Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-02-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe
-
Size
344KB
-
MD5
7ffa76dd27713a53b648f233d185d503
-
SHA1
cf99c01cc394c0d73a7158137f095da2e50dcd78
-
SHA256
f10528b6f423c143ffd3eb15f35f1a5a9a5da634ab8f2206565d09836c49cdf7
-
SHA512
55c48de3e664f4b001a2fe1d91b6be8cd3bb5fe77491cefa32940636a9b2718457461692677c6764c3f75c89d3362e67f9e9f52b0e0c5ce6edf12c0868dd23ab
-
SSDEEP
3072:mEGh0oalEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGglqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral1/files/0x000c000000012328-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000013413-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000012328-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0033000000013a3a-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000012328-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000012328-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0010000000012328-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5AAE76CD-B719-41c1-9F6A-3AE06082EA3F} {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9EBBACE-5709-4b77-9DA0-6FC28F2349EE} {CBB81B21-4144-42c3-B328-EE5643663077}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CE54FD71-CB44-4817-B174-5446AC1E7287} {D06503AB-E839-4be1-9602-A2A929751E4C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DB060E41-741E-47c8-A4E8-B65F40EBC5A6} {2EB6B823-9879-4172-A93B-D3EDA3573982}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F74AF9BA-BC6A-4caf-A4F8-5B9767D13984} {DB060E41-741E-47c8-A4E8-B65F40EBC5A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F74AF9BA-BC6A-4caf-A4F8-5B9767D13984}\stubpath = "C:\\Windows\\{F74AF9BA-BC6A-4caf-A4F8-5B9767D13984}.exe" {DB060E41-741E-47c8-A4E8-B65F40EBC5A6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C} 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}\stubpath = "C:\\Windows\\{60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe" 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F51C4F8F-3386-4ee6-BE87-B41DE3717DF4} {F74AF9BA-BC6A-4caf-A4F8-5B9767D13984}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CBB81B21-4144-42c3-B328-EE5643663077}\stubpath = "C:\\Windows\\{CBB81B21-4144-42c3-B328-EE5643663077}.exe" {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D06503AB-E839-4be1-9602-A2A929751E4C} {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}\stubpath = "C:\\Windows\\{5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe" {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CBB81B21-4144-42c3-B328-EE5643663077} {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D06503AB-E839-4be1-9602-A2A929751E4C}\stubpath = "C:\\Windows\\{D06503AB-E839-4be1-9602-A2A929751E4C}.exe" {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2EB6B823-9879-4172-A93B-D3EDA3573982} {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F51C4F8F-3386-4ee6-BE87-B41DE3717DF4}\stubpath = "C:\\Windows\\{F51C4F8F-3386-4ee6-BE87-B41DE3717DF4}.exe" {F74AF9BA-BC6A-4caf-A4F8-5B9767D13984}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C647F8A-10CA-48af-9995-9EBEBEF40366}\stubpath = "C:\\Windows\\{1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe" {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}\stubpath = "C:\\Windows\\{B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe" {CBB81B21-4144-42c3-B328-EE5643663077}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2EB6B823-9879-4172-A93B-D3EDA3573982}\stubpath = "C:\\Windows\\{2EB6B823-9879-4172-A93B-D3EDA3573982}.exe" {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DB060E41-741E-47c8-A4E8-B65F40EBC5A6}\stubpath = "C:\\Windows\\{DB060E41-741E-47c8-A4E8-B65F40EBC5A6}.exe" {2EB6B823-9879-4172-A93B-D3EDA3573982}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C647F8A-10CA-48af-9995-9EBEBEF40366} {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CE54FD71-CB44-4817-B174-5446AC1E7287}\stubpath = "C:\\Windows\\{CE54FD71-CB44-4817-B174-5446AC1E7287}.exe" {D06503AB-E839-4be1-9602-A2A929751E4C}.exe -
Deletes itself 1 IoCs
pid Process 2628 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2952 {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe 2668 {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe 2480 {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe 2488 {CBB81B21-4144-42c3-B328-EE5643663077}.exe 2792 {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe 1384 {D06503AB-E839-4be1-9602-A2A929751E4C}.exe 2216 {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe 2508 {2EB6B823-9879-4172-A93B-D3EDA3573982}.exe 2076 {DB060E41-741E-47c8-A4E8-B65F40EBC5A6}.exe 2864 {F74AF9BA-BC6A-4caf-A4F8-5B9767D13984}.exe 1168 {F51C4F8F-3386-4ee6-BE87-B41DE3717DF4}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe File created C:\Windows\{CBB81B21-4144-42c3-B328-EE5643663077}.exe {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe File created C:\Windows\{B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe {CBB81B21-4144-42c3-B328-EE5643663077}.exe File created C:\Windows\{D06503AB-E839-4be1-9602-A2A929751E4C}.exe {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe File created C:\Windows\{CE54FD71-CB44-4817-B174-5446AC1E7287}.exe {D06503AB-E839-4be1-9602-A2A929751E4C}.exe File created C:\Windows\{2EB6B823-9879-4172-A93B-D3EDA3573982}.exe {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe File created C:\Windows\{F74AF9BA-BC6A-4caf-A4F8-5B9767D13984}.exe {DB060E41-741E-47c8-A4E8-B65F40EBC5A6}.exe File created C:\Windows\{5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe File created C:\Windows\{1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe File created C:\Windows\{DB060E41-741E-47c8-A4E8-B65F40EBC5A6}.exe {2EB6B823-9879-4172-A93B-D3EDA3573982}.exe File created C:\Windows\{F51C4F8F-3386-4ee6-BE87-B41DE3717DF4}.exe {F74AF9BA-BC6A-4caf-A4F8-5B9767D13984}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1940 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe Token: SeIncBasePriorityPrivilege 2952 {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe Token: SeIncBasePriorityPrivilege 2668 {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe Token: SeIncBasePriorityPrivilege 2480 {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe Token: SeIncBasePriorityPrivilege 2488 {CBB81B21-4144-42c3-B328-EE5643663077}.exe Token: SeIncBasePriorityPrivilege 2792 {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe Token: SeIncBasePriorityPrivilege 1384 {D06503AB-E839-4be1-9602-A2A929751E4C}.exe Token: SeIncBasePriorityPrivilege 2216 {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe Token: SeIncBasePriorityPrivilege 2508 {2EB6B823-9879-4172-A93B-D3EDA3573982}.exe Token: SeIncBasePriorityPrivilege 2076 {DB060E41-741E-47c8-A4E8-B65F40EBC5A6}.exe Token: SeIncBasePriorityPrivilege 2864 {F74AF9BA-BC6A-4caf-A4F8-5B9767D13984}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2952 1940 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe 28 PID 1940 wrote to memory of 2952 1940 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe 28 PID 1940 wrote to memory of 2952 1940 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe 28 PID 1940 wrote to memory of 2952 1940 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe 28 PID 1940 wrote to memory of 2628 1940 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe 29 PID 1940 wrote to memory of 2628 1940 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe 29 PID 1940 wrote to memory of 2628 1940 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe 29 PID 1940 wrote to memory of 2628 1940 2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe 29 PID 2952 wrote to memory of 2668 2952 {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe 30 PID 2952 wrote to memory of 2668 2952 {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe 30 PID 2952 wrote to memory of 2668 2952 {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe 30 PID 2952 wrote to memory of 2668 2952 {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe 30 PID 2952 wrote to memory of 2604 2952 {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe 31 PID 2952 wrote to memory of 2604 2952 {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe 31 PID 2952 wrote to memory of 2604 2952 {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe 31 PID 2952 wrote to memory of 2604 2952 {60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe 31 PID 2668 wrote to memory of 2480 2668 {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe 32 PID 2668 wrote to memory of 2480 2668 {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe 32 PID 2668 wrote to memory of 2480 2668 {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe 32 PID 2668 wrote to memory of 2480 2668 {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe 32 PID 2668 wrote to memory of 2656 2668 {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe 33 PID 2668 wrote to memory of 2656 2668 {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe 33 PID 2668 wrote to memory of 2656 2668 {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe 33 PID 2668 wrote to memory of 2656 2668 {5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe 33 PID 2480 wrote to memory of 2488 2480 {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe 36 PID 2480 wrote to memory of 2488 2480 {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe 36 PID 2480 wrote to memory of 2488 2480 {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe 36 PID 2480 wrote to memory of 2488 2480 {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe 36 PID 2480 wrote to memory of 2948 2480 {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe 37 PID 2480 wrote to memory of 2948 2480 {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe 37 PID 2480 wrote to memory of 2948 2480 {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe 37 PID 2480 wrote to memory of 2948 2480 {1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe 37 PID 2488 wrote to memory of 2792 2488 {CBB81B21-4144-42c3-B328-EE5643663077}.exe 38 PID 2488 wrote to memory of 2792 2488 {CBB81B21-4144-42c3-B328-EE5643663077}.exe 38 PID 2488 wrote to memory of 2792 2488 {CBB81B21-4144-42c3-B328-EE5643663077}.exe 38 PID 2488 wrote to memory of 2792 2488 {CBB81B21-4144-42c3-B328-EE5643663077}.exe 38 PID 2488 wrote to memory of 2788 2488 {CBB81B21-4144-42c3-B328-EE5643663077}.exe 39 PID 2488 wrote to memory of 2788 2488 {CBB81B21-4144-42c3-B328-EE5643663077}.exe 39 PID 2488 wrote to memory of 2788 2488 {CBB81B21-4144-42c3-B328-EE5643663077}.exe 39 PID 2488 wrote to memory of 2788 2488 {CBB81B21-4144-42c3-B328-EE5643663077}.exe 39 PID 2792 wrote to memory of 1384 2792 {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe 40 PID 2792 wrote to memory of 1384 2792 {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe 40 PID 2792 wrote to memory of 1384 2792 {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe 40 PID 2792 wrote to memory of 1384 2792 {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe 40 PID 2792 wrote to memory of 1744 2792 {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe 41 PID 2792 wrote to memory of 1744 2792 {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe 41 PID 2792 wrote to memory of 1744 2792 {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe 41 PID 2792 wrote to memory of 1744 2792 {B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe 41 PID 1384 wrote to memory of 2216 1384 {D06503AB-E839-4be1-9602-A2A929751E4C}.exe 42 PID 1384 wrote to memory of 2216 1384 {D06503AB-E839-4be1-9602-A2A929751E4C}.exe 42 PID 1384 wrote to memory of 2216 1384 {D06503AB-E839-4be1-9602-A2A929751E4C}.exe 42 PID 1384 wrote to memory of 2216 1384 {D06503AB-E839-4be1-9602-A2A929751E4C}.exe 42 PID 1384 wrote to memory of 1968 1384 {D06503AB-E839-4be1-9602-A2A929751E4C}.exe 43 PID 1384 wrote to memory of 1968 1384 {D06503AB-E839-4be1-9602-A2A929751E4C}.exe 43 PID 1384 wrote to memory of 1968 1384 {D06503AB-E839-4be1-9602-A2A929751E4C}.exe 43 PID 1384 wrote to memory of 1968 1384 {D06503AB-E839-4be1-9602-A2A929751E4C}.exe 43 PID 2216 wrote to memory of 2508 2216 {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe 44 PID 2216 wrote to memory of 2508 2216 {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe 44 PID 2216 wrote to memory of 2508 2216 {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe 44 PID 2216 wrote to memory of 2508 2216 {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe 44 PID 2216 wrote to memory of 2196 2216 {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe 45 PID 2216 wrote to memory of 2196 2216 {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe 45 PID 2216 wrote to memory of 2196 2216 {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe 45 PID 2216 wrote to memory of 2196 2216 {CE54FD71-CB44-4817-B174-5446AC1E7287}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_7ffa76dd27713a53b648f233d185d503_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\{60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exeC:\Windows\{60CC95DC-558C-48d1-B43E-EDCC5E7DBD3C}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\{5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exeC:\Windows\{5AAE76CD-B719-41c1-9F6A-3AE06082EA3F}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\{1C647F8A-10CA-48af-9995-9EBEBEF40366}.exeC:\Windows\{1C647F8A-10CA-48af-9995-9EBEBEF40366}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\{CBB81B21-4144-42c3-B328-EE5643663077}.exeC:\Windows\{CBB81B21-4144-42c3-B328-EE5643663077}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\{B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exeC:\Windows\{B9EBBACE-5709-4b77-9DA0-6FC28F2349EE}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\{D06503AB-E839-4be1-9602-A2A929751E4C}.exeC:\Windows\{D06503AB-E839-4be1-9602-A2A929751E4C}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\{CE54FD71-CB44-4817-B174-5446AC1E7287}.exeC:\Windows\{CE54FD71-CB44-4817-B174-5446AC1E7287}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\{2EB6B823-9879-4172-A93B-D3EDA3573982}.exeC:\Windows\{2EB6B823-9879-4172-A93B-D3EDA3573982}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2EB6B~1.EXE > nul10⤵PID:2140
-
-
C:\Windows\{DB060E41-741E-47c8-A4E8-B65F40EBC5A6}.exeC:\Windows\{DB060E41-741E-47c8-A4E8-B65F40EBC5A6}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Windows\{F74AF9BA-BC6A-4caf-A4F8-5B9767D13984}.exeC:\Windows\{F74AF9BA-BC6A-4caf-A4F8-5B9767D13984}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2864 -
C:\Windows\{F51C4F8F-3386-4ee6-BE87-B41DE3717DF4}.exeC:\Windows\{F51C4F8F-3386-4ee6-BE87-B41DE3717DF4}.exe12⤵
- Executes dropped EXE
PID:1168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F74AF~1.EXE > nul12⤵PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DB060~1.EXE > nul11⤵PID:1812
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CE54F~1.EXE > nul9⤵PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D0650~1.EXE > nul8⤵PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B9EBB~1.EXE > nul7⤵PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CBB81~1.EXE > nul6⤵PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C647~1.EXE > nul5⤵PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5AAE7~1.EXE > nul4⤵PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{60CC9~1.EXE > nul3⤵PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5c159b4cb046b0b2275e755b2321d058f
SHA11ab05d8d580b1592bd299e221c747fb3f8c6599a
SHA256e83b8ab1ebe35da95cb89009d283c68d26cf927a9116e64ae5afe08e2516882a
SHA512a39179d169011a3a4179723b180f50a6e8257d6a1b0817dfd8115b3418301b52edb2bb9accd3913f0490c628c55a5d42f0f22811cd989c271d08c69cb218c5ea
-
Filesize
344KB
MD5f0297b8f9e7be5662c82b865f26d4999
SHA19e489d897193958c39d83e995aa1bd72a6fc80d1
SHA256e7f73688d67f9584b87ed4e43fb4515cfe81bf4404ea3c5cf319857503bdce35
SHA5124077318fada9874306a9648476d3667c939551caf2ba01aa1efa08cd7348d69b5c5a2d1e6c3ebfc681022ab22b65c64a8991dd6ce3af8a6af73f235f4eab301f
-
Filesize
344KB
MD5150d4b1d4b3f3556c13eb94e196da2dc
SHA144154d766b4042af3075502d03fc294c22ee421c
SHA256d98f5aa2db1beabb121c152bea9712e02e624501680974fa0c62e3c01d77c963
SHA5123781a8b72c3bfabc4b668c0c49952804846e55c4a6c81e74d1854f290cfb382eceff1d9fec9932a756c2195bd911ce3fffcd0552a4071fa9a4cc980d6cfba11d
-
Filesize
344KB
MD50346674294a9686ece0060df5adbd101
SHA1ebc017038619e42047068ab6e9cb0b1e34f78d91
SHA2560d3541878b7aa13cb9d37c578b13b7898699914df8aa9f7fd061229a32a148fb
SHA5125986507df3a16e3ed552120f6c72b22a0bdd87a36ddca64e6a967039b21de9ca5f2ce28bf1c7cd1823537bc235f53b329ce06857dcdb08ae92b588330908f54f
-
Filesize
344KB
MD5d037b64a7bb1b1cc807cca14701412c7
SHA15783ba055fefae965b13984213cf2fdb5d700410
SHA2560299e66092c4b4a9876ed63b76978e87384826bde77f35e18830d3043ab7ff58
SHA512e65f2cc2768b9d2176843b0fc84589ba7f144c47ce9ae79d4feb2e8506604e5a58eee7f03f225c8c85f13b1b66f0c375df5d2b6cb13db4d52ff8c7aea7ee1b7b
-
Filesize
3KB
MD52dbca5a1940ccc48eeb39a0369fe5100
SHA1d44c7dd2f37d831eff7dd9514406f515ef7ec42f
SHA25619e59143ad087fc440c91b1a8cf901b2aca5707a54f7aea6cc11768ac92c9ffa
SHA5122139bb618e5d8b589de40c08f0f77cc6c59d3bc20f0ca75d22711bd9df16863d28c4355b95757be80b12c82126e8bde0cec279011336648c6858f77029550861
-
Filesize
344KB
MD50d3a4f0dc87537753441621ba6a061f8
SHA16d7256572dca525f1c35cc592d00469e479b797e
SHA2564e0db6a3e573bc164dd70082de4b0d007915406d414a337337a473b099e06e2d
SHA512a8577c8a01699a3445b356c473de5fac655d32026565b3c86cd4aa112030e597953243cd9a8a9830da824cccf8d9ffee1ca524c1cf072051dc19cea14c7edb5a
-
Filesize
344KB
MD5b0e8b1a1f566474cf262bc5ab84ca2c1
SHA1f975fd95a93ac93ae7c1c5aa3c7c16bd5970ad41
SHA25651ffe7a9fcd786d3946ccf6565fa011998954dbe0e0157eaa498c9cb5177bae9
SHA5121825516d8508e367f2e26eeca97f97ed0c0233e318c96c7d44fac4cb04e3c8abe948ebe98841de1ed59ac4ced7006e32ba3e35d57d8714a9505bead74608abbe
-
Filesize
344KB
MD5c225fc9e75906ba53dfe65390cfcef33
SHA103527fd500049216e999342f073ff54218df9285
SHA256c38b4d19c731c477a049059fe4c412aa28f4df4066b507e97a934e39c87bf1fa
SHA51286a4b02e05984b88a718802537b9f471e657a5d618cadc5ac345408ca39e0d71c797ac53041ca0fee024e452cdef73a3248d24021faca382b500901f08e06ebd
-
Filesize
344KB
MD506822912bc9bfbda24dea1337ce64031
SHA12bc915073f59c4e9d79d1d5ba313e273eed09f39
SHA256294e9b6c4f21ef2b46923013d1e0163bc4d1d31abc6f71bcd763c9854de706f1
SHA5129ef6d80c46c7e2c003f1fde729a6476ec568e2faa185e69cce9b81b0408f37b1f691fa2f1ab9da92f217dea5c358c854072f7038065c579092a97bfe4f1f39c4
-
Filesize
344KB
MD51b08c824448cef84ee000926c43e4ed6
SHA1a3653b7bf65ac90d7c72105e0a6535cc7a81d0c8
SHA2569573c73f7f74543f018d3dc037e2c12852fb890b7eda7b9e1bf763ced3c280f2
SHA5128d5cee542230999c3ceaef18467ea8b8cd7ba95701b72fda6b3dd2a6478d8f569d787907f5b9e66f0d9dd2d09a8fecc5dc20647a274c9826b7e22c799e59f7df
-
Filesize
344KB
MD59be338546c4c2b0cafc697b539e23e2a
SHA1f590b5251e4f23dca451daa0d879ea0eeca9ac3b
SHA256c102809972f65b9dd4b5b0a6bbc79058148c509e89de0911398c4f7de1421f08
SHA51274db7afbc1b1ee1cc82f7fe41b6a3c57b2d6d75a74936d8a3e9deb6b645c38ecc0e6a9c515378eb6cc7ea91df260d5ed0d4fae1380e56cb0a8f0b7c7db3f0b84