 PID 2840 wrote to memory of 2148 2840 {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe 35 PID 2840 wrote to memory of 2148 2840 {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe 35 PID 2840 wrote to memory of 2148 2840 {AA03F710-2AD7-44bf-8351-BB976119A82A}.exe 35 PID 2232 wrote to memory of 2208 2232 {B42B33CF-D593-48df-869E-193F401EAD9E}.exe 36 PID 2232 wrote to memory of 2208 2232 {B42B33CF-D593-48df-869E-193F401EAD9E}.exe 36 PID 2232 wrote to memory of 2208 2232 {B42B33CF-D593-48df-869E-193F401EAD9E}.exe 36 PID 2232 wrote to memory of 2208 2232 {B42B33CF-D593-48df-869E-193F401EAD9E}.exe 36 PID 2232 wrote to memory of 780 2232 {B42B33CF-D593-48df-869E-193F401EAD9E}.exe 37 PID 2232 wrote to memory of 780 2232 {B42B33CF-D593-48df-869E-193F401EAD9E}.exe 37 PID 2232 wrote to memory of 780 2232 {B42B33CF-D593-48df-869E-193F401EAD9E}.exe 37 PID 2232 wrote to memory of 780 2232 {B42B33CF-D593-48df-869E-193F401EAD9E}.exe 37 PID 2208 wrote to memory of 1500 2208 {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe 38 PID 2208 wrote to memory of 1500 2208 {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe 38 PID 2208 wrote to memory of 1500 2208 {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe 38 PID 2208 wrote to memory of 1500 2208 {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe 38 PID 2208 wrote to memory of 2640 2208 {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe 39 PID 2208 wrote to memory of 2640 2208 {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe 39 PID 2208 wrote to memory of 2640 2208 {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe 39 PID 2208 wrote to memory of 2640 2208 {ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe 39 PID 1500 wrote to memory of 1964 1500 {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe 40 PID 1500 wrote to memory of 1964 1500 {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe 40 PID 1500 wrote to memory of 1964 1500 {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe 40 PID 1500 wrote to memory of 1964 1500 {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe 40 PID 1500 wrote to memory of 2936 1500 {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe 41 PID 1500 wrote to memory of 2936 1500 {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe 41 PID 1500 wrote to memory of 2936 1500 {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe 41 PID 1500 wrote to memory of 2936 1500 {03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe 41 PID 1964 wrote to memory of 2524 1964 {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe 42 PID 1964 wrote to memory of 2524 1964 {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe 42 PID 1964 wrote to memory of 2524 1964 {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe 42 PID 1964 wrote to memory of 2524 1964 {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe 42 PID 1964 wrote to memory of 1296 1964 {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe 43 PID 1964 wrote to memory of 1296 1964 {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe 43 PID 1964 wrote to memory of 1296 1964 {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe 43 PID 1964 wrote to memory of 1296 1964 {64F11729-7FAC-486a-A3B0-C0286BD07881}.exe 43 PID 2524 wrote to memory of 2924 2524 {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe 44 PID 2524 wrote to memory of 2924 2524 {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe 44 PID 2524 wrote to memory of 2924 2524 {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe 44 PID 2524 wrote to memory of 2924 2524 {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe 44 PID 2524 wrote to memory of 1072 2524 {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe 45 PID 2524 wrote to memory of 1072 2524 {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe 45 PID 2524 wrote to memory of 1072 2524 {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe 45 PID 2524 wrote to memory of 1072 2524 {D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\{0FE06601-EAEF-4897-8795-A909B9B291DE}.exeC:\Windows\{0FE06601-EAEF-4897-8795-A909B9B291DE}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\{AA03F710-2AD7-44bf-8351-BB976119A82A}.exeC:\Windows\{AA03F710-2AD7-44bf-8351-BB976119A82A}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\{B42B33CF-D593-48df-869E-193F401EAD9E}.exeC:\Windows\{B42B33CF-D593-48df-869E-193F401EAD9E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\{ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exeC:\Windows\{ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\{03CFCFA0-3EEB-41e9-9729-0884AE031923}.exeC:\Windows\{03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\{64F11729-7FAC-486a-A3B0-C0286BD07881}.exeC:\Windows\{64F11729-7FAC-486a-A3B0-C0286BD07881}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\{D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exeC:\Windows\{D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\{93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exeC:\Windows\{93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2924 -
C:\Windows\{1963611B-72B7-47f8-8942-A3C908D7D666}.exeC:\Windows\{1963611B-72B7-47f8-8942-A3C908D7D666}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:784 -
C:\Windows\{F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exeC:\Windows\{F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Windows\{B3C109DB-3238-4842-AB90-DDC66E01FF8A}.exeC:\Windows\{B3C109DB-3238-4842-AB90-DDC66E01FF8A}.exe12⤵
- Executes dropped EXE
PID:1676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F8BFD~1.EXE > nul12⤵PID:2448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{19636~1.EXE > nul11⤵PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{93DC4~1.EXE > nul10⤵PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4232~1.EXE > nul9⤵PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{64F11~1.EXE > nul8⤵PID:1296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03CFC~1.EXE > nul7⤵PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ECE73~1.EXE > nul6⤵PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B42B3~1.EXE > nul5⤵PID:780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA03F~1.EXE > nul4⤵PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0FE06~1.EXE > nul3⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD541c8720f2df8e5fa0675237bf74df4ce
SHA170b4b780f053250473bd37a1264992bb9122ee73
SHA256b69e4bd7c4db27c1c056b39cb64972576a60afa8fa07a82cae7a5b2f4cf546c1
SHA5129ccb10e911f4a08aea457981cf6dd9070aefd124fc5ee86d8510af5941915b8b890f19739fd00ba993496bd44542b1c1899a93886475138b7ecb71bc51eff1ea
-
Filesize
408KB
MD5930d7de1a3505891d36b2646fe8c8966
SHA197d1dae283af14d25e2a53a489bf1d3f6b262d33
SHA2565b25f68607b00dccf1e801e9b9eac50f00cc7df6c26bd5d41a9d1042b0b30e8a
SHA5126c0090afb4f8df348b7395ba4aeaedc2813ba3430cc2d0ef1c5ba9254724e6fc57e04680876ae84f75204b1a14a752f59a9387ffbd8c891364ce2cce73940027
-
Filesize
408KB
MD503862f7f9a76cb29bf857dd0b6883539
SHA1350ea33e6fc53a1490e1e03fab12895e598dd928
SHA256a5fff2e522467f0021492e776caa000dfa0cfd919e968f1bc5c92b437e45bff9
SHA5129668953dcb1e50be3fe93e31b279636fe4633806cfd1b7a31fb1d8c55c3247a5113b027e4f90347b72e724da75818441a8aabb4287795bfd8a0011908f1d9e98
-
Filesize
408KB
MD58cc3b8bff845cc845a6a7b64f342d5ab
SHA1a3351e936262bb6635817724f49b8a0c9f6ef870
SHA25665fd42cfc26ebcc91ec0873a1f4c173deb551ab92e8712f54c17d5520a5c7ef8
SHA5129a1a239769d6eb045aec784e19a4de35da85c3568b0024bd6f383809652bd68de9f26c21c085297db3b5008bc3fbeabc4bacc205c20f33fe2cf64361e92ae3cd
-
Filesize
408KB
MD5f386ae392db5d36c52399f9909d2c87f
SHA1ad584027919b628c2875d1c6f3f8597d8b6c48cd
SHA256d851f78f2969145c98d82306174ef7fd285e117a657213eac4f3937881f7019d
SHA5125f4f6a040774a7044ba23563688391033913d8fb8806b5806c89bf45fa203c2306923bf919171179f69ba2b5d029229b7dd28f6d98dee1d30a977f153eb08863
-
Filesize
408KB
MD5c56159b3914cead9e5388b8e09170cd8
SHA190923ba862c94e5aa735b5a5f231a36fc321c650
SHA256ea542f3efb84d4c979a84a1b37808db3d0b07a7fdd22fb7127eaa99838dfcf56
SHA512a5242b7fc1eaee4404dfb6bb03e4a274426cedf80b50b1354d4b7beffc3b249be94c86adfeaf1e5a5d1b74e226690d3619f857c1c55bfe9225d8a6ca071e5623
-
Filesize
408KB
MD52bc995213253ef427242ea88a4348ba7
SHA1e2ffd72e753fe248b4dfb206d68707390174b4f5
SHA256aa2e177e0dc5e0e66c029b4120febc5b2d489821acc566b40ec532f117d438cc
SHA512e1e581a31bd4aea9096a7358839b66f4650be92a5dffd8772262ac1fab1510b560735f8970ee45d148f2483ec2f7346d8a69064a4333cbf9da2ceb4e3e5ffc37
-
Filesize
408KB
MD5e0b6303ef2b0ea30e2fdbf0e0af85f6d
SHA17f1baa82bf974a04f1ab7c25170e161e0244da5b
SHA2565b6f017290760667bf696d29522985f3af08571b11e2b6fe784157ced3b00054
SHA5125036673e09ce077638bbeb6572d63780609e363cddafa8d4b20cc2f85f5bae79ee98e01f206850f446cc8f548625df445082785a6def194bc641b685d7d9beb9
-
Filesize
408KB
MD51cb43767fdd72c20a90bb1399f4b8a83
SHA19ab06a154e29e25371a7d1d9b88d3aff6136a314
SHA256dfb844d512f1d1ead9cb4c9cbee54ddb284ba7e4c674f7d50965b27e57b85928
SHA512c2943d0eb261b14114469a528c5bb34cea02e3b7b3ed2e79fd36bff93d7e12cda7b4e36fdbe87564075e5045be2befd2c9948a211672d3a9b9bbb8b5aa8f91e7
-
Filesize
408KB
MD5e5c86d2c6a9b120e148c1ee5a9f59c22
SHA1498696b1e4c789081a040ae39665937415101ebd
SHA2562549d7f921f528770af81484ca8fc21fd8d13db9e631f8dde34787a0fda7d020
SHA5120821efaa6fad058742b6e90f27b40514497cce0b9395241e1d8f443decdbd27650a76f116673d96da2bd0e702a575f328f542f5ef61943343e0de7ca37e22b98
-
Filesize
408KB
MD55def4e4d9ef834cc60845384897f0415
SHA1144c9e1a8eaab234de0be3f2cccbae692a3b7039
SHA256175942e9c7abd2e657939e42c1b3d3ea08628bc095a727160c92ee69ebbe5553
SHA512fea237886e20c4df380e2385b11f28dc589b611cc3fe19e74ad6e153006523de0be400c089cbae870fb8773eab5b8f8de53a2412a5401125d3e628d43e0d802d
-
Filesize
408KB
MD5127a798ccd4511b427355c50e7acd703
SHA116cc86639e262fc407bc0e0abb85a5781425835b
SHA256903826cb4d1feae36962be00eb7864b4afd8287912ce11dd5d832c5e4c9b4f71
SHA51235ad4ab3ac1ba1faa4189740e9614d00b161325d2ebd29da048c2ffd7575174e17096a04ad271dcae22df742e127b86579781a393d85503256eb2d8aadd45c5a