Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 04:25 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe
-
Size
192KB
-
MD5
2a4e6d79bb3ac0a3ce603d3e02940d43
-
SHA1
672a9c8ebf45d4dc6f013d5131e0c755536ebb2e
-
SHA256
6de584a57549165150ea67d7df78408a8329aeb510600525bcc6929d4cf12d15
-
SHA512
00f20ff6f2598b9dd227e3e13789910ab6330ec5e08ec92168f68248b882e956bbdcd42cf4728c644a4b316b74828955e11d4a012acb4b0affc3c4fe1f8dcb2d
-
SSDEEP
1536:1EGh0oIl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oIl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000d00000001224c-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000014698-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000000f680-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000014698-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000000f680-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0010000000014698-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001100000000f680-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0011000000014698-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001200000000f680-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0012000000014698-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001300000000f680-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{25409364-D57D-4b19-9488-CE8930F3048D}\stubpath = "C:\\Windows\\{25409364-D57D-4b19-9488-CE8930F3048D}.exe" {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DEAF4FF5-5222-4912-9A8F-F30B647C8431} {25409364-D57D-4b19-9488-CE8930F3048D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1610B2BA-71A5-4533-9B4B-16C13E1C5482} {92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{25409364-D57D-4b19-9488-CE8930F3048D} {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}\stubpath = "C:\\Windows\\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe" {29AD14CF-1A21-4bff-BC27-09243C68166B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{29AD14CF-1A21-4bff-BC27-09243C68166B} {DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{29AD14CF-1A21-4bff-BC27-09243C68166B}\stubpath = "C:\\Windows\\{29AD14CF-1A21-4bff-BC27-09243C68166B}.exe" {DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85} {29AD14CF-1A21-4bff-BC27-09243C68166B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0DEF5C9D-F268-4253-A21B-1D73FA556950} {1E421CC6-02F1-487d-A80A-5094056319AA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0DEF5C9D-F268-4253-A21B-1D73FA556950}\stubpath = "C:\\Windows\\{0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe" {1E421CC6-02F1-487d-A80A-5094056319AA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C7A52A4-04E4-4318-9434-899DB864BD2E}\stubpath = "C:\\Windows\\{3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe" {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A10A422C-E15C-4341-9606-80B37A80D695}\stubpath = "C:\\Windows\\{A10A422C-E15C-4341-9606-80B37A80D695}.exe" {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E421CC6-02F1-487d-A80A-5094056319AA} {A10A422C-E15C-4341-9606-80B37A80D695}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E421CC6-02F1-487d-A80A-5094056319AA}\stubpath = "C:\\Windows\\{1E421CC6-02F1-487d-A80A-5094056319AA}.exe" {A10A422C-E15C-4341-9606-80B37A80D695}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D} {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}\stubpath = "C:\\Windows\\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe" {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004} 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}\stubpath = "C:\\Windows\\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe" 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A10A422C-E15C-4341-9606-80B37A80D695} {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C7A52A4-04E4-4318-9434-899DB864BD2E} {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}\stubpath = "C:\\Windows\\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe" {25409364-D57D-4b19-9488-CE8930F3048D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}\stubpath = "C:\\Windows\\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exe" {92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe -
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1684 {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe 2544 {A10A422C-E15C-4341-9606-80B37A80D695}.exe 2836 {1E421CC6-02F1-487d-A80A-5094056319AA}.exe 788 {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe 572 {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe 2732 {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe 2348 {25409364-D57D-4b19-9488-CE8930F3048D}.exe 1844 {DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe 1764 {29AD14CF-1A21-4bff-BC27-09243C68166B}.exe 2088 {92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe 2952 {1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe File created C:\Windows\{1E421CC6-02F1-487d-A80A-5094056319AA}.exe {A10A422C-E15C-4341-9606-80B37A80D695}.exe File created C:\Windows\{0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe {1E421CC6-02F1-487d-A80A-5094056319AA}.exe File created C:\Windows\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe File created C:\Windows\{29AD14CF-1A21-4bff-BC27-09243C68166B}.exe {DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe File created C:\Windows\{A10A422C-E15C-4341-9606-80B37A80D695}.exe {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe File created C:\Windows\{3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe File created C:\Windows\{25409364-D57D-4b19-9488-CE8930F3048D}.exe {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe File created C:\Windows\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe {25409364-D57D-4b19-9488-CE8930F3048D}.exe File created C:\Windows\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe {29AD14CF-1A21-4bff-BC27-09243C68166B}.exe File created C:\Windows\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exe {92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2656 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe Token: SeIncBasePriorityPrivilege 1684 {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe Token: SeIncBasePriorityPrivilege 2544 {A10A422C-E15C-4341-9606-80B37A80D695}.exe Token: SeIncBasePriorityPrivilege 2836 {1E421CC6-02F1-487d-A80A-5094056319AA}.exe Token: SeIncBasePriorityPrivilege 788 {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe Token: SeIncBasePriorityPrivilege 572 {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe Token: SeIncBasePriorityPrivilege 2732 {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe Token: SeIncBasePriorityPrivilege 2348 {25409364-D57D-4b19-9488-CE8930F3048D}.exe Token: SeIncBasePriorityPrivilege 1844 {DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe Token: SeIncBasePriorityPrivilege 1764 {29AD14CF-1A21-4bff-BC27-09243C68166B}.exe Token: SeIncBasePriorityPrivilege 2088 {92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1684 2656 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe 28 PID 2656 wrote to memory of 1684 2656 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe 28 PID 2656 wrote to memory of 1684 2656 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe 28 PID 2656 wrote to memory of 1684 2656 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe 28 PID 2656 wrote to memory of 2668 2656 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe 29 PID 2656 wrote to memory of 2668 2656 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe 29 PID 2656 wrote to memory of 2668 2656 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe 29 PID 2656 wrote to memory of 2668 2656 2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe 29 PID 1684 wrote to memory of 2544 1684 {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe 30 PID 1684 wrote to memory of 2544 1684 {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe 30 PID 1684 wrote to memory of 2544 1684 {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe 30 PID 1684 wrote to memory of 2544 1684 {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe 30 PID 1684 wrote to memory of 2760 1684 {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe 31 PID 1684 wrote to memory of 2760 1684 {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe 31 PID 1684 wrote to memory of 2760 1684 {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe 31 PID 1684 wrote to memory of 2760 1684 {F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe 31 PID 2544 wrote to memory of 2836 2544 {A10A422C-E15C-4341-9606-80B37A80D695}.exe 34 PID 2544 wrote to memory of 2836 2544 {A10A422C-E15C-4341-9606-80B37A80D695}.exe 34 PID 2544 wrote to memory of 2836 2544 {A10A422C-E15C-4341-9606-80B37A80D695}.exe 34 PID 2544 wrote to memory of 2836 2544 {A10A422C-E15C-4341-9606-80B37A80D695}.exe 34 PID 2544 wrote to memory of 3032 2544 {A10A422C-E15C-4341-9606-80B37A80D695}.exe 35 PID 2544 wrote to memory of 3032 2544 {A10A422C-E15C-4341-9606-80B37A80D695}.exe 35 PID 2544 wrote to memory of 3032 2544 {A10A422C-E15C-4341-9606-80B37A80D695}.exe 35 PID 2544 wrote to memory of 3032 2544 {A10A422C-E15C-4341-9606-80B37A80D695}.exe 35 PID 2836 wrote to memory of 788 2836 {1E421CC6-02F1-487d-A80A-5094056319AA}.exe 36 PID 2836 wrote to memory of 788 2836 {1E421CC6-02F1-487d-A80A-5094056319AA}.exe 36 PID 2836 wrote to memory of 788 2836 {1E421CC6-02F1-487d-A80A-5094056319AA}.exe 36 PID 2836 wrote to memory of 788 2836 {1E421CC6-02F1-487d-A80A-5094056319AA}.exe 36 PID 2836 wrote to memory of 1956 2836 {1E421CC6-02F1-487d-A80A-5094056319AA}.exe 37 PID 2836 wrote to memory of 1956 2836 {1E421CC6-02F1-487d-A80A-5094056319AA}.exe 37 PID 2836 wrote to memory of 1956 2836 {1E421CC6-02F1-487d-A80A-5094056319AA}.exe 37 PID 2836 wrote to memory of 1956 2836 {1E421CC6-02F1-487d-A80A-5094056319AA}.exe 37 PID 788 wrote to memory of 572 788 {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe 38 PID 788 wrote to memory of 572 788 {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe 38 PID 788 wrote to memory of 572 788 {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe 38 PID 788 wrote to memory of 572 788 {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe 38 PID 788 wrote to memory of 2080 788 {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe 39 PID 788 wrote to memory of 2080 788 {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe 39 PID 788 wrote to memory of 2080 788 {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe 39 PID 788 wrote to memory of 2080 788 {0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe 39 PID 572 wrote to memory of 2732 572 {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe 40 PID 572 wrote to memory of 2732 572 {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe 40 PID 572 wrote to memory of 2732 572 {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe 40 PID 572 wrote to memory of 2732 572 {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe 40 PID 572 wrote to memory of 2948 572 {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe 41 PID 572 wrote to memory of 2948 572 {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe 41 PID 572 wrote to memory of 2948 572 {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe 41 PID 572 wrote to memory of 2948 572 {83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe 41 PID 2732 wrote to memory of 2348 2732 {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe 42 PID 2732 wrote to memory of 2348 2732 {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe 42 PID 2732 wrote to memory of 2348 2732 {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe 42 PID 2732 wrote to memory of 2348 2732 {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe 42 PID 2732 wrote to memory of 952 2732 {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe 43 PID 2732 wrote to memory of 952 2732 {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe 43 PID 2732 wrote to memory of 952 2732 {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe 43 PID 2732 wrote to memory of 952 2732 {3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe 43 PID 2348 wrote to memory of 1844 2348 {25409364-D57D-4b19-9488-CE8930F3048D}.exe 44 PID 2348 wrote to memory of 1844 2348 {25409364-D57D-4b19-9488-CE8930F3048D}.exe 44 PID 2348 wrote to memory of 1844 2348 {25409364-D57D-4b19-9488-CE8930F3048D}.exe 44 PID 2348 wrote to memory of 1844 2348 {25409364-D57D-4b19-9488-CE8930F3048D}.exe 44 PID 2348 wrote to memory of 2044 2348 {25409364-D57D-4b19-9488-CE8930F3048D}.exe 45 PID 2348 wrote to memory of 2044 2348 {25409364-D57D-4b19-9488-CE8930F3048D}.exe 45 PID 2348 wrote to memory of 2044 2348 {25409364-D57D-4b19-9488-CE8930F3048D}.exe 45 PID 2348 wrote to memory of 2044 2348 {25409364-D57D-4b19-9488-CE8930F3048D}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exeC:\Windows\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\{A10A422C-E15C-4341-9606-80B37A80D695}.exeC:\Windows\{A10A422C-E15C-4341-9606-80B37A80D695}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\{1E421CC6-02F1-487d-A80A-5094056319AA}.exeC:\Windows\{1E421CC6-02F1-487d-A80A-5094056319AA}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\{0DEF5C9D-F268-4253-A21B-1D73FA556950}.exeC:\Windows\{0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exeC:\Windows\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\{3C7A52A4-04E4-4318-9434-899DB864BD2E}.exeC:\Windows\{3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\{25409364-D57D-4b19-9488-CE8930F3048D}.exeC:\Windows\{25409364-D57D-4b19-9488-CE8930F3048D}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exeC:\Windows\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Windows\{29AD14CF-1A21-4bff-BC27-09243C68166B}.exeC:\Windows\{29AD14CF-1A21-4bff-BC27-09243C68166B}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exeC:\Windows\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exeC:\Windows\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exe12⤵
- Executes dropped EXE
PID:2952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{92253~1.EXE > nul12⤵PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{29AD1~1.EXE > nul11⤵PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DEAF4~1.EXE > nul10⤵PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{25409~1.EXE > nul9⤵PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C7A5~1.EXE > nul8⤵PID:952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{83D4A~1.EXE > nul7⤵PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0DEF5~1.EXE > nul6⤵PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1E421~1.EXE > nul5⤵PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A10A4~1.EXE > nul4⤵PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F0D48~1.EXE > nul3⤵PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5f1d6e51c5af0016c101997e73ce7c09f
SHA1cb593976f2add58673c730ff27c61be7d876640b
SHA2562530da9bd114c1ef548fd402c44ef769a77d562f6c748a55fae2271c00e6fe88
SHA512abda0b3d15373638b7e4aba639609cd3788a8407f17f49333cb655474843faca13eb50afd08c949eea1ffc690c83bd7a3870d7802ccba6c8622eeb692bd6445f
-
Filesize
192KB
MD5bd03e28029934a092c4c91402ae9b5de
SHA14f380e02d8f749f1eec040b6d428acda8500b735
SHA2569c48a33617584a441b3749c378d2a841f4984ac787e44d22920d641884fd13c5
SHA512516e5285a561be2e22de806090cd0cc27431b4d495bf1207b88f0a413c084fa9cdafcd99614c8c60cbf7f9205e80544f706272fcd6a4afb0c751b52bbee3684c
-
Filesize
192KB
MD51129a95a142ef17523e5f2b32d4cb0d4
SHA1d351be974f2c00f155bba7b4ddb43004c5a247e7
SHA2561b751d216d90708ee296f15a2a58b9484ccaf44a95845807fcf3044f31f83e7d
SHA5124987fc9e2f75399ec09224b0cea8e1ae8179eb13777184ac4272e3458fadedf2cd442d448e57f51044b3e74c9e1a3f82814e1ed9fe68d56a3d5f477a1ddda101
-
Filesize
192KB
MD59b50a2d1a09aaf049878b427ed6624ba
SHA10cc4fd0595e352e80fb5591934d39d1308f27307
SHA256b852395fc9cdaf9ee8df20fc115fff638725abf305f8214ae9c7de551bae33ca
SHA512f9740c899f342be7dea115fa6761069cd100c57544faf4f7d2725d7a936890266428bf90901186e7c974a99c2ac3bce6caf7e47be424a917d2421743d53f08eb
-
Filesize
192KB
MD56d8d01e9f77df877af5eb7fd32f860e0
SHA1fabd1c3a3c791cddd9ab50d14a6f0e702b98833e
SHA2568380d8438bae57d00dc126ed8b6671199e326445f97a7c1107d2f7ba074e1cd7
SHA51245569ec692233f4379f1a5d28ac9d03d18033990bb27d7eff1fd4ae6405f39fb17477740ee2124c1fa3ada7ed2b5d0c8f18eeb8a07ad8966bac374547fa6a014
-
Filesize
192KB
MD50b5d534d146655244d96d6947069f744
SHA15340d6be36f90f9fbc9157ac7c54fc35e0d3d531
SHA2560c0d8fa851b37396310a5b47761577abfb425acc04eb3d587ff1ac2a931ef240
SHA5120446a2251f17cec7d7b13bc2bb30e1b5b2286e55c7b33977fae09a40102d6d2c391a1f346dd5c9aebad0988c33e688576db777fc634f24772eced22b1d3b4a9a
-
Filesize
192KB
MD5d0cc6688e1e6961a25b2a67d905b9207
SHA1a30ae7f04e1347c3f4c9d3f6774e0ad96bc1b983
SHA2561709d2ffdf72d7bb35b34e5c043da6a79e934a27fcd371222c332ab66ebf57b5
SHA512862ad6dff9cef57489638e126c210154acf6792cc2674529ef46c52f87e0f33d37f28ca96925eb200d5fc61d31137fa94d76aa999cc3b194c3f3f2574f6029ef
-
Filesize
192KB
MD529fad7ca678de5393a4308e0cd940336
SHA1fb5f4ac045361dcbd9a63d84a30bce8443d6847a
SHA256613f980e04ad160d78f7b40efe389aebdd1839ba2471d06ab406e0be70bb1d57
SHA5121c5cd854c98a35b964217b554f29b73f6bcef55c6e4b2edad7c3ddeb4cb078ff11b28389c8ad79d4a0dc22f4c892db9ef25fc5b08c1fc9e7d1df8f124b69193f
-
Filesize
192KB
MD5e077334888bf363c45fa91d8fe08ed01
SHA170ce43e9fe1d16b58740a4a521d95a8fb4298522
SHA256e4ebb5bd9366de9bc4609261f4b187284748e882c7aa0cdf3d3c30dc79107e11
SHA512428375ce26b76aae3ff421192325657cfcade06e617e4ad322b1150cfb90990628ddaa4d00d3073080bc47fe626d13dbc4258652d9d949dba087e433ffc1c0ed
-
Filesize
192KB
MD55c80b69cb2ea5ecdeda851f9cbe14b51
SHA1fa142c4699cb86ab5617201569f4be8f0d16399d
SHA256d93a4b712a68603d287c7f7128dc2f85a6a78786740fd49026ac24a0a1f1d5ab
SHA512a86cd56b457de4d1c43b0adb48b991148deaf42459a9b1ed3cb44ba6ebdbdc338d544453595a7cc23c1529eb15bd060908214cbd37f5349739ff0cb152b3ecbf
-
Filesize
192KB
MD52e6552bd1f9e8e543459eb1e517d5d91
SHA1a91e713a83b838b1d6aef04d9205cb66e0fdb384
SHA2568b6a8f2b4d90a0f521657e2f4f3cfe081080958e1bb769e09e4925e6004a0071
SHA5125d38853ba0839b18906b52958249b6415533173adc19cf93eaa7db7cd17df175de5d10a48397ef911f5de4bf251a1834ce4f56ae68e27bded446c72ad892bdbf