Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe
Resource
win10v2004-20240319-en
General
-
Target
2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe
-
Size
180KB
-
MD5
199d0c673a3ab605193615540a45910a
-
SHA1
134a0215e4d61dbe05d484a10ac2d1db5991bc4a
-
SHA256
22984bd98239bcafdc423e704aa401054af953e791b704cb20362d7d7d0cc298
-
SHA512
7a530a470307a2839fea9f11326e12a1b08ff9c0de279c0d8045ecfaf4c1d4de1ad2c5dfb11969a5cb32aa4e5650209a8339e89a8a013a295ef2ac8abf95db63
-
SSDEEP
3072:jEGh0o5lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG7l5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0007000000023341-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002334f-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00040000000167e1-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000234c3-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000235d7-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000235d8-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000235d7-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000235d8-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a0000000230fb-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a0000000230fd-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000001db7a-79.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023613-84.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F6ABC27D-9A5E-4388-B40B-84CAD18591ED} 2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}\stubpath = "C:\\Windows\\{2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe" {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DAC91386-3B64-4664-A6BF-42F857DDC477} {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}\stubpath = "C:\\Windows\\{D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe" {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4BB49F1-12B4-4416-811B-702E3195906D}\stubpath = "C:\\Windows\\{E4BB49F1-12B4-4416-811B-702E3195906D}.exe" {08572767-CDC4-4afa-AAF6-269D28AD2AF6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0B11129-A822-4d74-A0D9-39EB7D8FD9C6} {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{39DAFE39-2553-4614-855E-C7257BB8E0C3}\stubpath = "C:\\Windows\\{39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe" {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1ED2AC48-A829-448a-A633-27A74FE67F3F}\stubpath = "C:\\Windows\\{1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe" {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{58686C70-1565-407f-9597-52C500211D4B} {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{58686C70-1565-407f-9597-52C500211D4B}\stubpath = "C:\\Windows\\{58686C70-1565-407f-9597-52C500211D4B}.exe" {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{176BE1D6-2E86-45fd-83DB-CE7DFA24D265} {58686C70-1565-407f-9597-52C500211D4B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{203FFB73-6D9C-4feb-B1AD-456365189F8D}\stubpath = "C:\\Windows\\{203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe" {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DAC91386-3B64-4664-A6BF-42F857DDC477}\stubpath = "C:\\Windows\\{DAC91386-3B64-4664-A6BF-42F857DDC477}.exe" {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08572767-CDC4-4afa-AAF6-269D28AD2AF6} {EAC03AEA-1983-455a-B33A-527FEA069277}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08572767-CDC4-4afa-AAF6-269D28AD2AF6}\stubpath = "C:\\Windows\\{08572767-CDC4-4afa-AAF6-269D28AD2AF6}.exe" {EAC03AEA-1983-455a-B33A-527FEA069277}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F6ABC27D-9A5E-4388-B40B-84CAD18591ED}\stubpath = "C:\\Windows\\{F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe" 2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{203FFB73-6D9C-4feb-B1AD-456365189F8D} {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EAC03AEA-1983-455a-B33A-527FEA069277} {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EAC03AEA-1983-455a-B33A-527FEA069277}\stubpath = "C:\\Windows\\{EAC03AEA-1983-455a-B33A-527FEA069277}.exe" {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4BB49F1-12B4-4416-811B-702E3195906D} {08572767-CDC4-4afa-AAF6-269D28AD2AF6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{39DAFE39-2553-4614-855E-C7257BB8E0C3} {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1ED2AC48-A829-448a-A633-27A74FE67F3F} {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{176BE1D6-2E86-45fd-83DB-CE7DFA24D265}\stubpath = "C:\\Windows\\{176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe" {58686C70-1565-407f-9597-52C500211D4B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2BE9CC51-6DA9-47bb-89A1-3135075A0B0F} {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe -
Executes dropped EXE 12 IoCs
pid Process 4196 {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe 804 {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe 1268 {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe 4604 {58686C70-1565-407f-9597-52C500211D4B}.exe 2212 {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe 3268 {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe 960 {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe 4640 {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe 1844 {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe 2392 {EAC03AEA-1983-455a-B33A-527FEA069277}.exe 4760 {08572767-CDC4-4afa-AAF6-269D28AD2AF6}.exe 4768 {E4BB49F1-12B4-4416-811B-702E3195906D}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{58686C70-1565-407f-9597-52C500211D4B}.exe {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe File created C:\Windows\{203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe File created C:\Windows\{2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe File created C:\Windows\{DAC91386-3B64-4664-A6BF-42F857DDC477}.exe {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe File created C:\Windows\{D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe File created C:\Windows\{E4BB49F1-12B4-4416-811B-702E3195906D}.exe {08572767-CDC4-4afa-AAF6-269D28AD2AF6}.exe File created C:\Windows\{39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe File created C:\Windows\{1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe File created C:\Windows\{176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe {58686C70-1565-407f-9597-52C500211D4B}.exe File created C:\Windows\{EAC03AEA-1983-455a-B33A-527FEA069277}.exe {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe File created C:\Windows\{08572767-CDC4-4afa-AAF6-269D28AD2AF6}.exe {EAC03AEA-1983-455a-B33A-527FEA069277}.exe File created C:\Windows\{F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe 2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4504 2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe Token: SeIncBasePriorityPrivilege 4196 {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe Token: SeIncBasePriorityPrivilege 804 {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe Token: SeIncBasePriorityPrivilege 1268 {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe Token: SeIncBasePriorityPrivilege 4604 {58686C70-1565-407f-9597-52C500211D4B}.exe Token: SeIncBasePriorityPrivilege 2212 {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe Token: SeIncBasePriorityPrivilege 3268 {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe Token: SeIncBasePriorityPrivilege 960 {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe Token: SeIncBasePriorityPrivilege 4640 {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe Token: SeIncBasePriorityPrivilege 1844 {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe Token: SeManageVolumePrivilege 3928 svchost.exe Token: SeIncBasePriorityPrivilege 2392 {EAC03AEA-1983-455a-B33A-527FEA069277}.exe Token: SeIncBasePriorityPrivilege 4760 {08572767-CDC4-4afa-AAF6-269D28AD2AF6}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4196 4504 2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe 105 PID 4504 wrote to memory of 4196 4504 2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe 105 PID 4504 wrote to memory of 4196 4504 2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe 105 PID 4504 wrote to memory of 3272 4504 2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe 106 PID 4504 wrote to memory of 3272 4504 2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe 106 PID 4504 wrote to memory of 3272 4504 2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe 106 PID 4196 wrote to memory of 804 4196 {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe 107 PID 4196 wrote to memory of 804 4196 {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe 107 PID 4196 wrote to memory of 804 4196 {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe 107 PID 4196 wrote to memory of 1848 4196 {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe 108 PID 4196 wrote to memory of 1848 4196 {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe 108 PID 4196 wrote to memory of 1848 4196 {F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe 108 PID 804 wrote to memory of 1268 804 {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe 113 PID 804 wrote to memory of 1268 804 {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe 113 PID 804 wrote to memory of 1268 804 {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe 113 PID 804 wrote to memory of 1752 804 {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe 114 PID 804 wrote to memory of 1752 804 {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe 114 PID 804 wrote to memory of 1752 804 {39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe 114 PID 1268 wrote to memory of 4604 1268 {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe 116 PID 1268 wrote to memory of 4604 1268 {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe 116 PID 1268 wrote to memory of 4604 1268 {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe 116 PID 1268 wrote to memory of 4984 1268 {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe 117 PID 1268 wrote to memory of 4984 1268 {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe 117 PID 1268 wrote to memory of 4984 1268 {1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe 117 PID 4604 wrote to memory of 2212 4604 {58686C70-1565-407f-9597-52C500211D4B}.exe 118 PID 4604 wrote to memory of 2212 4604 {58686C70-1565-407f-9597-52C500211D4B}.exe 118 PID 4604 wrote to memory of 2212 4604 {58686C70-1565-407f-9597-52C500211D4B}.exe 118 PID 4604 wrote to memory of 4996 4604 {58686C70-1565-407f-9597-52C500211D4B}.exe 119 PID 4604 wrote to memory of 4996 4604 {58686C70-1565-407f-9597-52C500211D4B}.exe 119 PID 4604 wrote to memory of 4996 4604 {58686C70-1565-407f-9597-52C500211D4B}.exe 119 PID 2212 wrote to memory of 3268 2212 {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe 121 PID 2212 wrote to memory of 3268 2212 {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe 121 PID 2212 wrote to memory of 3268 2212 {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe 121 PID 2212 wrote to memory of 8 2212 {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe 122 PID 2212 wrote to memory of 8 2212 {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe 122 PID 2212 wrote to memory of 8 2212 {176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe 122 PID 3268 wrote to memory of 960 3268 {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe 123 PID 3268 wrote to memory of 960 3268 {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe 123 PID 3268 wrote to memory of 960 3268 {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe 123 PID 3268 wrote to memory of 4976 3268 {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe 124 PID 3268 wrote to memory of 4976 3268 {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe 124 PID 3268 wrote to memory of 4976 3268 {203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe 124 PID 960 wrote to memory of 4640 960 {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe 125 PID 960 wrote to memory of 4640 960 {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe 125 PID 960 wrote to memory of 4640 960 {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe 125 PID 960 wrote to memory of 2280 960 {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe 126 PID 960 wrote to memory of 2280 960 {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe 126 PID 960 wrote to memory of 2280 960 {2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe 126 PID 4640 wrote to memory of 1844 4640 {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe 134 PID 4640 wrote to memory of 1844 4640 {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe 134 PID 4640 wrote to memory of 1844 4640 {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe 134 PID 4640 wrote to memory of 4604 4640 {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe 135 PID 4640 wrote to memory of 4604 4640 {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe 135 PID 4640 wrote to memory of 4604 4640 {DAC91386-3B64-4664-A6BF-42F857DDC477}.exe 135 PID 1844 wrote to memory of 2392 1844 {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe 136 PID 1844 wrote to memory of 2392 1844 {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe 136 PID 1844 wrote to memory of 2392 1844 {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe 136 PID 1844 wrote to memory of 4016 1844 {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe 137 PID 1844 wrote to memory of 4016 1844 {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe 137 PID 1844 wrote to memory of 4016 1844 {D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe 137 PID 2392 wrote to memory of 4760 2392 {EAC03AEA-1983-455a-B33A-527FEA069277}.exe 144 PID 2392 wrote to memory of 4760 2392 {EAC03AEA-1983-455a-B33A-527FEA069277}.exe 144 PID 2392 wrote to memory of 4760 2392 {EAC03AEA-1983-455a-B33A-527FEA069277}.exe 144 PID 2392 wrote to memory of 4296 2392 {EAC03AEA-1983-455a-B33A-527FEA069277}.exe 145
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-08_199d0c673a3ab605193615540a45910a_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\{F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exeC:\Windows\{F6ABC27D-9A5E-4388-B40B-84CAD18591ED}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\{39DAFE39-2553-4614-855E-C7257BB8E0C3}.exeC:\Windows\{39DAFE39-2553-4614-855E-C7257BB8E0C3}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\{1ED2AC48-A829-448a-A633-27A74FE67F3F}.exeC:\Windows\{1ED2AC48-A829-448a-A633-27A74FE67F3F}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\{58686C70-1565-407f-9597-52C500211D4B}.exeC:\Windows\{58686C70-1565-407f-9597-52C500211D4B}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\{176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exeC:\Windows\{176BE1D6-2E86-45fd-83DB-CE7DFA24D265}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\{203FFB73-6D9C-4feb-B1AD-456365189F8D}.exeC:\Windows\{203FFB73-6D9C-4feb-B1AD-456365189F8D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\{2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exeC:\Windows\{2BE9CC51-6DA9-47bb-89A1-3135075A0B0F}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\{DAC91386-3B64-4664-A6BF-42F857DDC477}.exeC:\Windows\{DAC91386-3B64-4664-A6BF-42F857DDC477}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\{D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exeC:\Windows\{D0B11129-A822-4d74-A0D9-39EB7D8FD9C6}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\{EAC03AEA-1983-455a-B33A-527FEA069277}.exeC:\Windows\{EAC03AEA-1983-455a-B33A-527FEA069277}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\{08572767-CDC4-4afa-AAF6-269D28AD2AF6}.exeC:\Windows\{08572767-CDC4-4afa-AAF6-269D28AD2AF6}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4760 -
C:\Windows\{E4BB49F1-12B4-4416-811B-702E3195906D}.exeC:\Windows\{E4BB49F1-12B4-4416-811B-702E3195906D}.exe13⤵
- Executes dropped EXE
PID:4768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{08572~1.EXE > nul13⤵PID:4892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EAC03~1.EXE > nul12⤵PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D0B11~1.EXE > nul11⤵PID:4016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DAC91~1.EXE > nul10⤵PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2BE9C~1.EXE > nul9⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{203FF~1.EXE > nul8⤵PID:4976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{176BE~1.EXE > nul7⤵PID:8
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{58686~1.EXE > nul6⤵PID:4996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1ED2A~1.EXE > nul5⤵PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39DAF~1.EXE > nul4⤵PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F6ABC~1.EXE > nul3⤵PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3640 --field-trial-handle=2132,i,4018525042804461719,1997165676266557055,262144 --variations-seed-version /prefetch:81⤵PID:1248
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4016
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5c7e6bb22351bb00f9822fc47eda26dcc
SHA17d1904634486f13bce79ae750fd9b8af4437cb4a
SHA2561fc280b798e6b288d71345a2c3a0163b175298b5c917166e6dc87a61f5882577
SHA512962ec95c35275aa0dfe19dd1626485f612e2961a045183c853e0b4e6fef628f92ce88d5b7433eb19c516a58ff876ab82b4e2b459d145cfe0bdbb205f186416c1
-
Filesize
180KB
MD565a0d0e8e210f50cd7be4ce51ec1e42e
SHA127b8817b268eaccf60ae44f2724c6e0cff1c9226
SHA256106c89f5bde91ca8c0305132860bf6b83f9ba359e2370f4f759b920c6de079bf
SHA5125952d29921f796b89c745f7a33bf91bc42f4240086e167ccf4e6aeffec23de1d0bf0e10e5cd53d5297d3f63269725195c46794880c874a44e07ad6232527b718
-
Filesize
180KB
MD520b7900dd3d40b97b5b9c26291d5d08f
SHA159b7d32ffe50645c374ac49b5b658123ced58a64
SHA2561ce6bf247440e3973061711c6d9e8679551146b347ddd4079a8f459353f3e6ee
SHA5123950635bd54bbb5b2f0643a1548cf0c23a74f6d00220c5e89c5c8826e7bb4d46852f53a2b742df70978f7c33b896ef520152c1ce41f0ebbcf318bc7031d57a94
-
Filesize
180KB
MD5ca5ce497c4fb329e1756fc5f93b62b45
SHA11e9e82b94e4b367025abfb2617342b29d08fe1d6
SHA256d0667c7ea86819f3ba0336d33262455dd684ad9531ac50a1ab1f39dc4e1605c8
SHA512caaf4c2d2f209989c1fd5a623ab16a18018e0a4e4ee4c1122cc6f77e5c4fb2661ab80ea98fd94839630812857cfc59731bbbca07a102ddd3e4030f513e38a86a
-
Filesize
180KB
MD5403cc159426daabbc51a10c35e26e0f7
SHA182728ae726a3a396655f411561889ebb3f8e3208
SHA25667e4ce7d16a082b9c9915114ee9542960347c6c658a55cee14bf611daee88847
SHA5128892db2ed9460b497ca6e2278d4003b39ae398e376ea0c512260578f0b58b396426ca62324bcb3e17e5cc286807e2c4dc6a482cf92dde458946a35e14bb5f0ad
-
Filesize
180KB
MD58203dbdaeb280b3699fce40709cb28cb
SHA153eb636b553b285973c3916f6becccbcff83ecae
SHA256f5da8439ae0f37b6857862aec2d5b45968ae08ba8d62c5973cc9bb7b8bf3a272
SHA51230c1be312f3589089210216255b19d6dab7fd03f2a476146992a1ec4d7d3250d4c3ee196497bb86f8302ed0b4c2cbe91dd2fbd1ea8f93297701a64343768ad24
-
Filesize
180KB
MD5f462dc51434723c367c2d2ac88aa69ee
SHA145cfbd11074f929dc8d1807b65af4c7abe5af591
SHA25634892f2227f6eb3d2e254cd02cf72a71f0100e7e9a094d9b6a0bc6377fd555fe
SHA51284af6c09f54e4158807c0bd5e3ca14e8363b1807e5d881a383e29fc95ad6dbdca669754cc1561fade47a0d0cac256b2a4b462189c5cee3252ed47a69f8bb3954
-
Filesize
180KB
MD53d7e7dcd99a3868fa979310ceb878ca3
SHA1f386bb3929bda449165b9b176a2ee4a8cc533484
SHA25675c041185d152c1f247d8e03d232c789fd12355bd1d721c8548b3b1a3d5f9942
SHA5120bc24de76ec578fea625aa6e5ad57d41227e3dc969edfaae5ce066060579da838419c650e4563a838dec8c5ea90c4a2a12cc7a4435a6fec09b25439c1646670e
-
Filesize
180KB
MD5d7e8a7987aaf4ef7f29bc59e44bcd299
SHA1e74c3f8bae43061d88fb83d9948e57d55d038139
SHA2568eaa6bac035cbe6d5d00494593e8cb292768e6cc43e80fc2587bc4b00ae09d79
SHA512b300d09d500ecc79260b748ef66c432ab96fc8ab65a5822889fed317e866e056baa7f5494694c7b1bcc973a48213f9f4ecbb450802fc48223af75839258d1d93
-
Filesize
180KB
MD5fa6fece1519902fed0c6a6605b34fdae
SHA1c742fc1203293e47fb20dbd1d00806b466d7608d
SHA25650b18de47361791b6b1869513916a9da22ab36f17d2902b051a28ba82e47aff2
SHA5127e7071a276b071b639be53684f3fd37906f969c71122f62b2aeb64b66ee7af0775e033806eb09ba6e5b22892001519656696434d7c48fac52c1a555ee945cea1
-
Filesize
180KB
MD54226b9ad3316cbef281bb0c6b9e57397
SHA1cdf0fc9d9d2ceaed5bf5cf78357fee5a98705714
SHA256e8033d26372b89bde24e3dc0ae49d076db0c403e2279e05a7b91273c9a712bbb
SHA5127f4db87a9b8bc84df5778711da11e698b80ad9efddea17b50859d9d1021df4006e2be686a32aa5068b065cdeb9a20faa02a00c2a9ac3cf003db0de1766beea5b
-
Filesize
180KB
MD515ae0bc80454b40ae835b4ed88515f2f
SHA170a6831b4dc342202c707ef5097a851d39a8e1a9
SHA2565e7179ffb1f286a43300867ec9eb3c0a909c4450da931cb1ef7566258577dd2f
SHA512f2beee7a73f2a7daba8d7ffddad7f4450902ef911172966b07cbf89294c0d2667328473bbac2b0257f6dc9327dd70b1b61951f8801d3f26c75f5edbd3505687c