Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe
-
Size
180KB
-
MD5
6e3f34199c5a28517d7ca915a7f3527c
-
SHA1
aa78f7fe40e090bd6ce201fe5acc9e7b751d44e2
-
SHA256
65bb51f51bc9c3e6afe8e98c414d93b45d25abed970c2aed13cae615cc66bb04
-
SHA512
fbcbd3fe28748f3f97d4091e7f07108edf6ffc3880eec8b0b2940913b6a6e844f890c110b52552ccb742b9720d60816b93ea8a6f61f88abaa6f0534e30b8d2a1
-
SSDEEP
3072:jEGh0onlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG1l5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x00090000000122be-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000014323-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a0000000122be-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0038000000014502-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b0000000122be-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c0000000122be-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000122be-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1DB679C2-A73F-489d-A555-B1757FA08F2B} {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A013DC21-7B8E-44a6-8146-A761138856E6}\stubpath = "C:\\Windows\\{A013DC21-7B8E-44a6-8146-A761138856E6}.exe" {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C1A64064-B109-40b2-9736-98D6876A7C6E}\stubpath = "C:\\Windows\\{C1A64064-B109-40b2-9736-98D6876A7C6E}.exe" {A013DC21-7B8E-44a6-8146-A761138856E6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{85609D70-DB91-4c58-9CD3-0324301194EB} {DF810D14-BADB-4288-870B-D7234440D853}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{636939D0-9EB3-48c1-A455-48A95DE624A2}\stubpath = "C:\\Windows\\{636939D0-9EB3-48c1-A455-48A95DE624A2}.exe" {85609D70-DB91-4c58-9CD3-0324301194EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EEEB49B3-42CE-4777-9FA6-94AFB0C4DA6D} {7AFD3D26-14BA-48ab-86FF-095963135F29}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11C67898-DFB8-4496-8868-3A5B21E09A2C} {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A013DC21-7B8E-44a6-8146-A761138856E6} {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DF810D14-BADB-4288-870B-D7234440D853} {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DF810D14-BADB-4288-870B-D7234440D853}\stubpath = "C:\\Windows\\{DF810D14-BADB-4288-870B-D7234440D853}.exe" {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{85609D70-DB91-4c58-9CD3-0324301194EB}\stubpath = "C:\\Windows\\{85609D70-DB91-4c58-9CD3-0324301194EB}.exe" {DF810D14-BADB-4288-870B-D7234440D853}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9DF37C3C-D7AD-4781-AF14-D33D7B68A82A} {636939D0-9EB3-48c1-A455-48A95DE624A2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9DF37C3C-D7AD-4781-AF14-D33D7B68A82A}\stubpath = "C:\\Windows\\{9DF37C3C-D7AD-4781-AF14-D33D7B68A82A}.exe" {636939D0-9EB3-48c1-A455-48A95DE624A2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7AFD3D26-14BA-48ab-86FF-095963135F29} {9DF37C3C-D7AD-4781-AF14-D33D7B68A82A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1DB679C2-A73F-489d-A555-B1757FA08F2B}\stubpath = "C:\\Windows\\{1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe" {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7AFD3D26-14BA-48ab-86FF-095963135F29}\stubpath = "C:\\Windows\\{7AFD3D26-14BA-48ab-86FF-095963135F29}.exe" {9DF37C3C-D7AD-4781-AF14-D33D7B68A82A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{636939D0-9EB3-48c1-A455-48A95DE624A2} {85609D70-DB91-4c58-9CD3-0324301194EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EEEB49B3-42CE-4777-9FA6-94AFB0C4DA6D}\stubpath = "C:\\Windows\\{EEEB49B3-42CE-4777-9FA6-94AFB0C4DA6D}.exe" {7AFD3D26-14BA-48ab-86FF-095963135F29}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C1A64064-B109-40b2-9736-98D6876A7C6E} {A013DC21-7B8E-44a6-8146-A761138856E6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ABEFBD25-46B6-4b08-82A1-761D21965298}\stubpath = "C:\\Windows\\{ABEFBD25-46B6-4b08-82A1-761D21965298}.exe" 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11C67898-DFB8-4496-8868-3A5B21E09A2C}\stubpath = "C:\\Windows\\{11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe" {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ABEFBD25-46B6-4b08-82A1-761D21965298} 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe -
Deletes itself 1 IoCs
pid Process 3036 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1300 {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe 2660 {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe 2796 {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe 2980 {A013DC21-7B8E-44a6-8146-A761138856E6}.exe 2828 {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe 1904 {DF810D14-BADB-4288-870B-D7234440D853}.exe 1660 {85609D70-DB91-4c58-9CD3-0324301194EB}.exe 772 {636939D0-9EB3-48c1-A455-48A95DE624A2}.exe 2012 {9DF37C3C-D7AD-4781-AF14-D33D7B68A82A}.exe 2320 {7AFD3D26-14BA-48ab-86FF-095963135F29}.exe 1164 {EEEB49B3-42CE-4777-9FA6-94AFB0C4DA6D}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe File created C:\Windows\{1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe File created C:\Windows\{DF810D14-BADB-4288-870B-D7234440D853}.exe {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe File created C:\Windows\{636939D0-9EB3-48c1-A455-48A95DE624A2}.exe {85609D70-DB91-4c58-9CD3-0324301194EB}.exe File created C:\Windows\{7AFD3D26-14BA-48ab-86FF-095963135F29}.exe {9DF37C3C-D7AD-4781-AF14-D33D7B68A82A}.exe File created C:\Windows\{EEEB49B3-42CE-4777-9FA6-94AFB0C4DA6D}.exe {7AFD3D26-14BA-48ab-86FF-095963135F29}.exe File created C:\Windows\{ABEFBD25-46B6-4b08-82A1-761D21965298}.exe 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe File created C:\Windows\{A013DC21-7B8E-44a6-8146-A761138856E6}.exe {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe File created C:\Windows\{C1A64064-B109-40b2-9736-98D6876A7C6E}.exe {A013DC21-7B8E-44a6-8146-A761138856E6}.exe File created C:\Windows\{85609D70-DB91-4c58-9CD3-0324301194EB}.exe {DF810D14-BADB-4288-870B-D7234440D853}.exe File created C:\Windows\{9DF37C3C-D7AD-4781-AF14-D33D7B68A82A}.exe {636939D0-9EB3-48c1-A455-48A95DE624A2}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2416 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe Token: SeIncBasePriorityPrivilege 1300 {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe Token: SeIncBasePriorityPrivilege 2660 {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe Token: SeIncBasePriorityPrivilege 2796 {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe Token: SeIncBasePriorityPrivilege 2980 {A013DC21-7B8E-44a6-8146-A761138856E6}.exe Token: SeIncBasePriorityPrivilege 2828 {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe Token: SeIncBasePriorityPrivilege 1904 {DF810D14-BADB-4288-870B-D7234440D853}.exe Token: SeIncBasePriorityPrivilege 1660 {85609D70-DB91-4c58-9CD3-0324301194EB}.exe Token: SeIncBasePriorityPrivilege 772 {636939D0-9EB3-48c1-A455-48A95DE624A2}.exe Token: SeIncBasePriorityPrivilege 2012 {9DF37C3C-D7AD-4781-AF14-D33D7B68A82A}.exe Token: SeIncBasePriorityPrivilege 2320 {7AFD3D26-14BA-48ab-86FF-095963135F29}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1300 2416 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe 28 PID 2416 wrote to memory of 1300 2416 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe 28 PID 2416 wrote to memory of 1300 2416 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe 28 PID 2416 wrote to memory of 1300 2416 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe 28 PID 2416 wrote to memory of 3036 2416 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe 29 PID 2416 wrote to memory of 3036 2416 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe 29 PID 2416 wrote to memory of 3036 2416 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe 29 PID 2416 wrote to memory of 3036 2416 2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe 29 PID 1300 wrote to memory of 2660 1300 {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe 30 PID 1300 wrote to memory of 2660 1300 {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe 30 PID 1300 wrote to memory of 2660 1300 {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe 30 PID 1300 wrote to memory of 2660 1300 {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe 30 PID 1300 wrote to memory of 2596 1300 {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe 31 PID 1300 wrote to memory of 2596 1300 {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe 31 PID 1300 wrote to memory of 2596 1300 {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe 31 PID 1300 wrote to memory of 2596 1300 {ABEFBD25-46B6-4b08-82A1-761D21965298}.exe 31 PID 2660 wrote to memory of 2796 2660 {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe 32 PID 2660 wrote to memory of 2796 2660 {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe 32 PID 2660 wrote to memory of 2796 2660 {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe 32 PID 2660 wrote to memory of 2796 2660 {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe 32 PID 2660 wrote to memory of 2488 2660 {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe 33 PID 2660 wrote to memory of 2488 2660 {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe 33 PID 2660 wrote to memory of 2488 2660 {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe 33 PID 2660 wrote to memory of 2488 2660 {11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe 33 PID 2796 wrote to memory of 2980 2796 {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe 37 PID 2796 wrote to memory of 2980 2796 {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe 37 PID 2796 wrote to memory of 2980 2796 {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe 37 PID 2796 wrote to memory of 2980 2796 {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe 37 PID 2796 wrote to memory of 1744 2796 {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe 36 PID 2796 wrote to memory of 1744 2796 {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe 36 PID 2796 wrote to memory of 1744 2796 {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe 36 PID 2796 wrote to memory of 1744 2796 {1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe 36 PID 2980 wrote to memory of 2828 2980 {A013DC21-7B8E-44a6-8146-A761138856E6}.exe 38 PID 2980 wrote to memory of 2828 2980 {A013DC21-7B8E-44a6-8146-A761138856E6}.exe 38 PID 2980 wrote to memory of 2828 2980 {A013DC21-7B8E-44a6-8146-A761138856E6}.exe 38 PID 2980 wrote to memory of 2828 2980 {A013DC21-7B8E-44a6-8146-A761138856E6}.exe 38 PID 2980 wrote to memory of 2960 2980 {A013DC21-7B8E-44a6-8146-A761138856E6}.exe 39 PID 2980 wrote to memory of 2960 2980 {A013DC21-7B8E-44a6-8146-A761138856E6}.exe 39 PID 2980 wrote to memory of 2960 2980 {A013DC21-7B8E-44a6-8146-A761138856E6}.exe 39 PID 2980 wrote to memory of 2960 2980 {A013DC21-7B8E-44a6-8146-A761138856E6}.exe 39 PID 2828 wrote to memory of 1904 2828 {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe 40 PID 2828 wrote to memory of 1904 2828 {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe 40 PID 2828 wrote to memory of 1904 2828 {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe 40 PID 2828 wrote to memory of 1904 2828 {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe 40 PID 2828 wrote to memory of 1264 2828 {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe 41 PID 2828 wrote to memory of 1264 2828 {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe 41 PID 2828 wrote to memory of 1264 2828 {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe 41 PID 2828 wrote to memory of 1264 2828 {C1A64064-B109-40b2-9736-98D6876A7C6E}.exe 41 PID 1904 wrote to memory of 1660 1904 {DF810D14-BADB-4288-870B-D7234440D853}.exe 42 PID 1904 wrote to memory of 1660 1904 {DF810D14-BADB-4288-870B-D7234440D853}.exe 42 PID 1904 wrote to memory of 1660 1904 {DF810D14-BADB-4288-870B-D7234440D853}.exe 42 PID 1904 wrote to memory of 1660 1904 {DF810D14-BADB-4288-870B-D7234440D853}.exe 42 PID 1904 wrote to memory of 1568 1904 {DF810D14-BADB-4288-870B-D7234440D853}.exe 43 PID 1904 wrote to memory of 1568 1904 {DF810D14-BADB-4288-870B-D7234440D853}.exe 43 PID 1904 wrote to memory of 1568 1904 {DF810D14-BADB-4288-870B-D7234440D853}.exe 43 PID 1904 wrote to memory of 1568 1904 {DF810D14-BADB-4288-870B-D7234440D853}.exe 43 PID 1660 wrote to memory of 772 1660 {85609D70-DB91-4c58-9CD3-0324301194EB}.exe 44 PID 1660 wrote to memory of 772 1660 {85609D70-DB91-4c58-9CD3-0324301194EB}.exe 44 PID 1660 wrote to memory of 772 1660 {85609D70-DB91-4c58-9CD3-0324301194EB}.exe 44 PID 1660 wrote to memory of 772 1660 {85609D70-DB91-4c58-9CD3-0324301194EB}.exe 44 PID 1660 wrote to memory of 2248 1660 {85609D70-DB91-4c58-9CD3-0324301194EB}.exe 45 PID 1660 wrote to memory of 2248 1660 {85609D70-DB91-4c58-9CD3-0324301194EB}.exe 45 PID 1660 wrote to memory of 2248 1660 {85609D70-DB91-4c58-9CD3-0324301194EB}.exe 45 PID 1660 wrote to memory of 2248 1660 {85609D70-DB91-4c58-9CD3-0324301194EB}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_6e3f34199c5a28517d7ca915a7f3527c_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\{ABEFBD25-46B6-4b08-82A1-761D21965298}.exeC:\Windows\{ABEFBD25-46B6-4b08-82A1-761D21965298}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\{11C67898-DFB8-4496-8868-3A5B21E09A2C}.exeC:\Windows\{11C67898-DFB8-4496-8868-3A5B21E09A2C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\{1DB679C2-A73F-489d-A555-B1757FA08F2B}.exeC:\Windows\{1DB679C2-A73F-489d-A555-B1757FA08F2B}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1DB67~1.EXE > nul5⤵PID:1744
-
-
C:\Windows\{A013DC21-7B8E-44a6-8146-A761138856E6}.exeC:\Windows\{A013DC21-7B8E-44a6-8146-A761138856E6}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\{C1A64064-B109-40b2-9736-98D6876A7C6E}.exeC:\Windows\{C1A64064-B109-40b2-9736-98D6876A7C6E}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\{DF810D14-BADB-4288-870B-D7234440D853}.exeC:\Windows\{DF810D14-BADB-4288-870B-D7234440D853}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\{85609D70-DB91-4c58-9CD3-0324301194EB}.exeC:\Windows\{85609D70-DB91-4c58-9CD3-0324301194EB}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\{636939D0-9EB3-48c1-A455-48A95DE624A2}.exeC:\Windows\{636939D0-9EB3-48c1-A455-48A95DE624A2}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{63693~1.EXE > nul10⤵PID:2304
-
-
C:\Windows\{9DF37C3C-D7AD-4781-AF14-D33D7B68A82A}.exeC:\Windows\{9DF37C3C-D7AD-4781-AF14-D33D7B68A82A}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9DF37~1.EXE > nul11⤵PID:596
-
-
C:\Windows\{7AFD3D26-14BA-48ab-86FF-095963135F29}.exeC:\Windows\{7AFD3D26-14BA-48ab-86FF-095963135F29}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2320 -
C:\Windows\{EEEB49B3-42CE-4777-9FA6-94AFB0C4DA6D}.exeC:\Windows\{EEEB49B3-42CE-4777-9FA6-94AFB0C4DA6D}.exe12⤵
- Executes dropped EXE
PID:1164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7AFD3~1.EXE > nul12⤵PID:916
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{85609~1.EXE > nul9⤵PID:2248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DF810~1.EXE > nul8⤵PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C1A64~1.EXE > nul7⤵PID:1264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A013D~1.EXE > nul6⤵PID:2960
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11C67~1.EXE > nul4⤵PID:2488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ABEFB~1.EXE > nul3⤵PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5ccfdf0cd12ee49cb6f7d6b0ffb89f92b
SHA119df8c43b33529f36675b647e5fa766866b287b4
SHA256a66affd5573018eed683cb492da4791f8f0dbd03cb1b4cacebd49105b8804b11
SHA51265c5346b5f0ef9149280a06b66573e922c744ae5cb45d398323230e93e10ff48db788655c9bb2cb0e003574b1df375127c1ba53864b634218aca46a57d01dace
-
Filesize
180KB
MD5c1058f1e05ecf6a2f8056a57aeebce68
SHA150d7128c6164a4b6df58580f66765891bfd508de
SHA2569968e9fa12e0074a50c9d47749e69586ba09c89f56b88177f91ef74fe5bf46f2
SHA512db9e7af963031ec8ac0cdd7c1ece5436226c163aa081452a428dfc6da38b3cb750fc744fccc07bf617e3f9fac568944c1fa677b5e6999bab540f34b2c9419f5f
-
Filesize
180KB
MD5f9ffc16d28a8d1a67cffdd355818e5d7
SHA1e186d78f4fc62d8cb566bc5877805d691fbafc90
SHA256a879bdab9523a158092475c3c1207e5b1dcb345c18d6781b9a8bf2c7b8ebc6e3
SHA51260ddfcb27428df914148f01987b36bb105ef401762d30d5fb886e107e0e6f3f667a34d83398ca177ae912694f228dddb0451bbe16b97b41a8fa6b93c092789e5
-
Filesize
180KB
MD5979b55d107c6d3b82230f65bdf2519ba
SHA12d21ef8680175eff5f03b03ffd58d6cbe528ea97
SHA25657c2b53fbf103de792d797f38209195f6d59b9efc1d8e177016d92af11e8a6cc
SHA512c6b47ff6b5f881235c481ffbeda6f4e9b104ba8ad47d9c4bcfce267e7f20b7c7773986b12ec5ef2a792790c176e00fba2e2ddd9971268e33cd86a24650f09606
-
Filesize
180KB
MD556a0e66991a030b708d40d91a84a862e
SHA18b0667479527b969de020dd2bde41b24d89c6952
SHA25694413be1f31c90b80ce33d1d915f1a41427e7a58d1b3d94b2e5e7d2748d076ef
SHA512a390e5d8646f389a8c467ac9fac3285fb2273c08c074154aa9cbf972ea073a31b1d68d102a38488a72d36c485317ef558d840dbcb9ff3879ff1dd04004bda77b
-
Filesize
180KB
MD5bf704f96ed1e1dd79db092745b4a12bb
SHA1661985d76e0d52a8bf25d6af31931cfb37224188
SHA2563875a6718948fd651508f1a7fd0c62d540046ee04c1b7bf80b86899b882ca897
SHA5127a2cfd3f325b8c1bf911aa26d2ea425e872aff437105654bb67b7de73af4d5e114c13d82b8ae263e3cdba8ada0e19cecc3fadf68bf8ad00e99bf395dc9f18a93
-
Filesize
180KB
MD5f59425427d2790eebe8bfc0213892dc4
SHA1455dbc2aa1a72328461a96da71491869de764e8f
SHA25659242ab87f6f22d355e0d0d6aef956e53919c4b82044cbdc0d481ac0b913dd40
SHA51225160d59e211aaade2643f35dcb2a804359b78bf18aa455fbdd7af1c0f4b3343b2d92960f46f96a6625fb364bee6e11924818f01588cc21020e29f70a630e1ef
-
Filesize
180KB
MD51899830c4d4a73d01d43817e76749891
SHA170adf9d8240d66e57e8f94dabcb546a3c5f2055d
SHA256ad984f4fa3714ceaf8e222d7d72ab8c0e7dab5d70bd46a2c1ad2bb93f64fa22c
SHA5129fec62edbf1b882e9c833f1db056d4e317710992cf829eab685db576da366865742f98def08cf569ffe8e7eca211bd545c5cc58657eec152b510a0115227d528
-
Filesize
180KB
MD54e865f07e4a81f4d92b86feb52b44845
SHA16e3bef118be7c6305edd7717e14aab0c33cdc1fd
SHA256fe4613478fb5772e653541b1de597102402f5614aa96bad2aeac34d9c8f1ae16
SHA51232b501586053b247d9437afacd53e9761c6087101f328359125bd1b18ebd5f05f798ba7da4052bded24b97e4c09eba11dd71d355dfd65f15c52fb4be80922c3d
-
Filesize
180KB
MD51ea3aaff4fd7e91cef1f4c77da545585
SHA12fe67fcd026be15f13ef70b8c1f69cb55ebc212b
SHA25671075a826f2fcff7488f945cd3b72c82f39c7fddf8d4d9b8c0b9a9c3fab50fee
SHA5127a1750b559c40edfdf1c06ee753d8232ddeddd77d5b231e235f687c1e6ad8de47d06a56f9ee591e986e7e441b2f242ef4f71c2babe157226a07e5358e80ac68f
-
Filesize
180KB
MD50b509549617701e818cfdecb822052ab
SHA1e25b00f37d9d190e582409d5be0142587bb56233
SHA2562caa532a82fc65688a26b4c4d643ed6f0723ef36801202fd1ca79e77f4304705
SHA5124fa3832abab737d66e67ea7968d7b1b2f392330109d80715ec4d7a85824c2fd4ffa571f03237332db8eb7b6b44bb3c5c21658822e9f76cbc1249af018be87505