Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe
-
Size
344KB
-
MD5
e8e30d11b3770e6704888e4b5ddf8115
-
SHA1
98775ad34e4e47c84766859ca53020120130af02
-
SHA256
9e3b86279c8c2a84675646e21d94d1b99d6610b368c199abdc37fc13d0e21fee
-
SHA512
6268252e6a76a5305c291a4b3f50e94af0e9a8272140dcf227826f8da22740b616f22b4f1f2087cd01845ae9e882baf542c4b78788e9a8733abfaa50a56766f7
-
SSDEEP
3072:mEGh0oolEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGalqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000d000000012246-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001232a-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000012246-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a0000000146c8-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000012246-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0010000000012246-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0011000000012246-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{68E32B28-49CA-47c7-88F7-20737AA86A77}\stubpath = "C:\\Windows\\{68E32B28-49CA-47c7-88F7-20737AA86A77}.exe" 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA644BCA-138D-4aae-A994-6247EBC152C8} {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{47C4DBE2-986E-4efa-805C-B24ADDC9D958} {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}\stubpath = "C:\\Windows\\{65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe" {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{41DC206B-9943-4485-9F5D-E8DD60B6B509}\stubpath = "C:\\Windows\\{41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe" {65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{231A0106-DFEA-40c9-9EBE-C1F0E4CCF444} {3451706C-208E-4f7c-8A13-5A54E688E983}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDE37791-2513-43e9-8D7B-BEB8F2F1B59F} {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}\stubpath = "C:\\Windows\\{BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe" {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9EB5620-0885-4af3-BEE9-2FA01202E44C} {B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3451706C-208E-4f7c-8A13-5A54E688E983}\stubpath = "C:\\Windows\\{3451706C-208E-4f7c-8A13-5A54E688E983}.exe" {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37} {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{41DC206B-9943-4485-9F5D-E8DD60B6B509} {65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B912A057-4374-475c-BEEA-51A9C2C2CC88} {41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}\stubpath = "C:\\Windows\\{231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe" {3451706C-208E-4f7c-8A13-5A54E688E983}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B912A057-4374-475c-BEEA-51A9C2C2CC88}\stubpath = "C:\\Windows\\{B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe" {41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{68E32B28-49CA-47c7-88F7-20737AA86A77} 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0C575C9-5307-43b6-802A-E7185C1F7B52} {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0C575C9-5307-43b6-802A-E7185C1F7B52}\stubpath = "C:\\Windows\\{C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe" {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA644BCA-138D-4aae-A994-6247EBC152C8}\stubpath = "C:\\Windows\\{EA644BCA-138D-4aae-A994-6247EBC152C8}.exe" {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{47C4DBE2-986E-4efa-805C-B24ADDC9D958}\stubpath = "C:\\Windows\\{47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe" {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3451706C-208E-4f7c-8A13-5A54E688E983} {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9EB5620-0885-4af3-BEE9-2FA01202E44C}\stubpath = "C:\\Windows\\{B9EB5620-0885-4af3-BEE9-2FA01202E44C}.exe" {B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe -
Deletes itself 1 IoCs
pid Process 2104 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2520 {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe 2420 {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe 2812 {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe 2704 {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe 2136 {3451706C-208E-4f7c-8A13-5A54E688E983}.exe 1756 {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe 768 {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe 2580 {65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe 2776 {41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe 2688 {B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe 556 {B9EB5620-0885-4af3-BEE9-2FA01202E44C}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe {41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe File created C:\Windows\{68E32B28-49CA-47c7-88F7-20737AA86A77}.exe 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe File created C:\Windows\{C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe File created C:\Windows\{EA644BCA-138D-4aae-A994-6247EBC152C8}.exe {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe File created C:\Windows\{3451706C-208E-4f7c-8A13-5A54E688E983}.exe {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe File created C:\Windows\{231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe {3451706C-208E-4f7c-8A13-5A54E688E983}.exe File created C:\Windows\{41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe {65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe File created C:\Windows\{47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe File created C:\Windows\{BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe File created C:\Windows\{65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe File created C:\Windows\{B9EB5620-0885-4af3-BEE9-2FA01202E44C}.exe {B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2672 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe Token: SeIncBasePriorityPrivilege 2520 {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe Token: SeIncBasePriorityPrivilege 2420 {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe Token: SeIncBasePriorityPrivilege 2812 {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe Token: SeIncBasePriorityPrivilege 2704 {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe Token: SeIncBasePriorityPrivilege 2136 {3451706C-208E-4f7c-8A13-5A54E688E983}.exe Token: SeIncBasePriorityPrivilege 1756 {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe Token: SeIncBasePriorityPrivilege 768 {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe Token: SeIncBasePriorityPrivilege 2580 {65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe Token: SeIncBasePriorityPrivilege 2776 {41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe Token: SeIncBasePriorityPrivilege 2688 {B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2520 2672 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe 28 PID 2672 wrote to memory of 2520 2672 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe 28 PID 2672 wrote to memory of 2520 2672 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe 28 PID 2672 wrote to memory of 2520 2672 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe 28 PID 2672 wrote to memory of 2104 2672 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe 29 PID 2672 wrote to memory of 2104 2672 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe 29 PID 2672 wrote to memory of 2104 2672 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe 29 PID 2672 wrote to memory of 2104 2672 2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe 29 PID 2520 wrote to memory of 2420 2520 {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe 31 PID 2520 wrote to memory of 2420 2520 {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe 31 PID 2520 wrote to memory of 2420 2520 {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe 31 PID 2520 wrote to memory of 2420 2520 {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe 31 PID 2520 wrote to memory of 1280 2520 {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe 30 PID 2520 wrote to memory of 1280 2520 {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe 30 PID 2520 wrote to memory of 1280 2520 {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe 30 PID 2520 wrote to memory of 1280 2520 {68E32B28-49CA-47c7-88F7-20737AA86A77}.exe 30 PID 2420 wrote to memory of 2812 2420 {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe 33 PID 2420 wrote to memory of 2812 2420 {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe 33 PID 2420 wrote to memory of 2812 2420 {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe 33 PID 2420 wrote to memory of 2812 2420 {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe 33 PID 2420 wrote to memory of 2744 2420 {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe 32 PID 2420 wrote to memory of 2744 2420 {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe 32 PID 2420 wrote to memory of 2744 2420 {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe 32 PID 2420 wrote to memory of 2744 2420 {C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe 32 PID 2812 wrote to memory of 2704 2812 {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe 36 PID 2812 wrote to memory of 2704 2812 {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe 36 PID 2812 wrote to memory of 2704 2812 {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe 36 PID 2812 wrote to memory of 2704 2812 {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe 36 PID 2812 wrote to memory of 2588 2812 {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe 37 PID 2812 wrote to memory of 2588 2812 {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe 37 PID 2812 wrote to memory of 2588 2812 {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe 37 PID 2812 wrote to memory of 2588 2812 {EA644BCA-138D-4aae-A994-6247EBC152C8}.exe 37 PID 2704 wrote to memory of 2136 2704 {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe 38 PID 2704 wrote to memory of 2136 2704 {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe 38 PID 2704 wrote to memory of 2136 2704 {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe 38 PID 2704 wrote to memory of 2136 2704 {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe 38 PID 2704 wrote to memory of 1876 2704 {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe 39 PID 2704 wrote to memory of 1876 2704 {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe 39 PID 2704 wrote to memory of 1876 2704 {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe 39 PID 2704 wrote to memory of 1876 2704 {47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe 39 PID 2136 wrote to memory of 1756 2136 {3451706C-208E-4f7c-8A13-5A54E688E983}.exe 40 PID 2136 wrote to memory of 1756 2136 {3451706C-208E-4f7c-8A13-5A54E688E983}.exe 40 PID 2136 wrote to memory of 1756 2136 {3451706C-208E-4f7c-8A13-5A54E688E983}.exe 40 PID 2136 wrote to memory of 1756 2136 {3451706C-208E-4f7c-8A13-5A54E688E983}.exe 40 PID 2136 wrote to memory of 1664 2136 {3451706C-208E-4f7c-8A13-5A54E688E983}.exe 41 PID 2136 wrote to memory of 1664 2136 {3451706C-208E-4f7c-8A13-5A54E688E983}.exe 41 PID 2136 wrote to memory of 1664 2136 {3451706C-208E-4f7c-8A13-5A54E688E983}.exe 41 PID 2136 wrote to memory of 1664 2136 {3451706C-208E-4f7c-8A13-5A54E688E983}.exe 41 PID 1756 wrote to memory of 768 1756 {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe 42 PID 1756 wrote to memory of 768 1756 {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe 42 PID 1756 wrote to memory of 768 1756 {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe 42 PID 1756 wrote to memory of 768 1756 {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe 42 PID 1756 wrote to memory of 2472 1756 {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe 43 PID 1756 wrote to memory of 2472 1756 {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe 43 PID 1756 wrote to memory of 2472 1756 {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe 43 PID 1756 wrote to memory of 2472 1756 {231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe 43 PID 768 wrote to memory of 2580 768 {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe 44 PID 768 wrote to memory of 2580 768 {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe 44 PID 768 wrote to memory of 2580 768 {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe 44 PID 768 wrote to memory of 2580 768 {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe 44 PID 768 wrote to memory of 2924 768 {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe 45 PID 768 wrote to memory of 2924 768 {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe 45 PID 768 wrote to memory of 2924 768 {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe 45 PID 768 wrote to memory of 2924 768 {BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\{68E32B28-49CA-47c7-88F7-20737AA86A77}.exeC:\Windows\{68E32B28-49CA-47c7-88F7-20737AA86A77}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{68E32~1.EXE > nul3⤵PID:1280
-
-
C:\Windows\{C0C575C9-5307-43b6-802A-E7185C1F7B52}.exeC:\Windows\{C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0C57~1.EXE > nul4⤵PID:2744
-
-
C:\Windows\{EA644BCA-138D-4aae-A994-6247EBC152C8}.exeC:\Windows\{EA644BCA-138D-4aae-A994-6247EBC152C8}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\{47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exeC:\Windows\{47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\{3451706C-208E-4f7c-8A13-5A54E688E983}.exeC:\Windows\{3451706C-208E-4f7c-8A13-5A54E688E983}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\{231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exeC:\Windows\{231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\{BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exeC:\Windows\{BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\{65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exeC:\Windows\{65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{65C5A~1.EXE > nul10⤵PID:2932
-
-
C:\Windows\{41DC206B-9943-4485-9F5D-E8DD60B6B509}.exeC:\Windows\{41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41DC2~1.EXE > nul11⤵PID:2148
-
-
C:\Windows\{B912A057-4374-475c-BEEA-51A9C2C2CC88}.exeC:\Windows\{B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\{B9EB5620-0885-4af3-BEE9-2FA01202E44C}.exeC:\Windows\{B9EB5620-0885-4af3-BEE9-2FA01202E44C}.exe12⤵
- Executes dropped EXE
PID:556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B912A~1.EXE > nul12⤵PID:1352
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BDE37~1.EXE > nul9⤵PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{231A0~1.EXE > nul8⤵PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34517~1.EXE > nul7⤵PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{47C4D~1.EXE > nul6⤵PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA644~1.EXE > nul5⤵PID:2588
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD57d29d1ad14627e9ee6e2152254fcda68
SHA1376381d5d26fc9976692ab9e13dfc04bd425b75c
SHA2569e407493b5d326242109b48603882e59402aef6a64a7201ba46a578ad5472953
SHA512fee7e6ee4e079a4aa62bb0ed774ae025171c6462e9d3d2b62eee54e7272d7f78e07ac2a433ee1981e035f6fdeb1ad34340f6ac46a27c9eb9e070a73b1e577fd6
-
Filesize
344KB
MD5fe8407f4ea2c7a3f9adf58e76c9eb5f1
SHA114b4ffb359b7b30d3bec64a60f8e368eb961eb9e
SHA256a09189a7c12a683fba2ac8cad31930d31bb156222cae0a4aba945e4097ded5f6
SHA512f09e0bfd426a496429c19826ff95378fc5f89c36c0cd9a5c07bff3fe97afef3dcb409bbbd73637d20a7c8cfa1966b447af06fea5c3464b5cb54e8a41922c832f
-
Filesize
344KB
MD559089d8940209969b2bd403f125fc430
SHA1427a37b7143d502b55e95ed2727eba965a292608
SHA25622077899c6a2b609719dc2edc53f05ed76eea197443357c9b8de09eaa752b40f
SHA51230000043a5e41cbee9c4cf9daee7aa99a7b09ff22b0baaa5638f47b01462e4533c7ee244f546080334617e50b4fcb1ba7af0f27dc2dabaeaa4fb5be23c4d5b97
-
Filesize
344KB
MD52de2d324123604eea32e146c414de300
SHA10597bdf057916ade86bb4ac1098988f65476f1ff
SHA256a93e09fdfee53a7f854a75815a966a86c179790e4cc285d36057b891c03d2199
SHA512aa76004e5c6063f6b4567637e5b400b5a4be646ec8b089d8be081e2458054e15a2930bcd7a859588c791fc35b1c800037b336c9c571b0b97ff530306e0e02337
-
Filesize
344KB
MD50eaf0e4d9d63c69641f5314bdcd0f3e3
SHA1af5998f74f8903a2658df011450623bcfa8bd53a
SHA2566c9cf6691475dbc79e7ed1bb74b8a0ac45eb42efa68b9469a9527abd468f3d3f
SHA5124601adbef46369d72d25fc7be9dbd012614dfc465fadd6f087c40bd8576c6647241750cc9373c4f00a8432e8790cb94dc6375aaf8f8bbd31b26039c282f5e13c
-
Filesize
344KB
MD5ebf2b4025189346ec537de5cbf923084
SHA17a120928c5badf1f7edb7f20dd92a9f3a4351e22
SHA256bf8f0007d8a28484bab79b5a963ce90777565b97090986635efc83c4ea6d9319
SHA512c4176355289781d9911a7d9cd802933c77a81848e67e19fe06cffd0a5d46a178999e858b267444b902ce7e1706927b0e151c9b0a5040489e32b021ea99e8cc41
-
Filesize
344KB
MD503309cab5f88b927286fc9f8ff0afa2a
SHA1bb19262852b23634c5b3f052eeafdf3c581c007e
SHA256b28ea95bcb2086bd8164137531474a22c353d0e5b770eb81372e473e9471c2ef
SHA5122722c1182aabac6964c700d194e051d2cea724761e5850dfbbab5da8b0a2d71820c89bb41a507c845eb1198d45af9bc217a7dd87d99b25ac932b07bdde2dbbfb
-
Filesize
344KB
MD550a018658789bc906be9dd2db3494b2d
SHA1d31ba08135b3649e0b0919c7b0ef8a234c5966b9
SHA2565e6b1a08538213d23bee8db57641bb08d11be1d250831198b1604e5f42af81b0
SHA512348b9651a4e4dbd107b41531325a527acc47bf68375cd29432f061af35eb3ec6bd2e480fc4e2906a9f694a794ab550cd1f7bef386405d24b56a948645b775bb3
-
Filesize
344KB
MD5708442a4994b7f2d87965bffcd9ce37e
SHA1295eaae48219e1e7185b0ef9023633f7b0962d45
SHA2568881a0d8e5444ab7415c9ad543cd1e87dd103f31360659174b933bcb71c8ba71
SHA512c20c266b8f517b1cd78593d040a0124fc9cb8f2baf88267373613dac3a56f970e0bea48c3393591d1718e33434c93f1a30f6c38c6db0f4fe8e425b7201c3ea41
-
Filesize
344KB
MD5ce7261b825fe3ecb9cbb60fa3b07fad0
SHA12c0e1c75ed509f082168a0595963dd5999433800
SHA256987dab23b8f62b6cc2a0f38aabfbef53eae0497962425f615f6493f3f638d0c6
SHA512a9077b796273aea262e86cb4b6dc9b58e1b375bb8157f113c56776dfa50916879b38857d583cab4370c236719c010041ae04485641fb7f4438aeb329ae1b44cc
-
Filesize
344KB
MD5ab3b0f5d0aa65905f74823bf9656f3d4
SHA100529a24cb812c919bebac04106635822b2f3ca1
SHA256135006e2f3ac75a1523f5cab29ce20cf10fe4e6c12c519b4810350f04c4231d0
SHA51240e7d5815aa9b412df1edfe8156f9d29951b21cb2b74f3b3947611736b2e7e21a8ff2ce700437b6dea33b9b1c1be6383af5e4183ce44406b48aa412c98ecbb71