Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06/04/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe
-
Size
216KB
-
MD5
25a1894246c3759287116921baa4b1cd
-
SHA1
5d92e057ca228577fa32b424f96d5b5a3604fac2
-
SHA256
332c3deae86895dc3d6096686596c645afba2414f31f69ac022994da2a2a0f21
-
SHA512
abd3a93d9df861903ad18fbbfd8f3fdd7670b0e1b17dfc45ee9ed455b4c871ead077e78ceed0edfdf7cc532347c1a7fca5835ff19154cd3c767e902dd8b4c0ef
-
SSDEEP
3072:jEGh0ool+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGylEeKcAEcGy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000b0000000144e0-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x003400000001480e-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c0000000144e0-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00340000000149e1-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000144e0-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e0000000144e0-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f0000000144e0-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12EB664A-0251-46ae-ADBC-3FDA3138F463}\stubpath = "C:\\Windows\\{12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe" 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}\stubpath = "C:\\Windows\\{C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe" {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE} {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7295DE02-9406-4e40-B68D-F7AB1D1F433E}\stubpath = "C:\\Windows\\{7295DE02-9406-4e40-B68D-F7AB1D1F433E}.exe" {623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DD0400B-15DF-4722-959C-3A0E3B0D61B9} {7E2B6F5F-20C0-42d6-B054-F80233AC93EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DD0400B-15DF-4722-959C-3A0E3B0D61B9}\stubpath = "C:\\Windows\\{3DD0400B-15DF-4722-959C-3A0E3B0D61B9}.exe" {7E2B6F5F-20C0-42d6-B054-F80233AC93EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA539EEE-C384-4ebf-9B92-A004A720E56C} {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA539EEE-C384-4ebf-9B92-A004A720E56C}\stubpath = "C:\\Windows\\{EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe" {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}\stubpath = "C:\\Windows\\{04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe" {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB03F408-A036-40d4-B03D-131A77F996C6}\stubpath = "C:\\Windows\\{CB03F408-A036-40d4-B03D-131A77F996C6}.exe" {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}\stubpath = "C:\\Windows\\{2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe" {CB03F408-A036-40d4-B03D-131A77F996C6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD} {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E2B6F5F-20C0-42d6-B054-F80233AC93EB} {7295DE02-9406-4e40-B68D-F7AB1D1F433E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E2B6F5F-20C0-42d6-B054-F80233AC93EB}\stubpath = "C:\\Windows\\{7E2B6F5F-20C0-42d6-B054-F80233AC93EB}.exe" {7295DE02-9406-4e40-B68D-F7AB1D1F433E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2}\stubpath = "C:\\Windows\\{623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2}.exe" {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7295DE02-9406-4e40-B68D-F7AB1D1F433E} {623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12EB664A-0251-46ae-ADBC-3FDA3138F463} 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB03F408-A036-40d4-B03D-131A77F996C6} {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA} {CB03F408-A036-40d4-B03D-131A77F996C6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}\stubpath = "C:\\Windows\\{AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe" {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F} {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2} {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe -
Deletes itself 1 IoCs
pid Process 2560 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3004 {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe 2520 {CB03F408-A036-40d4-B03D-131A77F996C6}.exe 2516 {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe 2664 {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe 1820 {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe 1600 {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe 1368 {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe 1380 {623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2}.exe 1900 {7295DE02-9406-4e40-B68D-F7AB1D1F433E}.exe 604 {7E2B6F5F-20C0-42d6-B054-F80233AC93EB}.exe 2860 {3DD0400B-15DF-4722-959C-3A0E3B0D61B9}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{CB03F408-A036-40d4-B03D-131A77F996C6}.exe {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe File created C:\Windows\{EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe File created C:\Windows\{623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2}.exe {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe File created C:\Windows\{3DD0400B-15DF-4722-959C-3A0E3B0D61B9}.exe {7E2B6F5F-20C0-42d6-B054-F80233AC93EB}.exe File created C:\Windows\{12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe File created C:\Windows\{2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe {CB03F408-A036-40d4-B03D-131A77F996C6}.exe File created C:\Windows\{C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe File created C:\Windows\{AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe File created C:\Windows\{04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe File created C:\Windows\{7295DE02-9406-4e40-B68D-F7AB1D1F433E}.exe {623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2}.exe File created C:\Windows\{7E2B6F5F-20C0-42d6-B054-F80233AC93EB}.exe {7295DE02-9406-4e40-B68D-F7AB1D1F433E}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2012 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe Token: SeIncBasePriorityPrivilege 3004 {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe Token: SeIncBasePriorityPrivilege 2520 {CB03F408-A036-40d4-B03D-131A77F996C6}.exe Token: SeIncBasePriorityPrivilege 2516 {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe Token: SeIncBasePriorityPrivilege 2664 {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe Token: SeIncBasePriorityPrivilege 1820 {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe Token: SeIncBasePriorityPrivilege 1600 {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe Token: SeIncBasePriorityPrivilege 1368 {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe Token: SeIncBasePriorityPrivilege 1380 {623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2}.exe Token: SeIncBasePriorityPrivilege 1900 {7295DE02-9406-4e40-B68D-F7AB1D1F433E}.exe Token: SeIncBasePriorityPrivilege 604 {7E2B6F5F-20C0-42d6-B054-F80233AC93EB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3004 2012 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe 28 PID 2012 wrote to memory of 3004 2012 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe 28 PID 2012 wrote to memory of 3004 2012 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe 28 PID 2012 wrote to memory of 3004 2012 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe 28 PID 2012 wrote to memory of 2560 2012 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe 29 PID 2012 wrote to memory of 2560 2012 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe 29 PID 2012 wrote to memory of 2560 2012 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe 29 PID 2012 wrote to memory of 2560 2012 2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe 29 PID 3004 wrote to memory of 2520 3004 {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe 30 PID 3004 wrote to memory of 2520 3004 {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe 30 PID 3004 wrote to memory of 2520 3004 {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe 30 PID 3004 wrote to memory of 2520 3004 {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe 30 PID 3004 wrote to memory of 2440 3004 {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe 31 PID 3004 wrote to memory of 2440 3004 {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe 31 PID 3004 wrote to memory of 2440 3004 {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe 31 PID 3004 wrote to memory of 2440 3004 {12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe 31 PID 2520 wrote to memory of 2516 2520 {CB03F408-A036-40d4-B03D-131A77F996C6}.exe 32 PID 2520 wrote to memory of 2516 2520 {CB03F408-A036-40d4-B03D-131A77F996C6}.exe 32 PID 2520 wrote to memory of 2516 2520 {CB03F408-A036-40d4-B03D-131A77F996C6}.exe 32 PID 2520 wrote to memory of 2516 2520 {CB03F408-A036-40d4-B03D-131A77F996C6}.exe 32 PID 2520 wrote to memory of 2400 2520 {CB03F408-A036-40d4-B03D-131A77F996C6}.exe 33 PID 2520 wrote to memory of 2400 2520 {CB03F408-A036-40d4-B03D-131A77F996C6}.exe 33 PID 2520 wrote to memory of 2400 2520 {CB03F408-A036-40d4-B03D-131A77F996C6}.exe 33 PID 2520 wrote to memory of 2400 2520 {CB03F408-A036-40d4-B03D-131A77F996C6}.exe 33 PID 2516 wrote to memory of 2664 2516 {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe 36 PID 2516 wrote to memory of 2664 2516 {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe 36 PID 2516 wrote to memory of 2664 2516 {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe 36 PID 2516 wrote to memory of 2664 2516 {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe 36 PID 2516 wrote to memory of 2660 2516 {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe 37 PID 2516 wrote to memory of 2660 2516 {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe 37 PID 2516 wrote to memory of 2660 2516 {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe 37 PID 2516 wrote to memory of 2660 2516 {2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe 37 PID 2664 wrote to memory of 1820 2664 {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe 38 PID 2664 wrote to memory of 1820 2664 {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe 38 PID 2664 wrote to memory of 1820 2664 {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe 38 PID 2664 wrote to memory of 1820 2664 {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe 38 PID 2664 wrote to memory of 2300 2664 {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe 39 PID 2664 wrote to memory of 2300 2664 {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe 39 PID 2664 wrote to memory of 2300 2664 {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe 39 PID 2664 wrote to memory of 2300 2664 {EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe 39 PID 1820 wrote to memory of 1600 1820 {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe 40 PID 1820 wrote to memory of 1600 1820 {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe 40 PID 1820 wrote to memory of 1600 1820 {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe 40 PID 1820 wrote to memory of 1600 1820 {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe 40 PID 1820 wrote to memory of 1592 1820 {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe 41 PID 1820 wrote to memory of 1592 1820 {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe 41 PID 1820 wrote to memory of 1592 1820 {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe 41 PID 1820 wrote to memory of 1592 1820 {C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe 41 PID 1600 wrote to memory of 1368 1600 {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe 42 PID 1600 wrote to memory of 1368 1600 {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe 42 PID 1600 wrote to memory of 1368 1600 {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe 42 PID 1600 wrote to memory of 1368 1600 {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe 42 PID 1600 wrote to memory of 1488 1600 {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe 43 PID 1600 wrote to memory of 1488 1600 {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe 43 PID 1600 wrote to memory of 1488 1600 {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe 43 PID 1600 wrote to memory of 1488 1600 {AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe 43 PID 1368 wrote to memory of 1380 1368 {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe 44 PID 1368 wrote to memory of 1380 1368 {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe 44 PID 1368 wrote to memory of 1380 1368 {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe 44 PID 1368 wrote to memory of 1380 1368 {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe 44 PID 1368 wrote to memory of 1708 1368 {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe 45 PID 1368 wrote to memory of 1708 1368 {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe 45 PID 1368 wrote to memory of 1708 1368 {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe 45 PID 1368 wrote to memory of 1708 1368 {04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-06_25a1894246c3759287116921baa4b1cd_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\{12EB664A-0251-46ae-ADBC-3FDA3138F463}.exeC:\Windows\{12EB664A-0251-46ae-ADBC-3FDA3138F463}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\{CB03F408-A036-40d4-B03D-131A77F996C6}.exeC:\Windows\{CB03F408-A036-40d4-B03D-131A77F996C6}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\{2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exeC:\Windows\{2D6706A1-9F0F-4c3b-8D4C-E95C3F3CA1CA}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\{EA539EEE-C384-4ebf-9B92-A004A720E56C}.exeC:\Windows\{EA539EEE-C384-4ebf-9B92-A004A720E56C}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\{C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exeC:\Windows\{C19D13B2-C6E2-42a1-AD18-02C2CDFFF2CD}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\{AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exeC:\Windows\{AE0039DD-EFAA-4e4b-83FA-0C46EF40C2CE}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\{04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exeC:\Windows\{04251FA6-A1CA-4535-B2C0-B7E1F8EE7E4F}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\{623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2}.exeC:\Windows\{623C5C12-D87B-40b3-AA49-5C0CE9A6EBC2}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\{7295DE02-9406-4e40-B68D-F7AB1D1F433E}.exeC:\Windows\{7295DE02-9406-4e40-B68D-F7AB1D1F433E}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\{7E2B6F5F-20C0-42d6-B054-F80233AC93EB}.exeC:\Windows\{7E2B6F5F-20C0-42d6-B054-F80233AC93EB}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:604 -
C:\Windows\{3DD0400B-15DF-4722-959C-3A0E3B0D61B9}.exeC:\Windows\{3DD0400B-15DF-4722-959C-3A0E3B0D61B9}.exe12⤵
- Executes dropped EXE
PID:2860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E2B6~1.EXE > nul12⤵PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7295D~1.EXE > nul11⤵PID:488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{623C5~1.EXE > nul10⤵PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{04251~1.EXE > nul9⤵PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AE003~1.EXE > nul8⤵PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C19D1~1.EXE > nul7⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA539~1.EXE > nul6⤵PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2D670~1.EXE > nul5⤵PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB03F~1.EXE > nul4⤵PID:2400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{12EB6~1.EXE > nul3⤵PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5e65b611ca58284220dde484ba27a38e8
SHA157d4e4b4a277330507b99bc356cbd1270fd7ec01
SHA256033f5382ee04093345496ecaa41dbaa29cce8d7cc62b8b6f871cd001f2aac17a
SHA51294cb75702cf48d2cc62dfd903b1c368541f652b590778acd67cb00cb4c693f2bfd5b4ce45f888795bf8018689d3e10bc2fb6da87997195a0de7a09690edb3c7f
-
Filesize
216KB
MD594a35db5c78b497fca03ed464eefd594
SHA1317fa9b25d78416d6bd0b57556873cf7c7d555b3
SHA256bf12e6fef955ca0acc2b07ff9fe8e249ee2ac388bbf254a92b9c9c162eca919d
SHA5124bf8128b14bfa5d7662ed9922213027de57c2eaf085391d0f1310a678b1a405be77613c8433d738e14d18a602b95d07ab251131705b1ad1c8529ee7455e7ee4b
-
Filesize
216KB
MD5e0844b218d15a04bb3ed529d79b5fc48
SHA1bf1430b5254670fa9eac85b23c966a84ef2bd3d5
SHA256730c7c1a7ca5bfcc0c704805f05034858104e759bd8412b27cf175bfced94eb1
SHA51205d2830b1632691310810982068e0f1da57a69fffb46a11402a3cda219633820efc8027c00b562a4f29d692cedc40f308598545cfa14caab8e7ed274e69b18e0
-
Filesize
216KB
MD54f37a935a8207324e1f693c616a7b76b
SHA16e86ccec204ae9e92cada58ae4871a3a5fbcc417
SHA256a588b2df02e5154edfb3a5e193a8e895af3dc27d0f2574ae61d35657e86a4a5c
SHA512957500b44ca861df5cae4f9d724921953320c1ef80710be5ea41a203d1b338f050ec033c993117b0e1c91e43f1210aab884f39e2161649885d7280ceea926bc7
-
Filesize
216KB
MD5518f9772499fd2b70f5fa7e04470d72a
SHA13631c803ae356f28b9f262e038c114a86c6ad7fe
SHA256b1c0983d18eef97005ef935fc3c05303502ab76403a747324504a144a206cd22
SHA5126a8fd832f9823cd839d8ef67a5dc0d953fad5eb800d06cb5b3fbacd0cd093d1d4f4db529dff33d897cf9e05749b596f46e5ad6c48761af24c499fe42848c87e4
-
Filesize
216KB
MD5c81f46ff8a73bbcf5f0cae1e53904e9b
SHA134c8e86358794549bd45bece60fe705e109b7c7b
SHA2569114f75728bda8f7bf33e04d81ac923f16d23bdd2be8bdfbeba199fe5f174b68
SHA512f70ad781dee3461476ed9bf5447b4299d384ebf5028ff70416d8a6ea041080a69857e1d21a7812b1eb3e2803be66c4129959c8bc52b7c7d7397628a5817d33ee
-
Filesize
216KB
MD5769ffe3f24a4f357daf1589217555d39
SHA153077c95c6a2d89e07c8872f6911a5f62b9198c6
SHA256391093b0b3d590573b00bee6d2df7c65979ad6c8ca0bfd8aaf749a589e4e97f6
SHA512d81b11353d87bc1318f61c4049bd968350e1530066acd870f1e770e46ded781106659a913b302e1d6d2bb879e25faaa8872aa3b18721b8d4efbdd28483a599f5
-
Filesize
216KB
MD5d1a55e5ff740a1f440ec7f933815b5f7
SHA1414d815bf9d988e2499f2cac8d01a20ace759670
SHA256c34f29bfe4153c5655eaec3b354895295b3f930331f7457aed02416f72d08436
SHA5123c65807c5552b23fe6ed733abdeed2d66df69d30bf3c14fc50ff2d1612d17e87274c288b714fed1d2effc6edd600cf13fea0a2f4ab2c0dc714b98eec24cf3ffa
-
Filesize
216KB
MD58e212be26b02f9dd39ca2e7f5e237590
SHA1d0f2e9c56de5ecd62b1a5fa12e2b0ed790d1fcde
SHA25630cf491c305ff73770fd56818719559f5f15148aa6d58e6da7de199272d6c865
SHA512b334327e06aedc5b8f4202d23118c4e01e849e4d36e880b6f7df25e4f511bfb5bc80e86f61244dd923e30006552edfb13a729c3a4a087d46ef1cdc30d6e7d317
-
Filesize
216KB
MD5c155e1a266576611c889b4769c0361cf
SHA15590f9d9a73ca758effe30df13a2a228b031600d
SHA2562ede752bf474d18e05502e8933d089bc1965f0c421526e0b61a9e7e77377bfc8
SHA512600f63a1ec97cf187907f2e7259585256302c269923a277d3084eaa3a01dad2a9b007cbf37098a1c97c31926dcf11040c88564982ee480ec3ddc1c878dd438d7
-
Filesize
216KB
MD5595a29e1b59cb009fb41b097c8e7cded
SHA1f4afa2d93c2d47208102c05ecfc63b80b72009b6
SHA256e8810a88c2d55ef47115b5cf8e7a0661eea5f0fd7486b0131273f7789f706cb4
SHA512d18c9af4517fc5b0efd8dbe247be4870bf7cab3b32ac033922f0a1999de15efc1be2f0d3d0a81c3c87753a873e53b70490caf48a1f66a88d3d2d3d9a62138cd4