Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe
-
Size
408KB
-
MD5
3e21e43241c2979bab9ed04c77d3e8cd
-
SHA1
00af89e1fb175b1de3eae77baf3930a69f1d6784
-
SHA256
dcffb6dfdcdacfaa5830a04aaa3299a086e99eee43dd57805ae2b2d0b78fb9d7
-
SHA512
bb4d00e93a5ffb684be2fd5965a4fcdc978654e9de248fd5e3ccfe0acac4b42e92dd984315510c16de8cc58d29c13634e4e36ba2ad65f416f3517035d7df5d59
-
SSDEEP
3072:CEGh0ohl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGfldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000b00000001224e-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000015cb3-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c00000001224e-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0038000000015d2f-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001224e-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001224e-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001224e-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9F4A10FD-3669-4794-9346-2525B1B877FB} {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70D1CAC8-121C-4001-AA72-828218D15DA5} {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34B22196-B4EA-4ea0-AFB9-7F102CAFE314}\stubpath = "C:\\Windows\\{34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe" {A19468DE-4A1D-430d-B936-D3F61186A622}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84489D00-E04F-4250-A8B7-2E4DE6D5D0A7} {91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81841C49-18A1-47c4-AABD-290C43F7CF23} 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9F4A10FD-3669-4794-9346-2525B1B877FB}\stubpath = "C:\\Windows\\{9F4A10FD-3669-4794-9346-2525B1B877FB}.exe" {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A19468DE-4A1D-430d-B936-D3F61186A622} {F9F96481-578D-43f7-9C61-87359EA0F269}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{645DFEDC-7EB5-4869-831C-F7965A64F67C} {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{645DFEDC-7EB5-4869-831C-F7965A64F67C}\stubpath = "C:\\Windows\\{645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe" {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81841C49-18A1-47c4-AABD-290C43F7CF23}\stubpath = "C:\\Windows\\{81841C49-18A1-47c4-AABD-290C43F7CF23}.exe" 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}\stubpath = "C:\\Windows\\{93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe" {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70D1CAC8-121C-4001-AA72-828218D15DA5}\stubpath = "C:\\Windows\\{70D1CAC8-121C-4001-AA72-828218D15DA5}.exe" {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9F96481-578D-43f7-9C61-87359EA0F269} {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9F96481-578D-43f7-9C61-87359EA0F269}\stubpath = "C:\\Windows\\{F9F96481-578D-43f7-9C61-87359EA0F269}.exe" {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A19468DE-4A1D-430d-B936-D3F61186A622}\stubpath = "C:\\Windows\\{A19468DE-4A1D-430d-B936-D3F61186A622}.exe" {F9F96481-578D-43f7-9C61-87359EA0F269}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34B22196-B4EA-4ea0-AFB9-7F102CAFE314} {A19468DE-4A1D-430d-B936-D3F61186A622}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}\stubpath = "C:\\Windows\\{84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe" {91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B3F9359-DA07-48ed-97B1-842C8787DDFD} {84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93E30C28-3B0E-4ecc-BB1A-AA748F1577AE} {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91ABB085-3D9E-48a8-89EE-B2228E7ADFDF} {645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}\stubpath = "C:\\Windows\\{91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe" {645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B3F9359-DA07-48ed-97B1-842C8787DDFD}\stubpath = "C:\\Windows\\{7B3F9359-DA07-48ed-97B1-842C8787DDFD}.exe" {84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe -
Executes dropped EXE 11 IoCs
pid Process 2224 {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe 2840 {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe 2732 {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe 2872 {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe 2436 {F9F96481-578D-43f7-9C61-87359EA0F269}.exe 1628 {A19468DE-4A1D-430d-B936-D3F61186A622}.exe 2860 {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe 1420 {645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe 1320 {91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe 684 {84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe 1780 {7B3F9359-DA07-48ed-97B1-842C8787DDFD}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{9F4A10FD-3669-4794-9346-2525B1B877FB}.exe {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe File created C:\Windows\{93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe File created C:\Windows\{F9F96481-578D-43f7-9C61-87359EA0F269}.exe {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe File created C:\Windows\{A19468DE-4A1D-430d-B936-D3F61186A622}.exe {F9F96481-578D-43f7-9C61-87359EA0F269}.exe File created C:\Windows\{91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe {645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe File created C:\Windows\{84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe {91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe File created C:\Windows\{81841C49-18A1-47c4-AABD-290C43F7CF23}.exe 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe File created C:\Windows\{70D1CAC8-121C-4001-AA72-828218D15DA5}.exe {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe File created C:\Windows\{34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe {A19468DE-4A1D-430d-B936-D3F61186A622}.exe File created C:\Windows\{645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe File created C:\Windows\{7B3F9359-DA07-48ed-97B1-842C8787DDFD}.exe {84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2144 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe Token: SeIncBasePriorityPrivilege 2224 {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe Token: SeIncBasePriorityPrivilege 2840 {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe Token: SeIncBasePriorityPrivilege 2732 {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe Token: SeIncBasePriorityPrivilege 2872 {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe Token: SeIncBasePriorityPrivilege 2436 {F9F96481-578D-43f7-9C61-87359EA0F269}.exe Token: SeIncBasePriorityPrivilege 1628 {A19468DE-4A1D-430d-B936-D3F61186A622}.exe Token: SeIncBasePriorityPrivilege 2860 {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe Token: SeIncBasePriorityPrivilege 1420 {645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe Token: SeIncBasePriorityPrivilege 1320 {91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe Token: SeIncBasePriorityPrivilege 684 {84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2224 2144 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe 28 PID 2144 wrote to memory of 2224 2144 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe 28 PID 2144 wrote to memory of 2224 2144 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe 28 PID 2144 wrote to memory of 2224 2144 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe 28 PID 2144 wrote to memory of 2772 2144 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe 29 PID 2144 wrote to memory of 2772 2144 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe 29 PID 2144 wrote to memory of 2772 2144 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe 29 PID 2144 wrote to memory of 2772 2144 2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe 29 PID 2224 wrote to memory of 2840 2224 {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe 31 PID 2224 wrote to memory of 2840 2224 {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe 31 PID 2224 wrote to memory of 2840 2224 {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe 31 PID 2224 wrote to memory of 2840 2224 {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe 31 PID 2224 wrote to memory of 2684 2224 {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe 30 PID 2224 wrote to memory of 2684 2224 {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe 30 PID 2224 wrote to memory of 2684 2224 {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe 30 PID 2224 wrote to memory of 2684 2224 {81841C49-18A1-47c4-AABD-290C43F7CF23}.exe 30 PID 2840 wrote to memory of 2732 2840 {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe 33 PID 2840 wrote to memory of 2732 2840 {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe 33 PID 2840 wrote to memory of 2732 2840 {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe 33 PID 2840 wrote to memory of 2732 2840 {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe 33 PID 2840 wrote to memory of 2620 2840 {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe 32 PID 2840 wrote to memory of 2620 2840 {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe 32 PID 2840 wrote to memory of 2620 2840 {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe 32 PID 2840 wrote to memory of 2620 2840 {9F4A10FD-3669-4794-9346-2525B1B877FB}.exe 32 PID 2732 wrote to memory of 2872 2732 {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe 37 PID 2732 wrote to memory of 2872 2732 {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe 37 PID 2732 wrote to memory of 2872 2732 {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe 37 PID 2732 wrote to memory of 2872 2732 {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe 37 PID 2732 wrote to memory of 2908 2732 {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe 36 PID 2732 wrote to memory of 2908 2732 {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe 36 PID 2732 wrote to memory of 2908 2732 {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe 36 PID 2732 wrote to memory of 2908 2732 {93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe 36 PID 2872 wrote to memory of 2436 2872 {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe 38 PID 2872 wrote to memory of 2436 2872 {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe 38 PID 2872 wrote to memory of 2436 2872 {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe 38 PID 2872 wrote to memory of 2436 2872 {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe 38 PID 2872 wrote to memory of 1604 2872 {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe 39 PID 2872 wrote to memory of 1604 2872 {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe 39 PID 2872 wrote to memory of 1604 2872 {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe 39 PID 2872 wrote to memory of 1604 2872 {70D1CAC8-121C-4001-AA72-828218D15DA5}.exe 39 PID 2436 wrote to memory of 1628 2436 {F9F96481-578D-43f7-9C61-87359EA0F269}.exe 41 PID 2436 wrote to memory of 1628 2436 {F9F96481-578D-43f7-9C61-87359EA0F269}.exe 41 PID 2436 wrote to memory of 1628 2436 {F9F96481-578D-43f7-9C61-87359EA0F269}.exe 41 PID 2436 wrote to memory of 1628 2436 {F9F96481-578D-43f7-9C61-87359EA0F269}.exe 41 PID 2436 wrote to memory of 1344 2436 {F9F96481-578D-43f7-9C61-87359EA0F269}.exe 40 PID 2436 wrote to memory of 1344 2436 {F9F96481-578D-43f7-9C61-87359EA0F269}.exe 40 PID 2436 wrote to memory of 1344 2436 {F9F96481-578D-43f7-9C61-87359EA0F269}.exe 40 PID 2436 wrote to memory of 1344 2436 {F9F96481-578D-43f7-9C61-87359EA0F269}.exe 40 PID 1628 wrote to memory of 2860 1628 {A19468DE-4A1D-430d-B936-D3F61186A622}.exe 43 PID 1628 wrote to memory of 2860 1628 {A19468DE-4A1D-430d-B936-D3F61186A622}.exe 43 PID 1628 wrote to memory of 2860 1628 {A19468DE-4A1D-430d-B936-D3F61186A622}.exe 43 PID 1628 wrote to memory of 2860 1628 {A19468DE-4A1D-430d-B936-D3F61186A622}.exe 43 PID 1628 wrote to memory of 2876 1628 {A19468DE-4A1D-430d-B936-D3F61186A622}.exe 42 PID 1628 wrote to memory of 2876 1628 {A19468DE-4A1D-430d-B936-D3F61186A622}.exe 42 PID 1628 wrote to memory of 2876 1628 {A19468DE-4A1D-430d-B936-D3F61186A622}.exe 42 PID 1628 wrote to memory of 2876 1628 {A19468DE-4A1D-430d-B936-D3F61186A622}.exe 42 PID 2860 wrote to memory of 1420 2860 {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe 44 PID 2860 wrote to memory of 1420 2860 {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe 44 PID 2860 wrote to memory of 1420 2860 {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe 44 PID 2860 wrote to memory of 1420 2860 {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe 44 PID 2860 wrote to memory of 1268 2860 {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe 45 PID 2860 wrote to memory of 1268 2860 {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe 45 PID 2860 wrote to memory of 1268 2860 {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe 45 PID 2860 wrote to memory of 1268 2860 {34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\{81841C49-18A1-47c4-AABD-290C43F7CF23}.exeC:\Windows\{81841C49-18A1-47c4-AABD-290C43F7CF23}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81841~1.EXE > nul3⤵PID:2684
-
-
C:\Windows\{9F4A10FD-3669-4794-9346-2525B1B877FB}.exeC:\Windows\{9F4A10FD-3669-4794-9346-2525B1B877FB}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9F4A1~1.EXE > nul4⤵PID:2620
-
-
C:\Windows\{93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exeC:\Windows\{93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{93E30~1.EXE > nul5⤵PID:2908
-
-
C:\Windows\{70D1CAC8-121C-4001-AA72-828218D15DA5}.exeC:\Windows\{70D1CAC8-121C-4001-AA72-828218D15DA5}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{F9F96481-578D-43f7-9C61-87359EA0F269}.exeC:\Windows\{F9F96481-578D-43f7-9C61-87359EA0F269}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9F96~1.EXE > nul7⤵PID:1344
-
-
C:\Windows\{A19468DE-4A1D-430d-B936-D3F61186A622}.exeC:\Windows\{A19468DE-4A1D-430d-B936-D3F61186A622}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1946~1.EXE > nul8⤵PID:2876
-
-
C:\Windows\{34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exeC:\Windows\{34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\{645DFEDC-7EB5-4869-831C-F7965A64F67C}.exeC:\Windows\{645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{645DF~1.EXE > nul10⤵PID:1972
-
-
C:\Windows\{91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exeC:\Windows\{91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
C:\Windows\{84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exeC:\Windows\{84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{84489~1.EXE > nul12⤵PID:1708
-
-
C:\Windows\{7B3F9359-DA07-48ed-97B1-842C8787DDFD}.exeC:\Windows\{7B3F9359-DA07-48ed-97B1-842C8787DDFD}.exe12⤵
- Executes dropped EXE
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{91ABB~1.EXE > nul11⤵PID:892
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34B22~1.EXE > nul9⤵PID:1268
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70D1C~1.EXE > nul6⤵PID:1604
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD590e1d9da389c2863b37827fa9b0fb981
SHA136185511315868861f0de9bc75f2b3b282979dfd
SHA2564f0abef16dde83209046e2c50e1d9653f4b855970c2110e2235c93c7de52056e
SHA512878081510a8290dbfeb8bef78dadb6e34c80e3a4cadef47e3a46deff95e63f77b75f6ce34f860389e9574970014a336ab472ba1f6166e756005c8ce2ebb91c90
-
Filesize
408KB
MD558e89d5bec81894e461021ee2f4d2070
SHA12d8692b74a4873d4f97d1f9096026800d651a99f
SHA256d2a0915f42a092fac3d7bfddb234515c99f1d6d6000af35a2faf2fd71e561fc5
SHA512b4f4ef2670e1b2dd01c65ee2867cbf0921a9a8e7f6e77da51f8e37c63c34294080d1089cc240e312d708b0d041afe46f3d6c917ec461b59c2456c4d0b287803f
-
Filesize
408KB
MD5fc86426bd8f7607e7ced690ae700f705
SHA1f3e5eefaa2c83e4fd21429c176a1f5da02e7d89c
SHA256cb48e96f08b43857efeda49fa148689a6ea28cce3237d8074b8bec1171e2ae85
SHA512d8444412aafad811e3e393cff763f76026d7eb2fd78a47ef20200587dca0c1ffe9b2110070dfbcb89ca302bbb399b15222f3ad486f0609af43766b77233b7b90
-
Filesize
408KB
MD5e19197af6b02ee8cde062cc91291f578
SHA18dd5aab3f551cc769873fcfb5b3fa222f31d3945
SHA25613a5ae64232b26da44514629ded84ae936aec9fc925ac8365ce76f10d95f1013
SHA5122fab5bfbb3ae8fd36c1a8047f229bbde25b7d191adcc4c50aeef971bba450880474b36aa02d4d70fb39eb97de95b64f936b93dc0f12274a6cde9553d3736dbff
-
Filesize
408KB
MD511de01f50636e43fc5aaf75651a42adb
SHA129a743366562e32d9c81d5e8a8da42d03a951f2c
SHA256a04a44532b065a65a1081af88a315b9929f629274bff6c75d73d0b651a078f2e
SHA5126c32e97e09b5ffb4da2050f0c3316ac985910cf03e7669a31431063164d7e22abb72ec0cff454b1f6e31a58bc6009b22ef85bca4e3be50b01c29ece1bad41516
-
Filesize
408KB
MD522d4ecfacca2fe8b752e7757bd5406b2
SHA13eba64fe403df21bacc6dcf0b1c3b8e1c67d0f73
SHA2566fe4d12848f989badbc04a1ff67631bd1801469e565251c19635b0339e5699ab
SHA512252ab2c93a2ee2e9350658fd23bf8038ae7b096c1644db0087de1682044a506118fc0e6706afffb9f45c3e317e1fb03bc0399eb5854804b5e989aba0d651db2c
-
Filesize
408KB
MD5f741b41bc09c46ffe0d31995d52b94c6
SHA1d454899b87f3c2da63c9c00b01b52923eb030306
SHA256e291f873b246208096eb0411a3583570a91fbb403bc2b172c219f2ff9815c101
SHA512f16cd05e9c91d25670f7a423dacc4beb3727e111a15ed5b1702d09f63821ba9b7df7d99e65ab3f5cf35ecd19ecc892b899886d7539b49289dcb99defee375bf1
-
Filesize
408KB
MD57ed0c5a0c6f51d7461f23ebb46fb3f1c
SHA1e6a34e43e08fa06fcb52217ccf7ea3da8327df28
SHA25629f252ef6be166f37ec7eb0d968244c30f4360b2551fb466da86d9a2c579538d
SHA51223702b02a97d11915d1c6bcf955b492db6991a581bcdd1b18cd804ff0b01aaa69a2f01848eeb3f87a61cff7d2406e0c7a2ca150520b1154405a07862a1e540cd
-
Filesize
408KB
MD5961969d12110348d4c79857dee7786cb
SHA1e636d4240e8d7bbad9ad881706c0ae14019abe70
SHA2569d00e10a1d42949d13982b6eaf6bafe3d674402821e2ddff58c74c00a1cbe3d3
SHA512f101626576a72c7259011ba61d42edf2d5998a88b56108e3713c43a14377a1ba97012a9ce54f0d91ca0527b51f61b9ce5eb02a5c5effa2dd2e065614f03a021c
-
Filesize
408KB
MD53de6eec7bfb4c96d5796d38cda76eb13
SHA119d62a7848b55f63d2eb313e3f6a813ed329e7d0
SHA2566b62a73e8ca8d88d817e694e5b123a9df5005cf4f83cf14682d1fe465c8afde9
SHA512a762454e51d158a879d6f283e3b5e799c7b418e406ddb57f874f5313d113ed04ec544e1d1592780651ca54c5b0c641c2b8b6fc7c54a30b9fe7affa738d795d4d
-
Filesize
408KB
MD53be38f7a71cab9b7bc6bd548c217bda5
SHA10efd18e6ebee96a450fd68f5620bc5f0e8b2b391
SHA25655744285e55eaa3cb57a6a24354a01ad3e09a9eab2ecef10044ecd9b68fb6818
SHA51219c1621ff326285cec01c6fc3ff5836b44297f1ac85127b7a5ccba20ee6959cf0e2aa312725972fe871e3b4173f0bdadf086b31753bf93db39d09a3d242b8127