Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe
-
Size
197KB
-
MD5
824b3bd8c222fcdbc3e533c9c859236f
-
SHA1
6d8373ce4735a22ad1cf27660f01776c3624a48d
-
SHA256
89cb50d7ef8764e6651f530632d972d9003683f06b28ac58be4048996ebe5c83
-
SHA512
e0de70d5ac1e7528e3c5bb2eab13f21ed90f340ad32aa7f89a535655430aaaaf232923d6519fa741115d550c73569f2b74e06365e48f158f17086762799e17a1
-
SSDEEP
3072:jEGh0oSl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGwlEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral1/files/0x000b000000012274-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000012274-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c0000000122fe-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0032000000015608-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000000b1f5-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000122fe-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001100000000b1f5-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e0000000122fe-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001200000000b1f5-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f0000000122fe-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001300000000b1f5-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70DC48A6-D4A4-4060-A43B-803264A02811} {468F7DD2-441B-43e0-B626-DFFA0F6D965A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{636E2E3A-5610-46a6-A404-17E38180E451} {8D4C1D97-501B-4be1-8E08-A0DB8075371E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05185A97-1A8F-40a5-BBB2-B588AB14CB3D} 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{274F7BEF-A5F0-4465-8054-5209236072EB}\stubpath = "C:\\Windows\\{274F7BEF-A5F0-4465-8054-5209236072EB}.exe" {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{468F7DD2-441B-43e0-B626-DFFA0F6D965A} {274F7BEF-A5F0-4465-8054-5209236072EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{468F7DD2-441B-43e0-B626-DFFA0F6D965A}\stubpath = "C:\\Windows\\{468F7DD2-441B-43e0-B626-DFFA0F6D965A}.exe" {274F7BEF-A5F0-4465-8054-5209236072EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8D4C1D97-501B-4be1-8E08-A0DB8075371E} {70DC48A6-D4A4-4060-A43B-803264A02811}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05185A97-1A8F-40a5-BBB2-B588AB14CB3D}\stubpath = "C:\\Windows\\{05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe" 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}\stubpath = "C:\\Windows\\{476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe" {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB4AA939-95DA-4539-9217-9DCAAB4B62D7}\stubpath = "C:\\Windows\\{EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe" {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1667A5B7-E47F-484a-AF61-37225B6D4631}\stubpath = "C:\\Windows\\{1667A5B7-E47F-484a-AF61-37225B6D4631}.exe" {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2BE12E3A-2FE5-4365-95EE-626ECFDB12C1} {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}\stubpath = "C:\\Windows\\{2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe" {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A02D684E-CCC6-4bf0-A03E-91AF3C074A63} {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A02D684E-CCC6-4bf0-A03E-91AF3C074A63}\stubpath = "C:\\Windows\\{A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe" {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83} {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB4AA939-95DA-4539-9217-9DCAAB4B62D7} {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{636E2E3A-5610-46a6-A404-17E38180E451}\stubpath = "C:\\Windows\\{636E2E3A-5610-46a6-A404-17E38180E451}.exe" {8D4C1D97-501B-4be1-8E08-A0DB8075371E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{274F7BEF-A5F0-4465-8054-5209236072EB} {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8D4C1D97-501B-4be1-8E08-A0DB8075371E}\stubpath = "C:\\Windows\\{8D4C1D97-501B-4be1-8E08-A0DB8075371E}.exe" {70DC48A6-D4A4-4060-A43B-803264A02811}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1667A5B7-E47F-484a-AF61-37225B6D4631} {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70DC48A6-D4A4-4060-A43B-803264A02811}\stubpath = "C:\\Windows\\{70DC48A6-D4A4-4060-A43B-803264A02811}.exe" {468F7DD2-441B-43e0-B626-DFFA0F6D965A}.exe -
Deletes itself 1 IoCs
pid Process 2396 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2972 {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe 2728 {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe 2580 {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe 2152 {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe 2988 {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe 888 {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe 2856 {274F7BEF-A5F0-4465-8054-5209236072EB}.exe 1308 {468F7DD2-441B-43e0-B626-DFFA0F6D965A}.exe 1672 {70DC48A6-D4A4-4060-A43B-803264A02811}.exe 2004 {8D4C1D97-501B-4be1-8E08-A0DB8075371E}.exe 2756 {636E2E3A-5610-46a6-A404-17E38180E451}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{636E2E3A-5610-46a6-A404-17E38180E451}.exe {8D4C1D97-501B-4be1-8E08-A0DB8075371E}.exe File created C:\Windows\{A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe File created C:\Windows\{274F7BEF-A5F0-4465-8054-5209236072EB}.exe {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe File created C:\Windows\{468F7DD2-441B-43e0-B626-DFFA0F6D965A}.exe {274F7BEF-A5F0-4465-8054-5209236072EB}.exe File created C:\Windows\{70DC48A6-D4A4-4060-A43B-803264A02811}.exe {468F7DD2-441B-43e0-B626-DFFA0F6D965A}.exe File created C:\Windows\{2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe File created C:\Windows\{8D4C1D97-501B-4be1-8E08-A0DB8075371E}.exe {70DC48A6-D4A4-4060-A43B-803264A02811}.exe File created C:\Windows\{05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe File created C:\Windows\{476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe File created C:\Windows\{EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe File created C:\Windows\{1667A5B7-E47F-484a-AF61-37225B6D4631}.exe {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1192 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe Token: SeIncBasePriorityPrivilege 2972 {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe Token: SeIncBasePriorityPrivilege 2728 {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe Token: SeIncBasePriorityPrivilege 2580 {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe Token: SeIncBasePriorityPrivilege 2152 {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe Token: SeIncBasePriorityPrivilege 2988 {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe Token: SeIncBasePriorityPrivilege 888 {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe Token: SeIncBasePriorityPrivilege 2856 {274F7BEF-A5F0-4465-8054-5209236072EB}.exe Token: SeIncBasePriorityPrivilege 1308 {468F7DD2-441B-43e0-B626-DFFA0F6D965A}.exe Token: SeIncBasePriorityPrivilege 1672 {70DC48A6-D4A4-4060-A43B-803264A02811}.exe Token: SeIncBasePriorityPrivilege 2004 {8D4C1D97-501B-4be1-8E08-A0DB8075371E}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2972 1192 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe 28 PID 1192 wrote to memory of 2972 1192 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe 28 PID 1192 wrote to memory of 2972 1192 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe 28 PID 1192 wrote to memory of 2972 1192 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe 28 PID 1192 wrote to memory of 2396 1192 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe 29 PID 1192 wrote to memory of 2396 1192 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe 29 PID 1192 wrote to memory of 2396 1192 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe 29 PID 1192 wrote to memory of 2396 1192 2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe 29 PID 2972 wrote to memory of 2728 2972 {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe 30 PID 2972 wrote to memory of 2728 2972 {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe 30 PID 2972 wrote to memory of 2728 2972 {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe 30 PID 2972 wrote to memory of 2728 2972 {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe 30 PID 2972 wrote to memory of 2348 2972 {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe 31 PID 2972 wrote to memory of 2348 2972 {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe 31 PID 2972 wrote to memory of 2348 2972 {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe 31 PID 2972 wrote to memory of 2348 2972 {05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe 31 PID 2728 wrote to memory of 2580 2728 {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe 34 PID 2728 wrote to memory of 2580 2728 {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe 34 PID 2728 wrote to memory of 2580 2728 {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe 34 PID 2728 wrote to memory of 2580 2728 {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe 34 PID 2728 wrote to memory of 2620 2728 {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe 35 PID 2728 wrote to memory of 2620 2728 {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe 35 PID 2728 wrote to memory of 2620 2728 {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe 35 PID 2728 wrote to memory of 2620 2728 {476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe 35 PID 2580 wrote to memory of 2152 2580 {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe 36 PID 2580 wrote to memory of 2152 2580 {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe 36 PID 2580 wrote to memory of 2152 2580 {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe 36 PID 2580 wrote to memory of 2152 2580 {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe 36 PID 2580 wrote to memory of 1032 2580 {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe 37 PID 2580 wrote to memory of 1032 2580 {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe 37 PID 2580 wrote to memory of 1032 2580 {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe 37 PID 2580 wrote to memory of 1032 2580 {EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe 37 PID 2152 wrote to memory of 2988 2152 {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe 38 PID 2152 wrote to memory of 2988 2152 {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe 38 PID 2152 wrote to memory of 2988 2152 {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe 38 PID 2152 wrote to memory of 2988 2152 {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe 38 PID 2152 wrote to memory of 3012 2152 {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe 39 PID 2152 wrote to memory of 3012 2152 {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe 39 PID 2152 wrote to memory of 3012 2152 {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe 39 PID 2152 wrote to memory of 3012 2152 {1667A5B7-E47F-484a-AF61-37225B6D4631}.exe 39 PID 2988 wrote to memory of 888 2988 {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe 40 PID 2988 wrote to memory of 888 2988 {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe 40 PID 2988 wrote to memory of 888 2988 {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe 40 PID 2988 wrote to memory of 888 2988 {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe 40 PID 2988 wrote to memory of 2852 2988 {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe 41 PID 2988 wrote to memory of 2852 2988 {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe 41 PID 2988 wrote to memory of 2852 2988 {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe 41 PID 2988 wrote to memory of 2852 2988 {2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe 41 PID 888 wrote to memory of 2856 888 {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe 42 PID 888 wrote to memory of 2856 888 {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe 42 PID 888 wrote to memory of 2856 888 {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe 42 PID 888 wrote to memory of 2856 888 {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe 42 PID 888 wrote to memory of 2016 888 {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe 43 PID 888 wrote to memory of 2016 888 {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe 43 PID 888 wrote to memory of 2016 888 {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe 43 PID 888 wrote to memory of 2016 888 {A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe 43 PID 2856 wrote to memory of 1308 2856 {274F7BEF-A5F0-4465-8054-5209236072EB}.exe 44 PID 2856 wrote to memory of 1308 2856 {274F7BEF-A5F0-4465-8054-5209236072EB}.exe 44 PID 2856 wrote to memory of 1308 2856 {274F7BEF-A5F0-4465-8054-5209236072EB}.exe 44 PID 2856 wrote to memory of 1308 2856 {274F7BEF-A5F0-4465-8054-5209236072EB}.exe 44 PID 2856 wrote to memory of 1468 2856 {274F7BEF-A5F0-4465-8054-5209236072EB}.exe 45 PID 2856 wrote to memory of 1468 2856 {274F7BEF-A5F0-4465-8054-5209236072EB}.exe 45 PID 2856 wrote to memory of 1468 2856 {274F7BEF-A5F0-4465-8054-5209236072EB}.exe 45 PID 2856 wrote to memory of 1468 2856 {274F7BEF-A5F0-4465-8054-5209236072EB}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_824b3bd8c222fcdbc3e533c9c859236f_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\{05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exeC:\Windows\{05185A97-1A8F-40a5-BBB2-B588AB14CB3D}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exeC:\Windows\{476DD9C3-04E1-4045-ABD3-8B5FDB4F9D83}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\{EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exeC:\Windows\{EB4AA939-95DA-4539-9217-9DCAAB4B62D7}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\{1667A5B7-E47F-484a-AF61-37225B6D4631}.exeC:\Windows\{1667A5B7-E47F-484a-AF61-37225B6D4631}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\{2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exeC:\Windows\{2BE12E3A-2FE5-4365-95EE-626ECFDB12C1}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\{A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exeC:\Windows\{A02D684E-CCC6-4bf0-A03E-91AF3C074A63}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\{274F7BEF-A5F0-4465-8054-5209236072EB}.exeC:\Windows\{274F7BEF-A5F0-4465-8054-5209236072EB}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\{468F7DD2-441B-43e0-B626-DFFA0F6D965A}.exeC:\Windows\{468F7DD2-441B-43e0-B626-DFFA0F6D965A}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Windows\{70DC48A6-D4A4-4060-A43B-803264A02811}.exeC:\Windows\{70DC48A6-D4A4-4060-A43B-803264A02811}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\{8D4C1D97-501B-4be1-8E08-A0DB8075371E}.exeC:\Windows\{8D4C1D97-501B-4be1-8E08-A0DB8075371E}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\{636E2E3A-5610-46a6-A404-17E38180E451}.exeC:\Windows\{636E2E3A-5610-46a6-A404-17E38180E451}.exe12⤵
- Executes dropped EXE
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D4C1~1.EXE > nul12⤵PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70DC4~1.EXE > nul11⤵PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{468F7~1.EXE > nul10⤵PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{274F7~1.EXE > nul9⤵PID:1468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A02D6~1.EXE > nul8⤵PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2BE12~1.EXE > nul7⤵PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1667A~1.EXE > nul6⤵PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EB4AA~1.EXE > nul5⤵PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{476DD~1.EXE > nul4⤵PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{05185~1.EXE > nul3⤵PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD581fc64e93828a1f65d667f94b7f0a0be
SHA1d2d5b63530e6078d7380369669c26c54080dfc4b
SHA256f18e5ad19892ead33e7b023a90ca9138eeab5b7110b2078dd26abb0ea9d30ce5
SHA51213337a6e155231aa57618fae561d9ecaef68074c8d5872e6533e976cd834fb8f26d0f7705146571e055e159590751076d4b5e73807a5a5ef62ae855c3c0637c1
-
Filesize
173KB
MD58446909832e4a17440ce674bfe060da2
SHA1918e207bd1933892ab7c1dac5a28bdc652dbc55f
SHA256267e58cb9e0a6cf7c673df03300de664c83b3d36d2ddf88da0380ce17e2d5e15
SHA512e6349fea615149c34c55e60b96feb44b50f36f8e14dda91d7c60f78f194cbf000dd19942c64eca988274edebc701a07208843c70c66167712a0dc23bdcdfc1ac
-
Filesize
197KB
MD558363e5483815be9e3a13913c2077381
SHA12d8721ed71bfc17f06fffd3a3ee15dbf361e3d00
SHA2564489171b6548d9271b208d65a3767da776040fc67be584bd50e497ce511e8e35
SHA512c98adfb29d4c6448a2a631b0fd6d1635f328bce8c5f7f6aa679d5f74e88d6cb8810c1406e021833d963fe8e5a5890c561a9c0e3d56651c41f82f9bde23041858
-
Filesize
197KB
MD527a7f3d5abc5207d39c00cf031c9116c
SHA1b477310843fbf96a2cc014cfffe19b2dcc7b6756
SHA2563e4529f5820841242ef931dd45fbfa7445547e6a4607359410bbb7feb8c8e438
SHA512236ec8311d2c73ab18d8316c54388ae9653e4c8e69b50c931d9c7c3aeee009262e745df59c95193a40ad15b084587e9520cec6053a6a5e593fce23438655df3e
-
Filesize
197KB
MD53897ae86446d9a43baa2878d8e001af1
SHA1134465ad92cc4517c6ba09fbc2601bd9d71b4971
SHA256513bce5c1d1327de2ad97e9b34b996171fccfd6da17f1e970803e06734954a91
SHA5128bc7f36a820e06285cf5614405aaef1344921c9f14000e49c27e9528ff9bbc5bd6721a05194493fed201c97a1028a01c2178949032d6fabb790b2c0a987d140f
-
Filesize
197KB
MD52ee408799d3d057e83b40d66300753b9
SHA15471db481f0655d0d1933ce3685feb0604729f0a
SHA256746475d14d1f6e6ac15db02a6d989b1588d060dd0d122d052eae42d874341cae
SHA512e32d05ad6ab7d3599208f81633e3468c1e52adc5c353dfc94f59f85f47a0d6fb6e78f43407d104e844c57c072b9025281ec1cf12080d9df903df29a6bc9f4440
-
Filesize
197KB
MD5fc0a546b0c985360f7cd83adaf715704
SHA190d89ec1e562b4b5e0f1f1b9cfffd90da9c1d0ac
SHA256d915d4aea9420bf7ba0af87bdfe30bc5f520bd9b26bc805ef9fc04af07e66354
SHA512204f4070bf0c78ae20581f8a11a0d6bd2dcfc9b71a389b9c95b328910eb60a00c0a903fa087f2509572769811f75ea3068a8c5a0ced2fee6955c0cad3d591673
-
Filesize
197KB
MD5086ac28f0882f7f2da38275c34ad4a75
SHA15a926acde0c47240ac49b346392e6f467d210a2e
SHA256382d423412f2a705b0ce78b1b8f707391108c48e316401d881cfc325ca60955e
SHA512c04e699ede320c20d4ddc4622f46db0b0d65c376c2161929b9733625189f7f9c3fb4f14b980890535f832036623d64e08c7eccacb1af5809ef86f6549b043c34
-
Filesize
197KB
MD5dd6911f0ee05b40e100d8aa47998dc16
SHA1ba12aa9c972089995c579240616f4832e4acd480
SHA256250e9caf9b401b35b35d3ab2349610d04068afe655b1acfa8d1a179c81de63ee
SHA512aa8999f83749e3a44186b25b1690f937d94a250d15163c68b4ca4e09d1cb54668bdef7742c2d66416a0d1c7a988c3ae38c5cc0fed55a959634761daa31a7c012
-
Filesize
197KB
MD5b02c482e7e7533a044d73706225586c0
SHA19f5a4b98cf16c468d66f0cdeab2e87ace8dad302
SHA256fccc44fc52ea2f460e7fbf0e0cd3c4ba7d96cd38564906d58cdcace8a01da0f2
SHA51278ebf573b4ceb8aa4a67d4afb5055df61ba8507a007ce124d2c4ecdb4cf4cb43c01d9c3e203a5e4a4c3cdaa836819cbd4ceaef5a4ecce22163312c557833397a
-
Filesize
197KB
MD5d5c1ee68f754f327b0e60e034a99b344
SHA1a2a2ba42ed52872a056468200a122914cc99667e
SHA256ac497799405d791b9361a0deae7d9919e86d2cd773ce6ddab2c43f962f4b0242
SHA512f22f9e4b61e9bb0bcc346ad2ef5fdbcb3a30cab90765cc3b25660a0791e9ecde335cf6420a1abff7e83b547cea0c39c14b8b78ae41676e46045929b5c5db6251
-
Filesize
197KB
MD567dda83fc1f56dc49711a98492512974
SHA1c1784dc6740cfd20b83833e6e5bd89335b7f3ed8
SHA256dd375901198c77af2deeeef0c25e2d56e2594b4e7f7db2edcad402fe3cadca8f
SHA512bef75d0c7751bf0d93bcb4714f79d7c23581bf475df866314b1a4ac759ecb9b418754c582ea8e8a60d5919068b2e81af58c98b2a1bbc1de685d591b341570d46