Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe
-
Size
216KB
-
MD5
2588a529c965c4a4674a457178b14b94
-
SHA1
86af6a3acb4cf77e5dbbb5c3fc9c3e982fef39d7
-
SHA256
496c27cccfb19172955eac958f3f06609e9bdbd196e2c856aa9b2d18b8f0d389
-
SHA512
c09f5ef268f9022d5b1adb2f2197ad2711c7b5f66d5ccf276de8f20c3358df7d0a9d03e8d2ec2e3f7a1658e2d70fdeb351659e33540e9ea072b718cccb691201
-
SSDEEP
3072:jEGh0osl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGylEeKcAEcGy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c00000001224d-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000012674-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001224d-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0030000000014207-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001224d-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001224d-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000001224d-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93FFB8B0-5D94-4c8d-917F-B277723A2805}\stubpath = "C:\\Windows\\{93FFB8B0-5D94-4c8d-917F-B277723A2805}.exe" {C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21D9A942-55B4-401f-9E58-1ECEB991C29F}\stubpath = "C:\\Windows\\{21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe" 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37C875D8-B11B-4e83-94E0-2F4D68BF92DF}\stubpath = "C:\\Windows\\{37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe" {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E41E031-4330-4cbf-8A8B-9F5478C44520} {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}\stubpath = "C:\\Windows\\{0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe" {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46B8CA26-A859-40b0-907D-390E89125A0C}\stubpath = "C:\\Windows\\{46B8CA26-A859-40b0-907D-390E89125A0C}.exe" {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}\stubpath = "C:\\Windows\\{224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe" {46B8CA26-A859-40b0-907D-390E89125A0C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37C875D8-B11B-4e83-94E0-2F4D68BF92DF} {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CEA30694-BDDA-40a6-A2C7-28371DB7E41D}\stubpath = "C:\\Windows\\{CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe" {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E15BC337-EE2E-4555-B5A4-ABAEEA3E8097} {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46B8CA26-A859-40b0-907D-390E89125A0C} {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1} {46B8CA26-A859-40b0-907D-390E89125A0C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21D9A942-55B4-401f-9E58-1ECEB991C29F} 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E41E031-4330-4cbf-8A8B-9F5478C44520}\stubpath = "C:\\Windows\\{9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe" {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}\stubpath = "C:\\Windows\\{C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe" {224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93FFB8B0-5D94-4c8d-917F-B277723A2805} {C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CEA30694-BDDA-40a6-A2C7-28371DB7E41D} {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{420707E8-0E55-482f-AEE7-680B9041D4BA} {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{420707E8-0E55-482f-AEE7-680B9041D4BA}\stubpath = "C:\\Windows\\{420707E8-0E55-482f-AEE7-680B9041D4BA}.exe" {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}\stubpath = "C:\\Windows\\{E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe" {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8} {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2CCB223-6A7E-4449-B9E9-37B36CC11ADE} {224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe -
Deletes itself 1 IoCs
pid Process 2952 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2956 {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe 2648 {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe 2408 {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe 1980 {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe 2724 {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe 1632 {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe 2300 {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe 1672 {46B8CA26-A859-40b0-907D-390E89125A0C}.exe 2064 {224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe 384 {C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe 1600 {93FFB8B0-5D94-4c8d-917F-B277723A2805}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe File created C:\Windows\{420707E8-0E55-482f-AEE7-680B9041D4BA}.exe {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe File created C:\Windows\{E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe File created C:\Windows\{0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe File created C:\Windows\{46B8CA26-A859-40b0-907D-390E89125A0C}.exe {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe File created C:\Windows\{224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe {46B8CA26-A859-40b0-907D-390E89125A0C}.exe File created C:\Windows\{93FFB8B0-5D94-4c8d-917F-B277723A2805}.exe {C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe File created C:\Windows\{21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe File created C:\Windows\{9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe File created C:\Windows\{CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe File created C:\Windows\{C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe {224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2988 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe Token: SeIncBasePriorityPrivilege 2956 {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe Token: SeIncBasePriorityPrivilege 2648 {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe Token: SeIncBasePriorityPrivilege 2408 {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe Token: SeIncBasePriorityPrivilege 1980 {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe Token: SeIncBasePriorityPrivilege 2724 {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe Token: SeIncBasePriorityPrivilege 1632 {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe Token: SeIncBasePriorityPrivilege 2300 {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe Token: SeIncBasePriorityPrivilege 1672 {46B8CA26-A859-40b0-907D-390E89125A0C}.exe Token: SeIncBasePriorityPrivilege 2064 {224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe Token: SeIncBasePriorityPrivilege 384 {C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2956 2988 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe 28 PID 2988 wrote to memory of 2956 2988 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe 28 PID 2988 wrote to memory of 2956 2988 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe 28 PID 2988 wrote to memory of 2956 2988 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe 28 PID 2988 wrote to memory of 2952 2988 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe 29 PID 2988 wrote to memory of 2952 2988 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe 29 PID 2988 wrote to memory of 2952 2988 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe 29 PID 2988 wrote to memory of 2952 2988 2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe 29 PID 2956 wrote to memory of 2648 2956 {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe 30 PID 2956 wrote to memory of 2648 2956 {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe 30 PID 2956 wrote to memory of 2648 2956 {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe 30 PID 2956 wrote to memory of 2648 2956 {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe 30 PID 2956 wrote to memory of 2392 2956 {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe 31 PID 2956 wrote to memory of 2392 2956 {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe 31 PID 2956 wrote to memory of 2392 2956 {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe 31 PID 2956 wrote to memory of 2392 2956 {21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe 31 PID 2648 wrote to memory of 2408 2648 {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe 32 PID 2648 wrote to memory of 2408 2648 {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe 32 PID 2648 wrote to memory of 2408 2648 {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe 32 PID 2648 wrote to memory of 2408 2648 {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe 32 PID 2648 wrote to memory of 2432 2648 {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe 33 PID 2648 wrote to memory of 2432 2648 {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe 33 PID 2648 wrote to memory of 2432 2648 {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe 33 PID 2648 wrote to memory of 2432 2648 {37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe 33 PID 2408 wrote to memory of 1980 2408 {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe 36 PID 2408 wrote to memory of 1980 2408 {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe 36 PID 2408 wrote to memory of 1980 2408 {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe 36 PID 2408 wrote to memory of 1980 2408 {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe 36 PID 2408 wrote to memory of 2372 2408 {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe 37 PID 2408 wrote to memory of 2372 2408 {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe 37 PID 2408 wrote to memory of 2372 2408 {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe 37 PID 2408 wrote to memory of 2372 2408 {9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe 37 PID 1980 wrote to memory of 2724 1980 {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe 38 PID 1980 wrote to memory of 2724 1980 {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe 38 PID 1980 wrote to memory of 2724 1980 {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe 38 PID 1980 wrote to memory of 2724 1980 {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe 38 PID 1980 wrote to memory of 2760 1980 {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe 39 PID 1980 wrote to memory of 2760 1980 {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe 39 PID 1980 wrote to memory of 2760 1980 {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe 39 PID 1980 wrote to memory of 2760 1980 {CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe 39 PID 2724 wrote to memory of 1632 2724 {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe 40 PID 2724 wrote to memory of 1632 2724 {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe 40 PID 2724 wrote to memory of 1632 2724 {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe 40 PID 2724 wrote to memory of 1632 2724 {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe 40 PID 2724 wrote to memory of 1768 2724 {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe 41 PID 2724 wrote to memory of 1768 2724 {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe 41 PID 2724 wrote to memory of 1768 2724 {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe 41 PID 2724 wrote to memory of 1768 2724 {420707E8-0E55-482f-AEE7-680B9041D4BA}.exe 41 PID 1632 wrote to memory of 2300 1632 {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe 42 PID 1632 wrote to memory of 2300 1632 {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe 42 PID 1632 wrote to memory of 2300 1632 {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe 42 PID 1632 wrote to memory of 2300 1632 {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe 42 PID 1632 wrote to memory of 2772 1632 {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe 43 PID 1632 wrote to memory of 2772 1632 {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe 43 PID 1632 wrote to memory of 2772 1632 {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe 43 PID 1632 wrote to memory of 2772 1632 {E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe 43 PID 2300 wrote to memory of 1672 2300 {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe 44 PID 2300 wrote to memory of 1672 2300 {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe 44 PID 2300 wrote to memory of 1672 2300 {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe 44 PID 2300 wrote to memory of 1672 2300 {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe 44 PID 2300 wrote to memory of 1696 2300 {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe 45 PID 2300 wrote to memory of 1696 2300 {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe 45 PID 2300 wrote to memory of 1696 2300 {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe 45 PID 2300 wrote to memory of 1696 2300 {0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\{21D9A942-55B4-401f-9E58-1ECEB991C29F}.exeC:\Windows\{21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\{37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exeC:\Windows\{37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\{9E41E031-4330-4cbf-8A8B-9F5478C44520}.exeC:\Windows\{9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\{CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exeC:\Windows\{CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\{420707E8-0E55-482f-AEE7-680B9041D4BA}.exeC:\Windows\{420707E8-0E55-482f-AEE7-680B9041D4BA}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\{E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exeC:\Windows\{E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\{0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exeC:\Windows\{0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\{46B8CA26-A859-40b0-907D-390E89125A0C}.exeC:\Windows\{46B8CA26-A859-40b0-907D-390E89125A0C}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\{224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exeC:\Windows\{224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\{C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exeC:\Windows\{C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:384 -
C:\Windows\{93FFB8B0-5D94-4c8d-917F-B277723A2805}.exeC:\Windows\{93FFB8B0-5D94-4c8d-917F-B277723A2805}.exe12⤵
- Executes dropped EXE
PID:1600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2CCB~1.EXE > nul12⤵PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{224EC~1.EXE > nul11⤵PID:324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{46B8C~1.EXE > nul10⤵PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0301B~1.EXE > nul9⤵PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E15BC~1.EXE > nul8⤵PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{42070~1.EXE > nul7⤵PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CEA30~1.EXE > nul6⤵PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E41E~1.EXE > nul5⤵PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37C87~1.EXE > nul4⤵PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{21D9A~1.EXE > nul3⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5a75ad12bc725581e272499ec250a1656
SHA1f83636d66adb1da74a1a166cda95a670525eb9af
SHA256b69158fe2980b48b69cc3b21899ed28640b1deefc0af3fd76ac9e70c53946f75
SHA51258290447bbdaab6849e8256acacf0c7df20fa74a3dc2a05895ea941c3256acc7250f2fc3d56b83ac15d24391712a5df41bb8f0e9eb89e60ab0e7a8231ab1c7fa
-
Filesize
216KB
MD5354da6d5761c3ec7b01dd928cf7195e1
SHA1962667e71eb067183f138fe23780898b7c5f4eb0
SHA25661eae0570291a575b7b77bca6e2bfa83a3ea0095ed80ce974883e957a4f2f3fe
SHA512b9e4ca017be01ebd2bb48dedabd6837596cf05ac7d9ebdcce34dce52adee82aa03a24de8ef2d9cb78c3ef806b4adf0115c3846f01470d63984d37199597c512f
-
Filesize
216KB
MD52583c36f666f1a49f65b65a1521d84f7
SHA1e458d25e117d739f699b186fd48ed71628ec9f06
SHA2568d6e160131a6655eff4819c98e9940ac4736746fa9d122a0be1254d692296b91
SHA51233956c320917be4894d0c22ec89281230e293e004de78bbf820b91546371a753c18143f0875fef6d1d4a091a6c3492f31d1fac7f71f6cf4bf8c5e0bf5dab094f
-
Filesize
216KB
MD5b2058a6948a17fed09adc732c4b5c548
SHA198c62acc70bf8f5f27c3c6eac91ed2d566b573e1
SHA256d308b9e9bf6e0e684da9efc2c5864211b173d3c9f36da02d0e8db4c5638996c7
SHA51201b2d455566ef8d34a0ab794f67975dfa0670891e4b11c09cadca7fd5ba7fa7c8b24a653db5f1290345a982d1684cb8e41219f13d35c2f169d0096e009405306
-
Filesize
216KB
MD5b4462858e40a5525b7d64ac6511cd5bd
SHA1860d58a0fdb3f5477ef83a98bf94686198b8c20c
SHA25610e9d5dd469a3aee81e80eca207f99ee60d6af08849a4eb7f7f35e893b80b8a9
SHA5126447a84c6e485bf62ecd18713b3cd13510ae90fbed5a00b95cb328a9b85f43d0ad7e4623865748851c0d391682a259037678dca90bb8bb569ac4a67302393dfe
-
Filesize
216KB
MD50518a3b0f971b311b71d5cc6fb8e9c69
SHA175d58b9eb4aea0906c85a6d71a14db0c2bdfdc3b
SHA256b788b6429dee8e3f2df116667db3d347af3b4fe6d3cc5e7d87d05e6c526f77de
SHA51290693fbaff81789a765107be34391a6629bae3ca174f010f419b0000d72cf50fa7148e095c9a8d78d365ad82b7aba554d650062c9fc27fe0e754c7924cc72908
-
Filesize
216KB
MD56bb9e0cfe4409db5ad0cfee6c2c91ed6
SHA112719d06a8c61be255c236705266639bc6a89ce2
SHA2568a68a25b55efdb43f29b141fd9bafba6c96a81d97f42060ced08563e0e571dfc
SHA5127017e9063d546f01a3ba284f19f61171c14ab9f4cfba759a106866e0b03c379c79518ea5cf295c5f31d36324c47d762c6c5f3f22758c28811b298ac76d8fe7df
-
Filesize
216KB
MD57804b15ab7ca881bd0afe7f6eca728bb
SHA175832a289dc9272f52d742f77625e4c45c327ccd
SHA25664287cda1b2c80ed68cf1f1e3194077e18e7a04a83c9bf35659663cb83ef0606
SHA512bf1900b80458b2c06bcac6b53a276f7080bb4710a072601f4865b90f540b9dafd86602a64854297090e7ef40567e1fc2bf8932deee011de84c163fab318932d5
-
Filesize
216KB
MD5d877aaa34745327565816c7f97499081
SHA1f9263668d81e76fd5d56ac41f5fc3180bcd168db
SHA25609b4f64cb31695377ab51ae5c54a5f89e398bd0b584c94a4290f4945ef241461
SHA5125f49980cf644a60c860ee0e12418259df23c46c16a4919f63d24b090cec92a29b77e5db7d9682c8f0920bea23606cfda118168a16c0732ad06ad0b5632d0c6af
-
Filesize
216KB
MD5b21016b9aef3ec8f686d4db609c5e1f3
SHA1db8438b9b3b2b1cbc2fc339120d7e4900464d239
SHA256ced8a84d4d9f831974692fe42ecd69af3e0ee7d54c86c1a13f3212163b12194b
SHA5120265b01da453566c7c6e3dfbad16d21e4efdf88bcd35b25bfe2222c012b82e5043f1db6778cc3369200f0020e39178fb977136a3981ba39e257984a8d1605a1e
-
Filesize
216KB
MD59e8fd5dcfdffc1cc6fd09d260f44f367
SHA1355c0a48909ecd11bbf7c1a0b61b3e4a115abd02
SHA256c8d41e54e79feb57e110066318cc1b5ad5eea1b4bdab323019b9f78230f24123
SHA51248448e8e5a0b509a0781a7f614736c6a39e694ce579a05420d072a84cf0d1d43009be698c09fb7e6d4ef3c9f353bf6a926b6dc97ebd65c7ec8e36e7b8330b212