Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/02/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe
-
Size
168KB
-
MD5
4848c742a84ccdfdb81fea25fbfbee7c
-
SHA1
7c46053d89f15df7d8360a064531c23369028ffa
-
SHA256
9765be7826adf144df01b85b2483b9a25e1618834e0af6222e18a65181865cc9
-
SHA512
500a3c073b939e7cb9ad3fcec1a402904b91215c8657880591a125e690425c1a60427518b97a42bbbccaa6ea3e111617fa13bb65ecb21138052c9718fb023ee8
-
SSDEEP
1536:1EGh0oNlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oNlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x0009000000012262-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001230d-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000012262-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000b1f7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0002000000010f1d-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000500000000b1f7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0003000000010f1d-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000b1f7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000010f1d-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000700000000b1f7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000010f1d-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4A7152AC-9BE8-4ff2-9B34-9609048F14A5} 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B64A0FC5-C888-40e0-8D70-18A73B1AB491}\stubpath = "C:\\Windows\\{B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe" {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1A89C9F4-B91D-4993-896C-FAE277A3CC4A}\stubpath = "C:\\Windows\\{1A89C9F4-B91D-4993-896C-FAE277A3CC4A}.exe" {8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D84C4C67-1E0D-4c6f-81FA-3A1C9C387240} {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E}\stubpath = "C:\\Windows\\{8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E}.exe" {D84C4C67-1E0D-4c6f-81FA-3A1C9C387240}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B18A8581-D898-4ee4-B740-133724EED24E} {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B18A8581-D898-4ee4-B740-133724EED24E}\stubpath = "C:\\Windows\\{B18A8581-D898-4ee4-B740-133724EED24E}.exe" {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D} {B18A8581-D898-4ee4-B740-133724EED24E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}\stubpath = "C:\\Windows\\{F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe" {B18A8581-D898-4ee4-B740-133724EED24E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0299A1B4-64EF-4c62-A7C6-030A154777CE} {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB260F36-A2DB-4b6a-9CDC-1F70C1768303}\stubpath = "C:\\Windows\\{EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe" {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1A89C9F4-B91D-4993-896C-FAE277A3CC4A} {8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B64A0FC5-C888-40e0-8D70-18A73B1AB491} {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F69900B-6410-40a0-9D3B-0686EC6D4843} {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F69900B-6410-40a0-9D3B-0686EC6D4843}\stubpath = "C:\\Windows\\{8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe" {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4187679B-3DD1-465b-9EFC-682D1524D357} {1A89C9F4-B91D-4993-896C-FAE277A3CC4A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4A7152AC-9BE8-4ff2-9B34-9609048F14A5}\stubpath = "C:\\Windows\\{4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe" 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0299A1B4-64EF-4c62-A7C6-030A154777CE}\stubpath = "C:\\Windows\\{0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe" {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB260F36-A2DB-4b6a-9CDC-1F70C1768303} {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D84C4C67-1E0D-4c6f-81FA-3A1C9C387240}\stubpath = "C:\\Windows\\{D84C4C67-1E0D-4c6f-81FA-3A1C9C387240}.exe" {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E} {D84C4C67-1E0D-4c6f-81FA-3A1C9C387240}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4187679B-3DD1-465b-9EFC-682D1524D357}\stubpath = "C:\\Windows\\{4187679B-3DD1-465b-9EFC-682D1524D357}.exe" {1A89C9F4-B91D-4993-896C-FAE277A3CC4A}.exe -
Deletes itself 1 IoCs
pid Process 2188 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2380 {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe 1736 {B18A8581-D898-4ee4-B740-133724EED24E}.exe 2948 {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe 2580 {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe 2264 {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe 784 {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe 1896 {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe 344 {D84C4C67-1E0D-4c6f-81FA-3A1C9C387240}.exe 1564 {8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E}.exe 2792 {1A89C9F4-B91D-4993-896C-FAE277A3CC4A}.exe 2368 {4187679B-3DD1-465b-9EFC-682D1524D357}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{D84C4C67-1E0D-4c6f-81FA-3A1C9C387240}.exe {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe File created C:\Windows\{1A89C9F4-B91D-4993-896C-FAE277A3CC4A}.exe {8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E}.exe File created C:\Windows\{4187679B-3DD1-465b-9EFC-682D1524D357}.exe {1A89C9F4-B91D-4993-896C-FAE277A3CC4A}.exe File created C:\Windows\{4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe File created C:\Windows\{F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe {B18A8581-D898-4ee4-B740-133724EED24E}.exe File created C:\Windows\{B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe File created C:\Windows\{8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe File created C:\Windows\{0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe File created C:\Windows\{EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe File created C:\Windows\{8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E}.exe {D84C4C67-1E0D-4c6f-81FA-3A1C9C387240}.exe File created C:\Windows\{B18A8581-D898-4ee4-B740-133724EED24E}.exe {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2976 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe Token: SeIncBasePriorityPrivilege 2380 {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe Token: SeIncBasePriorityPrivilege 1736 {B18A8581-D898-4ee4-B740-133724EED24E}.exe Token: SeIncBasePriorityPrivilege 2948 {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe Token: SeIncBasePriorityPrivilege 2580 {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe Token: SeIncBasePriorityPrivilege 2264 {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe Token: SeIncBasePriorityPrivilege 784 {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe Token: SeIncBasePriorityPrivilege 1896 {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe Token: SeIncBasePriorityPrivilege 344 {D84C4C67-1E0D-4c6f-81FA-3A1C9C387240}.exe Token: SeIncBasePriorityPrivilege 1564 {8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E}.exe Token: SeIncBasePriorityPrivilege 2792 {1A89C9F4-B91D-4993-896C-FAE277A3CC4A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2380 2976 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe 28 PID 2976 wrote to memory of 2380 2976 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe 28 PID 2976 wrote to memory of 2380 2976 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe 28 PID 2976 wrote to memory of 2380 2976 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe 28 PID 2976 wrote to memory of 2188 2976 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe 29 PID 2976 wrote to memory of 2188 2976 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe 29 PID 2976 wrote to memory of 2188 2976 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe 29 PID 2976 wrote to memory of 2188 2976 2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe 29 PID 2380 wrote to memory of 1736 2380 {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe 30 PID 2380 wrote to memory of 1736 2380 {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe 30 PID 2380 wrote to memory of 1736 2380 {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe 30 PID 2380 wrote to memory of 1736 2380 {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe 30 PID 2380 wrote to memory of 1172 2380 {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe 31 PID 2380 wrote to memory of 1172 2380 {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe 31 PID 2380 wrote to memory of 1172 2380 {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe 31 PID 2380 wrote to memory of 1172 2380 {4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe 31 PID 1736 wrote to memory of 2948 1736 {B18A8581-D898-4ee4-B740-133724EED24E}.exe 33 PID 1736 wrote to memory of 2948 1736 {B18A8581-D898-4ee4-B740-133724EED24E}.exe 33 PID 1736 wrote to memory of 2948 1736 {B18A8581-D898-4ee4-B740-133724EED24E}.exe 33 PID 1736 wrote to memory of 2948 1736 {B18A8581-D898-4ee4-B740-133724EED24E}.exe 33 PID 1736 wrote to memory of 2828 1736 {B18A8581-D898-4ee4-B740-133724EED24E}.exe 32 PID 1736 wrote to memory of 2828 1736 {B18A8581-D898-4ee4-B740-133724EED24E}.exe 32 PID 1736 wrote to memory of 2828 1736 {B18A8581-D898-4ee4-B740-133724EED24E}.exe 32 PID 1736 wrote to memory of 2828 1736 {B18A8581-D898-4ee4-B740-133724EED24E}.exe 32 PID 2948 wrote to memory of 2580 2948 {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe 36 PID 2948 wrote to memory of 2580 2948 {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe 36 PID 2948 wrote to memory of 2580 2948 {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe 36 PID 2948 wrote to memory of 2580 2948 {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe 36 PID 2948 wrote to memory of 2612 2948 {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe 37 PID 2948 wrote to memory of 2612 2948 {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe 37 PID 2948 wrote to memory of 2612 2948 {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe 37 PID 2948 wrote to memory of 2612 2948 {F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe 37 PID 2580 wrote to memory of 2264 2580 {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe 38 PID 2580 wrote to memory of 2264 2580 {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe 38 PID 2580 wrote to memory of 2264 2580 {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe 38 PID 2580 wrote to memory of 2264 2580 {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe 38 PID 2580 wrote to memory of 2560 2580 {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe 39 PID 2580 wrote to memory of 2560 2580 {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe 39 PID 2580 wrote to memory of 2560 2580 {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe 39 PID 2580 wrote to memory of 2560 2580 {B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe 39 PID 2264 wrote to memory of 784 2264 {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe 41 PID 2264 wrote to memory of 784 2264 {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe 41 PID 2264 wrote to memory of 784 2264 {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe 41 PID 2264 wrote to memory of 784 2264 {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe 41 PID 2264 wrote to memory of 1776 2264 {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe 40 PID 2264 wrote to memory of 1776 2264 {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe 40 PID 2264 wrote to memory of 1776 2264 {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe 40 PID 2264 wrote to memory of 1776 2264 {8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe 40 PID 784 wrote to memory of 1896 784 {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe 42 PID 784 wrote to memory of 1896 784 {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe 42 PID 784 wrote to memory of 1896 784 {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe 42 PID 784 wrote to memory of 1896 784 {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe 42 PID 784 wrote to memory of 1952 784 {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe 43 PID 784 wrote to memory of 1952 784 {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe 43 PID 784 wrote to memory of 1952 784 {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe 43 PID 784 wrote to memory of 1952 784 {0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe 43 PID 1896 wrote to memory of 344 1896 {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe 44 PID 1896 wrote to memory of 344 1896 {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe 44 PID 1896 wrote to memory of 344 1896 {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe 44 PID 1896 wrote to memory of 344 1896 {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe 44 PID 1896 wrote to memory of 640 1896 {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe 45 PID 1896 wrote to memory of 640 1896 {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe 45 PID 1896 wrote to memory of 640 1896 {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe 45 PID 1896 wrote to memory of 640 1896 {EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_4848c742a84ccdfdb81fea25fbfbee7c_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\{4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exeC:\Windows\{4A7152AC-9BE8-4ff2-9B34-9609048F14A5}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\{B18A8581-D898-4ee4-B740-133724EED24E}.exeC:\Windows\{B18A8581-D898-4ee4-B740-133724EED24E}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B18A8~1.EXE > nul4⤵PID:2828
-
-
C:\Windows\{F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exeC:\Windows\{F410749D-3DDD-4c32-8D6B-FE9E4C0DF14D}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\{B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exeC:\Windows\{B64A0FC5-C888-40e0-8D70-18A73B1AB491}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\{8F69900B-6410-40a0-9D3B-0686EC6D4843}.exeC:\Windows\{8F69900B-6410-40a0-9D3B-0686EC6D4843}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F699~1.EXE > nul7⤵PID:1776
-
-
C:\Windows\{0299A1B4-64EF-4c62-A7C6-030A154777CE}.exeC:\Windows\{0299A1B4-64EF-4c62-A7C6-030A154777CE}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\{EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exeC:\Windows\{EB260F36-A2DB-4b6a-9CDC-1F70C1768303}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\{D84C4C67-1E0D-4c6f-81FA-3A1C9C387240}.exeC:\Windows\{D84C4C67-1E0D-4c6f-81FA-3A1C9C387240}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:344 -
C:\Windows\{8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E}.exeC:\Windows\{8C38A6E3-CD0D-42b0-BCD8-36DF12C0A22E}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\{1A89C9F4-B91D-4993-896C-FAE277A3CC4A}.exeC:\Windows\{1A89C9F4-B91D-4993-896C-FAE277A3CC4A}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Windows\{4187679B-3DD1-465b-9EFC-682D1524D357}.exeC:\Windows\{4187679B-3DD1-465b-9EFC-682D1524D357}.exe12⤵
- Executes dropped EXE
PID:2368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1A89C~1.EXE > nul12⤵PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C38A~1.EXE > nul11⤵PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D84C4~1.EXE > nul10⤵PID:320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EB260~1.EXE > nul9⤵PID:640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0299A~1.EXE > nul8⤵PID:1952
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B64A0~1.EXE > nul6⤵PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4107~1.EXE > nul5⤵PID:2612
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4A715~1.EXE > nul3⤵PID:1172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD56b444e975ab181b0cc420516570f670b
SHA18adf13ed1299dd1cfc9e10208fd45723dfd80d4f
SHA256685b52279455ce6b4eee49bae92c3726d81c202bccf1b66d4b76f6c52531db79
SHA512ba85a6bb5562a5a513e4e9b5a9f4fb27c9c317725cc21bb0c3895cfae8e9c523f79cabec1eca4abfecdc43727c9da98f14289043f5b79f9e0e171245723219e5
-
Filesize
168KB
MD52de32ba2d0711e0e2117ce3726b3bb32
SHA1264285a22bfc396509d03b735214d8b21ead5ad1
SHA256ff2577caf5b1c7c9394453f70ca93193312efd303629572e637da691046565ab
SHA512b561e1cfd9dc75da756d2445065f4ac02d4a364beb6f19de9ac04e35287c1d2ce5cbfa68cc1b88349ab244bc26872a6cda718d11d56a0f84f9768b6698a616c1
-
Filesize
168KB
MD5d4f670382c27a51a598694b583ebe15a
SHA17fa06275ab3413b7c58c6b829f6ba87ebb941f7b
SHA256f6255e1bc2f1c1f22e75f0e11b93cbeb140b4e142c0e8069ae82e2ff18016217
SHA51295a63039f94ad08840819def5e7a56c04b9eb29cc13698c64ec0aa17edf0737c28e5f51373ca5604d4fe9d32139825de2b620d3090abb5127a29a521f2e7b11c
-
Filesize
168KB
MD572b7872f1df243b59eed4e7b2fb47cac
SHA1798e553f6640717f60b405308e891182f86bbaf9
SHA25624178e84a18502c7bb3a88e7a24abd2646964081a5e7709535d5a45d816985fb
SHA512db603feac7c283fe19aec3ab4fe6a98cacdfd276011f248064c58868c9f8e7e19b1c11afcf7b8eb6d56588c63a2f2bb6fac0b47f573050ae5a6cd6996cf1344d
-
Filesize
168KB
MD54742ef8119bfda94215ef6c69c400d04
SHA19a118ae4c753b07452b0193ec9bda61e70e4dcaf
SHA2566b47bd172644c810e135fb10679f64d2780c17114decd9bd5331cf7c669332d4
SHA5120e4d676f1d347ca70dfc253c82cc9fe09b6e2e4a97a86caa205ef2dbcd59bf42e8453f93b3205b1b8a3081f9e69f4281fcf839c5a7b61621b6daff91f750c06a
-
Filesize
168KB
MD50a11b15aed7f503360fa62011f7f1541
SHA12e02ee08a5d0edf3077f9ceef063d1687a5d88c8
SHA256c330d1d515ac53be75dc23bf68c5fa7465f11f4521819be5b7c1302d5d654e5c
SHA512ee4acadde7eea51429ee811c23a29592b4f18c458a98392434e0ab653699f50436c9caf24a53561680e8bc1bb15446c3dba41d878f8a04f25dbbee90495efb38
-
Filesize
168KB
MD5a08cd44ddbdc2be9d7680b5d48e25133
SHA1059dd6108b65cdeb5275f4ac337c3fd73a1c6de9
SHA2560a2df12ba7afd82722e2924609ce70f91b6726fd04f3fcc2692c5ab0ad862193
SHA512143f00955f036e83497ad337a655bf71055db51b107fda9432f40e59bfad1fcb888350fec8a233b7bd58638a1e18028db7fe8bac4f27502ef65600aa6c4b6628
-
Filesize
168KB
MD5b0dd83bf764a41d627954b52d43d8e45
SHA189d444cbd3a8c15786f3bdcc23bf614359b575d5
SHA2569d16ccb878ec44fcf7c04a573e5f1e00dbaa2fd6d87ea8a55266ff954016999a
SHA5123809b2cc7b15860fe40a06379246a9d8cc9dc43f8e98c9edcac1815821695308db854527bedb256fa94cde6593a73c1677e966c733b9b9acc7bd1e100fbe8487
-
Filesize
168KB
MD565e25591e2df10b2106c2e9b1ebfcf1f
SHA19dba5afebe42625cbb82b7caefc9e11b6fbd4939
SHA256fecc2e9d5e370f701c2e2ca38089726611607d024e48ec029b113640a89b32dd
SHA512449ed6e412410c28f409a935887e7ad3662598e7a75766323159eac80c7f545374f23a086b6858cb472b9d8e6f9bb0639add9dfb338d342a94ca3a217d5d7662
-
Filesize
168KB
MD5ce8e204100ee8e174bc5a85102deedf6
SHA1b6e1efe30e5c366608016251e4154152b4fcc3df
SHA25644221e1a746268d371163e32c4124b5464f2e08ba6364a9d3502d35f225a4ebc
SHA512a1f02a381d51c12efc32fc1f6fa1fcb79aff7c4377e72b30a2009db3f0d619b84feb5c1846646b756cb326c4e53abe92c5bc4e1a49da0cbfe6a8347391904138
-
Filesize
168KB
MD5dd8174840d2482c7aca30d6dbc7431a6
SHA11a68433ac22474d94a19bea9d6491086cb04db20
SHA25622ede4f47385f0df2ab8ca37c13305a86e2da703fb1d55f113aba13f5ca64500
SHA512ac6964230e2031c68f1f2d7061438920eee3cd0902b949947cacfcb4d70d87e9477a44f0fc3db40bfdd37955ea41f5157c2cd74d6cf56089465375b749c872b3