Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe
-
Size
380KB
-
MD5
f261b78d408c3b1e20ec18c19bfb31f5
-
SHA1
9514899cfa2f6d101b24cfb9c6717dab9e19d88f
-
SHA256
d05e89348d554c8a738889979a92ba2e9def43414be4b27a869294419aecdcc9
-
SHA512
dc36a70dc7ce5e6e1a7fda7c10f8f16ef76f5de3d687db4646d63eff8290eec733fc74c730728ef6afdd963c428c4ea697a93494b2803fb36fa8b7f48bf44fd3
-
SSDEEP
3072:mEGh0oGZlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEct:mEG8l7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c00000001224c-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000000f680-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001224c-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000000f680-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001224c-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001100000000f680-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001224c-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001200000000f680-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000001224c-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001300000000f680-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001100000001224c-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB3E3860-EB50-456b-BE7B-9D2C7E4DE617} 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{739D79D0-B91C-4e05-93F2-3E631C4C6946}\stubpath = "C:\\Windows\\{739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe" {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59C29CA0-FECC-4a8e-8860-15E18178AAA1} {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6A516EA-2502-49be-8C37-A652D52AA11A} {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7623F9F0-3E0D-43d8-8B66-590BF0EF16BF} {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3323CB39-E708-4874-A115-505754BE5ACF}\stubpath = "C:\\Windows\\{3323CB39-E708-4874-A115-505754BE5ACF}.exe" {6C751F79-B65C-4304-9C41-94628CC80500}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C751F79-B65C-4304-9C41-94628CC80500} {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}\stubpath = "C:\\Windows\\{EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe" 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{739D79D0-B91C-4e05-93F2-3E631C4C6946} {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59C29CA0-FECC-4a8e-8860-15E18178AAA1}\stubpath = "C:\\Windows\\{59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe" {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6A516EA-2502-49be-8C37-A652D52AA11A}\stubpath = "C:\\Windows\\{B6A516EA-2502-49be-8C37-A652D52AA11A}.exe" {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{31EAE2D6-0A89-4566-84DF-A068FC0B34F9} {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{31EAE2D6-0A89-4566-84DF-A068FC0B34F9}\stubpath = "C:\\Windows\\{31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe" {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}\stubpath = "C:\\Windows\\{7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe" {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3323CB39-E708-4874-A115-505754BE5ACF} {6C751F79-B65C-4304-9C41-94628CC80500}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46E7B387-715D-4763-82B8-8BEC21954971} {175DA91B-B807-43b7-B3ED-13E480EC87E2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9804B3C4-590D-46ff-A8F0-5C70ED4AE54C} {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C751F79-B65C-4304-9C41-94628CC80500}\stubpath = "C:\\Windows\\{6C751F79-B65C-4304-9C41-94628CC80500}.exe" {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{175DA91B-B807-43b7-B3ED-13E480EC87E2} {3323CB39-E708-4874-A115-505754BE5ACF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46E7B387-715D-4763-82B8-8BEC21954971}\stubpath = "C:\\Windows\\{46E7B387-715D-4763-82B8-8BEC21954971}.exe" {175DA91B-B807-43b7-B3ED-13E480EC87E2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}\stubpath = "C:\\Windows\\{9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe" {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{175DA91B-B807-43b7-B3ED-13E480EC87E2}\stubpath = "C:\\Windows\\{175DA91B-B807-43b7-B3ED-13E480EC87E2}.exe" {3323CB39-E708-4874-A115-505754BE5ACF}.exe -
Deletes itself 1 IoCs
pid Process 2244 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2308 {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe 2568 {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe 2608 {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe 2496 {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe 2600 {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe 3008 {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe 2036 {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe 1712 {6C751F79-B65C-4304-9C41-94628CC80500}.exe 1696 {3323CB39-E708-4874-A115-505754BE5ACF}.exe 780 {175DA91B-B807-43b7-B3ED-13E480EC87E2}.exe 1976 {46E7B387-715D-4763-82B8-8BEC21954971}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe File created C:\Windows\{9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe File created C:\Windows\{7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe File created C:\Windows\{6C751F79-B65C-4304-9C41-94628CC80500}.exe {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe File created C:\Windows\{3323CB39-E708-4874-A115-505754BE5ACF}.exe {6C751F79-B65C-4304-9C41-94628CC80500}.exe File created C:\Windows\{175DA91B-B807-43b7-B3ED-13E480EC87E2}.exe {3323CB39-E708-4874-A115-505754BE5ACF}.exe File created C:\Windows\{EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe File created C:\Windows\{739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe File created C:\Windows\{59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe File created C:\Windows\{B6A516EA-2502-49be-8C37-A652D52AA11A}.exe {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe File created C:\Windows\{46E7B387-715D-4763-82B8-8BEC21954971}.exe {175DA91B-B807-43b7-B3ED-13E480EC87E2}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2320 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe Token: SeIncBasePriorityPrivilege 2308 {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe Token: SeIncBasePriorityPrivilege 2568 {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe Token: SeIncBasePriorityPrivilege 2608 {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe Token: SeIncBasePriorityPrivilege 2496 {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe Token: SeIncBasePriorityPrivilege 2600 {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe Token: SeIncBasePriorityPrivilege 3008 {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe Token: SeIncBasePriorityPrivilege 2036 {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe Token: SeIncBasePriorityPrivilege 1712 {6C751F79-B65C-4304-9C41-94628CC80500}.exe Token: SeIncBasePriorityPrivilege 1696 {3323CB39-E708-4874-A115-505754BE5ACF}.exe Token: SeIncBasePriorityPrivilege 780 {175DA91B-B807-43b7-B3ED-13E480EC87E2}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2308 2320 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe 28 PID 2320 wrote to memory of 2308 2320 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe 28 PID 2320 wrote to memory of 2308 2320 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe 28 PID 2320 wrote to memory of 2308 2320 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe 28 PID 2320 wrote to memory of 2244 2320 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe 29 PID 2320 wrote to memory of 2244 2320 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe 29 PID 2320 wrote to memory of 2244 2320 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe 29 PID 2320 wrote to memory of 2244 2320 2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe 29 PID 2308 wrote to memory of 2568 2308 {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe 32 PID 2308 wrote to memory of 2568 2308 {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe 32 PID 2308 wrote to memory of 2568 2308 {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe 32 PID 2308 wrote to memory of 2568 2308 {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe 32 PID 2308 wrote to memory of 1964 2308 {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe 33 PID 2308 wrote to memory of 1964 2308 {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe 33 PID 2308 wrote to memory of 1964 2308 {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe 33 PID 2308 wrote to memory of 1964 2308 {EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe 33 PID 2568 wrote to memory of 2608 2568 {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe 34 PID 2568 wrote to memory of 2608 2568 {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe 34 PID 2568 wrote to memory of 2608 2568 {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe 34 PID 2568 wrote to memory of 2608 2568 {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe 34 PID 2568 wrote to memory of 2536 2568 {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe 35 PID 2568 wrote to memory of 2536 2568 {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe 35 PID 2568 wrote to memory of 2536 2568 {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe 35 PID 2568 wrote to memory of 2536 2568 {739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe 35 PID 2608 wrote to memory of 2496 2608 {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe 36 PID 2608 wrote to memory of 2496 2608 {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe 36 PID 2608 wrote to memory of 2496 2608 {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe 36 PID 2608 wrote to memory of 2496 2608 {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe 36 PID 2608 wrote to memory of 1148 2608 {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe 37 PID 2608 wrote to memory of 1148 2608 {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe 37 PID 2608 wrote to memory of 1148 2608 {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe 37 PID 2608 wrote to memory of 1148 2608 {59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe 37 PID 2496 wrote to memory of 2600 2496 {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe 38 PID 2496 wrote to memory of 2600 2496 {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe 38 PID 2496 wrote to memory of 2600 2496 {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe 38 PID 2496 wrote to memory of 2600 2496 {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe 38 PID 2496 wrote to memory of 2388 2496 {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe 39 PID 2496 wrote to memory of 2388 2496 {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe 39 PID 2496 wrote to memory of 2388 2496 {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe 39 PID 2496 wrote to memory of 2388 2496 {B6A516EA-2502-49be-8C37-A652D52AA11A}.exe 39 PID 2600 wrote to memory of 3008 2600 {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe 40 PID 2600 wrote to memory of 3008 2600 {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe 40 PID 2600 wrote to memory of 3008 2600 {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe 40 PID 2600 wrote to memory of 3008 2600 {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe 40 PID 2600 wrote to memory of 1240 2600 {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe 41 PID 2600 wrote to memory of 1240 2600 {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe 41 PID 2600 wrote to memory of 1240 2600 {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe 41 PID 2600 wrote to memory of 1240 2600 {31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe 41 PID 3008 wrote to memory of 2036 3008 {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe 42 PID 3008 wrote to memory of 2036 3008 {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe 42 PID 3008 wrote to memory of 2036 3008 {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe 42 PID 3008 wrote to memory of 2036 3008 {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe 42 PID 3008 wrote to memory of 1940 3008 {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe 43 PID 3008 wrote to memory of 1940 3008 {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe 43 PID 3008 wrote to memory of 1940 3008 {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe 43 PID 3008 wrote to memory of 1940 3008 {9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe 43 PID 2036 wrote to memory of 1712 2036 {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe 44 PID 2036 wrote to memory of 1712 2036 {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe 44 PID 2036 wrote to memory of 1712 2036 {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe 44 PID 2036 wrote to memory of 1712 2036 {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe 44 PID 2036 wrote to memory of 752 2036 {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe 45 PID 2036 wrote to memory of 752 2036 {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe 45 PID 2036 wrote to memory of 752 2036 {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe 45 PID 2036 wrote to memory of 752 2036 {7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-13_f261b78d408c3b1e20ec18c19bfb31f5_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\{EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exeC:\Windows\{EB3E3860-EB50-456b-BE7B-9D2C7E4DE617}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\{739D79D0-B91C-4e05-93F2-3E631C4C6946}.exeC:\Windows\{739D79D0-B91C-4e05-93F2-3E631C4C6946}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\{59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exeC:\Windows\{59C29CA0-FECC-4a8e-8860-15E18178AAA1}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\{B6A516EA-2502-49be-8C37-A652D52AA11A}.exeC:\Windows\{B6A516EA-2502-49be-8C37-A652D52AA11A}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\{31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exeC:\Windows\{31EAE2D6-0A89-4566-84DF-A068FC0B34F9}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\{9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exeC:\Windows\{9804B3C4-590D-46ff-A8F0-5C70ED4AE54C}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\{7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exeC:\Windows\{7623F9F0-3E0D-43d8-8B66-590BF0EF16BF}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\{6C751F79-B65C-4304-9C41-94628CC80500}.exeC:\Windows\{6C751F79-B65C-4304-9C41-94628CC80500}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1712 -
C:\Windows\{3323CB39-E708-4874-A115-505754BE5ACF}.exeC:\Windows\{3323CB39-E708-4874-A115-505754BE5ACF}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1696 -
C:\Windows\{175DA91B-B807-43b7-B3ED-13E480EC87E2}.exeC:\Windows\{175DA91B-B807-43b7-B3ED-13E480EC87E2}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:780 -
C:\Windows\{46E7B387-715D-4763-82B8-8BEC21954971}.exeC:\Windows\{46E7B387-715D-4763-82B8-8BEC21954971}.exe12⤵
- Executes dropped EXE
PID:1976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{175DA~1.EXE > nul12⤵PID:3044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3323C~1.EXE > nul11⤵PID:592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C751~1.EXE > nul10⤵PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7623F~1.EXE > nul9⤵PID:752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9804B~1.EXE > nul8⤵PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{31EAE~1.EXE > nul7⤵PID:1240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6A51~1.EXE > nul6⤵PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{59C29~1.EXE > nul5⤵PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{739D7~1.EXE > nul4⤵PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EB3E3~1.EXE > nul3⤵PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5db2fc581722305215bbc369d31bd444f
SHA1320299c61c7349789af51854f5a382f79ba663f0
SHA256d9ce02c29d484d2081658bd56d2a26c961d98dc5284deb9e301cdd07f0951955
SHA5128ecde8e433e4ecfa6ce584251ed053d8d181ea4d9bf92164b86f1ff01fe10ab2e3280c3f7e789800bea3821dde859382dbab8e6735e58b07e948540cce867b84
-
Filesize
380KB
MD5a50f96bc46505da664ecc12c7b2bb7d9
SHA100844252abcc3ada5ffcd3145045d3ae61c6d0cb
SHA256937fb4ff11ebbea7b6652ef4e1ed0c083020bc7197e524b8e6e4c32119398294
SHA5128bc933e1c759cf36b2aab1754d7aad79c98094e442fc54a9874077314b35255279e62596a67b8e5a993020c9f8f2c42e42a7e069529633683d43381af2d80464
-
Filesize
380KB
MD51b52b064f83ce9ec76e7e61d6594db74
SHA19d4adbdc35fa1f6c7ce3484aafa74d4af412bb10
SHA256ea4d84323e4ab0864a1a45a97616f5dfa4f59732243119b80ebed05b36d50267
SHA512080210c1e584aea5264fc770e639ef0eeae11cf5b1adb69a736dd09127dea61386455900378660ed750a06bf1f5119fc18f2fe40aece5ff9bd00a2241fdc397c
-
Filesize
380KB
MD55720a20d764bffc69731121a7dba8733
SHA103a9983048d3dab605118c5d18c0888677e89da4
SHA256d2d9b65e81b2edf79d1a7949b5260aa76766ea277be86641dc15ff3f51434b2a
SHA51253c5c7f1b16fd8d89f5b3911fa4a3c604565619d2fbde397368068e94f6c243e7a7616d89f1ecb4a3c17f1b8cf13ee3ea567e2b6b0373bd64ca029543ec1d947
-
Filesize
380KB
MD52a271836f4bb9b0570e558cc06ce227e
SHA1cda0c4218d3076367287c73131f5588cf203993d
SHA256f09a1a4a548d5163a7a67d9ffc337e563244888c71207b790641ffb373e51540
SHA5121a4bbed27cc320f0726b01e2184c19868a182632f2b045dd38f902917bbdaf00b5c4d16c9ac635f9189c9b73416f249318d875a2ec5d8beee680fae85e7e5d89
-
Filesize
380KB
MD5825a6bb9c49f4958ac09072d448d9174
SHA147a782f73ddb9224e47d8ab80f9bcef368ffb5b5
SHA256e86aa98604f95585b8f5475b114f9c658057736d8afb7f4819d7a340b4feff7b
SHA512a8fb18c6e71604a23f25456011c094c70ca865e4397c87e512359dbc4031d2d781b0e96352b646aad91aa8ad2b87609e59b4ba8d3da78fe159a2fc9b538ffde2
-
Filesize
380KB
MD56379470cd27620d1a0cf7755bf614e6d
SHA169d1c7ed27ea03641ed757fdfbb20b6180b3a5a2
SHA256aedcc9088876335e8eb38c068d20acadac81fb132102be4a474228574eae218d
SHA512391b53583a70156a5f6faf58c438526d58f6daee53f5e2a4add0c7e229d7b1614d02803f8f9e18b054494690d7bd9714cb1c6629cb2ad9205475d9e3a3dfb18f
-
Filesize
380KB
MD5978809487f83b2adf693486d0c595825
SHA1eb6ff36e497dfb151f85e63e671cc737a6e0989e
SHA2561bcba12551606c94067e32704b56d86de4bbd04d6aff6100b5d0f8f142feda61
SHA5123bc699a2d6490eb4ad9b2ea840e15c3658745eed2cfe76b4c9c0177434e26e53dbab20905893c9839dd4a33a501526590e34235d3fe89bff8c88f18d4c08ed97
-
Filesize
380KB
MD561db183784a8fe6becf040edcadfe4f6
SHA1ccd32d758dec96cd747a797efe6c6b99a76ec841
SHA25651e7e282e926772d5f26eb9d41322dba9d2dfea999a6f1bb92b51f1bc1b52c1f
SHA5127fcc543b21fbcfff5456b75205a65a10893b2aeaea5bfd4fa954fd5b4b96614f45ddde48400ef237d7b286e715827c8df588432a97a730bcb8a595e0cc38ac3c
-
Filesize
380KB
MD52e7b71a11feeb916c9a573f773de2ab7
SHA15f4be3e94464486ff2ab6cb4d7ef204b4f174c91
SHA25685825ff4a30d10f5c57e5a30254073a5b2ad005d034de5581aa3396277d599ed
SHA51282c5e5af47ee0cbc5332558d57f08c34321698aa55c5da01e48a1a9c7612712c4be5cd28964d79da925595772f8a8dcb53a127dac5f6f1da0317170e448bb6af
-
Filesize
380KB
MD5259c993b16fb7416139e01de9779795b
SHA1bddcbef8c31a5a4a179997ec42f44f376cac0585
SHA256f3c5a78029ee0f6f627d233e7922f9b7726ca434201e87f90131a8d0d38ee0fa
SHA512ec2d94d80708103bd5fc678917c884f8757517f228c8bcf04b938d4eee91b65ff75c0c9d8b5e7d44f1797d6a81aff521b0e18b144395a682796f52b6262c1c30