Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 16:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe
-
Size
192KB
-
MD5
3bed806b5326e661c2e220d40d6c1ae8
-
SHA1
fd012ce2d06f1a14de88861cf4ed0ba53e75b7ef
-
SHA256
e62a156b891e54a93d78151071927ed8fbda35123f03e7eaca7ebf9cb463dfb5
-
SHA512
bd6798767aa1bf9d9abbcb2fed7b2b6dee46a12ebbf1720b6a76c4ad4a83b0cc3b39934b87255bad67c6fac1b6668757274a4e94b41446e1e37baab5c80eb8d0
-
SSDEEP
1536:1EGh0okl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0okl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral2/files/0x0004000000022ea3-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002325e-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023261-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a00000002325e-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023261-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b00000002325e-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000733-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000735-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000733-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0006000000000026-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000000507-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727} {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B06CD87D-4BC5-4e9c-8983-A27BB811F42F}\stubpath = "C:\\Windows\\{B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe" {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6E182E5F-4778-4077-BA2C-641DB9CCCBB2} {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91} {50B381FE-5A4F-450b-B203-A979760822C2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}\stubpath = "C:\\Windows\\{1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe" {50B381FE-5A4F-450b-B203-A979760822C2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A} {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8BC920C6-40DD-45bd-865C-CC4488D37316} {068B5474-AD86-4f57-AD2B-513C954195DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DFFA6E21-29B4-4257-839A-EF487A4C0D62} {8BC920C6-40DD-45bd-865C-CC4488D37316}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE} 2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1DA167E5-ABC4-47b4-A211-C91CCA784DAF} {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B06CD87D-4BC5-4e9c-8983-A27BB811F42F} {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{50B381FE-5A4F-450b-B203-A979760822C2} {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{50B381FE-5A4F-450b-B203-A979760822C2}\stubpath = "C:\\Windows\\{50B381FE-5A4F-450b-B203-A979760822C2}.exe" {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}\stubpath = "C:\\Windows\\{29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe" {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}\stubpath = "C:\\Windows\\{B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe" 2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1DA167E5-ABC4-47b4-A211-C91CCA784DAF}\stubpath = "C:\\Windows\\{1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe" {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{068B5474-AD86-4f57-AD2B-513C954195DB}\stubpath = "C:\\Windows\\{068B5474-AD86-4f57-AD2B-513C954195DB}.exe" {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8BC920C6-40DD-45bd-865C-CC4488D37316}\stubpath = "C:\\Windows\\{8BC920C6-40DD-45bd-865C-CC4488D37316}.exe" {068B5474-AD86-4f57-AD2B-513C954195DB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}\stubpath = "C:\\Windows\\{8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe" {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6E182E5F-4778-4077-BA2C-641DB9CCCBB2}\stubpath = "C:\\Windows\\{6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe" {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{068B5474-AD86-4f57-AD2B-513C954195DB} {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DFFA6E21-29B4-4257-839A-EF487A4C0D62}\stubpath = "C:\\Windows\\{DFFA6E21-29B4-4257-839A-EF487A4C0D62}.exe" {8BC920C6-40DD-45bd-865C-CC4488D37316}.exe -
Executes dropped EXE 11 IoCs
pid Process 2356 {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe 2804 {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe 3880 {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe 1016 {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe 4220 {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe 764 {50B381FE-5A4F-450b-B203-A979760822C2}.exe 3008 {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe 4464 {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe 2128 {068B5474-AD86-4f57-AD2B-513C954195DB}.exe 228 {8BC920C6-40DD-45bd-865C-CC4488D37316}.exe 1624 {DFFA6E21-29B4-4257-839A-EF487A4C0D62}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{068B5474-AD86-4f57-AD2B-513C954195DB}.exe {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe File created C:\Windows\{B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe 2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe File created C:\Windows\{8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe File created C:\Windows\{29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe File created C:\Windows\{50B381FE-5A4F-450b-B203-A979760822C2}.exe {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe File created C:\Windows\{1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe {50B381FE-5A4F-450b-B203-A979760822C2}.exe File created C:\Windows\{8BC920C6-40DD-45bd-865C-CC4488D37316}.exe {068B5474-AD86-4f57-AD2B-513C954195DB}.exe File created C:\Windows\{DFFA6E21-29B4-4257-839A-EF487A4C0D62}.exe {8BC920C6-40DD-45bd-865C-CC4488D37316}.exe File created C:\Windows\{1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe File created C:\Windows\{B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe File created C:\Windows\{6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4036 2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe Token: SeIncBasePriorityPrivilege 2356 {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe Token: SeIncBasePriorityPrivilege 2804 {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe Token: SeIncBasePriorityPrivilege 3880 {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe Token: SeIncBasePriorityPrivilege 1016 {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe Token: SeIncBasePriorityPrivilege 4220 {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe Token: SeIncBasePriorityPrivilege 764 {50B381FE-5A4F-450b-B203-A979760822C2}.exe Token: SeIncBasePriorityPrivilege 3008 {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe Token: SeIncBasePriorityPrivilege 4464 {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe Token: SeIncBasePriorityPrivilege 2128 {068B5474-AD86-4f57-AD2B-513C954195DB}.exe Token: SeIncBasePriorityPrivilege 228 {8BC920C6-40DD-45bd-865C-CC4488D37316}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4036 wrote to memory of 2356 4036 2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe 101 PID 4036 wrote to memory of 2356 4036 2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe 101 PID 4036 wrote to memory of 2356 4036 2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe 101 PID 4036 wrote to memory of 2928 4036 2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe 102 PID 4036 wrote to memory of 2928 4036 2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe 102 PID 4036 wrote to memory of 2928 4036 2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe 102 PID 2356 wrote to memory of 2804 2356 {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe 106 PID 2356 wrote to memory of 2804 2356 {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe 106 PID 2356 wrote to memory of 2804 2356 {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe 106 PID 2356 wrote to memory of 4912 2356 {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe 107 PID 2356 wrote to memory of 4912 2356 {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe 107 PID 2356 wrote to memory of 4912 2356 {B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe 107 PID 2804 wrote to memory of 3880 2804 {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe 108 PID 2804 wrote to memory of 3880 2804 {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe 108 PID 2804 wrote to memory of 3880 2804 {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe 108 PID 2804 wrote to memory of 4764 2804 {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe 109 PID 2804 wrote to memory of 4764 2804 {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe 109 PID 2804 wrote to memory of 4764 2804 {1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe 109 PID 3880 wrote to memory of 1016 3880 {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe 111 PID 3880 wrote to memory of 1016 3880 {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe 111 PID 3880 wrote to memory of 1016 3880 {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe 111 PID 3880 wrote to memory of 1432 3880 {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe 112 PID 3880 wrote to memory of 1432 3880 {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe 112 PID 3880 wrote to memory of 1432 3880 {8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe 112 PID 1016 wrote to memory of 4220 1016 {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe 113 PID 1016 wrote to memory of 4220 1016 {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe 113 PID 1016 wrote to memory of 4220 1016 {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe 113 PID 1016 wrote to memory of 212 1016 {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe 114 PID 1016 wrote to memory of 212 1016 {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe 114 PID 1016 wrote to memory of 212 1016 {B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe 114 PID 4220 wrote to memory of 764 4220 {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe 115 PID 4220 wrote to memory of 764 4220 {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe 115 PID 4220 wrote to memory of 764 4220 {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe 115 PID 4220 wrote to memory of 4856 4220 {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe 116 PID 4220 wrote to memory of 4856 4220 {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe 116 PID 4220 wrote to memory of 4856 4220 {6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe 116 PID 764 wrote to memory of 3008 764 {50B381FE-5A4F-450b-B203-A979760822C2}.exe 117 PID 764 wrote to memory of 3008 764 {50B381FE-5A4F-450b-B203-A979760822C2}.exe 117 PID 764 wrote to memory of 3008 764 {50B381FE-5A4F-450b-B203-A979760822C2}.exe 117 PID 764 wrote to memory of 4692 764 {50B381FE-5A4F-450b-B203-A979760822C2}.exe 118 PID 764 wrote to memory of 4692 764 {50B381FE-5A4F-450b-B203-A979760822C2}.exe 118 PID 764 wrote to memory of 4692 764 {50B381FE-5A4F-450b-B203-A979760822C2}.exe 118 PID 3008 wrote to memory of 4464 3008 {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe 119 PID 3008 wrote to memory of 4464 3008 {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe 119 PID 3008 wrote to memory of 4464 3008 {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe 119 PID 3008 wrote to memory of 4320 3008 {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe 120 PID 3008 wrote to memory of 4320 3008 {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe 120 PID 3008 wrote to memory of 4320 3008 {1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe 120 PID 4464 wrote to memory of 2128 4464 {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe 121 PID 4464 wrote to memory of 2128 4464 {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe 121 PID 4464 wrote to memory of 2128 4464 {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe 121 PID 4464 wrote to memory of 3324 4464 {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe 122 PID 4464 wrote to memory of 3324 4464 {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe 122 PID 4464 wrote to memory of 3324 4464 {29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe 122 PID 2128 wrote to memory of 228 2128 {068B5474-AD86-4f57-AD2B-513C954195DB}.exe 123 PID 2128 wrote to memory of 228 2128 {068B5474-AD86-4f57-AD2B-513C954195DB}.exe 123 PID 2128 wrote to memory of 228 2128 {068B5474-AD86-4f57-AD2B-513C954195DB}.exe 123 PID 2128 wrote to memory of 3364 2128 {068B5474-AD86-4f57-AD2B-513C954195DB}.exe 124 PID 2128 wrote to memory of 3364 2128 {068B5474-AD86-4f57-AD2B-513C954195DB}.exe 124 PID 2128 wrote to memory of 3364 2128 {068B5474-AD86-4f57-AD2B-513C954195DB}.exe 124 PID 228 wrote to memory of 1624 228 {8BC920C6-40DD-45bd-865C-CC4488D37316}.exe 125 PID 228 wrote to memory of 1624 228 {8BC920C6-40DD-45bd-865C-CC4488D37316}.exe 125 PID 228 wrote to memory of 1624 228 {8BC920C6-40DD-45bd-865C-CC4488D37316}.exe 125 PID 228 wrote to memory of 4556 228 {8BC920C6-40DD-45bd-865C-CC4488D37316}.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\{B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exeC:\Windows\{B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\{1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exeC:\Windows\{1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\{8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exeC:\Windows\{8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\{B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exeC:\Windows\{B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\{6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exeC:\Windows\{6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\{50B381FE-5A4F-450b-B203-A979760822C2}.exeC:\Windows\{50B381FE-5A4F-450b-B203-A979760822C2}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\{1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exeC:\Windows\{1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\{29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exeC:\Windows\{29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\{068B5474-AD86-4f57-AD2B-513C954195DB}.exeC:\Windows\{068B5474-AD86-4f57-AD2B-513C954195DB}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\{8BC920C6-40DD-45bd-865C-CC4488D37316}.exeC:\Windows\{8BC920C6-40DD-45bd-865C-CC4488D37316}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\{DFFA6E21-29B4-4257-839A-EF487A4C0D62}.exeC:\Windows\{DFFA6E21-29B4-4257-839A-EF487A4C0D62}.exe12⤵
- Executes dropped EXE
PID:1624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8BC92~1.EXE > nul12⤵PID:4556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{068B5~1.EXE > nul11⤵PID:3364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{29D92~1.EXE > nul10⤵PID:3324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1F1F9~1.EXE > nul9⤵PID:4320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{50B38~1.EXE > nul8⤵PID:4692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E182~1.EXE > nul7⤵PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B06CD~1.EXE > nul6⤵PID:212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8253A~1.EXE > nul5⤵PID:1432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1DA16~1.EXE > nul4⤵PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B114D~1.EXE > nul3⤵PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3628 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5875bb0ccab9e12be5652abc88fa6d123
SHA1cf50a421b2d9a1b1c9530dfeed5ca7782e825c9e
SHA256faa74bd9f4acf10ae5f06dee871716f9693f12b4083557624ee4f277c132450c
SHA512b003736df5765f4a1ce7f7e3adbc7ee2775a407c1c6db82d7ba00d738add961a4df6d3a264b1d96aeff80947610c141f5a12d2267e8aa49c5deca78fae53f6e3
-
Filesize
192KB
MD584131d1bb04a16ac166a404a76a802dd
SHA17a14064d2f9b737d73c28691b16b71dcf4e48c7c
SHA256eb745fa21b368ac6b6d98feded4530a66350e95d114f6a7231b999c37256cf26
SHA512f3237c7752b5e9238345830c1d332be380a132db59814ec82b6a332dabf480ad2e3abd381021e106503d7b948ddf859fdbfe161b9893d07fc5f710d0cfb3dc72
-
Filesize
192KB
MD527f56e5aeec52eea5feb37381cf33e71
SHA15c32be77c81636d37215913a13fdc0f6bc1f02dd
SHA256a2ede5183c4f240cff0dff3596e66bd12c5a56d61bef021b30ef6cee400302a5
SHA512dc77b523a662ff10e1b230764121415b90b9d43a7edb9e926a83167f76853f555f0a781d24a1a4abcfcadd77fd30d03f0a54f4a183d6ff410a3524977231fddc
-
Filesize
192KB
MD51d5a0a7bd4cd93b028698bd8d3538d10
SHA1a9f0114f316d6de21cd6be21698e59104e12cba3
SHA2567cfa6b9ab1ad74ea97cc2f74779fc18d8d44446771fdd469f71b92666e3dc0f3
SHA5127bd618493361e25de377ca3cb926c23eac1fbfe0a27ba164e2363bdefdd7a17cd63ffcdd6757ac047eec11fbf0dfc2551fe5180f5ec6fc689004e89d7fa80e1d
-
Filesize
192KB
MD562ac6f90db0f2904a8bf689a2431c00d
SHA14ac4cde4ee28a2f353d989db427a693b0afc87dc
SHA2569a4f2037e59eb00b9638a5a90a04d6187dc30a6bcc092c85e0e3ad784f753e3b
SHA512762239e8dddd7defe55f07dbd28e2bec3f246ebdc9cb6184f85f8a84b32a6b0baa8feed01d38746c33fb329dbc6c7dd4549ba6fdd09582de2503d8637b42569d
-
Filesize
192KB
MD53434d7315b34659f9eaf3a968dd95523
SHA1757ee22d837fd3f796ffe9a9136655607262d423
SHA256b6821bdd64b44d281a6536afa8c4b4a733ad9bebe8d47d6d3414a34606550950
SHA512c85608f7705cc942d6a9bf5f2ac2503bde5478b68e3687269ff12c751baa32359fdb7706b8705fed9b5cd158ded335ae860556996b52326eb3e57b9284280b7e
-
Filesize
192KB
MD5b8f66b948a215475780f78c8d9bb6c2b
SHA1a51b70b7dd692fc2d93d6acba64df56ae1eb5849
SHA256a331938ce60c86ddea1453085b69b856ec2cbb1d75e38e572e7aa3c6afaf22f0
SHA512e3e3a39e39f5232a7d8da0dcb94805d05504d8e6fbf2f89c7508ae2de1f7b1669069f36243a16043a56e62d9c4874db79dd2d8602f382f8f30e3ccee8f5e5421
-
Filesize
192KB
MD5c9108bf6dc6501ac3b2f96428f78c0b2
SHA1093e29f8ccb6817b0074a43e148454aa0888f0c0
SHA256491ace39ee864b562b0390d2d19630cffe7a48ca1ca51ab1c99b979c1af1491d
SHA512fa0d9cde0aaa45ef502c591658dc98dab3502f5a6f41f59001ac39d37c85e674d4acc11225e7244e62ea8f4cacefa4c44d40557ddae01dd9896205d4c1a2366a
-
Filesize
192KB
MD5729a746695ecfdd33259e5c91f0a0e81
SHA19013a27126dcd420452b08ef9173411a1109f9d0
SHA256bd97bf19be822870578fb75569c993e918c85763c0e56b44cf1039002bbac415
SHA512eb1f5321a532b73ab531c53d31f96634660aea51c1919e60659a60176ca5aec20ff60634c7109285f030ec16000d17392d2b235615cf3395e7cee7863676c6b0
-
Filesize
192KB
MD5ebc418a417c5471067faa6bcfa28e945
SHA159bece46dca6a7debbacc12de5a13ca5d57a0299
SHA256aa33ea5254d183693d5cdcb029e635eb9d708deb76726dcc8af3830a363b594b
SHA5121452e558afa05341d9ff550cbd563a7afbf20b3b369099c519d5a4d1fc7f2577e1c803e0f651de342388c3b9484cb9c650e82ba923ba33535ef3e1a7427ca11f
-
Filesize
192KB
MD5dab2ad2e2cd73a0f24660ebb17e2d534
SHA1afaa705cdab11618ba04efe8c4ba96ced7ee2712
SHA256c853bc7785512ae606c31fed6a66f7be1a69f57b9ff31f06357b3699b989a1d6
SHA5123b6f534cc554d79c85d50c17b930868a03930f034e80908811fb3ba9e2aa2e609b0b88fa4158417961726da9920179a50f69c5839a9fe5531b7b3495897fc360