Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/02/2024, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe
-
Size
344KB
-
MD5
60963c9fe998a92198f04daae00c2d77
-
SHA1
39b2ae023e5ea9c54b1332a581e6cd996d3b37fc
-
SHA256
0c9057675ac72e3033f51acaf4317fe6c4417f38e7c68d75e0f266a053815639
-
SHA512
bc2bd2f2107efcdc7ee8435241f1a98de69b8385ea4327e137e3547c73d6271f2ecc881f2e9736f3c2eb3f967de45d661c00fb5383f7cd12d4934e9c3220738c
-
SSDEEP
3072:mEGh0omlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG8lqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000900000001447e-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b0000000144ac-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a00000001447e-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000014825-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000005a59-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b00000001447e-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000005a59-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c00000001447e-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000005a59-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001447e-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000005a59-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C34F267-C6AD-4623-87CF-D740C7A1D3A0} {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DDB01856-6C0A-4003-A1AF-BD1C4661CBD8} {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6EB20AD-361D-4ebd-8C46-7EE930431647} {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C} {45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1} 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}\stubpath = "C:\\Windows\\{DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe" {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7378FE5A-3005-4340-ACE0-B42949952003}\stubpath = "C:\\Windows\\{7378FE5A-3005-4340-ACE0-B42949952003}.exe" {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}\stubpath = "C:\\Windows\\{62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe" {45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FFA0D19F-FAF5-4774-AE22-7077285E7D9A} {62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}\stubpath = "C:\\Windows\\{45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe" {E0F2B5BE-9862-4803-A326-846FA0F65698}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{31DFE9F6-6FBE-409e-97A9-97AA94A5005A} {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}\stubpath = "C:\\Windows\\{BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe" {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6EB20AD-361D-4ebd-8C46-7EE930431647}\stubpath = "C:\\Windows\\{A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe" {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7378FE5A-3005-4340-ACE0-B42949952003} {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E0F2B5BE-9862-4803-A326-846FA0F65698} {7378FE5A-3005-4340-ACE0-B42949952003}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E0F2B5BE-9862-4803-A326-846FA0F65698}\stubpath = "C:\\Windows\\{E0F2B5BE-9862-4803-A326-846FA0F65698}.exe" {7378FE5A-3005-4340-ACE0-B42949952003}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}\stubpath = "C:\\Windows\\{5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe" 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C34F267-C6AD-4623-87CF-D740C7A1D3A0}\stubpath = "C:\\Windows\\{1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe" {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{31DFE9F6-6FBE-409e-97A9-97AA94A5005A}\stubpath = "C:\\Windows\\{31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe" {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78} {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0} {E0F2B5BE-9862-4803-A326-846FA0F65698}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FFA0D19F-FAF5-4774-AE22-7077285E7D9A}\stubpath = "C:\\Windows\\{FFA0D19F-FAF5-4774-AE22-7077285E7D9A}.exe" {62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe -
Deletes itself 1 IoCs
pid Process 3064 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2952 {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe 2632 {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe 2768 {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe 2876 {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe 2968 {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe 2712 {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe 2532 {7378FE5A-3005-4340-ACE0-B42949952003}.exe 2972 {E0F2B5BE-9862-4803-A326-846FA0F65698}.exe 2076 {45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe 2844 {62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe 584 {FFA0D19F-FAF5-4774-AE22-7077285E7D9A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe {E0F2B5BE-9862-4803-A326-846FA0F65698}.exe File created C:\Windows\{1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe File created C:\Windows\{BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe File created C:\Windows\{A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe File created C:\Windows\{7378FE5A-3005-4340-ACE0-B42949952003}.exe {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe File created C:\Windows\{E0F2B5BE-9862-4803-A326-846FA0F65698}.exe {7378FE5A-3005-4340-ACE0-B42949952003}.exe File created C:\Windows\{62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe {45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe File created C:\Windows\{FFA0D19F-FAF5-4774-AE22-7077285E7D9A}.exe {62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe File created C:\Windows\{5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe File created C:\Windows\{31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe File created C:\Windows\{DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2360 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe Token: SeIncBasePriorityPrivilege 2952 {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe Token: SeIncBasePriorityPrivilege 2632 {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe Token: SeIncBasePriorityPrivilege 2768 {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe Token: SeIncBasePriorityPrivilege 2876 {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe Token: SeIncBasePriorityPrivilege 2968 {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe Token: SeIncBasePriorityPrivilege 2712 {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe Token: SeIncBasePriorityPrivilege 2532 {7378FE5A-3005-4340-ACE0-B42949952003}.exe Token: SeIncBasePriorityPrivilege 2972 {E0F2B5BE-9862-4803-A326-846FA0F65698}.exe Token: SeIncBasePriorityPrivilege 2076 {45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe Token: SeIncBasePriorityPrivilege 2844 {62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2952 2360 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe 28 PID 2360 wrote to memory of 2952 2360 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe 28 PID 2360 wrote to memory of 2952 2360 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe 28 PID 2360 wrote to memory of 2952 2360 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe 28 PID 2360 wrote to memory of 3064 2360 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe 29 PID 2360 wrote to memory of 3064 2360 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe 29 PID 2360 wrote to memory of 3064 2360 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe 29 PID 2360 wrote to memory of 3064 2360 2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe 29 PID 2952 wrote to memory of 2632 2952 {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe 30 PID 2952 wrote to memory of 2632 2952 {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe 30 PID 2952 wrote to memory of 2632 2952 {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe 30 PID 2952 wrote to memory of 2632 2952 {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe 30 PID 2952 wrote to memory of 2732 2952 {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe 31 PID 2952 wrote to memory of 2732 2952 {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe 31 PID 2952 wrote to memory of 2732 2952 {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe 31 PID 2952 wrote to memory of 2732 2952 {5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe 31 PID 2632 wrote to memory of 2768 2632 {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe 32 PID 2632 wrote to memory of 2768 2632 {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe 32 PID 2632 wrote to memory of 2768 2632 {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe 32 PID 2632 wrote to memory of 2768 2632 {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe 32 PID 2632 wrote to memory of 2752 2632 {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe 33 PID 2632 wrote to memory of 2752 2632 {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe 33 PID 2632 wrote to memory of 2752 2632 {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe 33 PID 2632 wrote to memory of 2752 2632 {1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe 33 PID 2768 wrote to memory of 2876 2768 {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe 36 PID 2768 wrote to memory of 2876 2768 {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe 36 PID 2768 wrote to memory of 2876 2768 {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe 36 PID 2768 wrote to memory of 2876 2768 {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe 36 PID 2768 wrote to memory of 2996 2768 {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe 37 PID 2768 wrote to memory of 2996 2768 {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe 37 PID 2768 wrote to memory of 2996 2768 {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe 37 PID 2768 wrote to memory of 2996 2768 {31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe 37 PID 2876 wrote to memory of 2968 2876 {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe 38 PID 2876 wrote to memory of 2968 2876 {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe 38 PID 2876 wrote to memory of 2968 2876 {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe 38 PID 2876 wrote to memory of 2968 2876 {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe 38 PID 2876 wrote to memory of 892 2876 {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe 39 PID 2876 wrote to memory of 892 2876 {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe 39 PID 2876 wrote to memory of 892 2876 {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe 39 PID 2876 wrote to memory of 892 2876 {BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe 39 PID 2968 wrote to memory of 2712 2968 {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe 40 PID 2968 wrote to memory of 2712 2968 {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe 40 PID 2968 wrote to memory of 2712 2968 {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe 40 PID 2968 wrote to memory of 2712 2968 {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe 40 PID 2968 wrote to memory of 1876 2968 {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe 41 PID 2968 wrote to memory of 1876 2968 {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe 41 PID 2968 wrote to memory of 1876 2968 {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe 41 PID 2968 wrote to memory of 1876 2968 {DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe 41 PID 2712 wrote to memory of 2532 2712 {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe 42 PID 2712 wrote to memory of 2532 2712 {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe 42 PID 2712 wrote to memory of 2532 2712 {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe 42 PID 2712 wrote to memory of 2532 2712 {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe 42 PID 2712 wrote to memory of 2684 2712 {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe 43 PID 2712 wrote to memory of 2684 2712 {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe 43 PID 2712 wrote to memory of 2684 2712 {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe 43 PID 2712 wrote to memory of 2684 2712 {A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe 43 PID 2532 wrote to memory of 2972 2532 {7378FE5A-3005-4340-ACE0-B42949952003}.exe 44 PID 2532 wrote to memory of 2972 2532 {7378FE5A-3005-4340-ACE0-B42949952003}.exe 44 PID 2532 wrote to memory of 2972 2532 {7378FE5A-3005-4340-ACE0-B42949952003}.exe 44 PID 2532 wrote to memory of 2972 2532 {7378FE5A-3005-4340-ACE0-B42949952003}.exe 44 PID 2532 wrote to memory of 1644 2532 {7378FE5A-3005-4340-ACE0-B42949952003}.exe 45 PID 2532 wrote to memory of 1644 2532 {7378FE5A-3005-4340-ACE0-B42949952003}.exe 45 PID 2532 wrote to memory of 1644 2532 {7378FE5A-3005-4340-ACE0-B42949952003}.exe 45 PID 2532 wrote to memory of 1644 2532 {7378FE5A-3005-4340-ACE0-B42949952003}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\{5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exeC:\Windows\{5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\{1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exeC:\Windows\{1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\{31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exeC:\Windows\{31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\{BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exeC:\Windows\{BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\{DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exeC:\Windows\{DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\{A6EB20AD-361D-4ebd-8C46-7EE930431647}.exeC:\Windows\{A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\{7378FE5A-3005-4340-ACE0-B42949952003}.exeC:\Windows\{7378FE5A-3005-4340-ACE0-B42949952003}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\{E0F2B5BE-9862-4803-A326-846FA0F65698}.exeC:\Windows\{E0F2B5BE-9862-4803-A326-846FA0F65698}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2972 -
C:\Windows\{45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exeC:\Windows\{45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{45501~1.EXE > nul11⤵PID:680
-
-
C:\Windows\{62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exeC:\Windows\{62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{62EDE~1.EXE > nul12⤵PID:2056
-
-
C:\Windows\{FFA0D19F-FAF5-4774-AE22-7077285E7D9A}.exeC:\Windows\{FFA0D19F-FAF5-4774-AE22-7077285E7D9A}.exe12⤵
- Executes dropped EXE
PID:584
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E0F2B~1.EXE > nul10⤵PID:2316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7378F~1.EXE > nul9⤵PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6EB2~1.EXE > nul8⤵PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DDB01~1.EXE > nul7⤵PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BDEC9~1.EXE > nul6⤵PID:892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{31DFE~1.EXE > nul5⤵PID:2996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C34F~1.EXE > nul4⤵PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5BEBB~1.EXE > nul3⤵PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5ee46cd813e525a2dc62207867e49a9ff
SHA16d4a3a499dd28a8d678651c3933bee8038324140
SHA2568f14de4cdc6a39b041ce53c39535fdbe8087778e4a213c9ae786e887069720fb
SHA512d2da7f354fc0a32d39286873c8bd046f9c7ad941352dd7c7931b22821ca68649c750d2b8bd407ea4a602183893c906a72a336b69de08dfb622ed7368e470738c
-
Filesize
344KB
MD5d06cc2f637f73de9c588ae4c79e56308
SHA1bfae570278b33ba659eb0464fb505c4435514bc4
SHA256612db2ca087c56ec666f75ee705b341086b5d3ad5ac9b79345df840dc76253cd
SHA5128f07150fe0da1d1727a371b289c2353b8e139c8ded11f29e166cddf418b920627ad1780490e34b09b0fa6efcbbde9fbe09679c7cb3cfed93b641f70008ab7b59
-
Filesize
344KB
MD5a42a81b93051285bfb67ab802fe3577e
SHA1d9e8c6dc6440a278e59f3f1cba438e268a17fe2d
SHA2566f4908ffb90cfde9c7dfc8fd32466a91e93ff2b57a3111cb67c28a7b3f74ace1
SHA5120ec4a0e3b52c1474e275e5870ae8d081527358643d2051b501b7117b17d4fbf9bdca5869754a9ad84c1d5725d0b29abd511f1189bbc3c9f24931423ece45b14c
-
Filesize
344KB
MD5d5c2c64f0a05d03d6cedd85a3750fe88
SHA13d6103600e60780b748e3d93ae7a0c14f50c9dbd
SHA2568917935d311ba3f4fe2f512cd44eb190c92cb45054c817f30f31927e57454be5
SHA5123e3987c9528ca7ef2858425e4a504208a1007b1f0a418bba0af2df8ccd56a524ebedac2e6f06c3fbb3de755b3244aeb3f13e9b6a35000cd54b60d42ed7d9ebdd
-
Filesize
344KB
MD56983e0d268c7ce43c1039ca2bbc4682f
SHA171c336d30d0843db804235509bd35cb8dd15d83e
SHA2569cd798129258913d1893ff0ae680b9d753429f55a2e5819a46f56c6d5584eac1
SHA5129f8868fe03159f2ae40bc4865db144fc9454fb65004055fd416b811b45d411be06f41ccc82e498a243ec83b2e12ebfbb9451cbdb7e21e74998a634de0c88b6db
-
Filesize
344KB
MD52301d87bd0cd8a9acb22a4bc14d06446
SHA100b67747494e375e990bada36f1c163cd40a5ca0
SHA256f7d4f2f72d5c40573af66538b42df00c10981840af41984058884de07b665575
SHA512505143adedbfc7af149b5fccb74f6a20e9d4a7c5b72d231da32ef5a722b906ff5c3b166726c67de8a0b55021e4ba41289089a7583c9303089900ebeeb2345146
-
Filesize
344KB
MD5316f50bd4452e6f02847c9cb97f0fcec
SHA191aaf38024bae1999efe4254d10986168163c49b
SHA2561af251869203f487edc7f3a5592fd7ba6cec968216fa5ec88489289baf3a1185
SHA512505d9a33e7af195af6ddbbaa180ba8666a991dec96b56a7a494369989128b83d5a6fd999843665b66fb833e9e53e64851bbd3212e758edbd2f9e33b0a0fa659f
-
Filesize
344KB
MD5eef2995c8e9a1049af25fa7ecea95854
SHA170e2b4cd6af2a02087e01744697733ddbf93f734
SHA25615826af1b39880385c21f57050449433d47855a0fa017e99d711dc132c8cae7b
SHA51251bec705d1ba849949e37235260e2b6162320dab5eecd915273b9ee938fafb6ae14f10e909ccebd832a8071c92a9732111963f5f9282fb5281a731203c39c1a1
-
Filesize
344KB
MD5a1ac1dddf8ab1c304a23ec4f99d706c3
SHA15001c091281f0f00789d1a6ab8407618a03d04d4
SHA25686210c6cc1170b5f25f7a3a5972eb6e9929bc53a045a0d8b322cc9e9b15e857d
SHA5128b4ff00a6a1f48a7b3533502794b73281089d406cb96ca1b4487a60098dc3fd156542526935aa4783ec6c55e80611c6ea65249c6256e81119c792b98c04d6067
-
Filesize
344KB
MD5be86709e62f1880ed7286eb906343ab1
SHA1bb4e6d178b1a7a2b2fa5853c2be4288e506ee4eb
SHA25604e7439a569b268154d6bd69d0e28750226196f322799f2d18aff19ed27a2730
SHA512f28736147d92c6b7741b7fa8381b64750e152d3d911a6e45f9fc2d9a164c87b8781845b79ca21a6e99450e31d5d45bd64dfc1b964c936b40aa1a226af835163f
-
Filesize
344KB
MD5928f173e0fdfd6a7981e5fd19a0388ff
SHA1683dc0a5ed8fc7d0f0e23e36b5126a7e9cb46d4e
SHA256912dc79db94148f7f1efc2a6a7a84598d6dab07be55e9f8d901ac79c919a45ce
SHA512ad530df10a8faaaf322248f0a85420a6cbd38dd9196023ab1192107e35395a28fdbd935c112eb7de95d7e2fe42c73234397834248c491347e37398336db165fc