Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe
-
Size
197KB
-
MD5
629d2ea6bfbcb5a115ae6afcd82ec057
-
SHA1
824bcfc6b052cf6a260de85894d4956cc0f7b345
-
SHA256
43011feded4bbaf93d20e9f93ce1ad16d5736bc46f3fbce8cd4b87e0d8e333cd
-
SHA512
28534325d120f7cb6fe4ccb4977252c15a4505883fd2f817ddb832e49e4e9e0d63473d4b0adb1c477201b159c9e83f3fa9d297261b24d3ec1b73235b7f748b71
-
SSDEEP
3072:jEGh0o3l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGplEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x0009000000012251-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000013a83-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000012251-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0036000000016c9c-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000012251-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012251-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000012251-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{537D60FB-804E-42fe-A585-6B16577E1A58}\stubpath = "C:\\Windows\\{537D60FB-804E-42fe-A585-6B16577E1A58}.exe" {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{686D7645-FB5C-475e-A984-C28EC13274B1}\stubpath = "C:\\Windows\\{686D7645-FB5C-475e-A984-C28EC13274B1}.exe" {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB09C957-7BC8-437f-A931-6CD926685DB5} {F96BCD1D-1266-4097-A3F3-1988926D62AB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11260682-F84E-44fb-AF1E-D89567270532} 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}\stubpath = "C:\\Windows\\{0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe" {11260682-F84E-44fb-AF1E-D89567270532}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1446254F-D0A2-4274-9504-4EDFD0110E7B} {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB09C957-7BC8-437f-A931-6CD926685DB5}\stubpath = "C:\\Windows\\{CB09C957-7BC8-437f-A931-6CD926685DB5}.exe" {F96BCD1D-1266-4097-A3F3-1988926D62AB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{936252FB-1F60-4828-B834-0A602A72E15D} {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{936252FB-1F60-4828-B834-0A602A72E15D}\stubpath = "C:\\Windows\\{936252FB-1F60-4828-B834-0A602A72E15D}.exe" {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17995EF2-BD96-4d75-9C95-61B1401249B5} {537D60FB-804E-42fe-A585-6B16577E1A58}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17995EF2-BD96-4d75-9C95-61B1401249B5}\stubpath = "C:\\Windows\\{17995EF2-BD96-4d75-9C95-61B1401249B5}.exe" {537D60FB-804E-42fe-A585-6B16577E1A58}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{686D7645-FB5C-475e-A984-C28EC13274B1} {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E23D974-0056-4c52-9FCC-FEDBD08142E1} {686D7645-FB5C-475e-A984-C28EC13274B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F96BCD1D-1266-4097-A3F3-1988926D62AB} {7E23D974-0056-4c52-9FCC-FEDBD08142E1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11260682-F84E-44fb-AF1E-D89567270532}\stubpath = "C:\\Windows\\{11260682-F84E-44fb-AF1E-D89567270532}.exe" 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3} {11260682-F84E-44fb-AF1E-D89567270532}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}\stubpath = "C:\\Windows\\{E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe" {936252FB-1F60-4828-B834-0A602A72E15D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1446254F-D0A2-4274-9504-4EDFD0110E7B}\stubpath = "C:\\Windows\\{1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe" {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E23D974-0056-4c52-9FCC-FEDBD08142E1}\stubpath = "C:\\Windows\\{7E23D974-0056-4c52-9FCC-FEDBD08142E1}.exe" {686D7645-FB5C-475e-A984-C28EC13274B1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F96BCD1D-1266-4097-A3F3-1988926D62AB}\stubpath = "C:\\Windows\\{F96BCD1D-1266-4097-A3F3-1988926D62AB}.exe" {7E23D974-0056-4c52-9FCC-FEDBD08142E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{537D60FB-804E-42fe-A585-6B16577E1A58} {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0} {936252FB-1F60-4828-B834-0A602A72E15D}.exe -
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2700 {11260682-F84E-44fb-AF1E-D89567270532}.exe 3028 {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe 2632 {537D60FB-804E-42fe-A585-6B16577E1A58}.exe 1940 {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe 2972 {936252FB-1F60-4828-B834-0A602A72E15D}.exe 2264 {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe 352 {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe 1436 {686D7645-FB5C-475e-A984-C28EC13274B1}.exe 2988 {7E23D974-0056-4c52-9FCC-FEDBD08142E1}.exe 2308 {F96BCD1D-1266-4097-A3F3-1988926D62AB}.exe 640 {CB09C957-7BC8-437f-A931-6CD926685DB5}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe {11260682-F84E-44fb-AF1E-D89567270532}.exe File created C:\Windows\{17995EF2-BD96-4d75-9C95-61B1401249B5}.exe {537D60FB-804E-42fe-A585-6B16577E1A58}.exe File created C:\Windows\{1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe File created C:\Windows\{686D7645-FB5C-475e-A984-C28EC13274B1}.exe {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe File created C:\Windows\{CB09C957-7BC8-437f-A931-6CD926685DB5}.exe {F96BCD1D-1266-4097-A3F3-1988926D62AB}.exe File created C:\Windows\{11260682-F84E-44fb-AF1E-D89567270532}.exe 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe File created C:\Windows\{537D60FB-804E-42fe-A585-6B16577E1A58}.exe {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe File created C:\Windows\{936252FB-1F60-4828-B834-0A602A72E15D}.exe {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe File created C:\Windows\{E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe {936252FB-1F60-4828-B834-0A602A72E15D}.exe File created C:\Windows\{7E23D974-0056-4c52-9FCC-FEDBD08142E1}.exe {686D7645-FB5C-475e-A984-C28EC13274B1}.exe File created C:\Windows\{F96BCD1D-1266-4097-A3F3-1988926D62AB}.exe {7E23D974-0056-4c52-9FCC-FEDBD08142E1}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1948 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe Token: SeIncBasePriorityPrivilege 2700 {11260682-F84E-44fb-AF1E-D89567270532}.exe Token: SeIncBasePriorityPrivilege 3028 {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe Token: SeIncBasePriorityPrivilege 2632 {537D60FB-804E-42fe-A585-6B16577E1A58}.exe Token: SeIncBasePriorityPrivilege 1940 {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe Token: SeIncBasePriorityPrivilege 2972 {936252FB-1F60-4828-B834-0A602A72E15D}.exe Token: SeIncBasePriorityPrivilege 2264 {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe Token: SeIncBasePriorityPrivilege 352 {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe Token: SeIncBasePriorityPrivilege 1436 {686D7645-FB5C-475e-A984-C28EC13274B1}.exe Token: SeIncBasePriorityPrivilege 2988 {7E23D974-0056-4c52-9FCC-FEDBD08142E1}.exe Token: SeIncBasePriorityPrivilege 2308 {F96BCD1D-1266-4097-A3F3-1988926D62AB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2700 1948 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe 28 PID 1948 wrote to memory of 2700 1948 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe 28 PID 1948 wrote to memory of 2700 1948 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe 28 PID 1948 wrote to memory of 2700 1948 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe 28 PID 1948 wrote to memory of 2748 1948 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe 29 PID 1948 wrote to memory of 2748 1948 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe 29 PID 1948 wrote to memory of 2748 1948 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe 29 PID 1948 wrote to memory of 2748 1948 2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe 29 PID 2700 wrote to memory of 3028 2700 {11260682-F84E-44fb-AF1E-D89567270532}.exe 30 PID 2700 wrote to memory of 3028 2700 {11260682-F84E-44fb-AF1E-D89567270532}.exe 30 PID 2700 wrote to memory of 3028 2700 {11260682-F84E-44fb-AF1E-D89567270532}.exe 30 PID 2700 wrote to memory of 3028 2700 {11260682-F84E-44fb-AF1E-D89567270532}.exe 30 PID 2700 wrote to memory of 2140 2700 {11260682-F84E-44fb-AF1E-D89567270532}.exe 31 PID 2700 wrote to memory of 2140 2700 {11260682-F84E-44fb-AF1E-D89567270532}.exe 31 PID 2700 wrote to memory of 2140 2700 {11260682-F84E-44fb-AF1E-D89567270532}.exe 31 PID 2700 wrote to memory of 2140 2700 {11260682-F84E-44fb-AF1E-D89567270532}.exe 31 PID 3028 wrote to memory of 2632 3028 {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe 32 PID 3028 wrote to memory of 2632 3028 {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe 32 PID 3028 wrote to memory of 2632 3028 {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe 32 PID 3028 wrote to memory of 2632 3028 {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe 32 PID 3028 wrote to memory of 2780 3028 {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe 33 PID 3028 wrote to memory of 2780 3028 {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe 33 PID 3028 wrote to memory of 2780 3028 {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe 33 PID 3028 wrote to memory of 2780 3028 {0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe 33 PID 2632 wrote to memory of 1940 2632 {537D60FB-804E-42fe-A585-6B16577E1A58}.exe 36 PID 2632 wrote to memory of 1940 2632 {537D60FB-804E-42fe-A585-6B16577E1A58}.exe 36 PID 2632 wrote to memory of 1940 2632 {537D60FB-804E-42fe-A585-6B16577E1A58}.exe 36 PID 2632 wrote to memory of 1940 2632 {537D60FB-804E-42fe-A585-6B16577E1A58}.exe 36 PID 2632 wrote to memory of 2844 2632 {537D60FB-804E-42fe-A585-6B16577E1A58}.exe 37 PID 2632 wrote to memory of 2844 2632 {537D60FB-804E-42fe-A585-6B16577E1A58}.exe 37 PID 2632 wrote to memory of 2844 2632 {537D60FB-804E-42fe-A585-6B16577E1A58}.exe 37 PID 2632 wrote to memory of 2844 2632 {537D60FB-804E-42fe-A585-6B16577E1A58}.exe 37 PID 1940 wrote to memory of 2972 1940 {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe 38 PID 1940 wrote to memory of 2972 1940 {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe 38 PID 1940 wrote to memory of 2972 1940 {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe 38 PID 1940 wrote to memory of 2972 1940 {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe 38 PID 1940 wrote to memory of 312 1940 {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe 39 PID 1940 wrote to memory of 312 1940 {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe 39 PID 1940 wrote to memory of 312 1940 {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe 39 PID 1940 wrote to memory of 312 1940 {17995EF2-BD96-4d75-9C95-61B1401249B5}.exe 39 PID 2972 wrote to memory of 2264 2972 {936252FB-1F60-4828-B834-0A602A72E15D}.exe 40 PID 2972 wrote to memory of 2264 2972 {936252FB-1F60-4828-B834-0A602A72E15D}.exe 40 PID 2972 wrote to memory of 2264 2972 {936252FB-1F60-4828-B834-0A602A72E15D}.exe 40 PID 2972 wrote to memory of 2264 2972 {936252FB-1F60-4828-B834-0A602A72E15D}.exe 40 PID 2972 wrote to memory of 1724 2972 {936252FB-1F60-4828-B834-0A602A72E15D}.exe 41 PID 2972 wrote to memory of 1724 2972 {936252FB-1F60-4828-B834-0A602A72E15D}.exe 41 PID 2972 wrote to memory of 1724 2972 {936252FB-1F60-4828-B834-0A602A72E15D}.exe 41 PID 2972 wrote to memory of 1724 2972 {936252FB-1F60-4828-B834-0A602A72E15D}.exe 41 PID 2264 wrote to memory of 352 2264 {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe 42 PID 2264 wrote to memory of 352 2264 {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe 42 PID 2264 wrote to memory of 352 2264 {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe 42 PID 2264 wrote to memory of 352 2264 {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe 42 PID 2264 wrote to memory of 2596 2264 {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe 43 PID 2264 wrote to memory of 2596 2264 {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe 43 PID 2264 wrote to memory of 2596 2264 {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe 43 PID 2264 wrote to memory of 2596 2264 {E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe 43 PID 352 wrote to memory of 1436 352 {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe 44 PID 352 wrote to memory of 1436 352 {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe 44 PID 352 wrote to memory of 1436 352 {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe 44 PID 352 wrote to memory of 1436 352 {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe 44 PID 352 wrote to memory of 1532 352 {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe 45 PID 352 wrote to memory of 1532 352 {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe 45 PID 352 wrote to memory of 1532 352 {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe 45 PID 352 wrote to memory of 1532 352 {1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_629d2ea6bfbcb5a115ae6afcd82ec057_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\{11260682-F84E-44fb-AF1E-D89567270532}.exeC:\Windows\{11260682-F84E-44fb-AF1E-D89567270532}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\{0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exeC:\Windows\{0E2DCC63-F1F1-4e9e-8F07-E5072B307BD3}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\{537D60FB-804E-42fe-A585-6B16577E1A58}.exeC:\Windows\{537D60FB-804E-42fe-A585-6B16577E1A58}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\{17995EF2-BD96-4d75-9C95-61B1401249B5}.exeC:\Windows\{17995EF2-BD96-4d75-9C95-61B1401249B5}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\{936252FB-1F60-4828-B834-0A602A72E15D}.exeC:\Windows\{936252FB-1F60-4828-B834-0A602A72E15D}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exeC:\Windows\{E57E84D6-2DD2-4eca-972D-2CD63BBD5ED0}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\{1446254F-D0A2-4274-9504-4EDFD0110E7B}.exeC:\Windows\{1446254F-D0A2-4274-9504-4EDFD0110E7B}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\{686D7645-FB5C-475e-A984-C28EC13274B1}.exeC:\Windows\{686D7645-FB5C-475e-A984-C28EC13274B1}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Windows\{7E23D974-0056-4c52-9FCC-FEDBD08142E1}.exeC:\Windows\{7E23D974-0056-4c52-9FCC-FEDBD08142E1}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E23D~1.EXE > nul11⤵PID:480
-
-
C:\Windows\{F96BCD1D-1266-4097-A3F3-1988926D62AB}.exeC:\Windows\{F96BCD1D-1266-4097-A3F3-1988926D62AB}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F96BC~1.EXE > nul12⤵PID:1104
-
-
C:\Windows\{CB09C957-7BC8-437f-A931-6CD926685DB5}.exeC:\Windows\{CB09C957-7BC8-437f-A931-6CD926685DB5}.exe12⤵
- Executes dropped EXE
PID:640
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{686D7~1.EXE > nul10⤵PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{14462~1.EXE > nul9⤵PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E57E8~1.EXE > nul8⤵PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{93625~1.EXE > nul7⤵PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{17995~1.EXE > nul6⤵PID:312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{537D6~1.EXE > nul5⤵PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0E2DC~1.EXE > nul4⤵PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11260~1.EXE > nul3⤵PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5adb95e0a52ab60f7f1fd223a4889d7fd
SHA1f1e98c1a4f09a9ac693a1e40cb1f74dcd6bb9dd6
SHA2564f9bdbde21184968b30856a39633bffdb2f729d09c0629d738989307f3cc1bc4
SHA5120769e8c6c469243d6ff1a68fa16f1bce7a929677948fc7cb6777e17f199f3a1f171f3620ccb5052150fb1b6f6300c5df7f53aee8073ac38c10425a86ca9ddc92
-
Filesize
197KB
MD50c322446b4d9d790701c1d8e0954da69
SHA1e41b7860c5a2fa3d77fcc7412af1cbb645c6e5bd
SHA256f8b868220e01f10d990f78abc51ec1dcc80e277206c42ca4f0179531b31a6ba1
SHA5128144f4b7d8254072578ea1be080bf2fc2addf44d5f3af13d0c30a7106a0a34f9fdfe1a729a7c503b6096f92fce92920c84ebea619e566e3c5bd8b7c31363a170
-
Filesize
197KB
MD5477d6e1d568bcb76e1b01fd8854a7f5d
SHA1700da9e90704af9cb216a2e8944b9cc3e06de087
SHA256fd93d842cc6e134c408d56c4290ab91ef3134ccde02449d417a39d9a55fb493f
SHA512baf5396c70f9598a96e25324e4d3a7455e163777e38164236881c8ef985d41174a4fbe658bb5407d2a13c58233b8ee4f1857125c1413a564ab48125d591a88c4
-
Filesize
197KB
MD5d76955ab3d2be77d6377d580a9e17522
SHA1d88eecea12a4e8d1266cf5826e880c6a3fb3d8a8
SHA256728a5828ad3b8349e97d74b24ae6e90f2ac93e84c100ce4ec7183ebb7ed033c3
SHA51254d5174b5af592b6559c6afadd68b70bfa91b652c6203f3cedea5d0bd2002f653d13cbf6ea5e791c60546bd59907cd232a9bb5e5280371ecc3d3fc8604ea5462
-
Filesize
197KB
MD5924579415ff00310682f2341c258e010
SHA1d3a4584902852a4cb90f2178ab2f927c793047c2
SHA2560e13be2efef4921fc4cc2cb0ce9573b4151ca34cf6ec6e512fb8d4f027a3f803
SHA5120b0e0b2ebaa5bb9db9db065b9cc42b8ecf347edcede4c532993f6ee99589d3b6f2f9383aaeb1fbb42a35e55e3bd3cd410d9f3eaf070d709c8bf9f92e251edc26
-
Filesize
197KB
MD5297198779a545545c6217c629cc6ad68
SHA19a94c9a45c4a181d8f786c2fc96c83143a9e6474
SHA25650f6a92b7d59b42030bf56763f8b1bb25462ba942faf02c2e5920b6a7d521878
SHA5125256fda5a7de395e9875e40f5d3b8f5de941fe16ce9f3f4bb080eeb7630534c81f0c5c1217d27ffafdd53461826d8031f29c8cd7387524ce8e229b42fd481361
-
Filesize
197KB
MD53f504465f15444e288088cefa77f8ec4
SHA1776320e3e4359fd96d078be63421ea9c086c109b
SHA256f5ea966aa42c88e9c0724e2160c70b1cdf0dc5002e8cec46377eb6f571f625aa
SHA512f97e19c8e1ea45a9a087978e56202f6c257233c9ccb4ec4e78cb6cb0e9cf2b2217b8dd74dfbd4babe40e5c102bd5007b116577ece8fa2c3c2c7753d2aa50ee2a
-
Filesize
197KB
MD5f2f979c7b990adf1929647146e45c501
SHA1f5d9bda80890894c0eee555a988d7f882d6759ca
SHA256337dc1be15bbc881920837e4c8a5a468b33602dd3d99d10a6a747bbb043de9a9
SHA51212fb2d8fce396a14593b90addc6e3ae03b709a4812d2384c06176001a4f53cec678e407294fe7e278462ee0109b2219489608d57262bafc2b7345b40282151c6
-
Filesize
197KB
MD590e0c3fae374ba1779aa4681a9de56c4
SHA119addf7eda8d858a912fa80e34a298e64f834934
SHA2561a4d33fc7584bb2ef58c6e38d112e4a01e6987a28ad320e84860c929a44bb7c4
SHA512dbd9f5d77fa642ba311feb91f92c698c5ad1352fa1d3c29bf82132aefd6b2a7ca6133bd09a22d2ad166fab5d8fdec142a7310284362cb7b9ad5942be14c691dd
-
Filesize
197KB
MD5449396a6128df46cb7be60010b91eb6f
SHA141768a7557f25c1d6207cb67603bcfa9b4c16154
SHA256da79d87ea5e1fa0f697aa557eaf7dc4e938d334a4bb77c90f50169ee16ce1a8c
SHA512fa4a4cce5402dd445c89d22873da141f603b7e33657a389c449f46cca204d37ab91b12a466a2e0c21e4e20b39cfeb0b436385887711d7e04cf5757286adf323e
-
Filesize
197KB
MD54e75f13384fdb3175f0f94747ae2e725
SHA1a3038f9a45f65fc952f0aac993223b6394119364
SHA2561e1ea634e602b757af770c3d34df71dff9977145093126343871a3dc9515763c
SHA5121b8d36136447d09c44f5a37674d3e06e57636f44fe6d4389266e99f08e1e75e101fc63109fadb9a142cee60cf197aa6f00e5df03e45ad5c74e3231a3e8c579f0