Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe
-
Size
372KB
-
MD5
e2c1bfeed2de4891b22b3edc77f5085f
-
SHA1
b2e677ddb01ba5ea6f66b3bb320bff12616b3955
-
SHA256
7157d6199bdf099598ebd24ad7465171c3e4fd68e08b6d7e99ab5c56cd8c62b1
-
SHA512
4c87b44b12e244fbfb5458519dd5e8020b7b58181c4ee4ecb26c03e65f042c26059c9bcae86d10bdb4e5e024236a2496492a9721ea9460137c96f12ab0b82877
-
SSDEEP
3072:CEGh0ormlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGcl/Oe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000a000000012243-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000012266-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000012243-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x003300000000b1f4-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012243-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000012243-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000012243-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62B3B8EE-CB1A-4bb2-8863-EF00F74D7655} {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}\stubpath = "C:\\Windows\\{62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe" {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5} 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AD25999F-65ED-488f-8B40-70EAE917ED32}\stubpath = "C:\\Windows\\{AD25999F-65ED-488f-8B40-70EAE917ED32}.exe" {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{068A7F74-35D2-481d-AC83-A01073F6D2B1}\stubpath = "C:\\Windows\\{068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe" {62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F7B41764-0A44-4b28-9B49-3A09078EE097}\stubpath = "C:\\Windows\\{F7B41764-0A44-4b28-9B49-3A09078EE097}.exe" {068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{127576DE-7193-4587-A3CE-B434E86148A3} {F7B41764-0A44-4b28-9B49-3A09078EE097}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{127576DE-7193-4587-A3CE-B434E86148A3}\stubpath = "C:\\Windows\\{127576DE-7193-4587-A3CE-B434E86148A3}.exe" {F7B41764-0A44-4b28-9B49-3A09078EE097}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}\stubpath = "C:\\Windows\\{E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe" 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5642B8F-A1E2-43a4-823E-1DF8AEF48243} {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5642B8F-A1E2-43a4-823E-1DF8AEF48243}\stubpath = "C:\\Windows\\{B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe" {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3} {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}\stubpath = "C:\\Windows\\{87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe" {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}\stubpath = "C:\\Windows\\{7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe" {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F7B41764-0A44-4b28-9B49-3A09078EE097} {068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0A480C2-F99F-4223-88EB-61B51477A1B7} {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0A480C2-F99F-4223-88EB-61B51477A1B7}\stubpath = "C:\\Windows\\{A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe" {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AD25999F-65ED-488f-8B40-70EAE917ED32} {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975} {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70E285D9-408F-487c-9DCD-19DC4B7F8309} {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70E285D9-408F-487c-9DCD-19DC4B7F8309}\stubpath = "C:\\Windows\\{70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe" {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{068A7F74-35D2-481d-AC83-A01073F6D2B1} {62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe -
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1724 {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe 2748 {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe 2428 {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe 1836 {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe 2916 {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe 1936 {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe 1804 {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe 1400 {62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe 1520 {068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe 2956 {F7B41764-0A44-4b28-9B49-3A09078EE097}.exe 576 {127576DE-7193-4587-A3CE-B434E86148A3}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe File created C:\Windows\{B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe File created C:\Windows\{7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe File created C:\Windows\{068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe {62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe File created C:\Windows\{F7B41764-0A44-4b28-9B49-3A09078EE097}.exe {068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe File created C:\Windows\{127576DE-7193-4587-A3CE-B434E86148A3}.exe {F7B41764-0A44-4b28-9B49-3A09078EE097}.exe File created C:\Windows\{E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe File created C:\Windows\{AD25999F-65ED-488f-8B40-70EAE917ED32}.exe {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe File created C:\Windows\{70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe File created C:\Windows\{62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe File created C:\Windows\{87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2212 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe Token: SeIncBasePriorityPrivilege 1724 {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe Token: SeIncBasePriorityPrivilege 2748 {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe Token: SeIncBasePriorityPrivilege 2428 {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe Token: SeIncBasePriorityPrivilege 1836 {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe Token: SeIncBasePriorityPrivilege 2916 {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe Token: SeIncBasePriorityPrivilege 1936 {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe Token: SeIncBasePriorityPrivilege 1804 {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe Token: SeIncBasePriorityPrivilege 1400 {62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe Token: SeIncBasePriorityPrivilege 1520 {068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe Token: SeIncBasePriorityPrivilege 2956 {F7B41764-0A44-4b28-9B49-3A09078EE097}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1724 2212 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe 28 PID 2212 wrote to memory of 1724 2212 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe 28 PID 2212 wrote to memory of 1724 2212 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe 28 PID 2212 wrote to memory of 1724 2212 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe 28 PID 2212 wrote to memory of 2764 2212 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe 29 PID 2212 wrote to memory of 2764 2212 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe 29 PID 2212 wrote to memory of 2764 2212 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe 29 PID 2212 wrote to memory of 2764 2212 2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe 29 PID 1724 wrote to memory of 2748 1724 {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe 31 PID 1724 wrote to memory of 2748 1724 {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe 31 PID 1724 wrote to memory of 2748 1724 {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe 31 PID 1724 wrote to memory of 2748 1724 {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe 31 PID 1724 wrote to memory of 2896 1724 {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe 30 PID 1724 wrote to memory of 2896 1724 {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe 30 PID 1724 wrote to memory of 2896 1724 {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe 30 PID 1724 wrote to memory of 2896 1724 {E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe 30 PID 2748 wrote to memory of 2428 2748 {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe 33 PID 2748 wrote to memory of 2428 2748 {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe 33 PID 2748 wrote to memory of 2428 2748 {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe 33 PID 2748 wrote to memory of 2428 2748 {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe 33 PID 2748 wrote to memory of 2788 2748 {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe 32 PID 2748 wrote to memory of 2788 2748 {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe 32 PID 2748 wrote to memory of 2788 2748 {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe 32 PID 2748 wrote to memory of 2788 2748 {A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe 32 PID 2428 wrote to memory of 1836 2428 {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe 36 PID 2428 wrote to memory of 1836 2428 {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe 36 PID 2428 wrote to memory of 1836 2428 {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe 36 PID 2428 wrote to memory of 1836 2428 {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe 36 PID 2428 wrote to memory of 1848 2428 {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe 37 PID 2428 wrote to memory of 1848 2428 {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe 37 PID 2428 wrote to memory of 1848 2428 {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe 37 PID 2428 wrote to memory of 1848 2428 {B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe 37 PID 1836 wrote to memory of 2916 1836 {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe 38 PID 1836 wrote to memory of 2916 1836 {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe 38 PID 1836 wrote to memory of 2916 1836 {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe 38 PID 1836 wrote to memory of 2916 1836 {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe 38 PID 1836 wrote to memory of 1560 1836 {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe 39 PID 1836 wrote to memory of 1560 1836 {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe 39 PID 1836 wrote to memory of 1560 1836 {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe 39 PID 1836 wrote to memory of 1560 1836 {87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe 39 PID 2916 wrote to memory of 1936 2916 {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe 40 PID 2916 wrote to memory of 1936 2916 {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe 40 PID 2916 wrote to memory of 1936 2916 {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe 40 PID 2916 wrote to memory of 1936 2916 {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe 40 PID 2916 wrote to memory of 1248 2916 {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe 41 PID 2916 wrote to memory of 1248 2916 {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe 41 PID 2916 wrote to memory of 1248 2916 {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe 41 PID 2916 wrote to memory of 1248 2916 {AD25999F-65ED-488f-8B40-70EAE917ED32}.exe 41 PID 1936 wrote to memory of 1804 1936 {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe 42 PID 1936 wrote to memory of 1804 1936 {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe 42 PID 1936 wrote to memory of 1804 1936 {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe 42 PID 1936 wrote to memory of 1804 1936 {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe 42 PID 1936 wrote to memory of 2196 1936 {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe 43 PID 1936 wrote to memory of 2196 1936 {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe 43 PID 1936 wrote to memory of 2196 1936 {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe 43 PID 1936 wrote to memory of 2196 1936 {7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe 43 PID 1804 wrote to memory of 1400 1804 {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe 44 PID 1804 wrote to memory of 1400 1804 {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe 44 PID 1804 wrote to memory of 1400 1804 {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe 44 PID 1804 wrote to memory of 1400 1804 {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe 44 PID 1804 wrote to memory of 760 1804 {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe 45 PID 1804 wrote to memory of 760 1804 {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe 45 PID 1804 wrote to memory of 760 1804 {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe 45 PID 1804 wrote to memory of 760 1804 {70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\{E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exeC:\Windows\{E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E186E~1.EXE > nul3⤵PID:2896
-
-
C:\Windows\{A0A480C2-F99F-4223-88EB-61B51477A1B7}.exeC:\Windows\{A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A0A48~1.EXE > nul4⤵PID:2788
-
-
C:\Windows\{B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exeC:\Windows\{B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\{87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exeC:\Windows\{87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\{AD25999F-65ED-488f-8B40-70EAE917ED32}.exeC:\Windows\{AD25999F-65ED-488f-8B40-70EAE917ED32}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\{7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exeC:\Windows\{7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\{70E285D9-408F-487c-9DCD-19DC4B7F8309}.exeC:\Windows\{70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\{62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exeC:\Windows\{62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1400 -
C:\Windows\{068A7F74-35D2-481d-AC83-A01073F6D2B1}.exeC:\Windows\{068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\{F7B41764-0A44-4b28-9B49-3A09078EE097}.exeC:\Windows\{F7B41764-0A44-4b28-9B49-3A09078EE097}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\{127576DE-7193-4587-A3CE-B434E86148A3}.exeC:\Windows\{127576DE-7193-4587-A3CE-B434E86148A3}.exe12⤵
- Executes dropped EXE
PID:576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F7B41~1.EXE > nul12⤵PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{068A7~1.EXE > nul11⤵PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{62B3B~1.EXE > nul10⤵PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70E28~1.EXE > nul9⤵PID:760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7BF9B~1.EXE > nul8⤵PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AD259~1.EXE > nul7⤵PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{87FBF~1.EXE > nul6⤵PID:1560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5642~1.EXE > nul5⤵PID:1848
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD586646999090fc3d75e137c061d6bda5c
SHA1e581581b57d6573c056e0fdf9189d9af3ff25efb
SHA256eac5329917b6d0634eb10c05f6ed24f40d50d3f8cea6ae3e30a1169d03e15de0
SHA51220eab8c2d3e18b454659c6e242e2b32d3b9f93e576551ff848de645b92bba2301e57085a1941919be4e00e437222f2b7dcda2f4d1e4c1377816ffd41d9e1d1b1
-
Filesize
372KB
MD5a09ce602f8c98388801cdc3330c1ab16
SHA14aa666d00bb5ec35261132f0a3b91ad65bdd22ba
SHA256f038bf3a32d9b2bd5734e2b26169b39c5b9759d516f616e9955173a750b9be8b
SHA51204b7c6a01dd9433d657ce401f266c08c7b3d94ba72f00cdf4e79f97340a3a710553f97eb3fd0a25472aa7f0c2f44f5775ef8f823cb2c8a93a0b3fcce0e781960
-
Filesize
372KB
MD5137c4125dff942d02d4d4f8c65a4a39a
SHA1e7be65d3589822922236e617aecc1f46d7cb0725
SHA256279ae82a5c65ff0e8a917fbea1ee6a124f6e38a3dc8dd8dd5b6a8514b41274ea
SHA51240b834569006da605e04eeca0c7dfde6a1cd96383f4e6d09aedec431d9fd0e30b88b80931e3ffaf6621768a9eba36ced576dc69c1f1c64a4f2aeaeafb8c0ad15
-
Filesize
372KB
MD5b382ece097d4bab279c1e0b87c25b9ca
SHA1e5a36e0f706e7dfe8f094c80097c3fc9269c2e7c
SHA25655a4db7d7f85f36a553cceb3cbd276647ca11375ea618a07c1fcaec0d619c1d9
SHA51218dbb32e580070854b2d702c9ec626f66a0ad968bcf5c40a01fecdf780a9497aceeddbc402e5022bb26dede3aa4b042ee70beac8c09288f007eba93514d9e919
-
Filesize
372KB
MD5a857fa64cdec0980946df9035d02c99b
SHA1e3feadf1e217816c5724a395e92599b2bf119ef0
SHA256337443da41aa7812283b6a1e2f6404fd831104f5aa3a0126fc31e0235c8c9e16
SHA512f36b155133fbe744d324af692d1be4fff2c1e166ba9fc6a05cba4c59b33913e8b773ecbc687228e747fd40e8e17337401fdb7d5b293fbf2bdf5b3a890c1bb6b8
-
Filesize
372KB
MD5f17a3a11c82dac948f2caf56b99de125
SHA1e747a18d3597e86798330c13f9cb61da69228f55
SHA256300e2b885b300672bc62268f580c846c00f7922095cc202d3b4da3cdd04bc7f4
SHA5128f109fd471dcf6db3771a59db12c26ce401946b30acd5d3415b931cf796da53eaac4ab57b59c038fdf42ca178e73fb2b37ad3858e828a72b17a17d9753d37568
-
Filesize
372KB
MD51e22a951e7582295a74253cedb371422
SHA1d3ed04a10f2d3c85562bfefe5d43e7bb15ec28d6
SHA256aa321676b908f36dc3ed207f9d7aa3884cb742ea52da477b8dcb55f5e0588385
SHA512f6f7742f18249951aae5fe3b75ad758fb14fd4368e705f06ea344d4933a94a9d7e852445e56545ea6d5f6b4fb1a16c76b6169f699ae33f4717317a3dfce7394a
-
Filesize
372KB
MD5470f0654e9307b79fd53640dae30b6a9
SHA15511f0714e6a912dcfeff85afcc40f39af46e22a
SHA2562c387bc9de4b3687880f56e9bd00a74b259fe5b3c6609b6abcad79a3d6bc84eb
SHA512ea41a2ca3436503ff02c5dae3be968e05cbd55a5cab1c254fe370ebfe49d2371afee724e328327897e897f50f7b64a37e7678ccd47b9053c7680044a6777cb66
-
Filesize
372KB
MD59a2781fbbcd19a5e36d63d63b6315ada
SHA181d88f3a6ba895b8f32d6d58a62d75267b39d1bf
SHA2569c00961b072b6cdf4297a2feae30df110bf4083692325bf3c45aeb43707b8628
SHA51205d3fac3d75139e47376391516a1e3bff4f99e12804a45fc62b5e8412dc1aaa18263936eed9cdfc936b02206248dd0181a873c03c3531525068eed5bd8c7abc6
-
Filesize
372KB
MD5eae590a1d25f95adb841cf7c98aaa903
SHA1a69115b7e78065bc8b4afee70ece1097de48188d
SHA256c0bca7ac183fb9aa249087367c60e1aed0cf3205e360d6a8753baaad92b57d2e
SHA51271e6d3216bd5f3a056ad5068cc58aa99a9d4d0dceab9f519befd25d77864b7cfe6f812300658e88dce310ed4b494fec28288dc98a7f5ac0a9a2c51145a4db9c9
-
Filesize
372KB
MD56b9dc614a206ae3de61b125a1d95e770
SHA195708e80171ee1afb6897be2d1267e30024d050a
SHA2563eef71a83917851c9e978ee8933d6419d9dc2d7b34897077660b121e194dcfe2
SHA5121887b4e007457d20a6585177222dd93296294d603692e0e4569002ee614b7340161ccf13a08f93354091ae73163bbd92a8d0631a9cc13733576c6e0ba0523373