Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe
-
Size
168KB
-
MD5
d26d049c40afc42fcc6bd7dda92f957c
-
SHA1
a020778e503db58c4678a603bf7513f1da7333d2
-
SHA256
e7b34d163469cf177e9327ec822e05ad0d061d16c8d26550ec795204f7ec3b2b
-
SHA512
1ae3e83191dfec5e2be320e4e95b5221f085b3ec40102cca955217f39d4099841d656535013c05253f9bad0729c171a98144275add4d4b6e155565cbeaa36b84
-
SSDEEP
1536:1EGh0o1lq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o1lqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral2/files/0x0006000000023251-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000200000002268d-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023260-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000002268d-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c00000002167d-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000021681-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d00000002167d-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070f-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000711-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000711-37.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00030000000006e5-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01A99EA4-8397-4bd0-9CED-D078F32CAE8A} {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D5F687C-A6D9-4e36-B9B3-57155B478C29}\stubpath = "C:\\Windows\\{8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe" {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC} {9257C844-EA30-4e93-A977-E3E3EA372771}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D72E8A33-EB8B-469d-88D0-6FD3468F63F1}\stubpath = "C:\\Windows\\{D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe" {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0} 2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01A99EA4-8397-4bd0-9CED-D078F32CAE8A}\stubpath = "C:\\Windows\\{01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe" {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9257C844-EA30-4e93-A977-E3E3EA372771}\stubpath = "C:\\Windows\\{9257C844-EA30-4e93-A977-E3E3EA372771}.exe" {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AEEE8CE9-FC90-43c6-8996-C52DEA390D00}\stubpath = "C:\\Windows\\{AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe" {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{62255D5A-9126-4e88-8D75-C3C045328E5D} {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16D0ABFA-3DB8-4844-B088-7F2EE3965808} {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16D0ABFA-3DB8-4844-B088-7F2EE3965808}\stubpath = "C:\\Windows\\{16D0ABFA-3DB8-4844-B088-7F2EE3965808}.exe" {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{660C0E99-5945-4739-AB5F-07D0E911EEDA} {B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}\stubpath = "C:\\Windows\\{B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe" 2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9257C844-EA30-4e93-A977-E3E3EA372771} {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}\stubpath = "C:\\Windows\\{038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe" {9257C844-EA30-4e93-A977-E3E3EA372771}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AEEE8CE9-FC90-43c6-8996-C52DEA390D00} {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D72E8A33-EB8B-469d-88D0-6FD3468F63F1} {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B0CC04C8-977E-4fe2-B2BA-AF56D5521E70} {16D0ABFA-3DB8-4844-B088-7F2EE3965808}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}\stubpath = "C:\\Windows\\{B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe" {16D0ABFA-3DB8-4844-B088-7F2EE3965808}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{660C0E99-5945-4739-AB5F-07D0E911EEDA}\stubpath = "C:\\Windows\\{660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe" {B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9DC9C102-B511-4395-9204-4D7D52431F7F} {660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D5F687C-A6D9-4e36-B9B3-57155B478C29} {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{62255D5A-9126-4e88-8D75-C3C045328E5D}\stubpath = "C:\\Windows\\{62255D5A-9126-4e88-8D75-C3C045328E5D}.exe" {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9DC9C102-B511-4395-9204-4D7D52431F7F}\stubpath = "C:\\Windows\\{9DC9C102-B511-4395-9204-4D7D52431F7F}.exe" {660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe -
Executes dropped EXE 11 IoCs
pid Process 2072 {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe 1696 {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe 4816 {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe 1588 {9257C844-EA30-4e93-A977-E3E3EA372771}.exe 3664 {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe 2328 {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe 2468 {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe 4060 {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe 3116 {16D0ABFA-3DB8-4844-B088-7F2EE3965808}.exe 4656 {660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe 5072 {9DC9C102-B511-4395-9204-4D7D52431F7F}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe File created C:\Windows\{D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe File created C:\Windows\{16D0ABFA-3DB8-4844-B088-7F2EE3965808}.exe {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe File created C:\Windows\{660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe {B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe File created C:\Windows\{9DC9C102-B511-4395-9204-4D7D52431F7F}.exe {660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe File created C:\Windows\{62255D5A-9126-4e88-8D75-C3C045328E5D}.exe {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe File created C:\Windows\{B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe 2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe File created C:\Windows\{01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe File created C:\Windows\{9257C844-EA30-4e93-A977-E3E3EA372771}.exe {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe File created C:\Windows\{038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe {9257C844-EA30-4e93-A977-E3E3EA372771}.exe File created C:\Windows\{AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 444 2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe Token: SeIncBasePriorityPrivilege 2072 {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe Token: SeIncBasePriorityPrivilege 1696 {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe Token: SeIncBasePriorityPrivilege 4816 {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe Token: SeIncBasePriorityPrivilege 1588 {9257C844-EA30-4e93-A977-E3E3EA372771}.exe Token: SeIncBasePriorityPrivilege 3664 {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe Token: SeIncBasePriorityPrivilege 2328 {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe Token: SeIncBasePriorityPrivilege 2468 {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe Token: SeIncBasePriorityPrivilege 4060 {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe Token: SeIncBasePriorityPrivilege 3208 {B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe Token: SeIncBasePriorityPrivilege 4656 {660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 444 wrote to memory of 2072 444 2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe 88 PID 444 wrote to memory of 2072 444 2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe 88 PID 444 wrote to memory of 2072 444 2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe 88 PID 444 wrote to memory of 3616 444 2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe 89 PID 444 wrote to memory of 3616 444 2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe 89 PID 444 wrote to memory of 3616 444 2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe 89 PID 2072 wrote to memory of 1696 2072 {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe 93 PID 2072 wrote to memory of 1696 2072 {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe 93 PID 2072 wrote to memory of 1696 2072 {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe 93 PID 2072 wrote to memory of 5036 2072 {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe 94 PID 2072 wrote to memory of 5036 2072 {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe 94 PID 2072 wrote to memory of 5036 2072 {B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe 94 PID 1696 wrote to memory of 4816 1696 {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe 97 PID 1696 wrote to memory of 4816 1696 {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe 97 PID 1696 wrote to memory of 4816 1696 {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe 97 PID 1696 wrote to memory of 2408 1696 {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe 96 PID 1696 wrote to memory of 2408 1696 {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe 96 PID 1696 wrote to memory of 2408 1696 {01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe 96 PID 4816 wrote to memory of 1588 4816 {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe 98 PID 4816 wrote to memory of 1588 4816 {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe 98 PID 4816 wrote to memory of 1588 4816 {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe 98 PID 4816 wrote to memory of 2428 4816 {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe 99 PID 4816 wrote to memory of 2428 4816 {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe 99 PID 4816 wrote to memory of 2428 4816 {8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe 99 PID 1588 wrote to memory of 3664 1588 {9257C844-EA30-4e93-A977-E3E3EA372771}.exe 100 PID 1588 wrote to memory of 3664 1588 {9257C844-EA30-4e93-A977-E3E3EA372771}.exe 100 PID 1588 wrote to memory of 3664 1588 {9257C844-EA30-4e93-A977-E3E3EA372771}.exe 100 PID 1588 wrote to memory of 1520 1588 {9257C844-EA30-4e93-A977-E3E3EA372771}.exe 101 PID 1588 wrote to memory of 1520 1588 {9257C844-EA30-4e93-A977-E3E3EA372771}.exe 101 PID 1588 wrote to memory of 1520 1588 {9257C844-EA30-4e93-A977-E3E3EA372771}.exe 101 PID 3664 wrote to memory of 2328 3664 {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe 102 PID 3664 wrote to memory of 2328 3664 {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe 102 PID 3664 wrote to memory of 2328 3664 {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe 102 PID 3664 wrote to memory of 3640 3664 {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe 103 PID 3664 wrote to memory of 3640 3664 {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe 103 PID 3664 wrote to memory of 3640 3664 {038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe 103 PID 2328 wrote to memory of 2468 2328 {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe 104 PID 2328 wrote to memory of 2468 2328 {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe 104 PID 2328 wrote to memory of 2468 2328 {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe 104 PID 2328 wrote to memory of 3908 2328 {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe 105 PID 2328 wrote to memory of 3908 2328 {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe 105 PID 2328 wrote to memory of 3908 2328 {AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe 105 PID 2468 wrote to memory of 4060 2468 {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe 106 PID 2468 wrote to memory of 4060 2468 {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe 106 PID 2468 wrote to memory of 4060 2468 {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe 106 PID 2468 wrote to memory of 1472 2468 {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe 107 PID 2468 wrote to memory of 1472 2468 {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe 107 PID 2468 wrote to memory of 1472 2468 {62255D5A-9126-4e88-8D75-C3C045328E5D}.exe 107 PID 4060 wrote to memory of 3116 4060 {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe 108 PID 4060 wrote to memory of 3116 4060 {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe 108 PID 4060 wrote to memory of 3116 4060 {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe 108 PID 4060 wrote to memory of 4400 4060 {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe 109 PID 4060 wrote to memory of 4400 4060 {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe 109 PID 4060 wrote to memory of 4400 4060 {D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe 109 PID 3208 wrote to memory of 4656 3208 {B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe 112 PID 3208 wrote to memory of 4656 3208 {B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe 112 PID 3208 wrote to memory of 4656 3208 {B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe 112 PID 3208 wrote to memory of 4812 3208 {B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe 113 PID 3208 wrote to memory of 4812 3208 {B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe 113 PID 3208 wrote to memory of 4812 3208 {B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe 113 PID 4656 wrote to memory of 5072 4656 {660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe 114 PID 4656 wrote to memory of 5072 4656 {660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe 114 PID 4656 wrote to memory of 5072 4656 {660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe 114 PID 4656 wrote to memory of 2144 4656 {660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_d26d049c40afc42fcc6bd7dda92f957c_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\{B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exeC:\Windows\{B8828316-05C4-4e6b-8BCA-2B38A6A8A5D0}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\{01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exeC:\Windows\{01A99EA4-8397-4bd0-9CED-D078F32CAE8A}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{01A99~1.EXE > nul4⤵PID:2408
-
-
C:\Windows\{8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exeC:\Windows\{8D5F687C-A6D9-4e36-B9B3-57155B478C29}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\{9257C844-EA30-4e93-A977-E3E3EA372771}.exeC:\Windows\{9257C844-EA30-4e93-A977-E3E3EA372771}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\{038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exeC:\Windows\{038B23F0-4D85-46c9-8E9C-9B3AFC31FFAC}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\{AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exeC:\Windows\{AEEE8CE9-FC90-43c6-8996-C52DEA390D00}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\{62255D5A-9126-4e88-8D75-C3C045328E5D}.exeC:\Windows\{62255D5A-9126-4e88-8D75-C3C045328E5D}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\{D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exeC:\Windows\{D72E8A33-EB8B-469d-88D0-6FD3468F63F1}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\{16D0ABFA-3DB8-4844-B088-7F2EE3965808}.exeC:\Windows\{16D0ABFA-3DB8-4844-B088-7F2EE3965808}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
PID:3116 -
C:\Windows\{B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exeC:\Windows\{B0CC04C8-977E-4fe2-B2BA-AF56D5521E70}.exe11⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\{660C0E99-5945-4739-AB5F-07D0E911EEDA}.exeC:\Windows\{660C0E99-5945-4739-AB5F-07D0E911EEDA}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\{9DC9C102-B511-4395-9204-4D7D52431F7F}.exeC:\Windows\{9DC9C102-B511-4395-9204-4D7D52431F7F}.exe13⤵
- Executes dropped EXE
PID:5072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{660C0~1.EXE > nul13⤵PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B0CC0~1.EXE > nul12⤵PID:4812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16D0A~1.EXE > nul11⤵PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D72E8~1.EXE > nul10⤵PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{62255~1.EXE > nul9⤵PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AEEE8~1.EXE > nul8⤵PID:3908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{038B2~1.EXE > nul7⤵PID:3640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9257C~1.EXE > nul6⤵PID:1520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D5F6~1.EXE > nul5⤵PID:2428
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B8828~1.EXE > nul3⤵PID:5036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD58aeacc238f80fc6a7334bbc2f3657406
SHA184985eebb6c4d6f3719cdf44ac6813cb2dcd4aa9
SHA25657c1ae1456313318ac2dfc91cb3e50335b7c1879a6afb07709ec78d86b9e2859
SHA51269e02c17f693bc33fc691ed36ad3151572549ed5a91ce87b7333e5060a41bd4ffd08d08d883ec2213d8370ce08b8204f0b453a54a5a7fb5fab5ed637a80042d9
-
Filesize
168KB
MD5661cff4fe82e292e23a8a35e26e209d0
SHA13118eb0e52004beb9381d81c78e2021070c427f1
SHA2568b7d3e21f07588889257da799e41cdf8d1400082728f1f1059b1ac60ac9c926b
SHA5128cc2b2b966fcf2b18ec42b1caaa1eac40d690f271d79e305205e8d2ce0c577adc35d0307ba78da31fc99a983add61423d96cb589bf7f8b4b1bf26969d72a5a30
-
Filesize
168KB
MD5e07159eeb014f6ec8d601f1b49de77ba
SHA14f8feed0cf9c5c27042dda20ca2a5e738107583d
SHA2568f1dc84ae9c07a653bafa8ffa8e79bac5f4ab8dd2cb5f0fae472fa1a71ae043b
SHA5121330059cb9ed13bd050d8b43a56f21106b5d9538d2013caf02e93adf8f3937a1ea3d35efac2d8f5d62f5d6fb08e210b18032b3faa6157bbfc8f37cd219ad311a
-
Filesize
168KB
MD54b2d0366f5a14170329e3971b88490fe
SHA1a046a21ed6115a2d301e276815f1def390c6e64a
SHA256fc726463ea53cd5ea52c27d696da76b1160e07c2dbe9346fe8694ed94e9dc002
SHA5129b22178445db4da88b04316edaa1a196ab6762ea710614145b472101cf5c2b17dba2bed52165bb0b3982d813b7e4cfaea6adf804c45aa5aad4872c9f1371c27f
-
Filesize
168KB
MD559e742ecf187892c17086c40d92eef90
SHA1048759060971d26a9578f08eb27adea16559afb7
SHA256a28308c35f9cacf259554dc519d764792009776c8cfad52dbdf5d8549a1eb5d1
SHA512b9b038839c0bbddfce4384544457dfa476b9671e8c05ffd0d43ffed0aaea149c4bc7d3ea2e8684577c19f3449cfc0686f350769b31cb6b56ab176fea453b84f2
-
Filesize
168KB
MD56afb1b58d726ac986adab8b9e317b45e
SHA1eb6d39275e3db5fd927def98daa859d0a8f2c2bb
SHA25651af12864d134af7c4ee7cf336fd0cc4775877917024ef12fed9d1e9f2d0ba5e
SHA512b64575291535f2ade2d8bebcd67a7c6652127453cdd178f653df9884a1fd805c40c9f225a05d74d13b578660cabe66d5a3b1466b046d258d82e0f0772cb1c982
-
Filesize
168KB
MD5a4e6e76b005421ec063b095c839d63fc
SHA181104f75b257083c47fad2d93430b6d63c076f9a
SHA2562d5609c792638caacd6b7d45d901bf19a31357c5d1fad1a7923b8b144df2afe6
SHA5122e17e109f0d46bfe9c0168d373f272ee1140adeb45d7feea666da7bf77113b6a1031d842183994fc4ed7c9002343b78e314684371bc0d7ad883b3c4d3e1233d9
-
Filesize
168KB
MD58aef045f6a3d289c880dbc76bc3c0db8
SHA1cba0c4e8b2cd17f6abd49cbd4b304dbbfa1e5d03
SHA2562255387eff62c7a5c450da7bc39ecaa12cf846cba6331f1346eb75b5c5c408a1
SHA512a229fb8cef9fc85d18a2ecf2ac1b1b5f96a1a26b18c0c6c67930da361da162d48bc5616b54d71a2312815ac29d59ec66bc43b8f89b498fd94852c84deca2ac9a
-
Filesize
168KB
MD54dba3f578b4a1f6578f1c260dbd8ac30
SHA1427f9936fe06252137dccaa86f0fe4bfa8f6f8ac
SHA2569d35d546e6be7c31e6c1da918cba1b88ac10a11c2cf49a22620a18d511159acc
SHA512298c2a0dd1311d830f74b243079c19b32d0d18d2e5970f7c12a7dc1b10786b1474039f0ba800cd15bdf24c56f94e53964d6dcefc27b6ca5d1cae782cd96ed240
-
Filesize
168KB
MD5201f6bfb985bf227db364408fcf97f35
SHA1d4ca68de24a4ecf68b24806211f154513d92873c
SHA256d5da22f11444f430f414addb4b11498ab40e870a54b20cedf39823597c16229b
SHA512924a265f62cdd7486bd4d1804cab517e4ac0c5b3ef253a181e4ef2c91467df3591d582943032b2d14d3387447bb4190cd47d03178bc92dacdcfa17897a792760
-
Filesize
168KB
MD56989ffc4df190e20c517477c299da8eb
SHA1dbd91f357cbb4ab6e2f14bff457df84b13e4c0f6
SHA256847152730faa6d1e5d5093ab273a34fa08b41c145e606810b8131eb9719fe798
SHA5122c52cd2777969d40f87abb3dab8ee2b79e0254acf356afe50fe2a68625629691e2599b3454b19c38d761a5f3c3b945063e059bd3353ca279c1cd8ebea218ceda