Analysis
-
max time kernel
168s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 08:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe
-
Size
380KB
-
MD5
aa5b4e69f65f4c40bb82eb38fbfa2884
-
SHA1
9281fa547640478410faf17ce58776d6f0dcf915
-
SHA256
cffbbea26e94db4d5db9a26d676f25d725268e6d4fe3c7a689aa297ac13f657d
-
SHA512
cbd9752cbd41ca4b0843a47d081f91b98cbc43049a48e5cd430f8882536e261723ee58acefbcefc23211111170628958c10c2adac6aaa2843cef6ea3a6d2cce3
-
SSDEEP
3072:mEGh0oclPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGil7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral2/files/0x000b000000023129-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002314b-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b00000002313e-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000001e80b-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023235-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023238-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002323e-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023240-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002323e-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023226-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002321d-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EFB2B7CB-BEEF-4cec-B415-FCB0532AF943} {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}\stubpath = "C:\\Windows\\{EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe" {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1366475-159A-434f-A276-E341323F4C3D}\stubpath = "C:\\Windows\\{C1366475-159A-434f-A276-E341323F4C3D}.exe" {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{887F9FF8-6079-4ef9-BD46-D4B00F0C40FE} {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{30F7F16F-04D7-4bed-8236-7C489FD1AE75} {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}\stubpath = "C:\\Windows\\{A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe" {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4540CD0-636D-4f25-AC26-D73B79B89DC7} {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C2651621-97E7-4c67-94DD-3CC20190005E} {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C2651621-97E7-4c67-94DD-3CC20190005E}\stubpath = "C:\\Windows\\{C2651621-97E7-4c67-94DD-3CC20190005E}.exe" {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2A9AB17-0FA1-435a-8F6B-864D1F7FD246} {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7A256BDF-D187-4e70-9C52-DA74B6678D67} 2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B063D45-5E37-4320-BF0E-D4330E1AAD00} {C2651621-97E7-4c67-94DD-3CC20190005E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B063D45-5E37-4320-BF0E-D4330E1AAD00}\stubpath = "C:\\Windows\\{9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe" {C2651621-97E7-4c67-94DD-3CC20190005E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1366475-159A-434f-A276-E341323F4C3D} {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8BCC95C1-A5FF-4f4e-9D69-F5494E929789} {A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7A256BDF-D187-4e70-9C52-DA74B6678D67}\stubpath = "C:\\Windows\\{7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe" 2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3} {C1366475-159A-434f-A276-E341323F4C3D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}\stubpath = "C:\\Windows\\{09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe" {C1366475-159A-434f-A276-E341323F4C3D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}\stubpath = "C:\\Windows\\{887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe" {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{30F7F16F-04D7-4bed-8236-7C489FD1AE75}\stubpath = "C:\\Windows\\{30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe" {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8BCC95C1-A5FF-4f4e-9D69-F5494E929789}\stubpath = "C:\\Windows\\{8BCC95C1-A5FF-4f4e-9D69-F5494E929789}.exe" {A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4540CD0-636D-4f25-AC26-D73B79B89DC7}\stubpath = "C:\\Windows\\{E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe" {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe -
Executes dropped EXE 11 IoCs
pid Process 3772 {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe 1492 {C2651621-97E7-4c67-94DD-3CC20190005E}.exe 4744 {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe 5108 {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe 1832 {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe 3248 {C1366475-159A-434f-A276-E341323F4C3D}.exe 628 {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe 4128 {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe 4888 {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe 2352 {A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe 4052 {8BCC95C1-A5FF-4f4e-9D69-F5494E929789}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{8BCC95C1-A5FF-4f4e-9D69-F5494E929789}.exe {A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe File created C:\Windows\{E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe File created C:\Windows\{A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe File created C:\Windows\{9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe {C2651621-97E7-4c67-94DD-3CC20190005E}.exe File created C:\Windows\{EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe File created C:\Windows\{C1366475-159A-434f-A276-E341323F4C3D}.exe {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe File created C:\Windows\{09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe {C1366475-159A-434f-A276-E341323F4C3D}.exe File created C:\Windows\{887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe File created C:\Windows\{30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe File created C:\Windows\{7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe 2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe File created C:\Windows\{C2651621-97E7-4c67-94DD-3CC20190005E}.exe {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2908 2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe Token: SeIncBasePriorityPrivilege 3772 {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe Token: SeIncBasePriorityPrivilege 1492 {C2651621-97E7-4c67-94DD-3CC20190005E}.exe Token: SeIncBasePriorityPrivilege 4744 {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe Token: SeIncBasePriorityPrivilege 5108 {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe Token: SeIncBasePriorityPrivilege 1832 {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe Token: SeIncBasePriorityPrivilege 3248 {C1366475-159A-434f-A276-E341323F4C3D}.exe Token: SeIncBasePriorityPrivilege 628 {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe Token: SeIncBasePriorityPrivilege 4128 {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe Token: SeIncBasePriorityPrivilege 4888 {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe Token: SeIncBasePriorityPrivilege 2352 {A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3772 2908 2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe 93 PID 2908 wrote to memory of 3772 2908 2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe 93 PID 2908 wrote to memory of 3772 2908 2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe 93 PID 2908 wrote to memory of 5060 2908 2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe 94 PID 2908 wrote to memory of 5060 2908 2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe 94 PID 2908 wrote to memory of 5060 2908 2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe 94 PID 3772 wrote to memory of 1492 3772 {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe 96 PID 3772 wrote to memory of 1492 3772 {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe 96 PID 3772 wrote to memory of 1492 3772 {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe 96 PID 3772 wrote to memory of 1940 3772 {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe 97 PID 3772 wrote to memory of 1940 3772 {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe 97 PID 3772 wrote to memory of 1940 3772 {7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe 97 PID 1492 wrote to memory of 4744 1492 {C2651621-97E7-4c67-94DD-3CC20190005E}.exe 103 PID 1492 wrote to memory of 4744 1492 {C2651621-97E7-4c67-94DD-3CC20190005E}.exe 103 PID 1492 wrote to memory of 4744 1492 {C2651621-97E7-4c67-94DD-3CC20190005E}.exe 103 PID 1492 wrote to memory of 4084 1492 {C2651621-97E7-4c67-94DD-3CC20190005E}.exe 104 PID 1492 wrote to memory of 4084 1492 {C2651621-97E7-4c67-94DD-3CC20190005E}.exe 104 PID 1492 wrote to memory of 4084 1492 {C2651621-97E7-4c67-94DD-3CC20190005E}.exe 104 PID 4744 wrote to memory of 5108 4744 {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe 113 PID 4744 wrote to memory of 5108 4744 {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe 113 PID 4744 wrote to memory of 5108 4744 {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe 113 PID 4744 wrote to memory of 4484 4744 {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe 114 PID 4744 wrote to memory of 4484 4744 {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe 114 PID 4744 wrote to memory of 4484 4744 {9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe 114 PID 5108 wrote to memory of 1832 5108 {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe 117 PID 5108 wrote to memory of 1832 5108 {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe 117 PID 5108 wrote to memory of 1832 5108 {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe 117 PID 5108 wrote to memory of 4220 5108 {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe 118 PID 5108 wrote to memory of 4220 5108 {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe 118 PID 5108 wrote to memory of 4220 5108 {E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe 118 PID 1832 wrote to memory of 3248 1832 {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe 119 PID 1832 wrote to memory of 3248 1832 {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe 119 PID 1832 wrote to memory of 3248 1832 {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe 119 PID 1832 wrote to memory of 3372 1832 {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe 120 PID 1832 wrote to memory of 3372 1832 {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe 120 PID 1832 wrote to memory of 3372 1832 {EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe 120 PID 3248 wrote to memory of 628 3248 {C1366475-159A-434f-A276-E341323F4C3D}.exe 121 PID 3248 wrote to memory of 628 3248 {C1366475-159A-434f-A276-E341323F4C3D}.exe 121 PID 3248 wrote to memory of 628 3248 {C1366475-159A-434f-A276-E341323F4C3D}.exe 121 PID 3248 wrote to memory of 2236 3248 {C1366475-159A-434f-A276-E341323F4C3D}.exe 122 PID 3248 wrote to memory of 2236 3248 {C1366475-159A-434f-A276-E341323F4C3D}.exe 122 PID 3248 wrote to memory of 2236 3248 {C1366475-159A-434f-A276-E341323F4C3D}.exe 122 PID 628 wrote to memory of 4128 628 {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe 124 PID 628 wrote to memory of 4128 628 {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe 124 PID 628 wrote to memory of 4128 628 {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe 124 PID 628 wrote to memory of 4484 628 {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe 125 PID 628 wrote to memory of 4484 628 {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe 125 PID 628 wrote to memory of 4484 628 {09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe 125 PID 4128 wrote to memory of 4888 4128 {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe 126 PID 4128 wrote to memory of 4888 4128 {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe 126 PID 4128 wrote to memory of 4888 4128 {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe 126 PID 4128 wrote to memory of 2416 4128 {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe 127 PID 4128 wrote to memory of 2416 4128 {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe 127 PID 4128 wrote to memory of 2416 4128 {887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe 127 PID 4888 wrote to memory of 2352 4888 {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe 129 PID 4888 wrote to memory of 2352 4888 {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe 129 PID 4888 wrote to memory of 2352 4888 {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe 129 PID 4888 wrote to memory of 3804 4888 {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe 130 PID 4888 wrote to memory of 3804 4888 {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe 130 PID 4888 wrote to memory of 3804 4888 {30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe 130 PID 2352 wrote to memory of 4052 2352 {A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe 135 PID 2352 wrote to memory of 4052 2352 {A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe 135 PID 2352 wrote to memory of 4052 2352 {A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe 135 PID 2352 wrote to memory of 3088 2352 {A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_aa5b4e69f65f4c40bb82eb38fbfa2884_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\{7A256BDF-D187-4e70-9C52-DA74B6678D67}.exeC:\Windows\{7A256BDF-D187-4e70-9C52-DA74B6678D67}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\{C2651621-97E7-4c67-94DD-3CC20190005E}.exeC:\Windows\{C2651621-97E7-4c67-94DD-3CC20190005E}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\{9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exeC:\Windows\{9B063D45-5E37-4320-BF0E-D4330E1AAD00}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\{E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exeC:\Windows\{E4540CD0-636D-4f25-AC26-D73B79B89DC7}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\{EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exeC:\Windows\{EFB2B7CB-BEEF-4cec-B415-FCB0532AF943}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\{C1366475-159A-434f-A276-E341323F4C3D}.exeC:\Windows\{C1366475-159A-434f-A276-E341323F4C3D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\{09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exeC:\Windows\{09BB3B2D-09A9-45a1-96B8-8F94B3EE34C3}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\{887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exeC:\Windows\{887F9FF8-6079-4ef9-BD46-D4B00F0C40FE}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\{30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exeC:\Windows\{30F7F16F-04D7-4bed-8236-7C489FD1AE75}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\{A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exeC:\Windows\{A2A9AB17-0FA1-435a-8F6B-864D1F7FD246}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\{8BCC95C1-A5FF-4f4e-9D69-F5494E929789}.exeC:\Windows\{8BCC95C1-A5FF-4f4e-9D69-F5494E929789}.exe12⤵
- Executes dropped EXE
PID:4052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A2A9A~1.EXE > nul12⤵PID:3088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{30F7F~1.EXE > nul11⤵PID:3804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{887F9~1.EXE > nul10⤵PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{09BB3~1.EXE > nul9⤵PID:4484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C1366~1.EXE > nul8⤵PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EFB2B~1.EXE > nul7⤵PID:3372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E4540~1.EXE > nul6⤵PID:4220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9B063~1.EXE > nul5⤵PID:4484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2651~1.EXE > nul4⤵PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7A256~1.EXE > nul3⤵PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:5060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5590d06baa2cdd38227e1e8649a793be5
SHA1dabf6fa2885e926a60240b7d91e8c01e683ffbde
SHA25639891afb6c72be781bf080e3262eda3f5311100be9d61a2624ae31f805949eae
SHA512a18bb40f3cc1f99a68ec042ae7485b9db7f11e8bdb3d2e982efc38fdcf1e5965b5eb3903e93c3a71dbdb633b056436f5715aa8f8a9de3bd836536d29c2ade0d2
-
Filesize
380KB
MD57def4d7ad16854ac2778bfe5ffb50881
SHA1600b40c137de1d48e747c7b6f476c374dfa461d7
SHA2560593486380935bd2d5cfab4ffc2cc4d8a0e4643279aa57ae81c776485aa56353
SHA51287a9a829b619ac0dc22c7cdbe9001b89f8f2d2b5059bdac91cc8b5f614ad23cd9057f7b524653788d1e9a6f11c5dbb1003618b39a8c474aa26436697aa37c129
-
Filesize
380KB
MD573d154f6546f4bc907b6ccf6394c84c2
SHA1c7f097e879b14b7f93bb791bb0d9747e574f08ce
SHA25602bae316be497f3e156f71ddbc138d26192b37927e25181d624e0bbc778c1b72
SHA5122a42f4b5c28c99d22c34500bc1337a9674bf1c73e85115287616d030afbf6a452896d71a0988891c426836aabe6ab6a5c11b138b14561cb63bb6fe5af5d1a05a
-
Filesize
380KB
MD5f658760dc02c600009ec72011cedd04a
SHA1dcbd2ccda0822789e8ffd88bb378ebff9c7c1b1c
SHA25643ef84873e17772d465c3eef1f1efbe5e47481125a6651e8f0b548978b61c114
SHA512636042c9360480a95527914f0aab80f520b90d63b179223400cfd39019532465fa335c6644332c723636769acf20fdda0acfd1f00712dc33deaeadc165db8639
-
Filesize
380KB
MD5d13c2012deb657921963f7bfb30a5596
SHA17f533cb46f48bdad681e3d5b48d0556bacdc8ffc
SHA2562f158509dd009e61c9e061910e5730e784e428bf81d3eb7b5eed5b4676562095
SHA51216b7f9d1a474cf86fab6954b574808b09396e657d031f904a8b8a10e85d32ef838bff8297b72b4fb8988d341d1f8d9abce1281373a2500076223bdeab5724c44
-
Filesize
380KB
MD5b4623bd669d7e6be19f85a100290bc39
SHA1cc91783c91540acd1b0f0a9128c7633b30119607
SHA2568ae56f474b6fae54c0ca42cf8342397efdd4ef6cbe4e5d4fe98678ad185c96a3
SHA5123fbd0250f085b65d134d4599351b8a1ceb104f3e0e053db291b467ae0709bd01b17dee2cdc9393e00e0b3c4b60d0289e838e38a24f1f3d57fb51fd61c9579194
-
Filesize
380KB
MD55e0e1b9b04bc98ccd5c3ca1f24f018fa
SHA1680ccb2c71b846f8b22fbd5ddb26cc47ee90969e
SHA256000b221bdff1175f4c34e775eedfa5ffab58dbc19f4bb11fa9df2b4cf16a002c
SHA5128c2e5ded8515e52324132218d94454253fbaf13c2bb2558eea332c4b6d232bccccd84927eb0bd70d89fe5c9a9e525128e69598bdb0e0c95994e3e72e666b0558
-
Filesize
380KB
MD58648e513271fc9179f75e66eb2aeabfe
SHA1deb428c6541587d0ef9f919777a5ee71c8419dab
SHA25637f3119a3f9a50c2501c819274beac5aeb813ce53e4556d32943fe6939282150
SHA5124edacf9651616944cf5ccb050fedda87c4d77bc50f41431db7f287aee04b0d0dba082035f123c44445968c0f4e8e880f388d4946c99572439cec57075dd8f7f3
-
Filesize
380KB
MD53b0b17e0a74bd51fe2acc02382bbd7f2
SHA127d6c615f61fc208fa110673fb4bdd294f0c0699
SHA25614f3613ede07e7a9160489c377a752b599732c990e039aad2b88b0ea3231e864
SHA512cce4d0097130756f1d4ebf77e8b88ca61a4486c49d1bbc4e0a4a3d3203929e053b52882d876e0e94a7e511f71cc9df4cd83048a1c2923913da5c1ec712691515
-
Filesize
380KB
MD5c11b3e116d50ce45c3c58e8e88f2a4f7
SHA1fd73ebce730a39c1bd425a99b0d6ca9fc0722d11
SHA2563bffb81821722269663c10ba53b6b0ea32542c7266f1bef919ec7076df193d88
SHA51233fdb9542e56037be315676f5833f02a57b401ad653e612f5839ca686c57d562d2453df7754ce39a5e9a1009c4034bbd63308c37e890d015488fb17611bc8029
-
Filesize
380KB
MD58dcde8c9748b7df32623f87a0fcf6193
SHA1f97143b4134cc6f57d29ca3842afd3b1ef08cadc
SHA256781abdc5e1a33d68a2fefba061e636cdc18144762181f6ef96f79bc79e9a16f4
SHA512bfda59e5e0ef06ae220f8951e03e10c53c9c22a8706ddfc9f53e2e7a4ccfcb24c77acb627e3f9de32629edd826ac1ea240481844bb503777133da785ccb342cd