Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe
-
Size
216KB
-
MD5
b8680a52977490ac4a1841252c0a2dc8
-
SHA1
9dd2384cb5b1e0ca2ed1fb921e6345875f9f18b5
-
SHA256
344e49da626af3c7b2f9ed75611263c42ccc9ff465ff49623a02faac18e74e79
-
SHA512
51b7f5e92bcbec9238a1c6cd7fc0d0593eec867a709c6aab600596d8ea2d9e86bac346cca1e22b8fec36ed5634269d33d396161c152508ed80acf1680dc93f3b
-
SSDEEP
3072:jEGh0ogl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEG2lEeKcAEcGy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x0008000000012254-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00040000000130fc-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002c000000014c3b-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00050000000130fc-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00060000000130fc-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00070000000130fc-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00080000000130fc-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8092D12A-5F46-4e36-9438-C09424A89E1D} {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B16094BA-0DAF-4428-90C3-BCE7123C87E0} {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109} {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{967EA5A1-2A32-4261-905F-BFBB103BD9D3}\stubpath = "C:\\Windows\\{967EA5A1-2A32-4261-905F-BFBB103BD9D3}.exe" {2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DBB7DF40-F0C8-4904-BB2B-5636186A3B7C}\stubpath = "C:\\Windows\\{DBB7DF40-F0C8-4904-BB2B-5636186A3B7C}.exe" {967EA5A1-2A32-4261-905F-BFBB103BD9D3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{30A5A150-65B6-4d14-9DCA-6A8E1FF5F633} 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1DEE586F-3AA5-44e8-80B1-022CBB8E5191} {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}\stubpath = "C:\\Windows\\{5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe" {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109}\stubpath = "C:\\Windows\\{2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109}.exe" {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7FD21884-B811-45bf-9370-CEA1E55F0105} {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7FD21884-B811-45bf-9370-CEA1E55F0105}\stubpath = "C:\\Windows\\{7FD21884-B811-45bf-9370-CEA1E55F0105}.exe" {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC7AF1FE-3370-4058-A794-4DBAB80DB898}\stubpath = "C:\\Windows\\{FC7AF1FE-3370-4058-A794-4DBAB80DB898}.exe" {DBB7DF40-F0C8-4904-BB2B-5636186A3B7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17EB31CA-169C-4581-9AFE-55DBB287D977}\stubpath = "C:\\Windows\\{17EB31CA-169C-4581-9AFE-55DBB287D977}.exe" {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A} {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{967EA5A1-2A32-4261-905F-BFBB103BD9D3} {2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}\stubpath = "C:\\Windows\\{30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe" 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8092D12A-5F46-4e36-9438-C09424A89E1D}\stubpath = "C:\\Windows\\{8092D12A-5F46-4e36-9438-C09424A89E1D}.exe" {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B16094BA-0DAF-4428-90C3-BCE7123C87E0}\stubpath = "C:\\Windows\\{B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe" {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1DEE586F-3AA5-44e8-80B1-022CBB8E5191}\stubpath = "C:\\Windows\\{1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe" {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17EB31CA-169C-4581-9AFE-55DBB287D977} {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DBB7DF40-F0C8-4904-BB2B-5636186A3B7C} {967EA5A1-2A32-4261-905F-BFBB103BD9D3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC7AF1FE-3370-4058-A794-4DBAB80DB898} {DBB7DF40-F0C8-4904-BB2B-5636186A3B7C}.exe -
Deletes itself 1 IoCs
pid Process 2632 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2496 {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe 2400 {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe 2940 {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe 1712 {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe 2776 {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe 1584 {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe 2460 {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe 1480 {2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109}.exe 2348 {967EA5A1-2A32-4261-905F-BFBB103BD9D3}.exe 1996 {DBB7DF40-F0C8-4904-BB2B-5636186A3B7C}.exe 2956 {FC7AF1FE-3370-4058-A794-4DBAB80DB898}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{8092D12A-5F46-4e36-9438-C09424A89E1D}.exe {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe File created C:\Windows\{7FD21884-B811-45bf-9370-CEA1E55F0105}.exe {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe File created C:\Windows\{30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe File created C:\Windows\{1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe File created C:\Windows\{17EB31CA-169C-4581-9AFE-55DBB287D977}.exe {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe File created C:\Windows\{5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe File created C:\Windows\{2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109}.exe {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe File created C:\Windows\{967EA5A1-2A32-4261-905F-BFBB103BD9D3}.exe {2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109}.exe File created C:\Windows\{DBB7DF40-F0C8-4904-BB2B-5636186A3B7C}.exe {967EA5A1-2A32-4261-905F-BFBB103BD9D3}.exe File created C:\Windows\{FC7AF1FE-3370-4058-A794-4DBAB80DB898}.exe {DBB7DF40-F0C8-4904-BB2B-5636186A3B7C}.exe File created C:\Windows\{B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2156 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe Token: SeIncBasePriorityPrivilege 2496 {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe Token: SeIncBasePriorityPrivilege 2400 {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe Token: SeIncBasePriorityPrivilege 2940 {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe Token: SeIncBasePriorityPrivilege 1712 {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe Token: SeIncBasePriorityPrivilege 2776 {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe Token: SeIncBasePriorityPrivilege 1584 {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe Token: SeIncBasePriorityPrivilege 2460 {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe Token: SeIncBasePriorityPrivilege 1480 {2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109}.exe Token: SeIncBasePriorityPrivilege 2348 {967EA5A1-2A32-4261-905F-BFBB103BD9D3}.exe Token: SeIncBasePriorityPrivilege 1996 {DBB7DF40-F0C8-4904-BB2B-5636186A3B7C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2496 2156 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe 28 PID 2156 wrote to memory of 2496 2156 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe 28 PID 2156 wrote to memory of 2496 2156 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe 28 PID 2156 wrote to memory of 2496 2156 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe 28 PID 2156 wrote to memory of 2632 2156 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe 29 PID 2156 wrote to memory of 2632 2156 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe 29 PID 2156 wrote to memory of 2632 2156 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe 29 PID 2156 wrote to memory of 2632 2156 2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe 29 PID 2496 wrote to memory of 2400 2496 {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe 30 PID 2496 wrote to memory of 2400 2496 {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe 30 PID 2496 wrote to memory of 2400 2496 {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe 30 PID 2496 wrote to memory of 2400 2496 {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe 30 PID 2496 wrote to memory of 2548 2496 {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe 31 PID 2496 wrote to memory of 2548 2496 {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe 31 PID 2496 wrote to memory of 2548 2496 {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe 31 PID 2496 wrote to memory of 2548 2496 {30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe 31 PID 2400 wrote to memory of 2940 2400 {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe 34 PID 2400 wrote to memory of 2940 2400 {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe 34 PID 2400 wrote to memory of 2940 2400 {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe 34 PID 2400 wrote to memory of 2940 2400 {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe 34 PID 2400 wrote to memory of 3064 2400 {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe 35 PID 2400 wrote to memory of 3064 2400 {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe 35 PID 2400 wrote to memory of 3064 2400 {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe 35 PID 2400 wrote to memory of 3064 2400 {8092D12A-5F46-4e36-9438-C09424A89E1D}.exe 35 PID 2940 wrote to memory of 1712 2940 {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe 36 PID 2940 wrote to memory of 1712 2940 {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe 36 PID 2940 wrote to memory of 1712 2940 {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe 36 PID 2940 wrote to memory of 1712 2940 {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe 36 PID 2940 wrote to memory of 2608 2940 {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe 37 PID 2940 wrote to memory of 2608 2940 {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe 37 PID 2940 wrote to memory of 2608 2940 {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe 37 PID 2940 wrote to memory of 2608 2940 {7FD21884-B811-45bf-9370-CEA1E55F0105}.exe 37 PID 1712 wrote to memory of 2776 1712 {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe 38 PID 1712 wrote to memory of 2776 1712 {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe 38 PID 1712 wrote to memory of 2776 1712 {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe 38 PID 1712 wrote to memory of 2776 1712 {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe 38 PID 1712 wrote to memory of 268 1712 {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe 39 PID 1712 wrote to memory of 268 1712 {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe 39 PID 1712 wrote to memory of 268 1712 {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe 39 PID 1712 wrote to memory of 268 1712 {B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe 39 PID 2776 wrote to memory of 1584 2776 {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe 40 PID 2776 wrote to memory of 1584 2776 {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe 40 PID 2776 wrote to memory of 1584 2776 {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe 40 PID 2776 wrote to memory of 1584 2776 {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe 40 PID 2776 wrote to memory of 1652 2776 {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe 41 PID 2776 wrote to memory of 1652 2776 {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe 41 PID 2776 wrote to memory of 1652 2776 {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe 41 PID 2776 wrote to memory of 1652 2776 {1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe 41 PID 1584 wrote to memory of 2460 1584 {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe 42 PID 1584 wrote to memory of 2460 1584 {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe 42 PID 1584 wrote to memory of 2460 1584 {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe 42 PID 1584 wrote to memory of 2460 1584 {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe 42 PID 1584 wrote to memory of 1352 1584 {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe 43 PID 1584 wrote to memory of 1352 1584 {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe 43 PID 1584 wrote to memory of 1352 1584 {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe 43 PID 1584 wrote to memory of 1352 1584 {17EB31CA-169C-4581-9AFE-55DBB287D977}.exe 43 PID 2460 wrote to memory of 1480 2460 {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe 44 PID 2460 wrote to memory of 1480 2460 {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe 44 PID 2460 wrote to memory of 1480 2460 {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe 44 PID 2460 wrote to memory of 1480 2460 {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe 44 PID 2460 wrote to memory of 1176 2460 {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe 45 PID 2460 wrote to memory of 1176 2460 {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe 45 PID 2460 wrote to memory of 1176 2460 {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe 45 PID 2460 wrote to memory of 1176 2460 {5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_b8680a52977490ac4a1841252c0a2dc8_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\{30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exeC:\Windows\{30A5A150-65B6-4d14-9DCA-6A8E1FF5F633}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\{8092D12A-5F46-4e36-9438-C09424A89E1D}.exeC:\Windows\{8092D12A-5F46-4e36-9438-C09424A89E1D}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\{7FD21884-B811-45bf-9370-CEA1E55F0105}.exeC:\Windows\{7FD21884-B811-45bf-9370-CEA1E55F0105}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\{B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exeC:\Windows\{B16094BA-0DAF-4428-90C3-BCE7123C87E0}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\{1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exeC:\Windows\{1DEE586F-3AA5-44e8-80B1-022CBB8E5191}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\{17EB31CA-169C-4581-9AFE-55DBB287D977}.exeC:\Windows\{17EB31CA-169C-4581-9AFE-55DBB287D977}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\{5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exeC:\Windows\{5A7AD4B4-D652-46ec-B5D1-073C1A6AA23A}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\{2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109}.exeC:\Windows\{2652EF15-A0AA-49c2-8D2A-DA4EEFAF7109}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\{967EA5A1-2A32-4261-905F-BFBB103BD9D3}.exeC:\Windows\{967EA5A1-2A32-4261-905F-BFBB103BD9D3}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\{DBB7DF40-F0C8-4904-BB2B-5636186A3B7C}.exeC:\Windows\{DBB7DF40-F0C8-4904-BB2B-5636186A3B7C}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\{FC7AF1FE-3370-4058-A794-4DBAB80DB898}.exeC:\Windows\{FC7AF1FE-3370-4058-A794-4DBAB80DB898}.exe12⤵
- Executes dropped EXE
PID:2956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DBB7D~1.EXE > nul12⤵PID:2288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{967EA~1.EXE > nul11⤵PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2652E~1.EXE > nul10⤵PID:796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A7AD~1.EXE > nul9⤵PID:1176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{17EB3~1.EXE > nul8⤵PID:1352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1DEE5~1.EXE > nul7⤵PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1609~1.EXE > nul6⤵PID:268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7FD21~1.EXE > nul5⤵PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8092D~1.EXE > nul4⤵PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{30A5A~1.EXE > nul3⤵PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5b2dd144938e754718b6f1508981733a2
SHA1fb18906ec73f20f4d72ec0970c79127140da17a4
SHA25654f9a320757d2630316e3a95a0640e9e2b4f1ba65097820558ae3d8b8541ac0b
SHA51247aab0d9e874bd5c825bb020df66fd42e154a46b91242ccfb6dd693a29c05a871610f23822653b668dd66a53ca4f715c67c41b0fc1ed300f09be18a0440dc0f2
-
Filesize
216KB
MD5e4d3ddee20969f5ce5557311a7499548
SHA1b6460b57050d4497868c77977c2c36bbc76bc530
SHA25617955e5bcc2659efc8de807fb56606c4a4059f2a2c44e71ea17f021c9264c50b
SHA512624b8968c020a46ed9912c7e268b0fc2fb46cfc338bf315b9fe6798dbe972beb354bdfaa67f3099df3dcc9db26d645c3ed92b40e5ec6fc2c0a4ebc8f84773b71
-
Filesize
216KB
MD53d724c55d29dd630604934ce8e603bc4
SHA1e67ad521063707e667551301a6820000a2856cc8
SHA2564121780e378859fc46f15b09d9bd5ccf0c32dfadd206837fcab11f503b43bd3d
SHA512650de1724768f76456273147b39d5c2a4b26f5c6a9fb4f8edc8e36ad913cf2b980a0df131b4b043b55ed2dda6237b0fbab4c4d692781e0ceca3f05dd5410c0ec
-
Filesize
216KB
MD5368ff049ab9c6fdd9853dd272d13d21e
SHA1a3dbfe8aee2926554962b5b2592200871433d1d2
SHA256904a1963e40b4d323c1035ca5df19651dd5939d9351f7cc4c37d6cd212321c1b
SHA51234812b2ae321061b25ed7af46422c0b35959821b99742e93954a276610ab19c9c832ad68b93a1b57c3b04b41a028336c64f27b58bbed15c8c63cd8a7a12ddf83
-
Filesize
216KB
MD5486b07dd965c1f484a6b8c444c147c1b
SHA129ac62dfbb4159755f47232b23d3428132236699
SHA25605dd4054b464d70c5134cc590f20a778fb2057ad31e068df801fa74efa9de728
SHA512ddc0ca77d5afdc5966b2966e90650413c91f7fff1b7de1ca285543b7c74f01a035e25d358567c7f6df7ca9d4347b66870e8a08e367afb26671b738b1892ddb09
-
Filesize
216KB
MD5f0bec3cc1fe4013571b27f03f0cb2735
SHA13374c9c98ccc9cc5eefdcaed193142d5a8c3951b
SHA2563d61fea317dcd4a76ede2f3b95dfdf7355dae8c9afc5fc936fab44e4a8d829ae
SHA512684d179523db5290c6299bc6105ab484b3ec7402c89b220a7d3b92174c06eacf1455c631b645cf9cd48a47eebddefc42ba95f8c2db04668a03f809d5c1e6903c
-
Filesize
216KB
MD52d1ba78369a49d17b830fd9dd0f92248
SHA1b9d07151d883086b967e9697c2e58f4fb8c8aba3
SHA2561f4a21ad9e47e23933963b51517c6c454cb7b67790af1ed4241e7bdb413f89ed
SHA512aa1fd2f6e4835464dc8114a8b44d147f5ccced136b9a2b8b1f4b1ee59caf54c459722db63a1af571082c6f2d7a4407c6e9d13a7a8502b7bee000f8b7d01ef1e3
-
Filesize
216KB
MD5ee8c673428bcb75491b0ca4cbf2b0097
SHA133956bc2f235c1b4fe394c439cfdba3a23e1bc13
SHA256fa0e14a9b4fd84cca5c4ee19e7c3bab1aba6191206690c644e1052b8aeef9c75
SHA5122ab6f51bbe1dd6ab9ddeba35e8c94a602599e80a9dae46d6c5ed67bb0885bf199d1456975a92ae1e783e5c4387cd79a2e2074be5ecfb21da38d0db065e7171d7
-
Filesize
216KB
MD511781c01ff1de1c78b6fa5acb9acf984
SHA1def446d9300fc35d8f819c634a60380ffdeff76d
SHA2565fa1c16c1d305ac0797872e3d444b6cb42899bf43e52049b4a93df02fc11ab25
SHA51291b86c8700e9a4113bb5cf0077824cbde5bbeb3198476ed243eacbfc64ce3e957795e9ac7a3d31e41a6be6506bab8b3b1cbaee5e6092e1121aa0569c544a382c
-
Filesize
216KB
MD5ba74cdf1486d66266196f7817ab052e5
SHA1a11e36b40fe5fbcf9cb79a8cd65da57cabbd7410
SHA256f9aefbe35bd6ad382e05a5fa8562763fee9df678b952f0f5abb0ebb159e13099
SHA512800f381898edb9a668019fa4e9c1fdbab966443fa9511b4807815605caae69691e4a92570fd7db37190ba26732422fe2d3bd15cda6e0cb4c5f3164b5a4fa488c
-
Filesize
216KB
MD5bc565663a24ed37f872ade32373d9849
SHA1410adb760c25797355322fa28337760cc57fac1f
SHA256dc1d3716c7239002e160fd7bf9e50598d991a593cd123affafe066b94fe2cf23
SHA512c77d62228e01a8fd602eb39e4c2d1230a0c0149832d05e6ed0c0e72ae98e5b662c2c9d78e4a4696acd742c6818c91a00816db1d907bdddcb286303a1fee09895