Analysis
-
max time kernel
144s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe
-
Size
180KB
-
MD5
4a0acad2f7bc66e059ef52d3899c9f93
-
SHA1
d96a4a906b646ad937d950947a2bcc930c62c823
-
SHA256
49ee024e576c46fef32737e5d787ab61f1562fac8bcf09e16fa6535c16c8e240
-
SHA512
61d6cb6ff0087db65ec972728b86b119dd9410c1bc976d3d764a471b43f5863db17b3d4c2f511c538a793333603b441d2d44461f596878e55b4a1a61aebc9779
-
SSDEEP
3072:jEGh0o1lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG3l5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c00000001224c-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001231b-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001224c-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0037000000013a7f-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001224c-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001224c-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000001224c-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7134BA7C-FB0E-40ea-971A-8A78F7EB7E32}\stubpath = "C:\\Windows\\{7134BA7C-FB0E-40ea-971A-8A78F7EB7E32}.exe" {092A13D4-885F-4ce2-BE21-25D137154E87}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2ADF820B-B177-42ce-BF47-553BB6418692}\stubpath = "C:\\Windows\\{2ADF820B-B177-42ce-BF47-553BB6418692}.exe" {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6904874A-61A2-420a-8D6F-98B10FC84F68}\stubpath = "C:\\Windows\\{6904874A-61A2-420a-8D6F-98B10FC84F68}.exe" {2ADF820B-B177-42ce-BF47-553BB6418692}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{040DA7F6-D705-4555-9584-A7FF59DE5C70}\stubpath = "C:\\Windows\\{040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe" {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C017A41F-8B7F-441c-B81D-31C73B9716FC}\stubpath = "C:\\Windows\\{C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe" {A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7134BA7C-FB0E-40ea-971A-8A78F7EB7E32} {092A13D4-885F-4ce2-BE21-25D137154E87}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{092A13D4-885F-4ce2-BE21-25D137154E87}\stubpath = "C:\\Windows\\{092A13D4-885F-4ce2-BE21-25D137154E87}.exe" {C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B0A2BD93-5928-4d51-8599-06AED23B8153}\stubpath = "C:\\Windows\\{B0A2BD93-5928-4d51-8599-06AED23B8153}.exe" {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{040DA7F6-D705-4555-9584-A7FF59DE5C70} {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}\stubpath = "C:\\Windows\\{A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe" {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C017A41F-8B7F-441c-B81D-31C73B9716FC} {A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{092A13D4-885F-4ce2-BE21-25D137154E87} {C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E98E008A-9F77-4957-BD84-4DC8E35EA051} 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DBE4258-A498-483f-88B0-D5CDC8347671} {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DBE4258-A498-483f-88B0-D5CDC8347671}\stubpath = "C:\\Windows\\{3DBE4258-A498-483f-88B0-D5CDC8347671}.exe" {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6904874A-61A2-420a-8D6F-98B10FC84F68} {2ADF820B-B177-42ce-BF47-553BB6418692}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8ADC1FE-B463-4f75-B3C2-D4F1079808B0} {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E98E008A-9F77-4957-BD84-4DC8E35EA051}\stubpath = "C:\\Windows\\{E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe" 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{881557F1-304E-4ef5-914D-9A2E92E1A728} {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{881557F1-304E-4ef5-914D-9A2E92E1A728}\stubpath = "C:\\Windows\\{881557F1-304E-4ef5-914D-9A2E92E1A728}.exe" {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2ADF820B-B177-42ce-BF47-553BB6418692} {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B0A2BD93-5928-4d51-8599-06AED23B8153} {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe -
Deletes itself 1 IoCs
pid Process 2468 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2796 {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe 2760 {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe 2788 {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe 2128 {2ADF820B-B177-42ce-BF47-553BB6418692}.exe 2964 {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe 1584 {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe 1800 {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe 2660 {A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe 2088 {C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe 2808 {092A13D4-885F-4ce2-BE21-25D137154E87}.exe 1140 {7134BA7C-FB0E-40ea-971A-8A78F7EB7E32}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe {A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe File created C:\Windows\{092A13D4-885F-4ce2-BE21-25D137154E87}.exe {C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe File created C:\Windows\{881557F1-304E-4ef5-914D-9A2E92E1A728}.exe {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe File created C:\Windows\{B0A2BD93-5928-4d51-8599-06AED23B8153}.exe {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe File created C:\Windows\{040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe File created C:\Windows\{6904874A-61A2-420a-8D6F-98B10FC84F68}.exe {2ADF820B-B177-42ce-BF47-553BB6418692}.exe File created C:\Windows\{A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe File created C:\Windows\{7134BA7C-FB0E-40ea-971A-8A78F7EB7E32}.exe {092A13D4-885F-4ce2-BE21-25D137154E87}.exe File created C:\Windows\{E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe File created C:\Windows\{3DBE4258-A498-483f-88B0-D5CDC8347671}.exe {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe File created C:\Windows\{2ADF820B-B177-42ce-BF47-553BB6418692}.exe {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1320 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe Token: SeIncBasePriorityPrivilege 2796 {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe Token: SeIncBasePriorityPrivilege 2760 {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe Token: SeIncBasePriorityPrivilege 2788 {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe Token: SeIncBasePriorityPrivilege 2128 {2ADF820B-B177-42ce-BF47-553BB6418692}.exe Token: SeIncBasePriorityPrivilege 2964 {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe Token: SeIncBasePriorityPrivilege 1584 {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe Token: SeIncBasePriorityPrivilege 1800 {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe Token: SeIncBasePriorityPrivilege 2660 {A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe Token: SeIncBasePriorityPrivilege 2088 {C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe Token: SeIncBasePriorityPrivilege 2808 {092A13D4-885F-4ce2-BE21-25D137154E87}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2796 1320 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe 28 PID 1320 wrote to memory of 2796 1320 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe 28 PID 1320 wrote to memory of 2796 1320 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe 28 PID 1320 wrote to memory of 2796 1320 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe 28 PID 1320 wrote to memory of 2468 1320 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe 29 PID 1320 wrote to memory of 2468 1320 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe 29 PID 1320 wrote to memory of 2468 1320 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe 29 PID 1320 wrote to memory of 2468 1320 2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe 29 PID 2796 wrote to memory of 2760 2796 {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe 31 PID 2796 wrote to memory of 2760 2796 {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe 31 PID 2796 wrote to memory of 2760 2796 {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe 31 PID 2796 wrote to memory of 2760 2796 {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe 31 PID 2796 wrote to memory of 3020 2796 {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe 30 PID 2796 wrote to memory of 3020 2796 {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe 30 PID 2796 wrote to memory of 3020 2796 {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe 30 PID 2796 wrote to memory of 3020 2796 {E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe 30 PID 2760 wrote to memory of 2788 2760 {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe 33 PID 2760 wrote to memory of 2788 2760 {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe 33 PID 2760 wrote to memory of 2788 2760 {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe 33 PID 2760 wrote to memory of 2788 2760 {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe 33 PID 2760 wrote to memory of 2196 2760 {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe 32 PID 2760 wrote to memory of 2196 2760 {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe 32 PID 2760 wrote to memory of 2196 2760 {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe 32 PID 2760 wrote to memory of 2196 2760 {3DBE4258-A498-483f-88B0-D5CDC8347671}.exe 32 PID 2788 wrote to memory of 2128 2788 {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe 36 PID 2788 wrote to memory of 2128 2788 {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe 36 PID 2788 wrote to memory of 2128 2788 {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe 36 PID 2788 wrote to memory of 2128 2788 {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe 36 PID 2788 wrote to memory of 1980 2788 {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe 37 PID 2788 wrote to memory of 1980 2788 {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe 37 PID 2788 wrote to memory of 1980 2788 {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe 37 PID 2788 wrote to memory of 1980 2788 {881557F1-304E-4ef5-914D-9A2E92E1A728}.exe 37 PID 2128 wrote to memory of 2964 2128 {2ADF820B-B177-42ce-BF47-553BB6418692}.exe 39 PID 2128 wrote to memory of 2964 2128 {2ADF820B-B177-42ce-BF47-553BB6418692}.exe 39 PID 2128 wrote to memory of 2964 2128 {2ADF820B-B177-42ce-BF47-553BB6418692}.exe 39 PID 2128 wrote to memory of 2964 2128 {2ADF820B-B177-42ce-BF47-553BB6418692}.exe 39 PID 2128 wrote to memory of 2988 2128 {2ADF820B-B177-42ce-BF47-553BB6418692}.exe 38 PID 2128 wrote to memory of 2988 2128 {2ADF820B-B177-42ce-BF47-553BB6418692}.exe 38 PID 2128 wrote to memory of 2988 2128 {2ADF820B-B177-42ce-BF47-553BB6418692}.exe 38 PID 2128 wrote to memory of 2988 2128 {2ADF820B-B177-42ce-BF47-553BB6418692}.exe 38 PID 2964 wrote to memory of 1584 2964 {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe 40 PID 2964 wrote to memory of 1584 2964 {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe 40 PID 2964 wrote to memory of 1584 2964 {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe 40 PID 2964 wrote to memory of 1584 2964 {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe 40 PID 2964 wrote to memory of 1820 2964 {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe 41 PID 2964 wrote to memory of 1820 2964 {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe 41 PID 2964 wrote to memory of 1820 2964 {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe 41 PID 2964 wrote to memory of 1820 2964 {6904874A-61A2-420a-8D6F-98B10FC84F68}.exe 41 PID 1584 wrote to memory of 1800 1584 {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe 42 PID 1584 wrote to memory of 1800 1584 {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe 42 PID 1584 wrote to memory of 1800 1584 {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe 42 PID 1584 wrote to memory of 1800 1584 {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe 42 PID 1584 wrote to memory of 304 1584 {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe 43 PID 1584 wrote to memory of 304 1584 {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe 43 PID 1584 wrote to memory of 304 1584 {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe 43 PID 1584 wrote to memory of 304 1584 {B0A2BD93-5928-4d51-8599-06AED23B8153}.exe 43 PID 1800 wrote to memory of 2660 1800 {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe 44 PID 1800 wrote to memory of 2660 1800 {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe 44 PID 1800 wrote to memory of 2660 1800 {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe 44 PID 1800 wrote to memory of 2660 1800 {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe 44 PID 1800 wrote to memory of 2152 1800 {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe 45 PID 1800 wrote to memory of 2152 1800 {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe 45 PID 1800 wrote to memory of 2152 1800 {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe 45 PID 1800 wrote to memory of 2152 1800 {040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\{E98E008A-9F77-4957-BD84-4DC8E35EA051}.exeC:\Windows\{E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E98E0~1.EXE > nul3⤵PID:3020
-
-
C:\Windows\{3DBE4258-A498-483f-88B0-D5CDC8347671}.exeC:\Windows\{3DBE4258-A498-483f-88B0-D5CDC8347671}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3DBE4~1.EXE > nul4⤵PID:2196
-
-
C:\Windows\{881557F1-304E-4ef5-914D-9A2E92E1A728}.exeC:\Windows\{881557F1-304E-4ef5-914D-9A2E92E1A728}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\{2ADF820B-B177-42ce-BF47-553BB6418692}.exeC:\Windows\{2ADF820B-B177-42ce-BF47-553BB6418692}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2ADF8~1.EXE > nul6⤵PID:2988
-
-
C:\Windows\{6904874A-61A2-420a-8D6F-98B10FC84F68}.exeC:\Windows\{6904874A-61A2-420a-8D6F-98B10FC84F68}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\{B0A2BD93-5928-4d51-8599-06AED23B8153}.exeC:\Windows\{B0A2BD93-5928-4d51-8599-06AED23B8153}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\{040DA7F6-D705-4555-9584-A7FF59DE5C70}.exeC:\Windows\{040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\{A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exeC:\Windows\{A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\{C017A41F-8B7F-441c-B81D-31C73B9716FC}.exeC:\Windows\{C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\{092A13D4-885F-4ce2-BE21-25D137154E87}.exeC:\Windows\{092A13D4-885F-4ce2-BE21-25D137154E87}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Windows\{7134BA7C-FB0E-40ea-971A-8A78F7EB7E32}.exeC:\Windows\{7134BA7C-FB0E-40ea-971A-8A78F7EB7E32}.exe12⤵
- Executes dropped EXE
PID:1140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{092A1~1.EXE > nul12⤵PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C017A~1.EXE > nul11⤵PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8ADC~1.EXE > nul10⤵PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{040DA~1.EXE > nul9⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B0A2B~1.EXE > nul8⤵PID:304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69048~1.EXE > nul7⤵PID:1820
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{88155~1.EXE > nul5⤵PID:1980
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5c60c773a609734aa91bb9a6d62b2fb94
SHA1a6d805954576600ade91bd03309f7755d7122aa5
SHA256faa9ec3dfe30bd084ee43545ba936f56802cb8df15d21bfa0e47ab719ddd2f7e
SHA5123f603da0e8a4251b3923516d6a6693dca2ff61033208b246e9e5dfb2161d59bef3a7c3ecff2ebfde20ddda8a31d03af4183f3341535a1c4870546820bb0f0e10
-
Filesize
180KB
MD55d4410264a47b9c3263720da33c65b0b
SHA174192877a347e4dd6f2035e264ef9e15efc12960
SHA25612177334ef4c6075228650fbb8ffecd7120988cedd63de2544694f7442661f15
SHA51291d5567a6b0de830640474f7f68702a5a95bdb40a8b2b78085c6f1467a472cc24c8ad5674470eabf1e7c8ec403b127f716a775e9c7387c2eb779185f9b7dd725
-
Filesize
180KB
MD5035ba0f80460700b68455b681e809704
SHA1998bcbf905fbdca0f1171c799d5436ca665604f4
SHA2565149fb0b745e857b56eed562bbc15641ba108a6c7d45b8e6ff73a9de543553aa
SHA5124ec86cc4a8dfdb35719c717e30445867d173f2088f69bfaaf7e6e32c16885254d0587e697d6a64601af13c00072860a220f431dd4dcf69c29f99e3b5db75f2a4
-
Filesize
180KB
MD5ca90b33421cbf298b056e0e2951246d7
SHA10d7de80d1f6bcabdf6c1bb218cf7ea32cebf0f5e
SHA256e7b623e1ca2a7c0c72dc0fb9aa1e71f3b01d48a85b2ebff73fac3624ad6ad7cc
SHA51271831cf4e7852da393d8797af49746699aa611a6dc67d5b01e47c21b0e4e8cb261e21eeea4870b9416c935a2b55e92c0b909182cc9a0a3ad4bd733dd1cd7f9b7
-
Filesize
180KB
MD586176338d8d92a3c7592b9228288f490
SHA1f0f26aa0a9689252cc2bbeeb221ef6cdc2a57bc9
SHA256caf1ff1e22230cc3bfa06e8c43ec27840e37ce47445de158a2d5b9b2e4f56133
SHA51209a0f207d06672eac1140d5744a14b8ee27d3ca98eda06a46f807f69429906b1419bb4d670e76ff7122ba24d2111c9683042460c9c89a68ccdbef8df22be1df0
-
Filesize
180KB
MD55b80c1fd9164db90b4010a5d6545eb78
SHA155759e956a931ff61bbfa55dcb1d00bf291f5123
SHA256b27df07315298a7e169ca8bb6df35bab86b0d391f3898fe9c06b168486a64f65
SHA512bf6e10534084b39673859a16db8c2fb9ccc5b9a54357840f60184cf0c3f940af2082a1c22c58194cc6c41d526752798355e33f05099f4c32e0926f18aa006e98
-
Filesize
180KB
MD55d27e0424f7dc55f103a6557ff3c6772
SHA1cfc7801f68bd3c62752b660b1096081dc03ae15e
SHA25669f34cc9bd7a518f4a2ecea4c57810331736d3d2567efc34174787210c80838e
SHA512c4cfd146fc9ed8f059cae747f6298cd28ffca17b9aa0d9a16f1e09c33e21673733159730f8e99f0a2a826287856384829b09cd7f663008fdef4390dd45d952b1
-
Filesize
180KB
MD576dcde492d3f6e0d0c5c2604dd8142db
SHA15fb5fe5643679fd39837205601a9547ee2a386be
SHA256d429f06df214b8aeed1004b20a275fd67b9fa3299bc860eeaa1a69553b85dfbe
SHA512505ff60da925a2adf6c641d38180a4e4abdd38107704592f31fdb53935ad38d420053db8febf28bdf45cddffefb790f285ee5c25c3c4616fab433657188c5d8d
-
Filesize
180KB
MD50e957ec954ab884dfaced477a46add91
SHA10e22894979f37d2b13fc12686cf2a39bde54d8a7
SHA25660ccda1f71748b9bf1639ff2a00a14620ea6658df796dfd48d140a3a990cfde6
SHA5122c66b69f7b710bd1cd197f943db2c4650fb1c0c4873cf49eb9ed2c83c685def71a12a2d294cfbebf213ddf6fbb0caedf327dd6bd8fa82121211ae5f992b43265
-
Filesize
180KB
MD5cd465a64272d1a93ff3ae2c54e18d838
SHA1525f73e8fe411f9ce218b4e58f4c55e578778cf9
SHA2560100952883f7ec8e5290b4ca8ca4d8ef65b818cc804831c5d9bc79b9ea8350b7
SHA5126384b3bff2fa88c3dfee33c12fb7b53525e99e564be2aed8bc6944a9258af23a7bf93cfbb7982a87391e246be36e68894b993361039791a93dd09eae64594bac
-
Filesize
180KB
MD5aea25071ecc31826573cdbf47eefc66d
SHA1f1f9a792473d3ade01442d36170f51fae1138008
SHA256bd6f3c24c0a5472a593f527489bb0765a9b65b7bc0d7eb63e945fd76c7b530d4
SHA512b3932946ac916c4a86331f12318a99f809b03ef126dce86de66f835edf81aabe01e544ec9292b37b0d8840748658d8da8c79902365260f4d78b0edfbddce93ea