Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe
-
Size
180KB
-
MD5
59ffb0624b302acdc97c867190301fe1
-
SHA1
1364f5fb65fc1b6c7c3aea6f94d4307288f90675
-
SHA256
defeaaf7b5717c752996f42d1eb79697acb97fef85b95ce320257151996d36a5
-
SHA512
e79cce50618b272165dbebb47fe042797c73c4ef81a9dc56eb751c48046ddba2c3201a42234f7585883f47852b997e5a7728ad164fe53394e9aa2ed75e2beffd
-
SSDEEP
3072:jEGh0o4lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGil5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral1/files/0x000a000000013a1a-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000900000001410b-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000013a1a-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00090000000142cc-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000005a5a-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000013a1a-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000005a5a-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000013a1a-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000005a5a-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000013a1a-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000013a1a-69.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000005a5a-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9AD8EAD0-6251-4414-A6F5-093E3623018D} {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC0A62E8-0913-4def-8D79-52B236C366EB} {EC8B67B4-C653-464f-A749-8B3A55D01186}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{61D97121-52CA-4c2d-9069-240DA74A6B09}\stubpath = "C:\\Windows\\{61D97121-52CA-4c2d-9069-240DA74A6B09}.exe" {FC0A62E8-0913-4def-8D79-52B236C366EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7727CCC5-45F7-4d77-9114-E0DBF5A60188}\stubpath = "C:\\Windows\\{7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe" 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B6E1688-766C-4711-B57A-C0444718CD2E} {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E49ED91-ABA5-4942-9BCB-854634D00AAD}\stubpath = "C:\\Windows\\{9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe" {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01C9C829-BFBE-4d87-A79C-DD4C104CD188}\stubpath = "C:\\Windows\\{01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe" {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B6E1688-766C-4711-B57A-C0444718CD2E}\stubpath = "C:\\Windows\\{8B6E1688-766C-4711-B57A-C0444718CD2E}.exe" {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{61D97121-52CA-4c2d-9069-240DA74A6B09} {FC0A62E8-0913-4def-8D79-52B236C366EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17ECABA5-4588-4586-A70F-A370949A3B5D}\stubpath = "C:\\Windows\\{17ECABA5-4588-4586-A70F-A370949A3B5D}.exe" {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E49ED91-ABA5-4942-9BCB-854634D00AAD} {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9AD8EAD0-6251-4414-A6F5-093E3623018D}\stubpath = "C:\\Windows\\{9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe" {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6794371-C00C-4fe9-A640-F71AC2B96846}\stubpath = "C:\\Windows\\{D6794371-C00C-4fe9-A640-F71AC2B96846}.exe" {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{55C6B2D3-27B8-48fc-9377-B2CB9675C802} {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{55C6B2D3-27B8-48fc-9377-B2CB9675C802}\stubpath = "C:\\Windows\\{55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe" {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17ECABA5-4588-4586-A70F-A370949A3B5D} {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EC8B67B4-C653-464f-A749-8B3A55D01186} {D6794371-C00C-4fe9-A640-F71AC2B96846}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EC8B67B4-C653-464f-A749-8B3A55D01186}\stubpath = "C:\\Windows\\{EC8B67B4-C653-464f-A749-8B3A55D01186}.exe" {D6794371-C00C-4fe9-A640-F71AC2B96846}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC0A62E8-0913-4def-8D79-52B236C366EB}\stubpath = "C:\\Windows\\{FC0A62E8-0913-4def-8D79-52B236C366EB}.exe" {EC8B67B4-C653-464f-A749-8B3A55D01186}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7727CCC5-45F7-4d77-9114-E0DBF5A60188} 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01C9C829-BFBE-4d87-A79C-DD4C104CD188} {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6794371-C00C-4fe9-A640-F71AC2B96846} {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe -
Executes dropped EXE 11 IoCs
pid Process 3016 {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe 2704 {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe 2872 {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe 2976 {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe 1988 {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe 1488 {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe 2784 {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe 1644 {D6794371-C00C-4fe9-A640-F71AC2B96846}.exe 2964 {EC8B67B4-C653-464f-A749-8B3A55D01186}.exe 2900 {FC0A62E8-0913-4def-8D79-52B236C366EB}.exe 2904 {61D97121-52CA-4c2d-9069-240DA74A6B09}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe File created C:\Windows\{9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe File created C:\Windows\{9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe File created C:\Windows\{D6794371-C00C-4fe9-A640-F71AC2B96846}.exe {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe File created C:\Windows\{EC8B67B4-C653-464f-A749-8B3A55D01186}.exe {D6794371-C00C-4fe9-A640-F71AC2B96846}.exe File created C:\Windows\{FC0A62E8-0913-4def-8D79-52B236C366EB}.exe {EC8B67B4-C653-464f-A749-8B3A55D01186}.exe File created C:\Windows\{61D97121-52CA-4c2d-9069-240DA74A6B09}.exe {FC0A62E8-0913-4def-8D79-52B236C366EB}.exe File created C:\Windows\{55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe File created C:\Windows\{8B6E1688-766C-4711-B57A-C0444718CD2E}.exe {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe File created C:\Windows\{17ECABA5-4588-4586-A70F-A370949A3B5D}.exe {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe File created C:\Windows\{7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2420 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe Token: SeIncBasePriorityPrivilege 3016 {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe Token: SeIncBasePriorityPrivilege 2704 {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe Token: SeIncBasePriorityPrivilege 2872 {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe Token: SeIncBasePriorityPrivilege 2976 {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe Token: SeIncBasePriorityPrivilege 1988 {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe Token: SeIncBasePriorityPrivilege 1488 {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe Token: SeIncBasePriorityPrivilege 2784 {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe Token: SeIncBasePriorityPrivilege 1644 {D6794371-C00C-4fe9-A640-F71AC2B96846}.exe Token: SeIncBasePriorityPrivilege 2964 {EC8B67B4-C653-464f-A749-8B3A55D01186}.exe Token: SeIncBasePriorityPrivilege 2900 {FC0A62E8-0913-4def-8D79-52B236C366EB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3016 2420 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe 28 PID 2420 wrote to memory of 3016 2420 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe 28 PID 2420 wrote to memory of 3016 2420 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe 28 PID 2420 wrote to memory of 3016 2420 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe 28 PID 2420 wrote to memory of 3028 2420 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe 29 PID 2420 wrote to memory of 3028 2420 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe 29 PID 2420 wrote to memory of 3028 2420 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe 29 PID 2420 wrote to memory of 3028 2420 2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe 29 PID 3016 wrote to memory of 2704 3016 {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe 30 PID 3016 wrote to memory of 2704 3016 {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe 30 PID 3016 wrote to memory of 2704 3016 {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe 30 PID 3016 wrote to memory of 2704 3016 {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe 30 PID 3016 wrote to memory of 2624 3016 {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe 31 PID 3016 wrote to memory of 2624 3016 {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe 31 PID 3016 wrote to memory of 2624 3016 {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe 31 PID 3016 wrote to memory of 2624 3016 {7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe 31 PID 2704 wrote to memory of 2872 2704 {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe 32 PID 2704 wrote to memory of 2872 2704 {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe 32 PID 2704 wrote to memory of 2872 2704 {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe 32 PID 2704 wrote to memory of 2872 2704 {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe 32 PID 2704 wrote to memory of 2828 2704 {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe 33 PID 2704 wrote to memory of 2828 2704 {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe 33 PID 2704 wrote to memory of 2828 2704 {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe 33 PID 2704 wrote to memory of 2828 2704 {55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe 33 PID 2872 wrote to memory of 2976 2872 {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe 36 PID 2872 wrote to memory of 2976 2872 {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe 36 PID 2872 wrote to memory of 2976 2872 {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe 36 PID 2872 wrote to memory of 2976 2872 {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe 36 PID 2872 wrote to memory of 2296 2872 {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe 37 PID 2872 wrote to memory of 2296 2872 {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe 37 PID 2872 wrote to memory of 2296 2872 {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe 37 PID 2872 wrote to memory of 2296 2872 {01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe 37 PID 2976 wrote to memory of 1988 2976 {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe 39 PID 2976 wrote to memory of 1988 2976 {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe 39 PID 2976 wrote to memory of 1988 2976 {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe 39 PID 2976 wrote to memory of 1988 2976 {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe 39 PID 2976 wrote to memory of 2984 2976 {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe 38 PID 2976 wrote to memory of 2984 2976 {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe 38 PID 2976 wrote to memory of 2984 2976 {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe 38 PID 2976 wrote to memory of 2984 2976 {8B6E1688-766C-4711-B57A-C0444718CD2E}.exe 38 PID 1988 wrote to memory of 1488 1988 {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe 40 PID 1988 wrote to memory of 1488 1988 {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe 40 PID 1988 wrote to memory of 1488 1988 {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe 40 PID 1988 wrote to memory of 1488 1988 {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe 40 PID 1988 wrote to memory of 2788 1988 {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe 41 PID 1988 wrote to memory of 2788 1988 {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe 41 PID 1988 wrote to memory of 2788 1988 {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe 41 PID 1988 wrote to memory of 2788 1988 {17ECABA5-4588-4586-A70F-A370949A3B5D}.exe 41 PID 1488 wrote to memory of 2784 1488 {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe 43 PID 1488 wrote to memory of 2784 1488 {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe 43 PID 1488 wrote to memory of 2784 1488 {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe 43 PID 1488 wrote to memory of 2784 1488 {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe 43 PID 1488 wrote to memory of 2824 1488 {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe 42 PID 1488 wrote to memory of 2824 1488 {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe 42 PID 1488 wrote to memory of 2824 1488 {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe 42 PID 1488 wrote to memory of 2824 1488 {9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe 42 PID 2784 wrote to memory of 1644 2784 {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe 44 PID 2784 wrote to memory of 1644 2784 {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe 44 PID 2784 wrote to memory of 1644 2784 {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe 44 PID 2784 wrote to memory of 1644 2784 {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe 44 PID 2784 wrote to memory of 1580 2784 {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe 45 PID 2784 wrote to memory of 1580 2784 {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe 45 PID 2784 wrote to memory of 1580 2784 {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe 45 PID 2784 wrote to memory of 1580 2784 {9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_59ffb0624b302acdc97c867190301fe1_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\{7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exeC:\Windows\{7727CCC5-45F7-4d77-9114-E0DBF5A60188}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\{55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exeC:\Windows\{55C6B2D3-27B8-48fc-9377-B2CB9675C802}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\{01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exeC:\Windows\{01C9C829-BFBE-4d87-A79C-DD4C104CD188}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{8B6E1688-766C-4711-B57A-C0444718CD2E}.exeC:\Windows\{8B6E1688-766C-4711-B57A-C0444718CD2E}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B6E1~1.EXE > nul6⤵PID:2984
-
-
C:\Windows\{17ECABA5-4588-4586-A70F-A370949A3B5D}.exeC:\Windows\{17ECABA5-4588-4586-A70F-A370949A3B5D}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\{9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exeC:\Windows\{9E49ED91-ABA5-4942-9BCB-854634D00AAD}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E49E~1.EXE > nul8⤵PID:2824
-
-
C:\Windows\{9AD8EAD0-6251-4414-A6F5-093E3623018D}.exeC:\Windows\{9AD8EAD0-6251-4414-A6F5-093E3623018D}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\{D6794371-C00C-4fe9-A640-F71AC2B96846}.exeC:\Windows\{D6794371-C00C-4fe9-A640-F71AC2B96846}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Windows\{EC8B67B4-C653-464f-A749-8B3A55D01186}.exeC:\Windows\{EC8B67B4-C653-464f-A749-8B3A55D01186}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Windows\{FC0A62E8-0913-4def-8D79-52B236C366EB}.exeC:\Windows\{FC0A62E8-0913-4def-8D79-52B236C366EB}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FC0A6~1.EXE > nul12⤵PID:1908
-
-
C:\Windows\{61D97121-52CA-4c2d-9069-240DA74A6B09}.exeC:\Windows\{61D97121-52CA-4c2d-9069-240DA74A6B09}.exe12⤵
- Executes dropped EXE
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EC8B6~1.EXE > nul11⤵PID:268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D6794~1.EXE > nul10⤵PID:1896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9AD8E~1.EXE > nul9⤵PID:1580
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{17ECA~1.EXE > nul7⤵PID:2788
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{01C9C~1.EXE > nul5⤵PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{55C6B~1.EXE > nul4⤵PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7727C~1.EXE > nul3⤵PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5a92ceea59346fe5652a0393449d9f7bf
SHA19f354cdff538917d39d7933300bfe80d2c8af489
SHA256f2fadedecab80c5436106c2aa4b2280a7d2da91e2fecb84cb4c78d6f5f312cfa
SHA512182d8ef1fc5faf4b55d83959739a07210686fa09539fcd276fc937d8172881fec76a013ec5c4a1a434ff044287fbe2b9fa56c44fcb90514870f209ffbf9b49fd
-
Filesize
180KB
MD530dceb4c5b7469c660f568915f0b54a6
SHA17e79cca643df33b5d90d232c20feb65af739710c
SHA2560cec66a055ce0a5ec5bbbbcee1e629f2f78e5887b24df39a9982a14a2056b1b7
SHA51234cad855a0dedadc9d1e259a660ccad3bd7a3b599cad55a305686f73333b1ae009193b56a1eb548489b8f6cd152f4662273e5fe70ac02631ac1d14c052bae1c3
-
Filesize
180KB
MD5f685d99bc119e7b52bf4a7d003b7d996
SHA175a65e34f8118fa075d84bcd45b939ddabcbb83f
SHA256250034364815e42f6bd430e5bf98d64fba17809353a5cd456c5fec7912f3c49d
SHA512d68f66973571b7aacd7eee070f080540b43e5fc2ce930bec6380287272901149bcc6d50af962ba4abb4b8eee12663d4f308eaa7c628a7a254517c55c0dcecd26
-
Filesize
180KB
MD5fefe0b701e4a54fc2c34acaac763037e
SHA15ad1153ef4cdc80555067801aa6d83ed6a01edb4
SHA2562ac557eadf1663f9243e4f249a8a4c2d85c9d9bcef0940dd127b0f6eee96f971
SHA512931a069ae2ac11358629b4f5476c5c23356e166e55e25ffd9f2d95b224ab939d94397556d610251d7286a846ed142631df4110a07731b5f376c0fe0b8a31cbc7
-
Filesize
180KB
MD591baa6e7f1fec7ea899da815c152f0a9
SHA1106a52956ffa463ded9cc78a0d3256bcf7e1e663
SHA256cd193449326418948f655803920d0ad41d1c25825f87a375d9fbca0c406b0518
SHA512f72a7f485e5cdeb54932723c2580ebb57b5475dc3a34a74d32829a67dbe8902867a63752d0b16bb25489cca98601ee70fb6437d43bcd6b9576deff682007df44
-
Filesize
180KB
MD50cf2655e8df4fbb8506c860c054e154f
SHA1b766dc009dd227925c03b5c5d0f5bae20fba7de0
SHA2564362e6d5b93cd45fb31c80c88721b1ebf0145f0cd32a72d40f97cffd53942206
SHA51222d3f312bc8584064d1bbaea041aa46c83faa6becfe4d0d80a7855c0b6eac8fe12d1033abf4a1ec735b3418aedd539cf61f11f999a51f7dda9c7983ca465cfc8
-
Filesize
180KB
MD512147132040ff234e29bfa7ef2014015
SHA1bd11d42e98f0ee8563b38e3a3bdbe12ee9b5a6f3
SHA2562452028036dbd5b84bec16b2da596e083fd06a3b1f9c228403e7f5021a509f37
SHA5127fa445754db7469343a418e72201015a667f1ee3a14f345e70747b6db0cec9cd588fd3b146b4690581689e8035d1c0aef733ae49b73c2fd5cf6e03359529e38a
-
Filesize
180KB
MD59317a1e694f25467ee0dae58c9159b62
SHA1095b808912cd51bfe5b85a3136ae2f74750d0c6c
SHA2562f49b87cc319a9300b5d2309e34eff2ee8a320e320452540cc375d8206d3490a
SHA512dc3c52bab6dd8eaa90b89111fa72d67480ffe4fc26debd603e440f9dce177a6501a8e9669ee414d12a08c7d47c19a400476134208acc00a471855c6c133152ad
-
Filesize
180KB
MD5ee457fa9e3abd2dc765223e7aeac2aa9
SHA194a58ddf744182b9d5e8ba684f952030255566cc
SHA256d207d5bdd7c40e94c08963b6f6fb81d68bad3b2f96c8aae97931891f2041f8fa
SHA512bd944527644465908fba821a955cd37372d6f572a14ab4b1555a6149c7c76bcbcd8b3e98c7c706bed9bb75d56a42160e42a9532c8425d4b6e85b91326e624c57
-
Filesize
180KB
MD564e430cb1572ff7a546d0b8405af6071
SHA173ff58612b0f3ceb29db31e7153b3748be5deb8f
SHA256a326066b74615b8a67f4f4b55267e3a54cb85512aa68ebd68f925d518afe385e
SHA5125e6c880bcc93f9c08cded9198f971446fd8acfc3ec987dee0003d1ad204cc35e470532e00d3b5250c12f120187e7d12ba7428559a0b7d6860624121cadd0b170
-
Filesize
180KB
MD510822fd4244ac02ae4a3a4d613f1b8cf
SHA1947743505281dfef014129392fa7e8df0e7de468
SHA25639be446f7ad3d1ba6df1ddd9e1873c561cf7e681b1d7cd4f81428dfe18799caa
SHA5122c5b3a6c9171a0e0c34d41fbeb345ea9d0ad2f679d8e00ff85431887d8dfdc2925eb90f2e45330483e28fe353a7141dc659e76437e67d4d9d31b1466fa4db3a7
-
Filesize
4KB
MD520e68d522972601599cb52f61b2c4d7d
SHA1eb1c0e6f9a58c6732e19a150430708fbd8d40267
SHA2568d6e912059ad442675b14f94a94e7548b78c84935f79363a56422f1a92490bb9
SHA512ef653f0786e2c9ca55ea2b42b8310e4180636f2026c2ad7847686f0656cc97c42f963ce2d72ee5acff55dad84af8b9e1a6850b342c77921e77b154018ce18ac8