Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe
-
Size
180KB
-
MD5
589e86406f4d525daf65af854d5851b8
-
SHA1
e4b004b5d6c9875c796da7974192a7201522c048
-
SHA256
6014c5a45508c5bc9db8ab5735bc17e70d90b01f295b1ccd62e39be6d308200c
-
SHA512
329ea11c5a902f60cce68574373edd5fb82d6fc49c4b52a7c05bc35220e009cf895b3c728b4a340477141451598a02546e82ac62fabf40900cde543d6d7ca6a2
-
SSDEEP
3072:jEGh0o0lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGGl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000b000000012256-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b0000000144e4-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012256-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001500000001471d-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000012256-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000012256-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000012256-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A} 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}\stubpath = "C:\\Windows\\{321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe" {70EB22D7-F728-4de3-B208-E52C64446C40}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F3DCDFF-400B-456e-B900-6ADC5D42C915} {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BC0DD400-49BB-4653-9F8F-2A100D757D20}\stubpath = "C:\\Windows\\{BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe" {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{018E01BB-3980-4584-8A16-CDCB20FADFB1} {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06} {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{00347FB0-68E5-4e42-B059-258F9A267A92}\stubpath = "C:\\Windows\\{00347FB0-68E5-4e42-B059-258F9A267A92}.exe" {D152597E-1657-42ed-B106-E53ADAE8E0A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4F837242-8F12-40b0-8E4B-182AD1DBE5C9}\stubpath = "C:\\Windows\\{4F837242-8F12-40b0-8E4B-182AD1DBE5C9}.exe" {00347FB0-68E5-4e42-B059-258F9A267A92}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{50B1F287-B613-497c-B11F-C8ECA95BA244} {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{50B1F287-B613-497c-B11F-C8ECA95BA244}\stubpath = "C:\\Windows\\{50B1F287-B613-497c-B11F-C8ECA95BA244}.exe" {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06}\stubpath = "C:\\Windows\\{3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06}.exe" {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D152597E-1657-42ed-B106-E53ADAE8E0A8} {3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{00347FB0-68E5-4e42-B059-258F9A267A92} {D152597E-1657-42ed-B106-E53ADAE8E0A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}\stubpath = "C:\\Windows\\{B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe" 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70EB22D7-F728-4de3-B208-E52C64446C40}\stubpath = "C:\\Windows\\{70EB22D7-F728-4de3-B208-E52C64446C40}.exe" {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BC0DD400-49BB-4653-9F8F-2A100D757D20} {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{018E01BB-3980-4584-8A16-CDCB20FADFB1}\stubpath = "C:\\Windows\\{018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe" {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4F837242-8F12-40b0-8E4B-182AD1DBE5C9} {00347FB0-68E5-4e42-B059-258F9A267A92}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70EB22D7-F728-4de3-B208-E52C64446C40} {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2} {70EB22D7-F728-4de3-B208-E52C64446C40}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F3DCDFF-400B-456e-B900-6ADC5D42C915}\stubpath = "C:\\Windows\\{7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe" {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D152597E-1657-42ed-B106-E53ADAE8E0A8}\stubpath = "C:\\Windows\\{D152597E-1657-42ed-B106-E53ADAE8E0A8}.exe" {3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06}.exe -
Deletes itself 1 IoCs
pid Process 2340 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2212 {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe 2544 {70EB22D7-F728-4de3-B208-E52C64446C40}.exe 2560 {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe 2448 {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe 1316 {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe 628 {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe 1560 {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe 2744 {3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06}.exe 1396 {D152597E-1657-42ed-B106-E53ADAE8E0A8}.exe 1820 {00347FB0-68E5-4e42-B059-258F9A267A92}.exe 1616 {4F837242-8F12-40b0-8E4B-182AD1DBE5C9}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe File created C:\Windows\{70EB22D7-F728-4de3-B208-E52C64446C40}.exe {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe File created C:\Windows\{321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe {70EB22D7-F728-4de3-B208-E52C64446C40}.exe File created C:\Windows\{BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe File created C:\Windows\{50B1F287-B613-497c-B11F-C8ECA95BA244}.exe {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe File created C:\Windows\{3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06}.exe {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe File created C:\Windows\{00347FB0-68E5-4e42-B059-258F9A267A92}.exe {D152597E-1657-42ed-B106-E53ADAE8E0A8}.exe File created C:\Windows\{7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe File created C:\Windows\{018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe File created C:\Windows\{D152597E-1657-42ed-B106-E53ADAE8E0A8}.exe {3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06}.exe File created C:\Windows\{4F837242-8F12-40b0-8E4B-182AD1DBE5C9}.exe {00347FB0-68E5-4e42-B059-258F9A267A92}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2512 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe Token: SeIncBasePriorityPrivilege 2212 {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe Token: SeIncBasePriorityPrivilege 2544 {70EB22D7-F728-4de3-B208-E52C64446C40}.exe Token: SeIncBasePriorityPrivilege 2560 {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe Token: SeIncBasePriorityPrivilege 2448 {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe Token: SeIncBasePriorityPrivilege 1316 {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe Token: SeIncBasePriorityPrivilege 628 {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe Token: SeIncBasePriorityPrivilege 1560 {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe Token: SeIncBasePriorityPrivilege 2744 {3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06}.exe Token: SeIncBasePriorityPrivilege 1396 {D152597E-1657-42ed-B106-E53ADAE8E0A8}.exe Token: SeIncBasePriorityPrivilege 1820 {00347FB0-68E5-4e42-B059-258F9A267A92}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2212 2512 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe 28 PID 2512 wrote to memory of 2212 2512 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe 28 PID 2512 wrote to memory of 2212 2512 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe 28 PID 2512 wrote to memory of 2212 2512 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe 28 PID 2512 wrote to memory of 2340 2512 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe 29 PID 2512 wrote to memory of 2340 2512 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe 29 PID 2512 wrote to memory of 2340 2512 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe 29 PID 2512 wrote to memory of 2340 2512 2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe 29 PID 2212 wrote to memory of 2544 2212 {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe 30 PID 2212 wrote to memory of 2544 2212 {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe 30 PID 2212 wrote to memory of 2544 2212 {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe 30 PID 2212 wrote to memory of 2544 2212 {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe 30 PID 2212 wrote to memory of 2636 2212 {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe 31 PID 2212 wrote to memory of 2636 2212 {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe 31 PID 2212 wrote to memory of 2636 2212 {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe 31 PID 2212 wrote to memory of 2636 2212 {B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe 31 PID 2544 wrote to memory of 2560 2544 {70EB22D7-F728-4de3-B208-E52C64446C40}.exe 32 PID 2544 wrote to memory of 2560 2544 {70EB22D7-F728-4de3-B208-E52C64446C40}.exe 32 PID 2544 wrote to memory of 2560 2544 {70EB22D7-F728-4de3-B208-E52C64446C40}.exe 32 PID 2544 wrote to memory of 2560 2544 {70EB22D7-F728-4de3-B208-E52C64446C40}.exe 32 PID 2544 wrote to memory of 2568 2544 {70EB22D7-F728-4de3-B208-E52C64446C40}.exe 33 PID 2544 wrote to memory of 2568 2544 {70EB22D7-F728-4de3-B208-E52C64446C40}.exe 33 PID 2544 wrote to memory of 2568 2544 {70EB22D7-F728-4de3-B208-E52C64446C40}.exe 33 PID 2544 wrote to memory of 2568 2544 {70EB22D7-F728-4de3-B208-E52C64446C40}.exe 33 PID 2560 wrote to memory of 2448 2560 {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe 36 PID 2560 wrote to memory of 2448 2560 {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe 36 PID 2560 wrote to memory of 2448 2560 {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe 36 PID 2560 wrote to memory of 2448 2560 {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe 36 PID 2560 wrote to memory of 2556 2560 {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe 37 PID 2560 wrote to memory of 2556 2560 {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe 37 PID 2560 wrote to memory of 2556 2560 {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe 37 PID 2560 wrote to memory of 2556 2560 {321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe 37 PID 2448 wrote to memory of 1316 2448 {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe 38 PID 2448 wrote to memory of 1316 2448 {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe 38 PID 2448 wrote to memory of 1316 2448 {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe 38 PID 2448 wrote to memory of 1316 2448 {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe 38 PID 2448 wrote to memory of 2820 2448 {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe 39 PID 2448 wrote to memory of 2820 2448 {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe 39 PID 2448 wrote to memory of 2820 2448 {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe 39 PID 2448 wrote to memory of 2820 2448 {7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe 39 PID 1316 wrote to memory of 628 1316 {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe 40 PID 1316 wrote to memory of 628 1316 {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe 40 PID 1316 wrote to memory of 628 1316 {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe 40 PID 1316 wrote to memory of 628 1316 {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe 40 PID 1316 wrote to memory of 1192 1316 {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe 41 PID 1316 wrote to memory of 1192 1316 {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe 41 PID 1316 wrote to memory of 1192 1316 {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe 41 PID 1316 wrote to memory of 1192 1316 {BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe 41 PID 628 wrote to memory of 1560 628 {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe 42 PID 628 wrote to memory of 1560 628 {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe 42 PID 628 wrote to memory of 1560 628 {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe 42 PID 628 wrote to memory of 1560 628 {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe 42 PID 628 wrote to memory of 1808 628 {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe 43 PID 628 wrote to memory of 1808 628 {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe 43 PID 628 wrote to memory of 1808 628 {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe 43 PID 628 wrote to memory of 1808 628 {018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe 43 PID 1560 wrote to memory of 2744 1560 {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe 44 PID 1560 wrote to memory of 2744 1560 {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe 44 PID 1560 wrote to memory of 2744 1560 {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe 44 PID 1560 wrote to memory of 2744 1560 {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe 44 PID 1560 wrote to memory of 308 1560 {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe 45 PID 1560 wrote to memory of 308 1560 {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe 45 PID 1560 wrote to memory of 308 1560 {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe 45 PID 1560 wrote to memory of 308 1560 {50B1F287-B613-497c-B11F-C8ECA95BA244}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_589e86406f4d525daf65af854d5851b8_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\{B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exeC:\Windows\{B9CB09A6-F95D-41b8-BE01-B76D6FDB5A0A}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\{70EB22D7-F728-4de3-B208-E52C64446C40}.exeC:\Windows\{70EB22D7-F728-4de3-B208-E52C64446C40}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\{321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exeC:\Windows\{321A6959-A0E5-4cbc-A2D4-5C7C7C1481B2}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\{7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exeC:\Windows\{7F3DCDFF-400B-456e-B900-6ADC5D42C915}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\{BC0DD400-49BB-4653-9F8F-2A100D757D20}.exeC:\Windows\{BC0DD400-49BB-4653-9F8F-2A100D757D20}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\{018E01BB-3980-4584-8A16-CDCB20FADFB1}.exeC:\Windows\{018E01BB-3980-4584-8A16-CDCB20FADFB1}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\{50B1F287-B613-497c-B11F-C8ECA95BA244}.exeC:\Windows\{50B1F287-B613-497c-B11F-C8ECA95BA244}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\{3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06}.exeC:\Windows\{3ACAE4BE-8647-408b-9CE7-8FC13BCBFE06}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\{D152597E-1657-42ed-B106-E53ADAE8E0A8}.exeC:\Windows\{D152597E-1657-42ed-B106-E53ADAE8E0A8}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1396 -
C:\Windows\{00347FB0-68E5-4e42-B059-258F9A267A92}.exeC:\Windows\{00347FB0-68E5-4e42-B059-258F9A267A92}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\{4F837242-8F12-40b0-8E4B-182AD1DBE5C9}.exeC:\Windows\{4F837242-8F12-40b0-8E4B-182AD1DBE5C9}.exe12⤵
- Executes dropped EXE
PID:1616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{00347~1.EXE > nul12⤵PID:592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D1525~1.EXE > nul11⤵PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3ACAE~1.EXE > nul10⤵PID:2956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{50B1F~1.EXE > nul9⤵PID:308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{018E0~1.EXE > nul8⤵PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BC0DD~1.EXE > nul7⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7F3DC~1.EXE > nul6⤵PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{321A6~1.EXE > nul5⤵PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70EB2~1.EXE > nul4⤵PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B9CB0~1.EXE > nul3⤵PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5e8267dace8d05872b3a9f42850639a8a
SHA1010a58c64b49cba89b9f1902fc5b36cc29bc29e3
SHA2560cb2b3a1c8f54545635f77ffc91da02527352065cfce0af93cf226070d436a49
SHA5122f2d2528ae99b2ed052275ab65e8d2c82afdf1fdf69eddc7ce50ccebd0f831b11d66a129e227914d4e0f40aecb72d182853b758fc73ff24065104ff61e405ea5
-
Filesize
180KB
MD5a6647955cb2c15a04ca607724e2cea78
SHA19abb57e41a00ad9b2aa7552165e107dbae7f18a4
SHA2567cbf9bb1701e45a26bb331f54444283c6432c088198fe2b17f824c8e3e77b4e4
SHA512dc0b333e814465c7220932ec0e77fd429f7c2d895f467364831e06b4617d69c7437adfbcb015b8f14cda631280645ad0c8333f1ccd24e736cd12e29d2a265adf
-
Filesize
180KB
MD503bb5366856822df1fba6cdd7a360096
SHA15eb4f1f2e683006a78e76366f20e3378dd185fc7
SHA256c1f7674aa58fe622d2913ec4b733dbc7eabcc1a7ffea01a5f221a7c727aa824b
SHA5121c0c25fffdd1cbfb85c84eef9c7127e40ce1b860bec15dc0181158df9078ecd3b397dbfcad091fe23def43f181fc2f4514b6148b1104a77b08e7f90f99ba3b8b
-
Filesize
180KB
MD5a17f8dd44b44020835b91f32c1959c7f
SHA1968229b21ec20310f2f4eeab1bef7d303be9832e
SHA256bbea9d04738ec1012b41a2afada98bf776af2719b24089919348775dece05d8f
SHA512a990532acc75ad73f730080736dd10e81af85c7d1b93cfe713861a18797868569425077e196cc989c60f3d4ee21f8362a9dcf9658959d94e58c8f2c01bc845cc
-
Filesize
180KB
MD5f0dd0578639d357d1bf65a84287e3193
SHA100561aec4fd3d929acd21a99cd62cc6e56d942fe
SHA256ae8bfb763f4d92eafa5114692ed5fbd901c370ce33e1d40a4ca46116db398353
SHA512aa4283c7850e9e4b8ed200ad065ca014fda5abb4a0b60b5376ccd9d1cc12adda15671b349516648a3a119136f400ef2c926f26b6792b3f128dca6f73680f81bb
-
Filesize
180KB
MD53d3dda863b8c8b0ed7069df20c4418e0
SHA12b08e208f7ad7ba68a8fd179a643398908578577
SHA256609b22775643a987db46ec9029252c265afe494beeeee1eba439eea3349ed134
SHA512b5dc1fbc91a918f5a84c473d7ed45b871ff41a93d3a3c7efc8bfaa1f3e400772b8eea071b87901b3f8253311ab5f93063e9fa9d14ce524a79e08b5cafa0eb0f2
-
Filesize
180KB
MD57fdb19064045da6ac924013fa9b739bc
SHA17ecba11f3555c66053ce5355eb14a02f9ba611c5
SHA25660c0119c923635e34d932868342bbee7a0628591a785d8f5bc8a4f6d016b043a
SHA5124b4ddcaccfc7f55e4f523bf2357630f233c97695bd366e5b5fd095afd44a38f1328b4e6e7ef75147bd00b47f9da400e61e643060917c32f507f8e4a452593c14
-
Filesize
180KB
MD5e7058e8090197418a88d8dadaca562ce
SHA18b9495e32306b9e3f780c837e4e17853ea1fdb73
SHA256db4dbcf1f9934c240861801feb997ccd925fb0dbd5b7552da6c1b94c267dbfd4
SHA51284f9f4ec3384aca133802d35844c216d0f06ba8a0ad041a031b9b822cebe29790c3eb5b9ad1462280bf8f8fa724daab29fab1cc052c8bb04800a0f781945b1aa
-
Filesize
180KB
MD5ce287991044eee1fc4a813048aa86f4d
SHA125e044fbc216bf8dce1d2b1569ec5658fc0a6d09
SHA25684647f5f2a9fdad9e0f294c6f0f9270d61f14fd32339bf3c7e9719c149b25b69
SHA512f7002cc097e60c833b9cd4e2e7e3e63a55940c71c599a24a3ecdbd68ecdd16177f145bddbf4a1589b4c7b1750a7703c8ecf6d4735e665f3eb8b7114565a5c592
-
Filesize
180KB
MD5d80baa3d46c4301cf9a4c6337d02577f
SHA1aef41129cd7c7d5e60d7340b36200249b16342e2
SHA256e13c1591ae3c157ec452dc28d071bd4ae86cfd1484e11207f8e168945ec4fe9b
SHA512be1ed025f9e2ff9fe519b9f9962121af4827240a2043033daa5c21144f28bf548f3bcd9705c2108ee65a7171b0d4d7c1e75d04e92ffa3b7040d9f314104e793d
-
Filesize
180KB
MD5287c6e922018d9231dc80058c8234b64
SHA11741315cd99a288698824ac93a979eba91fa6385
SHA25686e97d6ba8e8e57716f1893dbcd18c45f5e49b1a520be4c976271f05b54f7e47
SHA512ac819c53755fc3ccca0dd7f0629c0b41e65c6138b3459e4bfd532eaffb7ea0e87638afbe7230843f2f0afb866fc6c0633593867215ad3c03ebe1395aba3a3b87