Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe
Resource
win10v2004-20240226-en
General
-
Target
ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe
-
Size
380KB
-
MD5
da67cc911b13343d2d871e9ffd67c5cb
-
SHA1
908e600d4b5364c9b3f900720bdfb8dcbd8ecdcc
-
SHA256
ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1
-
SHA512
292335b34bd64c28229c3ec0808b33eaa8299983e170888a62814bc9b933ce4690db84eacb565b568a78ee87a38b9f603183e7ffe564f24f46445a60c7160090
-
SSDEEP
3072:mEGh0ovlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGdl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c00000001231a-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a00000001431c-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001231a-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0036000000014502-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001231a-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001231a-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000001231a-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C3D88065-6D3C-49a8-A078-02AA1C683DB6} {80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C3D88065-6D3C-49a8-A078-02AA1C683DB6}\stubpath = "C:\\Windows\\{C3D88065-6D3C-49a8-A078-02AA1C683DB6}.exe" {80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57184A6D-F9EA-43d4-8CA3-48135B64A357} {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}\stubpath = "C:\\Windows\\{E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe" ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8EDBA8DA-178C-40a3-B424-CC26D6458E3B} {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3E094DB6-A87A-4245-895B-789A2B1A3281}\stubpath = "C:\\Windows\\{3E094DB6-A87A-4245-895B-789A2B1A3281}.exe" {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0} {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4} ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{06E35083-9C8B-4df6-AEE1-EA1F7406B73D}\stubpath = "C:\\Windows\\{06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe" {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57184A6D-F9EA-43d4-8CA3-48135B64A357}\stubpath = "C:\\Windows\\{57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe" {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBE7E5A2-A727-4ab1-803C-DF76A1C94863}\stubpath = "C:\\Windows\\{FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe" {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3E094DB6-A87A-4245-895B-789A2B1A3281} {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}\stubpath = "C:\\Windows\\{E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe" {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{050B3955-CBAC-424b-93C1-ECC903C84079} {C3D88065-6D3C-49a8-A078-02AA1C683DB6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91BD837B-44D3-4590-9B56-039A6BAEC927}\stubpath = "C:\\Windows\\{91BD837B-44D3-4590-9B56-039A6BAEC927}.exe" {050B3955-CBAC-424b-93C1-ECC903C84079}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{06E35083-9C8B-4df6-AEE1-EA1F7406B73D} {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBE7E5A2-A727-4ab1-803C-DF76A1C94863} {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E5FE94C9-84E1-481b-9FB8-EB37AFF3E696} {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0}\stubpath = "C:\\Windows\\{80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0}.exe" {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{050B3955-CBAC-424b-93C1-ECC903C84079}\stubpath = "C:\\Windows\\{050B3955-CBAC-424b-93C1-ECC903C84079}.exe" {C3D88065-6D3C-49a8-A078-02AA1C683DB6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91BD837B-44D3-4590-9B56-039A6BAEC927} {050B3955-CBAC-424b-93C1-ECC903C84079}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8EDBA8DA-178C-40a3-B424-CC26D6458E3B}\stubpath = "C:\\Windows\\{8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe" {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe -
Deletes itself 1 IoCs
pid Process 1964 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1032 {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe 2720 {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe 868 {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe 3024 {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe 2828 {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe 2696 {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe 700 {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe 2824 {80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0}.exe 2700 {C3D88065-6D3C-49a8-A078-02AA1C683DB6}.exe 1260 {050B3955-CBAC-424b-93C1-ECC903C84079}.exe 856 {91BD837B-44D3-4590-9B56-039A6BAEC927}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe File created C:\Windows\{FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe File created C:\Windows\{E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe File created C:\Windows\{050B3955-CBAC-424b-93C1-ECC903C84079}.exe {C3D88065-6D3C-49a8-A078-02AA1C683DB6}.exe File created C:\Windows\{91BD837B-44D3-4590-9B56-039A6BAEC927}.exe {050B3955-CBAC-424b-93C1-ECC903C84079}.exe File created C:\Windows\{8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe File created C:\Windows\{57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe File created C:\Windows\{3E094DB6-A87A-4245-895B-789A2B1A3281}.exe {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe File created C:\Windows\{80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0}.exe {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe File created C:\Windows\{C3D88065-6D3C-49a8-A078-02AA1C683DB6}.exe {80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0}.exe File created C:\Windows\{E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2220 ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe Token: SeIncBasePriorityPrivilege 1032 {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe Token: SeIncBasePriorityPrivilege 2720 {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe Token: SeIncBasePriorityPrivilege 868 {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe Token: SeIncBasePriorityPrivilege 3024 {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe Token: SeIncBasePriorityPrivilege 2828 {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe Token: SeIncBasePriorityPrivilege 2696 {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe Token: SeIncBasePriorityPrivilege 700 {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe Token: SeIncBasePriorityPrivilege 2824 {80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0}.exe Token: SeIncBasePriorityPrivilege 2700 {C3D88065-6D3C-49a8-A078-02AA1C683DB6}.exe Token: SeIncBasePriorityPrivilege 1260 {050B3955-CBAC-424b-93C1-ECC903C84079}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1032 2220 ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe 28 PID 2220 wrote to memory of 1032 2220 ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe 28 PID 2220 wrote to memory of 1032 2220 ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe 28 PID 2220 wrote to memory of 1032 2220 ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe 28 PID 2220 wrote to memory of 1964 2220 ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe 29 PID 2220 wrote to memory of 1964 2220 ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe 29 PID 2220 wrote to memory of 1964 2220 ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe 29 PID 2220 wrote to memory of 1964 2220 ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe 29 PID 1032 wrote to memory of 2720 1032 {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe 30 PID 1032 wrote to memory of 2720 1032 {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe 30 PID 1032 wrote to memory of 2720 1032 {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe 30 PID 1032 wrote to memory of 2720 1032 {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe 30 PID 1032 wrote to memory of 2624 1032 {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe 31 PID 1032 wrote to memory of 2624 1032 {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe 31 PID 1032 wrote to memory of 2624 1032 {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe 31 PID 1032 wrote to memory of 2624 1032 {E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe 31 PID 2720 wrote to memory of 868 2720 {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe 32 PID 2720 wrote to memory of 868 2720 {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe 32 PID 2720 wrote to memory of 868 2720 {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe 32 PID 2720 wrote to memory of 868 2720 {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe 32 PID 2720 wrote to memory of 2808 2720 {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe 33 PID 2720 wrote to memory of 2808 2720 {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe 33 PID 2720 wrote to memory of 2808 2720 {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe 33 PID 2720 wrote to memory of 2808 2720 {8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe 33 PID 868 wrote to memory of 3024 868 {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe 36 PID 868 wrote to memory of 3024 868 {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe 36 PID 868 wrote to memory of 3024 868 {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe 36 PID 868 wrote to memory of 3024 868 {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe 36 PID 868 wrote to memory of 1836 868 {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe 37 PID 868 wrote to memory of 1836 868 {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe 37 PID 868 wrote to memory of 1836 868 {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe 37 PID 868 wrote to memory of 1836 868 {06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe 37 PID 3024 wrote to memory of 2828 3024 {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe 38 PID 3024 wrote to memory of 2828 3024 {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe 38 PID 3024 wrote to memory of 2828 3024 {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe 38 PID 3024 wrote to memory of 2828 3024 {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe 38 PID 3024 wrote to memory of 2884 3024 {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe 39 PID 3024 wrote to memory of 2884 3024 {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe 39 PID 3024 wrote to memory of 2884 3024 {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe 39 PID 3024 wrote to memory of 2884 3024 {57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe 39 PID 2828 wrote to memory of 2696 2828 {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe 40 PID 2828 wrote to memory of 2696 2828 {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe 40 PID 2828 wrote to memory of 2696 2828 {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe 40 PID 2828 wrote to memory of 2696 2828 {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe 40 PID 2828 wrote to memory of 2000 2828 {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe 41 PID 2828 wrote to memory of 2000 2828 {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe 41 PID 2828 wrote to memory of 2000 2828 {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe 41 PID 2828 wrote to memory of 2000 2828 {FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe 41 PID 2696 wrote to memory of 700 2696 {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe 42 PID 2696 wrote to memory of 700 2696 {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe 42 PID 2696 wrote to memory of 700 2696 {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe 42 PID 2696 wrote to memory of 700 2696 {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe 42 PID 2696 wrote to memory of 620 2696 {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe 43 PID 2696 wrote to memory of 620 2696 {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe 43 PID 2696 wrote to memory of 620 2696 {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe 43 PID 2696 wrote to memory of 620 2696 {3E094DB6-A87A-4245-895B-789A2B1A3281}.exe 43 PID 700 wrote to memory of 2824 700 {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe 44 PID 700 wrote to memory of 2824 700 {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe 44 PID 700 wrote to memory of 2824 700 {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe 44 PID 700 wrote to memory of 2824 700 {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe 44 PID 700 wrote to memory of 1608 700 {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe 45 PID 700 wrote to memory of 1608 700 {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe 45 PID 700 wrote to memory of 1608 700 {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe 45 PID 700 wrote to memory of 1608 700 {E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe"C:\Users\Admin\AppData\Local\Temp\ee52c32330d824a198bb33a1148415f154b2b78d168075b4b939bfec1affcab1.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\{E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exeC:\Windows\{E1FBCAD8-E4F1-4e11-9EF8-CA60D4450DA4}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\{8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exeC:\Windows\{8EDBA8DA-178C-40a3-B424-CC26D6458E3B}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\{06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exeC:\Windows\{06E35083-9C8B-4df6-AEE1-EA1F7406B73D}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\{57184A6D-F9EA-43d4-8CA3-48135B64A357}.exeC:\Windows\{57184A6D-F9EA-43d4-8CA3-48135B64A357}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exeC:\Windows\{FBE7E5A2-A727-4ab1-803C-DF76A1C94863}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\{3E094DB6-A87A-4245-895B-789A2B1A3281}.exeC:\Windows\{3E094DB6-A87A-4245-895B-789A2B1A3281}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\{E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exeC:\Windows\{E5FE94C9-84E1-481b-9FB8-EB37AFF3E696}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\{80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0}.exeC:\Windows\{80C50A2F-0810-440d-9F9A-B5BD8AFE8DD0}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Windows\{C3D88065-6D3C-49a8-A078-02AA1C683DB6}.exeC:\Windows\{C3D88065-6D3C-49a8-A078-02AA1C683DB6}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Windows\{050B3955-CBAC-424b-93C1-ECC903C84079}.exeC:\Windows\{050B3955-CBAC-424b-93C1-ECC903C84079}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1260 -
C:\Windows\{91BD837B-44D3-4590-9B56-039A6BAEC927}.exeC:\Windows\{91BD837B-44D3-4590-9B56-039A6BAEC927}.exe12⤵
- Executes dropped EXE
PID:856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{050B3~1.EXE > nul12⤵PID:988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C3D88~1.EXE > nul11⤵PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80C50~1.EXE > nul10⤵PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E5FE9~1.EXE > nul9⤵PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3E094~1.EXE > nul8⤵PID:620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FBE7E~1.EXE > nul7⤵PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{57184~1.EXE > nul6⤵PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06E35~1.EXE > nul5⤵PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8EDBA~1.EXE > nul4⤵PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1FBC~1.EXE > nul3⤵PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\EE52C3~1.EXE > nul2⤵
- Deletes itself
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD507677af2f53e29925793be57ba0f8b2d
SHA1dc5053814bfc3077871437653c3537ab4aef9e6c
SHA25694134249079cbede8726d8743b3285b10f2952fc34a7ccf7ad3c80fedf4d00fd
SHA5126f8e3d31a41245eb58d0256a486e3b57b7b0fbcddceef8ea1c34cfeef715f49e1325f3c6bd0b6c774fced7cc60fbc133feba08ead6d6700c75d4aea9e08aecf4
-
Filesize
380KB
MD5874acdbe18df4f946db33fa72ab83bfd
SHA106e3c52c0a8c972aa27d0d5bfa7c6846be52aaab
SHA256b4ab20b2e0269c10704620a42172a15f20daf4167357c6be638d48c334e18b46
SHA512862264c6f4f08b086d5aa58f8f9810c63115cc0fdfb6f08a241aa1922cf82c503abe41e78eb7d5d6b4d714b12b426b5a917cab0da67b1e0e9ea0764a0d7361c8
-
Filesize
380KB
MD58a349b35abd2a3ba48cfb3b7f4e99072
SHA1c74a6ad8418213dbd56eadc223757f788d222d1e
SHA2563bd9f9db3ff5033510369f5ec0c4094da918f971e32d414a49b332e4d150a345
SHA5128ad7c3d7e64f5f3efcde2012b5e8e9bbbc3330acf00ff7eb9e269ab336852fb8357367564e778398f0424f5cf2ea18368b0254e841b156fb15f589366bfc6cdd
-
Filesize
380KB
MD5eb4a1e9e3b05856eb85fded6c228d4e3
SHA1cbbc1b33ecf6c91e7db95009e296ef3be5eeef76
SHA25626da99fd74928ee7df8b50e6fcf2195d0cc7632e13086c4f410954ba91b3dda3
SHA512daf4eb640e6a27ad0c9aa0e0d3c4df5c9da4095f27f34f326fc6d8774214e1f67d6bcd034d4fed5d201a68a2e5d161fd3f09a92cc13d904da17635448ce690de
-
Filesize
380KB
MD5400afc170667f8f35bc67f10460f6ae4
SHA1710417ca8f94058adf2fa5ffacfac735eecdb0ea
SHA2561a84eb7efe10dc903af41f5a8794682c5071a9068928d4d84da26ad71b376e40
SHA512ec8d65ef52469935da09aa6709837853551d754071da07829539ac98ee9002e18e6d33b67e774a18e67cbc9641aab90b84a1bca497bf4962d47137afad8fd910
-
Filesize
380KB
MD5b42034ea039048ac7b98685a8d7142c3
SHA17825d0ad6a6e6db07522f7db1fa07cc58b3d412c
SHA256c223a8cbc3daf35f17dc045b6993d88152ba7cf1a1d4ce830e4b7ca018c558f3
SHA51218de7c065661c161532b851d6ab2c594f3d7a8f4918e2832d9cee49cfa50187ae44de5b177e65945ad714205d1188d48cf3e7b2712baa7e2fd4142235f434e25
-
Filesize
380KB
MD515477c6bfde53caf4d941a83f9583353
SHA120de608647153cd8eaf93950f7b20c1071719ce7
SHA2564d31bc4bae8f5fadc039e230b2a6661d2211c40a6fe80961feba07802985ac9b
SHA512b26a5638bd44e7401a94846ea9f795d4be8176e10399e3c05ed5998f00dab068e018dadb52b462d82af80e913cad5c0cd119d7b88d85f5bd7b6a767b495a4cc9
-
Filesize
380KB
MD5348fa3042a461d81bbf329a12f0b1bdc
SHA10373bb665704662c491fd02ff0f6a8a02033b834
SHA256dc459b2cebd27ed3d952d30390bcb9a13147a17271cbacd9d0f2369a6024622b
SHA512cabddeffa09e4f8d825cca6806b84373fcadabd63cf6a8a7b6e04d0261ddacb5812e11101e18b03c8d51d8ef1a7190613bdcec050dfe9e913339556e63aaa78b
-
Filesize
380KB
MD5f8bd6b0d0a6b692da762f9bcc08d8ee3
SHA1b260fe4a35f44ea570a0b952b68b95862dec77f9
SHA256de453beca77d5b13d1b33fbfe4610e867fb7728199480327606e6ffe7dd96ece
SHA5127073c2eebdb736656890f6bd08aba727e9c5594d263ee45124e881c28561b1806fbf042f6fced407d9155a6a2460d9ffddf17767ee06114e00aca0be6c42ae3b
-
Filesize
380KB
MD5438c156041ee19c87262ef4b41895326
SHA120f977ca87ba4b6b2fa9310602f037010a872805
SHA2561f99b8657882af0057582ccf32f571f126d9fb5f29b1b37a957b15bf9671b765
SHA51242cdad7ca921ab5bc825c657ab69a31c7b68a1932985e9bbc622c96904c8499ef8eee7b53001275bf3c9dee32d3e8ffdbb4e1cd82ddb2980a0fc8e066b5762b2
-
Filesize
380KB
MD585c9dc8479f36c8892a2f46d82dab9bd
SHA15bb9161899782ef4b7eff2658828fcae02778f4e
SHA2560873f9d4114b48f84634d6fe80d874bb24efba8684e684dffe030a6808ea51ed
SHA5128d1362ef402e751ce62a14b5da65c70ede14dcb1dd94134f6a87fe9ba1f4a1890bcf8b2fbede50ad5b843e0f1a0d5ed033939824de5122d98195beaf2192176a