Analysis
-
max time kernel
160s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe
-
Size
197KB
-
MD5
93828db7f381bf70066d151df16c1dd0
-
SHA1
6b5c44e14822070775d2330dfdfad57afd247dde
-
SHA256
c171fc614da684e185f775c5dae17ff3ea1becedf2667df94f2b58b106ef0029
-
SHA512
ff7ffdb27bebb6901e338019909afd5660b0de2847642101c70ce7b1e7eaf30b0c3e8c627b935f8c52ffc6a8137dd20a9e1f205b79d7aa20632aca4d6e7a358a
-
SSDEEP
3072:jEGh0okl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGOlEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral2/files/0x0008000000023230-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002324c-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002334c-11.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023360-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002336a-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000233c4-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b0000000233c9-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002325a-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000233cd-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000233f0-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000234e1-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1EB6EE8A-CE50-41ee-A637-837BA0851E0D}\stubpath = "C:\\Windows\\{1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe" {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF026B59-1E1C-4fc3-9944-961C743E892B} {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6607CD11-3AFD-4963-B648-8911B5B72ADA} {AFD25213-8233-446e-B83B-C414F6440C45}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CFB75647-6AF2-433b-BD80-253D3F0AEF0D}\stubpath = "C:\\Windows\\{CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe" 2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3EA169E-B0F5-4767-851F-634B53461F37}\stubpath = "C:\\Windows\\{D3EA169E-B0F5-4767-851F-634B53461F37}.exe" {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F28B47F2-2296-4a08-8E9E-757AA534F7D3}\stubpath = "C:\\Windows\\{F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe" {D3EA169E-B0F5-4767-851F-634B53461F37}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34999EB7-72E4-4d72-9470-BAD347CAB229}\stubpath = "C:\\Windows\\{34999EB7-72E4-4d72-9470-BAD347CAB229}.exe" {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1EB6EE8A-CE50-41ee-A637-837BA0851E0D} {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA994D9C-9A20-4869-A5F5-D75B5617591B}\stubpath = "C:\\Windows\\{AA994D9C-9A20-4869-A5F5-D75B5617591B}.exe" {9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F28B47F2-2296-4a08-8E9E-757AA534F7D3} {D3EA169E-B0F5-4767-851F-634B53461F37}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AFD25213-8233-446e-B83B-C414F6440C45} {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AFD25213-8233-446e-B83B-C414F6440C45}\stubpath = "C:\\Windows\\{AFD25213-8233-446e-B83B-C414F6440C45}.exe" {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA994D9C-9A20-4869-A5F5-D75B5617591B} {9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CFB75647-6AF2-433b-BD80-253D3F0AEF0D} 2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3EA169E-B0F5-4767-851F-634B53461F37} {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{299A87AB-8710-4ab8-A41D-CB53D555328F}\stubpath = "C:\\Windows\\{299A87AB-8710-4ab8-A41D-CB53D555328F}.exe" {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF026B59-1E1C-4fc3-9944-961C743E892B}\stubpath = "C:\\Windows\\{CF026B59-1E1C-4fc3-9944-961C743E892B}.exe" {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E09E7B9-F210-4fec-B367-E1F951CDC386}\stubpath = "C:\\Windows\\{9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe" {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34999EB7-72E4-4d72-9470-BAD347CAB229} {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{299A87AB-8710-4ab8-A41D-CB53D555328F} {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6607CD11-3AFD-4963-B648-8911B5B72ADA}\stubpath = "C:\\Windows\\{6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe" {AFD25213-8233-446e-B83B-C414F6440C45}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E09E7B9-F210-4fec-B367-E1F951CDC386} {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe -
Executes dropped EXE 11 IoCs
pid Process 1028 {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe 560 {D3EA169E-B0F5-4767-851F-634B53461F37}.exe 2608 {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe 952 {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe 3972 {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe 440 {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe 4780 {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe 2228 {AFD25213-8233-446e-B83B-C414F6440C45}.exe 4784 {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe 1640 {9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe 3236 {AA994D9C-9A20-4869-A5F5-D75B5617591B}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe {D3EA169E-B0F5-4767-851F-634B53461F37}.exe File created C:\Windows\{299A87AB-8710-4ab8-A41D-CB53D555328F}.exe {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe File created C:\Windows\{1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe File created C:\Windows\{CF026B59-1E1C-4fc3-9944-961C743E892B}.exe {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe File created C:\Windows\{AFD25213-8233-446e-B83B-C414F6440C45}.exe {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe File created C:\Windows\{AA994D9C-9A20-4869-A5F5-D75B5617591B}.exe {9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe File created C:\Windows\{CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe 2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe File created C:\Windows\{D3EA169E-B0F5-4767-851F-634B53461F37}.exe {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe File created C:\Windows\{9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe File created C:\Windows\{34999EB7-72E4-4d72-9470-BAD347CAB229}.exe {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe File created C:\Windows\{6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe {AFD25213-8233-446e-B83B-C414F6440C45}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4032 2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe Token: SeIncBasePriorityPrivilege 1028 {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe Token: SeIncBasePriorityPrivilege 560 {D3EA169E-B0F5-4767-851F-634B53461F37}.exe Token: SeIncBasePriorityPrivilege 2608 {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe Token: SeIncBasePriorityPrivilege 952 {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe Token: SeIncBasePriorityPrivilege 3972 {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe Token: SeIncBasePriorityPrivilege 440 {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe Token: SeIncBasePriorityPrivilege 4780 {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe Token: SeIncBasePriorityPrivilege 2228 {AFD25213-8233-446e-B83B-C414F6440C45}.exe Token: SeIncBasePriorityPrivilege 4784 {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe Token: SeIncBasePriorityPrivilege 1640 {9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 1028 4032 2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe 95 PID 4032 wrote to memory of 1028 4032 2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe 95 PID 4032 wrote to memory of 1028 4032 2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe 95 PID 4032 wrote to memory of 4076 4032 2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe 96 PID 4032 wrote to memory of 4076 4032 2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe 96 PID 4032 wrote to memory of 4076 4032 2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe 96 PID 1028 wrote to memory of 560 1028 {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe 102 PID 1028 wrote to memory of 560 1028 {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe 102 PID 1028 wrote to memory of 560 1028 {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe 102 PID 1028 wrote to memory of 380 1028 {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe 103 PID 1028 wrote to memory of 380 1028 {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe 103 PID 1028 wrote to memory of 380 1028 {CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe 103 PID 560 wrote to memory of 2608 560 {D3EA169E-B0F5-4767-851F-634B53461F37}.exe 105 PID 560 wrote to memory of 2608 560 {D3EA169E-B0F5-4767-851F-634B53461F37}.exe 105 PID 560 wrote to memory of 2608 560 {D3EA169E-B0F5-4767-851F-634B53461F37}.exe 105 PID 560 wrote to memory of 4088 560 {D3EA169E-B0F5-4767-851F-634B53461F37}.exe 106 PID 560 wrote to memory of 4088 560 {D3EA169E-B0F5-4767-851F-634B53461F37}.exe 106 PID 560 wrote to memory of 4088 560 {D3EA169E-B0F5-4767-851F-634B53461F37}.exe 106 PID 2608 wrote to memory of 952 2608 {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe 109 PID 2608 wrote to memory of 952 2608 {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe 109 PID 2608 wrote to memory of 952 2608 {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe 109 PID 2608 wrote to memory of 5112 2608 {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe 110 PID 2608 wrote to memory of 5112 2608 {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe 110 PID 2608 wrote to memory of 5112 2608 {F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe 110 PID 952 wrote to memory of 3972 952 {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe 111 PID 952 wrote to memory of 3972 952 {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe 111 PID 952 wrote to memory of 3972 952 {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe 111 PID 952 wrote to memory of 4600 952 {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe 112 PID 952 wrote to memory of 4600 952 {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe 112 PID 952 wrote to memory of 4600 952 {34999EB7-72E4-4d72-9470-BAD347CAB229}.exe 112 PID 3972 wrote to memory of 440 3972 {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe 117 PID 3972 wrote to memory of 440 3972 {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe 117 PID 3972 wrote to memory of 440 3972 {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe 117 PID 3972 wrote to memory of 1312 3972 {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe 118 PID 3972 wrote to memory of 1312 3972 {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe 118 PID 3972 wrote to memory of 1312 3972 {299A87AB-8710-4ab8-A41D-CB53D555328F}.exe 118 PID 440 wrote to memory of 4780 440 {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe 120 PID 440 wrote to memory of 4780 440 {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe 120 PID 440 wrote to memory of 4780 440 {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe 120 PID 440 wrote to memory of 4376 440 {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe 121 PID 440 wrote to memory of 4376 440 {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe 121 PID 440 wrote to memory of 4376 440 {1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe 121 PID 4780 wrote to memory of 2228 4780 {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe 122 PID 4780 wrote to memory of 2228 4780 {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe 122 PID 4780 wrote to memory of 2228 4780 {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe 122 PID 4780 wrote to memory of 4008 4780 {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe 123 PID 4780 wrote to memory of 4008 4780 {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe 123 PID 4780 wrote to memory of 4008 4780 {CF026B59-1E1C-4fc3-9944-961C743E892B}.exe 123 PID 2228 wrote to memory of 4784 2228 {AFD25213-8233-446e-B83B-C414F6440C45}.exe 124 PID 2228 wrote to memory of 4784 2228 {AFD25213-8233-446e-B83B-C414F6440C45}.exe 124 PID 2228 wrote to memory of 4784 2228 {AFD25213-8233-446e-B83B-C414F6440C45}.exe 124 PID 2228 wrote to memory of 4508 2228 {AFD25213-8233-446e-B83B-C414F6440C45}.exe 125 PID 2228 wrote to memory of 4508 2228 {AFD25213-8233-446e-B83B-C414F6440C45}.exe 125 PID 2228 wrote to memory of 4508 2228 {AFD25213-8233-446e-B83B-C414F6440C45}.exe 125 PID 4784 wrote to memory of 1640 4784 {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe 126 PID 4784 wrote to memory of 1640 4784 {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe 126 PID 4784 wrote to memory of 1640 4784 {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe 126 PID 4784 wrote to memory of 4076 4784 {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe 127 PID 4784 wrote to memory of 4076 4784 {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe 127 PID 4784 wrote to memory of 4076 4784 {6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe 127 PID 1640 wrote to memory of 3236 1640 {9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe 128 PID 1640 wrote to memory of 3236 1640 {9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe 128 PID 1640 wrote to memory of 3236 1640 {9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe 128 PID 1640 wrote to memory of 1968 1640 {9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\{CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exeC:\Windows\{CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\{D3EA169E-B0F5-4767-851F-634B53461F37}.exeC:\Windows\{D3EA169E-B0F5-4767-851F-634B53461F37}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\{F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exeC:\Windows\{F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\{34999EB7-72E4-4d72-9470-BAD347CAB229}.exeC:\Windows\{34999EB7-72E4-4d72-9470-BAD347CAB229}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\{299A87AB-8710-4ab8-A41D-CB53D555328F}.exeC:\Windows\{299A87AB-8710-4ab8-A41D-CB53D555328F}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\{1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exeC:\Windows\{1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\{CF026B59-1E1C-4fc3-9944-961C743E892B}.exeC:\Windows\{CF026B59-1E1C-4fc3-9944-961C743E892B}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\{AFD25213-8233-446e-B83B-C414F6440C45}.exeC:\Windows\{AFD25213-8233-446e-B83B-C414F6440C45}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\{6607CD11-3AFD-4963-B648-8911B5B72ADA}.exeC:\Windows\{6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\{9E09E7B9-F210-4fec-B367-E1F951CDC386}.exeC:\Windows\{9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\{AA994D9C-9A20-4869-A5F5-D75B5617591B}.exeC:\Windows\{AA994D9C-9A20-4869-A5F5-D75B5617591B}.exe12⤵
- Executes dropped EXE
PID:3236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E09E~1.EXE > nul12⤵PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6607C~1.EXE > nul11⤵PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AFD25~1.EXE > nul10⤵PID:4508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CF026~1.EXE > nul9⤵PID:4008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1EB6E~1.EXE > nul8⤵PID:4376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{299A8~1.EXE > nul7⤵PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34999~1.EXE > nul6⤵PID:4600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F28B4~1.EXE > nul5⤵PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3EA1~1.EXE > nul4⤵PID:4088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CFB75~1.EXE > nul3⤵PID:380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD571ece801a3b732c093716dcc9162166b
SHA129a7e6fb7c1c0b13b80888ee911678f5a3c53d2f
SHA2561cb920e8dd46ed3d9f3b24a22272cca44afb4aba8d1b4915aa5cd81eb692ae47
SHA512d1c038c63821af6d15aed98dc69f4e6857bd52f68fb4801cc674b7ebf60cca8a81b839854e5462fcd24fa8d6f39fb876359c42bcadef31526e9ea7b3d08c15d8
-
Filesize
197KB
MD50226f666f7cc41613dff24f4ae0720c6
SHA1dffb5cf4e9654119446eb148c7f6dbde6930b9bd
SHA256ee8d4dd45c326ab0d28313c72d48419fee380b972641416ac5b57444d2bae1a1
SHA512829c2360bf4d2525ea1edf5a3475f21884cb6a0e31647b5aad102adcd2d03e59db5706570df41af632f46264f16764dce8b43019bf627688a63cbd930b15796b
-
Filesize
197KB
MD54e8a7c64b4c7ff4d3a5957fecef77e99
SHA12b11cea15dc36965b18b42a89085579041d50957
SHA25619bbd3abd4d4fed138db86e220565cd51c49b8686011dacda659bff9b0be0490
SHA5128a0fc6cc6134a5f43c6bbf7b59660ab0beb82abecdb87cdf56e2f9d7efb045aa150121ff34a64b6ec931df7aae86bad79d59aa7f3bebff52c6a187f3e84de38e
-
Filesize
197KB
MD590045364738aa6b1248547a40c3dd83e
SHA1a7fedfd67befc6de89122e7fe43e3b2f0e3f6989
SHA256d5a24ac3a0cde6d878908f977c4607b25c6f546e60dca9f46309bdccf5f58c4e
SHA512ecf8d3bc47f68ba5751773548ca262add4909c81fbb95a77dcedbd2f08500bfe4596886c0127b9a8cf4bd05a5eb3f08fe86aafef76b2692dea400ffa7838ff70
-
Filesize
197KB
MD5907fda39a3505299c4fe750de7a61149
SHA1f967c8e0a67a6660b21191ca367a4c8a2bdafaab
SHA256c36aac014037d886c648bfcadb45fcf53d7d73bdde01f9b628090a2c8683fce1
SHA51227316e743d7d9a297951428ff23fd6247d9c63d5e584b0981ef3f4b3c46dd865574a305fc79aa356a225cd425c92a2ee5f0edec31327bb37f5871456a3863ba8
-
Filesize
197KB
MD51affd3e4f2cc8dafce70b496be102762
SHA1816b7d1ac773a6e8fd4313580e9285a3565041d8
SHA256831242d03ed3cf4a45519e78812c3f550097deafb743683f1dc7adacd4083dfe
SHA51288ba778766c49c20db4497ee6995f99c65c71bcffdd273eb6676dfa5910395300b8bb619e606b0b0b97b9f2c066bbbbbfe4304b9171f004596d9ed7243975b8e
-
Filesize
197KB
MD5e026387b6fe6e27e902eb4c5e0747047
SHA10620482ef0c492eaa9f0f4b8710d391c7cf43878
SHA256166b9d80057f24f3350edf290d637fe5c10207225e239329e02a336607601455
SHA51262a623c3f452cf88d5e09f92d91ecd54bb719c6afbc08c233e9680def1073050d11c693bbe5e7b06fa63756614425b5e2f396b12876b6dfc13e193bf573721a4
-
Filesize
197KB
MD5103b412a7693e55e5561f9870d95352e
SHA1e454efacf906292f5dbad650c0d49d341c734194
SHA2567fa3b92f0f37aa085a7fff00da437abf4d86d71296805b6505e78bdc75988b87
SHA51255cc9a56db1f04565372d765dd6079fcef77659b8d3922f1d4b5b5f689e08fbf1621059c5d90ecce55eea25d865a320de6630ea7ccf9af80b0fa05505709f3ae
-
Filesize
197KB
MD5d5a018ddc5773edff16d0fdebbdc3b1d
SHA13e2f09de03228bfeab35a164606330518b5cf24e
SHA256e57e02a7d3d4e13e371b5da3bcca9655ddc5b9d5b95004ee95319ba24c26f1f8
SHA512fee35062f0c730d18f0f1bbdfc3ca604600db060d7042ce3461cf140a11d2dbc48cfd7094b47f216b0ff94b6979d7ac8984f6092cdd96002a64b198644540788
-
Filesize
197KB
MD53d1b458e034d4ccd27d2960be8f8755c
SHA1225b2dcddfb8ae5477f991eaafe991a29d716bb5
SHA2565d4bc81bf39e68717b01b7f6c2291d6d72886998006fd0973da1974fcca5d405
SHA51268deba62a91d0801e54edeca5a2c16665021db174ebc1560a384a82911dee4179cc5b4451c7c96d93fedeef064414733ed363febc4f48a2ed89f88c2a1cfc816
-
Filesize
197KB
MD57261bc7063d0fd742c72029ccd199612
SHA15a838996747e0343ed061d098ddbe72fdc8f4938
SHA25641fcedcd24e61cc6ff0a999dfdeb21a4399ce5d0c16024293463510d98597d0e
SHA5128bebd34ac35e0fe2dcc4b1aadfd89d36a9b970bab2b7742e8cfdc84c551acb6ac33b948ac82d923f459c0e123fc71708b0e7603da63e6be73f9c8d7bab0ef682