Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe
-
Size
168KB
-
MD5
0cfc053482265145ccc497d63bc3d217
-
SHA1
4230d085a71cd170ae725548283f1e778a53ff42
-
SHA256
a59518656442a30a6c8a2caeac983733149b011aeaad8c916e659047c7c2615c
-
SHA512
ccd9c4d53f82ecdba5d292117b2a0e509aa6f2f24695885b908a7c95fb468ce86ee4cd6b7389a68d4a15cd28f23ea0cea21a9e45fb661342276aaf8972f4df44
-
SSDEEP
1536:1EGh0oElq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oElqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000a000000012251-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000013a83-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000012251-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000016cb4-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012251-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000012251-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000012251-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8ABE43E1-A5F2-4540-BF65-563CE39A653D} {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8ABE43E1-A5F2-4540-BF65-563CE39A653D}\stubpath = "C:\\Windows\\{8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe" {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0125FFC-E2C4-4cf3-B920-2D0306721BCA} {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7831CC66-24FD-4ad7-81C5-E8B64AC26C35} {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7831CC66-24FD-4ad7-81C5-E8B64AC26C35}\stubpath = "C:\\Windows\\{7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe" {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{43704DAE-7A53-46c4-9BE7-278C72D0A9AD} {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C5D8AEE-02FE-4f28-A631-27476FB5124C}\stubpath = "C:\\Windows\\{2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe" {E00E2301-4735-4107-B5C3-78221E61FA70}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D8AC215-C856-4a7d-8F65-51E6716254C2} {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F4D3023F-EDF2-4436-9C87-9D1127626D62}\stubpath = "C:\\Windows\\{F4D3023F-EDF2-4436-9C87-9D1127626D62}.exe" {480AB463-CA5F-4588-84AD-71C141F33D7F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA514BAC-8E44-42da-AF43-39642A3737EC} {26E0398F-D6A2-499b-B806-30C236A66101}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{480AB463-CA5F-4588-84AD-71C141F33D7F} {AA514BAC-8E44-42da-AF43-39642A3737EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E00E2301-4735-4107-B5C3-78221E61FA70}\stubpath = "C:\\Windows\\{E00E2301-4735-4107-B5C3-78221E61FA70}.exe" 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{43704DAE-7A53-46c4-9BE7-278C72D0A9AD}\stubpath = "C:\\Windows\\{43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe" {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F4D3023F-EDF2-4436-9C87-9D1127626D62} {480AB463-CA5F-4588-84AD-71C141F33D7F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C5D8AEE-02FE-4f28-A631-27476FB5124C} {E00E2301-4735-4107-B5C3-78221E61FA70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0125FFC-E2C4-4cf3-B920-2D0306721BCA}\stubpath = "C:\\Windows\\{C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe" {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26E0398F-D6A2-499b-B806-30C236A66101} {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26E0398F-D6A2-499b-B806-30C236A66101}\stubpath = "C:\\Windows\\{26E0398F-D6A2-499b-B806-30C236A66101}.exe" {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA514BAC-8E44-42da-AF43-39642A3737EC}\stubpath = "C:\\Windows\\{AA514BAC-8E44-42da-AF43-39642A3737EC}.exe" {26E0398F-D6A2-499b-B806-30C236A66101}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{480AB463-CA5F-4588-84AD-71C141F33D7F}\stubpath = "C:\\Windows\\{480AB463-CA5F-4588-84AD-71C141F33D7F}.exe" {AA514BAC-8E44-42da-AF43-39642A3737EC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E00E2301-4735-4107-B5C3-78221E61FA70} 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D8AC215-C856-4a7d-8F65-51E6716254C2}\stubpath = "C:\\Windows\\{7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe" {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe -
Executes dropped EXE 11 IoCs
pid Process 1092 {E00E2301-4735-4107-B5C3-78221E61FA70}.exe 2776 {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe 2812 {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe 2840 {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe 3044 {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe 1568 {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe 1536 {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe 2652 {26E0398F-D6A2-499b-B806-30C236A66101}.exe 2932 {AA514BAC-8E44-42da-AF43-39642A3737EC}.exe 1984 {480AB463-CA5F-4588-84AD-71C141F33D7F}.exe 1168 {F4D3023F-EDF2-4436-9C87-9D1127626D62}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{E00E2301-4735-4107-B5C3-78221E61FA70}.exe 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe File created C:\Windows\{2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe {E00E2301-4735-4107-B5C3-78221E61FA70}.exe File created C:\Windows\{7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe File created C:\Windows\{43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe File created C:\Windows\{26E0398F-D6A2-499b-B806-30C236A66101}.exe {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe File created C:\Windows\{F4D3023F-EDF2-4436-9C87-9D1127626D62}.exe {480AB463-CA5F-4588-84AD-71C141F33D7F}.exe File created C:\Windows\{8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe File created C:\Windows\{C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe File created C:\Windows\{7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe File created C:\Windows\{AA514BAC-8E44-42da-AF43-39642A3737EC}.exe {26E0398F-D6A2-499b-B806-30C236A66101}.exe File created C:\Windows\{480AB463-CA5F-4588-84AD-71C141F33D7F}.exe {AA514BAC-8E44-42da-AF43-39642A3737EC}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1716 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe Token: SeIncBasePriorityPrivilege 1092 {E00E2301-4735-4107-B5C3-78221E61FA70}.exe Token: SeIncBasePriorityPrivilege 2776 {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe Token: SeIncBasePriorityPrivilege 2812 {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe Token: SeIncBasePriorityPrivilege 2840 {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe Token: SeIncBasePriorityPrivilege 3044 {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe Token: SeIncBasePriorityPrivilege 1568 {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe Token: SeIncBasePriorityPrivilege 1536 {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe Token: SeIncBasePriorityPrivilege 2652 {26E0398F-D6A2-499b-B806-30C236A66101}.exe Token: SeIncBasePriorityPrivilege 2932 {AA514BAC-8E44-42da-AF43-39642A3737EC}.exe Token: SeIncBasePriorityPrivilege 1984 {480AB463-CA5F-4588-84AD-71C141F33D7F}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1092 1716 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe 28 PID 1716 wrote to memory of 1092 1716 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe 28 PID 1716 wrote to memory of 1092 1716 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe 28 PID 1716 wrote to memory of 1092 1716 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe 28 PID 1716 wrote to memory of 2192 1716 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe 29 PID 1716 wrote to memory of 2192 1716 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe 29 PID 1716 wrote to memory of 2192 1716 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe 29 PID 1716 wrote to memory of 2192 1716 2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe 29 PID 1092 wrote to memory of 2776 1092 {E00E2301-4735-4107-B5C3-78221E61FA70}.exe 30 PID 1092 wrote to memory of 2776 1092 {E00E2301-4735-4107-B5C3-78221E61FA70}.exe 30 PID 1092 wrote to memory of 2776 1092 {E00E2301-4735-4107-B5C3-78221E61FA70}.exe 30 PID 1092 wrote to memory of 2776 1092 {E00E2301-4735-4107-B5C3-78221E61FA70}.exe 30 PID 1092 wrote to memory of 1708 1092 {E00E2301-4735-4107-B5C3-78221E61FA70}.exe 31 PID 1092 wrote to memory of 1708 1092 {E00E2301-4735-4107-B5C3-78221E61FA70}.exe 31 PID 1092 wrote to memory of 1708 1092 {E00E2301-4735-4107-B5C3-78221E61FA70}.exe 31 PID 1092 wrote to memory of 1708 1092 {E00E2301-4735-4107-B5C3-78221E61FA70}.exe 31 PID 2776 wrote to memory of 2812 2776 {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe 32 PID 2776 wrote to memory of 2812 2776 {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe 32 PID 2776 wrote to memory of 2812 2776 {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe 32 PID 2776 wrote to memory of 2812 2776 {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe 32 PID 2776 wrote to memory of 2736 2776 {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe 33 PID 2776 wrote to memory of 2736 2776 {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe 33 PID 2776 wrote to memory of 2736 2776 {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe 33 PID 2776 wrote to memory of 2736 2776 {2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe 33 PID 2812 wrote to memory of 2840 2812 {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe 36 PID 2812 wrote to memory of 2840 2812 {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe 36 PID 2812 wrote to memory of 2840 2812 {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe 36 PID 2812 wrote to memory of 2840 2812 {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe 36 PID 2812 wrote to memory of 2580 2812 {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe 37 PID 2812 wrote to memory of 2580 2812 {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe 37 PID 2812 wrote to memory of 2580 2812 {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe 37 PID 2812 wrote to memory of 2580 2812 {7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe 37 PID 2840 wrote to memory of 3044 2840 {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe 38 PID 2840 wrote to memory of 3044 2840 {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe 38 PID 2840 wrote to memory of 3044 2840 {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe 38 PID 2840 wrote to memory of 3044 2840 {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe 38 PID 2840 wrote to memory of 3052 2840 {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe 39 PID 2840 wrote to memory of 3052 2840 {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe 39 PID 2840 wrote to memory of 3052 2840 {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe 39 PID 2840 wrote to memory of 3052 2840 {8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe 39 PID 3044 wrote to memory of 1568 3044 {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe 40 PID 3044 wrote to memory of 1568 3044 {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe 40 PID 3044 wrote to memory of 1568 3044 {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe 40 PID 3044 wrote to memory of 1568 3044 {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe 40 PID 3044 wrote to memory of 1320 3044 {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe 41 PID 3044 wrote to memory of 1320 3044 {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe 41 PID 3044 wrote to memory of 1320 3044 {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe 41 PID 3044 wrote to memory of 1320 3044 {C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe 41 PID 1568 wrote to memory of 1536 1568 {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe 43 PID 1568 wrote to memory of 1536 1568 {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe 43 PID 1568 wrote to memory of 1536 1568 {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe 43 PID 1568 wrote to memory of 1536 1568 {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe 43 PID 1568 wrote to memory of 1036 1568 {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe 42 PID 1568 wrote to memory of 1036 1568 {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe 42 PID 1568 wrote to memory of 1036 1568 {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe 42 PID 1568 wrote to memory of 1036 1568 {7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe 42 PID 1536 wrote to memory of 2652 1536 {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe 44 PID 1536 wrote to memory of 2652 1536 {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe 44 PID 1536 wrote to memory of 2652 1536 {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe 44 PID 1536 wrote to memory of 2652 1536 {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe 44 PID 1536 wrote to memory of 1312 1536 {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe 45 PID 1536 wrote to memory of 1312 1536 {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe 45 PID 1536 wrote to memory of 1312 1536 {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe 45 PID 1536 wrote to memory of 1312 1536 {43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_0cfc053482265145ccc497d63bc3d217_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\{E00E2301-4735-4107-B5C3-78221E61FA70}.exeC:\Windows\{E00E2301-4735-4107-B5C3-78221E61FA70}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\{2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exeC:\Windows\{2C5D8AEE-02FE-4f28-A631-27476FB5124C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\{7D8AC215-C856-4a7d-8F65-51E6716254C2}.exeC:\Windows\{7D8AC215-C856-4a7d-8F65-51E6716254C2}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\{8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exeC:\Windows\{8ABE43E1-A5F2-4540-BF65-563CE39A653D}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\{C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exeC:\Windows\{C0125FFC-E2C4-4cf3-B920-2D0306721BCA}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\{7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exeC:\Windows\{7831CC66-24FD-4ad7-81C5-E8B64AC26C35}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7831C~1.EXE > nul8⤵PID:1036
-
-
C:\Windows\{43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exeC:\Windows\{43704DAE-7A53-46c4-9BE7-278C72D0A9AD}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\{26E0398F-D6A2-499b-B806-30C236A66101}.exeC:\Windows\{26E0398F-D6A2-499b-B806-30C236A66101}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2652 -
C:\Windows\{AA514BAC-8E44-42da-AF43-39642A3737EC}.exeC:\Windows\{AA514BAC-8E44-42da-AF43-39642A3737EC}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2932 -
C:\Windows\{480AB463-CA5F-4588-84AD-71C141F33D7F}.exeC:\Windows\{480AB463-CA5F-4588-84AD-71C141F33D7F}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\{F4D3023F-EDF2-4436-9C87-9D1127626D62}.exeC:\Windows\{F4D3023F-EDF2-4436-9C87-9D1127626D62}.exe12⤵
- Executes dropped EXE
PID:1168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{480AB~1.EXE > nul12⤵PID:592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA514~1.EXE > nul11⤵PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26E03~1.EXE > nul10⤵PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{43704~1.EXE > nul9⤵PID:1312
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0125~1.EXE > nul7⤵PID:1320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8ABE4~1.EXE > nul6⤵PID:3052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D8AC~1.EXE > nul5⤵PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2C5D8~1.EXE > nul4⤵PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E00E2~1.EXE > nul3⤵PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5dbfd47be7258b8c74e606acb39b02ef0
SHA16f886ebf5371f50bb7374ed09d509d481ebd056d
SHA25690e9f3708361074fa9ff2d5b4455dc833779c441d994e5afd5c8335f5d03acfc
SHA512a2bbad4594fe6ef29b6ae39250fc06fc641cd49a4c692576b0b8d68da13c3f26424d364d0734fbcf08f048ef229c8c58e514437cc1e3bb7252bbb84b93f2290e
-
Filesize
168KB
MD51b702a969760d35570a8c9eb956b8025
SHA18e512aa1ad2e8eaab475ae1799a3c2e4d9fc98ce
SHA256183bfc233334f90681dd02eb510192f5655167c9237e150c82c81276dbd0ab49
SHA512125440e0b29ae03f4c10c8dd7457b5e7db2635d1b8ae64e7306ccedd505b20a36ddb867c7c322415fa0b8b8eaa9b840b0e33387e2e7b02f31ecf562d4151289b
-
Filesize
168KB
MD5132caf6b90cadc4a9aac3d47aa8e514e
SHA1f4f36dc12447f143a456ab2ba1c0ba52257f35d5
SHA256f6212551bede80faf9aebb37ad64f2ede1131bec593e25e1c122181f066e8fda
SHA5125ab787e603f110f33831eaaba20b7580a09ec2f031116e7fd0e8dfbe8eeca1d1e659016fe863fa24b5839ee30ca7df570db6b9d9636430e33340c8ab65ee0fe2
-
Filesize
168KB
MD5f69df45cf7f10cad69da6be3161bde33
SHA185591d5c28a02c603edd7da93495405e760dd6e9
SHA256bcc43615083ee928f9c17756f35ec81bd996e83cfeca2cf2b79a55fe60ab3f22
SHA51276891ad1a871e7b2d2657f28e0e7fc1d213bdec678312687e3b6ef022cbd1341beefbcc7a5b916247aae7f331c27268cc9bffbb401d2f1f4ef1b42eb69a29224
-
Filesize
168KB
MD57a244e19b4e176e93843402013b94208
SHA1e62dc7deba488ef4121bee3521dec5d1f37f87a8
SHA2563df980304246d9e484c173cff2114a09a3ba19a3d7db42960a9e94f367d76bd9
SHA5123468c00c8519b4d699d2a1756bb95e4df47fdeb039640add3b42169cb9b2584a85576f878e9dd54fc5046dcbf1cc37f8cc338a3ff9fcca9388c9b174e74473c7
-
Filesize
168KB
MD59fca320746900e6fc1de84c0ae58473e
SHA1042ce1abd964694761d2b710bfae8a7e71550e24
SHA256fe7fb5a86de863ffbeaf548160b7a39d352aff75f619ff77380e2f7ddca9266c
SHA512867e206ef81d2ee9dc2b6f30b9ed66d210fab14802bbb8faf236a7abb848e9efc25075f9c5298cbc23812b4c17e3b20e7a8ab003d7e0dfb093e3002e1615b89f
-
Filesize
168KB
MD551d7bb83b21392c0763ef3f2466f370d
SHA1f96e3f58d52ea058713355df3b8e4a86ba4168b7
SHA2565cbe3cbcb1c794cd18302dd0084820d28b8ce3b813f86f323dd241c59f1bfda0
SHA51272964434f1b8aa77c1b268789c804b818620b46321226a6ee3ba878002c8056acbd5b6793f5bf6e721d65b217a10989f0c1636ca1e73c57dd4a4cf0c144c8864
-
Filesize
168KB
MD574482338dc7f1bd1fd7d8ff55e0466e8
SHA112ad21ff6ff7439a18660504240d90456913fb75
SHA256583b2b3aa72ee4510f888a261f9123165d0031e39359b4090e7fb5394918d8b6
SHA5125b968777af523dad8cfc1b205628b33ecdf821ca3bcdf6aea73f5994f5c3e54eb8201598cd603b160827d30b451d5ba8114831f83eb686d88c94ddf3da633278
-
Filesize
168KB
MD5d9d7f3c03918ad7ca29a9b26e86250b2
SHA1c4839e05dd63d9552270b201b284bdc4c623ae12
SHA25664cd6273cc8ab5f134eacb484e1957cf6f1aef05b09b4315b42876d4419255aa
SHA512939437105ce60f5882183146efb87b04d7cce65f33fc4641256b03a97aac304975cb002e11210a658255d8416500baf6410e953a46528d9f22c430523de8dea4
-
Filesize
168KB
MD5da9e7aa00d50c0bba84f51ad94e280dd
SHA146088af3b2930d17084aff23519307f07c8cbef0
SHA256f05b0db3a680eb07ce248d8c798de37ccc595832531ab300c071ddccae806df3
SHA512048e32413b8d08ad08f03f6bcee66a94ed2cf539c4df445c16dd797742904a404febbc5f67674387dceb14d82c0dae62b4871a8bf2f5e281a1eac2ac3a8de855
-
Filesize
168KB
MD58c031d3eb364dfda5b91ea8c19cf8eb3
SHA167a248741b92d5fe7ede607dd161e9e697b3e00e
SHA256a6c53361d494a53c17fc7c1eb2a5b6aa6f6bce546b13a6a1fc9ce5b14ce4f2f6
SHA512f8ce6a5e9e57a2e7cf686cbe4c464450dbcfafcf448b1502ccac3c74d289b7d0af0f3de098dde0b802302b575427e7a6c684122fb7b8d7527f89a46b0e884600