Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe
-
Size
168KB
-
MD5
5b565c5ea920a1012aff194d0970473a
-
SHA1
bec133f194b20f3129a7c2dfbe0f770d1da74433
-
SHA256
35b55f6af4ff536fbf252954356cb8a78dc07aa681ddae455095969dcf7830d3
-
SHA512
6fc4738d695cbed95aa136bf8452cf633e663d9f508819dedb3f99e4cdd3b87689b65ffc5a016bc1f96871b2c87ce3253bdbb1da1be7fb8c5359a333bf1e4ed3
-
SSDEEP
1536:1EGh0oglq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oglqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x0007000000012284-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e0000000122ec-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000012284-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000012284-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000012284-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000012284-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012284-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A32099B6-7D0E-4e66-BF02-C601F0098B72}\stubpath = "C:\\Windows\\{A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe" {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFAD5316-5495-452c-8134-15DC40D85B00}\stubpath = "C:\\Windows\\{CFAD5316-5495-452c-8134-15DC40D85B00}.exe" {AF3D909D-6B6D-4df2-9A78-961E706BBFD6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0648DA6A-523E-486a-A10B-A1E9366B9B70}\stubpath = "C:\\Windows\\{0648DA6A-523E-486a-A10B-A1E9366B9B70}.exe" {CFAD5316-5495-452c-8134-15DC40D85B00}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC0FFECB-1E80-415b-A811-02800123707E}\stubpath = "C:\\Windows\\{FC0FFECB-1E80-415b-A811-02800123707E}.exe" {0648DA6A-523E-486a-A10B-A1E9366B9B70}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CA7BA42F-8294-4f0d-86B1-5D183DD662FC} 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EA70D90-E0B6-4387-BE11-D210DA816A3F} {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4A093FF-FE48-4936-A2BD-FC2545C9E1E9} {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EA70D90-E0B6-4387-BE11-D210DA816A3F}\stubpath = "C:\\Windows\\{7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe" {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A32099B6-7D0E-4e66-BF02-C601F0098B72} {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D545307-9F2C-47d7-9A77-80318025B68D} {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D545307-9F2C-47d7-9A77-80318025B68D}\stubpath = "C:\\Windows\\{3D545307-9F2C-47d7-9A77-80318025B68D}.exe" {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AC9B01C7-34AF-4cae-B818-4C46ACEE9000}\stubpath = "C:\\Windows\\{AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe" {3D545307-9F2C-47d7-9A77-80318025B68D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CA7BA42F-8294-4f0d-86B1-5D183DD662FC}\stubpath = "C:\\Windows\\{CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe" 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BF1183EE-89DA-41a6-90E9-CA5737AC8EF7} {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}\stubpath = "C:\\Windows\\{BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe" {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF3D909D-6B6D-4df2-9A78-961E706BBFD6}\stubpath = "C:\\Windows\\{AF3D909D-6B6D-4df2-9A78-961E706BBFD6}.exe" {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFAD5316-5495-452c-8134-15DC40D85B00} {AF3D909D-6B6D-4df2-9A78-961E706BBFD6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0648DA6A-523E-486a-A10B-A1E9366B9B70} {CFAD5316-5495-452c-8134-15DC40D85B00}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC0FFECB-1E80-415b-A811-02800123707E} {0648DA6A-523E-486a-A10B-A1E9366B9B70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}\stubpath = "C:\\Windows\\{C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe" {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AC9B01C7-34AF-4cae-B818-4C46ACEE9000} {3D545307-9F2C-47d7-9A77-80318025B68D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF3D909D-6B6D-4df2-9A78-961E706BBFD6} {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe -
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2700 {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe 2780 {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe 2760 {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe 2988 {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe 2032 {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe 1528 {3D545307-9F2C-47d7-9A77-80318025B68D}.exe 2952 {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe 1148 {AF3D909D-6B6D-4df2-9A78-961E706BBFD6}.exe 1764 {CFAD5316-5495-452c-8134-15DC40D85B00}.exe 2956 {0648DA6A-523E-486a-A10B-A1E9366B9B70}.exe 1864 {FC0FFECB-1E80-415b-A811-02800123707E}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{0648DA6A-523E-486a-A10B-A1E9366B9B70}.exe {CFAD5316-5495-452c-8134-15DC40D85B00}.exe File created C:\Windows\{BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe File created C:\Windows\{7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe File created C:\Windows\{A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe File created C:\Windows\{3D545307-9F2C-47d7-9A77-80318025B68D}.exe {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe File created C:\Windows\{AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe {3D545307-9F2C-47d7-9A77-80318025B68D}.exe File created C:\Windows\{CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe File created C:\Windows\{C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe File created C:\Windows\{AF3D909D-6B6D-4df2-9A78-961E706BBFD6}.exe {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe File created C:\Windows\{CFAD5316-5495-452c-8134-15DC40D85B00}.exe {AF3D909D-6B6D-4df2-9A78-961E706BBFD6}.exe File created C:\Windows\{FC0FFECB-1E80-415b-A811-02800123707E}.exe {0648DA6A-523E-486a-A10B-A1E9366B9B70}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2868 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe Token: SeIncBasePriorityPrivilege 2700 {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe Token: SeIncBasePriorityPrivilege 2780 {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe Token: SeIncBasePriorityPrivilege 2760 {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe Token: SeIncBasePriorityPrivilege 2988 {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe Token: SeIncBasePriorityPrivilege 2032 {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe Token: SeIncBasePriorityPrivilege 1528 {3D545307-9F2C-47d7-9A77-80318025B68D}.exe Token: SeIncBasePriorityPrivilege 2952 {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe Token: SeIncBasePriorityPrivilege 1148 {AF3D909D-6B6D-4df2-9A78-961E706BBFD6}.exe Token: SeIncBasePriorityPrivilege 1764 {CFAD5316-5495-452c-8134-15DC40D85B00}.exe Token: SeIncBasePriorityPrivilege 2956 {0648DA6A-523E-486a-A10B-A1E9366B9B70}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2700 2868 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe 28 PID 2868 wrote to memory of 2700 2868 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe 28 PID 2868 wrote to memory of 2700 2868 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe 28 PID 2868 wrote to memory of 2700 2868 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe 28 PID 2868 wrote to memory of 2804 2868 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe 29 PID 2868 wrote to memory of 2804 2868 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe 29 PID 2868 wrote to memory of 2804 2868 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe 29 PID 2868 wrote to memory of 2804 2868 2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe 29 PID 2700 wrote to memory of 2780 2700 {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe 30 PID 2700 wrote to memory of 2780 2700 {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe 30 PID 2700 wrote to memory of 2780 2700 {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe 30 PID 2700 wrote to memory of 2780 2700 {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe 30 PID 2700 wrote to memory of 2864 2700 {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe 31 PID 2700 wrote to memory of 2864 2700 {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe 31 PID 2700 wrote to memory of 2864 2700 {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe 31 PID 2700 wrote to memory of 2864 2700 {CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe 31 PID 2780 wrote to memory of 2760 2780 {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe 33 PID 2780 wrote to memory of 2760 2780 {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe 33 PID 2780 wrote to memory of 2760 2780 {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe 33 PID 2780 wrote to memory of 2760 2780 {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe 33 PID 2780 wrote to memory of 1628 2780 {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe 32 PID 2780 wrote to memory of 1628 2780 {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe 32 PID 2780 wrote to memory of 1628 2780 {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe 32 PID 2780 wrote to memory of 1628 2780 {BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe 32 PID 2760 wrote to memory of 2988 2760 {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe 36 PID 2760 wrote to memory of 2988 2760 {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe 36 PID 2760 wrote to memory of 2988 2760 {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe 36 PID 2760 wrote to memory of 2988 2760 {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe 36 PID 2760 wrote to memory of 2100 2760 {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe 37 PID 2760 wrote to memory of 2100 2760 {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe 37 PID 2760 wrote to memory of 2100 2760 {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe 37 PID 2760 wrote to memory of 2100 2760 {7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe 37 PID 2988 wrote to memory of 2032 2988 {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe 38 PID 2988 wrote to memory of 2032 2988 {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe 38 PID 2988 wrote to memory of 2032 2988 {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe 38 PID 2988 wrote to memory of 2032 2988 {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe 38 PID 2988 wrote to memory of 2120 2988 {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe 39 PID 2988 wrote to memory of 2120 2988 {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe 39 PID 2988 wrote to memory of 2120 2988 {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe 39 PID 2988 wrote to memory of 2120 2988 {C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe 39 PID 2032 wrote to memory of 1528 2032 {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe 40 PID 2032 wrote to memory of 1528 2032 {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe 40 PID 2032 wrote to memory of 1528 2032 {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe 40 PID 2032 wrote to memory of 1528 2032 {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe 40 PID 2032 wrote to memory of 2652 2032 {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe 41 PID 2032 wrote to memory of 2652 2032 {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe 41 PID 2032 wrote to memory of 2652 2032 {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe 41 PID 2032 wrote to memory of 2652 2032 {A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe 41 PID 1528 wrote to memory of 2952 1528 {3D545307-9F2C-47d7-9A77-80318025B68D}.exe 43 PID 1528 wrote to memory of 2952 1528 {3D545307-9F2C-47d7-9A77-80318025B68D}.exe 43 PID 1528 wrote to memory of 2952 1528 {3D545307-9F2C-47d7-9A77-80318025B68D}.exe 43 PID 1528 wrote to memory of 2952 1528 {3D545307-9F2C-47d7-9A77-80318025B68D}.exe 43 PID 1528 wrote to memory of 2680 1528 {3D545307-9F2C-47d7-9A77-80318025B68D}.exe 42 PID 1528 wrote to memory of 2680 1528 {3D545307-9F2C-47d7-9A77-80318025B68D}.exe 42 PID 1528 wrote to memory of 2680 1528 {3D545307-9F2C-47d7-9A77-80318025B68D}.exe 42 PID 1528 wrote to memory of 2680 1528 {3D545307-9F2C-47d7-9A77-80318025B68D}.exe 42 PID 2952 wrote to memory of 1148 2952 {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe 45 PID 2952 wrote to memory of 1148 2952 {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe 45 PID 2952 wrote to memory of 1148 2952 {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe 45 PID 2952 wrote to memory of 1148 2952 {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe 45 PID 2952 wrote to memory of 1368 2952 {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe 44 PID 2952 wrote to memory of 1368 2952 {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe 44 PID 2952 wrote to memory of 1368 2952 {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe 44 PID 2952 wrote to memory of 1368 2952 {AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_5b565c5ea920a1012aff194d0970473a_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\{CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exeC:\Windows\{CA7BA42F-8294-4f0d-86B1-5D183DD662FC}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\{BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exeC:\Windows\{BF1183EE-89DA-41a6-90E9-CA5737AC8EF7}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BF118~1.EXE > nul4⤵PID:1628
-
-
C:\Windows\{7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exeC:\Windows\{7EA70D90-E0B6-4387-BE11-D210DA816A3F}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\{C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exeC:\Windows\{C4A093FF-FE48-4936-A2BD-FC2545C9E1E9}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\{A32099B6-7D0E-4e66-BF02-C601F0098B72}.exeC:\Windows\{A32099B6-7D0E-4e66-BF02-C601F0098B72}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\{3D545307-9F2C-47d7-9A77-80318025B68D}.exeC:\Windows\{3D545307-9F2C-47d7-9A77-80318025B68D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3D545~1.EXE > nul8⤵PID:2680
-
-
C:\Windows\{AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exeC:\Windows\{AC9B01C7-34AF-4cae-B818-4C46ACEE9000}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AC9B0~1.EXE > nul9⤵PID:1368
-
-
C:\Windows\{AF3D909D-6B6D-4df2-9A78-961E706BBFD6}.exeC:\Windows\{AF3D909D-6B6D-4df2-9A78-961E706BBFD6}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Windows\{CFAD5316-5495-452c-8134-15DC40D85B00}.exeC:\Windows\{CFAD5316-5495-452c-8134-15DC40D85B00}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\{0648DA6A-523E-486a-A10B-A1E9366B9B70}.exeC:\Windows\{0648DA6A-523E-486a-A10B-A1E9366B9B70}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0648D~1.EXE > nul12⤵PID:1812
-
-
C:\Windows\{FC0FFECB-1E80-415b-A811-02800123707E}.exeC:\Windows\{FC0FFECB-1E80-415b-A811-02800123707E}.exe12⤵
- Executes dropped EXE
PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CFAD5~1.EXE > nul11⤵PID:932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AF3D9~1.EXE > nul10⤵PID:2084
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A3209~1.EXE > nul7⤵PID:2652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C4A09~1.EXE > nul6⤵PID:2120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7EA70~1.EXE > nul5⤵PID:2100
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CA7BA~1.EXE > nul3⤵PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD59a6c021a9dd79146789d856f146432fb
SHA16c2abf2c19e0185e0f10dddbaa5ab688f084821f
SHA256c87793aa70964b9003f3d1b2f742d245be42d0a0e4807b6d971f898ab6b6347c
SHA512f4c7fb45112d9a1258ff261ff9ff1e80fbfd2bb4b9dc859f24d731151555a0f061eb61116f05965195e801e16e9c12c0e800bb35754eaf2bb557d6b34ec57602
-
Filesize
168KB
MD5070f50c67d3c145b20997e01e23b4959
SHA1fe5d09ebd12709f03440957668e00dddd50808e7
SHA256b53b7a6cb1cd85562700946534ed74c6e60b60083c8b20df14182cd55727cd28
SHA51257545ac9381bac612f016c94499b2240d75db5def912f1ec549288b08487004fc62948b94ffe33f68da5a85c42db623e28344522647baf64fea525b94e81ced1
-
Filesize
168KB
MD5317aa52328d71a85d3b2db4bd47c4f93
SHA19d89865a5a03cf86995d989a440b290f707e3743
SHA256d16eeca89d4b3dc045d2dba657ecf9981fb77b9397fb6d58e2a190d2943692b6
SHA512ff10a70d16f0f6eb16bb4b6e99f6aa331b321ccd97edf3308c558b3af50d8d8756dba6a7b2719451204408c80bf7fd4eb35865edae2bd4b731ac29488c208213
-
Filesize
168KB
MD5df0ce93539e4046f5e6fa9ef485736f4
SHA19055df4b60799232d42551f7ccb818b91d2423aa
SHA256522b917b6b639c824297cb39422908f517e3154324cc3b7ff0714bc9347213dc
SHA5123279c5084d282110935847e5560eaf503cd6f071cf2763c9240761b2f195c0866474051b2bdc51654f4f17608a14b18120fcb617016c9676c651c6e545c51643
-
Filesize
168KB
MD56818df10a83c0b8388ba422a9e2b0197
SHA1c58745c83e2c145023d1dacfdc37a2d2ec07cfc9
SHA25638db506876b9b0d3282de8ecafe59329aefc5273dd38e4dc2c620333db0b90af
SHA512de1c01657ddbcbb10323eceb074826f5fd3e0434433901931f319bdf76c3fa98890b2b6502e8c58c9a7fff450e4fdbfcfca973e7048530ec9ca6e57899a41e51
-
Filesize
168KB
MD5733715265a50c5f9efb08cf93ce915e9
SHA12b4cecea8809ea63de226bf7d7f1fa41577e9e2d
SHA256c23a6d61c30052e2e9b6cf7751b5e7c04261fce79b1d9e61d788668a6f5b7e1c
SHA512cc2c97211ffb8c1c7b40256837976f2fbc5c09239512e92f3c96384d75e5c7069460b5d82308d93cb8b2c1475730ee41f47be77ba3fd22d6afcf52cfe4e0055a
-
Filesize
168KB
MD5591d5588750939552bfac0ee873518bf
SHA1ed09915b7157509794b96440d629776f2cf88f56
SHA25666d724d601ca5a7c52e7b78cd95621b46ab8708c7a4fb373c63427a34de1c397
SHA5122f28598f6c9b3fcd4e218f560289104a2ecf097a58e3be952d534838d6df5bb323027ef3a73c340ce99f8ac8f579957d8b6b488225ac67bcaf3bc5c0b0921331
-
Filesize
168KB
MD5f645ce79b5b192ffb7f65121e57cc2fe
SHA1b498130b9a78d7fcdbb3983d5d7c379858d913e0
SHA256fd37d988286734615ed6756ed3292b38976d0920a301ac2691c47b6af26b092f
SHA512bf0ef19416f5dcf39e7c905a34b9a8e696b1c57b9693b81a543089c361b2b6c718b8b0d07afe9305a59bde86e6275a55bdfe147e10ca340934930533a7bd139e
-
Filesize
168KB
MD51f811236789cb6bb246e2a27d32c30cc
SHA19cadfdcc78bbce84177ced38d2bce603330bc25e
SHA2562e2eafab8e8789cef418e31eb332b6ff7ef955726721bfb59d1e15963552ee3e
SHA51232919a5e7be091e8da1bf361ba450b76805042f85bc2e439ceaded8960678e780258e3d16012ad131b2a92dd311adb400bf906dd599e3a8b95e9502379120d8d
-
Filesize
168KB
MD538b90e640639f45d05f132fd5038e8ae
SHA19563701bcf65e61f430200e369990002823f8358
SHA2560587bb8eb79d4415fd2f52910fb52b97ffe882397bc758965364b38303b8121e
SHA5121f405abecf3cc2681f3eeba36fa51ec363e35bfe57956ca390dda880165ca4d548bfdc852d74cf555539077ab1f71cf1d0208040eabc95871659ae886709210d
-
Filesize
168KB
MD5f2326b4f97e863c5631831670164a206
SHA12d0d6ff2e4fe436295bd94ff7e6e78b40ea7148b
SHA256c5d0c789d4d9a9765c65118c3446dab0d951e28d2654b273fcbd8175c94e1899
SHA5123f3366ef34b1d85f1771fa276b0879f6b91a5484c35064accd467d723c1da4b005325ae266853d1dc15642ee0053050df154c9a970b5179ba49c71167054508f