Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe
-
Size
180KB
-
MD5
3bd883a76624714dee9486c354149228
-
SHA1
327d598f506014ab15c84b2d257be584ea8f4b09
-
SHA256
05e11945edd1cd745c5772ab50288fbf34ccf696c5a3bf927e6132370d4d1c92
-
SHA512
21a086d3c5270e2ba5fd93614ad7e11c28165966292b1022f5a3b380bc3770b8418771562ee7d7501f25307f6a49c2dd30aa7f6f959d33ce2a597e205fd8c6ee
-
SSDEEP
3072:jEGh0o4lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGal5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x00070000000231e3-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00060000000231e8-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000231f7-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000001e7e2-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000022043-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000001e7e2-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000006cf-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000709-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000006cf-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000709-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000006cf-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000000709-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6503F6C6-3DD6-4919-A349-CFC6D971D2B4} 2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6503F6C6-3DD6-4919-A349-CFC6D971D2B4}\stubpath = "C:\\Windows\\{6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe" 2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{81455815-0605-417d-B933-7732CA887EC4}\stubpath = "C:\\Windows\\{81455815-0605-417d-B933-7732CA887EC4}.exe" {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F} {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C18789D-5245-4d27-9696-654776A9EE16} {12EB2277-8D11-44c7-929F-0B34147C90D6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{885D4B3F-5B46-480e-8581-FF2B4E5BC6C7} {3C18789D-5245-4d27-9696-654776A9EE16}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{885D4B3F-5B46-480e-8581-FF2B4E5BC6C7}\stubpath = "C:\\Windows\\{885D4B3F-5B46-480e-8581-FF2B4E5BC6C7}.exe" {3C18789D-5245-4d27-9696-654776A9EE16}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E101EB6A-66BB-4443-A1B8-C200029AE730}\stubpath = "C:\\Windows\\{E101EB6A-66BB-4443-A1B8-C200029AE730}.exe" {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{81455815-0605-417d-B933-7732CA887EC4} {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AFEFBB1E-EF66-42dc-8A35-74AA30624A82}\stubpath = "C:\\Windows\\{AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe" {81455815-0605-417d-B933-7732CA887EC4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9859E64D-6833-4957-9546-52201C139E43} {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}\stubpath = "C:\\Windows\\{66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe" {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}\stubpath = "C:\\Windows\\{9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe" {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9859E64D-6833-4957-9546-52201C139E43}\stubpath = "C:\\Windows\\{9859E64D-6833-4957-9546-52201C139E43}.exe" {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12EB2277-8D11-44c7-929F-0B34147C90D6} {9859E64D-6833-4957-9546-52201C139E43}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B47225E-3BC1-454e-862D-AE302A7C3810}\stubpath = "C:\\Windows\\{5B47225E-3BC1-454e-862D-AE302A7C3810}.exe" {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E101EB6A-66BB-4443-A1B8-C200029AE730} {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AFEFBB1E-EF66-42dc-8A35-74AA30624A82} {81455815-0605-417d-B933-7732CA887EC4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66E8EE6C-E92C-42b9-ADB1-BB8699D84B53} {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12EB2277-8D11-44c7-929F-0B34147C90D6}\stubpath = "C:\\Windows\\{12EB2277-8D11-44c7-929F-0B34147C90D6}.exe" {9859E64D-6833-4957-9546-52201C139E43}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C18789D-5245-4d27-9696-654776A9EE16}\stubpath = "C:\\Windows\\{3C18789D-5245-4d27-9696-654776A9EE16}.exe" {12EB2277-8D11-44c7-929F-0B34147C90D6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B47225E-3BC1-454e-862D-AE302A7C3810} {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1E7B339C-17CC-4c30-BF6B-E5158B783FD1} {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1E7B339C-17CC-4c30-BF6B-E5158B783FD1}\stubpath = "C:\\Windows\\{1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe" {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe -
Executes dropped EXE 12 IoCs
pid Process 2304 {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe 116 {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe 5076 {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe 4672 {81455815-0605-417d-B933-7732CA887EC4}.exe 3484 {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe 4360 {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe 4840 {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe 2772 {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe 4092 {9859E64D-6833-4957-9546-52201C139E43}.exe 2620 {12EB2277-8D11-44c7-929F-0B34147C90D6}.exe 2328 {3C18789D-5245-4d27-9696-654776A9EE16}.exe 2540 {885D4B3F-5B46-480e-8581-FF2B4E5BC6C7}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{E101EB6A-66BB-4443-A1B8-C200029AE730}.exe {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe File created C:\Windows\{81455815-0605-417d-B933-7732CA887EC4}.exe {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe File created C:\Windows\{AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe {81455815-0605-417d-B933-7732CA887EC4}.exe File created C:\Windows\{66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe File created C:\Windows\{9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe File created C:\Windows\{12EB2277-8D11-44c7-929F-0B34147C90D6}.exe {9859E64D-6833-4957-9546-52201C139E43}.exe File created C:\Windows\{885D4B3F-5B46-480e-8581-FF2B4E5BC6C7}.exe {3C18789D-5245-4d27-9696-654776A9EE16}.exe File created C:\Windows\{6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe 2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe File created C:\Windows\{1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe File created C:\Windows\{9859E64D-6833-4957-9546-52201C139E43}.exe {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe File created C:\Windows\{3C18789D-5245-4d27-9696-654776A9EE16}.exe {12EB2277-8D11-44c7-929F-0B34147C90D6}.exe File created C:\Windows\{5B47225E-3BC1-454e-862D-AE302A7C3810}.exe {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2800 2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe Token: SeIncBasePriorityPrivilege 2304 {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe Token: SeIncBasePriorityPrivilege 116 {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe Token: SeIncBasePriorityPrivilege 5076 {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe Token: SeIncBasePriorityPrivilege 4672 {81455815-0605-417d-B933-7732CA887EC4}.exe Token: SeIncBasePriorityPrivilege 3484 {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe Token: SeIncBasePriorityPrivilege 4360 {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe Token: SeIncBasePriorityPrivilege 4840 {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe Token: SeIncBasePriorityPrivilege 2772 {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe Token: SeIncBasePriorityPrivilege 4092 {9859E64D-6833-4957-9546-52201C139E43}.exe Token: SeIncBasePriorityPrivilege 2620 {12EB2277-8D11-44c7-929F-0B34147C90D6}.exe Token: SeIncBasePriorityPrivilege 2328 {3C18789D-5245-4d27-9696-654776A9EE16}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2304 2800 2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe 84 PID 2800 wrote to memory of 2304 2800 2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe 84 PID 2800 wrote to memory of 2304 2800 2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe 84 PID 2800 wrote to memory of 2580 2800 2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe 85 PID 2800 wrote to memory of 2580 2800 2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe 85 PID 2800 wrote to memory of 2580 2800 2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe 85 PID 2304 wrote to memory of 116 2304 {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe 91 PID 2304 wrote to memory of 116 2304 {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe 91 PID 2304 wrote to memory of 116 2304 {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe 91 PID 2304 wrote to memory of 4904 2304 {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe 92 PID 2304 wrote to memory of 4904 2304 {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe 92 PID 2304 wrote to memory of 4904 2304 {6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe 92 PID 116 wrote to memory of 5076 116 {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe 97 PID 116 wrote to memory of 5076 116 {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe 97 PID 116 wrote to memory of 5076 116 {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe 97 PID 116 wrote to memory of 1192 116 {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe 96 PID 116 wrote to memory of 1192 116 {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe 96 PID 116 wrote to memory of 1192 116 {5B47225E-3BC1-454e-862D-AE302A7C3810}.exe 96 PID 5076 wrote to memory of 4672 5076 {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe 98 PID 5076 wrote to memory of 4672 5076 {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe 98 PID 5076 wrote to memory of 4672 5076 {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe 98 PID 5076 wrote to memory of 972 5076 {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe 99 PID 5076 wrote to memory of 972 5076 {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe 99 PID 5076 wrote to memory of 972 5076 {E101EB6A-66BB-4443-A1B8-C200029AE730}.exe 99 PID 4672 wrote to memory of 3484 4672 {81455815-0605-417d-B933-7732CA887EC4}.exe 100 PID 4672 wrote to memory of 3484 4672 {81455815-0605-417d-B933-7732CA887EC4}.exe 100 PID 4672 wrote to memory of 3484 4672 {81455815-0605-417d-B933-7732CA887EC4}.exe 100 PID 4672 wrote to memory of 3648 4672 {81455815-0605-417d-B933-7732CA887EC4}.exe 101 PID 4672 wrote to memory of 3648 4672 {81455815-0605-417d-B933-7732CA887EC4}.exe 101 PID 4672 wrote to memory of 3648 4672 {81455815-0605-417d-B933-7732CA887EC4}.exe 101 PID 3484 wrote to memory of 4360 3484 {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe 102 PID 3484 wrote to memory of 4360 3484 {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe 102 PID 3484 wrote to memory of 4360 3484 {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe 102 PID 3484 wrote to memory of 1888 3484 {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe 103 PID 3484 wrote to memory of 1888 3484 {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe 103 PID 3484 wrote to memory of 1888 3484 {AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe 103 PID 4360 wrote to memory of 4840 4360 {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe 104 PID 4360 wrote to memory of 4840 4360 {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe 104 PID 4360 wrote to memory of 4840 4360 {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe 104 PID 4360 wrote to memory of 1044 4360 {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe 105 PID 4360 wrote to memory of 1044 4360 {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe 105 PID 4360 wrote to memory of 1044 4360 {66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe 105 PID 4840 wrote to memory of 2772 4840 {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe 106 PID 4840 wrote to memory of 2772 4840 {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe 106 PID 4840 wrote to memory of 2772 4840 {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe 106 PID 4840 wrote to memory of 2640 4840 {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe 107 PID 4840 wrote to memory of 2640 4840 {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe 107 PID 4840 wrote to memory of 2640 4840 {1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe 107 PID 2772 wrote to memory of 4092 2772 {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe 108 PID 2772 wrote to memory of 4092 2772 {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe 108 PID 2772 wrote to memory of 4092 2772 {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe 108 PID 2772 wrote to memory of 5084 2772 {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe 109 PID 2772 wrote to memory of 5084 2772 {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe 109 PID 2772 wrote to memory of 5084 2772 {9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe 109 PID 4092 wrote to memory of 2620 4092 {9859E64D-6833-4957-9546-52201C139E43}.exe 110 PID 4092 wrote to memory of 2620 4092 {9859E64D-6833-4957-9546-52201C139E43}.exe 110 PID 4092 wrote to memory of 2620 4092 {9859E64D-6833-4957-9546-52201C139E43}.exe 110 PID 4092 wrote to memory of 3400 4092 {9859E64D-6833-4957-9546-52201C139E43}.exe 111 PID 4092 wrote to memory of 3400 4092 {9859E64D-6833-4957-9546-52201C139E43}.exe 111 PID 4092 wrote to memory of 3400 4092 {9859E64D-6833-4957-9546-52201C139E43}.exe 111 PID 2620 wrote to memory of 2328 2620 {12EB2277-8D11-44c7-929F-0B34147C90D6}.exe 112 PID 2620 wrote to memory of 2328 2620 {12EB2277-8D11-44c7-929F-0B34147C90D6}.exe 112 PID 2620 wrote to memory of 2328 2620 {12EB2277-8D11-44c7-929F-0B34147C90D6}.exe 112 PID 2620 wrote to memory of 2580 2620 {12EB2277-8D11-44c7-929F-0B34147C90D6}.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-17_3bd883a76624714dee9486c354149228_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\{6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exeC:\Windows\{6503F6C6-3DD6-4919-A349-CFC6D971D2B4}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\{5B47225E-3BC1-454e-862D-AE302A7C3810}.exeC:\Windows\{5B47225E-3BC1-454e-862D-AE302A7C3810}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5B472~1.EXE > nul4⤵PID:1192
-
-
C:\Windows\{E101EB6A-66BB-4443-A1B8-C200029AE730}.exeC:\Windows\{E101EB6A-66BB-4443-A1B8-C200029AE730}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\{81455815-0605-417d-B933-7732CA887EC4}.exeC:\Windows\{81455815-0605-417d-B933-7732CA887EC4}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\{AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exeC:\Windows\{AFEFBB1E-EF66-42dc-8A35-74AA30624A82}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\{66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exeC:\Windows\{66E8EE6C-E92C-42b9-ADB1-BB8699D84B53}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\{1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exeC:\Windows\{1E7B339C-17CC-4c30-BF6B-E5158B783FD1}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\{9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exeC:\Windows\{9E8D31F5-B5D2-4ebb-8830-1DE6E8FB792F}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\{9859E64D-6833-4957-9546-52201C139E43}.exeC:\Windows\{9859E64D-6833-4957-9546-52201C139E43}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\{12EB2277-8D11-44c7-929F-0B34147C90D6}.exeC:\Windows\{12EB2277-8D11-44c7-929F-0B34147C90D6}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\{3C18789D-5245-4d27-9696-654776A9EE16}.exeC:\Windows\{3C18789D-5245-4d27-9696-654776A9EE16}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Windows\{885D4B3F-5B46-480e-8581-FF2B4E5BC6C7}.exeC:\Windows\{885D4B3F-5B46-480e-8581-FF2B4E5BC6C7}.exe13⤵
- Executes dropped EXE
PID:2540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C187~1.EXE > nul13⤵PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{12EB2~1.EXE > nul12⤵PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9859E~1.EXE > nul11⤵PID:3400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E8D3~1.EXE > nul10⤵PID:5084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1E7B3~1.EXE > nul9⤵PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{66E8E~1.EXE > nul8⤵PID:1044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AFEFB~1.EXE > nul7⤵PID:1888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81455~1.EXE > nul6⤵PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E101E~1.EXE > nul5⤵PID:972
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6503F~1.EXE > nul3⤵PID:4904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5c986af3eea28833590f36ac4b9933f3f
SHA173816dabdac85ca6164ec3774abb7fa576af3003
SHA25665b47444e0196effdbd92b570345f64c9628061d373c49904d4eca8f7ace55b6
SHA512e6359b0cf4fa73e5dd9562efc8924d03f98741fa04cc1043ce684e8a16a4d01be7a15016f5801deeca4720297bfe7fbcae772b9aa4aa571f3c7ca946d722baa7
-
Filesize
180KB
MD5e407e2fb56b38f60d214ecf6c759b6f3
SHA10d73c9888171747af70769fdb17c3fff8dbd6525
SHA256700d82c9f868b688b348bfa21df0872d14d70f328c179b8a352855e228f028e8
SHA5121c5f0bbff93fa04cda0142df2c9a0ee30888edeb34dade5f3986727f66516bb3a5f8b09d39aae412a250164b1de079d7b39abb03d57d1312e51917aac647f0bd
-
Filesize
180KB
MD5926ec3c62e8d997cb6852c36910eab5e
SHA185c6030dd38e951e77b442aca34b288cd7f01973
SHA2561d3615a1e20579d988a49c87cd7d46774d2febb674adc0e738118f7eb3881613
SHA512feabbd1266387ead143896430bf716d0288410dea0fe86201a3f2c7bcb5fbc4ade6860b4d30662e213950fa7f6b10f0e421e73338490fb0502ffb49594f1824e
-
Filesize
180KB
MD52d3f2838ddc84bba807f0500472d5ae8
SHA173b8f8feb1031bb002fa353037833d6f1a117d87
SHA256123fef105beda923c9fc0a90b59ee244d58c7d0952011375dad06862b4c1ec33
SHA512181dfe967706e32634191ae5a65dfa042cbbcbf105edeca613d423d7a323b80e40134bfb29997070fb766da474f8543b174ad741bf9104fca0f492033e7e4c35
-
Filesize
180KB
MD54411da23ad689746973ff606db961988
SHA142834b8c83fad91bce3d8309486e49c8858fb6e5
SHA256fcbf533c52a28c2aaffc99b26cb2acce5aa94155aa0ef793e372fbe56bcd7415
SHA5122af68f89e87299ccdf3531c593109e65e8dd9b391465c6d65df19d6294f6e90588c942485f56139348bf6357bdc8a30a5be22473771ba868e3dc1456a7f4b28f
-
Filesize
180KB
MD5365bd6478100f1899136c5496d73462c
SHA178c4aa6906ff212b841ec24d7ed3d3664f1a1fd9
SHA256a3d50947083aff2d3f6719ce59068f94776efd2639a1e5da92246e649965c2bd
SHA51238bf79b9f7f6e1e33cd39858f5af0f739354564f5e9708f5767bc9abdea2ad49bb59a4f272473c5b2ecec8d93b83b9b9ca164e0ab6a692209f945a41e81f92dd
-
Filesize
180KB
MD55e2fd183d814fbffd50053008aa1cd10
SHA12e42669d383c00db3f96bea1d72c6da2699f6a88
SHA256bd6e0995ed06a490f020842d1d7f417eb9af172c4fb84366f8fa706e987de4e8
SHA512a3f8fa74c3ea423a06ac93ba6af0aa637d20a89a5c6b6ecef7733c1beb304ae44bd1f72e98c7d69428de6461bc152f834843dd977a8ce3e9db2c60b0bf85d3cb
-
Filesize
180KB
MD5fcbde505c6f9cbb88f5f1419f5516e83
SHA1c601eeea96811b32816aed9d5e0efb5bfd67857b
SHA25618e946a37d26c0c89a354daa2ec127ee17345ba76fee5af36cb38f74f00d36a8
SHA512e81108bef2855f62dcb857bf79400eab0d1ee29b743c636e8d6db3e3d9f5abd504179b9aa120b56f0ec1b906a9f835ff6ee54602144f0c5128fd25cfda19f581
-
Filesize
180KB
MD5abc90c7e80a0fe3ae3c92085a256b7e9
SHA1879362e63bfff419132bfc7b927198bafbd4afda
SHA2568ee352b94e6e8073ea7960b7e0404df56159b17dc77bf26100e0d9944d4a0516
SHA5121ae76a0e7878d1f56bbf2795abbacb18f852c870c40e65867bf16e1c7be00feda9b5e438f4a5bfe93fd5f5d4dcc82bcda03c30d0a50e68ee7d3da0e2bf421d61
-
Filesize
180KB
MD5b39b3db871d7bd8a42e9ab4b6d1e5654
SHA199dfbd46ecc29b47ead1c881f2d811cb5ebc965b
SHA256da18991f8dd35974af1e84ac6c29e4c8f34d4cda266076494080698f06916a57
SHA512ef502538c72840d18d4d0a1d4a870d5c7705512b3c436d0af725a95ff056071674d83030fbd0e79c330b7f307e9f7a7ff71b14a0f19111aa52c8beb72e186bfb
-
Filesize
180KB
MD5467a114b6f2850fed3ece62b9c1c711c
SHA1db8622eab941e9d6a57bddb6abfd38add0c8b01a
SHA2568c00c99f4b5983677584fea038b78fc621b8e2449459d058580fe27f150bdc22
SHA5121579fce988934b8b00375b90991ba24a93120aefc9d558f4cca44338e0413fd069c0fd74aec2af4ac637717bfe0969a728a91b507703875a1a4d319b1a6b6b14
-
Filesize
180KB
MD57df3e8b02ea342ec27704b93cbfc081d
SHA133327f5b12be27a40cde6c0cc6e549c72fc43396
SHA256b66e738f6df975f6b59490188a7e907378a76c7a43491f08e1948671a27f3d1d
SHA5124f6a264e514bf3f5b8b3b731db724695bea370c41766e33e4489f84b26ea73f5f6f15e19c925fb12755a3fa46ff97904fe3894805c6c7e810f62f6adf1570b04