Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe
-
Size
168KB
-
MD5
bfcaa345f789f4dfc76ccccd1022676c
-
SHA1
c6e146bdf22a1e17401064658883b6246b3c4030
-
SHA256
e51d9134dbb065e51d79681002ceafd714ceef57c29925012598ac56fa7a3694
-
SHA512
041e33bc14aa9fcec3e50c4bb882fe288c55c0b5b4e3516dd0098d636a4a05ba63f16e6a8ba806f6c4e977ea24f3e05299e70a3c44dda0fe53df8898847a92a7
-
SSDEEP
1536:1EGh0oxlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oxlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x0009000000014abe-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000014b70-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000014abe-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a0000000155f7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000005a59-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000014abe-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000005a59-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000014abe-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000005a59-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000014abe-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000005a59-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}\stubpath = "C:\\Windows\\{2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe" 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E922B73-DCAF-45f0-BCEA-BB0D5DF24619} {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{04971852-ADE7-4ddd-ADF5-0906D328B470} {BC995298-4E62-405a-A6D6-12F4A880E146}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F} {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{87B47819-F75C-4724-9B9A-6D1360C4AFF7}\stubpath = "C:\\Windows\\{87B47819-F75C-4724-9B9A-6D1360C4AFF7}.exe" {62A25060-76C3-45ec-A626-EAA93E966D6C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{04ECD480-9B55-47cb-893E-6932E20A463A} {87B47819-F75C-4724-9B9A-6D1360C4AFF7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4} 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ED408C42-5DF0-4b33-B462-AED387F401FD}\stubpath = "C:\\Windows\\{ED408C42-5DF0-4b33-B462-AED387F401FD}.exe" {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}\stubpath = "C:\\Windows\\{9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe" {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BC995298-4E62-405a-A6D6-12F4A880E146} {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{04971852-ADE7-4ddd-ADF5-0906D328B470}\stubpath = "C:\\Windows\\{04971852-ADE7-4ddd-ADF5-0906D328B470}.exe" {BC995298-4E62-405a-A6D6-12F4A880E146}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9D40D83C-FBAB-473b-B4FF-AB17212A1B5F} {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}\stubpath = "C:\\Windows\\{9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe" {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ED408C42-5DF0-4b33-B462-AED387F401FD} {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BC995298-4E62-405a-A6D6-12F4A880E146}\stubpath = "C:\\Windows\\{BC995298-4E62-405a-A6D6-12F4A880E146}.exe" {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62A25060-76C3-45ec-A626-EAA93E966D6C} {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{87B47819-F75C-4724-9B9A-6D1360C4AFF7} {62A25060-76C3-45ec-A626-EAA93E966D6C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{341071BC-5949-47a8-BE79-4EBFD10C9E4F} {04ECD480-9B55-47cb-893E-6932E20A463A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{341071BC-5949-47a8-BE79-4EBFD10C9E4F}\stubpath = "C:\\Windows\\{341071BC-5949-47a8-BE79-4EBFD10C9E4F}.exe" {04ECD480-9B55-47cb-893E-6932E20A463A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}\stubpath = "C:\\Windows\\{8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe" {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{62A25060-76C3-45ec-A626-EAA93E966D6C}\stubpath = "C:\\Windows\\{62A25060-76C3-45ec-A626-EAA93E966D6C}.exe" {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{04ECD480-9B55-47cb-893E-6932E20A463A}\stubpath = "C:\\Windows\\{04ECD480-9B55-47cb-893E-6932E20A463A}.exe" {87B47819-F75C-4724-9B9A-6D1360C4AFF7}.exe -
Deletes itself 1 IoCs
pid Process 3056 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2164 {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe 2548 {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe 2728 {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe 2496 {BC995298-4E62-405a-A6D6-12F4A880E146}.exe 1892 {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe 1196 {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe 2480 {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe 800 {62A25060-76C3-45ec-A626-EAA93E966D6C}.exe 2828 {87B47819-F75C-4724-9B9A-6D1360C4AFF7}.exe 2268 {04ECD480-9B55-47cb-893E-6932E20A463A}.exe 1452 {341071BC-5949-47a8-BE79-4EBFD10C9E4F}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe File created C:\Windows\{04971852-ADE7-4ddd-ADF5-0906D328B470}.exe {BC995298-4E62-405a-A6D6-12F4A880E146}.exe File created C:\Windows\{87B47819-F75C-4724-9B9A-6D1360C4AFF7}.exe {62A25060-76C3-45ec-A626-EAA93E966D6C}.exe File created C:\Windows\{04ECD480-9B55-47cb-893E-6932E20A463A}.exe {87B47819-F75C-4724-9B9A-6D1360C4AFF7}.exe File created C:\Windows\{ED408C42-5DF0-4b33-B462-AED387F401FD}.exe {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe File created C:\Windows\{9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe File created C:\Windows\{BC995298-4E62-405a-A6D6-12F4A880E146}.exe {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe File created C:\Windows\{9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe File created C:\Windows\{8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe File created C:\Windows\{62A25060-76C3-45ec-A626-EAA93E966D6C}.exe {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe File created C:\Windows\{341071BC-5949-47a8-BE79-4EBFD10C9E4F}.exe {04ECD480-9B55-47cb-893E-6932E20A463A}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1392 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe Token: SeIncBasePriorityPrivilege 2164 {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe Token: SeIncBasePriorityPrivilege 2548 {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe Token: SeIncBasePriorityPrivilege 2728 {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe Token: SeIncBasePriorityPrivilege 2496 {BC995298-4E62-405a-A6D6-12F4A880E146}.exe Token: SeIncBasePriorityPrivilege 1892 {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe Token: SeIncBasePriorityPrivilege 1196 {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe Token: SeIncBasePriorityPrivilege 2480 {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe Token: SeIncBasePriorityPrivilege 800 {62A25060-76C3-45ec-A626-EAA93E966D6C}.exe Token: SeIncBasePriorityPrivilege 2828 {87B47819-F75C-4724-9B9A-6D1360C4AFF7}.exe Token: SeIncBasePriorityPrivilege 2268 {04ECD480-9B55-47cb-893E-6932E20A463A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2164 1392 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe 28 PID 1392 wrote to memory of 2164 1392 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe 28 PID 1392 wrote to memory of 2164 1392 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe 28 PID 1392 wrote to memory of 2164 1392 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe 28 PID 1392 wrote to memory of 3056 1392 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe 29 PID 1392 wrote to memory of 3056 1392 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe 29 PID 1392 wrote to memory of 3056 1392 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe 29 PID 1392 wrote to memory of 3056 1392 2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe 29 PID 2164 wrote to memory of 2548 2164 {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe 30 PID 2164 wrote to memory of 2548 2164 {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe 30 PID 2164 wrote to memory of 2548 2164 {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe 30 PID 2164 wrote to memory of 2548 2164 {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe 30 PID 2164 wrote to memory of 2628 2164 {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe 31 PID 2164 wrote to memory of 2628 2164 {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe 31 PID 2164 wrote to memory of 2628 2164 {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe 31 PID 2164 wrote to memory of 2628 2164 {2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe 31 PID 2548 wrote to memory of 2728 2548 {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe 32 PID 2548 wrote to memory of 2728 2548 {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe 32 PID 2548 wrote to memory of 2728 2548 {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe 32 PID 2548 wrote to memory of 2728 2548 {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe 32 PID 2548 wrote to memory of 2876 2548 {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe 33 PID 2548 wrote to memory of 2876 2548 {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe 33 PID 2548 wrote to memory of 2876 2548 {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe 33 PID 2548 wrote to memory of 2876 2548 {ED408C42-5DF0-4b33-B462-AED387F401FD}.exe 33 PID 2728 wrote to memory of 2496 2728 {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe 36 PID 2728 wrote to memory of 2496 2728 {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe 36 PID 2728 wrote to memory of 2496 2728 {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe 36 PID 2728 wrote to memory of 2496 2728 {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe 36 PID 2728 wrote to memory of 2724 2728 {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe 37 PID 2728 wrote to memory of 2724 2728 {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe 37 PID 2728 wrote to memory of 2724 2728 {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe 37 PID 2728 wrote to memory of 2724 2728 {9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe 37 PID 2496 wrote to memory of 1892 2496 {BC995298-4E62-405a-A6D6-12F4A880E146}.exe 38 PID 2496 wrote to memory of 1892 2496 {BC995298-4E62-405a-A6D6-12F4A880E146}.exe 38 PID 2496 wrote to memory of 1892 2496 {BC995298-4E62-405a-A6D6-12F4A880E146}.exe 38 PID 2496 wrote to memory of 1892 2496 {BC995298-4E62-405a-A6D6-12F4A880E146}.exe 38 PID 2496 wrote to memory of 2684 2496 {BC995298-4E62-405a-A6D6-12F4A880E146}.exe 39 PID 2496 wrote to memory of 2684 2496 {BC995298-4E62-405a-A6D6-12F4A880E146}.exe 39 PID 2496 wrote to memory of 2684 2496 {BC995298-4E62-405a-A6D6-12F4A880E146}.exe 39 PID 2496 wrote to memory of 2684 2496 {BC995298-4E62-405a-A6D6-12F4A880E146}.exe 39 PID 1892 wrote to memory of 1196 1892 {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe 40 PID 1892 wrote to memory of 1196 1892 {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe 40 PID 1892 wrote to memory of 1196 1892 {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe 40 PID 1892 wrote to memory of 1196 1892 {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe 40 PID 1892 wrote to memory of 2648 1892 {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe 41 PID 1892 wrote to memory of 2648 1892 {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe 41 PID 1892 wrote to memory of 2648 1892 {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe 41 PID 1892 wrote to memory of 2648 1892 {04971852-ADE7-4ddd-ADF5-0906D328B470}.exe 41 PID 1196 wrote to memory of 2480 1196 {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe 42 PID 1196 wrote to memory of 2480 1196 {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe 42 PID 1196 wrote to memory of 2480 1196 {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe 42 PID 1196 wrote to memory of 2480 1196 {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe 42 PID 1196 wrote to memory of 1080 1196 {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe 43 PID 1196 wrote to memory of 1080 1196 {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe 43 PID 1196 wrote to memory of 1080 1196 {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe 43 PID 1196 wrote to memory of 1080 1196 {9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe 43 PID 2480 wrote to memory of 800 2480 {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe 44 PID 2480 wrote to memory of 800 2480 {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe 44 PID 2480 wrote to memory of 800 2480 {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe 44 PID 2480 wrote to memory of 800 2480 {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe 44 PID 2480 wrote to memory of 936 2480 {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe 45 PID 2480 wrote to memory of 936 2480 {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe 45 PID 2480 wrote to memory of 936 2480 {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe 45 PID 2480 wrote to memory of 936 2480 {8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-06_bfcaa345f789f4dfc76ccccd1022676c_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\{2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exeC:\Windows\{2DF8AEF8-5F5E-415f-8820-8AFFE58BC4D4}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\{ED408C42-5DF0-4b33-B462-AED387F401FD}.exeC:\Windows\{ED408C42-5DF0-4b33-B462-AED387F401FD}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\{9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exeC:\Windows\{9E922B73-DCAF-45f0-BCEA-BB0D5DF24619}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\{BC995298-4E62-405a-A6D6-12F4A880E146}.exeC:\Windows\{BC995298-4E62-405a-A6D6-12F4A880E146}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\{04971852-ADE7-4ddd-ADF5-0906D328B470}.exeC:\Windows\{04971852-ADE7-4ddd-ADF5-0906D328B470}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\{9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exeC:\Windows\{9D40D83C-FBAB-473b-B4FF-AB17212A1B5F}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\{8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exeC:\Windows\{8F94D4EF-5A18-445a-82D1-9C66D6EA1F0F}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\{62A25060-76C3-45ec-A626-EAA93E966D6C}.exeC:\Windows\{62A25060-76C3-45ec-A626-EAA93E966D6C}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:800 -
C:\Windows\{87B47819-F75C-4724-9B9A-6D1360C4AFF7}.exeC:\Windows\{87B47819-F75C-4724-9B9A-6D1360C4AFF7}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2828 -
C:\Windows\{04ECD480-9B55-47cb-893E-6932E20A463A}.exeC:\Windows\{04ECD480-9B55-47cb-893E-6932E20A463A}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Windows\{341071BC-5949-47a8-BE79-4EBFD10C9E4F}.exeC:\Windows\{341071BC-5949-47a8-BE79-4EBFD10C9E4F}.exe12⤵
- Executes dropped EXE
PID:1452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{04ECD~1.EXE > nul12⤵PID:556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{87B47~1.EXE > nul11⤵PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{62A25~1.EXE > nul10⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F94D~1.EXE > nul9⤵PID:936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9D40D~1.EXE > nul8⤵PID:1080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{04971~1.EXE > nul7⤵PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BC995~1.EXE > nul6⤵PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E922~1.EXE > nul5⤵PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ED408~1.EXE > nul4⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2DF8A~1.EXE > nul3⤵PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5424218c5cbf6cad9ead3d0a47eef2401
SHA1c06de9e2ee766e09cd9ef3480f8d048f0a331e85
SHA25687213fb145d8ff3602747af1d2babee4ffd44675f8522ac09805d91de5237d1f
SHA512c5ea7b885b42282ecc464cf53228d04edb75830089ace81ea76afdecd38eda8947e44d7e0957b1cdb2adee9e6122a185675640108aad5469ec76b9fab983b42a
-
Filesize
168KB
MD5c2a988ba0f692f7c5856f5ec3a0537b7
SHA1cac52086cbf74d402ec1959da0be140cb1e0526c
SHA256c71cc8c1ac73ac8ddd51df99b215dbee3eb21c1d149ec0521cf833bdf337328f
SHA512f1e29c58497c3a7bb6a4a602255f177c39962f19fe4f6fdbd30bc207ddcd76fa8cb1c01a5d07f161861329bc09d0c3ca5f34ea34403bfea45276f0d0a3345174
-
Filesize
168KB
MD5593923fad5d063c5e7bf3a82a8208a0b
SHA12dbc0f88261a7185a1660454873ea9b276d4c2b5
SHA256d46bd060c7aeb8a334785eacdb078bec753e454139d3c3236825a0de78788d2b
SHA51255f3f98966fc0351c4d1a15ee38b6ab88bbc6aa955bf0a5d20d262e67abb42e5439cb8bb3c9d2402704a00abd4bab84db3c5f5568b9ba3d247f249522dc99392
-
Filesize
168KB
MD58503f3d236e182085ae0a5b9c74aae1c
SHA10ff7be9961a64793f7496f241466bca522938e83
SHA2564b5b13d424a43e9569d6fd3bda01e20ccfc0dd9999f13bd230e0e6edae664fc3
SHA512629b0166b5b88e3504a1ef1ac9937f6412983bc7a09b1dce9508cb775c48d9f3bf416e23569716a25a72fe376398ab0c94dca4f335024de182afe427d789bae1
-
Filesize
168KB
MD579bc9de2a79a112619051abceb099adc
SHA122ce63e40adcef9babf5fc644774bb79ae4f5ac1
SHA25676774cff175f6dc02b0eee1a57b84825928fab72ce754072a18e25c179b6345e
SHA512c756d82c17521bbd22fb0b21aa62229e69cd118d15db917497ec174510ad9b53d85af0c8c87102316882697a053f34774ad418b4a363d82743da77c8eb4f88b4
-
Filesize
168KB
MD516db4944e2e105aa1d46e94e9756296f
SHA1ceb006a52eaa84d09a7ba0d4d13fad12f46d5cf1
SHA2563ac899b553fc6d651e982acefcb2b99832537fb2153b809977a44895183c1b4b
SHA512b7fafa02d5cb575af7e806ee73947f5ad91fdd6b8ac9bffa68f89eb8c56e42f60cfbd26796b9ddfaa96317d201549f948911fb37f883fbf289af0c19290505f5
-
Filesize
168KB
MD5689fb5f3e414c1183fc38f02a672afbe
SHA1e2201841f4a4219dae1f3b945e8a6962ab8628ac
SHA25676eda751f746dfd94327d3dc9aa82431b005d54009ef808e0ee4b0d0bb55fa32
SHA512c0fc7c86d6d239e48cc72409dde22f8acd0948a86da5b3421e5d3ca4f7b15d4d12dd057df76ff01343a5a52f9dbb1a5fba48c03db8d63c9efd9268ed5796d983
-
Filesize
168KB
MD5d48404eb0547954862b0425b14f483d7
SHA10412e87043e052f6d8fd35a33ac090eba22b3e75
SHA25639822399567cbeff029c3d0d036495da407b093567d2260768927c638cd218ad
SHA512d39c3da2c35cb4f0e1436c89d75101ec18549e55d8849eae3ac0c0afa5a7042ee11a8d59187d52370427e6082d230b8441a3bfa072f08a0274abbb3a19bcbfc1
-
Filesize
168KB
MD5003713e6323f5e94089cd83c02e15024
SHA11ae3d57a792a96d7326b2159abb4805894595501
SHA256cd447b979731b4470d5bbcfd150318ce6b1281615a35f0107520ded667fb3675
SHA51228ee5537accbd0cdaf61687457a6c3bcedb3d61d651bdf2c35a87ea034f6e0be06de41fbcf22a7f388e7633c3bc363fbe65878e16c9b7e657a723b9cd3ca25e0
-
Filesize
168KB
MD50541f0d896ce280cd06e384551473d62
SHA1cc455a5df2d6127cebffc6424e7fb0fa93413623
SHA2566b3a35e01b9921ba90bfb6dc12781afc12e0ad42b2404246f6ee5a728e3acf01
SHA512af90da2ba63711e1e3056b74e6efd3918fb81370c9f5e1b535dffc310b694c22e22cc4803b6b7948d4fe339a689f12e172fb425748dd87eb7369138d25f7d956
-
Filesize
168KB
MD5fa56891a8185927a84fa6a1dd2e568e9
SHA105624eec35a6612c5fe4e276e5acf8b49859bc20
SHA2564705d9e46b03fa0e92c57a25791c4a28a0a0d3a3cae47efd40bba02dc3f5127e
SHA512a39915f515772b103e58b7b1fe70255cc669dcdd1080fc9a97dfd01c46e494e675ec873fa9e1f42c8caec5c242d49a0b7199960ed0913bfb37296db92ac01805