Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 15:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe
-
Size
168KB
-
MD5
d8a2d6a4ef75c2ea942165a28f040615
-
SHA1
f0cfad101bebf8625a592a90937af0fe0f25e402
-
SHA256
d367241bcd2b4130028ddd6780247dbceb9e267655e24f147a4f87cb6c6eb79c
-
SHA512
2e8c6460b21124bda4b87945daefc34c0f54d8f37ac4edc0213876e234b05251383aa6b57be0c63e63763d558901d5a5fa4274b03d41fa03a97c09a73f5c6b09
-
SSDEEP
1536:1EGh0oVlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oVlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x0009000000012243-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00100000000122c7-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000012243-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000300000000b1f2-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000b1f2-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000500000000b1f2-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000b1f2-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}\stubpath = "C:\\Windows\\{10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe" {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F941CFA4-136B-4a9d-898B-940A3F323E8C}\stubpath = "C:\\Windows\\{F941CFA4-136B-4a9d-898B-940A3F323E8C}.exe" {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0148771C-C2A2-4c38-A9F2-E62EC6A309CC} {7FFA0E63-B30C-40fb-BCFA-30B1550F653A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A9C7F03A-666C-41c5-940C-C50B3A6CCB26}\stubpath = "C:\\Windows\\{A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe" 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB} {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}\stubpath = "C:\\Windows\\{EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe" {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A09D0FDF-2570-4548-8380-46CD42F3E694}\stubpath = "C:\\Windows\\{A09D0FDF-2570-4548-8380-46CD42F3E694}.exe" {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1} {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6279EB2-6A00-456d-BC7C-666E93714D78} {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2} {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}\stubpath = "C:\\Windows\\{5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe" {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A09D0FDF-2570-4548-8380-46CD42F3E694} {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6279EB2-6A00-456d-BC7C-666E93714D78}\stubpath = "C:\\Windows\\{B6279EB2-6A00-456d-BC7C-666E93714D78}.exe" {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F941CFA4-136B-4a9d-898B-940A3F323E8C} {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7FFA0E63-B30C-40fb-BCFA-30B1550F653A}\stubpath = "C:\\Windows\\{7FFA0E63-B30C-40fb-BCFA-30B1550F653A}.exe" {ABE3B9E1-B86D-412c-B70F-D1CD67919D00}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3FAA1ECA-1BE2-465d-9F57-57B4320FC903} {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3FAA1ECA-1BE2-465d-9F57-57B4320FC903}\stubpath = "C:\\Windows\\{3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe" {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ABE3B9E1-B86D-412c-B70F-D1CD67919D00}\stubpath = "C:\\Windows\\{ABE3B9E1-B86D-412c-B70F-D1CD67919D00}.exe" {F941CFA4-136B-4a9d-898B-940A3F323E8C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7FFA0E63-B30C-40fb-BCFA-30B1550F653A} {ABE3B9E1-B86D-412c-B70F-D1CD67919D00}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0148771C-C2A2-4c38-A9F2-E62EC6A309CC}\stubpath = "C:\\Windows\\{0148771C-C2A2-4c38-A9F2-E62EC6A309CC}.exe" {7FFA0E63-B30C-40fb-BCFA-30B1550F653A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A9C7F03A-666C-41c5-940C-C50B3A6CCB26} 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ABE3B9E1-B86D-412c-B70F-D1CD67919D00} {F941CFA4-136B-4a9d-898B-940A3F323E8C}.exe -
Deletes itself 1 IoCs
pid Process 2944 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2948 {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe 2520 {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe 2728 {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe 2032 {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe 2736 {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe 1636 {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe 1932 {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe 1628 {F941CFA4-136B-4a9d-898B-940A3F323E8C}.exe 1324 {ABE3B9E1-B86D-412c-B70F-D1CD67919D00}.exe 2096 {7FFA0E63-B30C-40fb-BCFA-30B1550F653A}.exe 2268 {0148771C-C2A2-4c38-A9F2-E62EC6A309CC}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{A09D0FDF-2570-4548-8380-46CD42F3E694}.exe {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe File created C:\Windows\{10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe File created C:\Windows\{B6279EB2-6A00-456d-BC7C-666E93714D78}.exe {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe File created C:\Windows\{F941CFA4-136B-4a9d-898B-940A3F323E8C}.exe {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe File created C:\Windows\{ABE3B9E1-B86D-412c-B70F-D1CD67919D00}.exe {F941CFA4-136B-4a9d-898B-940A3F323E8C}.exe File created C:\Windows\{5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe File created C:\Windows\{EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe File created C:\Windows\{7FFA0E63-B30C-40fb-BCFA-30B1550F653A}.exe {ABE3B9E1-B86D-412c-B70F-D1CD67919D00}.exe File created C:\Windows\{0148771C-C2A2-4c38-A9F2-E62EC6A309CC}.exe {7FFA0E63-B30C-40fb-BCFA-30B1550F653A}.exe File created C:\Windows\{A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe File created C:\Windows\{3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2204 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe Token: SeIncBasePriorityPrivilege 2948 {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe Token: SeIncBasePriorityPrivilege 2520 {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe Token: SeIncBasePriorityPrivilege 2728 {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe Token: SeIncBasePriorityPrivilege 2032 {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe Token: SeIncBasePriorityPrivilege 2736 {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe Token: SeIncBasePriorityPrivilege 1636 {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe Token: SeIncBasePriorityPrivilege 1932 {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe Token: SeIncBasePriorityPrivilege 1628 {F941CFA4-136B-4a9d-898B-940A3F323E8C}.exe Token: SeIncBasePriorityPrivilege 1324 {ABE3B9E1-B86D-412c-B70F-D1CD67919D00}.exe Token: SeIncBasePriorityPrivilege 2096 {7FFA0E63-B30C-40fb-BCFA-30B1550F653A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2948 2204 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe 28 PID 2204 wrote to memory of 2948 2204 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe 28 PID 2204 wrote to memory of 2948 2204 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe 28 PID 2204 wrote to memory of 2948 2204 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe 28 PID 2204 wrote to memory of 2944 2204 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe 29 PID 2204 wrote to memory of 2944 2204 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe 29 PID 2204 wrote to memory of 2944 2204 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe 29 PID 2204 wrote to memory of 2944 2204 2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe 29 PID 2948 wrote to memory of 2520 2948 {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe 30 PID 2948 wrote to memory of 2520 2948 {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe 30 PID 2948 wrote to memory of 2520 2948 {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe 30 PID 2948 wrote to memory of 2520 2948 {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe 30 PID 2948 wrote to memory of 2544 2948 {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe 31 PID 2948 wrote to memory of 2544 2948 {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe 31 PID 2948 wrote to memory of 2544 2948 {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe 31 PID 2948 wrote to memory of 2544 2948 {A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe 31 PID 2520 wrote to memory of 2728 2520 {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe 32 PID 2520 wrote to memory of 2728 2520 {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe 32 PID 2520 wrote to memory of 2728 2520 {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe 32 PID 2520 wrote to memory of 2728 2520 {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe 32 PID 2520 wrote to memory of 1116 2520 {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe 33 PID 2520 wrote to memory of 1116 2520 {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe 33 PID 2520 wrote to memory of 1116 2520 {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe 33 PID 2520 wrote to memory of 1116 2520 {3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe 33 PID 2728 wrote to memory of 2032 2728 {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe 36 PID 2728 wrote to memory of 2032 2728 {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe 36 PID 2728 wrote to memory of 2032 2728 {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe 36 PID 2728 wrote to memory of 2032 2728 {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe 36 PID 2728 wrote to memory of 1940 2728 {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe 37 PID 2728 wrote to memory of 1940 2728 {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe 37 PID 2728 wrote to memory of 1940 2728 {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe 37 PID 2728 wrote to memory of 1940 2728 {5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe 37 PID 2032 wrote to memory of 2736 2032 {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe 38 PID 2032 wrote to memory of 2736 2032 {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe 38 PID 2032 wrote to memory of 2736 2032 {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe 38 PID 2032 wrote to memory of 2736 2032 {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe 38 PID 2032 wrote to memory of 2740 2032 {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe 39 PID 2032 wrote to memory of 2740 2032 {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe 39 PID 2032 wrote to memory of 2740 2032 {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe 39 PID 2032 wrote to memory of 2740 2032 {EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe 39 PID 2736 wrote to memory of 1636 2736 {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe 40 PID 2736 wrote to memory of 1636 2736 {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe 40 PID 2736 wrote to memory of 1636 2736 {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe 40 PID 2736 wrote to memory of 1636 2736 {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe 40 PID 2736 wrote to memory of 876 2736 {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe 41 PID 2736 wrote to memory of 876 2736 {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe 41 PID 2736 wrote to memory of 876 2736 {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe 41 PID 2736 wrote to memory of 876 2736 {A09D0FDF-2570-4548-8380-46CD42F3E694}.exe 41 PID 1636 wrote to memory of 1932 1636 {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe 42 PID 1636 wrote to memory of 1932 1636 {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe 42 PID 1636 wrote to memory of 1932 1636 {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe 42 PID 1636 wrote to memory of 1932 1636 {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe 42 PID 1636 wrote to memory of 2348 1636 {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe 43 PID 1636 wrote to memory of 2348 1636 {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe 43 PID 1636 wrote to memory of 2348 1636 {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe 43 PID 1636 wrote to memory of 2348 1636 {10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe 43 PID 1932 wrote to memory of 1628 1932 {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe 44 PID 1932 wrote to memory of 1628 1932 {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe 44 PID 1932 wrote to memory of 1628 1932 {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe 44 PID 1932 wrote to memory of 1628 1932 {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe 44 PID 1932 wrote to memory of 1100 1932 {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe 45 PID 1932 wrote to memory of 1100 1932 {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe 45 PID 1932 wrote to memory of 1100 1932 {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe 45 PID 1932 wrote to memory of 1100 1932 {B6279EB2-6A00-456d-BC7C-666E93714D78}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_d8a2d6a4ef75c2ea942165a28f040615_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\{A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exeC:\Windows\{A9C7F03A-666C-41c5-940C-C50B3A6CCB26}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\{3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exeC:\Windows\{3FAA1ECA-1BE2-465d-9F57-57B4320FC903}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\{5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exeC:\Windows\{5D2ACD27-2F3F-4c16-96CE-86E0B883BCF2}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\{EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exeC:\Windows\{EB767A41-B4CA-43c9-B6B2-F17B4BBF26AB}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\{A09D0FDF-2570-4548-8380-46CD42F3E694}.exeC:\Windows\{A09D0FDF-2570-4548-8380-46CD42F3E694}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exeC:\Windows\{10B4AF5E-F1F5-4f6d-BEEA-37C520763CE1}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\{B6279EB2-6A00-456d-BC7C-666E93714D78}.exeC:\Windows\{B6279EB2-6A00-456d-BC7C-666E93714D78}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\{F941CFA4-136B-4a9d-898B-940A3F323E8C}.exeC:\Windows\{F941CFA4-136B-4a9d-898B-940A3F323E8C}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\{ABE3B9E1-B86D-412c-B70F-D1CD67919D00}.exeC:\Windows\{ABE3B9E1-B86D-412c-B70F-D1CD67919D00}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Windows\{7FFA0E63-B30C-40fb-BCFA-30B1550F653A}.exeC:\Windows\{7FFA0E63-B30C-40fb-BCFA-30B1550F653A}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2096 -
C:\Windows\{0148771C-C2A2-4c38-A9F2-E62EC6A309CC}.exeC:\Windows\{0148771C-C2A2-4c38-A9F2-E62EC6A309CC}.exe12⤵
- Executes dropped EXE
PID:2268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7FFA0~1.EXE > nul12⤵PID:548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ABE3B~1.EXE > nul11⤵PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F941C~1.EXE > nul10⤵PID:1356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6279~1.EXE > nul9⤵PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{10B4A~1.EXE > nul8⤵PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A09D0~1.EXE > nul7⤵PID:876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EB767~1.EXE > nul6⤵PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D2AC~1.EXE > nul5⤵PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3FAA1~1.EXE > nul4⤵PID:1116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A9C7F~1.EXE > nul3⤵PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD582da03bdd2c753a96f53a6a26d9b3367
SHA12757c15fef62cf8d6b6d94b56fd4c6f09f714c7a
SHA25611204606115206342a8fd9b31cca4e787436ff2d61c3235a4b7c2ee379e494ea
SHA5129071dd384dbffdf4a56433c109ec2f687024fbdd6f6eae4cb5132d64306e3c2343d82f7cd7c83f293b08d3c256bcc70e8ec54a94155ee94684fe61c5294c4746
-
Filesize
168KB
MD5507eb33e306e6024e6178cee1141f978
SHA1d75d70f82494f2769be0ed057c6874c034308c8b
SHA2563a152f8dd7d243d4075b538afa6feadabbe76443f68c5a4961b11e841e971a3f
SHA512f92f793ad1e6a4626c6dbc8ca6d9005cc3e2048cc1ffd8d5466b7d97e6541e68907cfc62abb127c92f8443bae482b7acf87f8f7e06085867e5f810dbae9b16e6
-
Filesize
168KB
MD577ae11f836f1d74a44d8ec3122fb7f54
SHA1991ca768424117b5ba3012a88a51034caff75e6d
SHA25682aa394153571d0044b4bc47db0862dc6eebca64a0f24671ea9ac84f83ec5b4e
SHA512a18adcde91b0915ca4bfc33fc4628137399750f8bc3555c5a021d8239d8829d02bf871e297f2dcfc451f6fd243e2caa2f6a995f2e7dcb5e3da03306b46735cd1
-
Filesize
168KB
MD53243e8cfb102ceb4bf823c9bcf4b58ff
SHA19fbcaddfb3ea4c11e4ee1ebc902519ccf53ae06c
SHA2566478b670abf1062298cd2702744aac85c27247ae8deff277ed1196a1a9b397ad
SHA51286c39e0973bba5cbf22e18f411c0f46a0eeda258ef538da6238984f7983795f2893da875c894112b36162ffa3fdc33f4b50b40dc1b2fd3f63d88126320129929
-
Filesize
168KB
MD5777d440c3c142069a95a14eb8c288c6c
SHA12b4d590147dce5d99d5adf588195e7def6486096
SHA25618d366d7fc640610f0fc2393d16161ade55fbc8c55ab15cdd0bdfe0d94c10805
SHA51207e9d0002db10fe38be0a7dda3bdbbe0c5131c9bc3ada8fb5b24f90ba6e51d037c048bc194826797c9086c5e815a310c0caccb01c890ebc8371ae44e525cf1ef
-
Filesize
168KB
MD585df755959d5c634717f375992006a17
SHA19f47833ad8c77273539d46e84a356562cb30a90d
SHA256096901f5ac19dcc96f6724ce342219c8a0bd1e08b591dfb5c47a36b7ac06bc71
SHA512641572ceda086916eb35767a3ba4af996478a96b028435d9dff13779477dae0a5ff12e1095b6e03cf4574e71c9ed32ff296e8a05f742071e18e8e3be9342c70a
-
Filesize
168KB
MD587c5388f846e26418050c8504c2bd636
SHA14c823dfd577742a168775c4d3c04282a4a3d299d
SHA2562ae8466ecb4c5605f54a9d8368efce0c8c6234a129acbdb0249e3dfa3dc067be
SHA5123ce5a8948bf0865679cd5c1dd7cf024d27f10e753bca0a28f6dd29e1bb14ed40f00c65e4abfadb8106c356c4e4fa5d43194623e4bdb9b8df049245118b3aa362
-
Filesize
168KB
MD53c3344742fa8d453e10d16948b71a093
SHA1c4ef2d83ee2172dbbe20409f99ee152a3d04e734
SHA2563cca38700b68b5c262abcc77c0e99a6374716b3b3de8876a5f26307576480bb4
SHA512350fe80a32cdd194f5f78c0f123e06d62040f03e24a4c2f529a50ac51f45822c22dd3271b87617934af6b5cd9b222e7e0afd4228019b79e095ad965468de7aff
-
Filesize
168KB
MD55098b461217c779710def4147aeeeaf2
SHA1239a8b2897d1e293b7e3b0297a8ce5f68c51732d
SHA256eeefb3c8fa45e2e74240ccecb637193c4fbbd373aeae7889bf08a620beb7c8f5
SHA5122e2e18ba2fbfbf330db31f46ec377ab752b3cd427ddd6e2583b125664b0327c3c11cb8ac0710928f19e990e48fbc1d15c114412a74e97974ee05fe8ce40528dc
-
Filesize
168KB
MD56790c68a540731c88feb2b5d072c7fb0
SHA1256e82afcd1fbb9f564c3cc0e8bfcd61a0454fbe
SHA2564f88993103e967f95a385f523fdecb08f7bc1007f74dff1197b820ebdbe56410
SHA512f851c571ecf1434250308f0fa693e38c0b0428ca20e5d472f32d9d00dc33601fde3b490eecaa99ef3bbf1de45e5081456fdbfb70f048e75a37d51feb722d27eb
-
Filesize
168KB
MD59b4337231101288e3b46756734256ce6
SHA1395876870e3a6b68881625b17ba50260d209e28c
SHA25616afa0f9a2021ecb3d7c6c82b63546a7008a9019aab1853466caba2a458691f1
SHA512ba42a17d10ed0ee51b85cc5edbf675fe201d268d029b832e090569519630051cee69309b798ad3a80a2167e9fccd7059009bbc0dd0d2bf7e128332f9962776cd