Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe
-
Size
168KB
-
MD5
17afb6d7a9328490f1748c060baa1c10
-
SHA1
1837cd71a415e90c3e879da73306ff5d3aef8754
-
SHA256
bf7a5cb09a3e376a84a80ae224df66372aa1687cd5db23b7c7088972d439bf68
-
SHA512
9285a38dc947f68224be2c47c6a965c5179bd44bffda83b780ec4607206d2f3aad0d3b38211eca60654ee0f989364f84a799bca7ef444b2bc362c4aaf9620e35
-
SSDEEP
1536:1EGh0o3lq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o3lqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000b00000001224c-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012707-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c00000001224c-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002f000000014c2d-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001224c-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001224c-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001224c-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C7910F6-C16A-4aac-BC24-A976DAC13F1F}\stubpath = "C:\\Windows\\{8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe" 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C6572E3-83B7-4a62-B226-0B6CEF6A4812} {97A35C41-22CC-49c6-B239-00657B6C414E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C6572E3-83B7-4a62-B226-0B6CEF6A4812}\stubpath = "C:\\Windows\\{6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe" {97A35C41-22CC-49c6-B239-00657B6C414E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B375473-E65D-4c6d-B8C2-3A334AD610C1} {E08DEE9A-26A2-42de-A420-41AE79DB0902}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6730147-229E-46cc-BBC8-872E08C278CB} {46021418-1530-490c-9F8A-D9889FD90AA8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C7910F6-C16A-4aac-BC24-A976DAC13F1F} 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC863311-E2A7-4c91-96D8-BAB0C9071A8E}\stubpath = "C:\\Windows\\{FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe" {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A835802-2A2C-456b-A7B4-598F3F49EC5E}\stubpath = "C:\\Windows\\{5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe" {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DF45B66-AAAC-45eb-96B3-B7F5DBD83521} {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}\stubpath = "C:\\Windows\\{4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe" {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{97A35C41-22CC-49c6-B239-00657B6C414E}\stubpath = "C:\\Windows\\{97A35C41-22CC-49c6-B239-00657B6C414E}.exe" {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46021418-1530-490c-9F8A-D9889FD90AA8}\stubpath = "C:\\Windows\\{46021418-1530-490c-9F8A-D9889FD90AA8}.exe" {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6730147-229E-46cc-BBC8-872E08C278CB}\stubpath = "C:\\Windows\\{A6730147-229E-46cc-BBC8-872E08C278CB}.exe" {46021418-1530-490c-9F8A-D9889FD90AA8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E08DEE9A-26A2-42de-A420-41AE79DB0902} {A6730147-229E-46cc-BBC8-872E08C278CB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B375473-E65D-4c6d-B8C2-3A334AD610C1}\stubpath = "C:\\Windows\\{2B375473-E65D-4c6d-B8C2-3A334AD610C1}.exe" {E08DEE9A-26A2-42de-A420-41AE79DB0902}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{31D07E95-24E6-4a89-8B09-3047B553B168}\stubpath = "C:\\Windows\\{31D07E95-24E6-4a89-8B09-3047B553B168}.exe" {2B375473-E65D-4c6d-B8C2-3A334AD610C1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC863311-E2A7-4c91-96D8-BAB0C9071A8E} {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{97A35C41-22CC-49c6-B239-00657B6C414E} {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E08DEE9A-26A2-42de-A420-41AE79DB0902}\stubpath = "C:\\Windows\\{E08DEE9A-26A2-42de-A420-41AE79DB0902}.exe" {A6730147-229E-46cc-BBC8-872E08C278CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A835802-2A2C-456b-A7B4-598F3F49EC5E} {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{46021418-1530-490c-9F8A-D9889FD90AA8} {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{31D07E95-24E6-4a89-8B09-3047B553B168} {2B375473-E65D-4c6d-B8C2-3A334AD610C1}.exe -
Deletes itself 1 IoCs
pid Process 2508 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2704 {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe 2524 {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe 2728 {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe 2900 {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe 2724 {97A35C41-22CC-49c6-B239-00657B6C414E}.exe 296 {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe 2356 {46021418-1530-490c-9F8A-D9889FD90AA8}.exe 2024 {A6730147-229E-46cc-BBC8-872E08C278CB}.exe 2864 {E08DEE9A-26A2-42de-A420-41AE79DB0902}.exe 1932 {2B375473-E65D-4c6d-B8C2-3A334AD610C1}.exe 1388 {31D07E95-24E6-4a89-8B09-3047B553B168}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe {97A35C41-22CC-49c6-B239-00657B6C414E}.exe File created C:\Windows\{46021418-1530-490c-9F8A-D9889FD90AA8}.exe {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe File created C:\Windows\{A6730147-229E-46cc-BBC8-872E08C278CB}.exe {46021418-1530-490c-9F8A-D9889FD90AA8}.exe File created C:\Windows\{2B375473-E65D-4c6d-B8C2-3A334AD610C1}.exe {E08DEE9A-26A2-42de-A420-41AE79DB0902}.exe File created C:\Windows\{FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe File created C:\Windows\{5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe File created C:\Windows\{4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe File created C:\Windows\{97A35C41-22CC-49c6-B239-00657B6C414E}.exe {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe File created C:\Windows\{8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe File created C:\Windows\{E08DEE9A-26A2-42de-A420-41AE79DB0902}.exe {A6730147-229E-46cc-BBC8-872E08C278CB}.exe File created C:\Windows\{31D07E95-24E6-4a89-8B09-3047B553B168}.exe {2B375473-E65D-4c6d-B8C2-3A334AD610C1}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2872 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe Token: SeIncBasePriorityPrivilege 2704 {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe Token: SeIncBasePriorityPrivilege 2524 {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe Token: SeIncBasePriorityPrivilege 2728 {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe Token: SeIncBasePriorityPrivilege 2900 {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe Token: SeIncBasePriorityPrivilege 2724 {97A35C41-22CC-49c6-B239-00657B6C414E}.exe Token: SeIncBasePriorityPrivilege 296 {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe Token: SeIncBasePriorityPrivilege 2356 {46021418-1530-490c-9F8A-D9889FD90AA8}.exe Token: SeIncBasePriorityPrivilege 2024 {A6730147-229E-46cc-BBC8-872E08C278CB}.exe Token: SeIncBasePriorityPrivilege 2864 {E08DEE9A-26A2-42de-A420-41AE79DB0902}.exe Token: SeIncBasePriorityPrivilege 1932 {2B375473-E65D-4c6d-B8C2-3A334AD610C1}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2704 2872 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe 28 PID 2872 wrote to memory of 2704 2872 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe 28 PID 2872 wrote to memory of 2704 2872 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe 28 PID 2872 wrote to memory of 2704 2872 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe 28 PID 2872 wrote to memory of 2508 2872 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe 29 PID 2872 wrote to memory of 2508 2872 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe 29 PID 2872 wrote to memory of 2508 2872 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe 29 PID 2872 wrote to memory of 2508 2872 2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe 29 PID 2704 wrote to memory of 2524 2704 {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe 30 PID 2704 wrote to memory of 2524 2704 {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe 30 PID 2704 wrote to memory of 2524 2704 {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe 30 PID 2704 wrote to memory of 2524 2704 {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe 30 PID 2704 wrote to memory of 2684 2704 {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe 31 PID 2704 wrote to memory of 2684 2704 {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe 31 PID 2704 wrote to memory of 2684 2704 {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe 31 PID 2704 wrote to memory of 2684 2704 {8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe 31 PID 2524 wrote to memory of 2728 2524 {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe 32 PID 2524 wrote to memory of 2728 2524 {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe 32 PID 2524 wrote to memory of 2728 2524 {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe 32 PID 2524 wrote to memory of 2728 2524 {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe 32 PID 2524 wrote to memory of 2564 2524 {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe 33 PID 2524 wrote to memory of 2564 2524 {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe 33 PID 2524 wrote to memory of 2564 2524 {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe 33 PID 2524 wrote to memory of 2564 2524 {FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe 33 PID 2728 wrote to memory of 2900 2728 {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe 36 PID 2728 wrote to memory of 2900 2728 {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe 36 PID 2728 wrote to memory of 2900 2728 {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe 36 PID 2728 wrote to memory of 2900 2728 {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe 36 PID 2728 wrote to memory of 1064 2728 {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe 37 PID 2728 wrote to memory of 1064 2728 {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe 37 PID 2728 wrote to memory of 1064 2728 {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe 37 PID 2728 wrote to memory of 1064 2728 {5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe 37 PID 2900 wrote to memory of 2724 2900 {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe 38 PID 2900 wrote to memory of 2724 2900 {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe 38 PID 2900 wrote to memory of 2724 2900 {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe 38 PID 2900 wrote to memory of 2724 2900 {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe 38 PID 2900 wrote to memory of 2772 2900 {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe 39 PID 2900 wrote to memory of 2772 2900 {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe 39 PID 2900 wrote to memory of 2772 2900 {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe 39 PID 2900 wrote to memory of 2772 2900 {4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe 39 PID 2724 wrote to memory of 296 2724 {97A35C41-22CC-49c6-B239-00657B6C414E}.exe 40 PID 2724 wrote to memory of 296 2724 {97A35C41-22CC-49c6-B239-00657B6C414E}.exe 40 PID 2724 wrote to memory of 296 2724 {97A35C41-22CC-49c6-B239-00657B6C414E}.exe 40 PID 2724 wrote to memory of 296 2724 {97A35C41-22CC-49c6-B239-00657B6C414E}.exe 40 PID 2724 wrote to memory of 804 2724 {97A35C41-22CC-49c6-B239-00657B6C414E}.exe 41 PID 2724 wrote to memory of 804 2724 {97A35C41-22CC-49c6-B239-00657B6C414E}.exe 41 PID 2724 wrote to memory of 804 2724 {97A35C41-22CC-49c6-B239-00657B6C414E}.exe 41 PID 2724 wrote to memory of 804 2724 {97A35C41-22CC-49c6-B239-00657B6C414E}.exe 41 PID 296 wrote to memory of 2356 296 {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe 42 PID 296 wrote to memory of 2356 296 {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe 42 PID 296 wrote to memory of 2356 296 {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe 42 PID 296 wrote to memory of 2356 296 {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe 42 PID 296 wrote to memory of 1408 296 {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe 43 PID 296 wrote to memory of 1408 296 {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe 43 PID 296 wrote to memory of 1408 296 {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe 43 PID 296 wrote to memory of 1408 296 {6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe 43 PID 2356 wrote to memory of 2024 2356 {46021418-1530-490c-9F8A-D9889FD90AA8}.exe 44 PID 2356 wrote to memory of 2024 2356 {46021418-1530-490c-9F8A-D9889FD90AA8}.exe 44 PID 2356 wrote to memory of 2024 2356 {46021418-1530-490c-9F8A-D9889FD90AA8}.exe 44 PID 2356 wrote to memory of 2024 2356 {46021418-1530-490c-9F8A-D9889FD90AA8}.exe 44 PID 2356 wrote to memory of 2040 2356 {46021418-1530-490c-9F8A-D9889FD90AA8}.exe 45 PID 2356 wrote to memory of 2040 2356 {46021418-1530-490c-9F8A-D9889FD90AA8}.exe 45 PID 2356 wrote to memory of 2040 2356 {46021418-1530-490c-9F8A-D9889FD90AA8}.exe 45 PID 2356 wrote to memory of 2040 2356 {46021418-1530-490c-9F8A-D9889FD90AA8}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-08_17afb6d7a9328490f1748c060baa1c10_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exeC:\Windows\{8C7910F6-C16A-4aac-BC24-A976DAC13F1F}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\{FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exeC:\Windows\{FC863311-E2A7-4c91-96D8-BAB0C9071A8E}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\{5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exeC:\Windows\{5A835802-2A2C-456b-A7B4-598F3F49EC5E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\{4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exeC:\Windows\{4DF45B66-AAAC-45eb-96B3-B7F5DBD83521}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\{97A35C41-22CC-49c6-B239-00657B6C414E}.exeC:\Windows\{97A35C41-22CC-49c6-B239-00657B6C414E}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\{6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exeC:\Windows\{6C6572E3-83B7-4a62-B226-0B6CEF6A4812}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\{46021418-1530-490c-9F8A-D9889FD90AA8}.exeC:\Windows\{46021418-1530-490c-9F8A-D9889FD90AA8}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\{A6730147-229E-46cc-BBC8-872E08C278CB}.exeC:\Windows\{A6730147-229E-46cc-BBC8-872E08C278CB}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\{E08DEE9A-26A2-42de-A420-41AE79DB0902}.exeC:\Windows\{E08DEE9A-26A2-42de-A420-41AE79DB0902}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2864 -
C:\Windows\{2B375473-E65D-4c6d-B8C2-3A334AD610C1}.exeC:\Windows\{2B375473-E65D-4c6d-B8C2-3A334AD610C1}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\{31D07E95-24E6-4a89-8B09-3047B553B168}.exeC:\Windows\{31D07E95-24E6-4a89-8B09-3047B553B168}.exe12⤵
- Executes dropped EXE
PID:1388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2B375~1.EXE > nul12⤵PID:544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E08DE~1.EXE > nul11⤵PID:668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6730~1.EXE > nul10⤵PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{46021~1.EXE > nul9⤵PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C657~1.EXE > nul8⤵PID:1408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{97A35~1.EXE > nul7⤵PID:804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4DF45~1.EXE > nul6⤵PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A835~1.EXE > nul5⤵PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FC863~1.EXE > nul4⤵PID:2564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C791~1.EXE > nul3⤵PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD59d9501790e002e75b0fe8d01000baeb3
SHA17edf4d86e7b38cb63f50951de3753fd04545d585
SHA256f86cfc129e7befa8324d968b961f8dd9cbefc43ec533dc8eddb6ba719e16c833
SHA512943e5eeea97b3e5fcc40b7656e8b3eb166a772f92857e293a0e2add9ab280278b47d48ee34bdf649b96b612a78d17831c3a02f6c5279790cf30586564ce97cac
-
Filesize
168KB
MD5ae5b6c755865bbe32cb00a543006c445
SHA1f09a11613e4695e7b23bc348ab5223cdfe6103e4
SHA256c52684f31709bd791da199b7565930c619d26631ede22cfdaacbeacd7637b1a5
SHA512343d9e008aaedac97172f8ca77dfb9a2f053afc55c3c7ab0de900207d7925e57fb1d1208f7d5545c74c6fbcdb9d3883c99d2b075511b74e9779426f599281a30
-
Filesize
168KB
MD5c07e8429214ffd6b4c8556d0901e2973
SHA1dfd93368d47a24d594111fc29403d683433e1df0
SHA256dc7aee2082d0ee05eca132879b87a1783580c4e41211dcf1ad10d18dec3ef892
SHA5123a8717a383e74ca2c0b7510976ca4ce97edb9bfcd2c8d01e4b6886bf2c4cb579628d5272984e97ce6d9228ee557bb9fc149d8cd1376edc08e851a65f2f8e99a7
-
Filesize
168KB
MD511fbf8a3b8e8aee30b2cd003ea5ea83a
SHA11826392e01248a7cea52919ff51986027e451f5d
SHA256776d13d854031308706ed9c49cb253e2e563ee2fd62abd5e57a638918ca6f326
SHA5123783257e1522dad7ae2f7a611ae71202b2ade8cc33e1b8f00270f42a8d731304f5e0c935b87da11dd56e2e5793768d05336505d3ae7db8457fbd9eecfd33f619
-
Filesize
168KB
MD591fc1892021fc16ac9077c2fa30a2fd2
SHA1ad08985b74778f0d962351b46ec1c884539f2e7b
SHA25623b47936deed6010bdbc4c6040a9167055ca0a55ead95d15625ab63bf0ec2628
SHA512aaf9f7402b04c3f48ce25f54919c1479aa7b939daaf886bc59f611942ddfef9a27f3997dfd890e63454909033b17439aaefd675b5ca1da62a0447aaf5b74a31e
-
Filesize
168KB
MD5a90effbdf533285313a28a26a22c80d5
SHA1784ece4eebe6fb586ef3bdb290592e6896092767
SHA2561984310432c57deba73cacb5a46e0ba2fb35e5c6e0057966b2a9d97a8c973d19
SHA5123348900f8f1663da1753fc29cd3d451004a650e22cb0599fe603e8e160ac77e742861fe277a2486a8e17e9e4b888387874f1b2b3c7b15fc60c586ebbbc7a14dc
-
Filesize
168KB
MD568a718d9dbca54d2605ca25df37c26c2
SHA1e1c7bdd460b2c2515e86553c6f32a8a4b67284c0
SHA256dca94c58ac8a3572f44ba96705509be3b8d28d33445d389fac2acacc9a80efc9
SHA512e004fcfaff2e6d509b91dc9f461cbf8a91ddf83218c13d2ccf82c6ae650284ec6e34789f71d5cf9ae558183c34e280022e46749e61b12f7e8a220819f7260cab
-
Filesize
168KB
MD5cf580e5d92f6f3fda67a71511776acce
SHA1555fdf8a414f01fabcb37b7b8c5920d1e7f05bfb
SHA2565ab311043fdae921031adf99d39cefb44a24a511dff4537c1bcd49ba32c69d86
SHA5124338034717d0924373f629a7794de411b76d460ffe7a3b7bc0b15a35a5114dc3ad7cb5b0d4fe7e754b5b618583f7b07920e2d16a84bfb2e19bdde363d8509cee
-
Filesize
168KB
MD54eefa4ca958dd00073bbe76b0377b4df
SHA199f0105fa6066d11ba3acf52da0a6b26866493f9
SHA25694dc10befd75823e6c3fceaaf237ba79ba829bfa60ef75d3347b8ad43a33e372
SHA5121fed377d7740adaa3abb5a66d6ba0d62599909ed296519f4b5f64fb2bff7a2067ad2eff58f0c3f6d8768a8e00b31e7766588e77e29bcf82fddcf331e5e329129
-
Filesize
168KB
MD5532d9eaac9c2668dffd7010622d07f45
SHA1fbc8df6a4e650e335d389dc350de78fef55d2e74
SHA256feab10417c848a9efc5a10a30c000fe7e6e29ea06512127e5ca568423be0eeac
SHA5126765b0e2a12dfda2b5d59fe2e0b9e49c22fab878b60526c0bb6cb8cbc25562f75436d11a2e209ef0b17a6eb7d56551258a3b436631c4811165126889612b59e0
-
Filesize
168KB
MD584fa5aee7dac10a399b7bc77993f2858
SHA115db1d94730457e2ab2cd0f88b4432c261fb6ecc
SHA2568ffbd29f5e33d31e9612a02ba371c1c8728771e4594534c8cdf8ab12efcdf35f
SHA5127ce361fddfbc64cca01e2812d882207e8c2e78bffc93760eeabcabbcf1a76659bc27a2b24cd4562d110d1c49c555224e3111679b77f069b5d8b367bc23e59a9d