Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe
-
Size
192KB
-
MD5
e8a81dbe4934882bfcd2ec8cbfb7686f
-
SHA1
3e6a4c31e1bd1e4462a6561d6c66f853d58b0ae6
-
SHA256
887d454bcfb9f213418ce044f2aad69d6201d2cb3d65ba50f7b8ec9703e47f8b
-
SHA512
cb7400e5ac49f987268d840666b014bd6f0f109cfda555c71bde5b8bc7bf50c917df60544a321114fdba21a3373ff7b672c330f39427a3ce4fe9e4a04bb3c930
-
SSDEEP
1536:1EGh0oNl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oNl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral1/files/0x000c0000000122d5-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000122fc-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000122d5-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0003000000004ed5-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0003000000004ed5-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000b1f7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002c000000014824-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002c000000014a45-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002d000000014824-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002d000000014a45-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002e000000014824-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002e000000014a45-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}\stubpath = "C:\\Windows\\{5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe" {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E512EFC-326E-4124-88F5-F5DDCE71240B} {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{27C02EFC-D2C2-49c2-888F-A9BD2434C66B} {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{27C02EFC-D2C2-49c2-888F-A9BD2434C66B}\stubpath = "C:\\Windows\\{27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe" {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4400907F-C062-4aa6-AEE6-CB9DC1D3608E} {FFEBC816-4EEB-4e05-A2DD-9A6C056E614D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4400907F-C062-4aa6-AEE6-CB9DC1D3608E}\stubpath = "C:\\Windows\\{4400907F-C062-4aa6-AEE6-CB9DC1D3608E}.exe" {FFEBC816-4EEB-4e05-A2DD-9A6C056E614D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F4656B04-E09E-4d68-BBAC-F85D83BA6404} {87D97DCE-8DC4-465f-B12F-ABCD99CB33D6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56598158-CE65-47a3-B6F4-8B78A53708BC}\stubpath = "C:\\Windows\\{56598158-CE65-47a3-B6F4-8B78A53708BC}.exe" {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{87D97DCE-8DC4-465f-B12F-ABCD99CB33D6}\stubpath = "C:\\Windows\\{87D97DCE-8DC4-465f-B12F-ABCD99CB33D6}.exe" {4400907F-C062-4aa6-AEE6-CB9DC1D3608E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}\stubpath = "C:\\Windows\\{FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe" {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E2FBA96B-4565-4058-84F5-44A0979404D3} 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E2FBA96B-4565-4058-84F5-44A0979404D3}\stubpath = "C:\\Windows\\{E2FBA96B-4565-4058-84F5-44A0979404D3}.exe" 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E512EFC-326E-4124-88F5-F5DDCE71240B}\stubpath = "C:\\Windows\\{6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe" {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56598158-CE65-47a3-B6F4-8B78A53708BC} {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B0D8D26-396B-4d60-A78E-CEB8EB292C47} {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B0D8D26-396B-4d60-A78E-CEB8EB292C47}\stubpath = "C:\\Windows\\{2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe" {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FD0164A5-9E45-40de-8EB0-45DFEAFF1F85} {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FFEBC816-4EEB-4e05-A2DD-9A6C056E614D}\stubpath = "C:\\Windows\\{FFEBC816-4EEB-4e05-A2DD-9A6C056E614D}.exe" {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F4656B04-E09E-4d68-BBAC-F85D83BA6404}\stubpath = "C:\\Windows\\{F4656B04-E09E-4d68-BBAC-F85D83BA6404}.exe" {87D97DCE-8DC4-465f-B12F-ABCD99CB33D6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5} {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FFEBC816-4EEB-4e05-A2DD-9A6C056E614D} {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{87D97DCE-8DC4-465f-B12F-ABCD99CB33D6} {4400907F-C062-4aa6-AEE6-CB9DC1D3608E}.exe -
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2676 {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe 2708 {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe 2288 {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe 1676 {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe 3020 {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe 2236 {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe 2808 {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe 772 {FFEBC816-4EEB-4e05-A2DD-9A6C056E614D}.exe 1672 {4400907F-C062-4aa6-AEE6-CB9DC1D3608E}.exe 2056 {87D97DCE-8DC4-465f-B12F-ABCD99CB33D6}.exe 2176 {F4656B04-E09E-4d68-BBAC-F85D83BA6404}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{FFEBC816-4EEB-4e05-A2DD-9A6C056E614D}.exe {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe File created C:\Windows\{E2FBA96B-4565-4058-84F5-44A0979404D3}.exe 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe File created C:\Windows\{5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe File created C:\Windows\{FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe File created C:\Windows\{27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe File created C:\Windows\{4400907F-C062-4aa6-AEE6-CB9DC1D3608E}.exe {FFEBC816-4EEB-4e05-A2DD-9A6C056E614D}.exe File created C:\Windows\{87D97DCE-8DC4-465f-B12F-ABCD99CB33D6}.exe {4400907F-C062-4aa6-AEE6-CB9DC1D3608E}.exe File created C:\Windows\{F4656B04-E09E-4d68-BBAC-F85D83BA6404}.exe {87D97DCE-8DC4-465f-B12F-ABCD99CB33D6}.exe File created C:\Windows\{6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe File created C:\Windows\{56598158-CE65-47a3-B6F4-8B78A53708BC}.exe {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe File created C:\Windows\{2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 808 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe Token: SeIncBasePriorityPrivilege 2676 {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe Token: SeIncBasePriorityPrivilege 2708 {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe Token: SeIncBasePriorityPrivilege 2288 {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe Token: SeIncBasePriorityPrivilege 1676 {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe Token: SeIncBasePriorityPrivilege 3020 {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe Token: SeIncBasePriorityPrivilege 2236 {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe Token: SeIncBasePriorityPrivilege 2808 {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe Token: SeIncBasePriorityPrivilege 772 {FFEBC816-4EEB-4e05-A2DD-9A6C056E614D}.exe Token: SeIncBasePriorityPrivilege 1672 {4400907F-C062-4aa6-AEE6-CB9DC1D3608E}.exe Token: SeIncBasePriorityPrivilege 2056 {87D97DCE-8DC4-465f-B12F-ABCD99CB33D6}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 808 wrote to memory of 2676 808 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe 28 PID 808 wrote to memory of 2676 808 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe 28 PID 808 wrote to memory of 2676 808 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe 28 PID 808 wrote to memory of 2676 808 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe 28 PID 808 wrote to memory of 2724 808 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe 29 PID 808 wrote to memory of 2724 808 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe 29 PID 808 wrote to memory of 2724 808 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe 29 PID 808 wrote to memory of 2724 808 2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe 29 PID 2676 wrote to memory of 2708 2676 {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe 30 PID 2676 wrote to memory of 2708 2676 {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe 30 PID 2676 wrote to memory of 2708 2676 {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe 30 PID 2676 wrote to memory of 2708 2676 {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe 30 PID 2676 wrote to memory of 2888 2676 {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe 31 PID 2676 wrote to memory of 2888 2676 {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe 31 PID 2676 wrote to memory of 2888 2676 {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe 31 PID 2676 wrote to memory of 2888 2676 {E2FBA96B-4565-4058-84F5-44A0979404D3}.exe 31 PID 2708 wrote to memory of 2288 2708 {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe 32 PID 2708 wrote to memory of 2288 2708 {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe 32 PID 2708 wrote to memory of 2288 2708 {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe 32 PID 2708 wrote to memory of 2288 2708 {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe 32 PID 2708 wrote to memory of 2756 2708 {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe 33 PID 2708 wrote to memory of 2756 2708 {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe 33 PID 2708 wrote to memory of 2756 2708 {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe 33 PID 2708 wrote to memory of 2756 2708 {5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe 33 PID 2288 wrote to memory of 1676 2288 {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe 36 PID 2288 wrote to memory of 1676 2288 {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe 36 PID 2288 wrote to memory of 1676 2288 {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe 36 PID 2288 wrote to memory of 1676 2288 {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe 36 PID 2288 wrote to memory of 2928 2288 {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe 37 PID 2288 wrote to memory of 2928 2288 {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe 37 PID 2288 wrote to memory of 2928 2288 {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe 37 PID 2288 wrote to memory of 2928 2288 {6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe 37 PID 1676 wrote to memory of 3020 1676 {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe 38 PID 1676 wrote to memory of 3020 1676 {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe 38 PID 1676 wrote to memory of 3020 1676 {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe 38 PID 1676 wrote to memory of 3020 1676 {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe 38 PID 1676 wrote to memory of 368 1676 {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe 39 PID 1676 wrote to memory of 368 1676 {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe 39 PID 1676 wrote to memory of 368 1676 {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe 39 PID 1676 wrote to memory of 368 1676 {56598158-CE65-47a3-B6F4-8B78A53708BC}.exe 39 PID 3020 wrote to memory of 2236 3020 {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe 40 PID 3020 wrote to memory of 2236 3020 {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe 40 PID 3020 wrote to memory of 2236 3020 {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe 40 PID 3020 wrote to memory of 2236 3020 {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe 40 PID 3020 wrote to memory of 1908 3020 {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe 41 PID 3020 wrote to memory of 1908 3020 {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe 41 PID 3020 wrote to memory of 1908 3020 {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe 41 PID 3020 wrote to memory of 1908 3020 {2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe 41 PID 2236 wrote to memory of 2808 2236 {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe 42 PID 2236 wrote to memory of 2808 2236 {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe 42 PID 2236 wrote to memory of 2808 2236 {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe 42 PID 2236 wrote to memory of 2808 2236 {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe 42 PID 2236 wrote to memory of 584 2236 {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe 43 PID 2236 wrote to memory of 584 2236 {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe 43 PID 2236 wrote to memory of 584 2236 {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe 43 PID 2236 wrote to memory of 584 2236 {27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe 43 PID 2808 wrote to memory of 772 2808 {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe 44 PID 2808 wrote to memory of 772 2808 {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe 44 PID 2808 wrote to memory of 772 2808 {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe 44 PID 2808 wrote to memory of 772 2808 {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe 44 PID 2808 wrote to memory of 1092 2808 {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe 45 PID 2808 wrote to memory of 1092 2808 {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe 45 PID 2808 wrote to memory of 1092 2808 {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe 45 PID 2808 wrote to memory of 1092 2808 {FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-29_e8a81dbe4934882bfcd2ec8cbfb7686f_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\{E2FBA96B-4565-4058-84F5-44A0979404D3}.exeC:\Windows\{E2FBA96B-4565-4058-84F5-44A0979404D3}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\{5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exeC:\Windows\{5231AE8C-12C3-4aa3-87E4-A6B1E14A67D5}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\{6E512EFC-326E-4124-88F5-F5DDCE71240B}.exeC:\Windows\{6E512EFC-326E-4124-88F5-F5DDCE71240B}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\{56598158-CE65-47a3-B6F4-8B78A53708BC}.exeC:\Windows\{56598158-CE65-47a3-B6F4-8B78A53708BC}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\{2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exeC:\Windows\{2B0D8D26-396B-4d60-A78E-CEB8EB292C47}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\{27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exeC:\Windows\{27C02EFC-D2C2-49c2-888F-A9BD2434C66B}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\{FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exeC:\Windows\{FD0164A5-9E45-40de-8EB0-45DFEAFF1F85}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\{FFEBC816-4EEB-4e05-A2DD-9A6C056E614D}.exeC:\Windows\{FFEBC816-4EEB-4e05-A2DD-9A6C056E614D}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:772 -
C:\Windows\{4400907F-C062-4aa6-AEE6-CB9DC1D3608E}.exeC:\Windows\{4400907F-C062-4aa6-AEE6-CB9DC1D3608E}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\{87D97DCE-8DC4-465f-B12F-ABCD99CB33D6}.exeC:\Windows\{87D97DCE-8DC4-465f-B12F-ABCD99CB33D6}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\{F4656B04-E09E-4d68-BBAC-F85D83BA6404}.exeC:\Windows\{F4656B04-E09E-4d68-BBAC-F85D83BA6404}.exe12⤵
- Executes dropped EXE
PID:2176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{87D97~1.EXE > nul12⤵PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{44009~1.EXE > nul11⤵PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FFEBC~1.EXE > nul10⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD016~1.EXE > nul9⤵PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{27C02~1.EXE > nul8⤵PID:584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2B0D8~1.EXE > nul7⤵PID:1908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56598~1.EXE > nul6⤵PID:368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E512~1.EXE > nul5⤵PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5231A~1.EXE > nul4⤵PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E2FBA~1.EXE > nul3⤵PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5cae8e510ec708deec2cda5d8efecb7a3
SHA1d986f145cce23349693f445fda97a01edba5504d
SHA256305536299eb8fc5cb41b2607870d2d81194273880fb53770a639154dde3761de
SHA51287b64e48054b11bdb388c378f01d54760c4bf4fded727332e5c02a059a9f8003d1237767ddf287f875da73b29ea14b22e32b2a8cd8c6068994fee62851c55ed6
-
Filesize
192KB
MD53e470341c1d8ca9f9172208409ba4be8
SHA155c8894e72050e8445374634978362ef24666d8a
SHA256350795c64d9064c37778d3ef81ff72edf09939eecaaab9bd14709482c9ef4424
SHA512888e5db13111e66fe88244644a7428a70c8e935246aaefae88eeff86f56303da02680e6c791847f0a14c158d43c0b465a6bf259b65d1da04b5814a5bf87f717e
-
Filesize
192KB
MD5e244e1ad5889f9d589a9890fe3a80b86
SHA1c9ec92f567458591681f930044a63238293040d4
SHA256fc56f80bafe0c474b892b7873098dce55775da06dfd1d0aeeab7787e9ab99890
SHA51265d2c994f20d2c48315a02918df4143e527a1e5cbf313e301533f4a6d475ada9c7b96bed2961b229a0879aedd80f8ca22b6c8a4f65bc3f4d1d2ccfc78193e4c0
-
Filesize
192KB
MD533aeabffe42c2441f5590ad13b52c9ee
SHA1a8ec9ac3deccd2ee0124699aa809602b00213e3d
SHA25681363c7fe13ba2f43e8590ee790e627c11655464f473c9292afcaabeff6042c1
SHA5125f944bc6b6d1b659ca28df8eb50d6aed1c88cb7cf99b6e7b69dc70978ea96d0dbb36c9763397fcd50fc1ce87e673c6191b0e611870f210e576ec6723f54a193f
-
Filesize
192KB
MD53b1546d61c2906b0cf7a43e3e4149d41
SHA1a8876433d03362203505432eb6109828afe59480
SHA256372588780acfba0e92a7382002e80180c172e770be880b790e3a5746e4b515d5
SHA51222a4b40b6c3c52db06e189cee146eb86f09a0b121f57fd46f5457bc35fae651d9b06f1cd91a8997cf95b7f523831eb17e2c8a6a320ae3ac65e05f4698840e7aa
-
Filesize
108KB
MD577ee69396c933d5e1bda5734d7dfe4a2
SHA186cb31a6eb70b74b6a3d4b381344a17f3b8f2a4e
SHA2566155e96134ef2556961b9d936c6b09517a128090776ec24ea4eab0edd186f90c
SHA512d8803b3a54114d1fdd59eb7e017b91b20cede2483cea5ea410d74073fec8bcdffd45dbd7f7e90ff5b4aa06be26b2fb5c712f24c1fd6e9bd2fc6353ba2e84f4ea
-
Filesize
192KB
MD5c96a5c7c7f47b8cdf82faadf2a04d1b8
SHA1b62eb2378f4e8051e26bd1d727f3caca041991dc
SHA2560ee90d989d1fbf15ae388ab4cc8edbaa9419339c8f7920a594d6be42fecedfe6
SHA512724ddc1e5d4c3ca256a5bfe5aaad3726142826357c7084008bc5ccb8f813eef0493fa94dd3b2427726b7b5a5cef4d8c595308b679a5d7082dea70af4c332c087
-
Filesize
192KB
MD5ecee0a86dfcadeccbbe0ac4221dbfefa
SHA1429017f7a5a84bac3c923ba327b9e1ad6d0bc93b
SHA256f09c7008e8972a3aaed6719b2092b616847cd3d0093fe6faf1e98d9d327ad307
SHA51286cd432a493e38ee35d3e644651b255b1218bc38daa1f1090c1646a3b2de4efed3af40aa4cbada7ea339e8215164c713f2f0ab382b979ac7568d1bf39ef23334
-
Filesize
192KB
MD52b98c57e8c8ddd4e01c2637279485774
SHA17c3ddb4e2c0f30e62471c6ff0d056e759d941372
SHA256759dab059d3db16f88ed96b3bef2f9386955c0fcf3fd2e17f61e2daca8879f2f
SHA5123fae3e277da6358109a5accc83bc7841ecbe55ce19bba7d1218db779b7bb640e287f2633240ea55e85b1896c0ca3c401a237a582e27074ee59842b772aca6c94
-
Filesize
192KB
MD5130c6a71420acc91bd4c7363eafe4cde
SHA11411b24e93292e6cfb6cb93a96cee213adf5c48c
SHA256c08bcc4b8405e0f9c75675776445a0e6adc04f9cbddf8eaf627ab29a2a508ad8
SHA512af52139f27fedbacdd9fe92ee88bebfee95bacb5f1f421e32ef018b062a3509d29b0705ea80084fa9c7f593bfc6aadda632ee3c45affcdf655e63129f4b8b4f8
-
Filesize
192KB
MD5530eaa2dafaa7e9fe9ca78fbe13f414b
SHA1b9099381ddc272cd795b11888d825ade693af756
SHA2568a1b341a1e148b2001195816349364e1457f00a0e27f8e24092d750e34a3599f
SHA5125b4bea2b222fbcffb58084bf1bbb4d3f4180d47f1c48ae61d9fbbac031f4173aa4f3e618009d9826c5beac6e075797d478125f7ef5568a5e431ab3883d245e5b
-
Filesize
192KB
MD56d5bac35cdbb60269eec7fed0db6a516
SHA118ee36f7849a9cbff70c9e5f3b4e861947650f42
SHA2563c113ba7375e1edff2defd13b368c3c02db98a3137bacd24672c871f151b1bb1
SHA512e6fa37f4259cf2fed041c627964b9789a6c340985f7481d33535a5c2734e2f8cf7ecbda8520ef5f74775f594c4a5cf18fe6c95b2d2d018bf4e0d13b3b2a31bd3