Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe
-
Size
408KB
-
MD5
6fc12090822a30b1bc5a2b028d651e9f
-
SHA1
320b84a8e42b3637a4d6832f5c9fea81c832b5eb
-
SHA256
05877561112a2769521ca091d0a5af648beee3956c8279d11064149f8dd7bb71
-
SHA512
8a68a1051b2ed5b8b839c7d1261e5a901f2f1f5634bc2c7d846429927da928c275c6909256911f2c1f092fd0baffe246878b9bfadc716e5dd15fd1cbb19e10de
-
SSDEEP
3072:CEGh0oTl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGRldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x000500000001e816-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002322f-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000016932-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002322f-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000016932-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a00000002322f-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0006000000016932-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b00000002322f-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000016932-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c00000002322f-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000016932-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d00000002322f-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F174509-C129-4762-9E34-0A9E9E873037}\stubpath = "C:\\Windows\\{4F174509-C129-4762-9E34-0A9E9E873037}.exe" {6089A48B-2BA1-434a-A089-11391637C924}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}\stubpath = "C:\\Windows\\{727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe" {4F174509-C129-4762-9E34-0A9E9E873037}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{32566857-6B13-4e80-8021-322D0929C483} {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C966C6A-BCA2-456a-A538-82E2A84BE012}\stubpath = "C:\\Windows\\{3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe" {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{418406A1-FE31-4bbd-9001-C96EBCD33C23}\stubpath = "C:\\Windows\\{418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe" {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB4633AC-02DC-47f4-B138-714492E30C00}\stubpath = "C:\\Windows\\{CB4633AC-02DC-47f4-B138-714492E30C00}.exe" {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6089A48B-2BA1-434a-A089-11391637C924}\stubpath = "C:\\Windows\\{6089A48B-2BA1-434a-A089-11391637C924}.exe" {CB4633AC-02DC-47f4-B138-714492E30C00}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{727A1A07-83A3-4ebf-94A7-ABA6B6531FB3} {4F174509-C129-4762-9E34-0A9E9E873037}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3} {32566857-6B13-4e80-8021-322D0929C483}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F4767A8-933A-4a03-BD06-ECE193377CF5} {8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F4767A8-933A-4a03-BD06-ECE193377CF5}\stubpath = "C:\\Windows\\{6F4767A8-933A-4a03-BD06-ECE193377CF5}.exe" {8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DB284BF7-4514-4022-B911-8EC57676E361}\stubpath = "C:\\Windows\\{DB284BF7-4514-4022-B911-8EC57676E361}.exe" {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB8E99F6-7F6A-4ef3-831B-4A8930188A15} {DB284BF7-4514-4022-B911-8EC57676E361}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6089A48B-2BA1-434a-A089-11391637C924} {CB4633AC-02DC-47f4-B138-714492E30C00}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DB284BF7-4514-4022-B911-8EC57676E361} {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB8E99F6-7F6A-4ef3-831B-4A8930188A15}\stubpath = "C:\\Windows\\{BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe" {DB284BF7-4514-4022-B911-8EC57676E361}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB4633AC-02DC-47f4-B138-714492E30C00} {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F174509-C129-4762-9E34-0A9E9E873037} {6089A48B-2BA1-434a-A089-11391637C924}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C966C6A-BCA2-456a-A538-82E2A84BE012} {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF468BD1-716D-4df3-96A7-A4EDB65CC6C3} 2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}\stubpath = "C:\\Windows\\{CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe" 2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{418406A1-FE31-4bbd-9001-C96EBCD33C23} {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{32566857-6B13-4e80-8021-322D0929C483}\stubpath = "C:\\Windows\\{32566857-6B13-4e80-8021-322D0929C483}.exe" {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3}\stubpath = "C:\\Windows\\{8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3}.exe" {32566857-6B13-4e80-8021-322D0929C483}.exe -
Executes dropped EXE 12 IoCs
pid Process 1036 {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe 5032 {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe 3896 {DB284BF7-4514-4022-B911-8EC57676E361}.exe 1932 {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe 3564 {CB4633AC-02DC-47f4-B138-714492E30C00}.exe 2592 {6089A48B-2BA1-434a-A089-11391637C924}.exe 4640 {4F174509-C129-4762-9E34-0A9E9E873037}.exe 8 {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe 1396 {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe 1524 {32566857-6B13-4e80-8021-322D0929C483}.exe 4548 {8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3}.exe 4984 {6F4767A8-933A-4a03-BD06-ECE193377CF5}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe File created C:\Windows\{DB284BF7-4514-4022-B911-8EC57676E361}.exe {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe File created C:\Windows\{BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe {DB284BF7-4514-4022-B911-8EC57676E361}.exe File created C:\Windows\{6089A48B-2BA1-434a-A089-11391637C924}.exe {CB4633AC-02DC-47f4-B138-714492E30C00}.exe File created C:\Windows\{3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe File created C:\Windows\{8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3}.exe {32566857-6B13-4e80-8021-322D0929C483}.exe File created C:\Windows\{CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe 2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe File created C:\Windows\{CB4633AC-02DC-47f4-B138-714492E30C00}.exe {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe File created C:\Windows\{4F174509-C129-4762-9E34-0A9E9E873037}.exe {6089A48B-2BA1-434a-A089-11391637C924}.exe File created C:\Windows\{727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe {4F174509-C129-4762-9E34-0A9E9E873037}.exe File created C:\Windows\{32566857-6B13-4e80-8021-322D0929C483}.exe {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe File created C:\Windows\{6F4767A8-933A-4a03-BD06-ECE193377CF5}.exe {8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1092 2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe Token: SeIncBasePriorityPrivilege 1036 {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe Token: SeIncBasePriorityPrivilege 5032 {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe Token: SeIncBasePriorityPrivilege 3896 {DB284BF7-4514-4022-B911-8EC57676E361}.exe Token: SeIncBasePriorityPrivilege 1932 {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe Token: SeIncBasePriorityPrivilege 3564 {CB4633AC-02DC-47f4-B138-714492E30C00}.exe Token: SeIncBasePriorityPrivilege 2592 {6089A48B-2BA1-434a-A089-11391637C924}.exe Token: SeIncBasePriorityPrivilege 4640 {4F174509-C129-4762-9E34-0A9E9E873037}.exe Token: SeIncBasePriorityPrivilege 8 {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe Token: SeIncBasePriorityPrivilege 1396 {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe Token: SeIncBasePriorityPrivilege 1524 {32566857-6B13-4e80-8021-322D0929C483}.exe Token: SeIncBasePriorityPrivilege 4548 {8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1036 1092 2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe 87 PID 1092 wrote to memory of 1036 1092 2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe 87 PID 1092 wrote to memory of 1036 1092 2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe 87 PID 1092 wrote to memory of 216 1092 2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe 88 PID 1092 wrote to memory of 216 1092 2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe 88 PID 1092 wrote to memory of 216 1092 2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe 88 PID 1036 wrote to memory of 5032 1036 {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe 89 PID 1036 wrote to memory of 5032 1036 {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe 89 PID 1036 wrote to memory of 5032 1036 {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe 89 PID 1036 wrote to memory of 1568 1036 {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe 90 PID 1036 wrote to memory of 1568 1036 {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe 90 PID 1036 wrote to memory of 1568 1036 {CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe 90 PID 5032 wrote to memory of 3896 5032 {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe 94 PID 5032 wrote to memory of 3896 5032 {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe 94 PID 5032 wrote to memory of 3896 5032 {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe 94 PID 5032 wrote to memory of 1556 5032 {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe 95 PID 5032 wrote to memory of 1556 5032 {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe 95 PID 5032 wrote to memory of 1556 5032 {418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe 95 PID 3896 wrote to memory of 1932 3896 {DB284BF7-4514-4022-B911-8EC57676E361}.exe 96 PID 3896 wrote to memory of 1932 3896 {DB284BF7-4514-4022-B911-8EC57676E361}.exe 96 PID 3896 wrote to memory of 1932 3896 {DB284BF7-4514-4022-B911-8EC57676E361}.exe 96 PID 3896 wrote to memory of 1084 3896 {DB284BF7-4514-4022-B911-8EC57676E361}.exe 97 PID 3896 wrote to memory of 1084 3896 {DB284BF7-4514-4022-B911-8EC57676E361}.exe 97 PID 3896 wrote to memory of 1084 3896 {DB284BF7-4514-4022-B911-8EC57676E361}.exe 97 PID 1932 wrote to memory of 3564 1932 {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe 98 PID 1932 wrote to memory of 3564 1932 {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe 98 PID 1932 wrote to memory of 3564 1932 {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe 98 PID 1932 wrote to memory of 1656 1932 {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe 99 PID 1932 wrote to memory of 1656 1932 {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe 99 PID 1932 wrote to memory of 1656 1932 {BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe 99 PID 3564 wrote to memory of 2592 3564 {CB4633AC-02DC-47f4-B138-714492E30C00}.exe 100 PID 3564 wrote to memory of 2592 3564 {CB4633AC-02DC-47f4-B138-714492E30C00}.exe 100 PID 3564 wrote to memory of 2592 3564 {CB4633AC-02DC-47f4-B138-714492E30C00}.exe 100 PID 3564 wrote to memory of 4084 3564 {CB4633AC-02DC-47f4-B138-714492E30C00}.exe 101 PID 3564 wrote to memory of 4084 3564 {CB4633AC-02DC-47f4-B138-714492E30C00}.exe 101 PID 3564 wrote to memory of 4084 3564 {CB4633AC-02DC-47f4-B138-714492E30C00}.exe 101 PID 2592 wrote to memory of 4640 2592 {6089A48B-2BA1-434a-A089-11391637C924}.exe 102 PID 2592 wrote to memory of 4640 2592 {6089A48B-2BA1-434a-A089-11391637C924}.exe 102 PID 2592 wrote to memory of 4640 2592 {6089A48B-2BA1-434a-A089-11391637C924}.exe 102 PID 2592 wrote to memory of 3608 2592 {6089A48B-2BA1-434a-A089-11391637C924}.exe 103 PID 2592 wrote to memory of 3608 2592 {6089A48B-2BA1-434a-A089-11391637C924}.exe 103 PID 2592 wrote to memory of 3608 2592 {6089A48B-2BA1-434a-A089-11391637C924}.exe 103 PID 4640 wrote to memory of 8 4640 {4F174509-C129-4762-9E34-0A9E9E873037}.exe 104 PID 4640 wrote to memory of 8 4640 {4F174509-C129-4762-9E34-0A9E9E873037}.exe 104 PID 4640 wrote to memory of 8 4640 {4F174509-C129-4762-9E34-0A9E9E873037}.exe 104 PID 4640 wrote to memory of 1780 4640 {4F174509-C129-4762-9E34-0A9E9E873037}.exe 105 PID 4640 wrote to memory of 1780 4640 {4F174509-C129-4762-9E34-0A9E9E873037}.exe 105 PID 4640 wrote to memory of 1780 4640 {4F174509-C129-4762-9E34-0A9E9E873037}.exe 105 PID 8 wrote to memory of 1396 8 {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe 106 PID 8 wrote to memory of 1396 8 {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe 106 PID 8 wrote to memory of 1396 8 {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe 106 PID 8 wrote to memory of 624 8 {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe 107 PID 8 wrote to memory of 624 8 {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe 107 PID 8 wrote to memory of 624 8 {727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe 107 PID 1396 wrote to memory of 1524 1396 {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe 108 PID 1396 wrote to memory of 1524 1396 {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe 108 PID 1396 wrote to memory of 1524 1396 {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe 108 PID 1396 wrote to memory of 4616 1396 {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe 109 PID 1396 wrote to memory of 4616 1396 {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe 109 PID 1396 wrote to memory of 4616 1396 {3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe 109 PID 1524 wrote to memory of 4548 1524 {32566857-6B13-4e80-8021-322D0929C483}.exe 110 PID 1524 wrote to memory of 4548 1524 {32566857-6B13-4e80-8021-322D0929C483}.exe 110 PID 1524 wrote to memory of 4548 1524 {32566857-6B13-4e80-8021-322D0929C483}.exe 110 PID 1524 wrote to memory of 4796 1524 {32566857-6B13-4e80-8021-322D0929C483}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_6fc12090822a30b1bc5a2b028d651e9f_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\{CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exeC:\Windows\{CF468BD1-716D-4df3-96A7-A4EDB65CC6C3}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\{418406A1-FE31-4bbd-9001-C96EBCD33C23}.exeC:\Windows\{418406A1-FE31-4bbd-9001-C96EBCD33C23}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\{DB284BF7-4514-4022-B911-8EC57676E361}.exeC:\Windows\{DB284BF7-4514-4022-B911-8EC57676E361}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\{BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exeC:\Windows\{BB8E99F6-7F6A-4ef3-831B-4A8930188A15}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\{CB4633AC-02DC-47f4-B138-714492E30C00}.exeC:\Windows\{CB4633AC-02DC-47f4-B138-714492E30C00}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\{6089A48B-2BA1-434a-A089-11391637C924}.exeC:\Windows\{6089A48B-2BA1-434a-A089-11391637C924}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\{4F174509-C129-4762-9E34-0A9E9E873037}.exeC:\Windows\{4F174509-C129-4762-9E34-0A9E9E873037}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\{727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exeC:\Windows\{727A1A07-83A3-4ebf-94A7-ABA6B6531FB3}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\{3C966C6A-BCA2-456a-A538-82E2A84BE012}.exeC:\Windows\{3C966C6A-BCA2-456a-A538-82E2A84BE012}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\{32566857-6B13-4e80-8021-322D0929C483}.exeC:\Windows\{32566857-6B13-4e80-8021-322D0929C483}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\{8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3}.exeC:\Windows\{8E0C16F4-BF8B-4997-8BEB-D6FF028CC8E3}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Windows\{6F4767A8-933A-4a03-BD06-ECE193377CF5}.exeC:\Windows\{6F4767A8-933A-4a03-BD06-ECE193377CF5}.exe13⤵
- Executes dropped EXE
PID:4984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E0C1~1.EXE > nul13⤵PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{32566~1.EXE > nul12⤵PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C966~1.EXE > nul11⤵PID:4616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{727A1~1.EXE > nul10⤵PID:624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4F174~1.EXE > nul9⤵PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6089A~1.EXE > nul8⤵PID:3608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB463~1.EXE > nul7⤵PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BB8E9~1.EXE > nul6⤵PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DB284~1.EXE > nul5⤵PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41840~1.EXE > nul4⤵PID:1556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CF468~1.EXE > nul3⤵PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD51e008c5645347a66366707fde781816b
SHA17722b7ba2bf29a64f64e7055ff34ce3a44af627c
SHA256f965990dd800430d3ec6e6afa956fed248a685a7100fa5a89ec881fa5c60c7a1
SHA512cdfc97911f6bd624389a16c4628a6973d1f8a2fb32b45fcfda595829968f3e8c029184898341776302f16c62ba976de6ccab4cfaa6537ae38faec67c87df8034
-
Filesize
408KB
MD59e4b0d993827712dc8da12d0742307c7
SHA13ae0861a037e501a736ae6b24c380dbb8eac2af3
SHA2568679a587741b5245ce526c7aee8f7ef30f55bdc288c5c6441df91fed24b185dc
SHA512fa9f9122471d5d20c707147ccdd38267c0089e439118cef7b4b3ade8535ce7f6e5a1e3ae1f6fbff4ca434d3a0c9a8373c8dd0f4165cb013e8a0fc1e380b73baa
-
Filesize
408KB
MD59f26b20f87a8c88cd1ffe10e31f94c53
SHA182c77af7768d40bd9f26c4a3d314dc0ac8836cbb
SHA256c1031525fabb2ff1fdec7ece81058a44c3ccc6c92679a169dd884fddc740327c
SHA512aac6a15d6da23b8d98f7d4c0ca912b4fbc6c3cafaab12f42067586ded84a276eab9b4d010642b1c935c431716aaab2917bd050d3b52c30e95987973b63a63a0a
-
Filesize
408KB
MD57fda926e31e96af608089ed6bac831f2
SHA170d4771dd2f5922e829e295d46fdd285cc6f024d
SHA256ca48947c2b471ab5ab9fa4a8e8102df50616bd83e44863ce63ee48d20d944d65
SHA512ff2fa9292db43cd3b2d8231784cbcead2ac0348ef2326ac76d04a3e1865be340638b18635565526b862d152af7f0a9a3f4e1be32687629e4b358e242f3480749
-
Filesize
408KB
MD54c7365dd2e16fc20f9e192958367e8c5
SHA1a5d52e8f0bf6e17e4780f001fbe3fd5e786b3313
SHA256badf1466f63374f04e092c190ae44b6045d265dbf59053818809f4d2e63f40fb
SHA5121759c5a67e58fad453f7dcd72efba84b80e900cfa27059cb9d107d115bd54d00c37d392f5f6abed813159cdb124a448bef7c80c902abb0db56d679b76717f462
-
Filesize
408KB
MD54ea4c682b0979d768d7cfa82c8e51874
SHA177d7605278cff289710ce6228df2bb3307493798
SHA25636f601f5b9c73684fa042b368253ddc531de9048fc7f42d10db13e89fe8051f7
SHA512e20c74cefc41ddb73cb365418aa61a2cacee3475fb146608a81ad1559fdf15af0e6687faa29d52eb2dde516c47c7d863f67b66fb16aa91c638a6018f4f58ef04
-
Filesize
408KB
MD5e15d7b99d0acbb9b47d3fef10da51df0
SHA1daef382037f44d13f2875950b0b997a2e765471c
SHA256d544ad6dde41f0fbb5b5c6fc11b2a3ee76186bd4c31ba48337d71c88b571bf6e
SHA5125fa087be3230bcdc65912b1272565d595dc2819b346ca9aacfc2ee3d9bed1a569fd4898e352b09db767b782340b20ad7f6c24b8c641eb8b25e424f692ef02a43
-
Filesize
408KB
MD554623d5c0214a60d1d30275e8146e02a
SHA1bfe927bb87a433bf52ff733bb4048312f97580cb
SHA256fd30c1aca7fadc0b2e109f97185cc79523a9b5a4fa212f00a31431f7135561d1
SHA5124a8dd22c8be7e2f470599458bccb8cd8b8756b10995bd9a8b538c7478b3d13fdb7b933e10a0a5df792512b982a1a61d925ff2b7d85f6c0f29214f174ac11492b
-
Filesize
408KB
MD5c1db5eb095f1b75c1db4e462aae744c7
SHA1c53f9979fe7cc03db620b2f14190bf00a7f4eb62
SHA25626eb28329a74e4bc0947bece94766030e3065af35e7485b88a2aebbb8633e086
SHA512cb97b3210dbd18a853c6a72222e6d09cd6eac18a6e8e696792c374e8527d4e651e497b1efe401b48aaa2a4e0e738345d64904e721304ff0bd6b2c310b1a6e1e6
-
Filesize
408KB
MD5cad76ce724be9126616bc32a89327220
SHA1b1d826eb3a995a0a1b3a67d3298e398bf2733292
SHA2566b47cb53dc3fd2500a968dd9de6fb961621e5ee98eba77bafee2ec6874d303ee
SHA512c681e8e6206b126ce39c53b235237c5e241c5d10eae8611531859415241b6b6011017004efee55a09f98eba264af01d1960d36a1b4ac2d6f1636931617792e74
-
Filesize
408KB
MD541381e4cded4571b31f129f805ab6100
SHA1d019c2e7a81cafdabfdbb35c73c06115423f087a
SHA2566d5754e2535496b25359ea87a06522e3d4acc33398749ddd7e4425aa14cd90e3
SHA51267c35da296100dfb7f7b854730da859b2879573cee9c9f63c9deb2182662f534be9b992a60f4c6b11c10345e4a265df50d440045ecce67b4a106b15fb95cc16e
-
Filesize
408KB
MD59c86bf2983e090979facf265b03bc0bf
SHA14a4413f5d285d4755d4d31968eb23376f919cde3
SHA2566eb85cf57b50bf4277fd170db87b30b8f7a0b327f884f47c54ab385d84460f11
SHA51200a3994edd0ba9e3e396a212f0d8af0c487f35bc3800220410f1161357435a6a67ab16b8469311c68d7729adb3e3853b07175b1a81c8ca2b3f071212caa8d376