Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe
-
Size
344KB
-
MD5
eff4b2dcbf3e8f535b61d89accd95b8f
-
SHA1
5d383a00d93a35b5fddd76cfd8ef9c7357c2a325
-
SHA256
1df90f64895d9f0020d3ef992528063bc33c983c9cf656f6c35d6cec7e7b5f12
-
SHA512
0e25379a9a955acab0e0df4449d5345675f19ed2012d98cef359a8c1f20db318336552328b9af970f97ee7efc6d5e7bfc6cd86d4c61cc66c2719e5d5ec0f0e92
-
SSDEEP
3072:mEGh0oVlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG/lqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000d00000001225b-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00040000000130fc-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0033000000015c00-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00050000000130fc-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00060000000130fc-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00070000000130fc-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00080000000130fc-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{412147EB-A64C-4f39-8849-9F9CF5992080}\stubpath = "C:\\Windows\\{412147EB-A64C-4f39-8849-9F9CF5992080}.exe" {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{73AA0BA0-B32D-4160-9390-418E0AD0AAD7}\stubpath = "C:\\Windows\\{73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe" {12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{69261703-382D-4eab-A788-EC18E9A98C93} {73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{973B0962-4C59-4188-A539-E73B416B6F30}\stubpath = "C:\\Windows\\{973B0962-4C59-4188-A539-E73B416B6F30}.exe" {69261703-382D-4eab-A788-EC18E9A98C93}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B855263-4FF8-4174-BC4D-F6475EFF088E} {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A88C5145-94D8-42e8-88F6-49AD88F1986C}\stubpath = "C:\\Windows\\{A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe" {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12A3B659-3D5E-4388-92E1-41E7A37355A9} {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{973B0962-4C59-4188-A539-E73B416B6F30} {69261703-382D-4eab-A788-EC18E9A98C93}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{73AA0BA0-B32D-4160-9390-418E0AD0AAD7} {12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{69261703-382D-4eab-A788-EC18E9A98C93}\stubpath = "C:\\Windows\\{69261703-382D-4eab-A788-EC18E9A98C93}.exe" {73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DD7797DC-7858-41e1-92C7-BC1B777759CA}\stubpath = "C:\\Windows\\{DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe" 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B855263-4FF8-4174-BC4D-F6475EFF088E}\stubpath = "C:\\Windows\\{7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe" {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D52562C-9608-4f3f-B82F-97389FB6CD32} {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D52562C-9608-4f3f-B82F-97389FB6CD32}\stubpath = "C:\\Windows\\{5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe" {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A88C5145-94D8-42e8-88F6-49AD88F1986C} {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1AA70263-C6DB-4f4d-80AE-1D5263C453FA}\stubpath = "C:\\Windows\\{1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe" {412147EB-A64C-4f39-8849-9F9CF5992080}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12A3B659-3D5E-4388-92E1-41E7A37355A9}\stubpath = "C:\\Windows\\{12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe" {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DD7797DC-7858-41e1-92C7-BC1B777759CA} 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C3C66F9C-7C55-4ca0-B75B-709B658008FE} {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C3C66F9C-7C55-4ca0-B75B-709B658008FE}\stubpath = "C:\\Windows\\{C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe" {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{412147EB-A64C-4f39-8849-9F9CF5992080} {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1AA70263-C6DB-4f4d-80AE-1D5263C453FA} {412147EB-A64C-4f39-8849-9F9CF5992080}.exe -
Deletes itself 1 IoCs
pid Process 2552 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3024 {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe 2612 {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe 2488 {412147EB-A64C-4f39-8849-9F9CF5992080}.exe 2016 {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe 2696 {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe 272 {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe 1392 {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe 592 {12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe 1228 {73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe 3000 {69261703-382D-4eab-A788-EC18E9A98C93}.exe 2960 {973B0962-4C59-4188-A539-E73B416B6F30}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe File created C:\Windows\{73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe {12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe File created C:\Windows\{69261703-382D-4eab-A788-EC18E9A98C93}.exe {73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe File created C:\Windows\{973B0962-4C59-4188-A539-E73B416B6F30}.exe {69261703-382D-4eab-A788-EC18E9A98C93}.exe File created C:\Windows\{DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe File created C:\Windows\{C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe File created C:\Windows\{412147EB-A64C-4f39-8849-9F9CF5992080}.exe {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe File created C:\Windows\{12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe File created C:\Windows\{1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe {412147EB-A64C-4f39-8849-9F9CF5992080}.exe File created C:\Windows\{7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe File created C:\Windows\{A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2332 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe Token: SeIncBasePriorityPrivilege 3024 {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe Token: SeIncBasePriorityPrivilege 2612 {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe Token: SeIncBasePriorityPrivilege 2488 {412147EB-A64C-4f39-8849-9F9CF5992080}.exe Token: SeIncBasePriorityPrivilege 2016 {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe Token: SeIncBasePriorityPrivilege 2696 {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe Token: SeIncBasePriorityPrivilege 272 {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe Token: SeIncBasePriorityPrivilege 1392 {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe Token: SeIncBasePriorityPrivilege 592 {12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe Token: SeIncBasePriorityPrivilege 1228 {73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe Token: SeIncBasePriorityPrivilege 3000 {69261703-382D-4eab-A788-EC18E9A98C93}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3024 2332 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe 28 PID 2332 wrote to memory of 3024 2332 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe 28 PID 2332 wrote to memory of 3024 2332 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe 28 PID 2332 wrote to memory of 3024 2332 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe 28 PID 2332 wrote to memory of 2552 2332 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe 29 PID 2332 wrote to memory of 2552 2332 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe 29 PID 2332 wrote to memory of 2552 2332 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe 29 PID 2332 wrote to memory of 2552 2332 2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe 29 PID 3024 wrote to memory of 2612 3024 {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe 30 PID 3024 wrote to memory of 2612 3024 {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe 30 PID 3024 wrote to memory of 2612 3024 {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe 30 PID 3024 wrote to memory of 2612 3024 {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe 30 PID 3024 wrote to memory of 2596 3024 {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe 31 PID 3024 wrote to memory of 2596 3024 {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe 31 PID 3024 wrote to memory of 2596 3024 {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe 31 PID 3024 wrote to memory of 2596 3024 {DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe 31 PID 2612 wrote to memory of 2488 2612 {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe 34 PID 2612 wrote to memory of 2488 2612 {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe 34 PID 2612 wrote to memory of 2488 2612 {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe 34 PID 2612 wrote to memory of 2488 2612 {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe 34 PID 2612 wrote to memory of 2904 2612 {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe 35 PID 2612 wrote to memory of 2904 2612 {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe 35 PID 2612 wrote to memory of 2904 2612 {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe 35 PID 2612 wrote to memory of 2904 2612 {C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe 35 PID 2488 wrote to memory of 2016 2488 {412147EB-A64C-4f39-8849-9F9CF5992080}.exe 36 PID 2488 wrote to memory of 2016 2488 {412147EB-A64C-4f39-8849-9F9CF5992080}.exe 36 PID 2488 wrote to memory of 2016 2488 {412147EB-A64C-4f39-8849-9F9CF5992080}.exe 36 PID 2488 wrote to memory of 2016 2488 {412147EB-A64C-4f39-8849-9F9CF5992080}.exe 36 PID 2488 wrote to memory of 2724 2488 {412147EB-A64C-4f39-8849-9F9CF5992080}.exe 37 PID 2488 wrote to memory of 2724 2488 {412147EB-A64C-4f39-8849-9F9CF5992080}.exe 37 PID 2488 wrote to memory of 2724 2488 {412147EB-A64C-4f39-8849-9F9CF5992080}.exe 37 PID 2488 wrote to memory of 2724 2488 {412147EB-A64C-4f39-8849-9F9CF5992080}.exe 37 PID 2016 wrote to memory of 2696 2016 {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe 38 PID 2016 wrote to memory of 2696 2016 {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe 38 PID 2016 wrote to memory of 2696 2016 {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe 38 PID 2016 wrote to memory of 2696 2016 {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe 38 PID 2016 wrote to memory of 704 2016 {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe 39 PID 2016 wrote to memory of 704 2016 {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe 39 PID 2016 wrote to memory of 704 2016 {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe 39 PID 2016 wrote to memory of 704 2016 {1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe 39 PID 2696 wrote to memory of 272 2696 {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe 40 PID 2696 wrote to memory of 272 2696 {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe 40 PID 2696 wrote to memory of 272 2696 {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe 40 PID 2696 wrote to memory of 272 2696 {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe 40 PID 2696 wrote to memory of 1376 2696 {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe 41 PID 2696 wrote to memory of 1376 2696 {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe 41 PID 2696 wrote to memory of 1376 2696 {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe 41 PID 2696 wrote to memory of 1376 2696 {7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe 41 PID 272 wrote to memory of 1392 272 {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe 42 PID 272 wrote to memory of 1392 272 {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe 42 PID 272 wrote to memory of 1392 272 {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe 42 PID 272 wrote to memory of 1392 272 {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe 42 PID 272 wrote to memory of 312 272 {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe 43 PID 272 wrote to memory of 312 272 {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe 43 PID 272 wrote to memory of 312 272 {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe 43 PID 272 wrote to memory of 312 272 {5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe 43 PID 1392 wrote to memory of 592 1392 {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe 44 PID 1392 wrote to memory of 592 1392 {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe 44 PID 1392 wrote to memory of 592 1392 {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe 44 PID 1392 wrote to memory of 592 1392 {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe 44 PID 1392 wrote to memory of 2704 1392 {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe 45 PID 1392 wrote to memory of 2704 1392 {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe 45 PID 1392 wrote to memory of 2704 1392 {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe 45 PID 1392 wrote to memory of 2704 1392 {A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\{DD7797DC-7858-41e1-92C7-BC1B777759CA}.exeC:\Windows\{DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exeC:\Windows\{C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\{412147EB-A64C-4f39-8849-9F9CF5992080}.exeC:\Windows\{412147EB-A64C-4f39-8849-9F9CF5992080}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\{1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exeC:\Windows\{1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\{7B855263-4FF8-4174-BC4D-F6475EFF088E}.exeC:\Windows\{7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\{5D52562C-9608-4f3f-B82F-97389FB6CD32}.exeC:\Windows\{5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\{A88C5145-94D8-42e8-88F6-49AD88F1986C}.exeC:\Windows\{A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\{12A3B659-3D5E-4388-92E1-41E7A37355A9}.exeC:\Windows\{12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:592 -
C:\Windows\{73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exeC:\Windows\{73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1228 -
C:\Windows\{69261703-382D-4eab-A788-EC18E9A98C93}.exeC:\Windows\{69261703-382D-4eab-A788-EC18E9A98C93}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3000 -
C:\Windows\{973B0962-4C59-4188-A539-E73B416B6F30}.exeC:\Windows\{973B0962-4C59-4188-A539-E73B416B6F30}.exe12⤵
- Executes dropped EXE
PID:2960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69261~1.EXE > nul12⤵PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{73AA0~1.EXE > nul11⤵PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{12A3B~1.EXE > nul10⤵PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A88C5~1.EXE > nul9⤵PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D525~1.EXE > nul8⤵PID:312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7B855~1.EXE > nul7⤵PID:1376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1AA70~1.EXE > nul6⤵PID:704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41214~1.EXE > nul5⤵PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C3C66~1.EXE > nul4⤵PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DD779~1.EXE > nul3⤵PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD54827956b85dbbb27919ad2fb2ec58382
SHA1ff3756557c4ca5200629939e96caedb72fed9d20
SHA256a4e9e9ec12bc188bf5c26fa4000c85edf614b97a0433fde66f81f0be4aa56d6e
SHA512baa140640777f10df49c9676780ad8661693b2be1a661d889f071b2897a72a5f88a6b3da46b2a895604594f052fd677d1a7f952dc8de97fa96d10a75a7fb9482
-
Filesize
344KB
MD5badd2c0b29856aca4401211c01ba11aa
SHA1469ffe9b6806bd3985527f68209a04cd66ddb1fe
SHA256968c58213169c1a4df78da8c95196ed727ec71f08248cf851d03365bf9ff4914
SHA512f349ad6df305f894ca3837698846b47bde814c12d447c33b5c4eaaf956c2f76dd2fd1ccfc968a1a1cadbd1687beb37a3f0af0d942921a0d3081d5d164e304d18
-
Filesize
344KB
MD55e5763095e3ad91c12f7a8ac89bacf2e
SHA1a60d0b10f45457c086e9e809b1b41489eda2b606
SHA25609354d9f548026c6944e490f497aac82038bf295c8666105a5f40f14d0f88a4a
SHA512fa9d5310181c10979ba6e5daf816f595620ff8a5ca34168eff7c0818c03725343329b4a8039369d18a9830b4db1c2a4b5b24ad2792deeb1847d8ec520f20529f
-
Filesize
344KB
MD5a196597ffc2f496038164145fa65a764
SHA1bb1fde65f451ea0daada2056a47cc7ec556d1fe1
SHA256374e6cb1949551522ea7dabba2990957334227ee626e41055506d973221649bf
SHA512aa3deb2cf04d5dfa5cfc468502e8d53e957a4f180bd618faf480534ce833660ca26a1f409d1d7c3146a61760216a543e68a2ce8ea5508a11458ba08df0d32bc7
-
Filesize
344KB
MD57aff5dc62a471c59aebff3f660f2bf19
SHA1910d77a282a5396e4dd559f9c5e6091c62dcfd53
SHA256ac7f6325c3d9131ce41597f1998186a0ccabb02dedced6029166f024eca6a36a
SHA5129c10ae2e745e2d0d4c857fc6c5b32a86d43c4e79007543bda939dc227badaff29b0e24f693528e448f2bb346ee5cce41278f39903b354f851e28df5e67c4b6f2
-
Filesize
344KB
MD5d1cf20c2ac09ba937154be42af828709
SHA1441f19d0ec49087b57a88230d6c42c0460d7e4b7
SHA25691a9a2352f2fd80fa4b2b41c3f73b0c64ddf84f713470c281716e524dd89f99e
SHA5124576681a33c5ce9a825998e8687cc7214b7f1a55b497ec0da554f165b55ae0305da10d03768d43ed52effb588624a87b87180938d22ecbb390b6910968253595
-
Filesize
344KB
MD53d62d8533c765c7b48fc281223c2adcf
SHA19dda31f312a3fa26e8a9e8a4f2aafbffa8500ca9
SHA256170252f3a73a4ba5fedf17623f715a75784c6b374d7ffc5e85471c99a3c378b6
SHA512565bfd21d56e1a8b4a664e334181f0d90896bffbc52c9c89dacd58979fbea07d6b1ed9a2a800d47ff8273d92bc7921627013399d85377fa26e7516950ebf1a6b
-
Filesize
344KB
MD5c3277e0a8ea38c6bd9d7f2b0110bdd54
SHA1e649999462e2713dc17f4d997b63331807a209fa
SHA256d5e7e7c5e0d7cc224f69eab5514365c1b53b714f962d163e659f1327943b5c65
SHA512d07e5acaf13c6f00dc5510c31ef15ae51755a051431f853d5aa1cae1db892628f798d578b2afb7984cc56313df883e92c7387c146cd38009749190dfd3191ea7
-
Filesize
344KB
MD547d7b4737c2f11e4f8ce4866d55ef622
SHA1dd5ecc0d72ea50805326817830a7ffde25c0f395
SHA256ffd12ffcb08539e240dc8cfc86f857f6314224f8dd4963913730abc3a742012c
SHA5126fd53e07bba0433c7cb3acc96a89ea1757a99cc339c50bfbd26a0a7507dbf60a1aed459e6d5e95a5418c6b77a408f770fca310eecca3c82699d7e95d379902d5
-
Filesize
344KB
MD55fc41d95ecd4ed8570ce79aa3c490711
SHA159db324cddd67fc604ef458a3e81cbfa5e026b2a
SHA2563732fcd2ecbd897288339d06f62c65bd1e3101ead02bcfcb436c134916344e44
SHA5126716ab424df1887c7b56a60d0d1e44a79715b0db53fd65abb8a721b159b91d695621a03b6f2a56772857bd53344a98313f243031ac3425e732a47bebd866ee42
-
Filesize
344KB
MD56ce10f035398f635e832a447d3be49b3
SHA13ba03a9ab914708d32a9d4a60f663b9f0bef82c9
SHA256b2fb8ec8792bc1269a5975f12dc467b5fafc2457e0b0fd6764c206da80995809
SHA51248659cea6c3a8ca97b1995cb31228ad8273fd0fd712eb417971fdc143bd2068e431f1359e1e659710bf1ad0023c1082a183b91c820bb4be10e88a33b3409126c