Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe
-
Size
204KB
-
MD5
1c98473e2cf3ac1b4b7648652e2ab3ff
-
SHA1
e366129cb220fbd7616c3140dd84d41768a6ec17
-
SHA256
d493ae1bd8436b31cd43789c20901f2a99c51946a1d5062662f8f8dcdc4d3203
-
SHA512
5e8a37ba446eec068bd2bd300de8e62f01c4665eb59c5d751a4873fe31c6a617d158402d358e31ce2835a45ad8078083f35c06000acae69fb8a200cc2c146810
-
SSDEEP
1536:1EGh0oxl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oxl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000700000001220a-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000126dd-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000800000001220a-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000900000001220a-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a00000001220a-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b00000001220a-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c00000001220a-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12} {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80F0ADDB-4142-41f4-B1FD-FF80855B8E7C} 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}\stubpath = "C:\\Windows\\{80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe" 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2E3B83D-CD59-48e8-91D9-4B260BE9C480}\stubpath = "C:\\Windows\\{D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe" {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}\stubpath = "C:\\Windows\\{A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe" {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{217415D1-4171-4a2b-827C-F1EE768D9AC8}\stubpath = "C:\\Windows\\{217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe" {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B588A459-0DFE-4b60-8129-A306E67A34B8}\stubpath = "C:\\Windows\\{B588A459-0DFE-4b60-8129-A306E67A34B8}.exe" {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{217415D1-4171-4a2b-827C-F1EE768D9AC8} {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{257CBE63-5028-4903-AF1F-068DE965F2F6}\stubpath = "C:\\Windows\\{257CBE63-5028-4903-AF1F-068DE965F2F6}.exe" {D928B7FC-3D95-4a53-B7D1-7ECCC74243DF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57AD90A3-AAEA-4c1d-80E1-9DE7C4FDA6C7} {257CBE63-5028-4903-AF1F-068DE965F2F6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2E3B83D-CD59-48e8-91D9-4B260BE9C480} {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12}\stubpath = "C:\\Windows\\{F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12}.exe" {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D928B7FC-3D95-4a53-B7D1-7ECCC74243DF} {F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D928B7FC-3D95-4a53-B7D1-7ECCC74243DF}\stubpath = "C:\\Windows\\{D928B7FC-3D95-4a53-B7D1-7ECCC74243DF}.exe" {F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{257CBE63-5028-4903-AF1F-068DE965F2F6} {D928B7FC-3D95-4a53-B7D1-7ECCC74243DF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7} {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B588A459-0DFE-4b60-8129-A306E67A34B8} {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A014DD43-3DF5-46e5-BD19-1F598C12E6E4} {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A014DD43-3DF5-46e5-BD19-1F598C12E6E4}\stubpath = "C:\\Windows\\{A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe" {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8203E245-9F67-40f4-858A-C5F7CA2BE39F} {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8203E245-9F67-40f4-858A-C5F7CA2BE39F}\stubpath = "C:\\Windows\\{8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe" {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57AD90A3-AAEA-4c1d-80E1-9DE7C4FDA6C7}\stubpath = "C:\\Windows\\{57AD90A3-AAEA-4c1d-80E1-9DE7C4FDA6C7}.exe" {257CBE63-5028-4903-AF1F-068DE965F2F6}.exe -
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1732 {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe 2684 {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe 2592 {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe 2876 {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe 2472 {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe 1124 {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe 1948 {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe 1868 {F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12}.exe 3044 {D928B7FC-3D95-4a53-B7D1-7ECCC74243DF}.exe 2256 {257CBE63-5028-4903-AF1F-068DE965F2F6}.exe 1396 {57AD90A3-AAEA-4c1d-80E1-9DE7C4FDA6C7}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{57AD90A3-AAEA-4c1d-80E1-9DE7C4FDA6C7}.exe {257CBE63-5028-4903-AF1F-068DE965F2F6}.exe File created C:\Windows\{D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe File created C:\Windows\{A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe File created C:\Windows\{B588A459-0DFE-4b60-8129-A306E67A34B8}.exe {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe File created C:\Windows\{A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe File created C:\Windows\{D928B7FC-3D95-4a53-B7D1-7ECCC74243DF}.exe {F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12}.exe File created C:\Windows\{257CBE63-5028-4903-AF1F-068DE965F2F6}.exe {D928B7FC-3D95-4a53-B7D1-7ECCC74243DF}.exe File created C:\Windows\{80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe File created C:\Windows\{217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe File created C:\Windows\{8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe File created C:\Windows\{F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12}.exe {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2496 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe Token: SeIncBasePriorityPrivilege 1732 {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe Token: SeIncBasePriorityPrivilege 2684 {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe Token: SeIncBasePriorityPrivilege 2592 {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe Token: SeIncBasePriorityPrivilege 2876 {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe Token: SeIncBasePriorityPrivilege 2472 {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe Token: SeIncBasePriorityPrivilege 1124 {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe Token: SeIncBasePriorityPrivilege 1948 {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe Token: SeIncBasePriorityPrivilege 1868 {F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12}.exe Token: SeIncBasePriorityPrivilege 3044 {D928B7FC-3D95-4a53-B7D1-7ECCC74243DF}.exe Token: SeIncBasePriorityPrivilege 2256 {257CBE63-5028-4903-AF1F-068DE965F2F6}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1732 2496 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 28 PID 2496 wrote to memory of 1732 2496 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 28 PID 2496 wrote to memory of 1732 2496 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 28 PID 2496 wrote to memory of 1732 2496 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 28 PID 2496 wrote to memory of 2784 2496 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 29 PID 2496 wrote to memory of 2784 2496 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 29 PID 2496 wrote to memory of 2784 2496 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 29 PID 2496 wrote to memory of 2784 2496 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 29 PID 1732 wrote to memory of 2684 1732 {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe 30 PID 1732 wrote to memory of 2684 1732 {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe 30 PID 1732 wrote to memory of 2684 1732 {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe 30 PID 1732 wrote to memory of 2684 1732 {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe 30 PID 1732 wrote to memory of 2564 1732 {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe 31 PID 1732 wrote to memory of 2564 1732 {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe 31 PID 1732 wrote to memory of 2564 1732 {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe 31 PID 1732 wrote to memory of 2564 1732 {80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe 31 PID 2684 wrote to memory of 2592 2684 {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe 32 PID 2684 wrote to memory of 2592 2684 {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe 32 PID 2684 wrote to memory of 2592 2684 {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe 32 PID 2684 wrote to memory of 2592 2684 {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe 32 PID 2684 wrote to memory of 2444 2684 {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe 33 PID 2684 wrote to memory of 2444 2684 {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe 33 PID 2684 wrote to memory of 2444 2684 {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe 33 PID 2684 wrote to memory of 2444 2684 {D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe 33 PID 2592 wrote to memory of 2876 2592 {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe 36 PID 2592 wrote to memory of 2876 2592 {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe 36 PID 2592 wrote to memory of 2876 2592 {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe 36 PID 2592 wrote to memory of 2876 2592 {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe 36 PID 2592 wrote to memory of 2124 2592 {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe 37 PID 2592 wrote to memory of 2124 2592 {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe 37 PID 2592 wrote to memory of 2124 2592 {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe 37 PID 2592 wrote to memory of 2124 2592 {A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe 37 PID 2876 wrote to memory of 2472 2876 {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe 38 PID 2876 wrote to memory of 2472 2876 {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe 38 PID 2876 wrote to memory of 2472 2876 {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe 38 PID 2876 wrote to memory of 2472 2876 {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe 38 PID 2876 wrote to memory of 2648 2876 {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe 39 PID 2876 wrote to memory of 2648 2876 {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe 39 PID 2876 wrote to memory of 2648 2876 {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe 39 PID 2876 wrote to memory of 2648 2876 {217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe 39 PID 2472 wrote to memory of 1124 2472 {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe 40 PID 2472 wrote to memory of 1124 2472 {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe 40 PID 2472 wrote to memory of 1124 2472 {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe 40 PID 2472 wrote to memory of 1124 2472 {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe 40 PID 2472 wrote to memory of 2212 2472 {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe 41 PID 2472 wrote to memory of 2212 2472 {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe 41 PID 2472 wrote to memory of 2212 2472 {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe 41 PID 2472 wrote to memory of 2212 2472 {B588A459-0DFE-4b60-8129-A306E67A34B8}.exe 41 PID 1124 wrote to memory of 1948 1124 {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe 42 PID 1124 wrote to memory of 1948 1124 {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe 42 PID 1124 wrote to memory of 1948 1124 {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe 42 PID 1124 wrote to memory of 1948 1124 {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe 42 PID 1124 wrote to memory of 2016 1124 {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe 43 PID 1124 wrote to memory of 2016 1124 {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe 43 PID 1124 wrote to memory of 2016 1124 {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe 43 PID 1124 wrote to memory of 2016 1124 {A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe 43 PID 1948 wrote to memory of 1868 1948 {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe 44 PID 1948 wrote to memory of 1868 1948 {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe 44 PID 1948 wrote to memory of 1868 1948 {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe 44 PID 1948 wrote to memory of 1868 1948 {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe 44 PID 1948 wrote to memory of 1692 1948 {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe 45 PID 1948 wrote to memory of 1692 1948 {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe 45 PID 1948 wrote to memory of 1692 1948 {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe 45 PID 1948 wrote to memory of 1692 1948 {8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\{80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exeC:\Windows\{80F0ADDB-4142-41f4-B1FD-FF80855B8E7C}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\{D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exeC:\Windows\{D2E3B83D-CD59-48e8-91D9-4B260BE9C480}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\{A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exeC:\Windows\{A8FD3A19-B4BB-442d-8A9F-B8B1F2C0EFF7}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\{217415D1-4171-4a2b-827C-F1EE768D9AC8}.exeC:\Windows\{217415D1-4171-4a2b-827C-F1EE768D9AC8}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\{B588A459-0DFE-4b60-8129-A306E67A34B8}.exeC:\Windows\{B588A459-0DFE-4b60-8129-A306E67A34B8}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\{A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exeC:\Windows\{A014DD43-3DF5-46e5-BD19-1F598C12E6E4}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\{8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exeC:\Windows\{8203E245-9F67-40f4-858A-C5F7CA2BE39F}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\{F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12}.exeC:\Windows\{F0FBB02C-43CF-4c9d-8E65-2A9B86D8FA12}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\{D928B7FC-3D95-4a53-B7D1-7ECCC74243DF}.exeC:\Windows\{D928B7FC-3D95-4a53-B7D1-7ECCC74243DF}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\{257CBE63-5028-4903-AF1F-068DE965F2F6}.exeC:\Windows\{257CBE63-5028-4903-AF1F-068DE965F2F6}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\{57AD90A3-AAEA-4c1d-80E1-9DE7C4FDA6C7}.exeC:\Windows\{57AD90A3-AAEA-4c1d-80E1-9DE7C4FDA6C7}.exe12⤵
- Executes dropped EXE
PID:1396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{257CB~1.EXE > nul12⤵PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D928B~1.EXE > nul11⤵PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F0FBB~1.EXE > nul10⤵PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8203E~1.EXE > nul9⤵PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A014D~1.EXE > nul8⤵PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B588A~1.EXE > nul7⤵PID:2212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{21741~1.EXE > nul6⤵PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8FD3~1.EXE > nul5⤵PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2E3B~1.EXE > nul4⤵PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80F0A~1.EXE > nul3⤵PID:2564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD557a43dba18ab6954b299b20a2a7ca4dd
SHA1b133f79512aa2bedf1522d9beb6b68ca77e91c40
SHA256a08d1cf313f30d0aada9ed4b173e30d2b2d4b12822a9332fe8bb85651e4157d1
SHA512bfd1716a10665ae369d9637e5d2a1e5d6a5a1159ef77a09d980e8014900832e575b46f0fb66d80750c26cbf7d85eebfaabb0aaea747b7d7254fa20c8b0193b47
-
Filesize
204KB
MD5e4d8d14ef5c840d4731d846257f1efa1
SHA19e1ae0ec5834f0eb3e273eddad4f6633d7039550
SHA256f9d5a577b2299fa7b4809f6d2330f6d5b34521ecb9779f5c5e8eaefa401e3fea
SHA5120aaa0642e4cab5173425bbf030c3be744c9e3f0cf65c0fc675bb12b3503dcd420207516408c074399bebf509d33255deed4350487a31e423f12913ff4c80dba4
-
Filesize
204KB
MD5cd330e73c8c16e9d6132d0e751eeecf7
SHA1322cc480f414daa27ffd955be38105eb98908777
SHA2565c55dc99a98b7c764612d60546dcecaf66c82ec31ef7f39b1a29e4acb9124d98
SHA5121142a2103c41769359cc318157b64a242c59b52565a974db844c2031ea6c92804ba6742039033052d4ea9349c44fb18a1850ecaf7c44faad02c2faa123d07a5a
-
Filesize
204KB
MD5f1c5b8e56069f65c2947fe8eed8f8a58
SHA19dbe2ada8b548a1869d034fef2b46ac35e6fbc01
SHA256561254a3d0b59d99cc0fa7ba19b85e7df605011777b8688c36e34cfd34514b94
SHA512405651c3f3dc756492d8f6cd2822d7850637fca6ac8fa62f5a86d3fa4668aa65e2dff50146d2e694e5ac4377cf831ebf0c938d0c8e97deee61ef35687fab30eb
-
Filesize
204KB
MD5f85231224a4e1d4ca6dd992609f2608f
SHA184e42305773e66c0b9d5060da61cfb1d70a279b1
SHA256b742c627795b864f4e37a745ea1b3a20035c4ab22d27d652bba3727a2fc536b1
SHA512184e5df7459d94acab4f4e9e2e8572c7ee70a3e56a0c24d93f81c6025c2aa8917a02c0666b83d28fba3acd9b235bdb67a7c57de35f79f8cc49298db28bf61b6a
-
Filesize
204KB
MD5ac8e8550ea3eda86cf4421847f44fea6
SHA1d4690baf71d877cc9652174e13ffccf05f575ed1
SHA256059c8b89b4939577ac8fbe2d07893f1e32263f01c59cc08616b63fd6144779e7
SHA5120b290582c854ca058dca4f81656e61a7a41a1b7f107c943701a1f85e5dd9338911bde9f15731a27d11137e2d7f58827cadd2dda74c1ab79ad282084b03886755
-
Filesize
204KB
MD596a0c3a6eb74b035db92f2f371a0128f
SHA1229f4f7134f2b3fb2d1fae24af7083013468b910
SHA25668bee40454ff01f9368f531f778010529752d302b61026359683f71e49d9bff2
SHA512a25115f8ec3de649c00fcdac5c1e4beb581d6bd667c1890b50f117704f9270a18f7365c7b913a19b82cfbacf69564cca0efc2cac8983b78aa839106b67c37d62
-
Filesize
204KB
MD5d474e6addf08425b097e57b8a8891407
SHA1d82fca97909e505eada1fcd5a20252f1e6427bd1
SHA256f9de92d85fd64190ffccc2bff614d4a770e1d4d6fc982310a22b0b075cd8a0de
SHA512b15eebd0b42898aa499837d51383f2054ab5cb6a0e208bc0a20ae8b97920b5ae7f26775ef2d63d32ccd0dd549d565ef88e56f2adb6172a9df213fdfcc9b48172
-
Filesize
204KB
MD504af504dd2b4a1fb7bc0bb44f47b942f
SHA175ac241491ba0f9358f67fa5d243cda7fde28186
SHA2566defd35df32675cc9ed7836cf3bdfc219c439552d2688c5525ddec01e3d3c450
SHA512b47da3ee30c529006347feee31f069b2356bdd7b37206a011ad052a3b52c75d4e050994822bb0782619e5e39b102c4f201f15f1c63613aa3bf3b24e62b9df4f1
-
Filesize
204KB
MD50b1b8e75d6a03bf4666b5714a36f8cce
SHA189cfb2c2c5c4ca7f2fb0bdcc4cfc1ae1fc7fef2f
SHA2569f37ea00ee94c45589e0039946d5de82b9fe73e89f055f7bb596c3021c2571f5
SHA512963cc463ed5f4a915af43e27340acc6f9aa83de02572ed2d41b71ff6bc6280f1a273869935ca75859400bae0ee0303c8d8a9b6ea8847bd0736897fcffd4ceafc
-
Filesize
204KB
MD51553594df72fdca132ec61e5e9eb6340
SHA12f28884d9904a580adc25a807a965f6d747d3fdb
SHA2568b24f7a8d47a72ddf8deb3bb7658cc797aeb50ea51e4c223b8490da34e3d177a
SHA51238e965e5facc81917e4d642dc40c8d975e0434cc1b4a2dfa8421ad115811c2f295ed8a540a55c6d3adc9442a308880260e829b8066a6373253883f76361e47df