Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe
-
Size
197KB
-
MD5
2faa224e3327af62f250a59a467a91cb
-
SHA1
d2458ccbe522ccb358310c13485b6c22320017da
-
SHA256
bb6845faa17cb36a5403418e9d33ff8d9a9f9aaeef15633a58181b5aa9d44ca0
-
SHA512
abcfc2945f230ac342e42397c1808eea8de931932a421d5e4326449068157efd59ca72186afe769d7d249af14643e6635bced65038e174e1cfd2d73915fdb884
-
SSDEEP
3072:jEGh0oil+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGQlEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c000000012330-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000013417-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000012330-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0036000000013a53-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000012330-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000012330-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0010000000012330-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{621B8106-E480-4bf9-B2EA-2AB878F88170}\stubpath = "C:\\Windows\\{621B8106-E480-4bf9-B2EA-2AB878F88170}.exe" 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79168ADC-208A-4f40-9D84-A63217238C00}\stubpath = "C:\\Windows\\{79168ADC-208A-4f40-9D84-A63217238C00}.exe" {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DF53357-ADC8-4854-87B9-683E843B4DEF} {5272C736-6665-419a-A971-D41712605834}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DF53357-ADC8-4854-87B9-683E843B4DEF}\stubpath = "C:\\Windows\\{3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe" {5272C736-6665-419a-A971-D41712605834}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6711ACCE-1146-4f0b-A67B-E27932EA4A94}\stubpath = "C:\\Windows\\{6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe" {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F401679D-A41B-4b97-9AAB-38AEC88C1B6F} {0871750D-267F-4f59-81F9-7DD953F85466}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79BEF252-9709-4c6d-99E7-34E0B132613D} {F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79168ADC-208A-4f40-9D84-A63217238C00} {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5272C736-6665-419a-A971-D41712605834} {79168ADC-208A-4f40-9D84-A63217238C00}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A63CD24-4290-4fe6-A582-4A4756CD14A7} {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A63CD24-4290-4fe6-A582-4A4756CD14A7}\stubpath = "C:\\Windows\\{9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe" {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0871750D-267F-4f59-81F9-7DD953F85466} {06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0871750D-267F-4f59-81F9-7DD953F85466}\stubpath = "C:\\Windows\\{0871750D-267F-4f59-81F9-7DD953F85466}.exe" {06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F401679D-A41B-4b97-9AAB-38AEC88C1B6F}\stubpath = "C:\\Windows\\{F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe" {0871750D-267F-4f59-81F9-7DD953F85466}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79BEF252-9709-4c6d-99E7-34E0B132613D}\stubpath = "C:\\Windows\\{79BEF252-9709-4c6d-99E7-34E0B132613D}.exe" {F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{621B8106-E480-4bf9-B2EA-2AB878F88170} 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DA679C0-D1E0-49a2-89CE-EEA4CA312E74} {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}\stubpath = "C:\\Windows\\{4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe" {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5272C736-6665-419a-A971-D41712605834}\stubpath = "C:\\Windows\\{5272C736-6665-419a-A971-D41712605834}.exe" {79168ADC-208A-4f40-9D84-A63217238C00}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6711ACCE-1146-4f0b-A67B-E27932EA4A94} {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{06A6A20E-A1B2-44fb-B657-39166FEC272D} {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{06A6A20E-A1B2-44fb-B657-39166FEC272D}\stubpath = "C:\\Windows\\{06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe" {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe -
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2984 {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe 1952 {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe 2724 {79168ADC-208A-4f40-9D84-A63217238C00}.exe 1844 {5272C736-6665-419a-A971-D41712605834}.exe 2676 {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe 2000 {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe 2316 {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe 1244 {06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe 1976 {0871750D-267F-4f59-81F9-7DD953F85466}.exe 2228 {F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe 960 {79BEF252-9709-4c6d-99E7-34E0B132613D}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe File created C:\Windows\{79BEF252-9709-4c6d-99E7-34E0B132613D}.exe {F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe File created C:\Windows\{621B8106-E480-4bf9-B2EA-2AB878F88170}.exe 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe File created C:\Windows\{4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe File created C:\Windows\{79168ADC-208A-4f40-9D84-A63217238C00}.exe {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe File created C:\Windows\{5272C736-6665-419a-A971-D41712605834}.exe {79168ADC-208A-4f40-9D84-A63217238C00}.exe File created C:\Windows\{3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe {5272C736-6665-419a-A971-D41712605834}.exe File created C:\Windows\{6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe File created C:\Windows\{9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe File created C:\Windows\{0871750D-267F-4f59-81F9-7DD953F85466}.exe {06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe File created C:\Windows\{F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe {0871750D-267F-4f59-81F9-7DD953F85466}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3056 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe Token: SeIncBasePriorityPrivilege 2984 {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe Token: SeIncBasePriorityPrivilege 1952 {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe Token: SeIncBasePriorityPrivilege 2724 {79168ADC-208A-4f40-9D84-A63217238C00}.exe Token: SeIncBasePriorityPrivilege 1844 {5272C736-6665-419a-A971-D41712605834}.exe Token: SeIncBasePriorityPrivilege 2676 {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe Token: SeIncBasePriorityPrivilege 2000 {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe Token: SeIncBasePriorityPrivilege 2316 {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe Token: SeIncBasePriorityPrivilege 1244 {06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe Token: SeIncBasePriorityPrivilege 1976 {0871750D-267F-4f59-81F9-7DD953F85466}.exe Token: SeIncBasePriorityPrivilege 2228 {F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2984 3056 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe 28 PID 3056 wrote to memory of 2984 3056 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe 28 PID 3056 wrote to memory of 2984 3056 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe 28 PID 3056 wrote to memory of 2984 3056 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe 28 PID 3056 wrote to memory of 2564 3056 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe 29 PID 3056 wrote to memory of 2564 3056 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe 29 PID 3056 wrote to memory of 2564 3056 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe 29 PID 3056 wrote to memory of 2564 3056 2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe 29 PID 2984 wrote to memory of 1952 2984 {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe 30 PID 2984 wrote to memory of 1952 2984 {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe 30 PID 2984 wrote to memory of 1952 2984 {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe 30 PID 2984 wrote to memory of 1952 2984 {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe 30 PID 2984 wrote to memory of 1728 2984 {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe 31 PID 2984 wrote to memory of 1728 2984 {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe 31 PID 2984 wrote to memory of 1728 2984 {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe 31 PID 2984 wrote to memory of 1728 2984 {621B8106-E480-4bf9-B2EA-2AB878F88170}.exe 31 PID 1952 wrote to memory of 2724 1952 {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe 32 PID 1952 wrote to memory of 2724 1952 {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe 32 PID 1952 wrote to memory of 2724 1952 {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe 32 PID 1952 wrote to memory of 2724 1952 {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe 32 PID 1952 wrote to memory of 2480 1952 {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe 33 PID 1952 wrote to memory of 2480 1952 {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe 33 PID 1952 wrote to memory of 2480 1952 {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe 33 PID 1952 wrote to memory of 2480 1952 {4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe 33 PID 2724 wrote to memory of 1844 2724 {79168ADC-208A-4f40-9D84-A63217238C00}.exe 36 PID 2724 wrote to memory of 1844 2724 {79168ADC-208A-4f40-9D84-A63217238C00}.exe 36 PID 2724 wrote to memory of 1844 2724 {79168ADC-208A-4f40-9D84-A63217238C00}.exe 36 PID 2724 wrote to memory of 1844 2724 {79168ADC-208A-4f40-9D84-A63217238C00}.exe 36 PID 2724 wrote to memory of 1344 2724 {79168ADC-208A-4f40-9D84-A63217238C00}.exe 37 PID 2724 wrote to memory of 1344 2724 {79168ADC-208A-4f40-9D84-A63217238C00}.exe 37 PID 2724 wrote to memory of 1344 2724 {79168ADC-208A-4f40-9D84-A63217238C00}.exe 37 PID 2724 wrote to memory of 1344 2724 {79168ADC-208A-4f40-9D84-A63217238C00}.exe 37 PID 1844 wrote to memory of 2676 1844 {5272C736-6665-419a-A971-D41712605834}.exe 38 PID 1844 wrote to memory of 2676 1844 {5272C736-6665-419a-A971-D41712605834}.exe 38 PID 1844 wrote to memory of 2676 1844 {5272C736-6665-419a-A971-D41712605834}.exe 38 PID 1844 wrote to memory of 2676 1844 {5272C736-6665-419a-A971-D41712605834}.exe 38 PID 1844 wrote to memory of 2304 1844 {5272C736-6665-419a-A971-D41712605834}.exe 39 PID 1844 wrote to memory of 2304 1844 {5272C736-6665-419a-A971-D41712605834}.exe 39 PID 1844 wrote to memory of 2304 1844 {5272C736-6665-419a-A971-D41712605834}.exe 39 PID 1844 wrote to memory of 2304 1844 {5272C736-6665-419a-A971-D41712605834}.exe 39 PID 2676 wrote to memory of 2000 2676 {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe 40 PID 2676 wrote to memory of 2000 2676 {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe 40 PID 2676 wrote to memory of 2000 2676 {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe 40 PID 2676 wrote to memory of 2000 2676 {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe 40 PID 2676 wrote to memory of 2012 2676 {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe 41 PID 2676 wrote to memory of 2012 2676 {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe 41 PID 2676 wrote to memory of 2012 2676 {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe 41 PID 2676 wrote to memory of 2012 2676 {3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe 41 PID 2000 wrote to memory of 2316 2000 {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe 42 PID 2000 wrote to memory of 2316 2000 {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe 42 PID 2000 wrote to memory of 2316 2000 {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe 42 PID 2000 wrote to memory of 2316 2000 {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe 42 PID 2000 wrote to memory of 2844 2000 {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe 43 PID 2000 wrote to memory of 2844 2000 {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe 43 PID 2000 wrote to memory of 2844 2000 {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe 43 PID 2000 wrote to memory of 2844 2000 {6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe 43 PID 2316 wrote to memory of 1244 2316 {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe 44 PID 2316 wrote to memory of 1244 2316 {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe 44 PID 2316 wrote to memory of 1244 2316 {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe 44 PID 2316 wrote to memory of 1244 2316 {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe 44 PID 2316 wrote to memory of 756 2316 {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe 45 PID 2316 wrote to memory of 756 2316 {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe 45 PID 2316 wrote to memory of 756 2316 {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe 45 PID 2316 wrote to memory of 756 2316 {9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\{621B8106-E480-4bf9-B2EA-2AB878F88170}.exeC:\Windows\{621B8106-E480-4bf9-B2EA-2AB878F88170}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\{4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exeC:\Windows\{4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\{79168ADC-208A-4f40-9D84-A63217238C00}.exeC:\Windows\{79168ADC-208A-4f40-9D84-A63217238C00}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\{5272C736-6665-419a-A971-D41712605834}.exeC:\Windows\{5272C736-6665-419a-A971-D41712605834}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\{3DF53357-ADC8-4854-87B9-683E843B4DEF}.exeC:\Windows\{3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\{6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exeC:\Windows\{6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\{9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exeC:\Windows\{9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\{06A6A20E-A1B2-44fb-B657-39166FEC272D}.exeC:\Windows\{06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Windows\{0871750D-267F-4f59-81F9-7DD953F85466}.exeC:\Windows\{0871750D-267F-4f59-81F9-7DD953F85466}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Windows\{F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exeC:\Windows\{F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\{79BEF252-9709-4c6d-99E7-34E0B132613D}.exeC:\Windows\{79BEF252-9709-4c6d-99E7-34E0B132613D}.exe12⤵
- Executes dropped EXE
PID:960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4016~1.EXE > nul12⤵PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{08717~1.EXE > nul11⤵PID:768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06A6A~1.EXE > nul10⤵PID:1260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9A63C~1.EXE > nul9⤵PID:756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6711A~1.EXE > nul8⤵PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3DF53~1.EXE > nul7⤵PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5272C~1.EXE > nul6⤵PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79168~1.EXE > nul5⤵PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4DA67~1.EXE > nul4⤵PID:2480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{621B8~1.EXE > nul3⤵PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5dd7473118e0899fed5b5e3919b99444a
SHA1d8c1ec87b98eeda0dce3d49ec8fe34d2608278eb
SHA25686a7a50b9e14c4b3b3399f25f7099404fb788ff86ec07f7794d2f110943e80dc
SHA5129f651aa958fe3540990b835a4fbe7f5d298cb0cea41651a11565b47d1da8c4a48ee4631aef2968a81799b5d5659eef92f66b95dd78db7e55a64ba798f97c6455
-
Filesize
197KB
MD56c76e940480697e9eeda6e720f0cf7a2
SHA14d9ed1ef539aed5de615077c28d01d3b45459013
SHA2567ca9101f9b0b3118375a15fd4bea24c1d0fdb92bac8a1c5d05178dcffa4a7bf6
SHA5120da6407641d4e26dbe5e224d06a5aeee4cc032132e758616df220eb40e963f08170df70f94b3ba9eb96d4995760a8376215d44ee946a00907479e5c46c57e24c
-
Filesize
197KB
MD556caebb0ffc2d8c4b484c5ffd48bf883
SHA1f41126eeda15adca4ca05a65d627840cfc7640a2
SHA2560020b698d54c1a7319adf5ccc2ab3974082b0c93631dbc23c8b72b284d508ef4
SHA512c0ecf102a6f09e943fc9a74ab180b45555b7c12c3d0b55a370c8b711d2a7b10090573667ace863e6923d7bfad2eb4030050bd65edfa00991f49ea06538aa4cce
-
Filesize
197KB
MD52b6f154a6c85a88bcac2d235ccc5f66f
SHA1c7f3b5beb811f17e5e3f132b85b649ae01506fcd
SHA2565bb4b8766a59363610f1bd774bd06566a83f6976cc5876e4435bf10a25ce3d9c
SHA5120935c2801b2ec4b04569a8f282ec0e2a6892d4d1dfd23923f12c59ebd6c0f09fcf0d87720fcd3e5ce555f3826e75a27482efa636893c3a7d977966d70e207280
-
Filesize
197KB
MD5182168f20d7660dc06f69e652be244f1
SHA12a14e1b40a10f5b008373c054c8c5ea76c995e33
SHA2561b3de18a16462c5afa76ec6221159399d4947a43ba92b6847c357bda2d93340e
SHA512c47e9e2dc387ee71a66c92ae6e42fbdf7ca59783da1efa3d417c15ff864e12f40d2e3ac4997d8691b22ac5ed3474b4f37af86068dd221586fab5ee72eece165b
-
Filesize
197KB
MD50d4a3f9a6a21de76916a965f2e6a02e3
SHA18323b29db5c85a82f99a4f219217b22fb13e94ae
SHA2561a1496b360b3fcc547e5cfa23b2c04f42704be57f680184d1342cdd41d815778
SHA5125ed051f923078882789d7a937780a6d2dcc33533cbb192741d4b300773ad52cbe1b4e316bfbf72094c6fbadf4a7cfcc62448d649ced681fa1b6284a4e95861eb
-
Filesize
197KB
MD54f7bfb9e0ac833fbf5d14eab6309c631
SHA1fade97fe88c1942be57c72f4f66c88296cdadd29
SHA256547f28629aca7da3f9857452a662283ade3b77e5a051878e8411b76c61a1900f
SHA512103a9e29a5788a3ffb8ab371415ffd0dff094f4136304d4228d252766681fa411f193ef2105b13391ccc4ecd8b9f3c2698f734952d37eb17879f11e790d8d9d6
-
Filesize
197KB
MD55d5caef803d53940e4203a21b5649dd5
SHA1da295da85aeec4974aa9f8106b0081364d45a0a1
SHA2569510a42eccef11a00ff9ca705de48015c7b2ea3e9319ffbc32b2542c42de4237
SHA51277042fba9162bc8d2612046a13152ad3d226962a97ce7e2889fa0538f07b99a2908faef5e545e2bb2cbc5a6f70819b5ab3f1dd78351568b10f78922a1e835412
-
Filesize
197KB
MD5d0aa0de7ad3b47312a2113cd9ff7d895
SHA1f033cb14ab61f88f03aa5f239ed8ed54a855be21
SHA256550a8e3fbd3e946f51391e5129be8145e321f8cc5763030c7c83a3e757059902
SHA512d71538f291cbacb28e2a516f3cb6289af8e119726fbfab9c77ee8a1f5d4ba857772de34596b1f55e118659d775443cd9bfd49722b49d26f164e0185a598f4825
-
Filesize
197KB
MD5756cff69bc4dfb90400aeec720ef6efd
SHA162e6cf970d63ab902c8052cafc1ab0d980c3c063
SHA25649a7dc750a72bb835bb1bb90227733cc858c6e845eaf34784693193f7ad2e97a
SHA5126d4d6f51cc8d58415cdfb77a48ef8cf4db7ffc786ff2ed6b75fdb9db91c2f08d4f9f654cf44f72dc47daa3e39ef0dd79fced8fa158a51529e147cac846fd1f08
-
Filesize
197KB
MD5b0c388d6926965acd18bd257801e51dc
SHA135b3caebe9f62bbf828d2ca76ad9994efa76853f
SHA256df7babc3009460a83bba2e650ca5a6e1edd5b02f80c36ae363af974b6f963783
SHA512d8ca3d27428c927ae692e43f9c9d220d1da2b13bd29b67d8a714791746dda01ceacb6cd4e110baa0a155729af33add5e301d9815a7c881e3cc9cf5844b3a9a57