Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe
-
Size
180KB
-
MD5
519a9ee44e1923b099f49d5da225601d
-
SHA1
a16736e2704c5fcbae6df7ed58778d0794e597f6
-
SHA256
f9341249d04a4d712c8a6d7c248ffc28e8f2f779c41f416e8a5c9876cb4aa46a
-
SHA512
38342e8c2a166b541f23e3050412f88b4bc316c91fa98930fea02491981fa3280128425fd699244f0c558a2f196695da11ec6998da75de638358e189490d52bd
-
SSDEEP
3072:jEGh0oblfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGNl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c000000016cac-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002e000000016d2d-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000300000000b1f7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002f000000016d2d-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0030000000016d2d-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002e000000016d3b-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0013000000016d5b-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002f000000016d3b-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF5F0101-73EB-4125-983E-CC749989DAF8}\stubpath = "C:\\Windows\\{AF5F0101-73EB-4125-983E-CC749989DAF8}.exe" {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{492F62AD-21BB-48a9-B12E-9537B8123ABE} {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F99BF73-1807-462d-AA92-0F01EBA0FAA5} {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07CB0C66-9D7A-437e-AC10-BF72E354787B}\stubpath = "C:\\Windows\\{07CB0C66-9D7A-437e-AC10-BF72E354787B}.exe" {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBAC4E96-A986-4809-A621-57B6D60065B2}\stubpath = "C:\\Windows\\{FBAC4E96-A986-4809-A621-57B6D60065B2}.exe" {07CB0C66-9D7A-437e-AC10-BF72E354787B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF5FAD61-E36A-40f7-B0F2-363DE4EA1243} {512C1CC0-DAD2-40cb-8497-3788903F5631}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{512C1CC0-DAD2-40cb-8497-3788903F5631}\stubpath = "C:\\Windows\\{512C1CC0-DAD2-40cb-8497-3788903F5631}.exe" {FBAC4E96-A986-4809-A621-57B6D60065B2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8DD5DDE6-56E9-4a5c-B352-EF4832867499} 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8DD5DDE6-56E9-4a5c-B352-EF4832867499}\stubpath = "C:\\Windows\\{8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe" 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{492F62AD-21BB-48a9-B12E-9537B8123ABE}\stubpath = "C:\\Windows\\{492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe" {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0562EB9C-9337-4403-9D5F-9390AC0F78E7} {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}\stubpath = "C:\\Windows\\{5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe" {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B2F513C-51E0-4f6f-8404-BA5366AE8EE8} {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBAC4E96-A986-4809-A621-57B6D60065B2} {07CB0C66-9D7A-437e-AC10-BF72E354787B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0562EB9C-9337-4403-9D5F-9390AC0F78E7}\stubpath = "C:\\Windows\\{0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe" {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F99BF73-1807-462d-AA92-0F01EBA0FAA5}\stubpath = "C:\\Windows\\{8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe" {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{512C1CC0-DAD2-40cb-8497-3788903F5631} {FBAC4E96-A986-4809-A621-57B6D60065B2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF5FAD61-E36A-40f7-B0F2-363DE4EA1243}\stubpath = "C:\\Windows\\{AF5FAD61-E36A-40f7-B0F2-363DE4EA1243}.exe" {512C1CC0-DAD2-40cb-8497-3788903F5631}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF5F0101-73EB-4125-983E-CC749989DAF8} {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB} {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}\stubpath = "C:\\Windows\\{8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe" {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07CB0C66-9D7A-437e-AC10-BF72E354787B} {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe -
Deletes itself 1 IoCs
pid Process 1820 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3040 {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe 2972 {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe 2572 {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe 1956 {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe 1520 {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe 2896 {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe 1936 {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe 1216 {07CB0C66-9D7A-437e-AC10-BF72E354787B}.exe 2356 {FBAC4E96-A986-4809-A621-57B6D60065B2}.exe 2312 {512C1CC0-DAD2-40cb-8497-3788903F5631}.exe 2340 {AF5FAD61-E36A-40f7-B0F2-363DE4EA1243}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe File created C:\Windows\{8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe File created C:\Windows\{8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe File created C:\Windows\{07CB0C66-9D7A-437e-AC10-BF72E354787B}.exe {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe File created C:\Windows\{512C1CC0-DAD2-40cb-8497-3788903F5631}.exe {FBAC4E96-A986-4809-A621-57B6D60065B2}.exe File created C:\Windows\{8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe File created C:\Windows\{AF5F0101-73EB-4125-983E-CC749989DAF8}.exe {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe File created C:\Windows\{492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe File created C:\Windows\{0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe File created C:\Windows\{FBAC4E96-A986-4809-A621-57B6D60065B2}.exe {07CB0C66-9D7A-437e-AC10-BF72E354787B}.exe File created C:\Windows\{AF5FAD61-E36A-40f7-B0F2-363DE4EA1243}.exe {512C1CC0-DAD2-40cb-8497-3788903F5631}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2044 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe Token: SeIncBasePriorityPrivilege 3040 {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe Token: SeIncBasePriorityPrivilege 2972 {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe Token: SeIncBasePriorityPrivilege 2572 {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe Token: SeIncBasePriorityPrivilege 1956 {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe Token: SeIncBasePriorityPrivilege 1520 {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe Token: SeIncBasePriorityPrivilege 2896 {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe Token: SeIncBasePriorityPrivilege 1936 {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe Token: SeIncBasePriorityPrivilege 1216 {07CB0C66-9D7A-437e-AC10-BF72E354787B}.exe Token: SeIncBasePriorityPrivilege 2356 {FBAC4E96-A986-4809-A621-57B6D60065B2}.exe Token: SeIncBasePriorityPrivilege 2312 {512C1CC0-DAD2-40cb-8497-3788903F5631}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 3040 2044 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe 28 PID 2044 wrote to memory of 3040 2044 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe 28 PID 2044 wrote to memory of 3040 2044 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe 28 PID 2044 wrote to memory of 3040 2044 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe 28 PID 2044 wrote to memory of 1820 2044 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe 29 PID 2044 wrote to memory of 1820 2044 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe 29 PID 2044 wrote to memory of 1820 2044 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe 29 PID 2044 wrote to memory of 1820 2044 2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe 29 PID 3040 wrote to memory of 2972 3040 {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe 30 PID 3040 wrote to memory of 2972 3040 {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe 30 PID 3040 wrote to memory of 2972 3040 {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe 30 PID 3040 wrote to memory of 2972 3040 {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe 30 PID 3040 wrote to memory of 2808 3040 {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe 31 PID 3040 wrote to memory of 2808 3040 {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe 31 PID 3040 wrote to memory of 2808 3040 {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe 31 PID 3040 wrote to memory of 2808 3040 {8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe 31 PID 2972 wrote to memory of 2572 2972 {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe 34 PID 2972 wrote to memory of 2572 2972 {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe 34 PID 2972 wrote to memory of 2572 2972 {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe 34 PID 2972 wrote to memory of 2572 2972 {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe 34 PID 2972 wrote to memory of 3044 2972 {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe 35 PID 2972 wrote to memory of 3044 2972 {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe 35 PID 2972 wrote to memory of 3044 2972 {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe 35 PID 2972 wrote to memory of 3044 2972 {AF5F0101-73EB-4125-983E-CC749989DAF8}.exe 35 PID 2572 wrote to memory of 1956 2572 {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe 36 PID 2572 wrote to memory of 1956 2572 {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe 36 PID 2572 wrote to memory of 1956 2572 {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe 36 PID 2572 wrote to memory of 1956 2572 {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe 36 PID 2572 wrote to memory of 672 2572 {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe 37 PID 2572 wrote to memory of 672 2572 {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe 37 PID 2572 wrote to memory of 672 2572 {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe 37 PID 2572 wrote to memory of 672 2572 {492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe 37 PID 1956 wrote to memory of 1520 1956 {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe 38 PID 1956 wrote to memory of 1520 1956 {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe 38 PID 1956 wrote to memory of 1520 1956 {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe 38 PID 1956 wrote to memory of 1520 1956 {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe 38 PID 1956 wrote to memory of 1652 1956 {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe 39 PID 1956 wrote to memory of 1652 1956 {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe 39 PID 1956 wrote to memory of 1652 1956 {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe 39 PID 1956 wrote to memory of 1652 1956 {0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe 39 PID 1520 wrote to memory of 2896 1520 {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe 40 PID 1520 wrote to memory of 2896 1520 {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe 40 PID 1520 wrote to memory of 2896 1520 {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe 40 PID 1520 wrote to memory of 2896 1520 {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe 40 PID 1520 wrote to memory of 2932 1520 {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe 41 PID 1520 wrote to memory of 2932 1520 {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe 41 PID 1520 wrote to memory of 2932 1520 {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe 41 PID 1520 wrote to memory of 2932 1520 {5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe 41 PID 2896 wrote to memory of 1936 2896 {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe 42 PID 2896 wrote to memory of 1936 2896 {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe 42 PID 2896 wrote to memory of 1936 2896 {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe 42 PID 2896 wrote to memory of 1936 2896 {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe 42 PID 2896 wrote to memory of 1192 2896 {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe 43 PID 2896 wrote to memory of 1192 2896 {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe 43 PID 2896 wrote to memory of 1192 2896 {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe 43 PID 2896 wrote to memory of 1192 2896 {8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe 43 PID 1936 wrote to memory of 1216 1936 {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe 44 PID 1936 wrote to memory of 1216 1936 {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe 44 PID 1936 wrote to memory of 1216 1936 {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe 44 PID 1936 wrote to memory of 1216 1936 {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe 44 PID 1936 wrote to memory of 1800 1936 {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe 45 PID 1936 wrote to memory of 1800 1936 {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe 45 PID 1936 wrote to memory of 1800 1936 {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe 45 PID 1936 wrote to memory of 1800 1936 {8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_519a9ee44e1923b099f49d5da225601d_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\{8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exeC:\Windows\{8DD5DDE6-56E9-4a5c-B352-EF4832867499}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\{AF5F0101-73EB-4125-983E-CC749989DAF8}.exeC:\Windows\{AF5F0101-73EB-4125-983E-CC749989DAF8}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{492F62AD-21BB-48a9-B12E-9537B8123ABE}.exeC:\Windows\{492F62AD-21BB-48a9-B12E-9537B8123ABE}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\{0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exeC:\Windows\{0562EB9C-9337-4403-9D5F-9390AC0F78E7}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\{5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exeC:\Windows\{5D5C6CD6-E8DA-40b0-8DFA-0DB651BFE3EB}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\{8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exeC:\Windows\{8F99BF73-1807-462d-AA92-0F01EBA0FAA5}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\{8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exeC:\Windows\{8B2F513C-51E0-4f6f-8404-BA5366AE8EE8}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\{07CB0C66-9D7A-437e-AC10-BF72E354787B}.exeC:\Windows\{07CB0C66-9D7A-437e-AC10-BF72E354787B}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Windows\{FBAC4E96-A986-4809-A621-57B6D60065B2}.exeC:\Windows\{FBAC4E96-A986-4809-A621-57B6D60065B2}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Windows\{512C1CC0-DAD2-40cb-8497-3788903F5631}.exeC:\Windows\{512C1CC0-DAD2-40cb-8497-3788903F5631}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2312 -
C:\Windows\{AF5FAD61-E36A-40f7-B0F2-363DE4EA1243}.exeC:\Windows\{AF5FAD61-E36A-40f7-B0F2-363DE4EA1243}.exe12⤵
- Executes dropped EXE
PID:2340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{512C1~1.EXE > nul12⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FBAC4~1.EXE > nul11⤵PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{07CB0~1.EXE > nul10⤵PID:2564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B2F5~1.EXE > nul9⤵PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F99B~1.EXE > nul8⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D5C6~1.EXE > nul7⤵PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0562E~1.EXE > nul6⤵PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{492F6~1.EXE > nul5⤵PID:672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AF5F0~1.EXE > nul4⤵PID:3044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8DD5D~1.EXE > nul3⤵PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD50750270020822847caa7c26a9fb05391
SHA1b972e1d0729c72d731eb4b48e4f3e196633b97b6
SHA2560cf1c2d96d56b9c258b7d25b0eadb033f5c115cc9777db1b127f5fe7a7a3b7bc
SHA5128602c34a77ff4f4d6dbd805cf00522882fe49a8f2e3a8ba8fe7d741ba8d04f197e712c305f3658dfa372b851889c40aa72293189252e4986d45d32fc60c4a895
-
Filesize
180KB
MD5f8b82d86f4f4861f2c807f4a8d057c6e
SHA1e99a8f127921453224ef23370721a1e272150c7a
SHA256e0c2732f885dc9127b772c72b1b4b36253d5580942d6d044644bf49a5585b933
SHA5121628870a319fce461d6d780f9fbb71572711077222f07cf0bf0d8dd58613da771d1007dd37a028ea8aedd123daa82742a98c3aed2769c27df0a1bdcc935543a3
-
Filesize
180KB
MD5e7bc3f0d1e73a8246887151aaa02f890
SHA1555db1dd0da7844401e47c77c558c6f847dd1fe6
SHA2569da6aae500aa1707a72a7701e676b712000c4985b3e9ccf99d967416498da525
SHA512276a66912a8a3c9eb62257b61af0041fd5a91f159ae14a4cc19576fb4a0712280a6fe1dc22388b1314ae0aba80716745b8a51a12667b2685088d6a5a1f0e33ae
-
Filesize
180KB
MD55c8268cf340d1d8f0215a2e689c67326
SHA1bf90a3a8e61354ebaf0a0684e19c34b46ddae2f9
SHA256bc12c1b9ea6b61e5fff2559da444a482cc4bf362871bb404abecebddd6a14714
SHA512970bb06df8bc7fa3c9983c4d4d615643508fcf54c1f71576c6aef1617079ef0789f0b7356a4418e8392b33f03bba0d03a53b6e047c8a063c138e80f2836ca1cb
-
Filesize
180KB
MD50be126ca322fbf9046ba1b65562f2313
SHA19a7b46674a54723bfc1fc7a7f8ed18a8c04a8097
SHA2563e218bc5b48e91e3853f112ec35ac8500e0850f97b2aa07753efdd970babfeb2
SHA5128ec3efa4732cedc115ae8578305ed8b4b08562d8e562ab623b28c5ec225e6a9ad25da4c53f924fdd10da19247a0e11d0298e89a561b9c28dd60c8d82548b6673
-
Filesize
180KB
MD51384772100e4a8547c436fa3af83bf61
SHA12f9966b0db0c36f38040260078f7823a0896c64a
SHA25649ccfed31ab5bee91b8cb2ce3b54d85d075b6f8f4d54c7122a68e54beaf35706
SHA512cc27c99b85148614cb35cc59113e07629272b1bff525eeed5afb75d5eac3e0b97a1bdee740549bbfdd19d66562f1718188bcdcb55bb0f9b8ac9cb63316bfb10d
-
Filesize
180KB
MD5280c9a3292f87aeb82922428a7a4f9e3
SHA1e5dd49e6feb161adac045795815b64005a8d2243
SHA2565673f3b7f1e192a16f3198977bde3b80122ae6ef2d43082f7dd482bd099faa65
SHA51215dcfb7d2594d394d035d7e25b62e6f8abe82a1d2989cb031024954919a582c1f7fecbac844ecfe623b3257b4f67fe896aa5e55f7478ddb9e02213497a57c089
-
Filesize
180KB
MD5a237f1137f558340095b475e611f71d8
SHA1e3a2e1370811c1197cd019675707e3579280f070
SHA256fc275366264326367abdcca12351fae5ddb86bc2da4a944507ab15e86481be78
SHA51295bfbd78c9c58817b973f0f8e78d7ed7127a0f2b01a44f4e35e54923693c61df59a48f1d2b3ba1a67f279030c498503fe30085e31c1ed531d371736d04ed9947
-
Filesize
180KB
MD5099293bbff9f8931b6a2193cba74dec2
SHA15c4a94f6ad6220ab43711b810cd06b9e560ffcb0
SHA2567e64b6e2172f575683b7f7d7df71dd2ed8583a3e1ce891c90a42e9d60787c98c
SHA512ee0cd78cba589f228f3d5ca082f78aaa1b2275f22d027892e97460b1bd779ff399d7a2c699190b22a48af0bacf2f78a9edc5e266a394d6152b521c2a412b59ae
-
Filesize
180KB
MD5d6a336e3134c17074e661ce52573112f
SHA1d51da3d890e5edd141eebfe697bfc892d03b4fc6
SHA2566f43dd60e0c136f3e5f0ede5ed4b889dc189bfdf09338b63d0ec7bc129b28bb4
SHA512cb6778e94851578e7084958374bad7db56a2521d7196eccf4394b0a925ac11ca6345d1bc388b00b54fd5cfae391cdfaf6abf5703c301515561f44e63ea6044d5
-
Filesize
180KB
MD585896ee7a2589a0eed1c8040557c9839
SHA11ea824d8556714e759de023045fdf9131a4277f7
SHA256306a2553a07e86f9e6602b15a4ce55b067f6d3887aa4840e407d36e1a46cb44f
SHA512cc05059df68525dd7ba9bd2511d68ce4abc4d184dc844ccc6249fedc7225504b51f07499f782a2869d4960085a224e7f5fba1d9d58a68520ca7131d51fb9c76a