Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe
-
Size
216KB
-
MD5
79213cfa504d1553a041234a6a829718
-
SHA1
efc61f02978df7254345e131487670422a1bab73
-
SHA256
be379fced4b9205ace31dce2313bd91584efc90ef97970e237eed9352d4a763d
-
SHA512
b114314569cc38da6eb2c5f3293b94e3c531663542c91c212adf003e014b637d3c411c70a26352f9d9cdceefe53f94af3605f041de588a5dd9954a21a33fae23
-
SSDEEP
3072:jEGh0orl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGFlEeKcAEcGy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral1/files/0x000a000000012243-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0028000000015c63-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000f6f8-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0029000000015c63-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000700000000f6f8-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0029000000015c63-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002a000000015c63-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000800000000f6f8-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002b000000015c63-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0027000000015c6f-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002c000000015c63-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0028000000015c6f-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80FB3AF4-D527-4396-BD70-C84FA39CB99B}\stubpath = "C:\\Windows\\{80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe" {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C771874-921C-4842-9079-93BC2EDEDFB9}\stubpath = "C:\\Windows\\{5C771874-921C-4842-9079-93BC2EDEDFB9}.exe" {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E148AF2E-5805-4421-BB23-3C6B7B1C8F75}\stubpath = "C:\\Windows\\{E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe" 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80FB3AF4-D527-4396-BD70-C84FA39CB99B} {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C36CD23-02A5-4b51-A165-40F45F69F59F}\stubpath = "C:\\Windows\\{8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe" {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C771874-921C-4842-9079-93BC2EDEDFB9} {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D3F637B-3776-4ed3-94B1-4A5ED4AA468B} {7E868390-D47B-4d2f-8718-95AFBF6ADBF2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62DDB428-CBC8-4d1c-B017-30A16B609A55}\stubpath = "C:\\Windows\\{62DDB428-CBC8-4d1c-B017-30A16B609A55}.exe" {E28979DF-3AEA-4b8c-986A-7790CC9021CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EAE794B3-224A-426d-8C08-387710BDC0D1}\stubpath = "C:\\Windows\\{EAE794B3-224A-426d-8C08-387710BDC0D1}.exe" {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0B15D0D3-B576-4334-9567-18A22EF5A00F} {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E28979DF-3AEA-4b8c-986A-7790CC9021CA} {5D3F637B-3776-4ed3-94B1-4A5ED4AA468B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E28979DF-3AEA-4b8c-986A-7790CC9021CA}\stubpath = "C:\\Windows\\{E28979DF-3AEA-4b8c-986A-7790CC9021CA}.exe" {5D3F637B-3776-4ed3-94B1-4A5ED4AA468B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C36CD23-02A5-4b51-A165-40F45F69F59F} {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E868390-D47B-4d2f-8718-95AFBF6ADBF2}\stubpath = "C:\\Windows\\{7E868390-D47B-4d2f-8718-95AFBF6ADBF2}.exe" {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D} {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}\stubpath = "C:\\Windows\\{B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe" {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0B15D0D3-B576-4334-9567-18A22EF5A00F}\stubpath = "C:\\Windows\\{0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe" {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E868390-D47B-4d2f-8718-95AFBF6ADBF2} {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D3F637B-3776-4ed3-94B1-4A5ED4AA468B}\stubpath = "C:\\Windows\\{5D3F637B-3776-4ed3-94B1-4A5ED4AA468B}.exe" {7E868390-D47B-4d2f-8718-95AFBF6ADBF2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62DDB428-CBC8-4d1c-B017-30A16B609A55} {E28979DF-3AEA-4b8c-986A-7790CC9021CA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E148AF2E-5805-4421-BB23-3C6B7B1C8F75} 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EAE794B3-224A-426d-8C08-387710BDC0D1} {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe -
Deletes itself 1 IoCs
pid Process 2704 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2456 {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe 2744 {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe 2624 {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe 1012 {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe 1112 {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe 2864 {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe 1668 {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe 944 {7E868390-D47B-4d2f-8718-95AFBF6ADBF2}.exe 1636 {5D3F637B-3776-4ed3-94B1-4A5ED4AA468B}.exe 2100 {E28979DF-3AEA-4b8c-986A-7790CC9021CA}.exe 2436 {62DDB428-CBC8-4d1c-B017-30A16B609A55}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe File created C:\Windows\{0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe File created C:\Windows\{8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe File created C:\Windows\{80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe File created C:\Windows\{5C771874-921C-4842-9079-93BC2EDEDFB9}.exe {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe File created C:\Windows\{E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe File created C:\Windows\{7E868390-D47B-4d2f-8718-95AFBF6ADBF2}.exe {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe File created C:\Windows\{5D3F637B-3776-4ed3-94B1-4A5ED4AA468B}.exe {7E868390-D47B-4d2f-8718-95AFBF6ADBF2}.exe File created C:\Windows\{E28979DF-3AEA-4b8c-986A-7790CC9021CA}.exe {5D3F637B-3776-4ed3-94B1-4A5ED4AA468B}.exe File created C:\Windows\{62DDB428-CBC8-4d1c-B017-30A16B609A55}.exe {E28979DF-3AEA-4b8c-986A-7790CC9021CA}.exe File created C:\Windows\{EAE794B3-224A-426d-8C08-387710BDC0D1}.exe {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2276 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe Token: SeIncBasePriorityPrivilege 2456 {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe Token: SeIncBasePriorityPrivilege 2744 {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe Token: SeIncBasePriorityPrivilege 2624 {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe Token: SeIncBasePriorityPrivilege 1012 {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe Token: SeIncBasePriorityPrivilege 1112 {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe Token: SeIncBasePriorityPrivilege 2864 {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe Token: SeIncBasePriorityPrivilege 1668 {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe Token: SeIncBasePriorityPrivilege 944 {7E868390-D47B-4d2f-8718-95AFBF6ADBF2}.exe Token: SeIncBasePriorityPrivilege 1636 {5D3F637B-3776-4ed3-94B1-4A5ED4AA468B}.exe Token: SeIncBasePriorityPrivilege 2100 {E28979DF-3AEA-4b8c-986A-7790CC9021CA}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2456 2276 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe 28 PID 2276 wrote to memory of 2456 2276 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe 28 PID 2276 wrote to memory of 2456 2276 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe 28 PID 2276 wrote to memory of 2456 2276 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe 28 PID 2276 wrote to memory of 2704 2276 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe 29 PID 2276 wrote to memory of 2704 2276 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe 29 PID 2276 wrote to memory of 2704 2276 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe 29 PID 2276 wrote to memory of 2704 2276 2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe 29 PID 2456 wrote to memory of 2744 2456 {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe 32 PID 2456 wrote to memory of 2744 2456 {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe 32 PID 2456 wrote to memory of 2744 2456 {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe 32 PID 2456 wrote to memory of 2744 2456 {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe 32 PID 2456 wrote to memory of 3012 2456 {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe 33 PID 2456 wrote to memory of 3012 2456 {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe 33 PID 2456 wrote to memory of 3012 2456 {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe 33 PID 2456 wrote to memory of 3012 2456 {E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe 33 PID 2744 wrote to memory of 2624 2744 {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe 34 PID 2744 wrote to memory of 2624 2744 {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe 34 PID 2744 wrote to memory of 2624 2744 {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe 34 PID 2744 wrote to memory of 2624 2744 {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe 34 PID 2744 wrote to memory of 632 2744 {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe 35 PID 2744 wrote to memory of 632 2744 {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe 35 PID 2744 wrote to memory of 632 2744 {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe 35 PID 2744 wrote to memory of 632 2744 {EAE794B3-224A-426d-8C08-387710BDC0D1}.exe 35 PID 2624 wrote to memory of 1012 2624 {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe 36 PID 2624 wrote to memory of 1012 2624 {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe 36 PID 2624 wrote to memory of 1012 2624 {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe 36 PID 2624 wrote to memory of 1012 2624 {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe 36 PID 2624 wrote to memory of 1592 2624 {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe 37 PID 2624 wrote to memory of 1592 2624 {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe 37 PID 2624 wrote to memory of 1592 2624 {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe 37 PID 2624 wrote to memory of 1592 2624 {B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe 37 PID 1012 wrote to memory of 1112 1012 {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe 38 PID 1012 wrote to memory of 1112 1012 {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe 38 PID 1012 wrote to memory of 1112 1012 {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe 38 PID 1012 wrote to memory of 1112 1012 {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe 38 PID 1012 wrote to memory of 836 1012 {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe 39 PID 1012 wrote to memory of 836 1012 {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe 39 PID 1012 wrote to memory of 836 1012 {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe 39 PID 1012 wrote to memory of 836 1012 {0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe 39 PID 1112 wrote to memory of 2864 1112 {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe 41 PID 1112 wrote to memory of 2864 1112 {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe 41 PID 1112 wrote to memory of 2864 1112 {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe 41 PID 1112 wrote to memory of 2864 1112 {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe 41 PID 1112 wrote to memory of 2960 1112 {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe 40 PID 1112 wrote to memory of 2960 1112 {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe 40 PID 1112 wrote to memory of 2960 1112 {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe 40 PID 1112 wrote to memory of 2960 1112 {8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe 40 PID 2864 wrote to memory of 1668 2864 {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe 43 PID 2864 wrote to memory of 1668 2864 {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe 43 PID 2864 wrote to memory of 1668 2864 {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe 43 PID 2864 wrote to memory of 1668 2864 {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe 43 PID 2864 wrote to memory of 2160 2864 {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe 42 PID 2864 wrote to memory of 2160 2864 {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe 42 PID 2864 wrote to memory of 2160 2864 {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe 42 PID 2864 wrote to memory of 2160 2864 {80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe 42 PID 1668 wrote to memory of 944 1668 {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe 44 PID 1668 wrote to memory of 944 1668 {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe 44 PID 1668 wrote to memory of 944 1668 {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe 44 PID 1668 wrote to memory of 944 1668 {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe 44 PID 1668 wrote to memory of 800 1668 {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe 45 PID 1668 wrote to memory of 800 1668 {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe 45 PID 1668 wrote to memory of 800 1668 {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe 45 PID 1668 wrote to memory of 800 1668 {5C771874-921C-4842-9079-93BC2EDEDFB9}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_79213cfa504d1553a041234a6a829718_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\{E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exeC:\Windows\{E148AF2E-5805-4421-BB23-3C6B7B1C8F75}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\{EAE794B3-224A-426d-8C08-387710BDC0D1}.exeC:\Windows\{EAE794B3-224A-426d-8C08-387710BDC0D1}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\{B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exeC:\Windows\{B2F482AC-55B0-4ed2-A0C1-FAB212A0C40D}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\{0B15D0D3-B576-4334-9567-18A22EF5A00F}.exeC:\Windows\{0B15D0D3-B576-4334-9567-18A22EF5A00F}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\{8C36CD23-02A5-4b51-A165-40F45F69F59F}.exeC:\Windows\{8C36CD23-02A5-4b51-A165-40F45F69F59F}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C36C~1.EXE > nul7⤵PID:2960
-
-
C:\Windows\{80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exeC:\Windows\{80FB3AF4-D527-4396-BD70-C84FA39CB99B}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80FB3~1.EXE > nul8⤵PID:2160
-
-
C:\Windows\{5C771874-921C-4842-9079-93BC2EDEDFB9}.exeC:\Windows\{5C771874-921C-4842-9079-93BC2EDEDFB9}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\{7E868390-D47B-4d2f-8718-95AFBF6ADBF2}.exeC:\Windows\{7E868390-D47B-4d2f-8718-95AFBF6ADBF2}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:944 -
C:\Windows\{5D3F637B-3776-4ed3-94B1-4A5ED4AA468B}.exeC:\Windows\{5D3F637B-3776-4ed3-94B1-4A5ED4AA468B}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\{E28979DF-3AEA-4b8c-986A-7790CC9021CA}.exeC:\Windows\{E28979DF-3AEA-4b8c-986A-7790CC9021CA}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E2897~1.EXE > nul12⤵PID:588
-
-
C:\Windows\{62DDB428-CBC8-4d1c-B017-30A16B609A55}.exeC:\Windows\{62DDB428-CBC8-4d1c-B017-30A16B609A55}.exe12⤵
- Executes dropped EXE
PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D3F6~1.EXE > nul11⤵PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E868~1.EXE > nul10⤵PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C771~1.EXE > nul9⤵PID:800
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0B15D~1.EXE > nul6⤵PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B2F48~1.EXE > nul5⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EAE79~1.EXE > nul4⤵PID:632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E148A~1.EXE > nul3⤵PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5c4bc984da83cadad43fb06a8656e015a
SHA13db9af79dd883a39dbfe3ff69b3042018ce60f82
SHA256d5aad33e4746c054a7efacd7215483b87a4e8844598ecf6dc06778a84711d1d8
SHA512a27ef905e2b7e9797321aaa510618c204226a505ac6443b93541e44f578f2912607e0a496f0511f54340e3e3dc1cfb7ffc2ad174a2d2e05e8046a332cfb9092c
-
Filesize
126KB
MD50c95d6ce82af849ddeb2b28c62d277f6
SHA1d766711ff185a28dd7246a7c5e5a03f6966e0172
SHA2560cb41db26c723d36decd92f55c45a90f67921d223bb724ab1787892ec2b28bd0
SHA512f13e2b7fb5848abe09b91a32da715c31add61efbc9411d5d68edc9f99135ea9572dda2fb0e30aa14773e36fc8276e18f4ab35270f264b8bddda5841be94044a0
-
Filesize
216KB
MD58d9a6fd87362330e26c762fbc063e9ab
SHA103b87b9e3aa3cc1db7e5f0496e9986c2dc74f342
SHA256e5fa008253831f2a4f437175c1eadf03d6610b0599a7475b58c53962927eb102
SHA512096adda135087098dd8ccb49fe8f745f788f68a174d47f4c16066ef08eeccff6faaafd029905c9a39c83e0bf927e306c120b46ca528b09fd62ba9ca8907075e7
-
Filesize
216KB
MD5631d2fe91200d961da808c53213e7f9e
SHA108f84602ea8fa14b945ca5918abab7ff2ebf8a8d
SHA256c588a0b62bafa43de7ac6ab7c11b29ef613d2607ce41362d625777efd91269ab
SHA512eb2551d74cff5198f295654a88b68ff14168943682127d42f67535ec963660e789efcb90d083baf0723050c11762709f43a1bf9aadeb0cbded4287c996bef27c
-
Filesize
216KB
MD57ac647416c37a53737c47e790ee60352
SHA1f5e00b887f1be923140701ff1cdb03488e7e08f8
SHA256a9009e664bfe3c81227fd31fb7d5e6800c3044ed500e52aabe2740e15c9f441b
SHA5121cae93418effd665dbf6a0e520bae9c58fd1e21d8ae7abf39702b959f90b3d4082f6961b34b79eb0eb22dc48a7467346379d23157435fd38c04ed5e8496f6c6c
-
Filesize
216KB
MD50e4611eec8cc7e707b5416f5f125b62f
SHA191aae20d0ee5f7100efb0a184da39fe3033f9299
SHA256be1b0cb196013b03f9df4a23fbf13c1e77b2599e30f8eca1b178ee9d9887a1ab
SHA512074a854b54c6cfc4321a4b2e541c9365e2478b009f1f306214f1df177d59ab6ada6e72dcc5e489e7cc77c25902c26d27ac6da69d791d57a253604b9d9de40943
-
Filesize
216KB
MD5b625a56acfc649437a099b6dcafe532b
SHA1cc3915e92e09f8881a68e1084ed1e20c1c4538c8
SHA256d21f370e1c75d6c3eda712ef481ed0fb0a24d0b8e334bfab923fe827cf0be38e
SHA512a93a7528f93b80fa8edb50ab71f36544a9177ce6332bc17166d9b136427a5bf1ae7532dfbfc0ad323ad07e3a31f213bb4c286587b2f39a788f47cf0c960557a8
-
Filesize
216KB
MD5ee58d875061a51ed8104274b13bf62b3
SHA13da8cf8f95cb5a85ce55cecb5ecec97e826ff7f0
SHA256e35bd293f37372e04a9bc0582b9b0d1899927696e0b7752f86542215d7499021
SHA51269549afefcf41e631ebb68f2df9ac77994b2b89a9a89be8ea99542b4142082021ac6003f879401e84ea597c1271c0f58214b51285866528e57bde0e41f32df02
-
Filesize
216KB
MD5784c3d51ae6df438bec9ff097f2eb89d
SHA14bdd9308fe1a4379fc74591a02efbd927b067905
SHA25679cb003be5c32af69d4c20f4f301ce23050c3ab7c418825aa34f83f694033033
SHA512c00baf3c793b26e59584ff110c1a333100807838fcb2eba1956e2e8d7230a28403eb27837292b739bba38a5fa8e153d5fc9e94f1c172df749f7bf46a7393414e
-
Filesize
216KB
MD5c5253b0ca657d8a8590270bc4e3fbefe
SHA176e5913d9b75467a6686673995429270ca75bc83
SHA2566d144aadbac3f169d06c0360fecfec31569af92c2442d3c29c3e9751f1fd0b08
SHA5128c9d77178b15d68f32a496b548e0fbe18956cce596c31fa69d400808f84b5ff4a9fe75c0d2a80e776d5e92605dee385803d05ad94f662d593517cd538790afa1
-
Filesize
216KB
MD5839f6066668386edc151f32274eeda31
SHA1e61d3fd728bee902c776eb9f492f0884cf5c4ad0
SHA256c1cb169511ac43e29c8366e5e5ad048cb02a20dd2ca2272a2a3c33d1be22069c
SHA5124adff71ce9826672b3d329e3fca06ac5caec8d3a3835af0e571a5223970c617eba2d0bced32beb78cd898edc6a9ec2e0d4e28bec0379aa823a9f6f01dd26a311
-
Filesize
216KB
MD5e9feef02fc331e0a8401a6bee453c50d
SHA148d2ad9133e72971ef24c26b153f2efeca6ee4c4
SHA256e2c467d370a8afbb15d17eb1c3c245fc4290573032f130cc69630fc3fe499d0f
SHA512ab10056bceec8220d8fd5009d589c6b7f9b36010b027a7625d30227c65ab23c005c442555d92957505433322e6fa1368d7dafd2534cf37a1b1cb72e0575a5768