Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/02/2024, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe
-
Size
180KB
-
MD5
4f4c0cdb0aa8e4464dda8833320d2839
-
SHA1
47883e23fc1be462a4b885cff02c5e0e18fb92ae
-
SHA256
31d7f2ee1c13ecf334764a4d0e0e57fec167c0104b3d753e50980fa29da63d5f
-
SHA512
8f62eb3ff1e9fbc86ef6f2f3538caa6f63b7f304faed50f700bd16ff9ad0d94c46e125afa1f8d9e99fe1681c880b4740f0fdacb8a36f3aa5f18e17cc4a741e79
-
SSDEEP
3072:jEGh0o3lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGNl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000b000000015cfa-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000015d23-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000015cfa-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b0000000160a7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000005a5a-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000015cfa-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000005a5a-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000015cfa-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000005a5a-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000015cfa-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000005a5a-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}\stubpath = "C:\\Windows\\{AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe" {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FB58BB70-8EC1-4518-9887-322A3D07FD8D} {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{76A6905F-2A65-4b02-9784-C584734402C4}\stubpath = "C:\\Windows\\{76A6905F-2A65-4b02-9784-C584734402C4}.exe" {E4140934-E53C-45ef-936E-CCFF58C72704}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E4140934-E53C-45ef-936E-CCFF58C72704}\stubpath = "C:\\Windows\\{E4140934-E53C-45ef-936E-CCFF58C72704}.exe" {E7CFCDC4-25DD-4404-ADA4-31F83FDD659D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{76A6905F-2A65-4b02-9784-C584734402C4} {E4140934-E53C-45ef-936E-CCFF58C72704}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DE39337-37FC-4fe0-862C-D60E4F8016EE} 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}\stubpath = "C:\\Windows\\{03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe" {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0B090B4F-8E6D-4267-A63C-F7E857FCC9A1} {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}\stubpath = "C:\\Windows\\{0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe" {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E7CFCDC4-25DD-4404-ADA4-31F83FDD659D}\stubpath = "C:\\Windows\\{E7CFCDC4-25DD-4404-ADA4-31F83FDD659D}.exe" {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E4140934-E53C-45ef-936E-CCFF58C72704} {E7CFCDC4-25DD-4404-ADA4-31F83FDD659D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA31F3B9-61B4-4fa8-9F45-00F3E64648F9} {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F623F21D-BBE1-46fa-9232-8B038F049F79}\stubpath = "C:\\Windows\\{F623F21D-BBE1-46fa-9232-8B038F049F79}.exe" {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E7CFCDC4-25DD-4404-ADA4-31F83FDD659D} {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9544D5CE-5B76-4d99-8688-DE3C45008123} {76A6905F-2A65-4b02-9784-C584734402C4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9544D5CE-5B76-4d99-8688-DE3C45008123}\stubpath = "C:\\Windows\\{9544D5CE-5B76-4d99-8688-DE3C45008123}.exe" {76A6905F-2A65-4b02-9784-C584734402C4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DE39337-37FC-4fe0-862C-D60E4F8016EE}\stubpath = "C:\\Windows\\{3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe" 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C} {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FB58BB70-8EC1-4518-9887-322A3D07FD8D}\stubpath = "C:\\Windows\\{FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe" {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0AB8FA7B-E576-4723-9AA4-619DD60A84C7} {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0AB8FA7B-E576-4723-9AA4-619DD60A84C7}\stubpath = "C:\\Windows\\{0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe" {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F623F21D-BBE1-46fa-9232-8B038F049F79} {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe -
Deletes itself 1 IoCs
pid Process 1104 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2352 {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe 2644 {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe 2596 {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe 2312 {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe 1728 {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe 2332 {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe 1616 {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe 1408 {E7CFCDC4-25DD-4404-ADA4-31F83FDD659D}.exe 540 {E4140934-E53C-45ef-936E-CCFF58C72704}.exe 2272 {76A6905F-2A65-4b02-9784-C584734402C4}.exe 1724 {9544D5CE-5B76-4d99-8688-DE3C45008123}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe File created C:\Windows\{03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe File created C:\Windows\{AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe File created C:\Windows\{0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe File created C:\Windows\{0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe File created C:\Windows\{E7CFCDC4-25DD-4404-ADA4-31F83FDD659D}.exe {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe File created C:\Windows\{76A6905F-2A65-4b02-9784-C584734402C4}.exe {E4140934-E53C-45ef-936E-CCFF58C72704}.exe File created C:\Windows\{9544D5CE-5B76-4d99-8688-DE3C45008123}.exe {76A6905F-2A65-4b02-9784-C584734402C4}.exe File created C:\Windows\{FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe File created C:\Windows\{F623F21D-BBE1-46fa-9232-8B038F049F79}.exe {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe File created C:\Windows\{E4140934-E53C-45ef-936E-CCFF58C72704}.exe {E7CFCDC4-25DD-4404-ADA4-31F83FDD659D}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2216 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe Token: SeIncBasePriorityPrivilege 2352 {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe Token: SeIncBasePriorityPrivilege 2644 {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe Token: SeIncBasePriorityPrivilege 2596 {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe Token: SeIncBasePriorityPrivilege 2312 {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe Token: SeIncBasePriorityPrivilege 1728 {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe Token: SeIncBasePriorityPrivilege 2332 {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe Token: SeIncBasePriorityPrivilege 1616 {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe Token: SeIncBasePriorityPrivilege 1408 {E7CFCDC4-25DD-4404-ADA4-31F83FDD659D}.exe Token: SeIncBasePriorityPrivilege 540 {E4140934-E53C-45ef-936E-CCFF58C72704}.exe Token: SeIncBasePriorityPrivilege 2272 {76A6905F-2A65-4b02-9784-C584734402C4}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2352 2216 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe 28 PID 2216 wrote to memory of 2352 2216 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe 28 PID 2216 wrote to memory of 2352 2216 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe 28 PID 2216 wrote to memory of 2352 2216 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe 28 PID 2216 wrote to memory of 1104 2216 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe 29 PID 2216 wrote to memory of 1104 2216 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe 29 PID 2216 wrote to memory of 1104 2216 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe 29 PID 2216 wrote to memory of 1104 2216 2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe 29 PID 2352 wrote to memory of 2644 2352 {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe 30 PID 2352 wrote to memory of 2644 2352 {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe 30 PID 2352 wrote to memory of 2644 2352 {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe 30 PID 2352 wrote to memory of 2644 2352 {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe 30 PID 2352 wrote to memory of 2692 2352 {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe 31 PID 2352 wrote to memory of 2692 2352 {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe 31 PID 2352 wrote to memory of 2692 2352 {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe 31 PID 2352 wrote to memory of 2692 2352 {3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe 31 PID 2644 wrote to memory of 2596 2644 {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe 32 PID 2644 wrote to memory of 2596 2644 {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe 32 PID 2644 wrote to memory of 2596 2644 {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe 32 PID 2644 wrote to memory of 2596 2644 {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe 32 PID 2644 wrote to memory of 2836 2644 {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe 33 PID 2644 wrote to memory of 2836 2644 {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe 33 PID 2644 wrote to memory of 2836 2644 {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe 33 PID 2644 wrote to memory of 2836 2644 {03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe 33 PID 2596 wrote to memory of 2312 2596 {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe 36 PID 2596 wrote to memory of 2312 2596 {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe 36 PID 2596 wrote to memory of 2312 2596 {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe 36 PID 2596 wrote to memory of 2312 2596 {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe 36 PID 2596 wrote to memory of 2920 2596 {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe 37 PID 2596 wrote to memory of 2920 2596 {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe 37 PID 2596 wrote to memory of 2920 2596 {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe 37 PID 2596 wrote to memory of 2920 2596 {AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe 37 PID 2312 wrote to memory of 1728 2312 {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe 38 PID 2312 wrote to memory of 1728 2312 {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe 38 PID 2312 wrote to memory of 1728 2312 {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe 38 PID 2312 wrote to memory of 1728 2312 {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe 38 PID 2312 wrote to memory of 2812 2312 {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe 39 PID 2312 wrote to memory of 2812 2312 {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe 39 PID 2312 wrote to memory of 2812 2312 {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe 39 PID 2312 wrote to memory of 2812 2312 {FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe 39 PID 1728 wrote to memory of 2332 1728 {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe 40 PID 1728 wrote to memory of 2332 1728 {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe 40 PID 1728 wrote to memory of 2332 1728 {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe 40 PID 1728 wrote to memory of 2332 1728 {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe 40 PID 1728 wrote to memory of 1664 1728 {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe 41 PID 1728 wrote to memory of 1664 1728 {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe 41 PID 1728 wrote to memory of 1664 1728 {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe 41 PID 1728 wrote to memory of 1664 1728 {0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe 41 PID 2332 wrote to memory of 1616 2332 {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe 42 PID 2332 wrote to memory of 1616 2332 {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe 42 PID 2332 wrote to memory of 1616 2332 {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe 42 PID 2332 wrote to memory of 1616 2332 {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe 42 PID 2332 wrote to memory of 2776 2332 {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe 43 PID 2332 wrote to memory of 2776 2332 {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe 43 PID 2332 wrote to memory of 2776 2332 {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe 43 PID 2332 wrote to memory of 2776 2332 {F623F21D-BBE1-46fa-9232-8B038F049F79}.exe 43 PID 1616 wrote to memory of 1408 1616 {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe 44 PID 1616 wrote to memory of 1408 1616 {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe 44 PID 1616 wrote to memory of 1408 1616 {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe 44 PID 1616 wrote to memory of 1408 1616 {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe 44 PID 1616 wrote to memory of 1456 1616 {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe 45 PID 1616 wrote to memory of 1456 1616 {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe 45 PID 1616 wrote to memory of 1456 1616 {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe 45 PID 1616 wrote to memory of 1456 1616 {0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_4f4c0cdb0aa8e4464dda8833320d2839_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\{3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exeC:\Windows\{3DE39337-37FC-4fe0-862C-D60E4F8016EE}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\{03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exeC:\Windows\{03966BD0-B16F-45f5-A7A5-5E40AE1A3C2C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\{AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exeC:\Windows\{AA31F3B9-61B4-4fa8-9F45-00F3E64648F9}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\{FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exeC:\Windows\{FB58BB70-8EC1-4518-9887-322A3D07FD8D}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\{0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exeC:\Windows\{0AB8FA7B-E576-4723-9AA4-619DD60A84C7}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\{F623F21D-BBE1-46fa-9232-8B038F049F79}.exeC:\Windows\{F623F21D-BBE1-46fa-9232-8B038F049F79}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\{0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exeC:\Windows\{0B090B4F-8E6D-4267-A63C-F7E857FCC9A1}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\{E7CFCDC4-25DD-4404-ADA4-31F83FDD659D}.exeC:\Windows\{E7CFCDC4-25DD-4404-ADA4-31F83FDD659D}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1408 -
C:\Windows\{E4140934-E53C-45ef-936E-CCFF58C72704}.exeC:\Windows\{E4140934-E53C-45ef-936E-CCFF58C72704}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:540 -
C:\Windows\{76A6905F-2A65-4b02-9784-C584734402C4}.exeC:\Windows\{76A6905F-2A65-4b02-9784-C584734402C4}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\{9544D5CE-5B76-4d99-8688-DE3C45008123}.exeC:\Windows\{9544D5CE-5B76-4d99-8688-DE3C45008123}.exe12⤵
- Executes dropped EXE
PID:1724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{76A69~1.EXE > nul12⤵PID:608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E4140~1.EXE > nul11⤵PID:336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E7CFC~1.EXE > nul10⤵PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0B090~1.EXE > nul9⤵PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F623F~1.EXE > nul8⤵PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0AB8F~1.EXE > nul7⤵PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FB58B~1.EXE > nul6⤵PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA31F~1.EXE > nul5⤵PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03966~1.EXE > nul4⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3DE39~1.EXE > nul3⤵PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5ff713f324a07f84380795fd740232696
SHA1f0eff341be2e05611ee736d7ab9790252bc2e267
SHA256b5aee5640805dd29d04c79c8b07488891e685ee24a4dad71e1deb1a4f511e052
SHA5120f22feaa4a5f7d7392a623efab92bcdf3b61d06f42c48b79d1c988f8136e2423b5477247a333a66fe93b575b18bd29678a6c38e8646378f40a9b41f6771dd9cc
-
Filesize
180KB
MD5b429a3662d824f0d6ad7b1a323d3974e
SHA15a1bd56da2b3250ad0e5c3d3e01c946454861888
SHA256ea6956720743a5186c1468175fcd02fac1b8b42b0991bdc577d39572aa363fc2
SHA512efddaffe32a93d1f316afb1bd0904a32303505d350539238ef3bb81afee8a952e94ad7db60bf319b9570d61320659f9465ec94a874becbfcf79ef562525dc7e7
-
Filesize
180KB
MD50f4605339e1eed8e6d1ea70e358eb4e8
SHA1fecb60b98f569de48fe33b772fd0f0e08a80592e
SHA256982d96e3473f97998988c57669ad9e4f3949dd50e76c11dd974af2c7f050dbd1
SHA5125b1c44c99ce2e14588f853aa0038c6bfa972a0f94895b7747af82edff1d8df2a0d2b8c9e9802644afb872532781f808cfa2aecdf7da2c6f9897e1ac822d78fa8
-
Filesize
180KB
MD50ead6a394497803e336a384a202c42e2
SHA1de737ec2eb2e9f51ddbb3622ff9410b62b621a37
SHA256837a890ff5213b552e79ad4c5d50244eac3c87ad2ea41617300b208ee8d6193f
SHA512b4a147db5e45b3c1bf0bc1524e9164cdbd259e06b8511edeba714718063e77c7aac6c066a105bcba9c0c394fb1fb619e7ea801ef1acabd9486822671a0f53f53
-
Filesize
180KB
MD5f86d1e753844e8bdb4cc5474944931b7
SHA1abf1578873682c2af8bed6bb93cca5d20dc3befe
SHA256f975b953e0e03d5e756ede5eaf5a7e587e4ea186671cee3b2b6e72b9f35b5106
SHA5122d15fc126cc3f2d1bc3930c9d15d3d4b1840c92916c47857d38c65f07110f5e2b5f7d44d2f17082c37dc8c3d7b79aca34ec3a38db50169fb97e39637507fbfcd
-
Filesize
180KB
MD53bc6b5338a3d0e0679ae4f628ba9b78c
SHA172cc670069d8f75f21d3a7115ae55423506997e0
SHA25606ce3924577e296f590aa04afd9a68500e8899d6a2410535bb9c05a040a6a19d
SHA51231ec1c27a5490eb0220070b7f0186cfa59b1095da713b1b67ef05f70a266211bf74fdb15405c33fa74b9a41356b22d991821b126c51485e79b1162c732a55956
-
Filesize
180KB
MD56a7fbe40110dfecd6f55d8e95d26656c
SHA134b9bc086fc23eded30c7b23daf8e7be452cda68
SHA25660216226fd69f265582b2329952d55c320875ddf819af3564299d44c636f08ad
SHA512c54a8ed40797181c0a66e7f42a1f8b6ab799e20810b3c851c9a4e04cf961c0c7bb00b89e3e9ee1a4bbd8b4896f94fcbfe685e66a96fe933cf73be5953f74df77
-
Filesize
180KB
MD54e3a7c183c0cac288eceed0c0003a7b2
SHA1c3e0e772de65551ad4567590c879830390be1f73
SHA25635ff58edf7f4dffd62515b4742c1049c485755c9475ea041f85f68a6b5f15fe8
SHA512dff2bd62bf73a7c567bfd39bc5a473c40e7e7c92d42832d8c1ac0845037bc3aada51f04e1f767ed4d80854484ab984e687223d26a231e4b9faf45cf3564321c7
-
Filesize
180KB
MD5f63c4822f606126ff62021299e14f431
SHA1273b19847a223d0e60db00475eefeaf193bf225f
SHA256d2ddcb2d71438bfbbc8b98e23ccd91bf1a68c4a20409b8e4f1b879bff578c45d
SHA51210dc35633790fca0dc0397b963cc460ee1b6cd9f3494550fe2570b1d2128669295160ae198b630225cab4571a73be243d1b520d2fdac025d677819368933d9bf
-
Filesize
180KB
MD5da1ef825d2705405e05e8eebf3dbba07
SHA1158749d38b54aa3b7840fb03c14ecddeae91e9e1
SHA256254a5b558e533ee346b56ebea19e6f17053aeb9d9393ac85cf63d0e000ac0ead
SHA512f51682d2ab6d2e4e00dbd145a81db6fb5fc680add0438f651c3b80c0815b5669561bd3d98a3f06040e9ccc7ba1d63f5c1ee20432ee609b007acc401f9409a269
-
Filesize
180KB
MD552a76e601a306cc96e23e9903bf73641
SHA143a065537b2e41ca3cb25e1212d1ae997d2af973
SHA256885a1a6de2631573ab1a300eee178943932f91e9e95ed65858621b4aedb360e3
SHA512cdc6f222c59740dac5577fea468329f2645024329517502a230751ad9b53ad1b5eee1269ffe2f962d5cb8635a7fc1130a4774e7db9ecc51213f75a815ceb02b5