Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe
-
Size
197KB
-
MD5
34875d44a2ce978428bc2894caf4d84b
-
SHA1
976d0dd34cd08717cb7cf56e224cb976b24e28df
-
SHA256
217bede3f6528fd5e5610f32253c95f58d52cc4f6dd6abeb6bbc6d83b8c8a1d9
-
SHA512
b19ed8f813e02dbb98281c7fad8ad933edfe9e323b3f3518861f36388c19cab88ab8fb306a3c95c92c8b3b65eb9402b3d27dea76df688d397506e34a2a2db7fc
-
SSDEEP
3072:jEGh0oZl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGvlEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral1/files/0x000c000000012242-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001233d-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000012242-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0022000000014e4c-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000012242-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000012242-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-62.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0010000000012242-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2CC325A3-AA90-4588-8D18-7F05B2EB20FA}\stubpath = "C:\\Windows\\{2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe" {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}\stubpath = "C:\\Windows\\{D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe" {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AEF44FBE-B738-4ed4-A801-23D2EC0C2687}\stubpath = "C:\\Windows\\{AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe" {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65} {4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{36072C6A-E3B6-41e4-BE75-C1468C018B5A} {7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}\stubpath = "C:\\Windows\\{14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe" 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB} {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4AA1951E-8990-4869-BFBB-7F53BF16A18F} {F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}\stubpath = "C:\\Windows\\{7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe" {4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14134502-6BF5-44c7-AE20-8E6AEE1EBAE6} 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}\stubpath = "C:\\Windows\\{1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe" {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C} {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57016F3D-F1A3-45a5-9CBC-93AB81A57899} {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D5F589C3-C003-44f2-BD3C-0F9120747ADD} {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{36072C6A-E3B6-41e4-BE75-C1468C018B5A}\stubpath = "C:\\Windows\\{36072C6A-E3B6-41e4-BE75-C1468C018B5A}.exe" {7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4AA1951E-8990-4869-BFBB-7F53BF16A18F}\stubpath = "C:\\Windows\\{4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe" {F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2CC325A3-AA90-4588-8D18-7F05B2EB20FA} {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57016F3D-F1A3-45a5-9CBC-93AB81A57899}\stubpath = "C:\\Windows\\{57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe" {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D5F589C3-C003-44f2-BD3C-0F9120747ADD}\stubpath = "C:\\Windows\\{D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe" {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AEF44FBE-B738-4ed4-A801-23D2EC0C2687} {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB} {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}\stubpath = "C:\\Windows\\{F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe" {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe -
Deletes itself 1 IoCs
pid Process 2876 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3068 {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe 2752 {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe 2028 {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe 2504 {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe 1444 {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe 2200 {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe 2168 {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe 1440 {F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe 3012 {4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe 2008 {7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe 2980 {36072C6A-E3B6-41e4-BE75-C1468C018B5A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe File created C:\Windows\{1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe File created C:\Windows\{2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe File created C:\Windows\{D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe File created C:\Windows\{57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe File created C:\Windows\{AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe File created C:\Windows\{4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe {F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe File created C:\Windows\{D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe File created C:\Windows\{F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe File created C:\Windows\{7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe {4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe File created C:\Windows\{36072C6A-E3B6-41e4-BE75-C1468C018B5A}.exe {7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2256 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe Token: SeIncBasePriorityPrivilege 3068 {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe Token: SeIncBasePriorityPrivilege 2752 {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe Token: SeIncBasePriorityPrivilege 2028 {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe Token: SeIncBasePriorityPrivilege 2504 {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe Token: SeIncBasePriorityPrivilege 1444 {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe Token: SeIncBasePriorityPrivilege 2200 {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe Token: SeIncBasePriorityPrivilege 2168 {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe Token: SeIncBasePriorityPrivilege 1440 {F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe Token: SeIncBasePriorityPrivilege 3012 {4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe Token: SeIncBasePriorityPrivilege 2008 {7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 3068 2256 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe 28 PID 2256 wrote to memory of 3068 2256 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe 28 PID 2256 wrote to memory of 3068 2256 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe 28 PID 2256 wrote to memory of 3068 2256 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe 28 PID 2256 wrote to memory of 2876 2256 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe 29 PID 2256 wrote to memory of 2876 2256 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe 29 PID 2256 wrote to memory of 2876 2256 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe 29 PID 2256 wrote to memory of 2876 2256 2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe 29 PID 3068 wrote to memory of 2752 3068 {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe 30 PID 3068 wrote to memory of 2752 3068 {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe 30 PID 3068 wrote to memory of 2752 3068 {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe 30 PID 3068 wrote to memory of 2752 3068 {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe 30 PID 3068 wrote to memory of 2824 3068 {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe 31 PID 3068 wrote to memory of 2824 3068 {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe 31 PID 3068 wrote to memory of 2824 3068 {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe 31 PID 3068 wrote to memory of 2824 3068 {14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe 31 PID 2752 wrote to memory of 2028 2752 {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe 32 PID 2752 wrote to memory of 2028 2752 {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe 32 PID 2752 wrote to memory of 2028 2752 {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe 32 PID 2752 wrote to memory of 2028 2752 {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe 32 PID 2752 wrote to memory of 2756 2752 {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe 33 PID 2752 wrote to memory of 2756 2752 {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe 33 PID 2752 wrote to memory of 2756 2752 {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe 33 PID 2752 wrote to memory of 2756 2752 {1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe 33 PID 2028 wrote to memory of 2504 2028 {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe 36 PID 2028 wrote to memory of 2504 2028 {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe 36 PID 2028 wrote to memory of 2504 2028 {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe 36 PID 2028 wrote to memory of 2504 2028 {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe 36 PID 2028 wrote to memory of 2344 2028 {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe 37 PID 2028 wrote to memory of 2344 2028 {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe 37 PID 2028 wrote to memory of 2344 2028 {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe 37 PID 2028 wrote to memory of 2344 2028 {2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe 37 PID 2504 wrote to memory of 1444 2504 {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe 39 PID 2504 wrote to memory of 1444 2504 {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe 39 PID 2504 wrote to memory of 1444 2504 {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe 39 PID 2504 wrote to memory of 1444 2504 {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe 39 PID 2504 wrote to memory of 2856 2504 {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe 38 PID 2504 wrote to memory of 2856 2504 {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe 38 PID 2504 wrote to memory of 2856 2504 {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe 38 PID 2504 wrote to memory of 2856 2504 {D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe 38 PID 1444 wrote to memory of 2200 1444 {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe 41 PID 1444 wrote to memory of 2200 1444 {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe 41 PID 1444 wrote to memory of 2200 1444 {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe 41 PID 1444 wrote to memory of 2200 1444 {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe 41 PID 1444 wrote to memory of 1820 1444 {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe 40 PID 1444 wrote to memory of 1820 1444 {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe 40 PID 1444 wrote to memory of 1820 1444 {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe 40 PID 1444 wrote to memory of 1820 1444 {57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe 40 PID 2200 wrote to memory of 2168 2200 {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe 43 PID 2200 wrote to memory of 2168 2200 {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe 43 PID 2200 wrote to memory of 2168 2200 {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe 43 PID 2200 wrote to memory of 2168 2200 {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe 43 PID 2200 wrote to memory of 1684 2200 {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe 42 PID 2200 wrote to memory of 1684 2200 {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe 42 PID 2200 wrote to memory of 1684 2200 {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe 42 PID 2200 wrote to memory of 1684 2200 {D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe 42 PID 2168 wrote to memory of 1440 2168 {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe 44 PID 2168 wrote to memory of 1440 2168 {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe 44 PID 2168 wrote to memory of 1440 2168 {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe 44 PID 2168 wrote to memory of 1440 2168 {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe 44 PID 2168 wrote to memory of 2492 2168 {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe 45 PID 2168 wrote to memory of 2492 2168 {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe 45 PID 2168 wrote to memory of 2492 2168 {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe 45 PID 2168 wrote to memory of 2492 2168 {AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\{14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exeC:\Windows\{14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\{1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exeC:\Windows\{1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\{2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exeC:\Windows\{2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\{D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exeC:\Windows\{D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4987~1.EXE > nul6⤵PID:2856
-
-
C:\Windows\{57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exeC:\Windows\{57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{57016~1.EXE > nul7⤵PID:1820
-
-
C:\Windows\{D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exeC:\Windows\{D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D5F58~1.EXE > nul8⤵PID:1684
-
-
C:\Windows\{AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exeC:\Windows\{AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\{F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exeC:\Windows\{F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1440 -
C:\Windows\{4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exeC:\Windows\{4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4AA19~1.EXE > nul11⤵PID:1964
-
-
C:\Windows\{7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exeC:\Windows\{7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\{36072C6A-E3B6-41e4-BE75-C1468C018B5A}.exeC:\Windows\{36072C6A-E3B6-41e4-BE75-C1468C018B5A}.exe12⤵
- Executes dropped EXE
PID:2980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7EE3D~1.EXE > nul12⤵PID:1492
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F7FF5~1.EXE > nul10⤵PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AEF44~1.EXE > nul9⤵PID:2492
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2CC32~1.EXE > nul5⤵PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1FA8B~1.EXE > nul4⤵PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{14134~1.EXE > nul3⤵PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5630e2f06a986965440c2d80ed3c7f1ed
SHA1a904b36b5e18f3037171c0ffe1d7c26804717117
SHA25624d6f58fc03da53dc2b17d26452a5898e798451d45b34bbfe7cf5fa1e41cca81
SHA51235c368593b7526374b3ecf154d5c3eadae7fe32f6fc4fdf1ad58062ef154fc7287a61da34e3f146e5a9954593f1f87c3b14f4637a844ae515303b61198d9e8d0
-
Filesize
197KB
MD54b3131eeb10cc11ffc17c2b1bfb6d43d
SHA1ccea37d1a1c03abbd9733b72a73991e7bc0059e2
SHA256ad769801d492cd5172fcf5adb2a85213ea5d54256cfb7d343776982f12b0c8c3
SHA5129c36c2f24351f3a76039b7aea6f85a80fa004ac7980361ced5aa2364302eb0a4a03bcb5ab30500d7431bf3d9d81973c30052cd2881a42e444650bf8e6d84fa3e
-
Filesize
197KB
MD59aa685a5d370810e6de8bb4e033c0788
SHA1e8a41bee0b05e74b3f21b59ab5c0afa9e83bf7a9
SHA25644ab33427bb3c8e4817b4318f8d244e373c0f585947c5228c58eedcd080f75c7
SHA512f9aa10fab39a0d08e65912652591d6317069e26575a73f2635a213b57c4626d2be822631447bd30061aa6a560a980ef8980eacc689a62bd564fa75feb4161b08
-
Filesize
197KB
MD516b708062869c8d8f84571e2fb922b2b
SHA180e6b704a340ab3e7911f188f0955c2da3f386e3
SHA25624aca6a3e929557676d78429299899184ffb6163c5181299a2f33f59ce4647d3
SHA512635ee314e26361cf7e36885248b6e1d68e868187496434f5702b8b18134d15c030902361036903decc330ea084107dafd1bc090da8096ee7639464e610a3dca8
-
Filesize
197KB
MD54b8b586448f73c7c543c325ec9ddcf32
SHA11ff89dabbb5d9b20e6e7d3629344f1f93fdc3bc3
SHA256461ebd58fd4e72538462dfa50dbf402190c435981e3f64c6af503f56ee630fb7
SHA5122747dcc62a8e4e4480d0c2bce825c9f03a08cb3f7ed457c6a986f33b9353f036d6f0e81e2c37fa4d05417dd68f03615cfb8ffa65f0852bdd843ecc2f72ef9adf
-
Filesize
48KB
MD509aa3c3be58cc79e11d37db80d7a79f3
SHA1d67354a83bcc78ec954c762feb9c85c8955a758f
SHA256e890c2c0cffffd7cbff5eb3e0b225ed1f863bba5dfef73b528775bf331546b5d
SHA51217e5a1f691216e1c9b6ade335d2edc7fd11e42c75de2ad5779d1af54241447880edb60411886ebcb921b59ffc14c2d8c42ed813bcc95ffbdc83ab3e958d4fded
-
Filesize
197KB
MD509c47c6b2587f16f0430843afa15fcb5
SHA1979f826a1d1d4d893b670d0eba3320bd4aaeaed1
SHA256bf734f34362a3e3acfe9737d3d29b406be4986463639e5a270b8276400fd6ffb
SHA512c6aebd3c52189b7ce755453eac8f7bbad9c6ded9b98241493192ef3bba6b7a2f5bd25361e32d10b0a4c1df076e2afc0364e644de992ef56a43c115516d616f32
-
Filesize
197KB
MD5c460577fa1f90acff8619695f5135887
SHA17ab45234466d1abd4134d486a357798a6de7bf34
SHA256fdd0c86b3ba0b4be17bd193cb8f5c922f287e98baa51a9aecfe2714c2a49db00
SHA5121877d4a981d3a186e0b22197f180173441403528b66778bf3cc618310868d1e7a6f662be0d10e43c4658ce8f8440fa8ab5d7ee7d8e8a830d91bff043968fd413
-
Filesize
197KB
MD50f381ebc9cea5785af9c712e66bd6983
SHA110939e7837256a06bde4e9979a8b14593a755659
SHA2568204115e92b2fafc10fdd33fbc19e0709fbb67e18d7d45db58f2b76d0c48d0ef
SHA512f0c942b5b6df35f7b70ebdbe1b787c63072ab2a07b522bd896afce4aa36cf36859375306f373bddbe5af4d1c37e00f486dfd389fb1ba5c6e45a236b081690b83
-
Filesize
197KB
MD5b6f32fb152620666dcbad3c5c3fe337a
SHA116451964ae8fcaefd646798e16bc2b8707b4b494
SHA25641cd64be4676bc7a49e76747f1ccc5cd771c91ca4b19083c0c62f32d2974a4ae
SHA512a0a47cd68f6fca0caeb9d96d106979b0ef87e442ffe749d4a1bc52637ec95a7354faba27647461af9b96227cc087678fbdc440165be9657eeae11bcd102e8d97
-
Filesize
197KB
MD5ca91a7685ce0fbbde32f2e5fb997c906
SHA1d38f52227aa401dd515ce982be860bb6bb35ff60
SHA256989f2454ec6bcc79f0dd949aeb493f8c25665e39106fb0ef9b350a756c1f358f
SHA512fef3da0d4784a5eb427ab7e7bf0cfe41b2287c9adbe1b6d2db761614593bff8de9235d3d7066ece0828288f5a853b315a3320e5efab8f3dccb78aea35763bb2d
-
Filesize
197KB
MD55bce38462c0a58e01b27de0a220b5a78
SHA19899bfd26d85cfd07b2109cac05b28e2f15c344b
SHA256ecb8421fa8ab364ea3af72f5e58c601c246eb73bb98b2c073620d5612bc06d29
SHA512d58c4db83b1933e7ddd85aa256810c376e0a03c44c31f8455287694397279e1df3df22f1ac08c43191e16034a3c822a3dbfa08f2cfa562e169c465ab198e25c6