Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe
-
Size
408KB
-
MD5
4504243033ed8205cdc7a434a43d1f0a
-
SHA1
62423e7e1f5bb165116f603de7088cd9b34e6e08
-
SHA256
04a434581522721af09075ed5f1ca72b272fad2008a84f70d904a4c0d4a53c98
-
SHA512
476e3cfdbe9c65cd388817f5dc4190299f8c9d7a3416d2da3329addb0535052c0981997674825067f448675b96d37aee31cd2e97ba9d3527fa5670527849b291
-
SSDEEP
3072:CEGh0o/l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGJldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x00090000000122be-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000015c4c-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a0000000122be-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0033000000015cbd-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000015cce-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0010000000015cce-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0011000000015cce-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46A537A2-4777-4263-A4FD-2B774371F8DB}\stubpath = "C:\\Windows\\{46A537A2-4777-4263-A4FD-2B774371F8DB}.exe" {E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{396628D3-9044-4a94-9DD2-49C0981826E1} 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{396628D3-9044-4a94-9DD2-49C0981826E1}\stubpath = "C:\\Windows\\{396628D3-9044-4a94-9DD2-49C0981826E1}.exe" 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344} {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}\stubpath = "C:\\Windows\\{EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe" {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}\stubpath = "C:\\Windows\\{EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe" {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E52CDC07-0412-4f91-A36D-E0B6157B77B0}\stubpath = "C:\\Windows\\{E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe" {AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}\stubpath = "C:\\Windows\\{6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe" {396628D3-9044-4a94-9DD2-49C0981826E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9446EAED-3214-4f3f-8FEF-8F2E6216D63E} {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9446EAED-3214-4f3f-8FEF-8F2E6216D63E}\stubpath = "C:\\Windows\\{9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe" {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B6829C0-5DC4-4449-9A35-E6AE6C0EC272} {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA84B886-3B8C-460c-A94B-01CDD5D04B20} {236E9CA2-679D-41e0-A925-6F2D9084B393}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F7BDEC3-DBD9-4956-B8B9-458D58D38B91} {396628D3-9044-4a94-9DD2-49C0981826E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{50EDCE2A-3361-4a0f-9FE3-C852EE169819} {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{236E9CA2-679D-41e0-A925-6F2D9084B393} {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{236E9CA2-679D-41e0-A925-6F2D9084B393}\stubpath = "C:\\Windows\\{236E9CA2-679D-41e0-A925-6F2D9084B393}.exe" {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E52CDC07-0412-4f91-A36D-E0B6157B77B0} {AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D} {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}\stubpath = "C:\\Windows\\{2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe" {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{50EDCE2A-3361-4a0f-9FE3-C852EE169819}\stubpath = "C:\\Windows\\{50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe" {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA84B886-3B8C-460c-A94B-01CDD5D04B20}\stubpath = "C:\\Windows\\{AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe" {236E9CA2-679D-41e0-A925-6F2D9084B393}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46A537A2-4777-4263-A4FD-2B774371F8DB} {E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe -
Deletes itself 1 IoCs
pid Process 2436 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2760 {396628D3-9044-4a94-9DD2-49C0981826E1}.exe 2772 {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe 2352 {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe 1008 {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe 2720 {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe 1768 {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe 2300 {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe 1456 {236E9CA2-679D-41e0-A925-6F2D9084B393}.exe 2212 {AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe 1236 {E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe 908 {46A537A2-4777-4263-A4FD-2B774371F8DB}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{46A537A2-4777-4263-A4FD-2B774371F8DB}.exe {E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe File created C:\Windows\{396628D3-9044-4a94-9DD2-49C0981826E1}.exe 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe File created C:\Windows\{EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe File created C:\Windows\{EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe File created C:\Windows\{50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe File created C:\Windows\{AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe {236E9CA2-679D-41e0-A925-6F2D9084B393}.exe File created C:\Windows\{E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe {AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe File created C:\Windows\{6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe {396628D3-9044-4a94-9DD2-49C0981826E1}.exe File created C:\Windows\{9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe File created C:\Windows\{2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe File created C:\Windows\{236E9CA2-679D-41e0-A925-6F2D9084B393}.exe {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2900 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe Token: SeIncBasePriorityPrivilege 2760 {396628D3-9044-4a94-9DD2-49C0981826E1}.exe Token: SeIncBasePriorityPrivilege 2772 {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe Token: SeIncBasePriorityPrivilege 2352 {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe Token: SeIncBasePriorityPrivilege 1008 {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe Token: SeIncBasePriorityPrivilege 2720 {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe Token: SeIncBasePriorityPrivilege 1768 {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe Token: SeIncBasePriorityPrivilege 2300 {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe Token: SeIncBasePriorityPrivilege 1456 {236E9CA2-679D-41e0-A925-6F2D9084B393}.exe Token: SeIncBasePriorityPrivilege 2212 {AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe Token: SeIncBasePriorityPrivilege 1236 {E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2760 2900 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe 28 PID 2900 wrote to memory of 2760 2900 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe 28 PID 2900 wrote to memory of 2760 2900 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe 28 PID 2900 wrote to memory of 2760 2900 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe 28 PID 2900 wrote to memory of 2436 2900 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe 29 PID 2900 wrote to memory of 2436 2900 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe 29 PID 2900 wrote to memory of 2436 2900 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe 29 PID 2900 wrote to memory of 2436 2900 2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe 29 PID 2760 wrote to memory of 2772 2760 {396628D3-9044-4a94-9DD2-49C0981826E1}.exe 30 PID 2760 wrote to memory of 2772 2760 {396628D3-9044-4a94-9DD2-49C0981826E1}.exe 30 PID 2760 wrote to memory of 2772 2760 {396628D3-9044-4a94-9DD2-49C0981826E1}.exe 30 PID 2760 wrote to memory of 2772 2760 {396628D3-9044-4a94-9DD2-49C0981826E1}.exe 30 PID 2760 wrote to memory of 2600 2760 {396628D3-9044-4a94-9DD2-49C0981826E1}.exe 31 PID 2760 wrote to memory of 2600 2760 {396628D3-9044-4a94-9DD2-49C0981826E1}.exe 31 PID 2760 wrote to memory of 2600 2760 {396628D3-9044-4a94-9DD2-49C0981826E1}.exe 31 PID 2760 wrote to memory of 2600 2760 {396628D3-9044-4a94-9DD2-49C0981826E1}.exe 31 PID 2772 wrote to memory of 2352 2772 {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe 32 PID 2772 wrote to memory of 2352 2772 {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe 32 PID 2772 wrote to memory of 2352 2772 {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe 32 PID 2772 wrote to memory of 2352 2772 {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe 32 PID 2772 wrote to memory of 2492 2772 {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe 33 PID 2772 wrote to memory of 2492 2772 {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe 33 PID 2772 wrote to memory of 2492 2772 {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe 33 PID 2772 wrote to memory of 2492 2772 {6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe 33 PID 2352 wrote to memory of 1008 2352 {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe 36 PID 2352 wrote to memory of 1008 2352 {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe 36 PID 2352 wrote to memory of 1008 2352 {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe 36 PID 2352 wrote to memory of 1008 2352 {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe 36 PID 2352 wrote to memory of 2636 2352 {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe 37 PID 2352 wrote to memory of 2636 2352 {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe 37 PID 2352 wrote to memory of 2636 2352 {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe 37 PID 2352 wrote to memory of 2636 2352 {9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe 37 PID 1008 wrote to memory of 2720 1008 {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe 38 PID 1008 wrote to memory of 2720 1008 {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe 38 PID 1008 wrote to memory of 2720 1008 {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe 38 PID 1008 wrote to memory of 2720 1008 {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe 38 PID 1008 wrote to memory of 2752 1008 {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe 39 PID 1008 wrote to memory of 2752 1008 {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe 39 PID 1008 wrote to memory of 2752 1008 {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe 39 PID 1008 wrote to memory of 2752 1008 {EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe 39 PID 2720 wrote to memory of 1768 2720 {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe 40 PID 2720 wrote to memory of 1768 2720 {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe 40 PID 2720 wrote to memory of 1768 2720 {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe 40 PID 2720 wrote to memory of 1768 2720 {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe 40 PID 2720 wrote to memory of 2396 2720 {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe 41 PID 2720 wrote to memory of 2396 2720 {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe 41 PID 2720 wrote to memory of 2396 2720 {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe 41 PID 2720 wrote to memory of 2396 2720 {EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe 41 PID 1768 wrote to memory of 2300 1768 {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe 42 PID 1768 wrote to memory of 2300 1768 {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe 42 PID 1768 wrote to memory of 2300 1768 {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe 42 PID 1768 wrote to memory of 2300 1768 {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe 42 PID 1768 wrote to memory of 2516 1768 {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe 43 PID 1768 wrote to memory of 2516 1768 {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe 43 PID 1768 wrote to memory of 2516 1768 {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe 43 PID 1768 wrote to memory of 2516 1768 {2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe 43 PID 2300 wrote to memory of 1456 2300 {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe 44 PID 2300 wrote to memory of 1456 2300 {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe 44 PID 2300 wrote to memory of 1456 2300 {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe 44 PID 2300 wrote to memory of 1456 2300 {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe 44 PID 2300 wrote to memory of 1136 2300 {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe 45 PID 2300 wrote to memory of 1136 2300 {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe 45 PID 2300 wrote to memory of 1136 2300 {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe 45 PID 2300 wrote to memory of 1136 2300 {50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\{396628D3-9044-4a94-9DD2-49C0981826E1}.exeC:\Windows\{396628D3-9044-4a94-9DD2-49C0981826E1}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\{6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exeC:\Windows\{6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\{9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exeC:\Windows\{9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\{EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exeC:\Windows\{EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\{EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exeC:\Windows\{EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\{2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exeC:\Windows\{2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\{50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exeC:\Windows\{50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\{236E9CA2-679D-41e0-A925-6F2D9084B393}.exeC:\Windows\{236E9CA2-679D-41e0-A925-6F2D9084B393}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Windows\{AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exeC:\Windows\{AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\{E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exeC:\Windows\{E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Windows\{46A537A2-4777-4263-A4FD-2B774371F8DB}.exeC:\Windows\{46A537A2-4777-4263-A4FD-2B774371F8DB}.exe12⤵
- Executes dropped EXE
PID:908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E52CD~1.EXE > nul12⤵PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA84B~1.EXE > nul11⤵PID:700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{236E9~1.EXE > nul10⤵PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{50EDC~1.EXE > nul9⤵PID:1136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2B682~1.EXE > nul8⤵PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EFF7D~1.EXE > nul7⤵PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EAFB0~1.EXE > nul6⤵PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9446E~1.EXE > nul5⤵PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6F7BD~1.EXE > nul4⤵PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39662~1.EXE > nul3⤵PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5b238609efdd1ec74f1d4ffe775ae3245
SHA18a439ae273dfd1fdddc530350890d8a85f556cc2
SHA2564396740726f51e508cd118f90e9afe3d782400ae8e8e55fc8d9e6da3857b050b
SHA51281432d2d2da77b8d587a148da9dbc8ec7c5ea8dfce117ca1eaa968d35d1b99190cdf7d5d43729d9f562bbaed77a3eef7c1bceaff12cfa0c99b5d71e4862218d6
-
Filesize
408KB
MD58ff9b9b93666ce8fca222b6b2b63a25b
SHA1889c68a3c111db0c3f4474e14f5e2e1eca7a6601
SHA25622104870df65eb1f2236b711b64e41b87508694e828374b665e812ec42710dfe
SHA51281d546345bcccb2bd353399aacb594284901ae27f8df2f3c256fb6140576659927cb69377e4a95325eddac7ffcdd3d113ba457b04763a518ae2f3554d3784686
-
Filesize
408KB
MD52811793d2f9da1d24583afc4c9aca0c2
SHA1b46988ce2ebaad11cbe39ffb34247686debf47d1
SHA2563f85b28df4fce71faa6ce761e1cdbead4909eda52fd649de5369b8e126fa5ebc
SHA5124c27b80aad59db61079a4d097dbd25c1831f046d81b44deb1ee455ea5cea12d61fae818e97972742d6e33a16a19e08d4ce200811730e1bba5fef64c697d9ada1
-
Filesize
408KB
MD514f91aabd70e2df51532538104473dbd
SHA14e9577d7fe1654e361d886fffd87dfc646d2e938
SHA256fcbe054109b7fbfc5e427122799a7870ba1d92828508d2dcf0f010df5752cb47
SHA512854c5004a163be4c0bb134c9121da72299f86dd2ab94fa9f5355243350d9a2e80c36a69b3e110588e8cbc80aecb78867bff7eb353d164945a7415676215a3c1e
-
Filesize
408KB
MD59ff73f421ff7ff3022b650e8fa568867
SHA139ff6a74f283b69b81a6d4f1e19ef2d3fee07c88
SHA2569a2b8ed97338568aa9a76c249677f8ed4d5059db71aed56bc3fd0ce2874c93ac
SHA512d56b10d5a38ee4b09215dc8ada987400a72cc45951b1ec5760d0110d18059a9d5830a79b4db805d322ca881536b921b3384dd408dffa77d44e3540db669555ef
-
Filesize
408KB
MD559d701915f45b962ab22f220e0254244
SHA1bd77868ab32f2f6a19b448c4c1716b06cfaec241
SHA2560ed718d8e886b2a78a194bf1ab2bdfb562b18a32d74f424d10b78963ad694ff5
SHA512bf7d9de33d4e54ee6a71a9d963b8e6c80af270e5e2c54f8fb049d4671bbb534b5344a0adab549f33248251dee7242c2f96a5473c30f87996a12c2864a6ce1215
-
Filesize
408KB
MD514d2d08b2c700883c04b7b6d8880160e
SHA14bff8430c3379f23b222c39d97162fd1aa7d9c96
SHA256f85894b692636af684f92ebd4d0e3df1889b82572ddae8604bf5d8f52b837935
SHA51253ef8ff518add6256a9147831f9ba7d639da8c29950bf72236c30bb95f1d7acc9042137de54a17c32b550b4c30ec96c6f4aa1e1560c9f127fad53d6eea979e8b
-
Filesize
408KB
MD5bc8b60d3043563b1b63f749dade9c2c5
SHA14407ba2bdfacdce3936234cbb9ddbcbede7b0aa1
SHA256d8a24a30157bd32b24a2212ee1286fc6b45cd59b3f0f3d0e6877574545df40df
SHA512514510714886f6f94686351fe1b20ada83d6c13afe0d52b78581d97597aeb062ec20f19c67c0b6066ce0ba9e9bf740cbb018f88d7c921d7763cd419b2daf64c6
-
Filesize
408KB
MD56c5f5eb3cbe13098c56097a20f60d4da
SHA1f67ac9af11fbb26637bb8e003206f526f9ba4e6c
SHA256c22927f89b774b2e1749306af4389792e786a7849a4a9f3acafac177304524d1
SHA512f1924c5b4b02d5a069e6c597962d9036b5e11ddfb1ed5ae7a420a64aa3eec35b7cd0471464184b6c0433d10ee3121ef917e1c8d2b8ac7c56a5c558d82003c443
-
Filesize
408KB
MD587e7674a7429ba71f59a578759aa8806
SHA11279d9a48b16e1977fedf6a0d00a9167c0641fd1
SHA2562236265dd216943d9d038954a206830e29364d68f6f36ad492b607071e4fe688
SHA51287f45f9ba51a8b5000d80ada66548fc06926650727b53a489579a7209a29f8ab5acff7b6a911f848157ba4661eed6397c5d412cf4b22d7f3496ffb925dc54465
-
Filesize
408KB
MD5a1981d54b77710e610192e1434bd1a96
SHA1d04b7f9384a4e5c4ef1f9d7e102cf94ab59f7871
SHA2567d4b82febe245595199ae0b84d96c0a859455bbdf679d9f40ddb0669432f7874
SHA512d7d395e394e7a79efd9b80b7a36c85c197547e416813b73bb780f895dd6dcb119f5aa144bee94f857278c32b0fa78a5570f07f966dddcd0fc7a34213568d80ac