Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe
-
Size
180KB
-
MD5
ac1116f298dfcdc033f2ecafd0f6a5e2
-
SHA1
10353a1796232f543a359dcc606379d3ad46b702
-
SHA256
25dc3bb4893ab9b796c473694ab4ffc1df973134f33c8725452b20b44693306d
-
SHA512
a0069b570cc21492ffeb4ca27c9f93496bebfb9de8a5fea2c57db6ce7db380337ebde7226f63ba610a7a0d3bd5e9d851385531c3d573288695fffe12f5fed0b1
-
SSDEEP
3072:jEGh0oulfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGsl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0006000000023254-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002324f-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002325b-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002324f-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000022008-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000022009-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000022008-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070b-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070d-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070b-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070d-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000717-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0ECF343D-1A13-4c20-8AC7-BD601500C618} {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{861F3F82-A843-4e9f-A7C0-3D96F2EE854D}\stubpath = "C:\\Windows\\{861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe" {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8829530C-3FD1-49f6-B603-E99AF0E4B341}\stubpath = "C:\\Windows\\{8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe" {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2232F893-EE8F-4d0d-96F1-7FEA47DF7FA8}\stubpath = "C:\\Windows\\{2232F893-EE8F-4d0d-96F1-7FEA47DF7FA8}.exe" {20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C72D44A3-7A22-4054-8263-EC09A056EA43} 2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2E466A40-2FA9-4373-9C52-AED992E19547} {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2E466A40-2FA9-4373-9C52-AED992E19547}\stubpath = "C:\\Windows\\{2E466A40-2FA9-4373-9C52-AED992E19547}.exe" {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3DA434B-2FF6-41b6-8161-13644146549B}\stubpath = "C:\\Windows\\{D3DA434B-2FF6-41b6-8161-13644146549B}.exe" {82CCB330-A29E-4084-87AA-98895252BE99}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{569232D9-7E2B-4b9b-852B-E5FAC2184E95} {D3DA434B-2FF6-41b6-8161-13644146549B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0ECF343D-1A13-4c20-8AC7-BD601500C618}\stubpath = "C:\\Windows\\{0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe" {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C901F979-270D-4ad6-953F-DF85E71F13CC} {476C8AE1-00AB-42aa-B755-379040502610}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C901F979-270D-4ad6-953F-DF85E71F13CC}\stubpath = "C:\\Windows\\{C901F979-270D-4ad6-953F-DF85E71F13CC}.exe" {476C8AE1-00AB-42aa-B755-379040502610}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C72D44A3-7A22-4054-8263-EC09A056EA43}\stubpath = "C:\\Windows\\{C72D44A3-7A22-4054-8263-EC09A056EA43}.exe" 2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{82CCB330-A29E-4084-87AA-98895252BE99} {2E466A40-2FA9-4373-9C52-AED992E19547}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{82CCB330-A29E-4084-87AA-98895252BE99}\stubpath = "C:\\Windows\\{82CCB330-A29E-4084-87AA-98895252BE99}.exe" {2E466A40-2FA9-4373-9C52-AED992E19547}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3DA434B-2FF6-41b6-8161-13644146549B} {82CCB330-A29E-4084-87AA-98895252BE99}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{476C8AE1-00AB-42aa-B755-379040502610}\stubpath = "C:\\Windows\\{476C8AE1-00AB-42aa-B755-379040502610}.exe" {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2232F893-EE8F-4d0d-96F1-7FEA47DF7FA8} {20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{569232D9-7E2B-4b9b-852B-E5FAC2184E95}\stubpath = "C:\\Windows\\{569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe" {D3DA434B-2FF6-41b6-8161-13644146549B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{861F3F82-A843-4e9f-A7C0-3D96F2EE854D} {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8829530C-3FD1-49f6-B603-E99AF0E4B341} {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{476C8AE1-00AB-42aa-B755-379040502610} {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{20FB408F-BAAB-4358-92ED-5FDC2840C65A} {C901F979-270D-4ad6-953F-DF85E71F13CC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{20FB408F-BAAB-4358-92ED-5FDC2840C65A}\stubpath = "C:\\Windows\\{20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe" {C901F979-270D-4ad6-953F-DF85E71F13CC}.exe -
Executes dropped EXE 12 IoCs
pid Process 920 {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe 2004 {2E466A40-2FA9-4373-9C52-AED992E19547}.exe 1152 {82CCB330-A29E-4084-87AA-98895252BE99}.exe 3308 {D3DA434B-2FF6-41b6-8161-13644146549B}.exe 1732 {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe 3476 {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe 3592 {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe 1428 {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe 3512 {476C8AE1-00AB-42aa-B755-379040502610}.exe 4628 {C901F979-270D-4ad6-953F-DF85E71F13CC}.exe 1272 {20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe 224 {2232F893-EE8F-4d0d-96F1-7FEA47DF7FA8}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe {D3DA434B-2FF6-41b6-8161-13644146549B}.exe File created C:\Windows\{8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe File created C:\Windows\{476C8AE1-00AB-42aa-B755-379040502610}.exe {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe File created C:\Windows\{D3DA434B-2FF6-41b6-8161-13644146549B}.exe {82CCB330-A29E-4084-87AA-98895252BE99}.exe File created C:\Windows\{2E466A40-2FA9-4373-9C52-AED992E19547}.exe {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe File created C:\Windows\{82CCB330-A29E-4084-87AA-98895252BE99}.exe {2E466A40-2FA9-4373-9C52-AED992E19547}.exe File created C:\Windows\{0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe File created C:\Windows\{861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe File created C:\Windows\{C901F979-270D-4ad6-953F-DF85E71F13CC}.exe {476C8AE1-00AB-42aa-B755-379040502610}.exe File created C:\Windows\{20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe {C901F979-270D-4ad6-953F-DF85E71F13CC}.exe File created C:\Windows\{2232F893-EE8F-4d0d-96F1-7FEA47DF7FA8}.exe {20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe File created C:\Windows\{C72D44A3-7A22-4054-8263-EC09A056EA43}.exe 2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5072 2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe Token: SeIncBasePriorityPrivilege 920 {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe Token: SeIncBasePriorityPrivilege 2004 {2E466A40-2FA9-4373-9C52-AED992E19547}.exe Token: SeIncBasePriorityPrivilege 1152 {82CCB330-A29E-4084-87AA-98895252BE99}.exe Token: SeIncBasePriorityPrivilege 3308 {D3DA434B-2FF6-41b6-8161-13644146549B}.exe Token: SeIncBasePriorityPrivilege 1732 {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe Token: SeIncBasePriorityPrivilege 3476 {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe Token: SeIncBasePriorityPrivilege 3592 {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe Token: SeIncBasePriorityPrivilege 1428 {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe Token: SeIncBasePriorityPrivilege 3512 {476C8AE1-00AB-42aa-B755-379040502610}.exe Token: SeIncBasePriorityPrivilege 4628 {C901F979-270D-4ad6-953F-DF85E71F13CC}.exe Token: SeIncBasePriorityPrivilege 1272 {20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 920 5072 2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe 97 PID 5072 wrote to memory of 920 5072 2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe 97 PID 5072 wrote to memory of 920 5072 2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe 97 PID 5072 wrote to memory of 4408 5072 2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe 98 PID 5072 wrote to memory of 4408 5072 2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe 98 PID 5072 wrote to memory of 4408 5072 2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe 98 PID 920 wrote to memory of 2004 920 {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe 99 PID 920 wrote to memory of 2004 920 {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe 99 PID 920 wrote to memory of 2004 920 {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe 99 PID 920 wrote to memory of 380 920 {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe 100 PID 920 wrote to memory of 380 920 {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe 100 PID 920 wrote to memory of 380 920 {C72D44A3-7A22-4054-8263-EC09A056EA43}.exe 100 PID 2004 wrote to memory of 1152 2004 {2E466A40-2FA9-4373-9C52-AED992E19547}.exe 103 PID 2004 wrote to memory of 1152 2004 {2E466A40-2FA9-4373-9C52-AED992E19547}.exe 103 PID 2004 wrote to memory of 1152 2004 {2E466A40-2FA9-4373-9C52-AED992E19547}.exe 103 PID 2004 wrote to memory of 1296 2004 {2E466A40-2FA9-4373-9C52-AED992E19547}.exe 102 PID 2004 wrote to memory of 1296 2004 {2E466A40-2FA9-4373-9C52-AED992E19547}.exe 102 PID 2004 wrote to memory of 1296 2004 {2E466A40-2FA9-4373-9C52-AED992E19547}.exe 102 PID 1152 wrote to memory of 3308 1152 {82CCB330-A29E-4084-87AA-98895252BE99}.exe 104 PID 1152 wrote to memory of 3308 1152 {82CCB330-A29E-4084-87AA-98895252BE99}.exe 104 PID 1152 wrote to memory of 3308 1152 {82CCB330-A29E-4084-87AA-98895252BE99}.exe 104 PID 1152 wrote to memory of 2908 1152 {82CCB330-A29E-4084-87AA-98895252BE99}.exe 105 PID 1152 wrote to memory of 2908 1152 {82CCB330-A29E-4084-87AA-98895252BE99}.exe 105 PID 1152 wrote to memory of 2908 1152 {82CCB330-A29E-4084-87AA-98895252BE99}.exe 105 PID 3308 wrote to memory of 1732 3308 {D3DA434B-2FF6-41b6-8161-13644146549B}.exe 106 PID 3308 wrote to memory of 1732 3308 {D3DA434B-2FF6-41b6-8161-13644146549B}.exe 106 PID 3308 wrote to memory of 1732 3308 {D3DA434B-2FF6-41b6-8161-13644146549B}.exe 106 PID 3308 wrote to memory of 4940 3308 {D3DA434B-2FF6-41b6-8161-13644146549B}.exe 107 PID 3308 wrote to memory of 4940 3308 {D3DA434B-2FF6-41b6-8161-13644146549B}.exe 107 PID 3308 wrote to memory of 4940 3308 {D3DA434B-2FF6-41b6-8161-13644146549B}.exe 107 PID 1732 wrote to memory of 3476 1732 {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe 108 PID 1732 wrote to memory of 3476 1732 {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe 108 PID 1732 wrote to memory of 3476 1732 {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe 108 PID 1732 wrote to memory of 2444 1732 {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe 109 PID 1732 wrote to memory of 2444 1732 {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe 109 PID 1732 wrote to memory of 2444 1732 {569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe 109 PID 3476 wrote to memory of 3592 3476 {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe 110 PID 3476 wrote to memory of 3592 3476 {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe 110 PID 3476 wrote to memory of 3592 3476 {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe 110 PID 3476 wrote to memory of 3764 3476 {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe 111 PID 3476 wrote to memory of 3764 3476 {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe 111 PID 3476 wrote to memory of 3764 3476 {0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe 111 PID 3592 wrote to memory of 1428 3592 {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe 112 PID 3592 wrote to memory of 1428 3592 {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe 112 PID 3592 wrote to memory of 1428 3592 {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe 112 PID 3592 wrote to memory of 4400 3592 {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe 113 PID 3592 wrote to memory of 4400 3592 {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe 113 PID 3592 wrote to memory of 4400 3592 {861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe 113 PID 1428 wrote to memory of 3512 1428 {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe 114 PID 1428 wrote to memory of 3512 1428 {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe 114 PID 1428 wrote to memory of 3512 1428 {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe 114 PID 1428 wrote to memory of 4556 1428 {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe 115 PID 1428 wrote to memory of 4556 1428 {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe 115 PID 1428 wrote to memory of 4556 1428 {8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe 115 PID 3512 wrote to memory of 4628 3512 {476C8AE1-00AB-42aa-B755-379040502610}.exe 117 PID 3512 wrote to memory of 4628 3512 {476C8AE1-00AB-42aa-B755-379040502610}.exe 117 PID 3512 wrote to memory of 4628 3512 {476C8AE1-00AB-42aa-B755-379040502610}.exe 117 PID 3512 wrote to memory of 1348 3512 {476C8AE1-00AB-42aa-B755-379040502610}.exe 116 PID 3512 wrote to memory of 1348 3512 {476C8AE1-00AB-42aa-B755-379040502610}.exe 116 PID 3512 wrote to memory of 1348 3512 {476C8AE1-00AB-42aa-B755-379040502610}.exe 116 PID 4628 wrote to memory of 1272 4628 {C901F979-270D-4ad6-953F-DF85E71F13CC}.exe 118 PID 4628 wrote to memory of 1272 4628 {C901F979-270D-4ad6-953F-DF85E71F13CC}.exe 118 PID 4628 wrote to memory of 1272 4628 {C901F979-270D-4ad6-953F-DF85E71F13CC}.exe 118 PID 4628 wrote to memory of 2904 4628 {C901F979-270D-4ad6-953F-DF85E71F13CC}.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\{C72D44A3-7A22-4054-8263-EC09A056EA43}.exeC:\Windows\{C72D44A3-7A22-4054-8263-EC09A056EA43}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\{2E466A40-2FA9-4373-9C52-AED992E19547}.exeC:\Windows\{2E466A40-2FA9-4373-9C52-AED992E19547}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2E466~1.EXE > nul4⤵PID:1296
-
-
C:\Windows\{82CCB330-A29E-4084-87AA-98895252BE99}.exeC:\Windows\{82CCB330-A29E-4084-87AA-98895252BE99}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\{D3DA434B-2FF6-41b6-8161-13644146549B}.exeC:\Windows\{D3DA434B-2FF6-41b6-8161-13644146549B}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\{569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exeC:\Windows\{569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\{0ECF343D-1A13-4c20-8AC7-BD601500C618}.exeC:\Windows\{0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\{861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exeC:\Windows\{861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\{8829530C-3FD1-49f6-B603-E99AF0E4B341}.exeC:\Windows\{8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\{476C8AE1-00AB-42aa-B755-379040502610}.exeC:\Windows\{476C8AE1-00AB-42aa-B755-379040502610}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{476C8~1.EXE > nul11⤵PID:1348
-
-
C:\Windows\{C901F979-270D-4ad6-953F-DF85E71F13CC}.exeC:\Windows\{C901F979-270D-4ad6-953F-DF85E71F13CC}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\{20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exeC:\Windows\{20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{20FB4~1.EXE > nul13⤵PID:976
-
-
C:\Windows\{2232F893-EE8F-4d0d-96F1-7FEA47DF7FA8}.exeC:\Windows\{2232F893-EE8F-4d0d-96F1-7FEA47DF7FA8}.exe13⤵
- Executes dropped EXE
PID:224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C901F~1.EXE > nul12⤵PID:2904
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{88295~1.EXE > nul10⤵PID:4556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{861F3~1.EXE > nul9⤵PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0ECF3~1.EXE > nul8⤵PID:3764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56923~1.EXE > nul7⤵PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3DA4~1.EXE > nul6⤵PID:4940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{82CCB~1.EXE > nul5⤵PID:2908
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C72D4~1.EXE > nul3⤵PID:380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD563ffaf565bf63e55b840b5e77e701b28
SHA124c73d6f8193e5d0a004085b5eaa57bab034e748
SHA2563d1895ae5ec0d9e130ff1375328ed91a3d521aeb0c6a395d9a10cb3d293fc98d
SHA5127dbe38a18ecbe51b8f5af8ed7bfecc78094900ec9e5dcda3a7989fcfe4bf45e81f27c2d16f66e29396c425d053b377470a391bd76b1489de36650263af51f47c
-
Filesize
180KB
MD593581b7403bf9bddc3bbd339b50b1582
SHA13e1f5f9eb9c5708d8d928af469ef4b478c42eef6
SHA25635fc2fab51f6a2fe120bd5aa9f0542e3b3d0bbb3ebaf7388119ab24ff321c1c9
SHA5124455721c25c6fde57b0bcee79368b1eae49dd0cd4a9ef1ae51e00212c3d29c832deac8d3e82e4c3a57edfa17a2797005e9df50254e516af99d94eee9b647b865
-
Filesize
180KB
MD58931e86c1de02bf9775d2c664f78e9e6
SHA16417528a6880cd001c8ad0f30d8975a4d9afef25
SHA256a4ec7640b06d62c0c493a57667916c8be008c0889479053d9770a245fde53d8e
SHA512a8b078617d1d609f9d236516446ee7f8d5db08e7e4273c9612f2b7bc6ce2dea03f487e8eaf17ec2859cd7488dade9d64427039e6925980227282925d30cf9cfa
-
Filesize
180KB
MD5fc128fb4988ac03077a8ae9f35e7ed91
SHA17489985f7f26aaf32d93141265dae6132477c58f
SHA2560834d7a6b790c1c427c4c92949eb547f73ba8eb136b8a7c4a26db10a9af239c8
SHA512dfa38ca62368408eb9d10fae3e3f2d7067b6739f56c0c63ffe6e7bd9deabd47bc4acbca539fa6ccf20c64d641a45c4b6be6194c3956f7d8d4432e4923d853779
-
Filesize
180KB
MD5b0f2e59b556bae9c948b7abddd810fe0
SHA115e0e10af904ebf298f8df2d75b7e3113a740db7
SHA256284434e78d4c34d362ebd52c97fa67fe1ea71339b8acf525724ae3ac0bef1bfa
SHA512999d72added672b97fdc3ec14b737b802b6970f37a9dd39ae42ad4e01e76f1b4183c3a6526a538dce310e68aea02b1aafd50f0d62d5aaceaa102dfd8b441522f
-
Filesize
180KB
MD52b19c60ea7e770438e77c1bbbaabce8f
SHA15c4d33ee9c546550b5c4db02357e68aeebfbf8b6
SHA256b55023de58c2bea98b2c313a579c4d7dd1d0acbe2478b462874ccf19c39aa844
SHA5125d182f93c87179e2417fc434b99f9ba2dce627cf1c0e0b3eee7255cff19962f0f8a287646223cb49232f585a58ab0ec75cca409e2741879876625de020054ff4
-
Filesize
180KB
MD58592ce61edeab83fadcdfae1e6df4c10
SHA13e6ab6418b695f18b86662cd55828a71d5e711d9
SHA256208c33ca17fefa231ae119867563c9ebdc91ff2ec6bc6a12c69a3d990392d14e
SHA51295dcc63d941a3048198589f906ff6f88fab045974bce0b4da9c2a978fdc1e838e5f836c1294c85b71f44660d5ccb68feeeb95df258f79d5d62d0830d5ec8db85
-
Filesize
180KB
MD5cc791b1973f178cde6617ee304b7451f
SHA11521ba1a37b58283458b1c2b4d534c68b85ea7c1
SHA25614ae79051721efe5d505777d1b3065cd998e40734f1aaf59349e7b2da83f6ba9
SHA5124eb2417cd7d0c68c6eaf32055c922dd5a1cc0b25ddecd8fadc5527db3189ed2c7e31224f3423099538ce9e3426a97c57dddfa89d264fec9ab45331dfe5724ae3
-
Filesize
180KB
MD5f63562cac44545d5d29a0714c82062d9
SHA1cc89b56725d1d2c9e4acbbf1c5fd52c232bdd24a
SHA2560e3115e95c111beb069355acbb76a422041a6c54188274158d6cfcb02260b051
SHA512cb404471ec8f23163af4204a9d1cc5da50c1596bf69b805b11c4fdb5f31fd7bf4942fc8ccaa042924cfa478d79f2358d60b0fc5da7576c890a3a2517a9aa0c30
-
Filesize
180KB
MD58a70cf025d608f5d0054f5ad2bf5590c
SHA1b42a0010a5900517863a1a2ab0a8d1b7c3a9c9ec
SHA2567300d800b05421592be85427bf8d4c00d6ed832f4ae36752e31e9225cee17a3e
SHA512ffd565c0388284d88d5242b167a247ee19f1c0962852fdeeaff1f87a1adfe2a1540442568dad4a93989fb3007f25261c0c65ad6da65b8e88e78ddf00b937b927
-
Filesize
180KB
MD59d2319ddee4aaec02c83459ee45830ee
SHA1b8832febb1eafe33c6374cf6c9dfde4aa64f1a4f
SHA256fdd9c1637de475a69a4df4141a3f0745a8b198565e73dc41b32e610d0de0b116
SHA51219385862990ab81896c68dd26642309cbe9c63b2a0f92b4e3011e25d1055e7e9d79390ad25b1e67d37ef995de5d2ac66b8fbf86a233b6a2123ba1a08e0a460fb
-
Filesize
180KB
MD582f543b4ed10d9c2f180c1432b18afbf
SHA1a7f4ddac7e12046bb10df41a8cdfeaef989127f3
SHA256a94b180798779f8e4b59b494ec937041d58d96942e8823559dfae9e141ba20b8
SHA51279a343af3e46480f7854861b9379d7b31640ff77324853021318a48ffa9eaead12610ac4bb70abe4ddc9e9ae99b75f403e411aa7bd0a46facec30531bd24cea0