Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe
-
Size
408KB
-
MD5
8e39310db07304607d7f771358286ab8
-
SHA1
7d53a758f8184ebdd15a8a7864831b9b93905f6d
-
SHA256
881225db026aac0e0360f4201846ada14867937b2cfa284428db4319dcb17ad1
-
SHA512
fa4fe4af638ac92907ed1c00885f5d72be2ddc8ee511b72da342c3295ca64e6d700055a2958bee6ecb834727c25ba32023c177ed79b5f8df554762dcd84f80fe
-
SSDEEP
3072:CEGh0o3l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGtldOe2MUVg3vTeKcAEciTBqr3jy9
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c00000001223a-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000122a3-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001223a-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000300000000b1f2-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000b1f2-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000500000000b1f2-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000b1f2-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6} {5E985431-3CFB-47d1-9829-E66454F12776}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}\stubpath = "C:\\Windows\\{B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe" {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{45DAF88D-E69C-4477-B142-111ED8221839} {46283536-6F0C-4c8d-BEBC-81BB4AD831AF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DED57983-471F-4fed-A276-54CF9BB40068} {45DAF88D-E69C-4477-B142-111ED8221839}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DED57983-471F-4fed-A276-54CF9BB40068}\stubpath = "C:\\Windows\\{DED57983-471F-4fed-A276-54CF9BB40068}.exe" {45DAF88D-E69C-4477-B142-111ED8221839}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C773F401-6505-44c3-9051-DD2CEEA1A1BB} {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46283536-6F0C-4c8d-BEBC-81BB4AD831AF}\stubpath = "C:\\Windows\\{46283536-6F0C-4c8d-BEBC-81BB4AD831AF}.exe" {BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E985431-3CFB-47d1-9829-E66454F12776}\stubpath = "C:\\Windows\\{5E985431-3CFB-47d1-9829-E66454F12776}.exe" 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38CF545B-17FD-41e7-B168-7991DA700366}\stubpath = "C:\\Windows\\{38CF545B-17FD-41e7-B168-7991DA700366}.exe" {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54D57EA3-1796-4951-BDD4-87CE2C324453}\stubpath = "C:\\Windows\\{54D57EA3-1796-4951-BDD4-87CE2C324453}.exe" {38CF545B-17FD-41e7-B168-7991DA700366}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EAB16E7F-D59C-4606-95A8-27E85D103D03} {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EAB16E7F-D59C-4606-95A8-27E85D103D03}\stubpath = "C:\\Windows\\{EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe" {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2} {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46283536-6F0C-4c8d-BEBC-81BB4AD831AF} {BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E985431-3CFB-47d1-9829-E66454F12776} 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38CF545B-17FD-41e7-B168-7991DA700366} {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54D57EA3-1796-4951-BDD4-87CE2C324453} {38CF545B-17FD-41e7-B168-7991DA700366}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B} {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C773F401-6505-44c3-9051-DD2CEEA1A1BB}\stubpath = "C:\\Windows\\{C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe" {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}\stubpath = "C:\\Windows\\{D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe" {5E985431-3CFB-47d1-9829-E66454F12776}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2}\stubpath = "C:\\Windows\\{BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2}.exe" {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{45DAF88D-E69C-4477-B142-111ED8221839}\stubpath = "C:\\Windows\\{45DAF88D-E69C-4477-B142-111ED8221839}.exe" {46283536-6F0C-4c8d-BEBC-81BB4AD831AF}.exe -
Deletes itself 1 IoCs
pid Process 1408 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2056 {5E985431-3CFB-47d1-9829-E66454F12776}.exe 2124 {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe 2584 {38CF545B-17FD-41e7-B168-7991DA700366}.exe 2356 {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe 2052 {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe 2460 {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe 2268 {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe 1016 {BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2}.exe 1640 {46283536-6F0C-4c8d-BEBC-81BB4AD831AF}.exe 2852 {45DAF88D-E69C-4477-B142-111ED8221839}.exe 588 {DED57983-471F-4fed-A276-54CF9BB40068}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe {5E985431-3CFB-47d1-9829-E66454F12776}.exe File created C:\Windows\{54D57EA3-1796-4951-BDD4-87CE2C324453}.exe {38CF545B-17FD-41e7-B168-7991DA700366}.exe File created C:\Windows\{EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe File created C:\Windows\{45DAF88D-E69C-4477-B142-111ED8221839}.exe {46283536-6F0C-4c8d-BEBC-81BB4AD831AF}.exe File created C:\Windows\{DED57983-471F-4fed-A276-54CF9BB40068}.exe {45DAF88D-E69C-4477-B142-111ED8221839}.exe File created C:\Windows\{5E985431-3CFB-47d1-9829-E66454F12776}.exe 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe File created C:\Windows\{38CF545B-17FD-41e7-B168-7991DA700366}.exe {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe File created C:\Windows\{B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe File created C:\Windows\{C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe File created C:\Windows\{BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2}.exe {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe File created C:\Windows\{46283536-6F0C-4c8d-BEBC-81BB4AD831AF}.exe {BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2184 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe Token: SeIncBasePriorityPrivilege 2056 {5E985431-3CFB-47d1-9829-E66454F12776}.exe Token: SeIncBasePriorityPrivilege 2124 {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe Token: SeIncBasePriorityPrivilege 2584 {38CF545B-17FD-41e7-B168-7991DA700366}.exe Token: SeIncBasePriorityPrivilege 2356 {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe Token: SeIncBasePriorityPrivilege 2052 {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe Token: SeIncBasePriorityPrivilege 2460 {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe Token: SeIncBasePriorityPrivilege 2268 {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe Token: SeIncBasePriorityPrivilege 1016 {BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2}.exe Token: SeIncBasePriorityPrivilege 1640 {46283536-6F0C-4c8d-BEBC-81BB4AD831AF}.exe Token: SeIncBasePriorityPrivilege 2852 {45DAF88D-E69C-4477-B142-111ED8221839}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2056 2184 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe 28 PID 2184 wrote to memory of 2056 2184 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe 28 PID 2184 wrote to memory of 2056 2184 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe 28 PID 2184 wrote to memory of 2056 2184 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe 28 PID 2184 wrote to memory of 1408 2184 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe 29 PID 2184 wrote to memory of 1408 2184 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe 29 PID 2184 wrote to memory of 1408 2184 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe 29 PID 2184 wrote to memory of 1408 2184 2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe 29 PID 2056 wrote to memory of 2124 2056 {5E985431-3CFB-47d1-9829-E66454F12776}.exe 30 PID 2056 wrote to memory of 2124 2056 {5E985431-3CFB-47d1-9829-E66454F12776}.exe 30 PID 2056 wrote to memory of 2124 2056 {5E985431-3CFB-47d1-9829-E66454F12776}.exe 30 PID 2056 wrote to memory of 2124 2056 {5E985431-3CFB-47d1-9829-E66454F12776}.exe 30 PID 2056 wrote to memory of 2380 2056 {5E985431-3CFB-47d1-9829-E66454F12776}.exe 31 PID 2056 wrote to memory of 2380 2056 {5E985431-3CFB-47d1-9829-E66454F12776}.exe 31 PID 2056 wrote to memory of 2380 2056 {5E985431-3CFB-47d1-9829-E66454F12776}.exe 31 PID 2056 wrote to memory of 2380 2056 {5E985431-3CFB-47d1-9829-E66454F12776}.exe 31 PID 2124 wrote to memory of 2584 2124 {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe 32 PID 2124 wrote to memory of 2584 2124 {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe 32 PID 2124 wrote to memory of 2584 2124 {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe 32 PID 2124 wrote to memory of 2584 2124 {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe 32 PID 2124 wrote to memory of 2536 2124 {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe 33 PID 2124 wrote to memory of 2536 2124 {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe 33 PID 2124 wrote to memory of 2536 2124 {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe 33 PID 2124 wrote to memory of 2536 2124 {D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe 33 PID 2584 wrote to memory of 2356 2584 {38CF545B-17FD-41e7-B168-7991DA700366}.exe 36 PID 2584 wrote to memory of 2356 2584 {38CF545B-17FD-41e7-B168-7991DA700366}.exe 36 PID 2584 wrote to memory of 2356 2584 {38CF545B-17FD-41e7-B168-7991DA700366}.exe 36 PID 2584 wrote to memory of 2356 2584 {38CF545B-17FD-41e7-B168-7991DA700366}.exe 36 PID 2584 wrote to memory of 2440 2584 {38CF545B-17FD-41e7-B168-7991DA700366}.exe 37 PID 2584 wrote to memory of 2440 2584 {38CF545B-17FD-41e7-B168-7991DA700366}.exe 37 PID 2584 wrote to memory of 2440 2584 {38CF545B-17FD-41e7-B168-7991DA700366}.exe 37 PID 2584 wrote to memory of 2440 2584 {38CF545B-17FD-41e7-B168-7991DA700366}.exe 37 PID 2356 wrote to memory of 2052 2356 {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe 38 PID 2356 wrote to memory of 2052 2356 {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe 38 PID 2356 wrote to memory of 2052 2356 {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe 38 PID 2356 wrote to memory of 2052 2356 {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe 38 PID 2356 wrote to memory of 1564 2356 {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe 39 PID 2356 wrote to memory of 1564 2356 {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe 39 PID 2356 wrote to memory of 1564 2356 {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe 39 PID 2356 wrote to memory of 1564 2356 {54D57EA3-1796-4951-BDD4-87CE2C324453}.exe 39 PID 2052 wrote to memory of 2460 2052 {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe 40 PID 2052 wrote to memory of 2460 2052 {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe 40 PID 2052 wrote to memory of 2460 2052 {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe 40 PID 2052 wrote to memory of 2460 2052 {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe 40 PID 2052 wrote to memory of 2624 2052 {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe 41 PID 2052 wrote to memory of 2624 2052 {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe 41 PID 2052 wrote to memory of 2624 2052 {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe 41 PID 2052 wrote to memory of 2624 2052 {EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe 41 PID 2460 wrote to memory of 2268 2460 {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe 42 PID 2460 wrote to memory of 2268 2460 {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe 42 PID 2460 wrote to memory of 2268 2460 {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe 42 PID 2460 wrote to memory of 2268 2460 {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe 42 PID 2460 wrote to memory of 2192 2460 {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe 43 PID 2460 wrote to memory of 2192 2460 {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe 43 PID 2460 wrote to memory of 2192 2460 {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe 43 PID 2460 wrote to memory of 2192 2460 {B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe 43 PID 2268 wrote to memory of 1016 2268 {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe 44 PID 2268 wrote to memory of 1016 2268 {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe 44 PID 2268 wrote to memory of 1016 2268 {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe 44 PID 2268 wrote to memory of 1016 2268 {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe 44 PID 2268 wrote to memory of 1184 2268 {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe 45 PID 2268 wrote to memory of 1184 2268 {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe 45 PID 2268 wrote to memory of 1184 2268 {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe 45 PID 2268 wrote to memory of 1184 2268 {C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-27_8e39310db07304607d7f771358286ab8_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\{5E985431-3CFB-47d1-9829-E66454F12776}.exeC:\Windows\{5E985431-3CFB-47d1-9829-E66454F12776}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\{D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exeC:\Windows\{D97D1C98-5A5A-4ea6-BAD8-384644DEC7D6}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\{38CF545B-17FD-41e7-B168-7991DA700366}.exeC:\Windows\{38CF545B-17FD-41e7-B168-7991DA700366}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\{54D57EA3-1796-4951-BDD4-87CE2C324453}.exeC:\Windows\{54D57EA3-1796-4951-BDD4-87CE2C324453}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\{EAB16E7F-D59C-4606-95A8-27E85D103D03}.exeC:\Windows\{EAB16E7F-D59C-4606-95A8-27E85D103D03}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\{B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exeC:\Windows\{B247BEB7-B7C6-45f5-ABCF-A7481FDDF26B}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\{C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exeC:\Windows\{C773F401-6505-44c3-9051-DD2CEEA1A1BB}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\{BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2}.exeC:\Windows\{BD16AE24-BFDA-4388-9B38-AFA0ADBE6BA2}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1016 -
C:\Windows\{46283536-6F0C-4c8d-BEBC-81BB4AD831AF}.exeC:\Windows\{46283536-6F0C-4c8d-BEBC-81BB4AD831AF}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\{45DAF88D-E69C-4477-B142-111ED8221839}.exeC:\Windows\{45DAF88D-E69C-4477-B142-111ED8221839}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2852 -
C:\Windows\{DED57983-471F-4fed-A276-54CF9BB40068}.exeC:\Windows\{DED57983-471F-4fed-A276-54CF9BB40068}.exe12⤵
- Executes dropped EXE
PID:588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{45DAF~1.EXE > nul12⤵PID:1328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{46283~1.EXE > nul11⤵PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BD16A~1.EXE > nul10⤵PID:528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C773F~1.EXE > nul9⤵PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B247B~1.EXE > nul8⤵PID:2192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EAB16~1.EXE > nul7⤵PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{54D57~1.EXE > nul6⤵PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{38CF5~1.EXE > nul5⤵PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D97D1~1.EXE > nul4⤵PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5E985~1.EXE > nul3⤵PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD54ed56c36aba5f2b175a9128eb18d755c
SHA17a917012245ac387dcabc5ebd7b816688e6d8ba9
SHA25692f5d92b66d3ec656fe6038bd3290dd351adb21d4769194440d0c524eb4864f6
SHA51292a0c71e1772e70718164258078e3d296333a810e6a387666839df7e63c20d871a40a7057c5253a31ace672c8f2340f490a70a648817bd6eece70f457b902c90
-
Filesize
408KB
MD531c14cd45094fc1f2e0515206f05edbd
SHA1fa40c9a7d3707187127ca767ad1c8319373ef6ed
SHA25697b6bd89bd4e303e49f1011939d048665ca613efe79aa94cfd223654c9b8806e
SHA512ee43744c4e28fd84666f937b0c33a55c42f6a7b11d9577751ab5827db895641a5e5ecdf9bbf63b2872fa8727b560a2eaa6b70d791448a75565465a5edc955ee1
-
Filesize
408KB
MD577e1d3aad9c0f87785ac80c72c10ec01
SHA1fbdfab66286fda0e1b5da43f8045e61ca6a460c8
SHA256752ea33ff9eb760e3a873961ae0d5d2ac6bc3a274b01b198de56a5bd959002d4
SHA5124f5b5393e41fa61f07b88d11fbbdc9a6efd85893f5b464b9fb0ea38301a7079eaf53a7b6fb2adc53e844d692cba6607c56ec8dfb4ea26066a7ad072e481dac79
-
Filesize
408KB
MD5cfff119a1aa373c3ffeab7e26804339d
SHA14d18e3de5d0dfb5498c26da9c5d27c584c639c02
SHA256c107a867417aa24cf214226e1b65f5e8817ee2878c425223b66b452d790e3136
SHA512ebbd7cef3f91ed3a2f3290deb14dcc2f7f0c9ac46136384763bc32ebda2ff4af0563074c082c9fb1241d0a0bb55a0fc8584fcfcd67de600dd29a2e09f12cd7f5
-
Filesize
408KB
MD5e3d56246e755033c308a5e2a6e535a54
SHA130bb0a3ff07ab78e511129f311954ff1c693ece6
SHA256ec1531ab36fc72369349f6d1615faf802be013b6401765857c08dc3f6213f0a8
SHA512e76ecbd77edc24e381b2290575d01939a053f7c00a9eb064033a6147f2733baca5ab4dafc927a56c36ab0aa41752c670c30ff691d3d8bd30a7f4f0ed8fb70b1c
-
Filesize
408KB
MD593527763aa4d5a26c641232c20d932bf
SHA1f2d7f0a5b7d2e8093b06b2d45b339177b8fdf9f6
SHA256001632743788113427db76c594714efcc7728c8a93383c461c5f9f69aeac3a90
SHA51255000d681e3c98fc08c35d146b5b8cd37b0bd41a21c19cd2bb9fa959b33a04b9b9c62ca5fda4ae8bd00884e72c40a05191d8307572bdf9a39febfcb0abc060f1
-
Filesize
408KB
MD5dc6ab56f44b853ee561adf2398697381
SHA1f010c8ee81659f467e4adc5112947655f409af31
SHA256ebf9860faa1c897c6e31e62c969332512049dc265a3266137aee2d621fce5623
SHA51239ec88a023e0dcacbe3f5f51cfb0215df166e34bfd3d886849e2edc2597b19779be7fcb8b3b1ee945fa0cc31c268083d2c064b41bd2727f91b9dd09bc09f76a0
-
Filesize
408KB
MD517d66dfadfc633dfa2e54858560bde49
SHA12cb51644c09e8ddeaffc8e16699dcbb83d33be2c
SHA256456fc159b9e0d67cfc5abc27a72060cba4808a8296b07a1800e3b7bb461f5196
SHA512a7909daa6373b6c250d3405f411434ba90eddbb983e64355900cbefec3b90410336d0f8497f0d08f5e97bfbac6eb7ea26f1bf78ab4824cd54faa99995a52574b
-
Filesize
408KB
MD522e5bf5fff253b53414fdcf982d6588a
SHA15b9ddfca2fe0ee88355f9395b11ede2b88aeb9ff
SHA2568b3629fd0bada9f2caadaf114abf5b533a566648ed0fe4811eb879a166149a29
SHA512c62aa85a0ac481addd8274db862a68d6c38ea92819b0eeb214951468f964165daf21ac16daa6a347a1451678c920a4ca48a2d67b2405f7a448502ebde465f196
-
Filesize
408KB
MD5157ebe9fc8727227cbe6c8af253d0d9a
SHA1ace7c9acb8cd9ae0f9ef8bacee769c51b8eb2bfe
SHA2563ab7f0b3f28d925757d2ab586df507564da6c86fc5b299bf87a142713d0adf4f
SHA512f1245a245943702ec98a2d75213f5d09bbdff12b302e3326e1bf538abe3fb148767ea67de6a1d76a3cb43ae4472755296d104be01f78a3050be331df8d0a986f
-
Filesize
408KB
MD589ed92b55618dac85c9613cc91ea121a
SHA1ecd33c8f6770970bd2f390c8f213716c1342ad98
SHA256ce57382c4548edf3c9d5051d02c51dc308ad9e21aab7bf2683db51cb77ce333f
SHA5121329ae4f5cdfa1ec662f090c6b9e07fef9ca87fa595a52e461c7784e7573bec34f6f65ae4920ea22071d576ab481ab12fb6351a6aba96c8a5233ee7e8b23ceb0