Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe
-
Size
197KB
-
MD5
7aaeed50d8c3890d64899ce8cb751ca7
-
SHA1
2418ba5e39bdd410fcaecabcd82180c1490834d7
-
SHA256
a8700e332976214ae9012a6a0f4c1a8b5bd7549602629e282efb4c5c31106ef9
-
SHA512
ed22012e227b65e215f33a9442a9ad968fc1b8e378cd811dcf4eb618709d5ef353fc346d4cc9c31c6b045320328e2826e5a03f791b5879f25809e063f9b22e9d
-
SSDEEP
3072:jEGh0oIl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGOlEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000b000000013a06-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000015cff-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000013a06-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0038000000015d6b-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000013a06-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000013a06-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000013a06-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FB98EB5-CE81-4f99-B771-DC824DE48961} {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56F01383-9D3C-42c8-BB88-0804A9782370}\stubpath = "C:\\Windows\\{56F01383-9D3C-42c8-BB88-0804A9782370}.exe" {108C965C-9908-48b2-AD44-2108588F6956}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E38C8C63-6DAF-47c4-AF4B-4C66509C4E10}\stubpath = "C:\\Windows\\{E38C8C63-6DAF-47c4-AF4B-4C66509C4E10}.exe" {10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9373C8D-9D65-4a0c-9D3A-9DFB5598001F} 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FE63E818-B3C4-43e5-9E24-5EE5648A5FF9} {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}\stubpath = "C:\\Windows\\{FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe" {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7C13D2F9-FBC1-4ca4-9261-E625954A60EB}\stubpath = "C:\\Windows\\{7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe" {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE8E68F0-6844-486e-A1F0-75521A809ADE}\stubpath = "C:\\Windows\\{AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe" {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56F01383-9D3C-42c8-BB88-0804A9782370} {108C965C-9908-48b2-AD44-2108588F6956}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}\stubpath = "C:\\Windows\\{D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe" 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FB98EB5-CE81-4f99-B771-DC824DE48961}\stubpath = "C:\\Windows\\{0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe" {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E2BF719D-F8D6-4b98-A944-D9042A23E65D}\stubpath = "C:\\Windows\\{E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe" {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7C13D2F9-FBC1-4ca4-9261-E625954A60EB} {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{108C965C-9908-48b2-AD44-2108588F6956}\stubpath = "C:\\Windows\\{108C965C-9908-48b2-AD44-2108588F6956}.exe" {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10CE58B0-1727-44b8-A012-3AAD2B384A69}\stubpath = "C:\\Windows\\{10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe" {56F01383-9D3C-42c8-BB88-0804A9782370}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E38C8C63-6DAF-47c4-AF4B-4C66509C4E10} {10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E2BF719D-F8D6-4b98-A944-D9042A23E65D} {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE8E68F0-6844-486e-A1F0-75521A809ADE} {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{272AF77B-F6CA-413f-B921-8D62FCAAF115} {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{272AF77B-F6CA-413f-B921-8D62FCAAF115}\stubpath = "C:\\Windows\\{272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe" {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{108C965C-9908-48b2-AD44-2108588F6956} {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10CE58B0-1727-44b8-A012-3AAD2B384A69} {56F01383-9D3C-42c8-BB88-0804A9782370}.exe -
Executes dropped EXE 11 IoCs
pid Process 2136 {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe 2640 {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe 2596 {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe 2924 {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe 2792 {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe 2416 {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe 1440 {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe 2784 {108C965C-9908-48b2-AD44-2108588F6956}.exe 2332 {56F01383-9D3C-42c8-BB88-0804A9782370}.exe 2876 {10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe 1168 {E38C8C63-6DAF-47c4-AF4B-4C66509C4E10}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{56F01383-9D3C-42c8-BB88-0804A9782370}.exe {108C965C-9908-48b2-AD44-2108588F6956}.exe File created C:\Windows\{10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe {56F01383-9D3C-42c8-BB88-0804A9782370}.exe File created C:\Windows\{D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe File created C:\Windows\{0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe File created C:\Windows\{FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe File created C:\Windows\{AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe File created C:\Windows\{272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe File created C:\Windows\{108C965C-9908-48b2-AD44-2108588F6956}.exe {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe File created C:\Windows\{E38C8C63-6DAF-47c4-AF4B-4C66509C4E10}.exe {10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe File created C:\Windows\{E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe File created C:\Windows\{7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2844 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe Token: SeIncBasePriorityPrivilege 2136 {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe Token: SeIncBasePriorityPrivilege 2640 {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe Token: SeIncBasePriorityPrivilege 2596 {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe Token: SeIncBasePriorityPrivilege 2924 {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe Token: SeIncBasePriorityPrivilege 2792 {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe Token: SeIncBasePriorityPrivilege 2416 {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe Token: SeIncBasePriorityPrivilege 1440 {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe Token: SeIncBasePriorityPrivilege 2784 {108C965C-9908-48b2-AD44-2108588F6956}.exe Token: SeIncBasePriorityPrivilege 2332 {56F01383-9D3C-42c8-BB88-0804A9782370}.exe Token: SeIncBasePriorityPrivilege 2876 {10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2136 2844 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe 28 PID 2844 wrote to memory of 2136 2844 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe 28 PID 2844 wrote to memory of 2136 2844 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe 28 PID 2844 wrote to memory of 2136 2844 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe 28 PID 2844 wrote to memory of 2732 2844 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe 29 PID 2844 wrote to memory of 2732 2844 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe 29 PID 2844 wrote to memory of 2732 2844 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe 29 PID 2844 wrote to memory of 2732 2844 2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe 29 PID 2136 wrote to memory of 2640 2136 {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe 30 PID 2136 wrote to memory of 2640 2136 {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe 30 PID 2136 wrote to memory of 2640 2136 {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe 30 PID 2136 wrote to memory of 2640 2136 {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe 30 PID 2136 wrote to memory of 2720 2136 {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe 31 PID 2136 wrote to memory of 2720 2136 {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe 31 PID 2136 wrote to memory of 2720 2136 {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe 31 PID 2136 wrote to memory of 2720 2136 {D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe 31 PID 2640 wrote to memory of 2596 2640 {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe 32 PID 2640 wrote to memory of 2596 2640 {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe 32 PID 2640 wrote to memory of 2596 2640 {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe 32 PID 2640 wrote to memory of 2596 2640 {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe 32 PID 2640 wrote to memory of 2728 2640 {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe 33 PID 2640 wrote to memory of 2728 2640 {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe 33 PID 2640 wrote to memory of 2728 2640 {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe 33 PID 2640 wrote to memory of 2728 2640 {0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe 33 PID 2596 wrote to memory of 2924 2596 {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe 36 PID 2596 wrote to memory of 2924 2596 {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe 36 PID 2596 wrote to memory of 2924 2596 {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe 36 PID 2596 wrote to memory of 2924 2596 {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe 36 PID 2596 wrote to memory of 1068 2596 {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe 37 PID 2596 wrote to memory of 1068 2596 {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe 37 PID 2596 wrote to memory of 1068 2596 {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe 37 PID 2596 wrote to memory of 1068 2596 {E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe 37 PID 2924 wrote to memory of 2792 2924 {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe 38 PID 2924 wrote to memory of 2792 2924 {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe 38 PID 2924 wrote to memory of 2792 2924 {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe 38 PID 2924 wrote to memory of 2792 2924 {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe 38 PID 2924 wrote to memory of 2824 2924 {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe 39 PID 2924 wrote to memory of 2824 2924 {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe 39 PID 2924 wrote to memory of 2824 2924 {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe 39 PID 2924 wrote to memory of 2824 2924 {FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe 39 PID 2792 wrote to memory of 2416 2792 {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe 40 PID 2792 wrote to memory of 2416 2792 {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe 40 PID 2792 wrote to memory of 2416 2792 {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe 40 PID 2792 wrote to memory of 2416 2792 {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe 40 PID 2792 wrote to memory of 1092 2792 {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe 41 PID 2792 wrote to memory of 1092 2792 {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe 41 PID 2792 wrote to memory of 1092 2792 {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe 41 PID 2792 wrote to memory of 1092 2792 {7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe 41 PID 2416 wrote to memory of 1440 2416 {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe 42 PID 2416 wrote to memory of 1440 2416 {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe 42 PID 2416 wrote to memory of 1440 2416 {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe 42 PID 2416 wrote to memory of 1440 2416 {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe 42 PID 2416 wrote to memory of 1564 2416 {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe 43 PID 2416 wrote to memory of 1564 2416 {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe 43 PID 2416 wrote to memory of 1564 2416 {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe 43 PID 2416 wrote to memory of 1564 2416 {AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe 43 PID 1440 wrote to memory of 2784 1440 {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe 44 PID 1440 wrote to memory of 2784 1440 {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe 44 PID 1440 wrote to memory of 2784 1440 {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe 44 PID 1440 wrote to memory of 2784 1440 {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe 44 PID 1440 wrote to memory of 1284 1440 {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe 45 PID 1440 wrote to memory of 1284 1440 {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe 45 PID 1440 wrote to memory of 1284 1440 {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe 45 PID 1440 wrote to memory of 1284 1440 {272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\{D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exeC:\Windows\{D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\{0FB98EB5-CE81-4f99-B771-DC824DE48961}.exeC:\Windows\{0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\{E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exeC:\Windows\{E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\{FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exeC:\Windows\{FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\{7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exeC:\Windows\{7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\{AE8E68F0-6844-486e-A1F0-75521A809ADE}.exeC:\Windows\{AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\{272AF77B-F6CA-413f-B921-8D62FCAAF115}.exeC:\Windows\{272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\{108C965C-9908-48b2-AD44-2108588F6956}.exeC:\Windows\{108C965C-9908-48b2-AD44-2108588F6956}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2784 -
C:\Windows\{56F01383-9D3C-42c8-BB88-0804A9782370}.exeC:\Windows\{56F01383-9D3C-42c8-BB88-0804A9782370}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\{10CE58B0-1727-44b8-A012-3AAD2B384A69}.exeC:\Windows\{10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\{E38C8C63-6DAF-47c4-AF4B-4C66509C4E10}.exeC:\Windows\{E38C8C63-6DAF-47c4-AF4B-4C66509C4E10}.exe12⤵
- Executes dropped EXE
PID:1168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{10CE5~1.EXE > nul12⤵PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56F01~1.EXE > nul11⤵PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{108C9~1.EXE > nul10⤵PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{272AF~1.EXE > nul9⤵PID:1284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AE8E6~1.EXE > nul8⤵PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C13D~1.EXE > nul7⤵PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FE63E~1.EXE > nul6⤵PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E2BF7~1.EXE > nul5⤵PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0FB98~1.EXE > nul4⤵PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9373~1.EXE > nul3⤵PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD53cb79330c6096b89afaca88aae0ceb1b
SHA1ce416ac1e38422693dd630d0348151da813092c8
SHA2568b9532823d04414dd443ae940ae29eda97988b7303058201fc013fb5538995b5
SHA512a2ec1a2ab3267705266c9e415bd76ac3bac7e1ccb01bd80a1afd9efb817c4d3560248307973578846d68dff542ac60feebd264955d5abdae162aa9ea2f833167
-
Filesize
197KB
MD57c4e502dd09e2b05c14989ad994ea0bb
SHA1b278d0f0b26ec8b79375e6e58b4e140248389d97
SHA256c25a39b6acf0c9bca1c2d0f8bcfc6b7cd51628d2ff4ebae76b42bca99a9f25b7
SHA5121fcf628c7b5d8f5fa085e56d4fbab2a76695bdc796799cee3542b6ed6da5199e5a978c5e30d5e36fe4f7fc70cf0ca8830df5e2c1ae719e14ef65415a47220d7d
-
Filesize
197KB
MD5228c5c5ca401667c60194e257637efed
SHA13e7f1e76f597187cd2006dcf0eceae81b1942b56
SHA25646b550be301b4c388fc82999bd738ab4a691b4c925fbe0955d5ae16d9f2a704d
SHA51204f5a8801b606a60e345fd0e26e25a947ef2165ac5bc665fdf3c6120adce310adccb2b7a754dbcf9c259c614a9143427e1449ac88048afe4998171d6e4b5aabf
-
Filesize
197KB
MD5b2d038f8835e1b4bbea6ff8af1ab2f40
SHA1e43482e3a52554256a4935c78ef8931a0e7df8e7
SHA256bd5fdc041ddbab7ccfd06b82c31304b7048a059b7f530393ea6fda993c4d6b25
SHA512e60ee3fca6b9aefb0d6d846498000dfae0020aa854bca141d10f48c93735334555c084217365fa5c410ed02ed589b741694594891b603230d6eb06b2cbc38449
-
Filesize
197KB
MD5e103e64aa297a9372418ad6cbe820d99
SHA194680ff8f5847358b258476802608186bed5e192
SHA256deaf23542ecaeabb84e1d24af5810df6f68f59a7e226df02a90c3f38c8644915
SHA512ef17aa25935ca90c379f3f3af0e456fd18d1d261ce4703d4eaeb2c3ef472a4a408be96c3df658c3519c6b935ab45486ad4b5806317f1ade117f35b906516906b
-
Filesize
197KB
MD568a5117d8b0be8baca484e7f3461ae9c
SHA1ffdf7efea40e33ef6f35a4d3e01d7d206fb98ac8
SHA256abc3fe2e1f32f72b0f10477841eac884268e2e385f4308a3f5009007cf1c03da
SHA5121e6b933e9d9aba7b8225bf38e96701ec89ca11dd12ed2ed1bfa5e2ffeeab7350e8621d88edab6405add52e14f72d1bc4197e5bdc9e6f99331402343eb2009836
-
Filesize
197KB
MD5f3e4ac0591f7e90617b2b212242fb450
SHA14c2d71536778df8528b7ba098c57f5ba5af177d6
SHA256c0a0b6e39d0fc6b31923b34dc8d0e7b1c9a32765c7a50e7450a8462267de904d
SHA51209bd90c4e8b6226919f49efac3e86b01a514f41eddc1b287039f0a92b45d7c92f49d04596312a2ebe5caf638a769719d10774b6f77fc5951352d102a6138460d
-
Filesize
197KB
MD5cfb7b9050d4babaa3845067e7c18a777
SHA14b602243b5f4810eee7a0e52dfb251a5f6a3cfea
SHA256d3acb8744c32a7e41968dcc95d162e0d80148b7999a8dafd1ebaf5445bd7a96a
SHA512b2d33174ab7e562c8d846e64cb63f62e68f73df38fa3ce46e29aa11f3f25381681755b0cf4a5d2f2c17664eebf5e2ab92ef7e60fc49648a5b879e25c89786021
-
Filesize
197KB
MD5f96955a0705b1b2f3314f86bb7c2416e
SHA10ee1f089c2b7fa9695091d320018579e6741c074
SHA2565150fc4481fe6206606d590f29a47b0dd0f1eadee00179eaca6b0681e7fc6b5c
SHA512469e183d945fda6f2fd060ed4b9002ce4b6271604b29ac34322618fd09d34ec3c1c8edfe066e5d5118c98061d3098d942fdba322934802bc449fdbe66410e2ab
-
Filesize
197KB
MD549b430523755945eef649edbc5a30675
SHA1997dbbb2bd58bc814f8b6ccbdc7a96898d15a4b1
SHA2560ce609d179ad798dc3e37d0f5516f475adc426dea0e2f54402a074b71fb2a87c
SHA5125c29dc0ed3d5faa095741e17f968878c70722123b5a07333156ab77cf87f96175bfa59f1831a342d932eecf63b0ba8364d2611c886929ac89fb6e294abb9776a
-
Filesize
197KB
MD55787dd82b4d581d7367be5e1968248e1
SHA196a7c7200f83d08f9f78319d1b65535f9bc325c1
SHA2568196b99bcaa4a9f305f3d656f71b13c3a453d4957bac40f38c7374bc8c648246
SHA51243efd0b722b7da80041e14381a2e3163f597b8fd182cc6adfb522aa15714df6f6359d72ad8ab5ec545c4675b645336a3d3420e47b06a3742e0d54580e050b8b4