Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe
Resource
win10v2004-20240226-en
General
-
Target
b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe
-
Size
168KB
-
MD5
0b202b461c8f84b2286ad3d1ef892bc7
-
SHA1
4dfe25a1cb3497d46ae64a266b3e2d98572f190d
-
SHA256
b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d
-
SHA512
c022c671471bbbbf710c8e07985dbfa8690f86aae58f925ba44f6278dee668f3bf2d97520c1b92e87a33d12b83d8ef5aa7b585d5a909b0f9889ced1b9ae677f1
-
SSDEEP
1536:1EGh0o0li5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o0liOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x00020000000228bc-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00020000000228bf-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023227-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023228-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002322f-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023228-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002322f-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023228-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002322f-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023228-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a00000002322f-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c000000023228-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FA9D095B-1386-4b38-94BA-F1BECD8364FD} {432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2C7E776A-D14A-4e58-BF32-29A5714838DB} {95561774-2484-4d0b-A94D-C3420423717F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{272D7494-FC77-4021-B351-0C2F84CDEA4B}\stubpath = "C:\\Windows\\{272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe" {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}\stubpath = "C:\\Windows\\{BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe" {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AB272200-B25A-46cd-988A-C5B93485CFAE} {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA} {9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AC106E90-FA7B-4632-9E3B-E98762737E78}\stubpath = "C:\\Windows\\{AC106E90-FA7B-4632-9E3B-E98762737E78}.exe" b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{95561774-2484-4d0b-A94D-C3420423717F}\stubpath = "C:\\Windows\\{95561774-2484-4d0b-A94D-C3420423717F}.exe" {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{79DBB20B-D152-466a-B5E6-22E74A110F41}\stubpath = "C:\\Windows\\{79DBB20B-D152-466a-B5E6-22E74A110F41}.exe" {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B60D9037-EF06-456c-ADD2-87F3301BF68B}\stubpath = "C:\\Windows\\{B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe" {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{636F2234-8410-418e-A954-1D98AD045D1B}\stubpath = "C:\\Windows\\{636F2234-8410-418e-A954-1D98AD045D1B}.exe" {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{272D7494-FC77-4021-B351-0C2F84CDEA4B} {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B60D9037-EF06-456c-ADD2-87F3301BF68B} {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E96ECCA-F366-4557-A56E-8EE01785FE8A} {636F2234-8410-418e-A954-1D98AD045D1B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E96ECCA-F366-4557-A56E-8EE01785FE8A}\stubpath = "C:\\Windows\\{9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe" {636F2234-8410-418e-A954-1D98AD045D1B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA}\stubpath = "C:\\Windows\\{432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA}.exe" {9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AB272200-B25A-46cd-988A-C5B93485CFAE}\stubpath = "C:\\Windows\\{AB272200-B25A-46cd-988A-C5B93485CFAE}.exe" {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{636F2234-8410-418e-A954-1D98AD045D1B} {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FA9D095B-1386-4b38-94BA-F1BECD8364FD}\stubpath = "C:\\Windows\\{FA9D095B-1386-4b38-94BA-F1BECD8364FD}.exe" {432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AC106E90-FA7B-4632-9E3B-E98762737E78} b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{95561774-2484-4d0b-A94D-C3420423717F} {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2C7E776A-D14A-4e58-BF32-29A5714838DB}\stubpath = "C:\\Windows\\{2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe" {95561774-2484-4d0b-A94D-C3420423717F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BCC2D614-753E-4ba3-AD5B-B96280DFF2EF} {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{79DBB20B-D152-466a-B5E6-22E74A110F41} {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe -
Executes dropped EXE 12 IoCs
pid Process 2520 {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe 2004 {95561774-2484-4d0b-A94D-C3420423717F}.exe 1512 {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe 4400 {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe 3908 {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe 844 {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe 4572 {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe 2852 {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe 4204 {636F2234-8410-418e-A954-1D98AD045D1B}.exe 216 {9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe 3780 {432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA}.exe 4456 {FA9D095B-1386-4b38-94BA-F1BECD8364FD}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe File created C:\Windows\{9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe {636F2234-8410-418e-A954-1D98AD045D1B}.exe File created C:\Windows\{FA9D095B-1386-4b38-94BA-F1BECD8364FD}.exe {432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA}.exe File created C:\Windows\{95561774-2484-4d0b-A94D-C3420423717F}.exe {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe File created C:\Windows\{272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe File created C:\Windows\{BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe File created C:\Windows\{79DBB20B-D152-466a-B5E6-22E74A110F41}.exe {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe File created C:\Windows\{AB272200-B25A-46cd-988A-C5B93485CFAE}.exe {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe File created C:\Windows\{636F2234-8410-418e-A954-1D98AD045D1B}.exe {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe File created C:\Windows\{432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA}.exe {9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe File created C:\Windows\{AC106E90-FA7B-4632-9E3B-E98762737E78}.exe b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe File created C:\Windows\{2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe {95561774-2484-4d0b-A94D-C3420423717F}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1332 b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe Token: SeIncBasePriorityPrivilege 2520 {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe Token: SeIncBasePriorityPrivilege 2004 {95561774-2484-4d0b-A94D-C3420423717F}.exe Token: SeIncBasePriorityPrivilege 1512 {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe Token: SeIncBasePriorityPrivilege 4400 {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe Token: SeIncBasePriorityPrivilege 3908 {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe Token: SeIncBasePriorityPrivilege 844 {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe Token: SeIncBasePriorityPrivilege 4572 {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe Token: SeIncBasePriorityPrivilege 2852 {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe Token: SeIncBasePriorityPrivilege 4204 {636F2234-8410-418e-A954-1D98AD045D1B}.exe Token: SeIncBasePriorityPrivilege 216 {9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe Token: SeIncBasePriorityPrivilege 3780 {432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2520 1332 b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe 89 PID 1332 wrote to memory of 2520 1332 b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe 89 PID 1332 wrote to memory of 2520 1332 b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe 89 PID 1332 wrote to memory of 4472 1332 b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe 90 PID 1332 wrote to memory of 4472 1332 b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe 90 PID 1332 wrote to memory of 4472 1332 b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe 90 PID 2520 wrote to memory of 2004 2520 {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe 91 PID 2520 wrote to memory of 2004 2520 {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe 91 PID 2520 wrote to memory of 2004 2520 {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe 91 PID 2520 wrote to memory of 4368 2520 {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe 92 PID 2520 wrote to memory of 4368 2520 {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe 92 PID 2520 wrote to memory of 4368 2520 {AC106E90-FA7B-4632-9E3B-E98762737E78}.exe 92 PID 2004 wrote to memory of 1512 2004 {95561774-2484-4d0b-A94D-C3420423717F}.exe 95 PID 2004 wrote to memory of 1512 2004 {95561774-2484-4d0b-A94D-C3420423717F}.exe 95 PID 2004 wrote to memory of 1512 2004 {95561774-2484-4d0b-A94D-C3420423717F}.exe 95 PID 2004 wrote to memory of 2636 2004 {95561774-2484-4d0b-A94D-C3420423717F}.exe 96 PID 2004 wrote to memory of 2636 2004 {95561774-2484-4d0b-A94D-C3420423717F}.exe 96 PID 2004 wrote to memory of 2636 2004 {95561774-2484-4d0b-A94D-C3420423717F}.exe 96 PID 1512 wrote to memory of 4400 1512 {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe 100 PID 1512 wrote to memory of 4400 1512 {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe 100 PID 1512 wrote to memory of 4400 1512 {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe 100 PID 1512 wrote to memory of 3572 1512 {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe 101 PID 1512 wrote to memory of 3572 1512 {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe 101 PID 1512 wrote to memory of 3572 1512 {2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe 101 PID 4400 wrote to memory of 3908 4400 {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe 104 PID 4400 wrote to memory of 3908 4400 {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe 104 PID 4400 wrote to memory of 3908 4400 {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe 104 PID 4400 wrote to memory of 1232 4400 {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe 105 PID 4400 wrote to memory of 1232 4400 {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe 105 PID 4400 wrote to memory of 1232 4400 {272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe 105 PID 3908 wrote to memory of 844 3908 {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe 106 PID 3908 wrote to memory of 844 3908 {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe 106 PID 3908 wrote to memory of 844 3908 {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe 106 PID 3908 wrote to memory of 4960 3908 {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe 107 PID 3908 wrote to memory of 4960 3908 {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe 107 PID 3908 wrote to memory of 4960 3908 {BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe 107 PID 844 wrote to memory of 4572 844 {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe 108 PID 844 wrote to memory of 4572 844 {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe 108 PID 844 wrote to memory of 4572 844 {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe 108 PID 844 wrote to memory of 4504 844 {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe 109 PID 844 wrote to memory of 4504 844 {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe 109 PID 844 wrote to memory of 4504 844 {79DBB20B-D152-466a-B5E6-22E74A110F41}.exe 109 PID 4572 wrote to memory of 2852 4572 {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe 110 PID 4572 wrote to memory of 2852 4572 {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe 110 PID 4572 wrote to memory of 2852 4572 {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe 110 PID 4572 wrote to memory of 2028 4572 {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe 111 PID 4572 wrote to memory of 2028 4572 {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe 111 PID 4572 wrote to memory of 2028 4572 {AB272200-B25A-46cd-988A-C5B93485CFAE}.exe 111 PID 2852 wrote to memory of 4204 2852 {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe 112 PID 2852 wrote to memory of 4204 2852 {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe 112 PID 2852 wrote to memory of 4204 2852 {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe 112 PID 2852 wrote to memory of 4840 2852 {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe 113 PID 2852 wrote to memory of 4840 2852 {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe 113 PID 2852 wrote to memory of 4840 2852 {B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe 113 PID 4204 wrote to memory of 216 4204 {636F2234-8410-418e-A954-1D98AD045D1B}.exe 114 PID 4204 wrote to memory of 216 4204 {636F2234-8410-418e-A954-1D98AD045D1B}.exe 114 PID 4204 wrote to memory of 216 4204 {636F2234-8410-418e-A954-1D98AD045D1B}.exe 114 PID 4204 wrote to memory of 1588 4204 {636F2234-8410-418e-A954-1D98AD045D1B}.exe 115 PID 4204 wrote to memory of 1588 4204 {636F2234-8410-418e-A954-1D98AD045D1B}.exe 115 PID 4204 wrote to memory of 1588 4204 {636F2234-8410-418e-A954-1D98AD045D1B}.exe 115 PID 216 wrote to memory of 3780 216 {9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe 116 PID 216 wrote to memory of 3780 216 {9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe 116 PID 216 wrote to memory of 3780 216 {9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe 116 PID 216 wrote to memory of 3084 216 {9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe"C:\Users\Admin\AppData\Local\Temp\b181a530096c98c8933c97b7b427f908254415eaf1b09736e8fd25eb35c65d1d.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\{AC106E90-FA7B-4632-9E3B-E98762737E78}.exeC:\Windows\{AC106E90-FA7B-4632-9E3B-E98762737E78}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\{95561774-2484-4d0b-A94D-C3420423717F}.exeC:\Windows\{95561774-2484-4d0b-A94D-C3420423717F}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\{2C7E776A-D14A-4e58-BF32-29A5714838DB}.exeC:\Windows\{2C7E776A-D14A-4e58-BF32-29A5714838DB}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\{272D7494-FC77-4021-B351-0C2F84CDEA4B}.exeC:\Windows\{272D7494-FC77-4021-B351-0C2F84CDEA4B}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\{BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exeC:\Windows\{BCC2D614-753E-4ba3-AD5B-B96280DFF2EF}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\{79DBB20B-D152-466a-B5E6-22E74A110F41}.exeC:\Windows\{79DBB20B-D152-466a-B5E6-22E74A110F41}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\{AB272200-B25A-46cd-988A-C5B93485CFAE}.exeC:\Windows\{AB272200-B25A-46cd-988A-C5B93485CFAE}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\{B60D9037-EF06-456c-ADD2-87F3301BF68B}.exeC:\Windows\{B60D9037-EF06-456c-ADD2-87F3301BF68B}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\{636F2234-8410-418e-A954-1D98AD045D1B}.exeC:\Windows\{636F2234-8410-418e-A954-1D98AD045D1B}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\{9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exeC:\Windows\{9E96ECCA-F366-4557-A56E-8EE01785FE8A}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\{432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA}.exeC:\Windows\{432D0CF0-EFC8-4b7c-AE2A-4806DF1870FA}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3780 -
C:\Windows\{FA9D095B-1386-4b38-94BA-F1BECD8364FD}.exeC:\Windows\{FA9D095B-1386-4b38-94BA-F1BECD8364FD}.exe13⤵
- Executes dropped EXE
PID:4456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{432D0~1.EXE > nul13⤵PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E96E~1.EXE > nul12⤵PID:3084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{636F2~1.EXE > nul11⤵PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B60D9~1.EXE > nul10⤵PID:4840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AB272~1.EXE > nul9⤵PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79DBB~1.EXE > nul8⤵PID:4504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BCC2D~1.EXE > nul7⤵PID:4960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{272D7~1.EXE > nul6⤵PID:1232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2C7E7~1.EXE > nul5⤵PID:3572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{95561~1.EXE > nul4⤵PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AC106~1.EXE > nul3⤵PID:4368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\B181A5~1.EXE > nul2⤵PID:4472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD52fa58df53c6a6e8c3aec5d77f5524e1e
SHA103aed9f918cc219fa3d252c7e56448c148deec43
SHA256ee7fdb313b40f717c8a8527b6ed920d6b04c7d4258adeb2f581763b9d832550f
SHA512551a0eaeaa3dc108faeb03ec4b5989c3a355c5f514398be4b9b7c3d91617d1632e8f3933a572c705b36e6f6979fb234b39a65f735ae22985d96273c7ae901ae0
-
Filesize
168KB
MD5e6b35e09e1e26bbe0010fbb817ad537b
SHA156f34f356e538bbfd9da390bc0fc0e0dfdc6d71e
SHA256aca6bd7d8186f9f4319687aa19a3f58727b7e377561cceb946a902ca8db6fe1a
SHA5120fb9e025639aea248bbd71874eda7a302cb12a6b84e520c083e7961bfd81aa1b267496edda70602fe4e1041e3dea27f066ba1a52a3bab669177dd30ae4d47339
-
Filesize
168KB
MD5afc8e0e77d2bfb49eaa5ba169ca6178f
SHA1a1ded85940ff3b528ef6d10df4c3833764bebf1f
SHA2566427bec53c56b35bacfd5e09a9ab1272f8d6aaa8ba5a9d5e31cb938e8643639a
SHA51274fc2cc2e5c793f5771698be793e3661eefa2bd65bc250edd4ae3fc7b847e8f2d838df18f4e5f71b8368d135c622b1f87da9bb462d8d232f9daa9e6723500771
-
Filesize
168KB
MD588ac53302319a1b4c85903aa7e6104c2
SHA14b940a66d984a5c3df8625c4116380d425c6d54a
SHA256730c7f5a48849606356351a70a65a8d39332159d88714dac887f9b818c2f26d9
SHA512aa44fe8203755f7a82af90c2def99fd85f64b07a98210132c82c37aecb934a3981abd1c65c6daef44905cd902fe3a2a7575a9abcfc89886912dd3feb493b0cd8
-
Filesize
168KB
MD5ef8b27f51b296dff4ccdcf739736ebd6
SHA1d85f31c7b169b0c8711d04620b46082962c02e2d
SHA256ffeef3b7824ba1f23530f4737ade941cc6bf13f8c0cb603358d929b45404b0bb
SHA5122499ead6213dddae2b5267ce854e1330f5a82c3ec28bf71942c59212e2db1e4273c43729ba045c6e3cc320fda7cf36083d58e96190b17f91231e00db8bde1be0
-
Filesize
168KB
MD5fdca91ade0d76bd39eca913cab261b44
SHA10de77fa23c4531f5f4b360364a6e2699efe0ef24
SHA256fe8fab51e3537824e0ac791c3d51d4bd32537303062a34d4ccffa24f47f62505
SHA512eb87091d94161a69cc53738d8a9bd3289fb90b52db2ab556604316ee239d793f12ce46aaf169775d15d07e2277cf45317b1c04acb94b6dc2b206d321f8cb72eb
-
Filesize
168KB
MD510bf9eb30b1aed4e04f8d22dc63533a2
SHA12a9caa558928641ddc7996c1b21581aace38711a
SHA2562f8f8b6ac14ebe76b4b652eba2b94e68cbaa4ea4f1660c93d4c9e956910fe6f0
SHA51291711cf71a90030b926e81e15f968f67ce2fea793f551cd21ad0c4b5db70ebb62195cb31048a28e7601402c01487b788919316c62eb48d47ca52fcb979e3baf7
-
Filesize
168KB
MD539b9d8659f7b0b760007950ff52a832a
SHA1c8c4b209ca262eed97867bc68551367112c4e579
SHA25620d2b35f6a518a9c9dd6ca6eba0b7f9a95853322a5500800ca45855b5cb00381
SHA51283e40e971197504bc9655e8d544da7aed19b90d11fe8b1db25d07b1324e9a28d3d44bb2d84ff413da4b1ba687ead6304b45366c1f6e2b1df99cff8e407d5ab42
-
Filesize
168KB
MD5f929491ee8b7995448f621d569a3d8e5
SHA1b38688e815a8c70d358c79871cb3c3e8c3d81c9e
SHA25682c9e31c50eefb015f31a3e7dc5d12c8f443ea1deeb0525005b9dbe9df3e6774
SHA51255b49621c09f2f438d279b0324e548c511a16922e0fed7918cc7121ef9a098ad444523f3599cd191487f65973e3c5abf2b3a9bb9bb1ba16178d4523ef89dc4a8
-
Filesize
168KB
MD5bd1e0db1f2e793ccb2ffeea7b8cc3a90
SHA1958d6fcb2725aa8ee8ea826c1536b4bab708f203
SHA256b3fab091f4e32ac5120f8488e19e2c9580fca5fb8948704cccb38aea195bca81
SHA512136f555224ba6873d09701092479836e9011f6cd8766b8fe2f16cb26ad1affbeee2cb0aff154207bc5ff43a48890fdf95148c7745f79026ae14fbd9a2dd5db06
-
Filesize
168KB
MD59aeb85db0dced80d4f4b529241892858
SHA126f416511ad8f8ae3b9a2966692e688c6c3ff5c1
SHA2563d9a7dce666d43f24339aa93451bf7c805d1f30c246522230d14d06368c7fe71
SHA5123aea5d0479c20f675c36364793d5d4257930f82531fc72cd93f59a0e2ed14e062a9e6d17e11b2927d12f7bb245df622d73a1587547b76c19e910c52f40e0e236
-
Filesize
168KB
MD5e37f0cd70f2bf37da0fe0222dafd582a
SHA19c7a917a3256069f0f2f6f1a66e0bf71585787d5
SHA2566b599241c733dd23bcd2182913fcc7033acde1fccef4f38792f90372e62e9b8f
SHA512a5c3a6d050964035ed1d8c3ea32720dae8695747dcedcc6474d668a9c2196d7bf29d9f8d9cec3ef4cbc03523104b178873794e09cedac9a8cec59aba267c1ede