Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe
-
Size
180KB
-
MD5
6612c298ea03000ddd9b76bd76d59a51
-
SHA1
4eaa60fb827d8aa8e79209f4f88a081a401159b6
-
SHA256
ee237518406caf40cb079484f4c0d13a58b76f9c20d319187ffc9e20746e2295
-
SHA512
8f46fcb817ae95f876820a878503275fcdd5c7a5237060e64d9233426d1170dc44ab5b4b8564ba3cc7446d90c9f6f0d6f1f4b51cd3da948a495cad4fb933cee8
-
SSDEEP
3072:jEGh0oYlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGul5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000d0000000122e8-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0027000000015c6f-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000f6f8-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0028000000015c6f-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0014000000015c83-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0029000000015c6f-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0015000000015c83-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000015c9f-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0016000000015c83-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000015c9f-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0017000000015c83-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{345D991F-FBC6-4e66-A398-59D0D2BAD7B0}\stubpath = "C:\\Windows\\{345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe" {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5} {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDBF9D9E-C5D6-49b3-B716-DD7CF309641A}\stubpath = "C:\\Windows\\{BDBF9D9E-C5D6-49b3-B716-DD7CF309641A}.exe" {FF488128-6F6C-4903-88E7-797C383EFA75}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7C5C1E81-3953-4889-88CE-C311999753A8} 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}\stubpath = "C:\\Windows\\{CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe" {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{949965E1-35E7-4a40-ACE8-39D26E89102E} {D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF488128-6F6C-4903-88E7-797C383EFA75}\stubpath = "C:\\Windows\\{FF488128-6F6C-4903-88E7-797C383EFA75}.exe" {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E}\stubpath = "C:\\Windows\\{D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E}.exe" {BDBF9D9E-C5D6-49b3-B716-DD7CF309641A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C} {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}\stubpath = "C:\\Windows\\{2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe" {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{345D991F-FBC6-4e66-A398-59D0D2BAD7B0} {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{612977E4-C8FD-4c51-879E-30CA46FFCE6B} {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{612977E4-C8FD-4c51-879E-30CA46FFCE6B}\stubpath = "C:\\Windows\\{612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe" {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}\stubpath = "C:\\Windows\\{0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe" {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7C5C1E81-3953-4889-88CE-C311999753A8}\stubpath = "C:\\Windows\\{7C5C1E81-3953-4889-88CE-C311999753A8}.exe" 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{929DBD22-6E25-47cb-8EEF-30F1AA2B5575} {7C5C1E81-3953-4889-88CE-C311999753A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDBF9D9E-C5D6-49b3-B716-DD7CF309641A} {FF488128-6F6C-4903-88E7-797C383EFA75}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF488128-6F6C-4903-88E7-797C383EFA75} {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E} {BDBF9D9E-C5D6-49b3-B716-DD7CF309641A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{949965E1-35E7-4a40-ACE8-39D26E89102E}\stubpath = "C:\\Windows\\{949965E1-35E7-4a40-ACE8-39D26E89102E}.exe" {D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{929DBD22-6E25-47cb-8EEF-30F1AA2B5575}\stubpath = "C:\\Windows\\{929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe" {7C5C1E81-3953-4889-88CE-C311999753A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636} {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe -
Deletes itself 1 IoCs
pid Process 2708 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3068 {7C5C1E81-3953-4889-88CE-C311999753A8}.exe 2736 {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe 2684 {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe 576 {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe 1652 {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe 2884 {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe 1052 {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe 1988 {FF488128-6F6C-4903-88E7-797C383EFA75}.exe 1644 {BDBF9D9E-C5D6-49b3-B716-DD7CF309641A}.exe 596 {D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E}.exe 676 {949965E1-35E7-4a40-ACE8-39D26E89102E}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe File created C:\Windows\{345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe File created C:\Windows\{612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe File created C:\Windows\{FF488128-6F6C-4903-88E7-797C383EFA75}.exe {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe File created C:\Windows\{949965E1-35E7-4a40-ACE8-39D26E89102E}.exe {D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E}.exe File created C:\Windows\{7C5C1E81-3953-4889-88CE-C311999753A8}.exe 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe File created C:\Windows\{929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe {7C5C1E81-3953-4889-88CE-C311999753A8}.exe File created C:\Windows\{BDBF9D9E-C5D6-49b3-B716-DD7CF309641A}.exe {FF488128-6F6C-4903-88E7-797C383EFA75}.exe File created C:\Windows\{D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E}.exe {BDBF9D9E-C5D6-49b3-B716-DD7CF309641A}.exe File created C:\Windows\{CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe File created C:\Windows\{0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2276 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe Token: SeIncBasePriorityPrivilege 3068 {7C5C1E81-3953-4889-88CE-C311999753A8}.exe Token: SeIncBasePriorityPrivilege 2736 {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe Token: SeIncBasePriorityPrivilege 2684 {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe Token: SeIncBasePriorityPrivilege 576 {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe Token: SeIncBasePriorityPrivilege 1652 {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe Token: SeIncBasePriorityPrivilege 2884 {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe Token: SeIncBasePriorityPrivilege 1052 {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe Token: SeIncBasePriorityPrivilege 1988 {FF488128-6F6C-4903-88E7-797C383EFA75}.exe Token: SeIncBasePriorityPrivilege 1644 {BDBF9D9E-C5D6-49b3-B716-DD7CF309641A}.exe Token: SeIncBasePriorityPrivilege 596 {D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3068 2276 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe 28 PID 2276 wrote to memory of 3068 2276 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe 28 PID 2276 wrote to memory of 3068 2276 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe 28 PID 2276 wrote to memory of 3068 2276 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe 28 PID 2276 wrote to memory of 2708 2276 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe 29 PID 2276 wrote to memory of 2708 2276 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe 29 PID 2276 wrote to memory of 2708 2276 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe 29 PID 2276 wrote to memory of 2708 2276 2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe 29 PID 3068 wrote to memory of 2736 3068 {7C5C1E81-3953-4889-88CE-C311999753A8}.exe 32 PID 3068 wrote to memory of 2736 3068 {7C5C1E81-3953-4889-88CE-C311999753A8}.exe 32 PID 3068 wrote to memory of 2736 3068 {7C5C1E81-3953-4889-88CE-C311999753A8}.exe 32 PID 3068 wrote to memory of 2736 3068 {7C5C1E81-3953-4889-88CE-C311999753A8}.exe 32 PID 3068 wrote to memory of 2700 3068 {7C5C1E81-3953-4889-88CE-C311999753A8}.exe 33 PID 3068 wrote to memory of 2700 3068 {7C5C1E81-3953-4889-88CE-C311999753A8}.exe 33 PID 3068 wrote to memory of 2700 3068 {7C5C1E81-3953-4889-88CE-C311999753A8}.exe 33 PID 3068 wrote to memory of 2700 3068 {7C5C1E81-3953-4889-88CE-C311999753A8}.exe 33 PID 2736 wrote to memory of 2684 2736 {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe 34 PID 2736 wrote to memory of 2684 2736 {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe 34 PID 2736 wrote to memory of 2684 2736 {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe 34 PID 2736 wrote to memory of 2684 2736 {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe 34 PID 2736 wrote to memory of 2980 2736 {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe 35 PID 2736 wrote to memory of 2980 2736 {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe 35 PID 2736 wrote to memory of 2980 2736 {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe 35 PID 2736 wrote to memory of 2980 2736 {929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe 35 PID 2684 wrote to memory of 576 2684 {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe 36 PID 2684 wrote to memory of 576 2684 {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe 36 PID 2684 wrote to memory of 576 2684 {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe 36 PID 2684 wrote to memory of 576 2684 {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe 36 PID 2684 wrote to memory of 1628 2684 {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe 37 PID 2684 wrote to memory of 1628 2684 {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe 37 PID 2684 wrote to memory of 1628 2684 {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe 37 PID 2684 wrote to memory of 1628 2684 {CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe 37 PID 576 wrote to memory of 1652 576 {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe 38 PID 576 wrote to memory of 1652 576 {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe 38 PID 576 wrote to memory of 1652 576 {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe 38 PID 576 wrote to memory of 1652 576 {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe 38 PID 576 wrote to memory of 1828 576 {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe 39 PID 576 wrote to memory of 1828 576 {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe 39 PID 576 wrote to memory of 1828 576 {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe 39 PID 576 wrote to memory of 1828 576 {2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe 39 PID 1652 wrote to memory of 2884 1652 {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe 40 PID 1652 wrote to memory of 2884 1652 {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe 40 PID 1652 wrote to memory of 2884 1652 {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe 40 PID 1652 wrote to memory of 2884 1652 {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe 40 PID 1652 wrote to memory of 2188 1652 {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe 41 PID 1652 wrote to memory of 2188 1652 {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe 41 PID 1652 wrote to memory of 2188 1652 {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe 41 PID 1652 wrote to memory of 2188 1652 {345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe 41 PID 2884 wrote to memory of 1052 2884 {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe 42 PID 2884 wrote to memory of 1052 2884 {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe 42 PID 2884 wrote to memory of 1052 2884 {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe 42 PID 2884 wrote to memory of 1052 2884 {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe 42 PID 2884 wrote to memory of 2484 2884 {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe 43 PID 2884 wrote to memory of 2484 2884 {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe 43 PID 2884 wrote to memory of 2484 2884 {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe 43 PID 2884 wrote to memory of 2484 2884 {612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe 43 PID 1052 wrote to memory of 1988 1052 {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe 44 PID 1052 wrote to memory of 1988 1052 {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe 44 PID 1052 wrote to memory of 1988 1052 {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe 44 PID 1052 wrote to memory of 1988 1052 {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe 44 PID 1052 wrote to memory of 1892 1052 {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe 45 PID 1052 wrote to memory of 1892 1052 {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe 45 PID 1052 wrote to memory of 1892 1052 {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe 45 PID 1052 wrote to memory of 1892 1052 {0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_6612c298ea03000ddd9b76bd76d59a51_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\{7C5C1E81-3953-4889-88CE-C311999753A8}.exeC:\Windows\{7C5C1E81-3953-4889-88CE-C311999753A8}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\{929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exeC:\Windows\{929DBD22-6E25-47cb-8EEF-30F1AA2B5575}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exeC:\Windows\{CB8A569A-C7C7-4d9a-A73E-D1B7AAA36636}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\{2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exeC:\Windows\{2C60B285-FD32-42eb-B5DB-F3D5E6CA6B7C}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\{345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exeC:\Windows\{345D991F-FBC6-4e66-A398-59D0D2BAD7B0}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\{612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exeC:\Windows\{612977E4-C8FD-4c51-879E-30CA46FFCE6B}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\{0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exeC:\Windows\{0BA1B8E3-5B2D-4b93-9C14-CBC8457425F5}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\{FF488128-6F6C-4903-88E7-797C383EFA75}.exeC:\Windows\{FF488128-6F6C-4903-88E7-797C383EFA75}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Windows\{BDBF9D9E-C5D6-49b3-B716-DD7CF309641A}.exeC:\Windows\{BDBF9D9E-C5D6-49b3-B716-DD7CF309641A}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Windows\{D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E}.exeC:\Windows\{D2DA6A2D-4CD7-4961-B2B4-9F3925C03E2E}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:596 -
C:\Windows\{949965E1-35E7-4a40-ACE8-39D26E89102E}.exeC:\Windows\{949965E1-35E7-4a40-ACE8-39D26E89102E}.exe12⤵
- Executes dropped EXE
PID:676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2DA6~1.EXE > nul12⤵PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BDBF9~1.EXE > nul11⤵PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FF488~1.EXE > nul10⤵PID:1824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0BA1B~1.EXE > nul9⤵PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{61297~1.EXE > nul8⤵PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{345D9~1.EXE > nul7⤵PID:2188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2C60B~1.EXE > nul6⤵PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB8A5~1.EXE > nul5⤵PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{929DB~1.EXE > nul4⤵PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C5C1~1.EXE > nul3⤵PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD54d4653c862466a99bf608f2dd4b5d38b
SHA1a687c27b366436456114175bab7adc17cf73e373
SHA25629af294af50d23133fb576b5c4f29a57805146919890f1cbc44186efb9c6cab0
SHA512ff330481bc21722aae1a0c40c0deb0a748e49eec84f22365bef36d7221576bfc3eb295629e953da9a00a959fe17e0bc764cab3a72b4180f60804cd69df03c1ee
-
Filesize
180KB
MD5ea134e2bf352ff7303373b693074d020
SHA1315b09655448f5768a96cefc89d32cc749104ecd
SHA256a6cf0ae668fd0f3c82ede2c9c0f09a9b68d2c1e95db72bdc00a6120b7c38dc8e
SHA512e627646936af4bb0d3d6d2d6b489f52f11613a2fca9d2f7d34bad2cf1150be87c96af0cc2ccab717ac1264b9a7a8a8a1c9359d98648df150ef48d3066eb66b5b
-
Filesize
180KB
MD5b33bff92e4e93f3c8905559c194266bb
SHA1683bde5d5fa051038382cc2d3a76196c52287173
SHA25640ee3e4dda2f267bd6e48185155d934223d4ccf3ff9bace3d3937e074abcf5bf
SHA512f05a6c6d21a19eb2712a32a7658a7e33ab0b9833bf4246b93cf21792b6b7ae6b7c480069db6fedbbbf58c3e6808cb92a4fffd9de5fef526532861fddf3be3cee
-
Filesize
180KB
MD5ec4b672c5250d6c5d9ac2e5cd30ab573
SHA195cfbbf359edfdeb829759427bda5b28981f46ba
SHA2568a797c03dde16f48f9604573eb84b0614d4f24d81ae6c73a0a7add43b1fe7919
SHA512f55e69197bbb831f140b5dc1625aff78994af9360b4c616a1a7b8b5cb3a81cb9ac2c5d16162c46832161d629e3c94dd4538d108ea0f6c3cd3f15e81ffed30b11
-
Filesize
180KB
MD5fb78e48e0d204c3f5a4b02a221081a16
SHA191bccb84c6698d9d3d96e559dacfb91d5540260f
SHA25607a292327bea882ca16dd927c40cf19c8299b9a0d786804359c6511e0a09e568
SHA5124054f3be39c58b88eb5da29c61d0aebd785527d0703921d290fed665f363bb45c4fb15ee0eea132498b7b5afb270135dcea69b8acf9840b75ee82662ec395c7a
-
Filesize
180KB
MD5e9efddd4727d1b2e24964ed95f4d44fd
SHA111e572d4dcd379c882451212be23ee1598a3f67b
SHA256e9a2ab7966047bcae160410fdd1aac7299a8034520c26ad6703ce3afbc6f7e88
SHA512f1906a3c60ed1c83542875e0e71f4cfc6acc43db3de82496e3f6560fe74fe8e50c675d5db6d041ee60017dea61fd24eea4d9ef7eabd005d81c103ad0da3b8af2
-
Filesize
180KB
MD5030056bc07921fa50c1fb72666b18bef
SHA1740e7ab6373771aa521c0199e99412687c39581f
SHA256edf06aa47e2703971eff9aae8167b91b086cafac4c5f827e8b2ffb1f0b82a5af
SHA5123f6b549a1fb0417f35385398b88a9f01a2bdd3b061257df1bd4823453fad0650b89b4c12d151e69427a5c6f0c34a2712a857d8568af458cda0652bd26f035bb0
-
Filesize
180KB
MD5aa1d05f1166265b7d104fe46962eeb72
SHA11af42298159b9180bf85a28ef65a8ce9e6a10c82
SHA256ca1a73a4c052053d790e9bf580637ec2ac58bad926f6bd815328abcbddf77f1c
SHA512eaa4141665f233db681b35e6119b4d83ada3eca5bf557e22010196dd23e003751c9a4d946bad99d0da204b57f42d517e531099d8b7a3ff28bd3b485cc8126746
-
Filesize
180KB
MD588dbc81326050a8d59439865772ba5d7
SHA1e4a67febabd6302c46833872d05b385e5efd4b6d
SHA25680954f6d2f516a1fa0dde0bce12846fe933b40064597759ad9a22764c1af7ea2
SHA512155b3b716c274e5be3888b793240009ef165c24352477be7ebb9ddd621a05582da927d8eae9d607ec135df76ffbe1969f16b3f0573b3286f7124e50313bc2c5b
-
Filesize
180KB
MD53a0bd52c8a6e9f4a6ac5327e268f56b8
SHA18108b9fec977e8be3124bca51bc6d14c10c9fad8
SHA256f0cd239b900002130623cdad4199ff9d2ad4c1aa003bb85f46e78131364960b0
SHA512911d3c80b42d132dc3de2b975f169655845c76299b4c3eb7c7800e0cee290b8e8b76425cf6ca3dc79a9a3ab9bc2a9a9212d557717b9f7953a464f96432ac0853
-
Filesize
180KB
MD5a52ec6461d3e9b41dd33e16cb6afa0d0
SHA126663b868c54d3ec61f8d219433c3b17038b2f9e
SHA256901bb08904667acf1d77d818b3ff17a34facc0c145babef9cbdac5152d65abf4
SHA512d7dfe3308c475a424080a8f76d02e5029cf92804c4d5843bbf3c499d05065e88861fcfa3ec55747a35854d561b6649e52a65f7b7262b7c51e4414f5af07e664f