Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-02-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe
-
Size
372KB
-
MD5
93e0c1d832fea2fb903ddd630164c459
-
SHA1
386054b00e63833efd992ab1dda83b4a698d5080
-
SHA256
be6df662535773e6f3cff293eb2c7b824bfb086830b4af47ec11550c6896349d
-
SHA512
950fb97148c2b7114f0f261e37aa9963ee38f819b5477a1403fe8b7b553c8023e5ee030713c0b3b8af1c0833fa5793c27909272ff7cda8e266b304c0a7e6e7f7
-
SSDEEP
3072:CEGh0oqlMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGMlkOe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000d0000000122e0-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b0000000122ed-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e0000000122e0-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c0000000122ed-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000005a5a-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000122ed-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000005a5a-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e0000000122ed-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000005a5a-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f0000000122ed-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000005a5a-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B87F211-729B-4923-AA87-D4489E66E91B} {FF1126BA-4C29-4d37-BC71-BD76EEBBF261}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63219BE4-3E2A-4c27-ADFD-85C95D99318E} {8B87F211-729B-4923-AA87-D4489E66E91B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3598A515-21A0-4f58-AC3E-2604AE713ECD} {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3598A515-21A0-4f58-AC3E-2604AE713ECD}\stubpath = "C:\\Windows\\{3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe" {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{67DF9F01-2530-4892-A05B-5A0D53FAECB0} {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A5689BA-0894-4858-B245-F4AA5C88BF84} {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBE823E5-9E0B-4c54-AFAD-C540C1430775}\stubpath = "C:\\Windows\\{EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe" {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B87F211-729B-4923-AA87-D4489E66E91B}\stubpath = "C:\\Windows\\{8B87F211-729B-4923-AA87-D4489E66E91B}.exe" {FF1126BA-4C29-4d37-BC71-BD76EEBBF261}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D044338-2DD9-441f-A9FF-82930709349F}\stubpath = "C:\\Windows\\{0D044338-2DD9-441f-A9FF-82930709349F}.exe" 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BE15AF2F-E84A-487f-81AE-E42DF401F28C} {0D044338-2DD9-441f-A9FF-82930709349F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2A779DE-AA47-4940-9C99-C966B4D60B9D} {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2A779DE-AA47-4940-9C99-C966B4D60B9D}\stubpath = "C:\\Windows\\{C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe" {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF1126BA-4C29-4d37-BC71-BD76EEBBF261}\stubpath = "C:\\Windows\\{FF1126BA-4C29-4d37-BC71-BD76EEBBF261}.exe" {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BE15AF2F-E84A-487f-81AE-E42DF401F28C}\stubpath = "C:\\Windows\\{BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe" {0D044338-2DD9-441f-A9FF-82930709349F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{67DF9F01-2530-4892-A05B-5A0D53FAECB0}\stubpath = "C:\\Windows\\{67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe" {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A5689BA-0894-4858-B245-F4AA5C88BF84}\stubpath = "C:\\Windows\\{5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe" {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBE823E5-9E0B-4c54-AFAD-C540C1430775} {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A2E3512B-3B66-4b75-9E38-76586BCA9E2B} {63219BE4-3E2A-4c27-ADFD-85C95D99318E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D044338-2DD9-441f-A9FF-82930709349F} 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF1126BA-4C29-4d37-BC71-BD76EEBBF261} {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63219BE4-3E2A-4c27-ADFD-85C95D99318E}\stubpath = "C:\\Windows\\{63219BE4-3E2A-4c27-ADFD-85C95D99318E}.exe" {8B87F211-729B-4923-AA87-D4489E66E91B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A2E3512B-3B66-4b75-9E38-76586BCA9E2B}\stubpath = "C:\\Windows\\{A2E3512B-3B66-4b75-9E38-76586BCA9E2B}.exe" {63219BE4-3E2A-4c27-ADFD-85C95D99318E}.exe -
Deletes itself 1 IoCs
pid Process 1992 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2440 {0D044338-2DD9-441f-A9FF-82930709349F}.exe 2624 {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe 2612 {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe 2644 {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe 320 {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe 1488 {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe 2468 {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe 1056 {FF1126BA-4C29-4d37-BC71-BD76EEBBF261}.exe 3004 {8B87F211-729B-4923-AA87-D4489E66E91B}.exe 2332 {63219BE4-3E2A-4c27-ADFD-85C95D99318E}.exe 1440 {A2E3512B-3B66-4b75-9E38-76586BCA9E2B}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{63219BE4-3E2A-4c27-ADFD-85C95D99318E}.exe {8B87F211-729B-4923-AA87-D4489E66E91B}.exe File created C:\Windows\{3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe File created C:\Windows\{5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe File created C:\Windows\{C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe File created C:\Windows\{EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe File created C:\Windows\{8B87F211-729B-4923-AA87-D4489E66E91B}.exe {FF1126BA-4C29-4d37-BC71-BD76EEBBF261}.exe File created C:\Windows\{0D044338-2DD9-441f-A9FF-82930709349F}.exe 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe File created C:\Windows\{BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe {0D044338-2DD9-441f-A9FF-82930709349F}.exe File created C:\Windows\{67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe File created C:\Windows\{FF1126BA-4C29-4d37-BC71-BD76EEBBF261}.exe {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe File created C:\Windows\{A2E3512B-3B66-4b75-9E38-76586BCA9E2B}.exe {63219BE4-3E2A-4c27-ADFD-85C95D99318E}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1732 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe Token: SeIncBasePriorityPrivilege 2440 {0D044338-2DD9-441f-A9FF-82930709349F}.exe Token: SeIncBasePriorityPrivilege 2624 {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe Token: SeIncBasePriorityPrivilege 2612 {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe Token: SeIncBasePriorityPrivilege 2644 {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe Token: SeIncBasePriorityPrivilege 320 {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe Token: SeIncBasePriorityPrivilege 1488 {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe Token: SeIncBasePriorityPrivilege 2468 {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe Token: SeIncBasePriorityPrivilege 1056 {FF1126BA-4C29-4d37-BC71-BD76EEBBF261}.exe Token: SeIncBasePriorityPrivilege 3004 {8B87F211-729B-4923-AA87-D4489E66E91B}.exe Token: SeIncBasePriorityPrivilege 2332 {63219BE4-3E2A-4c27-ADFD-85C95D99318E}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2440 1732 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe 28 PID 1732 wrote to memory of 2440 1732 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe 28 PID 1732 wrote to memory of 2440 1732 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe 28 PID 1732 wrote to memory of 2440 1732 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe 28 PID 1732 wrote to memory of 1992 1732 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe 29 PID 1732 wrote to memory of 1992 1732 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe 29 PID 1732 wrote to memory of 1992 1732 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe 29 PID 1732 wrote to memory of 1992 1732 2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe 29 PID 2440 wrote to memory of 2624 2440 {0D044338-2DD9-441f-A9FF-82930709349F}.exe 31 PID 2440 wrote to memory of 2624 2440 {0D044338-2DD9-441f-A9FF-82930709349F}.exe 31 PID 2440 wrote to memory of 2624 2440 {0D044338-2DD9-441f-A9FF-82930709349F}.exe 31 PID 2440 wrote to memory of 2624 2440 {0D044338-2DD9-441f-A9FF-82930709349F}.exe 31 PID 2440 wrote to memory of 2724 2440 {0D044338-2DD9-441f-A9FF-82930709349F}.exe 30 PID 2440 wrote to memory of 2724 2440 {0D044338-2DD9-441f-A9FF-82930709349F}.exe 30 PID 2440 wrote to memory of 2724 2440 {0D044338-2DD9-441f-A9FF-82930709349F}.exe 30 PID 2440 wrote to memory of 2724 2440 {0D044338-2DD9-441f-A9FF-82930709349F}.exe 30 PID 2624 wrote to memory of 2612 2624 {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe 33 PID 2624 wrote to memory of 2612 2624 {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe 33 PID 2624 wrote to memory of 2612 2624 {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe 33 PID 2624 wrote to memory of 2612 2624 {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe 33 PID 2624 wrote to memory of 2876 2624 {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe 32 PID 2624 wrote to memory of 2876 2624 {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe 32 PID 2624 wrote to memory of 2876 2624 {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe 32 PID 2624 wrote to memory of 2876 2624 {BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe 32 PID 2612 wrote to memory of 2644 2612 {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe 35 PID 2612 wrote to memory of 2644 2612 {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe 35 PID 2612 wrote to memory of 2644 2612 {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe 35 PID 2612 wrote to memory of 2644 2612 {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe 35 PID 2612 wrote to memory of 2592 2612 {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe 34 PID 2612 wrote to memory of 2592 2612 {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe 34 PID 2612 wrote to memory of 2592 2612 {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe 34 PID 2612 wrote to memory of 2592 2612 {3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe 34 PID 2644 wrote to memory of 320 2644 {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe 39 PID 2644 wrote to memory of 320 2644 {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe 39 PID 2644 wrote to memory of 320 2644 {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe 39 PID 2644 wrote to memory of 320 2644 {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe 39 PID 2644 wrote to memory of 1624 2644 {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe 38 PID 2644 wrote to memory of 1624 2644 {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe 38 PID 2644 wrote to memory of 1624 2644 {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe 38 PID 2644 wrote to memory of 1624 2644 {67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe 38 PID 320 wrote to memory of 1488 320 {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe 41 PID 320 wrote to memory of 1488 320 {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe 41 PID 320 wrote to memory of 1488 320 {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe 41 PID 320 wrote to memory of 1488 320 {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe 41 PID 320 wrote to memory of 2532 320 {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe 40 PID 320 wrote to memory of 2532 320 {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe 40 PID 320 wrote to memory of 2532 320 {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe 40 PID 320 wrote to memory of 2532 320 {5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe 40 PID 1488 wrote to memory of 2468 1488 {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe 43 PID 1488 wrote to memory of 2468 1488 {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe 43 PID 1488 wrote to memory of 2468 1488 {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe 43 PID 1488 wrote to memory of 2468 1488 {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe 43 PID 1488 wrote to memory of 2848 1488 {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe 42 PID 1488 wrote to memory of 2848 1488 {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe 42 PID 1488 wrote to memory of 2848 1488 {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe 42 PID 1488 wrote to memory of 2848 1488 {C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe 42 PID 2468 wrote to memory of 1056 2468 {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe 45 PID 2468 wrote to memory of 1056 2468 {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe 45 PID 2468 wrote to memory of 1056 2468 {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe 45 PID 2468 wrote to memory of 1056 2468 {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe 45 PID 2468 wrote to memory of 1368 2468 {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe 44 PID 2468 wrote to memory of 1368 2468 {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe 44 PID 2468 wrote to memory of 1368 2468 {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe 44 PID 2468 wrote to memory of 1368 2468 {EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-20_93e0c1d832fea2fb903ddd630164c459_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\{0D044338-2DD9-441f-A9FF-82930709349F}.exeC:\Windows\{0D044338-2DD9-441f-A9FF-82930709349F}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D044~1.EXE > nul3⤵PID:2724
-
-
C:\Windows\{BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exeC:\Windows\{BE15AF2F-E84A-487f-81AE-E42DF401F28C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BE15A~1.EXE > nul4⤵PID:2876
-
-
C:\Windows\{3598A515-21A0-4f58-AC3E-2604AE713ECD}.exeC:\Windows\{3598A515-21A0-4f58-AC3E-2604AE713ECD}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3598A~1.EXE > nul5⤵PID:2592
-
-
C:\Windows\{67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exeC:\Windows\{67DF9F01-2530-4892-A05B-5A0D53FAECB0}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67DF9~1.EXE > nul6⤵PID:1624
-
-
C:\Windows\{5A5689BA-0894-4858-B245-F4AA5C88BF84}.exeC:\Windows\{5A5689BA-0894-4858-B245-F4AA5C88BF84}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A568~1.EXE > nul7⤵PID:2532
-
-
C:\Windows\{C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exeC:\Windows\{C2A779DE-AA47-4940-9C99-C966B4D60B9D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2A77~1.EXE > nul8⤵PID:2848
-
-
C:\Windows\{EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exeC:\Windows\{EBE823E5-9E0B-4c54-AFAD-C540C1430775}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EBE82~1.EXE > nul9⤵PID:1368
-
-
C:\Windows\{FF1126BA-4C29-4d37-BC71-BD76EEBBF261}.exeC:\Windows\{FF1126BA-4C29-4d37-BC71-BD76EEBBF261}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\{8B87F211-729B-4923-AA87-D4489E66E91B}.exeC:\Windows\{8B87F211-729B-4923-AA87-D4489E66E91B}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B87F~1.EXE > nul11⤵PID:392
-
-
C:\Windows\{63219BE4-3E2A-4c27-ADFD-85C95D99318E}.exeC:\Windows\{63219BE4-3E2A-4c27-ADFD-85C95D99318E}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\{A2E3512B-3B66-4b75-9E38-76586BCA9E2B}.exeC:\Windows\{A2E3512B-3B66-4b75-9E38-76586BCA9E2B}.exe12⤵
- Executes dropped EXE
PID:1440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{63219~1.EXE > nul12⤵PID:1100
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FF112~1.EXE > nul10⤵PID:2144
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5c7356d3133fd5434bddc7349714b6b3b
SHA17b66b9af4db1b743b85c70e1ba997630283b0afc
SHA2560870ce6c710aab322574fc3d17da25cc93e8f3ccafd942b2e0725f7119adb2e3
SHA5129759e24a44896b34c9275dbd8cc2f4550ecafcea3538440d3788114255d5d3fe9037300e8b64a27195f6518d66114ec232d7166ee31a0700b246ceac3d4ad32a
-
Filesize
372KB
MD552a75662a7647041fdb28a42ec38994f
SHA160703a2fdafb25ec66ba326873bd152c50a0a87b
SHA256d01a24d36a22fcaa46ad329477aa1c4368a8149ebc58edf9686d83e67235f9df
SHA51236004cce7d833b038019d17732fc4fa1fdddddfedc631a959c34ad9402c943db5925752886b7fd4e2b6c2dcb5af1ef118aff83256f3fea7083a90f083d30e28b
-
Filesize
372KB
MD52d15d909c986695a836a9f71c8219ab8
SHA1852ec66dcff9bca31eb31661a04308aac3e3889f
SHA2560e453b221ac43ff22e41f71579cbd1a94b434705898e9ccdffa6195d2c8d0df3
SHA512642b78935043cf36ea3b576cae82a73b405b7095df6c02a1a1ec0c214943f4160835a06c2e1b180e60460221febd9d5ee5315bc3eaeece9fd92c36c64d83e638
-
Filesize
372KB
MD579acf326b4e60208d1c570741f4806b0
SHA15653d9dc356fa13775c0188be36efb79d9806bd9
SHA25643548dd80de608f769055384a658f9254f2474b8b701050338b1644a4dd071d7
SHA5129ad91b8612f98c2c37e9c14bb95f44e10cb608978e40f57e05e8ddc9d8254aff9b66456f4df66f612a7d4828f3543cbcd185534854dda4e277518ed33d5d2a29
-
Filesize
372KB
MD512b901d801da46e170d86e84bdcb22ee
SHA1eee8a657d11d694ae4eb5f629440bff87de085a9
SHA256c078babe9a4d5118cca3a1a7e67d2746ac7e6d33bd7387d67e4cf18f7cc5230b
SHA51263ce716057bb6f4968ccc8d0e404cf32b20163330814f9b463d5cc1f4ebbf29bd45296c0907881c1c17595dfc1290275ad6c8db085582790ed02ad6eb5f8d018
-
Filesize
372KB
MD555eba0d67983a4bc4ab1ead6a986b18e
SHA124d57b0bc73c1e227d52fa57ee1dedd5f1b2e5a0
SHA256415c78022affe449a69830c6edde8c6ed4cba5911f563cc212c0aca48d638b06
SHA512d6296b93760f3e248dc0793f7280c1b768d25f5667630d1b55f6781be1418ef65536a9492593c367c506ca10eec68a87dbd1b8fb1099524ad634db7efa16b9d4
-
Filesize
372KB
MD5f62f527746e595c42b5f41dac08c63f9
SHA1d2ed38f40defdd2e27d227252ece5df37543a985
SHA256df263d4559d5feec1ecd339c9302afd04842d4c3da2ec1c827e1d042b6036d25
SHA512a9057f838c4fa037d094775445c6a2c935a458010110354322feb28f46e8324635933c525cde56d46ff67d40cac4923d684f4ab3e3bb9d60a376d4389d57e900
-
Filesize
372KB
MD5054a00b2cadc891f3e5eec44664683cd
SHA104a01fd3c3c59be1271be68c217ce555c18061e7
SHA256fbe790494a5140b743076127380574f6b302292fe8b21b5c8b01016d9289bd00
SHA512f53ff3b0d176c031fb279043eaab40904781642abff60067acedcab7d1db2113bc599ecf304b83334632dccc8ba40cd43fa3914a774b5edafcf007c142f065b8
-
Filesize
372KB
MD5178d5f1b59ec7a0c5dffdd42c6e03ba7
SHA1d575e1baf099b3fb1e388824faec59712805b094
SHA2569fd7e52369e3a7ea7fb7137342e6fe4c0bc6c595d4347e05f3fbc859586fc4bd
SHA5120aadfb25d0558407ee98f374b3989e01d7e2689d2776efe3ac10cb616bb605c195a5acecadd826fe3196af7187298cfe3a72f29e0ef54c30f39c1ea2715b17b5
-
Filesize
372KB
MD53d6779a77a43c1e08a86df626715a165
SHA102b91118c9c398a1d37f85d0ca21cb7c30e3e9b7
SHA256cd7ffd5f8012540d54116896801f11345fa4357575f2cc7ac346f19ee2e209a3
SHA512b4e0fc8c0674fe6d97cc79d319d530b5bcd4746dc014797226bf5e7b4111f000b931041f4256de49827a41eafe7dc2c9b298caef6ebea181a7fb7b9a4ccd4e9c
-
Filesize
372KB
MD5dccbc1d3455e27484de582fd6d7c26da
SHA1e357f4213863ff33942bbd1fb64dac97ef1c5b50
SHA2569dc31b2127ab1a28422a2e864dcde0b901289e286181868eb9daf673d73ccc2c
SHA5129189b055057e40cfcbb8138418b5afe01d5b7a824d7ad1bbe5bcd1d3c2e182fe2a39e55728c86032b54e40fdbcf736607e1a9931d7f8883c1b81fb9131c742da