Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe
-
Size
168KB
-
MD5
a12cc0dc8dc50f8a5ff3abbd754eef05
-
SHA1
e2aecaea74fc2ac3250e568df2071c3f2ee2ab50
-
SHA256
72dadb9d239891deaa58ebde923eff2919c6ff218fc7ef193c16a83dba4a4abc
-
SHA512
dca115bca57a4cfc51823e6834e41ad410d676a385e88eb5b41d82e23362171703a3ea08e76ebd6b64343e699e77a627102a6e29f0e5da257d2ce86e04d48ffa
-
SSDEEP
1536:1EGh0oylq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oylqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000b000000012256-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012671-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012256-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000012256-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000012256-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000012256-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0010000000012256-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5EFC8F8-04FB-4af7-9E5A-9A42EC521448}\stubpath = "C:\\Windows\\{B5EFC8F8-04FB-4af7-9E5A-9A42EC521448}.exe" {819D0363-73B2-4687-B802-7445292C6544}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0538872-7A2C-4464-A04E-C85B32DFE7D1} {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{06FC5AEC-884D-41aa-99B2-B63C1D29CE91}\stubpath = "C:\\Windows\\{06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe" {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{48EA7B83-7AA2-444a-848E-219E42E36FBA} {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{819D0363-73B2-4687-B802-7445292C6544} {0227B2E0-2112-470f-89C7-587FC3720677}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5EFC8F8-04FB-4af7-9E5A-9A42EC521448} {819D0363-73B2-4687-B802-7445292C6544}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0227B2E0-2112-470f-89C7-587FC3720677} {48EA7B83-7AA2-444a-848E-219E42E36FBA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0227B2E0-2112-470f-89C7-587FC3720677}\stubpath = "C:\\Windows\\{0227B2E0-2112-470f-89C7-587FC3720677}.exe" {48EA7B83-7AA2-444a-848E-219E42E36FBA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{819D0363-73B2-4687-B802-7445292C6544}\stubpath = "C:\\Windows\\{819D0363-73B2-4687-B802-7445292C6544}.exe" {0227B2E0-2112-470f-89C7-587FC3720677}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}\stubpath = "C:\\Windows\\{2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe" {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5DDDB605-0074-493c-9C84-833ADC2993E4}\stubpath = "C:\\Windows\\{5DDDB605-0074-493c-9C84-833ADC2993E4}.exe" {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A841A3D6-7E89-4bb8-88F6-F85022E53A06} {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{981817BE-DAF1-47c2-91E6-70DFAA62C9A4}\stubpath = "C:\\Windows\\{981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe" {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{48EA7B83-7AA2-444a-848E-219E42E36FBA}\stubpath = "C:\\Windows\\{48EA7B83-7AA2-444a-848E-219E42E36FBA}.exe" {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{981817BE-DAF1-47c2-91E6-70DFAA62C9A4} {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A} 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6} {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5DDDB605-0074-493c-9C84-833ADC2993E4} {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0538872-7A2C-4464-A04E-C85B32DFE7D1}\stubpath = "C:\\Windows\\{F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe" {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A841A3D6-7E89-4bb8-88F6-F85022E53A06}\stubpath = "C:\\Windows\\{A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe" {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}\stubpath = "C:\\Windows\\{79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe" 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{06FC5AEC-884D-41aa-99B2-B63C1D29CE91} {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe -
Deletes itself 1 IoCs
pid Process 2680 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 636 {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe 2624 {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe 2716 {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe 1496 {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe 2708 {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe 2904 {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe 2020 {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe 1644 {48EA7B83-7AA2-444a-848E-219E42E36FBA}.exe 1596 {0227B2E0-2112-470f-89C7-587FC3720677}.exe 2364 {819D0363-73B2-4687-B802-7445292C6544}.exe 2792 {B5EFC8F8-04FB-4af7-9E5A-9A42EC521448}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe File created C:\Windows\{981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe File created C:\Windows\{48EA7B83-7AA2-444a-848E-219E42E36FBA}.exe {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe File created C:\Windows\{819D0363-73B2-4687-B802-7445292C6544}.exe {0227B2E0-2112-470f-89C7-587FC3720677}.exe File created C:\Windows\{B5EFC8F8-04FB-4af7-9E5A-9A42EC521448}.exe {819D0363-73B2-4687-B802-7445292C6544}.exe File created C:\Windows\{5DDDB605-0074-493c-9C84-833ADC2993E4}.exe {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe File created C:\Windows\{F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe File created C:\Windows\{06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe File created C:\Windows\{0227B2E0-2112-470f-89C7-587FC3720677}.exe {48EA7B83-7AA2-444a-848E-219E42E36FBA}.exe File created C:\Windows\{79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe File created C:\Windows\{2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2224 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe Token: SeIncBasePriorityPrivilege 636 {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe Token: SeIncBasePriorityPrivilege 2624 {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe Token: SeIncBasePriorityPrivilege 2716 {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe Token: SeIncBasePriorityPrivilege 1496 {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe Token: SeIncBasePriorityPrivilege 2708 {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe Token: SeIncBasePriorityPrivilege 2904 {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe Token: SeIncBasePriorityPrivilege 2020 {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe Token: SeIncBasePriorityPrivilege 1644 {48EA7B83-7AA2-444a-848E-219E42E36FBA}.exe Token: SeIncBasePriorityPrivilege 1596 {0227B2E0-2112-470f-89C7-587FC3720677}.exe Token: SeIncBasePriorityPrivilege 2364 {819D0363-73B2-4687-B802-7445292C6544}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 636 2224 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe 28 PID 2224 wrote to memory of 636 2224 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe 28 PID 2224 wrote to memory of 636 2224 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe 28 PID 2224 wrote to memory of 636 2224 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe 28 PID 2224 wrote to memory of 2680 2224 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe 29 PID 2224 wrote to memory of 2680 2224 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe 29 PID 2224 wrote to memory of 2680 2224 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe 29 PID 2224 wrote to memory of 2680 2224 2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe 29 PID 636 wrote to memory of 2624 636 {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe 30 PID 636 wrote to memory of 2624 636 {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe 30 PID 636 wrote to memory of 2624 636 {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe 30 PID 636 wrote to memory of 2624 636 {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe 30 PID 636 wrote to memory of 2784 636 {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe 31 PID 636 wrote to memory of 2784 636 {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe 31 PID 636 wrote to memory of 2784 636 {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe 31 PID 636 wrote to memory of 2784 636 {79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe 31 PID 2624 wrote to memory of 2716 2624 {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe 32 PID 2624 wrote to memory of 2716 2624 {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe 32 PID 2624 wrote to memory of 2716 2624 {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe 32 PID 2624 wrote to memory of 2716 2624 {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe 32 PID 2624 wrote to memory of 2728 2624 {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe 33 PID 2624 wrote to memory of 2728 2624 {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe 33 PID 2624 wrote to memory of 2728 2624 {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe 33 PID 2624 wrote to memory of 2728 2624 {2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe 33 PID 2716 wrote to memory of 1496 2716 {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe 36 PID 2716 wrote to memory of 1496 2716 {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe 36 PID 2716 wrote to memory of 1496 2716 {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe 36 PID 2716 wrote to memory of 1496 2716 {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe 36 PID 2716 wrote to memory of 2596 2716 {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe 37 PID 2716 wrote to memory of 2596 2716 {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe 37 PID 2716 wrote to memory of 2596 2716 {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe 37 PID 2716 wrote to memory of 2596 2716 {5DDDB605-0074-493c-9C84-833ADC2993E4}.exe 37 PID 1496 wrote to memory of 2708 1496 {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe 38 PID 1496 wrote to memory of 2708 1496 {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe 38 PID 1496 wrote to memory of 2708 1496 {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe 38 PID 1496 wrote to memory of 2708 1496 {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe 38 PID 1496 wrote to memory of 2740 1496 {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe 39 PID 1496 wrote to memory of 2740 1496 {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe 39 PID 1496 wrote to memory of 2740 1496 {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe 39 PID 1496 wrote to memory of 2740 1496 {F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe 39 PID 2708 wrote to memory of 2904 2708 {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe 40 PID 2708 wrote to memory of 2904 2708 {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe 40 PID 2708 wrote to memory of 2904 2708 {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe 40 PID 2708 wrote to memory of 2904 2708 {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe 40 PID 2708 wrote to memory of 2328 2708 {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe 41 PID 2708 wrote to memory of 2328 2708 {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe 41 PID 2708 wrote to memory of 2328 2708 {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe 41 PID 2708 wrote to memory of 2328 2708 {06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe 41 PID 2904 wrote to memory of 2020 2904 {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe 42 PID 2904 wrote to memory of 2020 2904 {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe 42 PID 2904 wrote to memory of 2020 2904 {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe 42 PID 2904 wrote to memory of 2020 2904 {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe 42 PID 2904 wrote to memory of 1220 2904 {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe 43 PID 2904 wrote to memory of 1220 2904 {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe 43 PID 2904 wrote to memory of 1220 2904 {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe 43 PID 2904 wrote to memory of 1220 2904 {A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe 43 PID 2020 wrote to memory of 1644 2020 {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe 44 PID 2020 wrote to memory of 1644 2020 {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe 44 PID 2020 wrote to memory of 1644 2020 {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe 44 PID 2020 wrote to memory of 1644 2020 {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe 44 PID 2020 wrote to memory of 540 2020 {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe 45 PID 2020 wrote to memory of 540 2020 {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe 45 PID 2020 wrote to memory of 540 2020 {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe 45 PID 2020 wrote to memory of 540 2020 {981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-05_a12cc0dc8dc50f8a5ff3abbd754eef05_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\{79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exeC:\Windows\{79A4F469-FDA7-4ca9-A0E3-1E85B79A3D7A}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\{2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exeC:\Windows\{2E192E24-5DE3-4a9d-BC52-135E9CE0BDE6}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\{5DDDB605-0074-493c-9C84-833ADC2993E4}.exeC:\Windows\{5DDDB605-0074-493c-9C84-833ADC2993E4}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\{F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exeC:\Windows\{F0538872-7A2C-4464-A04E-C85B32DFE7D1}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\{06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exeC:\Windows\{06FC5AEC-884D-41aa-99B2-B63C1D29CE91}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\{A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exeC:\Windows\{A841A3D6-7E89-4bb8-88F6-F85022E53A06}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\{981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exeC:\Windows\{981817BE-DAF1-47c2-91E6-70DFAA62C9A4}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\{48EA7B83-7AA2-444a-848E-219E42E36FBA}.exeC:\Windows\{48EA7B83-7AA2-444a-848E-219E42E36FBA}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Windows\{0227B2E0-2112-470f-89C7-587FC3720677}.exeC:\Windows\{0227B2E0-2112-470f-89C7-587FC3720677}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Windows\{819D0363-73B2-4687-B802-7445292C6544}.exeC:\Windows\{819D0363-73B2-4687-B802-7445292C6544}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2364 -
C:\Windows\{B5EFC8F8-04FB-4af7-9E5A-9A42EC521448}.exeC:\Windows\{B5EFC8F8-04FB-4af7-9E5A-9A42EC521448}.exe12⤵
- Executes dropped EXE
PID:2792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{819D0~1.EXE > nul12⤵PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0227B~1.EXE > nul11⤵PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{48EA7~1.EXE > nul10⤵PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98181~1.EXE > nul9⤵PID:540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A841A~1.EXE > nul8⤵PID:1220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06FC5~1.EXE > nul7⤵PID:2328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F0538~1.EXE > nul6⤵PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5DDDB~1.EXE > nul5⤵PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2E192~1.EXE > nul4⤵PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79A4F~1.EXE > nul3⤵PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD52ecaf505c1a08614d295349e64dfe53a
SHA185906afafb5f1d2eba0509e1bc3dc6e2b06390d4
SHA256ca1520c9a0eedb3ac2686e95a908f236e0bac12cbb18a7557c56241eb27421c1
SHA51297cc1a5ca0358f526a08b2ae44b488c9268f33ff8f83bbee1c21383a36d919bb8806d470b259eca2bbe960858cca6bfb1bafb0ec9bfbe4b4f6f09d47ed42c81b
-
Filesize
168KB
MD5b11baac5d247aed95f34e53d02dd1689
SHA11c36f943e019b641a3fa08ad0aa74cba4945b3d0
SHA256fad5cc544ed8d49bb199aa3b5091438a2c93bcc49df9ad1712135ae028eb4c51
SHA512a0fec5b5dee2350d4eb03248654b19175b66291070bbaa3bbdbc090e6ec7b51f0fb05907224357d315444eb47d72101f103acb14dd1cd8f8c871b24dbd674fef
-
Filesize
168KB
MD5dce0dadc82f4de4e171e89eef15e3696
SHA1384d9b5efb1c7baf692cd6a45811360ba7b4dad8
SHA2560dd116d6a3563513dd0c5f377b29eab3dc8300eb7e4037098fe0df1efe6ca091
SHA5124cf7d3a629a0b56e84bf60b029908a022e43b7dbf443246e87cb94d5b1697de642f981ecfe7b85a282fdcd80dbf1fbd0b5c4cc2ad0f7f0fc694cfec2dbf05281
-
Filesize
168KB
MD527bb895a17ed6abe7dc31941b0f0dc35
SHA1e7afb33d4253a123422c8500b64b8217149193bc
SHA256756f4f9eafcf289e4dfb6b9e3955cdebaf85ab91bb134eac6ac884211d01371d
SHA512eed728b03436ed9dcb29d0f5b6cf49e4d3ceaab8fbc1d55d728c6b8b08bfa18e04d3ec215415bc46b2e06adb875f37aeb601d02e61189c9a587124053c2690a4
-
Filesize
168KB
MD5c787740e1deffa37d379ee25b5572ff0
SHA1c50af604e73d1dd180089b15525278d3b91f0bc9
SHA25611f14aea5acc6097933454944e8ce342d10661bf24911ef0b05059e764193027
SHA512a4b58b40e6400582ed54be17818fbc54258da252aef032943d92e57470799f6e77759c2ea912f7c0d280bf6abc7a8962c5ce25748a0e95d8f5a5d3ab9f253e42
-
Filesize
168KB
MD59096ed8c57683fc207c20b189439ec59
SHA1c0326b14a118aab3b60b05dd33620ebdc494f2c7
SHA256c26aa4c65f2dea2807dab1216223e52632b3944a90df3d41b96cbae9deb0ac0f
SHA5125713e375d58e905a3a097d32d5fab597bb3f978c2f24e49a5236a102bd6c947c6abae418dffa8910fcbcd6ecd6027ed0ad81f02b1297ef548e90dca91b75d970
-
Filesize
168KB
MD5ecebf75a58a4e410bd879e8468deb75d
SHA14a9f8c406c30e3bb0a0bf12656f0d5edd9f573c7
SHA2560d18f9cdcb7b59fad607f209d4f31e890f47a806072b1d6c6eab1574ff1bdcd5
SHA512e4728a4c9dcaaad68f5f2a169e3341bb46a9fff8a1cc34f9c7e2c0f6be83926031aff409d861ac6b93e6340d53258df3d812ccaf734f8134f3d12105c40535c6
-
Filesize
168KB
MD5229f1af0b73244ab76a6ab7f8463f02e
SHA10c3a9c72e04e9a26223b3d8a1c8f90a8aa447ac8
SHA256fedbe769c4e9ed21528933f71c15ee61933cd599ebab352b43427ba144bed1a8
SHA51266bea1e0708c9fbacedd88304fee5a0006327a24d733db751ce70c626019c8624a25d5177f74e0aaf599d0ece024e97728d8b89cda2fd4ce512c24e86a8bdefe
-
Filesize
168KB
MD522efd644849fd95d8b927f3f5e1c331f
SHA13f1bb94d0d96c6eb6712799b3d708469fe406920
SHA256d16dba8a484788ee4e7cbf626373e3f506020998454bff04874c19bb3b852497
SHA5127b75b3c8a9c69397065279e153c6c777559767f3ccd1d09cdcdc5cfdcdb398beaa597a4b726eba30bfe3f2298ae25442a193d47660251ef5d8f981aea4b5bf87
-
Filesize
168KB
MD52a427548456a47baa14ca950f55857a9
SHA1f24ca9ba34d856b9f6187cad40517ae583047f07
SHA2564c6dcd1d30fb85537c3ed0dcc4c61ccb1216cffb597742cc0bb3d8369256b578
SHA512e7e9864862cb5ac6144cb4f854e22b9bee4f1cbfd13eed2a1bcc43127bc27b60444b68a34121f16d481e2da9dc3f6eb017db3e6b893dc012e84e044fe7281405
-
Filesize
168KB
MD57d90ae09ac3009c31a883dcc314a6e49
SHA16e564cab4e613b732c52ff2c1e3f73b59a2ca1e4
SHA256d6182b4a8f6669b6aa436a639785dbd8f168bbbb4103470b2cc3bb15a125b86e
SHA51279a658411c99aa34e18e2b6760490b850db3b70995ee37f94c0ece0080f2b8dd4197ef0b93459422ad5af0b50abaae6cb56c383633880c0d02a2026af80ecc43