Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe
-
Size
372KB
-
MD5
ba912d46e1acfaf79d03097f09a2702c
-
SHA1
5498bf61a4d1dd745ffd368f4322cd1fd2484032
-
SHA256
a0dc464d4cce80c660597babf8923ad92308d4a14fafaa54cdc7670e09dd7955
-
SHA512
d2c2ae47d101fa2645acfe9a7e4c04fc6d05f6820971cf8f8fae396c17ba8f2345c62b7e1908bc6848601c94ab07e6ac63296a382e35dde2130855fc057b5f44
-
SSDEEP
3072:CEGh0o1mlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEG+l/Oe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x00100000000231ea-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000231e5-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000231f1-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000231e5-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000231f1-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000231e5-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000231f1-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000735-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000737-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000735-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000737-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000000735-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8551C881-BBDE-4ced-9E91-39DF7869C7E0}\stubpath = "C:\\Windows\\{8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe" {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EBCCADB4-7C44-4862-AB2F-34C1966E9F24} {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EBCCADB4-7C44-4862-AB2F-34C1966E9F24}\stubpath = "C:\\Windows\\{EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe" {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{26002FD4-506F-4c36-8D6F-5EAF6055645E} {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72980CFE-CB37-40b6-9963-A224BAC4BB16} {8D83283C-F091-4629-82A2-D8E726D4E244}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5426CA61-0DFD-4660-AA3D-8F7AFE38BBF5}\stubpath = "C:\\Windows\\{5426CA61-0DFD-4660-AA3D-8F7AFE38BBF5}.exe" {72980CFE-CB37-40b6-9963-A224BAC4BB16}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{687CE137-DE99-4efc-BED3-8623A85FCF29} {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{26002FD4-506F-4c36-8D6F-5EAF6055645E}\stubpath = "C:\\Windows\\{26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe" {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{31A19E2F-6C67-4d4d-AE58-83CACB738BF3}\stubpath = "C:\\Windows\\{31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe" {255AEA71-27D5-465e-B041-DAB523135730}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F97DB11-74EE-4363-97E6-0374FBC59718} {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D83283C-F091-4629-82A2-D8E726D4E244} {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{31A19E2F-6C67-4d4d-AE58-83CACB738BF3} {255AEA71-27D5-465e-B041-DAB523135730}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D83283C-F091-4629-82A2-D8E726D4E244}\stubpath = "C:\\Windows\\{8D83283C-F091-4629-82A2-D8E726D4E244}.exe" {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0F1EA7A-2F1B-4efa-B788-AC2990267966} 2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0F1EA7A-2F1B-4efa-B788-AC2990267966}\stubpath = "C:\\Windows\\{D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe" 2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}\stubpath = "C:\\Windows\\{DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe" {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8551C881-BBDE-4ced-9E91-39DF7869C7E0} {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{687CE137-DE99-4efc-BED3-8623A85FCF29}\stubpath = "C:\\Windows\\{687CE137-DE99-4efc-BED3-8623A85FCF29}.exe" {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{255AEA71-27D5-465e-B041-DAB523135730}\stubpath = "C:\\Windows\\{255AEA71-27D5-465e-B041-DAB523135730}.exe" {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D} {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{255AEA71-27D5-465e-B041-DAB523135730} {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F97DB11-74EE-4363-97E6-0374FBC59718}\stubpath = "C:\\Windows\\{2F97DB11-74EE-4363-97E6-0374FBC59718}.exe" {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72980CFE-CB37-40b6-9963-A224BAC4BB16}\stubpath = "C:\\Windows\\{72980CFE-CB37-40b6-9963-A224BAC4BB16}.exe" {8D83283C-F091-4629-82A2-D8E726D4E244}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5426CA61-0DFD-4660-AA3D-8F7AFE38BBF5} {72980CFE-CB37-40b6-9963-A224BAC4BB16}.exe -
Executes dropped EXE 12 IoCs
pid Process 3800 {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe 3368 {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe 2716 {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe 4104 {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe 3280 {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe 4412 {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe 2300 {255AEA71-27D5-465e-B041-DAB523135730}.exe 2160 {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe 220 {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe 3756 {8D83283C-F091-4629-82A2-D8E726D4E244}.exe 3848 {72980CFE-CB37-40b6-9963-A224BAC4BB16}.exe 5032 {5426CA61-0DFD-4660-AA3D-8F7AFE38BBF5}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{255AEA71-27D5-465e-B041-DAB523135730}.exe {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe File created C:\Windows\{8D83283C-F091-4629-82A2-D8E726D4E244}.exe {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe File created C:\Windows\{DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe File created C:\Windows\{8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe File created C:\Windows\{687CE137-DE99-4efc-BED3-8623A85FCF29}.exe {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe File created C:\Windows\{26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe File created C:\Windows\{31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe {255AEA71-27D5-465e-B041-DAB523135730}.exe File created C:\Windows\{2F97DB11-74EE-4363-97E6-0374FBC59718}.exe {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe File created C:\Windows\{72980CFE-CB37-40b6-9963-A224BAC4BB16}.exe {8D83283C-F091-4629-82A2-D8E726D4E244}.exe File created C:\Windows\{5426CA61-0DFD-4660-AA3D-8F7AFE38BBF5}.exe {72980CFE-CB37-40b6-9963-A224BAC4BB16}.exe File created C:\Windows\{D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe 2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe File created C:\Windows\{EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2568 2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe Token: SeIncBasePriorityPrivilege 3800 {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe Token: SeIncBasePriorityPrivilege 3368 {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe Token: SeIncBasePriorityPrivilege 2716 {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe Token: SeIncBasePriorityPrivilege 4104 {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe Token: SeIncBasePriorityPrivilege 3280 {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe Token: SeIncBasePriorityPrivilege 4412 {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe Token: SeIncBasePriorityPrivilege 2300 {255AEA71-27D5-465e-B041-DAB523135730}.exe Token: SeIncBasePriorityPrivilege 2160 {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe Token: SeIncBasePriorityPrivilege 220 {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe Token: SeIncBasePriorityPrivilege 3756 {8D83283C-F091-4629-82A2-D8E726D4E244}.exe Token: SeIncBasePriorityPrivilege 3848 {72980CFE-CB37-40b6-9963-A224BAC4BB16}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 3800 2568 2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe 95 PID 2568 wrote to memory of 3800 2568 2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe 95 PID 2568 wrote to memory of 3800 2568 2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe 95 PID 2568 wrote to memory of 1196 2568 2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe 96 PID 2568 wrote to memory of 1196 2568 2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe 96 PID 2568 wrote to memory of 1196 2568 2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe 96 PID 3800 wrote to memory of 3368 3800 {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe 97 PID 3800 wrote to memory of 3368 3800 {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe 97 PID 3800 wrote to memory of 3368 3800 {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe 97 PID 3800 wrote to memory of 3376 3800 {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe 98 PID 3800 wrote to memory of 3376 3800 {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe 98 PID 3800 wrote to memory of 3376 3800 {D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe 98 PID 3368 wrote to memory of 2716 3368 {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe 101 PID 3368 wrote to memory of 2716 3368 {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe 101 PID 3368 wrote to memory of 2716 3368 {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe 101 PID 3368 wrote to memory of 2560 3368 {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe 100 PID 3368 wrote to memory of 2560 3368 {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe 100 PID 3368 wrote to memory of 2560 3368 {DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe 100 PID 2716 wrote to memory of 4104 2716 {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe 102 PID 2716 wrote to memory of 4104 2716 {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe 102 PID 2716 wrote to memory of 4104 2716 {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe 102 PID 2716 wrote to memory of 3700 2716 {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe 103 PID 2716 wrote to memory of 3700 2716 {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe 103 PID 2716 wrote to memory of 3700 2716 {8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe 103 PID 4104 wrote to memory of 3280 4104 {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe 104 PID 4104 wrote to memory of 3280 4104 {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe 104 PID 4104 wrote to memory of 3280 4104 {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe 104 PID 4104 wrote to memory of 464 4104 {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe 105 PID 4104 wrote to memory of 464 4104 {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe 105 PID 4104 wrote to memory of 464 4104 {EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe 105 PID 3280 wrote to memory of 4412 3280 {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe 106 PID 3280 wrote to memory of 4412 3280 {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe 106 PID 3280 wrote to memory of 4412 3280 {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe 106 PID 3280 wrote to memory of 3660 3280 {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe 107 PID 3280 wrote to memory of 3660 3280 {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe 107 PID 3280 wrote to memory of 3660 3280 {687CE137-DE99-4efc-BED3-8623A85FCF29}.exe 107 PID 4412 wrote to memory of 2300 4412 {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe 108 PID 4412 wrote to memory of 2300 4412 {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe 108 PID 4412 wrote to memory of 2300 4412 {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe 108 PID 4412 wrote to memory of 720 4412 {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe 109 PID 4412 wrote to memory of 720 4412 {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe 109 PID 4412 wrote to memory of 720 4412 {26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe 109 PID 2300 wrote to memory of 2160 2300 {255AEA71-27D5-465e-B041-DAB523135730}.exe 110 PID 2300 wrote to memory of 2160 2300 {255AEA71-27D5-465e-B041-DAB523135730}.exe 110 PID 2300 wrote to memory of 2160 2300 {255AEA71-27D5-465e-B041-DAB523135730}.exe 110 PID 2300 wrote to memory of 2752 2300 {255AEA71-27D5-465e-B041-DAB523135730}.exe 111 PID 2300 wrote to memory of 2752 2300 {255AEA71-27D5-465e-B041-DAB523135730}.exe 111 PID 2300 wrote to memory of 2752 2300 {255AEA71-27D5-465e-B041-DAB523135730}.exe 111 PID 2160 wrote to memory of 220 2160 {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe 112 PID 2160 wrote to memory of 220 2160 {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe 112 PID 2160 wrote to memory of 220 2160 {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe 112 PID 2160 wrote to memory of 864 2160 {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe 113 PID 2160 wrote to memory of 864 2160 {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe 113 PID 2160 wrote to memory of 864 2160 {31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe 113 PID 220 wrote to memory of 3756 220 {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe 114 PID 220 wrote to memory of 3756 220 {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe 114 PID 220 wrote to memory of 3756 220 {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe 114 PID 220 wrote to memory of 5044 220 {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe 115 PID 220 wrote to memory of 5044 220 {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe 115 PID 220 wrote to memory of 5044 220 {2F97DB11-74EE-4363-97E6-0374FBC59718}.exe 115 PID 3756 wrote to memory of 3848 3756 {8D83283C-F091-4629-82A2-D8E726D4E244}.exe 116 PID 3756 wrote to memory of 3848 3756 {8D83283C-F091-4629-82A2-D8E726D4E244}.exe 116 PID 3756 wrote to memory of 3848 3756 {8D83283C-F091-4629-82A2-D8E726D4E244}.exe 116 PID 3756 wrote to memory of 4952 3756 {8D83283C-F091-4629-82A2-D8E726D4E244}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_ba912d46e1acfaf79d03097f09a2702c_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\{D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exeC:\Windows\{D0F1EA7A-2F1B-4efa-B788-AC2990267966}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\{DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exeC:\Windows\{DAD82DD5-53A4-4bf2-BEEF-2BFB20BF160D}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DAD82~1.EXE > nul4⤵PID:2560
-
-
C:\Windows\{8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exeC:\Windows\{8551C881-BBDE-4ced-9E91-39DF7869C7E0}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\{EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exeC:\Windows\{EBCCADB4-7C44-4862-AB2F-34C1966E9F24}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\{687CE137-DE99-4efc-BED3-8623A85FCF29}.exeC:\Windows\{687CE137-DE99-4efc-BED3-8623A85FCF29}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\{26002FD4-506F-4c36-8D6F-5EAF6055645E}.exeC:\Windows\{26002FD4-506F-4c36-8D6F-5EAF6055645E}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\{255AEA71-27D5-465e-B041-DAB523135730}.exeC:\Windows\{255AEA71-27D5-465e-B041-DAB523135730}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\{31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exeC:\Windows\{31A19E2F-6C67-4d4d-AE58-83CACB738BF3}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\{2F97DB11-74EE-4363-97E6-0374FBC59718}.exeC:\Windows\{2F97DB11-74EE-4363-97E6-0374FBC59718}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\{8D83283C-F091-4629-82A2-D8E726D4E244}.exeC:\Windows\{8D83283C-F091-4629-82A2-D8E726D4E244}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\{72980CFE-CB37-40b6-9963-A224BAC4BB16}.exeC:\Windows\{72980CFE-CB37-40b6-9963-A224BAC4BB16}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3848 -
C:\Windows\{5426CA61-0DFD-4660-AA3D-8F7AFE38BBF5}.exeC:\Windows\{5426CA61-0DFD-4660-AA3D-8F7AFE38BBF5}.exe13⤵
- Executes dropped EXE
PID:5032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72980~1.EXE > nul13⤵PID:4552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D832~1.EXE > nul12⤵PID:4952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2F97D~1.EXE > nul11⤵PID:5044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{31A19~1.EXE > nul10⤵PID:864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{255AE~1.EXE > nul9⤵PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26002~1.EXE > nul8⤵PID:720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{687CE~1.EXE > nul7⤵PID:3660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EBCCA~1.EXE > nul6⤵PID:464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8551C~1.EXE > nul5⤵PID:3700
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D0F1E~1.EXE > nul3⤵PID:3376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5d160ea73dc890acf1245521155bf6a48
SHA189139413275bbb67d4c4a939d262b5585b03be3b
SHA2566013169d6982817f32312926f38291ac21a4a7e544f83223a5e311f8bdebf5d1
SHA5125c2d6ca02a77bc6f319cd72b090ebd9b8bc62cea1d351eb864ca0e1965b37f5366de5738ff9284979f1cd98cc243958db11d04523aef139c1314ba2504de45cd
-
Filesize
372KB
MD5d60d062cc485e375ba2ad9cda175ced9
SHA1144120e50323979917ddedbd72c49ac11e0802ec
SHA256f0c25b0909bb1a23513e7e0dac60f9e3fa9278e2f18db111f2326e34046a5fb7
SHA51271bd8c206d5793c95f2e3ef6501ccf46d1f9fc958d8540bda7b4f67aa4273a9807a8c0328949fe7624d207c4a778e00173be0e59a238a896116d5dabe3d4cf7b
-
Filesize
372KB
MD51c6c74ee0d04faa923a568d63c572f08
SHA122dc23ee26b8725c040fef1e32830ccc54d5183e
SHA256a53fa27a6f9cbd5ad4ad58a1742ed74c3ef7037c5a2b78c60bd2d0c83c22342c
SHA51280a4aef67625aad40398c89ab987806b305bbf28ad3e29789d246517fbab1aa6aae8fde2e5c7cec6aac58aea0df8de8ff0c78c92ff3484a92f48a1ff935bb93f
-
Filesize
372KB
MD5e3547d30411c2e30d3a4174a6195cc3a
SHA1a7c1a725a99d9ee4148d5daee50a0ee820f0ae80
SHA25634ef292f1c40b6207386e04f5d82599d62894b688f865e369a5e5e846ed4d4fc
SHA5129c829c0aa971a35db5ee00adee66f46ca8d2530735b1bc0ca591bf51d3f357793b3d825435f061d113d8dc71a7e7a99e84f49258e44e653c75ef2dc0dd11f98a
-
Filesize
372KB
MD506afa3ebb3b5a8927b4b33a65407d62a
SHA104e33eaaa56b0aa4fa68a2c8ee26fa347ba41396
SHA2568eaa31fe0505c2933b1c719a18bb8bd2dc8bbcb723dd79377d6b40f4caccad13
SHA512e74fc7e6a54804c0ca0020f1787a5e4d5537585311ce3db519239276e3dc8975e627ef1b0f4edb1b00172ceb9b29e4b5b10def2ef32ae63dda6f1d8fc4308050
-
Filesize
372KB
MD52f9de40965eaa1f04679fa3b86b41e42
SHA174442d5c6a5b5a94f517e70860eb1628d4278202
SHA2562500fa0707570997c2397d8562b3aca6e9ec573c1ecd052a323221bdbcf494e1
SHA512e2445bfc1886cc33b09b3a56cf1310abb864d8759d23133f9d85713d6c455d1294e29d8a59724b87f5a17d4ea67f889bc0158d76740ae57161ab0044ccccc779
-
Filesize
372KB
MD53f6ab3fae6a914c5136b267790288391
SHA16d1d9535f7ecc53e441aa4801c6d69636b443b89
SHA256605cfbdf4946f9360fdbc9e5d13cd1a34240ed9990dd65ab286d89a919b50e6e
SHA51218a36faae95cefcf4e4f380f52edf888f2c44707d58dd59cde4f571772c0531d32cb2edae1913cd4d718dc37fe5a728640b170729ff017b8553d4d9d3f7f8549
-
Filesize
372KB
MD5c6d99bca47238adca0caa6f6c8cb5224
SHA11efd167492fc97c2ce82b033dbb6e3a72135af20
SHA2566abd9c9eed6f609b22cb67eb8979bfc515733af26995b309ee63af0022e2a72b
SHA512eb8ff37dadeab539b323ad421debf7b5cb9c6ea579d36dc836575f84dccb00e441365e64143b451bba94ac5f2afa2242930f2f9adc1d6984d8e70f01a8f66528
-
Filesize
372KB
MD5319047231fc6b8b37797b25610084c5c
SHA1eacf06566d10b615488506fc6ced14d760d5f97e
SHA256945c1022d3aa74a9d84a53e025292d20ff7cbbf884ac611a4bd5042ed42bf3ef
SHA51276bc7c52ae0e8ff3ce96b800e8b49e68ba8817b545a99c1d572ac70149e980b9a8646606e099194aa01202380ca9591980c98791bae8dfbcf1575b57e9a79570
-
Filesize
372KB
MD53f2c8847ba1bb9983a21e2a618b340eb
SHA1c1eaa587ec107df27b11de37b9d20eaddaef5a99
SHA256f2fdd9b736294e72966c2ab1a8175d82565ec965135e9eac053f67744f843a3b
SHA512416c231ef17236c2c779df6309a796a4c7098d5ec1911d53f1084aab26a1a05de6f58d8e5289d2105dd91f82bd63778f3cc8dd62c95e6e98dd8f60d9f4504562
-
Filesize
372KB
MD53ad93555b272340ce1c232a8f6e90636
SHA1c31bcd7ea04d78e5aa27d44bbeffb2809ee72b03
SHA256bb169600d6a69eebef5f748d13b3a74de68bd54f732456aaa26096c61402ef9f
SHA51229f855402656acc2529153c0fc35809ea71e7319682444d16fd16a2acb32ab5a11d55a3c2c9ab885b89f67ae5fb238e23f379eb00ff1377b9e78d1597e4844fa
-
Filesize
372KB
MD5d78716954c68dbd11f79d23d871628b7
SHA19528d6680e522804b965ac27a13122278ce3f27b
SHA256045a754c7e47a503c1d331d914a4f3eddc4ec627b2d09f87fc7c7a0d6230667c
SHA5125f95d490edd55176b15c6fd851bd3c90170661e6554a600f484bef0587e66eecebe890ef2bce3dc9c72373c0ea9441e105ad8233e0690dea761ab953293f60dc