Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 15:37 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe
-
Size
197KB
-
MD5
9dbd6af397555824fb7c58da23e7c4a0
-
SHA1
7f770ae62dcebc902fab13561885ea128d1f433b
-
SHA256
d3d3ed679b181d1d2467b7a2314b6148ff1ddf30b6bfb557ae1816df3635d13c
-
SHA512
42c7a959dec27e7cba8434d9d39dd8b6202aab954e1a4f6da39bab2c069723c77984a65fba0ce6c4715bfe3c44d25dd8b2f56b05bd321098f670e6e9c64bd272
-
SSDEEP
3072:jEGh0oFl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGjlEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000700000001227e-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c0000000122df-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000015546-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000300000000b1f3-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000b1f3-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000500000000b1f3-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000b1f3-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70662763-AA87-43ba-9178-F5619C318FD1} {AC15890E-096A-49ba-9ACE-1F7507191F5E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CE1DA119-3939-4e3c-A1F0-CA32D733E84E} 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98AD0080-352F-4a13-90F0-4EA069921598} {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4BCA9E00-8BB2-45a7-A269-976C7F04394C} {98AD0080-352F-4a13-90F0-4EA069921598}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4BCA9E00-8BB2-45a7-A269-976C7F04394C}\stubpath = "C:\\Windows\\{4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe" {98AD0080-352F-4a13-90F0-4EA069921598}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9009C71C-D834-4188-9B70-91F2859707C2} {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9009C71C-D834-4188-9B70-91F2859707C2}\stubpath = "C:\\Windows\\{9009C71C-D834-4188-9B70-91F2859707C2}.exe" {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CE1DA119-3939-4e3c-A1F0-CA32D733E84E}\stubpath = "C:\\Windows\\{CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe" 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98AD0080-352F-4a13-90F0-4EA069921598}\stubpath = "C:\\Windows\\{98AD0080-352F-4a13-90F0-4EA069921598}.exe" {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AC15890E-096A-49ba-9ACE-1F7507191F5E} {9009C71C-D834-4188-9B70-91F2859707C2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AC15890E-096A-49ba-9ACE-1F7507191F5E}\stubpath = "C:\\Windows\\{AC15890E-096A-49ba-9ACE-1F7507191F5E}.exe" {9009C71C-D834-4188-9B70-91F2859707C2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F4FA484E-0631-42a6-9E95-A45DD543F398} {70662763-AA87-43ba-9178-F5619C318FD1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BFFBFE5B-9E20-4d7c-97C3-184A1DE5290C} {F4FA484E-0631-42a6-9E95-A45DD543F398}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ADCE578F-7E47-4da8-8153-BA1C62B8D9C9} {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}\stubpath = "C:\\Windows\\{ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe" {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C7BBC39-6D9C-45ea-8795-942E3323D959} {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BFFBFE5B-9E20-4d7c-97C3-184A1DE5290C}\stubpath = "C:\\Windows\\{BFFBFE5B-9E20-4d7c-97C3-184A1DE5290C}.exe" {F4FA484E-0631-42a6-9E95-A45DD543F398}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{30F78ED5-E579-41d9-ACC5-A68065F95F29} {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{30F78ED5-E579-41d9-ACC5-A68065F95F29}\stubpath = "C:\\Windows\\{30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe" {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C7BBC39-6D9C-45ea-8795-942E3323D959}\stubpath = "C:\\Windows\\{2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe" {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70662763-AA87-43ba-9178-F5619C318FD1}\stubpath = "C:\\Windows\\{70662763-AA87-43ba-9178-F5619C318FD1}.exe" {AC15890E-096A-49ba-9ACE-1F7507191F5E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F4FA484E-0631-42a6-9E95-A45DD543F398}\stubpath = "C:\\Windows\\{F4FA484E-0631-42a6-9E95-A45DD543F398}.exe" {70662763-AA87-43ba-9178-F5619C318FD1}.exe -
Deletes itself 1 IoCs
pid Process 2940 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2316 {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe 2628 {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe 2504 {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe 2284 {98AD0080-352F-4a13-90F0-4EA069921598}.exe 1092 {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe 2688 {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe 1908 {9009C71C-D834-4188-9B70-91F2859707C2}.exe 576 {AC15890E-096A-49ba-9ACE-1F7507191F5E}.exe 1752 {70662763-AA87-43ba-9178-F5619C318FD1}.exe 2044 {F4FA484E-0631-42a6-9E95-A45DD543F398}.exe 1444 {BFFBFE5B-9E20-4d7c-97C3-184A1DE5290C}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{BFFBFE5B-9E20-4d7c-97C3-184A1DE5290C}.exe {F4FA484E-0631-42a6-9E95-A45DD543F398}.exe File created C:\Windows\{30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe File created C:\Windows\{ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe File created C:\Windows\{2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe File created C:\Windows\{9009C71C-D834-4188-9B70-91F2859707C2}.exe {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe File created C:\Windows\{70662763-AA87-43ba-9178-F5619C318FD1}.exe {AC15890E-096A-49ba-9ACE-1F7507191F5E}.exe File created C:\Windows\{CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe File created C:\Windows\{98AD0080-352F-4a13-90F0-4EA069921598}.exe {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe File created C:\Windows\{4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe {98AD0080-352F-4a13-90F0-4EA069921598}.exe File created C:\Windows\{AC15890E-096A-49ba-9ACE-1F7507191F5E}.exe {9009C71C-D834-4188-9B70-91F2859707C2}.exe File created C:\Windows\{F4FA484E-0631-42a6-9E95-A45DD543F398}.exe {70662763-AA87-43ba-9178-F5619C318FD1}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2180 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe Token: SeIncBasePriorityPrivilege 2316 {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe Token: SeIncBasePriorityPrivilege 2628 {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe Token: SeIncBasePriorityPrivilege 2504 {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe Token: SeIncBasePriorityPrivilege 2284 {98AD0080-352F-4a13-90F0-4EA069921598}.exe Token: SeIncBasePriorityPrivilege 1092 {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe Token: SeIncBasePriorityPrivilege 2688 {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe Token: SeIncBasePriorityPrivilege 1908 {9009C71C-D834-4188-9B70-91F2859707C2}.exe Token: SeIncBasePriorityPrivilege 576 {AC15890E-096A-49ba-9ACE-1F7507191F5E}.exe Token: SeIncBasePriorityPrivilege 1752 {70662763-AA87-43ba-9178-F5619C318FD1}.exe Token: SeIncBasePriorityPrivilege 2044 {F4FA484E-0631-42a6-9E95-A45DD543F398}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2316 2180 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe 28 PID 2180 wrote to memory of 2316 2180 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe 28 PID 2180 wrote to memory of 2316 2180 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe 28 PID 2180 wrote to memory of 2316 2180 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe 28 PID 2180 wrote to memory of 2940 2180 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe 29 PID 2180 wrote to memory of 2940 2180 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe 29 PID 2180 wrote to memory of 2940 2180 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe 29 PID 2180 wrote to memory of 2940 2180 2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe 29 PID 2316 wrote to memory of 2628 2316 {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe 30 PID 2316 wrote to memory of 2628 2316 {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe 30 PID 2316 wrote to memory of 2628 2316 {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe 30 PID 2316 wrote to memory of 2628 2316 {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe 30 PID 2316 wrote to memory of 2676 2316 {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe 31 PID 2316 wrote to memory of 2676 2316 {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe 31 PID 2316 wrote to memory of 2676 2316 {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe 31 PID 2316 wrote to memory of 2676 2316 {CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe 31 PID 2628 wrote to memory of 2504 2628 {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe 34 PID 2628 wrote to memory of 2504 2628 {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe 34 PID 2628 wrote to memory of 2504 2628 {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe 34 PID 2628 wrote to memory of 2504 2628 {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe 34 PID 2628 wrote to memory of 2424 2628 {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe 35 PID 2628 wrote to memory of 2424 2628 {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe 35 PID 2628 wrote to memory of 2424 2628 {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe 35 PID 2628 wrote to memory of 2424 2628 {30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe 35 PID 2504 wrote to memory of 2284 2504 {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe 36 PID 2504 wrote to memory of 2284 2504 {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe 36 PID 2504 wrote to memory of 2284 2504 {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe 36 PID 2504 wrote to memory of 2284 2504 {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe 36 PID 2504 wrote to memory of 2996 2504 {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe 37 PID 2504 wrote to memory of 2996 2504 {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe 37 PID 2504 wrote to memory of 2996 2504 {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe 37 PID 2504 wrote to memory of 2996 2504 {ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe 37 PID 2284 wrote to memory of 1092 2284 {98AD0080-352F-4a13-90F0-4EA069921598}.exe 38 PID 2284 wrote to memory of 1092 2284 {98AD0080-352F-4a13-90F0-4EA069921598}.exe 38 PID 2284 wrote to memory of 1092 2284 {98AD0080-352F-4a13-90F0-4EA069921598}.exe 38 PID 2284 wrote to memory of 1092 2284 {98AD0080-352F-4a13-90F0-4EA069921598}.exe 38 PID 2284 wrote to memory of 680 2284 {98AD0080-352F-4a13-90F0-4EA069921598}.exe 39 PID 2284 wrote to memory of 680 2284 {98AD0080-352F-4a13-90F0-4EA069921598}.exe 39 PID 2284 wrote to memory of 680 2284 {98AD0080-352F-4a13-90F0-4EA069921598}.exe 39 PID 2284 wrote to memory of 680 2284 {98AD0080-352F-4a13-90F0-4EA069921598}.exe 39 PID 1092 wrote to memory of 2688 1092 {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe 40 PID 1092 wrote to memory of 2688 1092 {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe 40 PID 1092 wrote to memory of 2688 1092 {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe 40 PID 1092 wrote to memory of 2688 1092 {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe 40 PID 1092 wrote to memory of 1872 1092 {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe 41 PID 1092 wrote to memory of 1872 1092 {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe 41 PID 1092 wrote to memory of 1872 1092 {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe 41 PID 1092 wrote to memory of 1872 1092 {4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe 41 PID 2688 wrote to memory of 1908 2688 {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe 42 PID 2688 wrote to memory of 1908 2688 {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe 42 PID 2688 wrote to memory of 1908 2688 {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe 42 PID 2688 wrote to memory of 1908 2688 {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe 42 PID 2688 wrote to memory of 2584 2688 {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe 43 PID 2688 wrote to memory of 2584 2688 {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe 43 PID 2688 wrote to memory of 2584 2688 {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe 43 PID 2688 wrote to memory of 2584 2688 {2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe 43 PID 1908 wrote to memory of 576 1908 {9009C71C-D834-4188-9B70-91F2859707C2}.exe 44 PID 1908 wrote to memory of 576 1908 {9009C71C-D834-4188-9B70-91F2859707C2}.exe 44 PID 1908 wrote to memory of 576 1908 {9009C71C-D834-4188-9B70-91F2859707C2}.exe 44 PID 1908 wrote to memory of 576 1908 {9009C71C-D834-4188-9B70-91F2859707C2}.exe 44 PID 1908 wrote to memory of 2692 1908 {9009C71C-D834-4188-9B70-91F2859707C2}.exe 45 PID 1908 wrote to memory of 2692 1908 {9009C71C-D834-4188-9B70-91F2859707C2}.exe 45 PID 1908 wrote to memory of 2692 1908 {9009C71C-D834-4188-9B70-91F2859707C2}.exe 45 PID 1908 wrote to memory of 2692 1908 {9009C71C-D834-4188-9B70-91F2859707C2}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-08_9dbd6af397555824fb7c58da23e7c4a0_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\{CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exeC:\Windows\{CE1DA119-3939-4e3c-A1F0-CA32D733E84E}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\{30F78ED5-E579-41d9-ACC5-A68065F95F29}.exeC:\Windows\{30F78ED5-E579-41d9-ACC5-A68065F95F29}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\{ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exeC:\Windows\{ADCE578F-7E47-4da8-8153-BA1C62B8D9C9}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\{98AD0080-352F-4a13-90F0-4EA069921598}.exeC:\Windows\{98AD0080-352F-4a13-90F0-4EA069921598}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\{4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exeC:\Windows\{4BCA9E00-8BB2-45a7-A269-976C7F04394C}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\{2C7BBC39-6D9C-45ea-8795-942E3323D959}.exeC:\Windows\{2C7BBC39-6D9C-45ea-8795-942E3323D959}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\{9009C71C-D834-4188-9B70-91F2859707C2}.exeC:\Windows\{9009C71C-D834-4188-9B70-91F2859707C2}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\{AC15890E-096A-49ba-9ACE-1F7507191F5E}.exeC:\Windows\{AC15890E-096A-49ba-9ACE-1F7507191F5E}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:576 -
C:\Windows\{70662763-AA87-43ba-9178-F5619C318FD1}.exeC:\Windows\{70662763-AA87-43ba-9178-F5619C318FD1}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\{F4FA484E-0631-42a6-9E95-A45DD543F398}.exeC:\Windows\{F4FA484E-0631-42a6-9E95-A45DD543F398}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Windows\{BFFBFE5B-9E20-4d7c-97C3-184A1DE5290C}.exeC:\Windows\{BFFBFE5B-9E20-4d7c-97C3-184A1DE5290C}.exe12⤵
- Executes dropped EXE
PID:1444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4FA4~1.EXE > nul12⤵PID:1336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70662~1.EXE > nul11⤵PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AC158~1.EXE > nul10⤵PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9009C~1.EXE > nul9⤵PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2C7BB~1.EXE > nul8⤵PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4BCA9~1.EXE > nul7⤵PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98AD0~1.EXE > nul6⤵PID:680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ADCE5~1.EXE > nul5⤵PID:2996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{30F78~1.EXE > nul4⤵PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CE1DA~1.EXE > nul3⤵PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5e96569fbc76868837546b6d7a566c098
SHA1fe60ec482c0c6d694d2df26269975577b1866a70
SHA25611f2ac99baf0d382d1138394db855cd9fc1dc55f8efc315023af50d9e7013e93
SHA5124a9cd55f150328c1eda89affc6b7029dd399a101c550fa6b75a6f1f4e5e32a4f206f363220906283c1a47689c631b362f9bd9f08f533549a0879ddd0e49c99f9
-
Filesize
197KB
MD5c80dc87a81cf5a0e92d5eccee3a6f89e
SHA1ccc5871506459aca03d02c5a211b7caaae7fd3bb
SHA256e6bfe011125b2df7c78cb51766d26464dacd3a7cc8e3f42480570b6c9f10189b
SHA5123733e25a04459dc10ab82f41d5b0af4fb2745ca3fcfe9b89219d74fd10a29c3bb914a1cf564b7bd2e4f6fbe98d22965d40cb688e992212031ea076bdb4e4fd24
-
Filesize
197KB
MD5a789773d9e0f5f3e1e8a82cef1cc9fe9
SHA1dccb4b20eabac645d191c8aefce33578f958efda
SHA25669001ab8aa91298ac590bb596d1dc32971224f7aae1448e53d79a9d15d2e015d
SHA51243f00504789646116bc6c21dfb93e5e7d7ba2680b543ee653616fdb7f4510cb5a0d836b5b369bf7117bf720fff9c2ef7f9c8e333397cfd2afa0e6927d4411b57
-
Filesize
197KB
MD5e71ea21f75b410b38d27ff780f40d71f
SHA11dafbd1a9fd0abf5dbe737e52759cf6c5c903e7d
SHA25686c666809bf5a54c5e373551b5c955918c76f3fc69e011b89c75ece034ef505b
SHA512a8de5c79d702652a00ef888f740a877ae2b232de48029a4b19c314c3c8a3757903057fafe4cf586202e6bbc3a6ad481c2a569a47e47a92bfd2561c5617804bcd
-
Filesize
197KB
MD5072d5fd151e3e4d74adbbdb7c5a72d7d
SHA1f6cae43f5b8f9109407c9999817ca23164b66089
SHA25665e3403020e641fa330d12ecf24f32187e83f033c13d0527c0525a661bd674cd
SHA51291bb8cad898d6558efafe5a370e00d354ecf8533d09ea03bd9ce72c808dddf240bb882f3297245fefc02738f431f6cacca2ac9674d599688b6708e0c2b9755c7
-
Filesize
197KB
MD58a2bcd545d8bcfdc73f0e3f86e2f12b2
SHA14af9d690990029cdc071c5a82a67554759bd2aa0
SHA256231e215f80bf053f8f2bd8fb71ed263d78a4a4b741f57d06603752bd7840e9ec
SHA51242494229d6ff0c0c2c5c2077c9ed470ab94650b94a6298e60f079a2ad9e82aac90b069b5b312c284d234f2c99b2ee0dd6a97cbc1ae0be6172de7d76e064bbfae
-
Filesize
197KB
MD52387ec3432ae7a53f681abc0f69619be
SHA1b900fdf765b0ce2884b2b75e3d3e7dc3ae90424b
SHA2563eebe447702314579babc3811d0fbe8eed9ee155b80f90eb6f552b6e34c7b7bf
SHA51248b26a35ca4457d68d226d68eec491396649b7fa1ef7c685f37160781d6d155a48c5499d38b1b27c25df3a12c8aee8389332b9143fef7a2a041e7dc3b7ad21c7
-
Filesize
197KB
MD571694213db4b15003d4e0db409071e80
SHA12ee3955517f4ec4c8b8601a0891ef2349f0c9d8d
SHA2567cf4f3dfd8bc190ad84e8292d66f9ccc2b948182ac4567b90810a2fd4ee3a35f
SHA512bd945afd8bc6c2d40bd9cb1e3ee35f2657c127c4201688d200940d7be26fc43991e70ff5d601148694543c19a0b7172ee6a2af4b74b949a7cc54d35901692fbf
-
Filesize
197KB
MD569dfaaf4f17cd0bc2037187c61039fe9
SHA1f217447d8a32cbbca90fc142f57b84a5b4bb41d3
SHA256d5aacc1dffcb2502e79648a80638b9962dc481a45f10217c1530b4bc163071ca
SHA512c9391f3b3d2a614e186c3e286a9d5a26f9792fa67bd4e0f1f9dd4e7d0d3a66bafb0f219327b4d371af3c24d07048be60f56ecaea640fb383877c3652254c806a
-
Filesize
197KB
MD5afed7d8f0974b65eda22efc7e201f4a1
SHA1475dca763fcd002a1c36763134649838db17717e
SHA25627a5ef6722a7c390fa9ec3a132ee6b2b0dfce6b744eb9919b7db10b66d2ab705
SHA512790f2664efc923cb665648fdb4db2c84c51276881670b362354e2701729738f842b332082c449083519ae316fc26d688d4b8ddbd7604cb98cd947000bf206482
-
Filesize
197KB
MD501c9dd5255b0961f9140a2fb2b41b6b4
SHA175c9f0e5bf7634637923d8d181a9d1f73d50f8de
SHA256a6ea7e9a6fdc5a6f580ac06236f5a72439e1a607ed4d4f9cbd2946f954968558
SHA512915fed1d787f4f0662b8af4dd1946bfae44a6d7260fb6d59a2b026f503a6a707b76bc1ccfc31a673d09ca049939ec9c774b01f053da495121a59b5b01ef41c95