Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe
-
Size
408KB
-
MD5
0239b222ff451ce500b5844dbcf3b6aa
-
SHA1
e7daedf8210b60b51762523c347782d8118a0fff
-
SHA256
1191080d6a84425682b11e776774080bea16ab23033cfb8cec42a17752464e0f
-
SHA512
1b3c1ab0a380ea4c262a55d519b75829bbd5cd1a6a450d189bfd15627f7098daf47abbdeb26b8d3d5f8625b253a6fa90d466e8e7359945df5b10cb69ec34f2e9
-
SSDEEP
3072:CEGh0oll3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGDldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000700000001225f-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000015c31-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0032000000015d85-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed8-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002500000000b1f4-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed8-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002600000000b1f4-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed8-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002700000000b1f4-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed8-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002800000000b1f4-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}\stubpath = "C:\\Windows\\{C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe" {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DD021573-3543-42e5-9504-21074BD492CC}\stubpath = "C:\\Windows\\{DD021573-3543-42e5-9504-21074BD492CC}.exe" {45A89A2A-A1EC-46ac-8939-14C988868A0E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{25FAE468-BDE8-4d83-B29D-50F7DF4FDB1F}\stubpath = "C:\\Windows\\{25FAE468-BDE8-4d83-B29D-50F7DF4FDB1F}.exe" {DD021573-3543-42e5-9504-21074BD492CC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}\stubpath = "C:\\Windows\\{E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe" {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C66550AB-3C2E-4aab-8CFF-1E03AA483B07}\stubpath = "C:\\Windows\\{C66550AB-3C2E-4aab-8CFF-1E03AA483B07}.exe" {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{45A89A2A-A1EC-46ac-8939-14C988868A0E} {C66550AB-3C2E-4aab-8CFF-1E03AA483B07}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{25FAE468-BDE8-4d83-B29D-50F7DF4FDB1F} {DD021573-3543-42e5-9504-21074BD492CC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{00D8C740-64D2-4efc-AD59-D74E19B4C01C} 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D739C23F-A91A-442f-83C3-C06EA25CC3DD}\stubpath = "C:\\Windows\\{D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe" {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E49EB20-32F7-4445-8547-32E98D0DD940} {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{45A89A2A-A1EC-46ac-8939-14C988868A0E}\stubpath = "C:\\Windows\\{45A89A2A-A1EC-46ac-8939-14C988868A0E}.exe" {C66550AB-3C2E-4aab-8CFF-1E03AA483B07}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C14AEE91-BF49-4cf3-91CB-20BDF4A77C96} {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E2795A8F-D7FD-4166-9A0C-DE942B6A51E8} {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C66550AB-3C2E-4aab-8CFF-1E03AA483B07} {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D739C23F-A91A-442f-83C3-C06EA25CC3DD} {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E49EB20-32F7-4445-8547-32E98D0DD940}\stubpath = "C:\\Windows\\{6E49EB20-32F7-4445-8547-32E98D0DD940}.exe" {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A432F9BB-B191-41b3-A86D-75A27C20422D} {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A432F9BB-B191-41b3-A86D-75A27C20422D}\stubpath = "C:\\Windows\\{A432F9BB-B191-41b3-A86D-75A27C20422D}.exe" {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DD021573-3543-42e5-9504-21074BD492CC} {45A89A2A-A1EC-46ac-8939-14C988868A0E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{00D8C740-64D2-4efc-AD59-D74E19B4C01C}\stubpath = "C:\\Windows\\{00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe" 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BCF4E44C-D4BA-46e2-BC39-3D966764C482} {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BCF4E44C-D4BA-46e2-BC39-3D966764C482}\stubpath = "C:\\Windows\\{BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe" {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe -
Deletes itself 1 IoCs
pid Process 2516 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3044 {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe 800 {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe 2444 {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe 1120 {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe 2704 {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe 536 {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe 2148 {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe 572 {C66550AB-3C2E-4aab-8CFF-1E03AA483B07}.exe 624 {45A89A2A-A1EC-46ac-8939-14C988868A0E}.exe 2060 {DD021573-3543-42e5-9504-21074BD492CC}.exe 2236 {25FAE468-BDE8-4d83-B29D-50F7DF4FDB1F}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe File created C:\Windows\{A432F9BB-B191-41b3-A86D-75A27C20422D}.exe {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe File created C:\Windows\{C66550AB-3C2E-4aab-8CFF-1E03AA483B07}.exe {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe File created C:\Windows\{45A89A2A-A1EC-46ac-8939-14C988868A0E}.exe {C66550AB-3C2E-4aab-8CFF-1E03AA483B07}.exe File created C:\Windows\{00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe File created C:\Windows\{D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe File created C:\Windows\{6E49EB20-32F7-4445-8547-32E98D0DD940}.exe {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe File created C:\Windows\{C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe File created C:\Windows\{E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe File created C:\Windows\{DD021573-3543-42e5-9504-21074BD492CC}.exe {45A89A2A-A1EC-46ac-8939-14C988868A0E}.exe File created C:\Windows\{25FAE468-BDE8-4d83-B29D-50F7DF4FDB1F}.exe {DD021573-3543-42e5-9504-21074BD492CC}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2128 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe Token: SeIncBasePriorityPrivilege 3044 {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe Token: SeIncBasePriorityPrivilege 800 {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe Token: SeIncBasePriorityPrivilege 2444 {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe Token: SeIncBasePriorityPrivilege 1120 {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe Token: SeIncBasePriorityPrivilege 2704 {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe Token: SeIncBasePriorityPrivilege 536 {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe Token: SeIncBasePriorityPrivilege 2148 {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe Token: SeIncBasePriorityPrivilege 572 {C66550AB-3C2E-4aab-8CFF-1E03AA483B07}.exe Token: SeIncBasePriorityPrivilege 624 {45A89A2A-A1EC-46ac-8939-14C988868A0E}.exe Token: SeIncBasePriorityPrivilege 2060 {DD021573-3543-42e5-9504-21074BD492CC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 3044 2128 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe 28 PID 2128 wrote to memory of 3044 2128 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe 28 PID 2128 wrote to memory of 3044 2128 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe 28 PID 2128 wrote to memory of 3044 2128 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe 28 PID 2128 wrote to memory of 2516 2128 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe 29 PID 2128 wrote to memory of 2516 2128 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe 29 PID 2128 wrote to memory of 2516 2128 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe 29 PID 2128 wrote to memory of 2516 2128 2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe 29 PID 3044 wrote to memory of 800 3044 {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe 30 PID 3044 wrote to memory of 800 3044 {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe 30 PID 3044 wrote to memory of 800 3044 {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe 30 PID 3044 wrote to memory of 800 3044 {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe 30 PID 3044 wrote to memory of 2484 3044 {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe 31 PID 3044 wrote to memory of 2484 3044 {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe 31 PID 3044 wrote to memory of 2484 3044 {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe 31 PID 3044 wrote to memory of 2484 3044 {00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe 31 PID 800 wrote to memory of 2444 800 {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe 34 PID 800 wrote to memory of 2444 800 {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe 34 PID 800 wrote to memory of 2444 800 {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe 34 PID 800 wrote to memory of 2444 800 {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe 34 PID 800 wrote to memory of 2864 800 {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe 35 PID 800 wrote to memory of 2864 800 {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe 35 PID 800 wrote to memory of 2864 800 {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe 35 PID 800 wrote to memory of 2864 800 {BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe 35 PID 2444 wrote to memory of 1120 2444 {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe 36 PID 2444 wrote to memory of 1120 2444 {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe 36 PID 2444 wrote to memory of 1120 2444 {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe 36 PID 2444 wrote to memory of 1120 2444 {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe 36 PID 2444 wrote to memory of 672 2444 {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe 37 PID 2444 wrote to memory of 672 2444 {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe 37 PID 2444 wrote to memory of 672 2444 {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe 37 PID 2444 wrote to memory of 672 2444 {D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe 37 PID 1120 wrote to memory of 2704 1120 {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe 38 PID 1120 wrote to memory of 2704 1120 {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe 38 PID 1120 wrote to memory of 2704 1120 {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe 38 PID 1120 wrote to memory of 2704 1120 {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe 38 PID 1120 wrote to memory of 532 1120 {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe 39 PID 1120 wrote to memory of 532 1120 {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe 39 PID 1120 wrote to memory of 532 1120 {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe 39 PID 1120 wrote to memory of 532 1120 {6E49EB20-32F7-4445-8547-32E98D0DD940}.exe 39 PID 2704 wrote to memory of 536 2704 {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe 40 PID 2704 wrote to memory of 536 2704 {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe 40 PID 2704 wrote to memory of 536 2704 {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe 40 PID 2704 wrote to memory of 536 2704 {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe 40 PID 2704 wrote to memory of 1600 2704 {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe 41 PID 2704 wrote to memory of 1600 2704 {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe 41 PID 2704 wrote to memory of 1600 2704 {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe 41 PID 2704 wrote to memory of 1600 2704 {A432F9BB-B191-41b3-A86D-75A27C20422D}.exe 41 PID 536 wrote to memory of 2148 536 {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe 42 PID 536 wrote to memory of 2148 536 {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe 42 PID 536 wrote to memory of 2148 536 {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe 42 PID 536 wrote to memory of 2148 536 {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe 42 PID 536 wrote to memory of 284 536 {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe 43 PID 536 wrote to memory of 284 536 {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe 43 PID 536 wrote to memory of 284 536 {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe 43 PID 536 wrote to memory of 284 536 {C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe 43 PID 2148 wrote to memory of 572 2148 {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe 44 PID 2148 wrote to memory of 572 2148 {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe 44 PID 2148 wrote to memory of 572 2148 {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe 44 PID 2148 wrote to memory of 572 2148 {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe 44 PID 2148 wrote to memory of 1420 2148 {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe 45 PID 2148 wrote to memory of 1420 2148 {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe 45 PID 2148 wrote to memory of 1420 2148 {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe 45 PID 2148 wrote to memory of 1420 2148 {E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_0239b222ff451ce500b5844dbcf3b6aa_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\{00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exeC:\Windows\{00D8C740-64D2-4efc-AD59-D74E19B4C01C}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\{BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exeC:\Windows\{BCF4E44C-D4BA-46e2-BC39-3D966764C482}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\{D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exeC:\Windows\{D739C23F-A91A-442f-83C3-C06EA25CC3DD}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\{6E49EB20-32F7-4445-8547-32E98D0DD940}.exeC:\Windows\{6E49EB20-32F7-4445-8547-32E98D0DD940}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\{A432F9BB-B191-41b3-A86D-75A27C20422D}.exeC:\Windows\{A432F9BB-B191-41b3-A86D-75A27C20422D}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\{C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exeC:\Windows\{C14AEE91-BF49-4cf3-91CB-20BDF4A77C96}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\{E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exeC:\Windows\{E2795A8F-D7FD-4166-9A0C-DE942B6A51E8}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\{C66550AB-3C2E-4aab-8CFF-1E03AA483B07}.exeC:\Windows\{C66550AB-3C2E-4aab-8CFF-1E03AA483B07}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:572 -
C:\Windows\{45A89A2A-A1EC-46ac-8939-14C988868A0E}.exeC:\Windows\{45A89A2A-A1EC-46ac-8939-14C988868A0E}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Windows\{DD021573-3543-42e5-9504-21074BD492CC}.exeC:\Windows\{DD021573-3543-42e5-9504-21074BD492CC}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\{25FAE468-BDE8-4d83-B29D-50F7DF4FDB1F}.exeC:\Windows\{25FAE468-BDE8-4d83-B29D-50F7DF4FDB1F}.exe12⤵
- Executes dropped EXE
PID:2236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DD021~1.EXE > nul12⤵PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{45A89~1.EXE > nul11⤵PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C6655~1.EXE > nul10⤵PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E2795~1.EXE > nul9⤵PID:1420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C14AE~1.EXE > nul8⤵PID:284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A432F~1.EXE > nul7⤵PID:1600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E49E~1.EXE > nul6⤵PID:532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D739C~1.EXE > nul5⤵PID:672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BCF4E~1.EXE > nul4⤵PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{00D8C~1.EXE > nul3⤵PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5dabd8b0aa752bafed011ddd2a7877d1f
SHA11f18c2954b0f76508d0f5a3ab542e3a61997b1af
SHA256e7ea11ca0a08117267cd135d559ec3def25155b68de0f40e2ee4c4ce4ae135ab
SHA5127c893a7d01cad2e1844835373334b51e791d295f9455578affa8d478ef80579bf79bc6a3f42b70a8659f02351eea1b2a75287549fc6b97521a30443085669174
-
Filesize
408KB
MD59fdccb17a8c37d1e1bdf77d0dde2ca52
SHA128f1455597aba49680ee564e526ee0175e620365
SHA25684b6424b2ddff6a4d35fad3baa1dde638c42602ad0d16c7020e591a19c9959ed
SHA512c78ea263c4d80d9d36e731f399044ec078c7ed7712435ad27f8d7cd8682df4f1ad68d02cceb650726577991cc080be32cdbbdd687e356f5db9521c2d731e9b5d
-
Filesize
408KB
MD57e324e46b2710382f2704a8e5f2ee5d3
SHA18e256feaafdbf85d74e88bba29923b831ff1951d
SHA25635e9c19584022981c37cd8435aa6cb433456738e733d7562819578ad46ac11aa
SHA5125d752be6a51f8334f44c54ae3c943f2c919bcec8f815c8cc7d60e77f92728668175c1e0fff392b341c7ebfa46b30af5a3011109690c3d332464e74c1ccd4f8f7
-
Filesize
408KB
MD5cbf450f1871294ec35d6c73c6ee9d2b5
SHA186c19c77f94b330f7747eef6aa4304b5f87d027a
SHA2564260a9bb8ad2ee2ddc7dda0d8fc86f72e22c22761df2cec4b023107e6b27f98c
SHA5125e0f6eb99d01fabf3cd13a925b7a6fe16cb154794d57f9e631f6a4cd5f8de2cdbc9f2100aa57cb71c29bf0a8ead5a7b5d7f0aacf9ad8ea0362ec2ee628af074b
-
Filesize
408KB
MD5f94650eb47c608c6c8be8382b15a3ca7
SHA12d490726bfe7e535e4999ed3433c5d1ea99c9f4e
SHA256d612262277e121b6a810083c896e82d5aa3872ed2fc046d91886b66e02683b5d
SHA5123dca391eb92a530cf673db3f9be5e0e5096404f905dc517a2c52db1790c3e843017a02e7fdf3920c14a388291b5382fd93c47744624570a85f640158d25de26f
-
Filesize
408KB
MD591b2bd09f1b6cce683b91d7cd3e842d9
SHA115b51972c978304b95fddf8f011d8f71be56bd7d
SHA25640ac57966e7fba120b75410183f86802eeebff27a521d51af4aa0b48ca57f775
SHA512677f8a8a662488fd3c47a696d831826b4919a3c0eb229eb3a73bb9c46ba70841944b0419b6466fc6fa0df57c2f62dcbcd11e648d2f695d971e82bdea3c92134b
-
Filesize
408KB
MD5ec1e5359599e538c5bb1279bc25f6c7d
SHA1c11f266d412a616ec6c2e3229e314abf467efc5f
SHA256313258128a504d172e5b01e99a9c9dde52072aa85cd2d706ef4190daf51f685c
SHA512fb9e750f4af365c8b7d10a48068346af1ad285ee98ba0309a8cb27d8082b4ead1332299ef2d6f5149f8e5cc52b79f564e0056f947585cc7fb9c8cf01a200f8a9
-
Filesize
408KB
MD54a3b74a3dabb86777d626509d8d41641
SHA1e6fd4fd256cc2e3d49d21de27f95930fd0c4e430
SHA2569a5cec6302edbc1696380dbb0c8f32d3889730c56bf9fa5989918c3733e07848
SHA512f8489f420cd0b8ccfa88db399461fd3ffa14b6e6f3b72f34e97680ad31be6c3e45207dc0cff33c9af41351503f96da0f7b574e65e3c81de2386aae5865c4e44b
-
Filesize
408KB
MD57620719e84dc7ee41408baf4824922e5
SHA195175c210440cb4f41b5114de5868179af17a5f5
SHA2565a7f8d01f17a2d1d4c4a9720adcb570645528b017ab45e5a3a31e220532426c5
SHA51260c2ba9a66541472e393aeceb9c7a01f157708a5c9a7b3ecfd656df3478f554fc231ac1a8ee6b91f81d53c2244e4741c536bc60739086fc447c9e4576b40a74c
-
Filesize
408KB
MD54ceb2f238d5542a649c21dd217ff1af0
SHA1bd1329f44c60f9e8c5ff4624f0e6a9e07abfcd9c
SHA2564acb44ea075112c85e68e27ea03a05f85cc534fde9a6657b62dba71b479c9b25
SHA512946318902646bb5faf04ebe728ffb10565d6f87bd186e13e5b05961f93550ce7913acaaec7781cbf278adfd857daa88b63bdd4c20df51a716e114208f47947d2
-
Filesize
408KB
MD52b06abd970745d1971c465b532b9e7bb
SHA168c80e1c4b8c630c91809099eda155bc834be8ca
SHA256a3569fa163fad2278e2c798a8a7d7c4cefbf7d19360505ce941afd056a64dfd7
SHA51261337b9f701ba4643325e665cd0d20cffa0ce2c2d2374bd4517494891f99e0aa421e724a83c0cce34ec355263fd976f0167efcefc54db35faa0257635d42989d