Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/02/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe
-
Size
408KB
-
MD5
2f0e633f67331e013a375568b2b31e16
-
SHA1
14a99464cddc6d9308fdac009efafae19bd35d7f
-
SHA256
0d7edd2bef6578e24fe679046060bc1aa116bb0089f574ee99c160c162cf81f0
-
SHA512
580f356c0b47bcf66d2a0a172962c20a67fa1dd521ec47e7b7129bdb9454aaa96fec75a245d9fe9a1ae4fd25da20e8f541309532378c32f8e2f2c14163775f82
-
SSDEEP
3072:CEGh0orl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEG5ldOe2MUVg3vTeKcAEciTBqr3jy9
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral1/files/0x000b000000012274-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001231d-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012274-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000000b1f5-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001100000000b1f5-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001200000000b1f5-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001300000000b1f5-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000004ed7-82.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F1682937-283E-460b-AED0-74B8D1E7CAD1}\stubpath = "C:\\Windows\\{F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe" {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}\stubpath = "C:\\Windows\\{0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe" {B6B0642D-A942-4947-BECE-949441766EBB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C2772DF-F970-46a0-9DFB-763CD20E5E66} {A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{924985C6-899B-4e27-9232-5CF7F164CC1E} {0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F1682937-283E-460b-AED0-74B8D1E7CAD1} {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6B0642D-A942-4947-BECE-949441766EBB} {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6B0642D-A942-4947-BECE-949441766EBB}\stubpath = "C:\\Windows\\{B6B0642D-A942-4947-BECE-949441766EBB}.exe" {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9384CB79-815A-405c-86C4-85766BAC656D} {7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A21BBF68-150D-4355-8F74-8B7C8CAB0341} {9384CB79-815A-405c-86C4-85766BAC656D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B179818C-4A39-4ccd-80DF-498E0D0438A8} {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E3CA581-9671-48fe-880E-582162C43702} {7F718F93-14DE-4260-859C-5B31A66A7020}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E3CA581-9671-48fe-880E-582162C43702}\stubpath = "C:\\Windows\\{8E3CA581-9671-48fe-880E-582162C43702}.exe" {7F718F93-14DE-4260-859C-5B31A66A7020}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A1353F98-1393-4dfd-A65B-83436B5EAC1C}\stubpath = "C:\\Windows\\{A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe" {8E3CA581-9671-48fe-880E-582162C43702}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B179818C-4A39-4ccd-80DF-498E0D0438A8}\stubpath = "C:\\Windows\\{B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe" {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7524FA6E-9BE9-41f6-B26A-8ACA57CB1202} {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}\stubpath = "C:\\Windows\\{7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe" {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9384CB79-815A-405c-86C4-85766BAC656D}\stubpath = "C:\\Windows\\{9384CB79-815A-405c-86C4-85766BAC656D}.exe" {7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F718F93-14DE-4260-859C-5B31A66A7020}\stubpath = "C:\\Windows\\{7F718F93-14DE-4260-859C-5B31A66A7020}.exe" 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{924985C6-899B-4e27-9232-5CF7F164CC1E}\stubpath = "C:\\Windows\\{924985C6-899B-4e27-9232-5CF7F164CC1E}.exe" {0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C2772DF-F970-46a0-9DFB-763CD20E5E66}\stubpath = "C:\\Windows\\{0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe" {A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A1353F98-1393-4dfd-A65B-83436B5EAC1C} {8E3CA581-9671-48fe-880E-582162C43702}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5} {B6B0642D-A942-4947-BECE-949441766EBB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A21BBF68-150D-4355-8F74-8B7C8CAB0341}\stubpath = "C:\\Windows\\{A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe" {9384CB79-815A-405c-86C4-85766BAC656D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F718F93-14DE-4260-859C-5B31A66A7020} 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe -
Deletes itself 1 IoCs
pid Process 2664 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2096 {7F718F93-14DE-4260-859C-5B31A66A7020}.exe 2816 {8E3CA581-9671-48fe-880E-582162C43702}.exe 2896 {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe 1900 {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe 2644 {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe 1068 {B6B0642D-A942-4947-BECE-949441766EBB}.exe 1260 {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe 2340 {7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe 2476 {9384CB79-815A-405c-86C4-85766BAC656D}.exe 1220 {A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe 2124 {0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe 1496 {924985C6-899B-4e27-9232-5CF7F164CC1E}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe {8E3CA581-9671-48fe-880E-582162C43702}.exe File created C:\Windows\{B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe File created C:\Windows\{F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe File created C:\Windows\{B6B0642D-A942-4947-BECE-949441766EBB}.exe {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe File created C:\Windows\{7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe File created C:\Windows\{A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe {9384CB79-815A-405c-86C4-85766BAC656D}.exe File created C:\Windows\{7F718F93-14DE-4260-859C-5B31A66A7020}.exe 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe File created C:\Windows\{8E3CA581-9671-48fe-880E-582162C43702}.exe {7F718F93-14DE-4260-859C-5B31A66A7020}.exe File created C:\Windows\{0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe {A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe File created C:\Windows\{924985C6-899B-4e27-9232-5CF7F164CC1E}.exe {0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe File created C:\Windows\{0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe {B6B0642D-A942-4947-BECE-949441766EBB}.exe File created C:\Windows\{9384CB79-815A-405c-86C4-85766BAC656D}.exe {7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2168 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe Token: SeIncBasePriorityPrivilege 2096 {7F718F93-14DE-4260-859C-5B31A66A7020}.exe Token: SeIncBasePriorityPrivilege 2816 {8E3CA581-9671-48fe-880E-582162C43702}.exe Token: SeIncBasePriorityPrivilege 2896 {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe Token: SeIncBasePriorityPrivilege 1900 {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe Token: SeIncBasePriorityPrivilege 2644 {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe Token: SeIncBasePriorityPrivilege 1068 {B6B0642D-A942-4947-BECE-949441766EBB}.exe Token: SeIncBasePriorityPrivilege 1260 {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe Token: SeIncBasePriorityPrivilege 2340 {7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe Token: SeIncBasePriorityPrivilege 2476 {9384CB79-815A-405c-86C4-85766BAC656D}.exe Token: SeIncBasePriorityPrivilege 1220 {A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe Token: SeIncBasePriorityPrivilege 2124 {0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2096 2168 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe 28 PID 2168 wrote to memory of 2096 2168 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe 28 PID 2168 wrote to memory of 2096 2168 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe 28 PID 2168 wrote to memory of 2096 2168 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe 28 PID 2168 wrote to memory of 2664 2168 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe 29 PID 2168 wrote to memory of 2664 2168 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe 29 PID 2168 wrote to memory of 2664 2168 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe 29 PID 2168 wrote to memory of 2664 2168 2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe 29 PID 2096 wrote to memory of 2816 2096 {7F718F93-14DE-4260-859C-5B31A66A7020}.exe 30 PID 2096 wrote to memory of 2816 2096 {7F718F93-14DE-4260-859C-5B31A66A7020}.exe 30 PID 2096 wrote to memory of 2816 2096 {7F718F93-14DE-4260-859C-5B31A66A7020}.exe 30 PID 2096 wrote to memory of 2816 2096 {7F718F93-14DE-4260-859C-5B31A66A7020}.exe 30 PID 2096 wrote to memory of 2844 2096 {7F718F93-14DE-4260-859C-5B31A66A7020}.exe 31 PID 2096 wrote to memory of 2844 2096 {7F718F93-14DE-4260-859C-5B31A66A7020}.exe 31 PID 2096 wrote to memory of 2844 2096 {7F718F93-14DE-4260-859C-5B31A66A7020}.exe 31 PID 2096 wrote to memory of 2844 2096 {7F718F93-14DE-4260-859C-5B31A66A7020}.exe 31 PID 2816 wrote to memory of 2896 2816 {8E3CA581-9671-48fe-880E-582162C43702}.exe 33 PID 2816 wrote to memory of 2896 2816 {8E3CA581-9671-48fe-880E-582162C43702}.exe 33 PID 2816 wrote to memory of 2896 2816 {8E3CA581-9671-48fe-880E-582162C43702}.exe 33 PID 2816 wrote to memory of 2896 2816 {8E3CA581-9671-48fe-880E-582162C43702}.exe 33 PID 2816 wrote to memory of 2720 2816 {8E3CA581-9671-48fe-880E-582162C43702}.exe 32 PID 2816 wrote to memory of 2720 2816 {8E3CA581-9671-48fe-880E-582162C43702}.exe 32 PID 2816 wrote to memory of 2720 2816 {8E3CA581-9671-48fe-880E-582162C43702}.exe 32 PID 2816 wrote to memory of 2720 2816 {8E3CA581-9671-48fe-880E-582162C43702}.exe 32 PID 2896 wrote to memory of 1900 2896 {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe 37 PID 2896 wrote to memory of 1900 2896 {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe 37 PID 2896 wrote to memory of 1900 2896 {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe 37 PID 2896 wrote to memory of 1900 2896 {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe 37 PID 2896 wrote to memory of 1568 2896 {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe 36 PID 2896 wrote to memory of 1568 2896 {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe 36 PID 2896 wrote to memory of 1568 2896 {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe 36 PID 2896 wrote to memory of 1568 2896 {A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe 36 PID 1900 wrote to memory of 2644 1900 {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe 38 PID 1900 wrote to memory of 2644 1900 {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe 38 PID 1900 wrote to memory of 2644 1900 {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe 38 PID 1900 wrote to memory of 2644 1900 {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe 38 PID 1900 wrote to memory of 3012 1900 {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe 39 PID 1900 wrote to memory of 3012 1900 {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe 39 PID 1900 wrote to memory of 3012 1900 {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe 39 PID 1900 wrote to memory of 3012 1900 {B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe 39 PID 2644 wrote to memory of 1068 2644 {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe 41 PID 2644 wrote to memory of 1068 2644 {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe 41 PID 2644 wrote to memory of 1068 2644 {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe 41 PID 2644 wrote to memory of 1068 2644 {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe 41 PID 2644 wrote to memory of 288 2644 {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe 40 PID 2644 wrote to memory of 288 2644 {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe 40 PID 2644 wrote to memory of 288 2644 {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe 40 PID 2644 wrote to memory of 288 2644 {F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe 40 PID 1068 wrote to memory of 1260 1068 {B6B0642D-A942-4947-BECE-949441766EBB}.exe 42 PID 1068 wrote to memory of 1260 1068 {B6B0642D-A942-4947-BECE-949441766EBB}.exe 42 PID 1068 wrote to memory of 1260 1068 {B6B0642D-A942-4947-BECE-949441766EBB}.exe 42 PID 1068 wrote to memory of 1260 1068 {B6B0642D-A942-4947-BECE-949441766EBB}.exe 42 PID 1068 wrote to memory of 1984 1068 {B6B0642D-A942-4947-BECE-949441766EBB}.exe 43 PID 1068 wrote to memory of 1984 1068 {B6B0642D-A942-4947-BECE-949441766EBB}.exe 43 PID 1068 wrote to memory of 1984 1068 {B6B0642D-A942-4947-BECE-949441766EBB}.exe 43 PID 1068 wrote to memory of 1984 1068 {B6B0642D-A942-4947-BECE-949441766EBB}.exe 43 PID 1260 wrote to memory of 2340 1260 {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe 44 PID 1260 wrote to memory of 2340 1260 {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe 44 PID 1260 wrote to memory of 2340 1260 {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe 44 PID 1260 wrote to memory of 2340 1260 {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe 44 PID 1260 wrote to memory of 1572 1260 {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe 45 PID 1260 wrote to memory of 1572 1260 {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe 45 PID 1260 wrote to memory of 1572 1260 {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe 45 PID 1260 wrote to memory of 1572 1260 {0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\{7F718F93-14DE-4260-859C-5B31A66A7020}.exeC:\Windows\{7F718F93-14DE-4260-859C-5B31A66A7020}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\{8E3CA581-9671-48fe-880E-582162C43702}.exeC:\Windows\{8E3CA581-9671-48fe-880E-582162C43702}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E3CA~1.EXE > nul4⤵PID:2720
-
-
C:\Windows\{A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exeC:\Windows\{A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1353~1.EXE > nul5⤵PID:1568
-
-
C:\Windows\{B179818C-4A39-4ccd-80DF-498E0D0438A8}.exeC:\Windows\{B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\{F1682937-283E-460b-AED0-74B8D1E7CAD1}.exeC:\Windows\{F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1682~1.EXE > nul7⤵PID:288
-
-
C:\Windows\{B6B0642D-A942-4947-BECE-949441766EBB}.exeC:\Windows\{B6B0642D-A942-4947-BECE-949441766EBB}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\{0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exeC:\Windows\{0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\{7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exeC:\Windows\{7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7524F~1.EXE > nul10⤵PID:1516
-
-
C:\Windows\{9384CB79-815A-405c-86C4-85766BAC656D}.exeC:\Windows\{9384CB79-815A-405c-86C4-85766BAC656D}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Windows\{A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exeC:\Windows\{A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1220 -
C:\Windows\{0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exeC:\Windows\{0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2124 -
C:\Windows\{924985C6-899B-4e27-9232-5CF7F164CC1E}.exeC:\Windows\{924985C6-899B-4e27-9232-5CF7F164CC1E}.exe13⤵
- Executes dropped EXE
PID:1496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0C277~1.EXE > nul13⤵PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A21BB~1.EXE > nul12⤵PID:1368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9384C~1.EXE > nul11⤵PID:2948
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0BCF6~1.EXE > nul9⤵PID:1572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6B06~1.EXE > nul8⤵PID:1984
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1798~1.EXE > nul6⤵PID:3012
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7F718~1.EXE > nul3⤵PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5a772122d040f5a9e7163758048753cba
SHA1387aabdbc4a0329cc09b4e775a283e55a26aa822
SHA25604f577c2295616244e9c22107e104f4ac0a6585aa19b27652031d615c6f1ed73
SHA5123f9cdbd8982cff08501e51c692e71d0288eef50803645ece81034b87d7bb362a7b23ed9e73b29e9b6c76942bfd8ea8a8f1f0cc940aa9279434fb9f8dfbdc4dba
-
Filesize
408KB
MD5654e59dc575f9c8bf04a2b851ffbbd09
SHA11a2941e880a6231a3d8dac532c9f352ea0a6cfbe
SHA25694f256f9f782f01a1d347b17e1b0770bd71f0f13ec785ecf4bf1606b331183e6
SHA512ed4861d571113433ca91af30f5d08e0ce2a786b730a75d037accefc28dc0b8f93bb05de027058b50b2604bc3b27764da53d32c1754f1505b4d7ae1fc18caae1b
-
Filesize
408KB
MD56a863effca9c97d7609a4d23473106ae
SHA1dc15c9a0cfc9ada78c080ba677a840a560ab9462
SHA25675cf77240c74be1f08d2952d6fd56c7dcd411c6857cea14a2abb00d90a30b14b
SHA512dc9a3f4307118c97969ff1770e25a4d5b34d280093a979c03840fd544b20597585db465aacf22df18ccb7e1e6936a8c195972e15142fb8eb5f9ed85de9b4b3b9
-
Filesize
408KB
MD51a91c32050d9a59ba70a75a07b812e01
SHA1a5d868f46435d80b1512c77df8197ec134a7e1a3
SHA256f0daec3fd195bd080b60607fc8da6dd12f675df37287587b67c9c1ec5cb6b3e6
SHA5129f7e43a092d9362577d108a36711bf083e1ce6825499bb634e210265ac33f546628ce1af9c6996317f008d44526ae78abd0088283f5f98e05b87f9a08b3cf4c5
-
Filesize
408KB
MD5ecbb175403e4ce09c14c1f46968f5f56
SHA1766961b94285f05ae38f1a0c728346d6a1b7f2ed
SHA256438068bd6715a31f33735881976d44b3a53d57f47ccbf787d28fc17c404281a3
SHA512069ab95e00adfaeaf4cdce764ab15d7d4b15a818566770b8b9716b12b4342a014dc26d21d79fea69e7a8f686e2e551544504192729ad544b0e81a875cdf16663
-
Filesize
408KB
MD53598fe8bf3c1f62d3bb304f7c3564565
SHA1d50b0b315258246c22b2c9e66e175191eae5c0a3
SHA2563efcef4aaf5afff88361c0395538cc34695e9a5d052c00bd0198f25a38f82905
SHA512aedb87ceb1da1aea16f40d44f4b80bc51aad78b323f1d0edef6aae75441f7c66a0485dd18b01505b4f662582038c67b80e0426b20579202199483d1c529d848d
-
Filesize
408KB
MD5560de02efc680141e59f445c926f8e01
SHA18d3bd719c4b5aa2785469ce2f782c76c259e7dca
SHA2568f418b0b46b51d85631e6e05fe5f1af80f52b8580c36732b4c5572e09b6391e9
SHA512f17297c0f99354312495d3a5ef846f8153cb5fa1ff632c3c590783dd510d2aa2e3bf0bbb7fd7c6e8a422ee7bee97f9723ffb6fedbac70b8794d138b153596fcf
-
Filesize
408KB
MD500e0a8a2f8dee1d347363ef48f1d4424
SHA1cd821e638657e800557569e5c6cf9acc1f020331
SHA256ea6014684df1f97c08060b364fda0d5b12cc46f5db9ed757b25b188922b09303
SHA512e1dd6b1f2a06e816b974f8390532ca872d5331f9937b3b069d6066de98f5016047d2f3656351a8144e490503e020a6dca00ea6801465edfccd3f924cd01688d8
-
Filesize
408KB
MD5a58964e81cb02b70e13842bcbe28307f
SHA1a7c75c77c1735e48ebd7ec33e8a9ae87258503bb
SHA256a3deebef2881c3c834e44e26be1af45837119014fa8dd75ea3581f3b38969eec
SHA51228b664b2456bf0eae2eb1424c5aa0155d5dbd0eafe9b46751d612265418f98c7e481b56c0e5718f08cd7ece54894ee698a28228b05bcba0a6304f5876e843f07
-
Filesize
408KB
MD51770bcdeaa4b179ec9b5f8fa267daea6
SHA153dcfd9da959ab0be53cec0709df0c6a853c81d8
SHA256fa227dc8415885fc353a5a7632abc820c2d138c8dc424934458439435a8da065
SHA512ce1551ccaed17f41d6b6693e2a4cbe7b3b1563375348d4c01f470d4dd4f38325b2425ba4a21b4a6d7206f0e46b34382360426f3c57f2c8e32c8462eb9a6a4d51
-
Filesize
408KB
MD55e282ae188b0a3ca946dc8087f2414b4
SHA1e60373b0a282c65dcc1f0dc5079213d516fedb0c
SHA25678e3a634f4274db5eb353347273d20a29799f526e78418939bbefdab8585b7a5
SHA51233c38d559795e15cbca720ec6609557ea24e195becef49c5394ba2b624932851429a0e54e54c9fea7ba16e2943a72d17e4d6d16df9f771ead99f87240ddb0d0b
-
Filesize
408KB
MD5ecd71d7eb55ff5ca155768df22805b5d
SHA1a5b8b0c3ad47388c25f1c82025fed6fdd9838fc5
SHA256aa98c0c90ba79c5832212178d7aa87829e72ff54950737218aa94dbe8c9ab81b
SHA512d4791fe0704ff64e08c6d6794678b98b484f068dc4fbf840885c6950ab29a176693edb429fe49bea169ea6d1c8b85fe98bc273b3d3cc5df233dd30c6b884cfa5