Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe
-
Size
168KB
-
MD5
cc5a1c532eb5a0ccb25653297c2444f5
-
SHA1
6e69fcd03a445b419c6128d51032e6cde424f1d5
-
SHA256
e6e6d6da5d85e09e11f2a2b27e2224907db538b65a0c5cf4f291547bac676db8
-
SHA512
97ab023b38cc5d7d84ce09b44da443f821a4aa91ea0e2b4af80979a2a606eacbf90872bdd71e30c8cfd2ea5e4e5b700a71e7172216b1a0a37700d238efcd1be0
-
SSDEEP
1536:1EGh0ofli5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0ofliOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000d000000012267-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c0000000132d6-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000012267-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000300000000b1f3-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000b1f3-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000500000000b1f3-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000b1f3-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C64A34B-F617-4cb8-8AE4-F18F21A3912C}\stubpath = "C:\\Windows\\{8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe" {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A337DD5-6881-44b2-999A-19B521AFFDE9}\stubpath = "C:\\Windows\\{7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe" {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4B803D7-2492-45fa-9C0D-8B8B103AA814} {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80948AFA-71A8-4d09-8D1B-38A035CD8945}\stubpath = "C:\\Windows\\{80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe" {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA} {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}\stubpath = "C:\\Windows\\{E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe" {38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F4F4E28C-9149-4717-BAC4-12B4A111142B} 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F4F4E28C-9149-4717-BAC4-12B4A111142B}\stubpath = "C:\\Windows\\{F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe" 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E} {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA2D04BB-865B-4df8-975A-047CAE9EFF6B}\stubpath = "C:\\Windows\\{EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe" {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A337DD5-6881-44b2-999A-19B521AFFDE9} {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4B803D7-2492-45fa-9C0D-8B8B103AA814}\stubpath = "C:\\Windows\\{D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe" {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}\stubpath = "C:\\Windows\\{38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe" {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E67F4E2A-6936-497a-9AA8-205DDA8CD7BF} {38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBFD61F7-C92C-40bd-9B53-82981D5C7551} {C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80948AFA-71A8-4d09-8D1B-38A035CD8945} {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4} {E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBFD61F7-C92C-40bd-9B53-82981D5C7551}\stubpath = "C:\\Windows\\{EBFD61F7-C92C-40bd-9B53-82981D5C7551}.exe" {C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C64A34B-F617-4cb8-8AE4-F18F21A3912C} {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}\stubpath = "C:\\Windows\\{FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe" {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA2D04BB-865B-4df8-975A-047CAE9EFF6B} {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}\stubpath = "C:\\Windows\\{C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe" {E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe -
Deletes itself 1 IoCs
pid Process 2792 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2696 {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe 2648 {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe 2672 {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe 1404 {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe 2500 {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe 1660 {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe 2760 {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe 1488 {38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe 1664 {E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe 2908 {C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe 2832 {EBFD61F7-C92C-40bd-9B53-82981D5C7551}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe File created C:\Windows\{FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe File created C:\Windows\{7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe File created C:\Windows\{D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe File created C:\Windows\{80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe File created C:\Windows\{E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe {38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe File created C:\Windows\{8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe File created C:\Windows\{EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe File created C:\Windows\{38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe File created C:\Windows\{C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe {E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe File created C:\Windows\{EBFD61F7-C92C-40bd-9B53-82981D5C7551}.exe {C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2060 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe Token: SeIncBasePriorityPrivilege 2696 {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe Token: SeIncBasePriorityPrivilege 2648 {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe Token: SeIncBasePriorityPrivilege 2672 {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe Token: SeIncBasePriorityPrivilege 1404 {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe Token: SeIncBasePriorityPrivilege 2500 {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe Token: SeIncBasePriorityPrivilege 1660 {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe Token: SeIncBasePriorityPrivilege 2760 {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe Token: SeIncBasePriorityPrivilege 1488 {38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe Token: SeIncBasePriorityPrivilege 1664 {E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe Token: SeIncBasePriorityPrivilege 2908 {C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2696 2060 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe 28 PID 2060 wrote to memory of 2696 2060 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe 28 PID 2060 wrote to memory of 2696 2060 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe 28 PID 2060 wrote to memory of 2696 2060 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe 28 PID 2060 wrote to memory of 2792 2060 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe 29 PID 2060 wrote to memory of 2792 2060 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe 29 PID 2060 wrote to memory of 2792 2060 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe 29 PID 2060 wrote to memory of 2792 2060 2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe 29 PID 2696 wrote to memory of 2648 2696 {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe 30 PID 2696 wrote to memory of 2648 2696 {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe 30 PID 2696 wrote to memory of 2648 2696 {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe 30 PID 2696 wrote to memory of 2648 2696 {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe 30 PID 2696 wrote to memory of 2568 2696 {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe 31 PID 2696 wrote to memory of 2568 2696 {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe 31 PID 2696 wrote to memory of 2568 2696 {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe 31 PID 2696 wrote to memory of 2568 2696 {F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe 31 PID 2648 wrote to memory of 2672 2648 {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe 32 PID 2648 wrote to memory of 2672 2648 {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe 32 PID 2648 wrote to memory of 2672 2648 {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe 32 PID 2648 wrote to memory of 2672 2648 {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe 32 PID 2648 wrote to memory of 2936 2648 {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe 33 PID 2648 wrote to memory of 2936 2648 {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe 33 PID 2648 wrote to memory of 2936 2648 {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe 33 PID 2648 wrote to memory of 2936 2648 {8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe 33 PID 2672 wrote to memory of 1404 2672 {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe 36 PID 2672 wrote to memory of 1404 2672 {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe 36 PID 2672 wrote to memory of 1404 2672 {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe 36 PID 2672 wrote to memory of 1404 2672 {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe 36 PID 2672 wrote to memory of 1956 2672 {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe 37 PID 2672 wrote to memory of 1956 2672 {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe 37 PID 2672 wrote to memory of 1956 2672 {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe 37 PID 2672 wrote to memory of 1956 2672 {FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe 37 PID 1404 wrote to memory of 2500 1404 {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe 38 PID 1404 wrote to memory of 2500 1404 {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe 38 PID 1404 wrote to memory of 2500 1404 {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe 38 PID 1404 wrote to memory of 2500 1404 {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe 38 PID 1404 wrote to memory of 796 1404 {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe 39 PID 1404 wrote to memory of 796 1404 {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe 39 PID 1404 wrote to memory of 796 1404 {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe 39 PID 1404 wrote to memory of 796 1404 {EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe 39 PID 2500 wrote to memory of 1660 2500 {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe 40 PID 2500 wrote to memory of 1660 2500 {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe 40 PID 2500 wrote to memory of 1660 2500 {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe 40 PID 2500 wrote to memory of 1660 2500 {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe 40 PID 2500 wrote to memory of 800 2500 {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe 41 PID 2500 wrote to memory of 800 2500 {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe 41 PID 2500 wrote to memory of 800 2500 {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe 41 PID 2500 wrote to memory of 800 2500 {7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe 41 PID 1660 wrote to memory of 2760 1660 {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe 42 PID 1660 wrote to memory of 2760 1660 {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe 42 PID 1660 wrote to memory of 2760 1660 {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe 42 PID 1660 wrote to memory of 2760 1660 {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe 42 PID 1660 wrote to memory of 588 1660 {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe 43 PID 1660 wrote to memory of 588 1660 {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe 43 PID 1660 wrote to memory of 588 1660 {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe 43 PID 1660 wrote to memory of 588 1660 {D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe 43 PID 2760 wrote to memory of 1488 2760 {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe 44 PID 2760 wrote to memory of 1488 2760 {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe 44 PID 2760 wrote to memory of 1488 2760 {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe 44 PID 2760 wrote to memory of 1488 2760 {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe 44 PID 2760 wrote to memory of 2880 2760 {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe 45 PID 2760 wrote to memory of 2880 2760 {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe 45 PID 2760 wrote to memory of 2880 2760 {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe 45 PID 2760 wrote to memory of 2880 2760 {80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\{F4F4E28C-9149-4717-BAC4-12B4A111142B}.exeC:\Windows\{F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\{8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exeC:\Windows\{8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\{FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exeC:\Windows\{FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\{EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exeC:\Windows\{EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\{7A337DD5-6881-44b2-999A-19B521AFFDE9}.exeC:\Windows\{7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\{D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exeC:\Windows\{D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\{80948AFA-71A8-4d09-8D1B-38A035CD8945}.exeC:\Windows\{80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\{38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exeC:\Windows\{38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Windows\{E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exeC:\Windows\{E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Windows\{C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exeC:\Windows\{C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\{EBFD61F7-C92C-40bd-9B53-82981D5C7551}.exeC:\Windows\{EBFD61F7-C92C-40bd-9B53-82981D5C7551}.exe12⤵
- Executes dropped EXE
PID:2832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C27B0~1.EXE > nul12⤵PID:540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E67F4~1.EXE > nul11⤵PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{38FDC~1.EXE > nul10⤵PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80948~1.EXE > nul9⤵PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4B80~1.EXE > nul8⤵PID:588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7A337~1.EXE > nul7⤵PID:800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA2D0~1.EXE > nul6⤵PID:796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FBEEE~1.EXE > nul5⤵PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C64A~1.EXE > nul4⤵PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4F4E~1.EXE > nul3⤵PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a807492d734a07434624fe963edc4bf7
SHA139cd1159577122ba2768873f924aabfc0ae52d16
SHA2561acb6b1e00b6942bb7c2b16e92d4763d3b623e6a59849c23bc99c8e13d9da80d
SHA512c50992d6f569847fc5a5be36d74e72060ac11611d2972ecb0ca4a49d8dadc3ca2c3754b8163290453750419b5f94e3e71e9fba0c961c0ba48716c1bf07251043
-
Filesize
168KB
MD5d067bae8db925200894dae34693c8633
SHA1735544b6e212a0bbd04ad712c9989bd0a3278ec7
SHA2561f69bcc0aaa13151fc7a23a0bab1905ad1f54f44cb9c85e75e539e29c342c2b0
SHA5120c4c0a7003eef4182e6a3dfa854dd7857764c1f8eaad2f7cf2a1cdac61adc7188e08d8aec1815e01a3d5021175baf7786f3e845f6f623e157aeb9eac896836bd
-
Filesize
168KB
MD51a2f882f822259a9cd345cde83226876
SHA18f3217e75204f64f14330eb3fb2e4ffbb276e65b
SHA256098e74c4803d43069b48bb29e0967871632fd0ef518c4a4e6cead7d065b19711
SHA51266b27ba2dda3bea7433d54f2af8f9fca6e65e7a30c77c41745c4732e382dd7d78c5f9f7a01632e8c75a8d26a59154cc8e4fe18f165aab72aa0d1ef48f87ed71f
-
Filesize
168KB
MD5b8475e1fbf77e27720aff2a9375b2876
SHA16d394905fbbdb1ac08fc9395103965d167a8ba4a
SHA25674572fd2e58c3500d3238f82964ce5805c0fae84b1113511f1e5d38b21a933f2
SHA512d5d5f87e6dd9c7e557c2338c723c8f4e6e10f4e16b3aa0caf256276577d4983e9685252089b14a5bd0c6765f6f78a7d775b81a2ca871933ee0a2e66b497731d2
-
Filesize
168KB
MD53db41aad5226363d6a32e44f96b7e9ed
SHA18a56417962aaa573a65a15dc1cb6f1bd08be018d
SHA2566672486f30e94cfdb66f379644b23b55ee65263cb613cd477f27c1066b416ae4
SHA5125cde4abc471542507645401471d07a5fc107ff0fbb40008d710a0b498712d67b64db04a8408f21561e89175668e4a8ef30958e5fee8d772c90c634213998d80c
-
Filesize
168KB
MD5b2e8ca84ad2bfea098013be2f63334fb
SHA18033541083aff2cd8523c2486b0383b8153af43e
SHA2563e13ed0b0aa2d5222baad72a947a0686b6104ae4174778bb30d4e0f5a7ceb22d
SHA512429617bed19bbc6fb7c1a630e42ce84b1525232b4be32d175f37a9c0f1ae1532329b3096eeb2683317ccf1bbd00eedac3b43b1b6421668fa5452c1478fcce216
-
Filesize
168KB
MD597343c53372b80794aed1380d404c4c1
SHA131c4a8612a638af313dccb64767778365e9a1cf3
SHA2563fb76eff5d94480684843def69c7bd69ba342baeabf418c6ee35c97f46da0186
SHA512a7876fd23c124ac0566788512208b976aa931cb2148fbe65da5963f450943c128471c8c6b060bae78cd992a6f6fec163c0b14c8e1ddbd007eb6c50f31e8cdae2
-
Filesize
168KB
MD5c96770359c2776070f71ce2cb8c8813c
SHA1c9fba611011ad89938eab4d08c2279ae6724641c
SHA25628ed7a0189e677dc9b6282d603dd5859a99906e5492def7040883fef984baf21
SHA512007ac3e21182cc4bdaa0b51638211335f8bd6211208ea1e082775179bb83e6211c080120a5da8810b977855be8625abdf6ad7990fb69e8ac02f444eef64382ed
-
Filesize
168KB
MD582448763c80db506af4def2d88c5036b
SHA13150c1316af1dcc4131f82682ff849e17c5b50b6
SHA25695ae9ca42569c6007fa63f0e1d110583585beb5191359fd44c448391c7ad3729
SHA5126ad0df1baf83948163450eaf224c5753d09c719658cf692e26416f449eba2b30fc96fcebe296e1c9301fbf2f61381a26ea8b46074e64b4a2e301ab572950588d
-
Filesize
168KB
MD5c5e92fe0139bf8dda831e839b75dd363
SHA1b29a23fe4f69ad2225bb42f69ac361dd04071219
SHA25663c9492f9b5a88f9ff1fe2a5124fef9bc8b8d1ca9664ff4ac9542c85e8931e51
SHA512772e1a9f6134de87ab1aced50068531645b83608d90e3706630fba871fc97cd2e3e5aa534aa9a157ddbe06b4f26c2404bf95578036b70bb77e1cf776016fd9eb
-
Filesize
168KB
MD5992e643fc145bc6221f6a3c07da7248c
SHA12d48be1fabf1aa7b6a0f28cfb2d7f2c1aebef387
SHA256c3afbda9cc7e033efc3bbbcbfce1cdd466fc785cde3f20dd3f117a69f819e4e1
SHA5122c2ceeb3e47ee4cddd09dad53938879b148d097fbf2ec80ac2a7b0f84e43b3496a02230a16fea25b47b6bad025591f4158604942cf17f603e956924aa6309adb