Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe
-
Size
204KB
-
MD5
1c98473e2cf3ac1b4b7648652e2ab3ff
-
SHA1
e366129cb220fbd7616c3140dd84d41768a6ec17
-
SHA256
d493ae1bd8436b31cd43789c20901f2a99c51946a1d5062662f8f8dcdc4d3203
-
SHA512
5e8a37ba446eec068bd2bd300de8e62f01c4665eb59c5d751a4873fe31c6a617d158402d358e31ce2835a45ad8078083f35c06000acae69fb8a200cc2c146810
-
SSDEEP
1536:1EGh0oxl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oxl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Auto-generated rule 10 IoCs
resource yara_rule behavioral2/files/0x000f000000023144-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002323a-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023234-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023240-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c000000021838-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000021841-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000709-28.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000000037-32.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000072f-37.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000000037-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{58F980AC-8121-45bd-AD4E-0D1829D37ADB}\stubpath = "C:\\Windows\\{58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe" {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD} {3216F4C1-4F18-4afb-8AA2-376279BCCA59}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}\stubpath = "C:\\Windows\\{8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe" {3216F4C1-4F18-4afb-8AA2-376279BCCA59}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3D26031B-FF3E-44e6-BF38-CCD32337E0F0}\stubpath = "C:\\Windows\\{3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe" {8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A88E8B4C-016B-4adb-9D38-22F4FB0F1563} {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A88E8B4C-016B-4adb-9D38-22F4FB0F1563}\stubpath = "C:\\Windows\\{A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe" {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{581679B3-6437-4f8f-B099-A1A1233075FA}\stubpath = "C:\\Windows\\{581679B3-6437-4f8f-B099-A1A1233075FA}.exe" 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{58F980AC-8121-45bd-AD4E-0D1829D37ADB} {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE4E533A-CCCC-40b2-B9DD-668E21F3D807}\stubpath = "C:\\Windows\\{BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe" {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3216F4C1-4F18-4afb-8AA2-376279BCCA59} {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2CF06693-3272-4877-9E93-115C6F10E1D2} {581679B3-6437-4f8f-B099-A1A1233075FA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2CF06693-3272-4877-9E93-115C6F10E1D2}\stubpath = "C:\\Windows\\{2CF06693-3272-4877-9E93-115C6F10E1D2}.exe" {581679B3-6437-4f8f-B099-A1A1233075FA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A438C09F-5636-429d-A230-B93E1CCE7BFE}\stubpath = "C:\\Windows\\{A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe" {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE4E533A-CCCC-40b2-B9DD-668E21F3D807} {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2992DCB8-406A-44cf-9801-E4CD161F9366} {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{581679B3-6437-4f8f-B099-A1A1233075FA} 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A438C09F-5636-429d-A230-B93E1CCE7BFE} {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3216F4C1-4F18-4afb-8AA2-376279BCCA59}\stubpath = "C:\\Windows\\{3216F4C1-4F18-4afb-8AA2-376279BCCA59}.exe" {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3D26031B-FF3E-44e6-BF38-CCD32337E0F0} {8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2992DCB8-406A-44cf-9801-E4CD161F9366}\stubpath = "C:\\Windows\\{2992DCB8-406A-44cf-9801-E4CD161F9366}.exe" {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D27F238-C27E-493c-A642-7F90AC5FE034} {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D27F238-C27E-493c-A642-7F90AC5FE034}\stubpath = "C:\\Windows\\{7D27F238-C27E-493c-A642-7F90AC5FE034}.exe" {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe -
Executes dropped EXE 10 IoCs
pid Process 4316 {581679B3-6437-4f8f-B099-A1A1233075FA}.exe 1340 {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe 660 {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe 4736 {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe 2320 {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe 3292 {3216F4C1-4F18-4afb-8AA2-376279BCCA59}.exe 4236 {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe 3128 {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe 3976 {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe 4536 {2992DCB8-406A-44cf-9801-E4CD161F9366}.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\{7D27F238-C27E-493c-A642-7F90AC5FE034}.exe {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe File created C:\Windows\{3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe {8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe File created C:\Windows\{A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe File created C:\Windows\{2992DCB8-406A-44cf-9801-E4CD161F9366}.exe {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe File created C:\Windows\{581679B3-6437-4f8f-B099-A1A1233075FA}.exe 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe File created C:\Windows\{58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe File created C:\Windows\{A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe File created C:\Windows\{3216F4C1-4F18-4afb-8AA2-376279BCCA59}.exe {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe File created C:\Windows\{BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe File created C:\Windows\{2CF06693-3272-4877-9E93-115C6F10E1D2}.exe {581679B3-6437-4f8f-B099-A1A1233075FA}.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4708 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe Token: SeIncBasePriorityPrivilege 4316 {581679B3-6437-4f8f-B099-A1A1233075FA}.exe Token: SeIncBasePriorityPrivilege 1340 {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe Token: SeIncBasePriorityPrivilege 660 {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe Token: SeIncBasePriorityPrivilege 4736 {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe Token: SeIncBasePriorityPrivilege 2320 {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe Token: SeIncBasePriorityPrivilege 4772 {8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe Token: SeIncBasePriorityPrivilege 4236 {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe Token: SeIncBasePriorityPrivilege 3128 {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe Token: SeIncBasePriorityPrivilege 3976 {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4316 4708 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 90 PID 4708 wrote to memory of 4316 4708 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 90 PID 4708 wrote to memory of 4316 4708 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 90 PID 4708 wrote to memory of 2708 4708 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 91 PID 4708 wrote to memory of 2708 4708 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 91 PID 4708 wrote to memory of 2708 4708 2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe 91 PID 4316 wrote to memory of 1340 4316 {581679B3-6437-4f8f-B099-A1A1233075FA}.exe 93 PID 4316 wrote to memory of 1340 4316 {581679B3-6437-4f8f-B099-A1A1233075FA}.exe 93 PID 4316 wrote to memory of 1340 4316 {581679B3-6437-4f8f-B099-A1A1233075FA}.exe 93 PID 4316 wrote to memory of 3152 4316 {581679B3-6437-4f8f-B099-A1A1233075FA}.exe 94 PID 4316 wrote to memory of 3152 4316 {581679B3-6437-4f8f-B099-A1A1233075FA}.exe 94 PID 4316 wrote to memory of 3152 4316 {581679B3-6437-4f8f-B099-A1A1233075FA}.exe 94 PID 1340 wrote to memory of 660 1340 {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe 100 PID 1340 wrote to memory of 660 1340 {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe 100 PID 1340 wrote to memory of 660 1340 {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe 100 PID 1340 wrote to memory of 2836 1340 {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe 101 PID 1340 wrote to memory of 2836 1340 {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe 101 PID 1340 wrote to memory of 2836 1340 {2CF06693-3272-4877-9E93-115C6F10E1D2}.exe 101 PID 660 wrote to memory of 4736 660 {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe 103 PID 660 wrote to memory of 4736 660 {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe 103 PID 660 wrote to memory of 4736 660 {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe 103 PID 660 wrote to memory of 1684 660 {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe 104 PID 660 wrote to memory of 1684 660 {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe 104 PID 660 wrote to memory of 1684 660 {58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe 104 PID 4736 wrote to memory of 2320 4736 {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe 105 PID 4736 wrote to memory of 2320 4736 {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe 105 PID 4736 wrote to memory of 2320 4736 {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe 105 PID 4736 wrote to memory of 2468 4736 {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe 106 PID 4736 wrote to memory of 2468 4736 {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe 106 PID 4736 wrote to memory of 2468 4736 {A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe 106 PID 2320 wrote to memory of 3292 2320 {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe 107 PID 2320 wrote to memory of 3292 2320 {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe 107 PID 2320 wrote to memory of 3292 2320 {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe 107 PID 2320 wrote to memory of 4520 2320 {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe 108 PID 2320 wrote to memory of 4520 2320 {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe 108 PID 2320 wrote to memory of 4520 2320 {7D27F238-C27E-493c-A642-7F90AC5FE034}.exe 108 PID 4772 wrote to memory of 4236 4772 {8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe 111 PID 4772 wrote to memory of 4236 4772 {8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe 111 PID 4772 wrote to memory of 4236 4772 {8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe 111 PID 4772 wrote to memory of 1768 4772 {8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe 112 PID 4772 wrote to memory of 1768 4772 {8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe 112 PID 4772 wrote to memory of 1768 4772 {8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe 112 PID 4236 wrote to memory of 3128 4236 {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe 113 PID 4236 wrote to memory of 3128 4236 {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe 113 PID 4236 wrote to memory of 3128 4236 {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe 113 PID 4236 wrote to memory of 3196 4236 {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe 114 PID 4236 wrote to memory of 3196 4236 {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe 114 PID 4236 wrote to memory of 3196 4236 {3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe 114 PID 3128 wrote to memory of 3976 3128 {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe 115 PID 3128 wrote to memory of 3976 3128 {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe 115 PID 3128 wrote to memory of 3976 3128 {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe 115 PID 3128 wrote to memory of 4708 3128 {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe 116 PID 3128 wrote to memory of 4708 3128 {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe 116 PID 3128 wrote to memory of 4708 3128 {A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe 116 PID 3976 wrote to memory of 4536 3976 {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe 117 PID 3976 wrote to memory of 4536 3976 {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe 117 PID 3976 wrote to memory of 4536 3976 {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe 117 PID 3976 wrote to memory of 4316 3976 {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe 118 PID 3976 wrote to memory of 4316 3976 {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe 118 PID 3976 wrote to memory of 4316 3976 {BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\{581679B3-6437-4f8f-B099-A1A1233075FA}.exeC:\Windows\{581679B3-6437-4f8f-B099-A1A1233075FA}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\{2CF06693-3272-4877-9E93-115C6F10E1D2}.exeC:\Windows\{2CF06693-3272-4877-9E93-115C6F10E1D2}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\{58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exeC:\Windows\{58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\{A438C09F-5636-429d-A230-B93E1CCE7BFE}.exeC:\Windows\{A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\{7D27F238-C27E-493c-A642-7F90AC5FE034}.exeC:\Windows\{7D27F238-C27E-493c-A642-7F90AC5FE034}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\{3216F4C1-4F18-4afb-8AA2-376279BCCA59}.exeC:\Windows\{3216F4C1-4F18-4afb-8AA2-376279BCCA59}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
PID:3292 -
C:\Windows\{8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exeC:\Windows\{8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe8⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\{3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exeC:\Windows\{3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\{A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exeC:\Windows\{A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\{BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exeC:\Windows\{BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\{2992DCB8-406A-44cf-9801-E4CD161F9366}.exeC:\Windows\{2992DCB8-406A-44cf-9801-E4CD161F9366}.exe12⤵
- Executes dropped EXE
PID:4536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BE4E5~1.EXE > nul12⤵PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A88E8~1.EXE > nul11⤵PID:4708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3D260~1.EXE > nul10⤵PID:3196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C3F7~1.EXE > nul9⤵PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3216F~1.EXE > nul8⤵PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D27F~1.EXE > nul7⤵PID:4520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A438C~1.EXE > nul6⤵PID:2468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{58F98~1.EXE > nul5⤵PID:1684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2CF06~1.EXE > nul4⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{58167~1.EXE > nul3⤵PID:3152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD59c5885a549ff9223f08e6b860123f82b
SHA1737509c51c8c2971219452dcb4124431fce886ef
SHA25669f845f297a9d1dd5168ad4d1825ac88bd289be07446d1336f85ccda2737b55b
SHA51294586754d71d80455788cd67a8d706148f19fff245602d5ce83eaa2824eeb381d39a5178a848c8de46ae6e98a738e44a9e7a789c9f7dd2e7c088e22063de342e
-
Filesize
204KB
MD5541d6a0b76c9fe36aa1b6750b09aa004
SHA1bea1a203cc848ac26b77fca759bf53eaf0d3e631
SHA2563cebdd57ee4bf26bcd0ae38582b8ccf98242330bd654eccc59867f7ba324eaaf
SHA512f4178cafff9e234a1740eb0837037695b29b2573904e78ae17ee39f11c2837e6ce854d7326a4b3e438302c94bcbc9edd7c43d788b1cb5e5d54033656024ebfa9
-
Filesize
204KB
MD59ce160f89a2163116db8530859f19fbc
SHA1b7e0bae91bbf7d72ae38e759b9d11bfb9948b2a5
SHA256d2e785b9193f950b143ba8e5956eec61ee07f7862b1e247f6b69638d1804a421
SHA512125e0930cb763d9b953e9707921ec1a3107f1bd3a9b57aefc4cd9c02236dd9562fc1a21fc058e8ff617b8f29a0d14ba133ae7ce45437cf235031beb67e100a49
-
Filesize
204KB
MD5115827388a4b954dd2f438ac82700243
SHA1632a472c8ef8ad3a21415360c430c8392805faca
SHA256a3d67a13cc1ef56c83a0bbd378786a18f9bfa238734f85119bdf74d677c8f129
SHA5121f6eb9b12db1658c9ff8075f175bfa5a7f0a72efeac0a34d661d0e87a044c368bb1f177dee0b36c1413db8d9db50981e0d8673ed5a4ee13b49a9f3512e040844
-
Filesize
204KB
MD5d5cbcbd81b0bdcf1a233ac046fc4b01d
SHA1546cc8f1a7af13bbf24ad9e4a0bd4e8a0e456e7e
SHA256366ff8d24510ded75ff5b757bd0abfecffafc1ef054e52d2fcb987aa50543d42
SHA512d85e4be4e99297e75133523d06b88d1c4f347bed9631363d938b4895176029a5cb5446175b13242b7085c24583f54ca18f4a84e591e02793c239fc6e1fea8a0c
-
Filesize
204KB
MD5a70faaefa2d1a2a21cb9601e112e1f8b
SHA19cc69a2aa127b89660bb32f64f022e762490dc38
SHA2560c574de07aead187001d80a055189224bf01c4ae83bdba9937ebba605b3f53b8
SHA512a361532581eb62970b7f2887651b6ddb220a0b0c2b13248ad196c530e21ab98c818d7392a8fce84ee7afc599bbe8e82c315dc9bf9f3e4456da07be908805bd85
-
Filesize
204KB
MD5c2afaa7b05dfef6def0a906eef1d9d0b
SHA17023701428a362211dbcdd769de92a9375d274ac
SHA256b746291f1523e56adcc53ab03a93ecd40e18deab66d2f0e2448742af061505d1
SHA512cb9f34d5f32301c0289371626fa86f0f36ca32337934d8d64121fbcc74bfe57a8915b3cb6df8a337d49642bbe8be7e07792ff63f85fedd707775fbd71272d6ca
-
Filesize
204KB
MD5b4134aa0c2d5e493d8c406ea7d0e4d4a
SHA15d4819bc655b8ed07d772d09b424512a6900cf8f
SHA256d58c4b433e22450e2dc0820dceca3b964753b4520d1c14ed130a42c0c3713c5c
SHA512d768697e88680434188d973b4b194b767c6af62bb411ee50973168a49517b06effe3a08ffd9571a5a74aa419e6775ccc926c0af3a948bc97ddea629721e831ac
-
Filesize
204KB
MD542b3087033a5a55730a8d918ecf29b34
SHA12de43c442a19c765513df22b3fd399a2a90a736f
SHA2563094cb6879c0e5013778290d875fbe5828d3da15b754bddb6a29fd654cc4859e
SHA5120381b2458b9a3012a13a0929ca5339cb4543fb0d160bfe5e6563760200ceef9053cd90e309f7afbe0a03964e4335bd39ae73b6ca787801d0e8d071d43cb0ad6a
-
Filesize
204KB
MD5876441494cf414e4009b4f4cfaf8d3dd
SHA10b2cf16fc4e25dc8af38ad0b4eaf581b53ec6af4
SHA256468769341a91119214159c310d14555cf23d87d69c706b774cba9fc45ce809c1
SHA512b4f3549b529366af6c58eaafc0bfca6c800446b82d17631320c69bd2ca32191fab760919bfe15d1a858d346f9da71eb4427607fe0c562c441e4e63724a871732