Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe
-
Size
168KB
-
MD5
13bed01937f6077efe719bb067ae2937
-
SHA1
76f1b484f3094688db3fd19cccab478d8b32e06d
-
SHA256
a7b8235b73441af0ee300f44a9c2b08a654bbb7f21f6ef62d95c128af4aa6c7f
-
SHA512
e7b33645e6878d4f0724c89098f4c977a295c3bd72f7fa79a365d6ee8564c5a563c60df21a2656117455bd51e341a833edd2fac7628c6187659de3f851262a57
-
SSDEEP
1536:1EGh0oQlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oQlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x000700000002321b-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0011000000023220-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023227-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0012000000023220-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021c86-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021c87-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000021c86-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070d-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070f-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070d-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070f-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000735-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}\stubpath = "C:\\Windows\\{7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe" {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7882DCEB-8415-46c6-83E1-20ECF6B970E7}\stubpath = "C:\\Windows\\{7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe" {66B2F15F-6076-4727-B3AD-49027E62B699}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3} {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}\stubpath = "C:\\Windows\\{7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe" {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{73CC77F6-3FC8-45f9-B253-821D772BCA4F}\stubpath = "C:\\Windows\\{73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe" {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FED9D205-D19A-4b28-8A12-1CBF95353984} {73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{61787A3B-EDB0-464b-AD63-364DF0A5F037} 2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{61787A3B-EDB0-464b-AD63-364DF0A5F037}\stubpath = "C:\\Windows\\{61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe" 2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FED9D205-D19A-4b28-8A12-1CBF95353984}\stubpath = "C:\\Windows\\{FED9D205-D19A-4b28-8A12-1CBF95353984}.exe" {73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66B2F15F-6076-4727-B3AD-49027E62B699}\stubpath = "C:\\Windows\\{66B2F15F-6076-4727-B3AD-49027E62B699}.exe" {55757647-7D54-4c46-9F53-032422240198}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7882DCEB-8415-46c6-83E1-20ECF6B970E7} {66B2F15F-6076-4727-B3AD-49027E62B699}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{279600E5-5E64-46f0-B5A6-B9134FB4E15F} {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{279600E5-5E64-46f0-B5A6-B9134FB4E15F}\stubpath = "C:\\Windows\\{279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe" {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6A247870-84F2-433c-960F-BD6901601B5B}\stubpath = "C:\\Windows\\{6A247870-84F2-433c-960F-BD6901601B5B}.exe" {FED9D205-D19A-4b28-8A12-1CBF95353984}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2048A37A-A8B0-4188-88D9-150F5F3D9BEA} {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2048A37A-A8B0-4188-88D9-150F5F3D9BEA}\stubpath = "C:\\Windows\\{2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe" {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{55757647-7D54-4c46-9F53-032422240198}\stubpath = "C:\\Windows\\{55757647-7D54-4c46-9F53-032422240198}.exe" {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66B2F15F-6076-4727-B3AD-49027E62B699} {55757647-7D54-4c46-9F53-032422240198}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{73CC77F6-3FC8-45f9-B253-821D772BCA4F} {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6A247870-84F2-433c-960F-BD6901601B5B} {FED9D205-D19A-4b28-8A12-1CBF95353984}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7FAC3F2E-38A4-499e-8E0A-DDAD2531947B} {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{55757647-7D54-4c46-9F53-032422240198} {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2} {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}\stubpath = "C:\\Windows\\{11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe" {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe -
Executes dropped EXE 12 IoCs
pid Process 2156 {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe 2576 {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe 916 {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe 2100 {55757647-7D54-4c46-9F53-032422240198}.exe 1556 {66B2F15F-6076-4727-B3AD-49027E62B699}.exe 3464 {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe 4772 {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe 228 {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe 5020 {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe 3300 {73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe 1828 {FED9D205-D19A-4b28-8A12-1CBF95353984}.exe 4360 {6A247870-84F2-433c-960F-BD6901601B5B}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe File created C:\Windows\{FED9D205-D19A-4b28-8A12-1CBF95353984}.exe {73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe File created C:\Windows\{7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe File created C:\Windows\{11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe File created C:\Windows\{279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe File created C:\Windows\{61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe 2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe File created C:\Windows\{2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe File created C:\Windows\{55757647-7D54-4c46-9F53-032422240198}.exe {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe File created C:\Windows\{66B2F15F-6076-4727-B3AD-49027E62B699}.exe {55757647-7D54-4c46-9F53-032422240198}.exe File created C:\Windows\{7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe {66B2F15F-6076-4727-B3AD-49027E62B699}.exe File created C:\Windows\{73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe File created C:\Windows\{6A247870-84F2-433c-960F-BD6901601B5B}.exe {FED9D205-D19A-4b28-8A12-1CBF95353984}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2008 2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe Token: SeIncBasePriorityPrivilege 2156 {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe Token: SeIncBasePriorityPrivilege 2576 {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe Token: SeIncBasePriorityPrivilege 916 {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe Token: SeIncBasePriorityPrivilege 2100 {55757647-7D54-4c46-9F53-032422240198}.exe Token: SeIncBasePriorityPrivilege 1556 {66B2F15F-6076-4727-B3AD-49027E62B699}.exe Token: SeIncBasePriorityPrivilege 3464 {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe Token: SeIncBasePriorityPrivilege 4772 {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe Token: SeIncBasePriorityPrivilege 228 {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe Token: SeIncBasePriorityPrivilege 5020 {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe Token: SeIncBasePriorityPrivilege 3300 {73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe Token: SeIncBasePriorityPrivilege 1828 {FED9D205-D19A-4b28-8A12-1CBF95353984}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2156 2008 2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe 96 PID 2008 wrote to memory of 2156 2008 2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe 96 PID 2008 wrote to memory of 2156 2008 2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe 96 PID 2008 wrote to memory of 2536 2008 2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe 97 PID 2008 wrote to memory of 2536 2008 2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe 97 PID 2008 wrote to memory of 2536 2008 2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe 97 PID 2156 wrote to memory of 2576 2156 {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe 98 PID 2156 wrote to memory of 2576 2156 {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe 98 PID 2156 wrote to memory of 2576 2156 {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe 98 PID 2156 wrote to memory of 2932 2156 {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe 99 PID 2156 wrote to memory of 2932 2156 {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe 99 PID 2156 wrote to memory of 2932 2156 {61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe 99 PID 2576 wrote to memory of 916 2576 {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe 101 PID 2576 wrote to memory of 916 2576 {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe 101 PID 2576 wrote to memory of 916 2576 {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe 101 PID 2576 wrote to memory of 2024 2576 {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe 102 PID 2576 wrote to memory of 2024 2576 {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe 102 PID 2576 wrote to memory of 2024 2576 {2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe 102 PID 916 wrote to memory of 2100 916 {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe 103 PID 916 wrote to memory of 2100 916 {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe 103 PID 916 wrote to memory of 2100 916 {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe 103 PID 916 wrote to memory of 744 916 {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe 104 PID 916 wrote to memory of 744 916 {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe 104 PID 916 wrote to memory of 744 916 {7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe 104 PID 2100 wrote to memory of 1556 2100 {55757647-7D54-4c46-9F53-032422240198}.exe 105 PID 2100 wrote to memory of 1556 2100 {55757647-7D54-4c46-9F53-032422240198}.exe 105 PID 2100 wrote to memory of 1556 2100 {55757647-7D54-4c46-9F53-032422240198}.exe 105 PID 2100 wrote to memory of 2400 2100 {55757647-7D54-4c46-9F53-032422240198}.exe 106 PID 2100 wrote to memory of 2400 2100 {55757647-7D54-4c46-9F53-032422240198}.exe 106 PID 2100 wrote to memory of 2400 2100 {55757647-7D54-4c46-9F53-032422240198}.exe 106 PID 1556 wrote to memory of 3464 1556 {66B2F15F-6076-4727-B3AD-49027E62B699}.exe 107 PID 1556 wrote to memory of 3464 1556 {66B2F15F-6076-4727-B3AD-49027E62B699}.exe 107 PID 1556 wrote to memory of 3464 1556 {66B2F15F-6076-4727-B3AD-49027E62B699}.exe 107 PID 1556 wrote to memory of 4000 1556 {66B2F15F-6076-4727-B3AD-49027E62B699}.exe 108 PID 1556 wrote to memory of 4000 1556 {66B2F15F-6076-4727-B3AD-49027E62B699}.exe 108 PID 1556 wrote to memory of 4000 1556 {66B2F15F-6076-4727-B3AD-49027E62B699}.exe 108 PID 3464 wrote to memory of 4772 3464 {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe 109 PID 3464 wrote to memory of 4772 3464 {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe 109 PID 3464 wrote to memory of 4772 3464 {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe 109 PID 3464 wrote to memory of 3896 3464 {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe 110 PID 3464 wrote to memory of 3896 3464 {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe 110 PID 3464 wrote to memory of 3896 3464 {7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe 110 PID 4772 wrote to memory of 228 4772 {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe 111 PID 4772 wrote to memory of 228 4772 {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe 111 PID 4772 wrote to memory of 228 4772 {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe 111 PID 4772 wrote to memory of 3304 4772 {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe 112 PID 4772 wrote to memory of 3304 4772 {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe 112 PID 4772 wrote to memory of 3304 4772 {7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe 112 PID 228 wrote to memory of 5020 228 {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe 113 PID 228 wrote to memory of 5020 228 {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe 113 PID 228 wrote to memory of 5020 228 {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe 113 PID 228 wrote to memory of 3252 228 {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe 114 PID 228 wrote to memory of 3252 228 {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe 114 PID 228 wrote to memory of 3252 228 {11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe 114 PID 5020 wrote to memory of 3300 5020 {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe 115 PID 5020 wrote to memory of 3300 5020 {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe 115 PID 5020 wrote to memory of 3300 5020 {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe 115 PID 5020 wrote to memory of 4556 5020 {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe 116 PID 5020 wrote to memory of 4556 5020 {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe 116 PID 5020 wrote to memory of 4556 5020 {279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe 116 PID 3300 wrote to memory of 1828 3300 {73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe 117 PID 3300 wrote to memory of 1828 3300 {73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe 117 PID 3300 wrote to memory of 1828 3300 {73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe 117 PID 3300 wrote to memory of 3108 3300 {73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_13bed01937f6077efe719bb067ae2937_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\{61787A3B-EDB0-464b-AD63-364DF0A5F037}.exeC:\Windows\{61787A3B-EDB0-464b-AD63-364DF0A5F037}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\{2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exeC:\Windows\{2048A37A-A8B0-4188-88D9-150F5F3D9BEA}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\{7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exeC:\Windows\{7FAC3F2E-38A4-499e-8E0A-DDAD2531947B}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\{55757647-7D54-4c46-9F53-032422240198}.exeC:\Windows\{55757647-7D54-4c46-9F53-032422240198}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\{66B2F15F-6076-4727-B3AD-49027E62B699}.exeC:\Windows\{66B2F15F-6076-4727-B3AD-49027E62B699}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\{7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exeC:\Windows\{7882DCEB-8415-46c6-83E1-20ECF6B970E7}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\{7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exeC:\Windows\{7A4DA220-4B4C-49a6-B8AD-6BAB31EB01F3}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\{11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exeC:\Windows\{11DEAC95-65E3-4bad-A381-E4CA7DA3BCD2}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\{279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exeC:\Windows\{279600E5-5E64-46f0-B5A6-B9134FB4E15F}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\{73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exeC:\Windows\{73CC77F6-3FC8-45f9-B253-821D772BCA4F}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\{FED9D205-D19A-4b28-8A12-1CBF95353984}.exeC:\Windows\{FED9D205-D19A-4b28-8A12-1CBF95353984}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1828 -
C:\Windows\{6A247870-84F2-433c-960F-BD6901601B5B}.exeC:\Windows\{6A247870-84F2-433c-960F-BD6901601B5B}.exe13⤵
- Executes dropped EXE
PID:4360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FED9D~1.EXE > nul13⤵PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{73CC7~1.EXE > nul12⤵PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{27960~1.EXE > nul11⤵PID:4556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11DEA~1.EXE > nul10⤵PID:3252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7A4DA~1.EXE > nul9⤵PID:3304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7882D~1.EXE > nul8⤵PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{66B2F~1.EXE > nul7⤵PID:4000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{55757~1.EXE > nul6⤵PID:2400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7FAC3~1.EXE > nul5⤵PID:744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2048A~1.EXE > nul4⤵PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{61787~1.EXE > nul3⤵PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD584a77681d6f93cca4b5b5ec3825644b3
SHA16dafa6ea30009067498d0063546de390c614eec7
SHA25675af5f216d188413d51adef80e5a581da6f142012eafb501b88839177a707cdb
SHA512820fb25afc7726b3353cd8f9a8d00a8ce94be2dd110e690f310e67671fc9fe2148fc4d8053f1e76f923d0a15b99f8e137928b2f4c365639ddefa972c336439c8
-
Filesize
168KB
MD5a7f4d62a6a675a73d7340b464c587c9b
SHA1c60909d0bbe5ac9d9db354a64c3f7a8ba42137d6
SHA25679579bc5e9cac9e22b4d38e9e1d144057c26294aef9478735d403cd7e12b605c
SHA512220e5532ab6853569fa795112ead67845f3f2c4887b3b8a02b3906d170574af4f4993ac1e1610ad4666c4d9c9c08829f6b54e6ae6cb0ac3280fdd9df82cb6ed6
-
Filesize
168KB
MD5d3df013235664b575799b47c33465380
SHA158d3bc912280b500e09cc749384825d6803f964b
SHA25609f84882d87817374e8360009cc01ff149e462166925442f3272b06d2a67a389
SHA512fd7f6c8b47e428dc49498c245fe8977a9fe1cbd0cae6af7c59685fd2cc039268d3e01b7e331a4a675354e9e86aace5abac3e9feb3df7d67444441e15912b9d30
-
Filesize
168KB
MD581d8bfdef934462c94abbfe8d9b9f764
SHA13c4c67a3b68b7ab578f28b2bde80ea3ec27dbca5
SHA25663976b71b40990542527910da37fe1e866d27f9c2f146fc02c427790c48e0e15
SHA512b66877bd00b67a3c49c92c98550d0fdae7136a30124c2eca3d8b4f3305b1f1c4318d56b5b73e4f785893bd2c3f0ab9cc7db41d7ded0ed05d2db69a44b4d72c44
-
Filesize
168KB
MD5d6c185633935f790113961bbe10eb714
SHA1489ba2d7a0daa0ba28ab34d3441286d48f641e8b
SHA2561a07db3800b686e01a1e041018403f6ce486df46ce73a68ff195dd06f9916a77
SHA512ed0b07b6a5efffcd0d177cd3d569bf2781bdf9733e4e1d71a246e5ae734c9b03b5004c856944bffd9e85f4b58c4d285dfefd670b5af05d18ed2ca1f576dd87e2
-
Filesize
168KB
MD577fa0301df3ac4e265c688d091f2a81d
SHA172faa770fa4c88eb90a30093cd9c45077ffc9d20
SHA2563b6b954e9ff33ec82834245b7a3799948633fddde534c65447fdc2e7dda95828
SHA512805c82958423050ff773ecc456cee314d9f82d1a626afd4ef0959f55e66297695a657997f8b90d2b52b17305856665e04fb23f81fa81a6561bb4bb83a8b5b857
-
Filesize
168KB
MD52235e19e30046e78248421b61e290cc4
SHA164c4ea1eb835a3ec49fa536a41a9bf467620e8a6
SHA2564c4c5c949e3b5c4d679589391eb11c6f1688fc492a9df4337a9e54858ca7a5b4
SHA5122c08dd3c8ad8138aa5325bcf1e99c38db49f12ff214a8cd0ba5acc58d2e02b4c087718906d4e0468e5028c74439d21663c5e9cf65519f1fb5874019bc6f61a1e
-
Filesize
168KB
MD553d8312b4a35dc3e32e2687918cd44ce
SHA1844435baeea9d6035343de03077888e5645a1701
SHA25619a560e472da5fb529edfc629a1451bb03d007e5a9038c578e70e5d6eea52a7d
SHA512d7f8084bb536250a13e5dd7036cf30d12cb0fc3a22905b0ccdc1ba69331096b43e5d8349c53d512c806bd277b2ad43c16b8d4c9d3ac47bc259a1785017d1102f
-
Filesize
168KB
MD5182ee4fd255bd64a40fba4ede8feab5a
SHA16935767882d4308cc2af172889c1e724dd4bbd78
SHA256526a926625ee51841ae491d779f157b4f1267ffe0129acb6c3b6c8ae7975124e
SHA512cf5027b7ca9dcb33c8db62d1ea170cb752bb184157b265b74cd7bcb976fda3f208c8c7d4680bb07e16824b9e59fc56eb5cd9a4d5fa34da7288ec4a1da60d870f
-
Filesize
168KB
MD5d31efb0c7d521bda15283bd8e32d32db
SHA15cd96d35f656c2a58dac5ddaec74a77f8d21f40b
SHA25637001925a85f8d6c91ef39dcb881b0faa70a552acb029d5c94af3ca3dee5ea44
SHA512f98830ebba638bd41c3661be7061f32a745d9f6fdce3d7377de91946c98615230ad1ef089ddcb7d36f9ccafc650b0d61342a28a69c5baa707cd9f2113a88cc48
-
Filesize
168KB
MD58caa0917b23414f84fa9118191d958c4
SHA1553f0699aa699bd115182cb8609152c971daf385
SHA256ee80aa68970628157cb3283628d49818f95eb65d92e862677197eef01db39fb3
SHA51253eb31c92905669df260c7db7a9228cb0ca5078822cfca31c705d19ed8f470f30febccbdd1af33132eddab3c53d481d3084d9abb720d92e13b47db427c60f62c
-
Filesize
168KB
MD5967fdd0546e11fab6bc663134b5e884d
SHA1473db7d5ff188e864819ae50b3da945321877192
SHA256c1421f3c56290a2cfcbac8993fcdf0e3d23522846ca0c8245573a3dd52d5449a
SHA512a9874783f2a21f9d065e63aab50dbadd72bdb09025f609525bdee415dfa2d3a29b3e35b028e77864960c818e0846a93967aa1e1dc76766b5bd734403c7f7c1e8