Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe
-
Size
168KB
-
MD5
4dba82785e0dd624a54aefff80d5f727
-
SHA1
d01cc83362eb22e85ed1f4260355ac26604d0175
-
SHA256
c612231a378e24264d18db0e4a68f3efe8b615fbe4daad73b63b5d5b01b94fb2
-
SHA512
dc6bd9ad68ef855e3ac6ee9ee2ae88a183c4ca715d6e9c45e54ee27ba2b75fc620f11f20b033b2de0baba03b5ce1776b8ab7036813e71b00550dca188e5c7bba
-
SSDEEP
1536:1EGh0oSlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oSlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0007000000023204-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023219-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023321-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000001e743-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000216c9-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002338d-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a0000000216c9-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000233b6-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000234a5-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000234aa-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a00000002311a-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023120-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2EBC06DE-227C-46c3-8C6C-70F285234BDD} {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}\stubpath = "C:\\Windows\\{7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe" {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DB082315-8198-4371-B540-83E07D4077DB} {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F220AD25-6F7B-4ac4-8438-C2D148AA17CB}\stubpath = "C:\\Windows\\{F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe" {DB082315-8198-4371-B540-83E07D4077DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{022ADB33-7FA6-485a-A81D-EA0417551250} {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{679822CD-21A3-4fe8-A104-223802B3DE7B} {022ADB33-7FA6-485a-A81D-EA0417551250}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6671BF6C-9F4F-4b87-A437-4D948BFC4971}\stubpath = "C:\\Windows\\{6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe" 2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2EBC06DE-227C-46c3-8C6C-70F285234BDD}\stubpath = "C:\\Windows\\{2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe" {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7573CFD4-15CD-4bcc-83C6-15F8164B9EB6} {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DB082315-8198-4371-B540-83E07D4077DB}\stubpath = "C:\\Windows\\{DB082315-8198-4371-B540-83E07D4077DB}.exe" {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F220AD25-6F7B-4ac4-8438-C2D148AA17CB} {DB082315-8198-4371-B540-83E07D4077DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1B60F5E-1BF9-445a-A4A1-6CA813BB874B} {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}\stubpath = "C:\\Windows\\{C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe" {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8C74177-1689-4c93-B45C-6D3533D2A805} {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A181157-BBA4-42ae-B1A8-8C9859488751} {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A181157-BBA4-42ae-B1A8-8C9859488751}\stubpath = "C:\\Windows\\{1A181157-BBA4-42ae-B1A8-8C9859488751}.exe" {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6671BF6C-9F4F-4b87-A437-4D948BFC4971} 2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8C74177-1689-4c93-B45C-6D3533D2A805}\stubpath = "C:\\Windows\\{A8C74177-1689-4c93-B45C-6D3533D2A805}.exe" {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{528A3E1F-1E63-4575-BC61-9C196B2B5381} {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{528A3E1F-1E63-4575-BC61-9C196B2B5381}\stubpath = "C:\\Windows\\{528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe" {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{022ADB33-7FA6-485a-A81D-EA0417551250}\stubpath = "C:\\Windows\\{022ADB33-7FA6-485a-A81D-EA0417551250}.exe" {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{679822CD-21A3-4fe8-A104-223802B3DE7B}\stubpath = "C:\\Windows\\{679822CD-21A3-4fe8-A104-223802B3DE7B}.exe" {022ADB33-7FA6-485a-A81D-EA0417551250}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B67F2F8A-6756-42b0-AE2F-067154728064} {679822CD-21A3-4fe8-A104-223802B3DE7B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B67F2F8A-6756-42b0-AE2F-067154728064}\stubpath = "C:\\Windows\\{B67F2F8A-6756-42b0-AE2F-067154728064}.exe" {679822CD-21A3-4fe8-A104-223802B3DE7B}.exe -
Executes dropped EXE 12 IoCs
pid Process 3556 {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe 3592 {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe 4928 {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe 4896 {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe 3908 {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe 3436 {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe 4544 {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe 1556 {DB082315-8198-4371-B540-83E07D4077DB}.exe 2532 {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe 1644 {022ADB33-7FA6-485a-A81D-EA0417551250}.exe 4996 {679822CD-21A3-4fe8-A104-223802B3DE7B}.exe 1724 {B67F2F8A-6756-42b0-AE2F-067154728064}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{022ADB33-7FA6-485a-A81D-EA0417551250}.exe {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe File created C:\Windows\{B67F2F8A-6756-42b0-AE2F-067154728064}.exe {679822CD-21A3-4fe8-A104-223802B3DE7B}.exe File created C:\Windows\{6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe 2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe File created C:\Windows\{7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe File created C:\Windows\{1A181157-BBA4-42ae-B1A8-8C9859488751}.exe {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe File created C:\Windows\{DB082315-8198-4371-B540-83E07D4077DB}.exe {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe File created C:\Windows\{F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe {DB082315-8198-4371-B540-83E07D4077DB}.exe File created C:\Windows\{2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe File created C:\Windows\{C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe File created C:\Windows\{A8C74177-1689-4c93-B45C-6D3533D2A805}.exe {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe File created C:\Windows\{528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe File created C:\Windows\{679822CD-21A3-4fe8-A104-223802B3DE7B}.exe {022ADB33-7FA6-485a-A81D-EA0417551250}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4692 2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe Token: SeIncBasePriorityPrivilege 3556 {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe Token: SeIncBasePriorityPrivilege 3592 {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe Token: SeIncBasePriorityPrivilege 4928 {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe Token: SeIncBasePriorityPrivilege 4896 {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe Token: SeIncBasePriorityPrivilege 3908 {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe Token: SeIncBasePriorityPrivilege 3436 {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe Token: SeIncBasePriorityPrivilege 4544 {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe Token: SeIncBasePriorityPrivilege 1556 {DB082315-8198-4371-B540-83E07D4077DB}.exe Token: SeIncBasePriorityPrivilege 2532 {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe Token: SeIncBasePriorityPrivilege 1644 {022ADB33-7FA6-485a-A81D-EA0417551250}.exe Token: SeIncBasePriorityPrivilege 4996 {679822CD-21A3-4fe8-A104-223802B3DE7B}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3556 4692 2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe 99 PID 4692 wrote to memory of 3556 4692 2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe 99 PID 4692 wrote to memory of 3556 4692 2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe 99 PID 4692 wrote to memory of 4512 4692 2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe 100 PID 4692 wrote to memory of 4512 4692 2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe 100 PID 4692 wrote to memory of 4512 4692 2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe 100 PID 3556 wrote to memory of 3592 3556 {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe 101 PID 3556 wrote to memory of 3592 3556 {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe 101 PID 3556 wrote to memory of 3592 3556 {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe 101 PID 3556 wrote to memory of 1664 3556 {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe 102 PID 3556 wrote to memory of 1664 3556 {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe 102 PID 3556 wrote to memory of 1664 3556 {6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe 102 PID 3592 wrote to memory of 4928 3592 {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe 105 PID 3592 wrote to memory of 4928 3592 {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe 105 PID 3592 wrote to memory of 4928 3592 {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe 105 PID 3592 wrote to memory of 5008 3592 {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe 106 PID 3592 wrote to memory of 5008 3592 {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe 106 PID 3592 wrote to memory of 5008 3592 {2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe 106 PID 4928 wrote to memory of 4896 4928 {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe 108 PID 4928 wrote to memory of 4896 4928 {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe 108 PID 4928 wrote to memory of 4896 4928 {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe 108 PID 4928 wrote to memory of 4732 4928 {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe 109 PID 4928 wrote to memory of 4732 4928 {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe 109 PID 4928 wrote to memory of 4732 4928 {C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe 109 PID 4896 wrote to memory of 3908 4896 {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe 110 PID 4896 wrote to memory of 3908 4896 {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe 110 PID 4896 wrote to memory of 3908 4896 {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe 110 PID 4896 wrote to memory of 1540 4896 {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe 111 PID 4896 wrote to memory of 1540 4896 {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe 111 PID 4896 wrote to memory of 1540 4896 {A8C74177-1689-4c93-B45C-6D3533D2A805}.exe 111 PID 3908 wrote to memory of 3436 3908 {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe 113 PID 3908 wrote to memory of 3436 3908 {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe 113 PID 3908 wrote to memory of 3436 3908 {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe 113 PID 3908 wrote to memory of 3420 3908 {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe 114 PID 3908 wrote to memory of 3420 3908 {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe 114 PID 3908 wrote to memory of 3420 3908 {528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe 114 PID 3436 wrote to memory of 4544 3436 {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe 115 PID 3436 wrote to memory of 4544 3436 {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe 115 PID 3436 wrote to memory of 4544 3436 {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe 115 PID 3436 wrote to memory of 4244 3436 {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe 116 PID 3436 wrote to memory of 4244 3436 {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe 116 PID 3436 wrote to memory of 4244 3436 {7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe 116 PID 4544 wrote to memory of 1556 4544 {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe 117 PID 4544 wrote to memory of 1556 4544 {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe 117 PID 4544 wrote to memory of 1556 4544 {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe 117 PID 4544 wrote to memory of 4324 4544 {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe 118 PID 4544 wrote to memory of 4324 4544 {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe 118 PID 4544 wrote to memory of 4324 4544 {1A181157-BBA4-42ae-B1A8-8C9859488751}.exe 118 PID 1556 wrote to memory of 2532 1556 {DB082315-8198-4371-B540-83E07D4077DB}.exe 121 PID 1556 wrote to memory of 2532 1556 {DB082315-8198-4371-B540-83E07D4077DB}.exe 121 PID 1556 wrote to memory of 2532 1556 {DB082315-8198-4371-B540-83E07D4077DB}.exe 121 PID 1556 wrote to memory of 2152 1556 {DB082315-8198-4371-B540-83E07D4077DB}.exe 122 PID 1556 wrote to memory of 2152 1556 {DB082315-8198-4371-B540-83E07D4077DB}.exe 122 PID 1556 wrote to memory of 2152 1556 {DB082315-8198-4371-B540-83E07D4077DB}.exe 122 PID 2532 wrote to memory of 1644 2532 {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe 125 PID 2532 wrote to memory of 1644 2532 {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe 125 PID 2532 wrote to memory of 1644 2532 {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe 125 PID 2532 wrote to memory of 2228 2532 {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe 126 PID 2532 wrote to memory of 2228 2532 {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe 126 PID 2532 wrote to memory of 2228 2532 {F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe 126 PID 1644 wrote to memory of 4996 1644 {022ADB33-7FA6-485a-A81D-EA0417551250}.exe 132 PID 1644 wrote to memory of 4996 1644 {022ADB33-7FA6-485a-A81D-EA0417551250}.exe 132 PID 1644 wrote to memory of 4996 1644 {022ADB33-7FA6-485a-A81D-EA0417551250}.exe 132 PID 1644 wrote to memory of 4460 1644 {022ADB33-7FA6-485a-A81D-EA0417551250}.exe 133
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_4dba82785e0dd624a54aefff80d5f727_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\{6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exeC:\Windows\{6671BF6C-9F4F-4b87-A437-4D948BFC4971}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\{2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exeC:\Windows\{2EBC06DE-227C-46c3-8C6C-70F285234BDD}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\{C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exeC:\Windows\{C1B60F5E-1BF9-445a-A4A1-6CA813BB874B}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\{A8C74177-1689-4c93-B45C-6D3533D2A805}.exeC:\Windows\{A8C74177-1689-4c93-B45C-6D3533D2A805}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\{528A3E1F-1E63-4575-BC61-9C196B2B5381}.exeC:\Windows\{528A3E1F-1E63-4575-BC61-9C196B2B5381}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\{7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exeC:\Windows\{7573CFD4-15CD-4bcc-83C6-15F8164B9EB6}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\{1A181157-BBA4-42ae-B1A8-8C9859488751}.exeC:\Windows\{1A181157-BBA4-42ae-B1A8-8C9859488751}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\{DB082315-8198-4371-B540-83E07D4077DB}.exeC:\Windows\{DB082315-8198-4371-B540-83E07D4077DB}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\{F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exeC:\Windows\{F220AD25-6F7B-4ac4-8438-C2D148AA17CB}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\{022ADB33-7FA6-485a-A81D-EA0417551250}.exeC:\Windows\{022ADB33-7FA6-485a-A81D-EA0417551250}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\{679822CD-21A3-4fe8-A104-223802B3DE7B}.exeC:\Windows\{679822CD-21A3-4fe8-A104-223802B3DE7B}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4996 -
C:\Windows\{B67F2F8A-6756-42b0-AE2F-067154728064}.exeC:\Windows\{B67F2F8A-6756-42b0-AE2F-067154728064}.exe13⤵
- Executes dropped EXE
PID:1724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67982~1.EXE > nul13⤵PID:432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{022AD~1.EXE > nul12⤵PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F220A~1.EXE > nul11⤵PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DB082~1.EXE > nul10⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1A181~1.EXE > nul9⤵PID:4324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7573C~1.EXE > nul8⤵PID:4244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{528A3~1.EXE > nul7⤵PID:3420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8C74~1.EXE > nul6⤵PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C1B60~1.EXE > nul5⤵PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2EBC0~1.EXE > nul4⤵PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6671B~1.EXE > nul3⤵PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5d1113b0a848a9f7b119e325393ba2dcb
SHA1cf2c256503f3be5b3983b9c8959ae2cb22eda58e
SHA25636befc73ff28a2fedfd52b7138936757018d5e3c8979afbc2109d776a2b14a0f
SHA512846a967cef354e50cede86e3490d420b85cfd107ac052a8b63e2a076aeccec3b1ec66328c208da3df0eb20f0e084c413df66e1bc141732a0bb36d12362005f27
-
Filesize
168KB
MD580198b6cc1b9dc26101d532dcaefcd59
SHA1ff5949548ad67d239674b1becde086a6369355c0
SHA256a3e1ab6b9f9e0112af41c68f7b3a0bab60d69eff4779a72bf728827034966eb5
SHA51288c6d89a77226bfdf57a2931e40fa2c3c19092907f8bd29950c653c9a1f9801111af6677534d0b0cc04a6876ee07ce8b9eb6790d19a6184844c08ce4542796ec
-
Filesize
168KB
MD5e844e8b42c6920defbb44c967fe18791
SHA1843dbab6ab6197ad7d567b8b84422601b920fc9b
SHA2560bda44a7e3238025390e6e614b6fe5c422076ce5f95b66d05bc716f53cb80671
SHA512e8af2de1e9299543c209e26e31fb487ffcef4f7825112c4b6f06a99bc0a66d0a85cc977504ec6f72436673507f81bc4a07dac2e69ee2d2f4d4f9ce2cf6298433
-
Filesize
168KB
MD5f5ce2373c43677cc60b2af2617d09f3c
SHA1b32ef53b8f69a30451359a1b67dfdab318bcab20
SHA256b5b9a9a0f08aa941853da1e8b1b1102d12ac107d3bb359f2952e9e58edcac00f
SHA512ef54487e41be8ec0df4e4a35666f8a23a768cf1e5ed4e040f411f8a743da5f0386b29042fbc34a84a18579d45d7e8532dbda7c01182e93a6e45cb3409017d2bf
-
Filesize
168KB
MD551cd586c18e26ccb508452a0090993aa
SHA15e249df1b15e3261c87801bc45d7752b3e58838a
SHA256ba52ecb1db81f73f0460e2d3513ba248c0f9fdf09a7380126d37ce1e97c23b0d
SHA51269c8c0c5e4e98895da449d53b37c5720ef054c808cf0c2e76177d6947a57dc0f62391a321588309a779c7fad35a44477e93bf13855e1e99fad6ef534c8ee5c9a
-
Filesize
168KB
MD5a930aa67716074d1b39899e9bef9149d
SHA125474361200435312da3ecc68367e7270cd6e828
SHA256b22e634f7c3133361cdd1f94918730c79c724d25bec5c51e8259f4bc9631cccc
SHA512b9347f5797fca85f46136976f7e033c18e3773f3181069bfd0c971856d276bc89ac082db8c289fba36cedf76136937c85cd9b64d74a36e14d35585d06504702d
-
Filesize
168KB
MD5e82f279a964fddff618354ff6fc1fdcf
SHA128c3a9a71f180a33feab4d0a10f7ebcd2019e213
SHA2565afa153177d5b244957cc9621f51e38225652614e554a849ee780ee19be2806b
SHA512cd7a5b9281e954eea426ca76291d220fb41fc9b89870242e2ebb56ada5c64f5f151a8aade6c6845fac746da05965cce0b2e70fc9a73d5e613d0b122ad0d64698
-
Filesize
168KB
MD5833fbda171531fe06480a98b300bebd3
SHA1a97b066c881b54de348a2ec264edecebef95e298
SHA2566a413632d98f57f96f73f4d3cc241876bb3648b3aafcb356494869847e7ac776
SHA5123e6b19df93b3cbca68d429a8e6940f4f24b65695b6c87ff54d958c25e0795aa2d53a8a1269ca827aeb64d83f8e4f4ca6412bf96f704f0520593012969c6465ef
-
Filesize
168KB
MD5bd5d2328d9f23648eb5790dc7ad06a94
SHA1c0a9d00acf2a4ee3f7bc8134af5e2a502752a44f
SHA25690b9cd0bb4b434c017e2f318821ea5b8852f096e5e64906c1852ce40770b0ee2
SHA5128b8b242e56b749bf14fb0a4e4fde2fe83bd5d0d921e3f01856c63928b8c664a08d12c8bc20f065e71942a26a54dd2c3c9e03383f649582bae93fe86032de02e0
-
Filesize
168KB
MD590607d60fe979358eeaab763737fdde6
SHA1e1b62fb3e1ea44a03d98d5e9a9375804ed180c1a
SHA256ebc91c49929b11ee073494c4e6053d6f9413d1a3ea478dba7184de7f9e274e67
SHA5125717a38e4478933de4b2e295783999a299b5fb3344a9382881396cdc805fdd67740f120644203b015c12ea189ccb97818e533c867d52de586cd13397da04370a
-
Filesize
168KB
MD59b82ff5093aaf4911d2e7897938018db
SHA1f91f7502b65682ba6f486027b2bd363646b93a90
SHA25659416233667c80e0e2913b4fdf3b0a7b7fc146c05883cfb5200c24ee93527ce1
SHA512e6c9d9f32fa46f9f4c5bd0c5b5f9f5c60dbc68d15fcb56b0630e0afb21e152adae1f157414491284416e06fd6a08a289e0d627fb254a1825622b5d6196cc19ad
-
Filesize
168KB
MD59991032f2ef53c41a56b433bc7e61152
SHA130678a9ef1f778a58dc4cbeeb000b0288ffe66e7
SHA256a706ad4e425bf0df7615e295e9af25cab090b83dcfd00a774730330c7096857d
SHA512bf39f664b02b7059fbf333761d919194ee27d52a0522255599c48770a1d4d221efd633accc319e6baa25ce16f647404efeece1f7047175f4f8366436c02f7dce