Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe
-
Size
408KB
-
MD5
ef5175dae48b2d844e19da082ae65980
-
SHA1
3a0f186b58fe79478cb3c9d3753ee7cf97d25fd2
-
SHA256
d50a6a7f742cec3861fdfd0f55ff62c0327050e441dc34768ab2e452912789e6
-
SHA512
01c1e656e11e5ebba9da934b0dc9fb6728739993fe189ab70b697f684239068db89f927814f558f599fcf0845120d681ee0cb72a149bb45bff27dcf875c0eee8
-
SSDEEP
3072:CEGh0okl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGOldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x00090000000122bf-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001416a-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a0000000122bf-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0033000000015cb0-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b0000000122bf-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c0000000122bf-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000122bf-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9D8AFF88-1D4B-47c6-9841-975A9200DD64} 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6410935F-C2BD-4497-B0E0-CE5516886C1A}\stubpath = "C:\\Windows\\{6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe" {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0988DD22-EFE2-479b-AEC8-B76DB234E0BC}\stubpath = "C:\\Windows\\{0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe" {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F95C682-60C3-4848-9D8F-9C150367BD11} {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F3EE1EA-7124-40bc-BB74-C18C17265608} {26A83170-77AD-4006-8AF5-CA2C29FF9408}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26A83170-77AD-4006-8AF5-CA2C29FF9408} {6F95C682-60C3-4848-9D8F-9C150367BD11}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}\stubpath = "C:\\Windows\\{24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe" {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0988DD22-EFE2-479b-AEC8-B76DB234E0BC} {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6B82A44B-1EF2-4672-92BD-1524A32E3D23}\stubpath = "C:\\Windows\\{6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe" {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A28D42FF-FC4B-4eba-A6DE-10CB78331452} {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{696BF9C9-5520-4138-BCD4-A81B2F4FDCB1} {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6410935F-C2BD-4497-B0E0-CE5516886C1A} {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45} {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2BA0CB4F-FCAA-44cc-92F4-48148804E91F}\stubpath = "C:\\Windows\\{2BA0CB4F-FCAA-44cc-92F4-48148804E91F}.exe" {0F3EE1EA-7124-40bc-BB74-C18C17265608}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26A83170-77AD-4006-8AF5-CA2C29FF9408}\stubpath = "C:\\Windows\\{26A83170-77AD-4006-8AF5-CA2C29FF9408}.exe" {6F95C682-60C3-4848-9D8F-9C150367BD11}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F3EE1EA-7124-40bc-BB74-C18C17265608}\stubpath = "C:\\Windows\\{0F3EE1EA-7124-40bc-BB74-C18C17265608}.exe" {26A83170-77AD-4006-8AF5-CA2C29FF9408}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2BA0CB4F-FCAA-44cc-92F4-48148804E91F} {0F3EE1EA-7124-40bc-BB74-C18C17265608}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9D8AFF88-1D4B-47c6-9841-975A9200DD64}\stubpath = "C:\\Windows\\{9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe" 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6B82A44B-1EF2-4672-92BD-1524A32E3D23} {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A28D42FF-FC4B-4eba-A6DE-10CB78331452}\stubpath = "C:\\Windows\\{A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe" {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}\stubpath = "C:\\Windows\\{696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe" {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F95C682-60C3-4848-9D8F-9C150367BD11}\stubpath = "C:\\Windows\\{6F95C682-60C3-4848-9D8F-9C150367BD11}.exe" {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe -
Deletes itself 1 IoCs
pid Process 3060 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2856 {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe 2636 {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe 2440 {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe 2584 {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe 1640 {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe 1820 {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe 812 {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe 1660 {6F95C682-60C3-4848-9D8F-9C150367BD11}.exe 2812 {26A83170-77AD-4006-8AF5-CA2C29FF9408}.exe 2768 {0F3EE1EA-7124-40bc-BB74-C18C17265608}.exe 1108 {2BA0CB4F-FCAA-44cc-92F4-48148804E91F}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe File created C:\Windows\{0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe File created C:\Windows\{6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe File created C:\Windows\{6F95C682-60C3-4848-9D8F-9C150367BD11}.exe {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe File created C:\Windows\{26A83170-77AD-4006-8AF5-CA2C29FF9408}.exe {6F95C682-60C3-4848-9D8F-9C150367BD11}.exe File created C:\Windows\{0F3EE1EA-7124-40bc-BB74-C18C17265608}.exe {26A83170-77AD-4006-8AF5-CA2C29FF9408}.exe File created C:\Windows\{9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe File created C:\Windows\{24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe File created C:\Windows\{A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe File created C:\Windows\{696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe File created C:\Windows\{2BA0CB4F-FCAA-44cc-92F4-48148804E91F}.exe {0F3EE1EA-7124-40bc-BB74-C18C17265608}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2268 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe Token: SeIncBasePriorityPrivilege 2856 {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe Token: SeIncBasePriorityPrivilege 2636 {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe Token: SeIncBasePriorityPrivilege 2440 {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe Token: SeIncBasePriorityPrivilege 2584 {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe Token: SeIncBasePriorityPrivilege 1640 {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe Token: SeIncBasePriorityPrivilege 1820 {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe Token: SeIncBasePriorityPrivilege 812 {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe Token: SeIncBasePriorityPrivilege 1660 {6F95C682-60C3-4848-9D8F-9C150367BD11}.exe Token: SeIncBasePriorityPrivilege 2812 {26A83170-77AD-4006-8AF5-CA2C29FF9408}.exe Token: SeIncBasePriorityPrivilege 2768 {0F3EE1EA-7124-40bc-BB74-C18C17265608}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2856 2268 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe 28 PID 2268 wrote to memory of 2856 2268 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe 28 PID 2268 wrote to memory of 2856 2268 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe 28 PID 2268 wrote to memory of 2856 2268 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe 28 PID 2268 wrote to memory of 3060 2268 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe 29 PID 2268 wrote to memory of 3060 2268 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe 29 PID 2268 wrote to memory of 3060 2268 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe 29 PID 2268 wrote to memory of 3060 2268 2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe 29 PID 2856 wrote to memory of 2636 2856 {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe 30 PID 2856 wrote to memory of 2636 2856 {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe 30 PID 2856 wrote to memory of 2636 2856 {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe 30 PID 2856 wrote to memory of 2636 2856 {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe 30 PID 2856 wrote to memory of 2540 2856 {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe 31 PID 2856 wrote to memory of 2540 2856 {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe 31 PID 2856 wrote to memory of 2540 2856 {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe 31 PID 2856 wrote to memory of 2540 2856 {9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe 31 PID 2636 wrote to memory of 2440 2636 {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe 32 PID 2636 wrote to memory of 2440 2636 {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe 32 PID 2636 wrote to memory of 2440 2636 {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe 32 PID 2636 wrote to memory of 2440 2636 {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe 32 PID 2636 wrote to memory of 2452 2636 {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe 33 PID 2636 wrote to memory of 2452 2636 {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe 33 PID 2636 wrote to memory of 2452 2636 {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe 33 PID 2636 wrote to memory of 2452 2636 {6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe 33 PID 2440 wrote to memory of 2584 2440 {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe 36 PID 2440 wrote to memory of 2584 2440 {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe 36 PID 2440 wrote to memory of 2584 2440 {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe 36 PID 2440 wrote to memory of 2584 2440 {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe 36 PID 2440 wrote to memory of 2340 2440 {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe 37 PID 2440 wrote to memory of 2340 2440 {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe 37 PID 2440 wrote to memory of 2340 2440 {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe 37 PID 2440 wrote to memory of 2340 2440 {24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe 37 PID 2584 wrote to memory of 1640 2584 {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe 38 PID 2584 wrote to memory of 1640 2584 {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe 38 PID 2584 wrote to memory of 1640 2584 {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe 38 PID 2584 wrote to memory of 1640 2584 {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe 38 PID 2584 wrote to memory of 1436 2584 {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe 39 PID 2584 wrote to memory of 1436 2584 {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe 39 PID 2584 wrote to memory of 1436 2584 {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe 39 PID 2584 wrote to memory of 1436 2584 {0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe 39 PID 1640 wrote to memory of 1820 1640 {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe 40 PID 1640 wrote to memory of 1820 1640 {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe 40 PID 1640 wrote to memory of 1820 1640 {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe 40 PID 1640 wrote to memory of 1820 1640 {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe 40 PID 1640 wrote to memory of 2100 1640 {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe 41 PID 1640 wrote to memory of 2100 1640 {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe 41 PID 1640 wrote to memory of 2100 1640 {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe 41 PID 1640 wrote to memory of 2100 1640 {6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe 41 PID 1820 wrote to memory of 812 1820 {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe 42 PID 1820 wrote to memory of 812 1820 {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe 42 PID 1820 wrote to memory of 812 1820 {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe 42 PID 1820 wrote to memory of 812 1820 {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe 42 PID 1820 wrote to memory of 1928 1820 {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe 43 PID 1820 wrote to memory of 1928 1820 {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe 43 PID 1820 wrote to memory of 1928 1820 {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe 43 PID 1820 wrote to memory of 1928 1820 {A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe 43 PID 812 wrote to memory of 1660 812 {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe 44 PID 812 wrote to memory of 1660 812 {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe 44 PID 812 wrote to memory of 1660 812 {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe 44 PID 812 wrote to memory of 1660 812 {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe 44 PID 812 wrote to memory of 1404 812 {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe 45 PID 812 wrote to memory of 1404 812 {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe 45 PID 812 wrote to memory of 1404 812 {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe 45 PID 812 wrote to memory of 1404 812 {696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_ef5175dae48b2d844e19da082ae65980_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\{9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exeC:\Windows\{9D8AFF88-1D4B-47c6-9841-975A9200DD64}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\{6410935F-C2BD-4497-B0E0-CE5516886C1A}.exeC:\Windows\{6410935F-C2BD-4497-B0E0-CE5516886C1A}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\{24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exeC:\Windows\{24B68AA5-8D8F-4dce-99E5-A2B9A7ED0C45}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\{0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exeC:\Windows\{0988DD22-EFE2-479b-AEC8-B76DB234E0BC}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\{6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exeC:\Windows\{6B82A44B-1EF2-4672-92BD-1524A32E3D23}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\{A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exeC:\Windows\{A28D42FF-FC4B-4eba-A6DE-10CB78331452}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\{696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exeC:\Windows\{696BF9C9-5520-4138-BCD4-A81B2F4FDCB1}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\{6F95C682-60C3-4848-9D8F-9C150367BD11}.exeC:\Windows\{6F95C682-60C3-4848-9D8F-9C150367BD11}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1660 -
C:\Windows\{26A83170-77AD-4006-8AF5-CA2C29FF9408}.exeC:\Windows\{26A83170-77AD-4006-8AF5-CA2C29FF9408}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2812 -
C:\Windows\{0F3EE1EA-7124-40bc-BB74-C18C17265608}.exeC:\Windows\{0F3EE1EA-7124-40bc-BB74-C18C17265608}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Windows\{2BA0CB4F-FCAA-44cc-92F4-48148804E91F}.exeC:\Windows\{2BA0CB4F-FCAA-44cc-92F4-48148804E91F}.exe12⤵
- Executes dropped EXE
PID:1108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0F3EE~1.EXE > nul12⤵PID:948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26A83~1.EXE > nul11⤵PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6F95C~1.EXE > nul10⤵PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{696BF~1.EXE > nul9⤵PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A28D4~1.EXE > nul8⤵PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6B82A~1.EXE > nul7⤵PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0988D~1.EXE > nul6⤵PID:1436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{24B68~1.EXE > nul5⤵PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{64109~1.EXE > nul4⤵PID:2452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9D8AF~1.EXE > nul3⤵PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD51fc0d6b42467607fcc76668ab78a2837
SHA15724c63c34a4e9cb677aca7927dcc3a8d12944ca
SHA256d2903cb654c40c02ffb8773bd4dd92822677644219569ac0a00c9f681c7c345e
SHA512c8340e82435ed0287e75f8c4ab9cfd204b83834af5d46aba8aab1a1a5f46fb8eb348452a3fe4f7d7a3bd062778317ad87ffed6beee8960d88376a12042c184f7
-
Filesize
408KB
MD5522ca6c6ecc6226e58f64ba397851884
SHA1bc8e604c5c79ab789c551cb2da2e2b759a31328f
SHA2562364dccd47435e1d21bce7ef41dd9973b8da948865f28a6358273e7df2a32925
SHA512da694178a04cf8ff54f864c0a499ac962c0598fa85511787389afa21b0a7c74fcecb9715ba4a1150ed5a538d08cc098296e78f02af5c64faf7cfd835149801d5
-
Filesize
408KB
MD56572c28bc63f37a4092916f92690cdbf
SHA17a6af1774a9a554396d524b804aec1c54ad4bf1d
SHA256549844be940e6db411f34ab91be2501c7849d1592bd2f1808c5e85cd2ccfbd47
SHA512007a728579a9ceb862a27a18da69a3b5cea35ab101a8d26feb51f03c566d05394aeee3349fb1872d6982e33a7b337159e646a00b5bde6d06b3d3fdba4ef05a91
-
Filesize
408KB
MD5e1284f5b408a357a956485cdeb669f62
SHA17332c9fffa001f9728e9cc09c3e8761c9bf8ba55
SHA2564169832de3ce0e00915565cda958ee3ec25efb922891de9fa30e867c346ccdb0
SHA512e777c7d438650693707d1a3a1e3a2a08899872cb4921f72c6dd6e45013d9f96d4f7bf34529b00f99f261c8cbbcf80d380e285f34cddeb0275e9e4072d0bc718e
-
Filesize
408KB
MD55d4e9015cfb6df5b6625c4ef5d458a4a
SHA165ec84da16103efc084006fb706354836c8f2979
SHA256d5b65572cc8109f4ad2cbf88dd213f5ab6227cdae57db1e43aa3d3ca3c8370e2
SHA512d37ed712fffd40c15ed0862e9672dc3105dfd057792b8ad498f7e2da275f1e59311d69ca6f4ce41e51e16c6aae431560931b6d38c590f03fdd246ccb33a56115
-
Filesize
408KB
MD5d751e9acf1341fff949a48c869e3fc49
SHA1c5ee269fb00294c42e11409a8fd1defab5011f52
SHA256974b978e8710b3ed5f7accfd98a90d26811c037b7c1855593c1e7861a6a0daf2
SHA512e63e81136ddca916d00d9b3ddfa387d11e7f69761d7a0e99daf658309ed278d354134dc6d5c4de38f1f68a07c0e9a9b6f256e4bdc1f1545a188b9d3280c1f41d
-
Filesize
408KB
MD5dd9af1cc045ac5b770a5b3ba1212394d
SHA1ca4f44c161c4143432b94f60221407fb264e8eef
SHA256e2af470429241b7a4007afb6aaa524e92b9dd378f83702e40ea7267f56eec58c
SHA512b59d67200c44b1140b848f12a944b883fe5cd0492cb71c3e9fb698fb531a977b7b293a858790bff071d73fb481cfb2c6cf400aefa80ceef48a8ba8df0fb5830f
-
Filesize
408KB
MD5cc5b9d8d7d36be5c8e5e5fd3a486728e
SHA137495189636b098a1d8ecc261801a2d92e86937f
SHA256434de6b8581c5179faa8278f00eb8fecc18253dddb8535b9cacded7ea46a3964
SHA512a7d736eb7f5a1d29291391d4964826722a28de172694bd289a8949d201639e19e3cb976f7f5a5985b960c4a8adfef7ceff277815f031efe3f1a7ab25c703490a
-
Filesize
408KB
MD56336f07924b19a754173e8fdf688c689
SHA197a9753d4323ba7ad008c8901d3779601d969ddc
SHA2566ced9445bb983ebbddc5033257089f0bf31a53cc4d718e8276928bd79180b394
SHA512498386e8a11fdda82ed96b1a55ab5e7160e71fc5fa75bb5a88e3b7c57ed1e83b83287f994ef122125e7b5a2dbe0c075be00efeb88f47b45e19a5f1295bebe704
-
Filesize
408KB
MD5b587714b8254f66bfb795178b03bea0e
SHA1c8dff1f63bdb26b9e1a9b901a9b07335db9830f9
SHA256609e652d433ed79374c6bf3f269805f7505af57fb92d758863fc6f763646dc77
SHA512e21e2137067b2617e335911c7e45b8c55aeade32beb8e6add1ac230cc525543693a886d5f9826771cbd464e09710b1e370e1a1a3de88c6cf35b90f24bd71553e
-
Filesize
408KB
MD57e8ba3db66b2cb30fba7ec19ad1fb67b
SHA142d021fb9c3fe6a4475f7432e868f9d5f92e65ec
SHA256eceddf0bab19060fc08a85ee909e2d1cfe86f3e4a2b23c6b0f944d78ddc31584
SHA5129074dd559978572d6062a91e957eabe23d8e27f359ea5dba9e461ee55f9fbaffd367a803c303015e8f72d073ba1a847d10450202cb5f3121ac72b335c4b0191a