Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe
-
Size
216KB
-
MD5
97a782d8b0a7402b28c7e618310a8ddc
-
SHA1
454ca0ba92c192145b9c7bdc12c9ecaf7163f089
-
SHA256
ff826b09fbc2df8659ddf31569675fcf7948253175110f0abbb6bca4f4bb4543
-
SHA512
3c6c60edd6b647c28e10ca601362177a6227d6a33de7607c3b9ecd429bdf128dfc8438440f6d9c4d77f0e4ef4f9ce83dc38901baded4893702d13c029745f5a9
-
SSDEEP
3072:jEGh0oxl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEG3lEeKcAEcGy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c000000012240-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000016cd7-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000300000000b1f2-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000b1f2-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000500000000b1f2-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000b1f2-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000700000000b1f2-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9F4125B8-31F9-4e93-B8C8-9485D1B498F2}\stubpath = "C:\\Windows\\{9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe" 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D87F2E21-BF90-4735-BC21-8FA519C2EFFD} {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D87F2E21-BF90-4735-BC21-8FA519C2EFFD}\stubpath = "C:\\Windows\\{D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe" {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC7883D1-D76D-4091-A508-FA0BBCB73652}\stubpath = "C:\\Windows\\{CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe" {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E28D3203-8296-42b9-B602-286772860395} {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1002196C-014B-49d9-8723-572E35DA31A3}\stubpath = "C:\\Windows\\{1002196C-014B-49d9-8723-572E35DA31A3}.exe" {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}\stubpath = "C:\\Windows\\{4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe" {1002196C-014B-49d9-8723-572E35DA31A3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D} {4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}\stubpath = "C:\\Windows\\{ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe" {4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59C8E642-5C12-4292-AE4F-045E6B2C4E21} {ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9F4125B8-31F9-4e93-B8C8-9485D1B498F2} 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC7883D1-D76D-4091-A508-FA0BBCB73652} {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D0355316-283D-49e2-915C-ED47CC63BDA1}\stubpath = "C:\\Windows\\{D0355316-283D-49e2-915C-ED47CC63BDA1}.exe" {E28D3203-8296-42b9-B602-286772860395}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{43F0D561-DF03-4bb5-998F-24A2DD138545} {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}\stubpath = "C:\\Windows\\{09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe" {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E28D3203-8296-42b9-B602-286772860395}\stubpath = "C:\\Windows\\{E28D3203-8296-42b9-B602-286772860395}.exe" {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D0355316-283D-49e2-915C-ED47CC63BDA1} {E28D3203-8296-42b9-B602-286772860395}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1002196C-014B-49d9-8723-572E35DA31A3} {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8} {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{43F0D561-DF03-4bb5-998F-24A2DD138545}\stubpath = "C:\\Windows\\{43F0D561-DF03-4bb5-998F-24A2DD138545}.exe" {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4E5CF75B-37F4-4215-BFF4-6FC8759A83EA} {1002196C-014B-49d9-8723-572E35DA31A3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59C8E642-5C12-4292-AE4F-045E6B2C4E21}\stubpath = "C:\\Windows\\{59C8E642-5C12-4292-AE4F-045E6B2C4E21}.exe" {ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe -
Deletes itself 1 IoCs
pid Process 1976 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2780 {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe 2504 {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe 2364 {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe 2336 {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe 1488 {E28D3203-8296-42b9-B602-286772860395}.exe 2736 {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe 2104 {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe 2632 {1002196C-014B-49d9-8723-572E35DA31A3}.exe 1360 {4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe 2228 {ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe 2256 {59C8E642-5C12-4292-AE4F-045E6B2C4E21}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{D0355316-283D-49e2-915C-ED47CC63BDA1}.exe {E28D3203-8296-42b9-B602-286772860395}.exe File created C:\Windows\{43F0D561-DF03-4bb5-998F-24A2DD138545}.exe {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe File created C:\Windows\{ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe {4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe File created C:\Windows\{9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe File created C:\Windows\{D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe File created C:\Windows\{09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe File created C:\Windows\{E28D3203-8296-42b9-B602-286772860395}.exe {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe File created C:\Windows\{CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe File created C:\Windows\{1002196C-014B-49d9-8723-572E35DA31A3}.exe {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe File created C:\Windows\{4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe {1002196C-014B-49d9-8723-572E35DA31A3}.exe File created C:\Windows\{59C8E642-5C12-4292-AE4F-045E6B2C4E21}.exe {ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2844 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe Token: SeIncBasePriorityPrivilege 2780 {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe Token: SeIncBasePriorityPrivilege 2504 {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe Token: SeIncBasePriorityPrivilege 2364 {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe Token: SeIncBasePriorityPrivilege 2336 {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe Token: SeIncBasePriorityPrivilege 1488 {E28D3203-8296-42b9-B602-286772860395}.exe Token: SeIncBasePriorityPrivilege 2736 {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe Token: SeIncBasePriorityPrivilege 2104 {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe Token: SeIncBasePriorityPrivilege 2632 {1002196C-014B-49d9-8723-572E35DA31A3}.exe Token: SeIncBasePriorityPrivilege 1360 {4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe Token: SeIncBasePriorityPrivilege 2228 {ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2780 2844 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe 28 PID 2844 wrote to memory of 2780 2844 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe 28 PID 2844 wrote to memory of 2780 2844 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe 28 PID 2844 wrote to memory of 2780 2844 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe 28 PID 2844 wrote to memory of 1976 2844 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe 29 PID 2844 wrote to memory of 1976 2844 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe 29 PID 2844 wrote to memory of 1976 2844 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe 29 PID 2844 wrote to memory of 1976 2844 2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe 29 PID 2780 wrote to memory of 2504 2780 {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe 30 PID 2780 wrote to memory of 2504 2780 {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe 30 PID 2780 wrote to memory of 2504 2780 {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe 30 PID 2780 wrote to memory of 2504 2780 {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe 30 PID 2780 wrote to memory of 2608 2780 {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe 31 PID 2780 wrote to memory of 2608 2780 {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe 31 PID 2780 wrote to memory of 2608 2780 {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe 31 PID 2780 wrote to memory of 2608 2780 {9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe 31 PID 2504 wrote to memory of 2364 2504 {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe 34 PID 2504 wrote to memory of 2364 2504 {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe 34 PID 2504 wrote to memory of 2364 2504 {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe 34 PID 2504 wrote to memory of 2364 2504 {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe 34 PID 2504 wrote to memory of 2424 2504 {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe 35 PID 2504 wrote to memory of 2424 2504 {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe 35 PID 2504 wrote to memory of 2424 2504 {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe 35 PID 2504 wrote to memory of 2424 2504 {D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe 35 PID 2364 wrote to memory of 2336 2364 {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe 36 PID 2364 wrote to memory of 2336 2364 {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe 36 PID 2364 wrote to memory of 2336 2364 {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe 36 PID 2364 wrote to memory of 2336 2364 {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe 36 PID 2364 wrote to memory of 1524 2364 {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe 37 PID 2364 wrote to memory of 1524 2364 {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe 37 PID 2364 wrote to memory of 1524 2364 {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe 37 PID 2364 wrote to memory of 1524 2364 {CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe 37 PID 2336 wrote to memory of 1488 2336 {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe 38 PID 2336 wrote to memory of 1488 2336 {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe 38 PID 2336 wrote to memory of 1488 2336 {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe 38 PID 2336 wrote to memory of 1488 2336 {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe 38 PID 2336 wrote to memory of 2660 2336 {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe 39 PID 2336 wrote to memory of 2660 2336 {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe 39 PID 2336 wrote to memory of 2660 2336 {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe 39 PID 2336 wrote to memory of 2660 2336 {09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe 39 PID 1488 wrote to memory of 2736 1488 {E28D3203-8296-42b9-B602-286772860395}.exe 40 PID 1488 wrote to memory of 2736 1488 {E28D3203-8296-42b9-B602-286772860395}.exe 40 PID 1488 wrote to memory of 2736 1488 {E28D3203-8296-42b9-B602-286772860395}.exe 40 PID 1488 wrote to memory of 2736 1488 {E28D3203-8296-42b9-B602-286772860395}.exe 40 PID 1488 wrote to memory of 2420 1488 {E28D3203-8296-42b9-B602-286772860395}.exe 41 PID 1488 wrote to memory of 2420 1488 {E28D3203-8296-42b9-B602-286772860395}.exe 41 PID 1488 wrote to memory of 2420 1488 {E28D3203-8296-42b9-B602-286772860395}.exe 41 PID 1488 wrote to memory of 2420 1488 {E28D3203-8296-42b9-B602-286772860395}.exe 41 PID 2736 wrote to memory of 2104 2736 {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe 42 PID 2736 wrote to memory of 2104 2736 {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe 42 PID 2736 wrote to memory of 2104 2736 {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe 42 PID 2736 wrote to memory of 2104 2736 {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe 42 PID 2736 wrote to memory of 1344 2736 {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe 43 PID 2736 wrote to memory of 1344 2736 {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe 43 PID 2736 wrote to memory of 1344 2736 {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe 43 PID 2736 wrote to memory of 1344 2736 {D0355316-283D-49e2-915C-ED47CC63BDA1}.exe 43 PID 2104 wrote to memory of 2632 2104 {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe 44 PID 2104 wrote to memory of 2632 2104 {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe 44 PID 2104 wrote to memory of 2632 2104 {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe 44 PID 2104 wrote to memory of 2632 2104 {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe 44 PID 2104 wrote to memory of 1728 2104 {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe 45 PID 2104 wrote to memory of 1728 2104 {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe 45 PID 2104 wrote to memory of 1728 2104 {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe 45 PID 2104 wrote to memory of 1728 2104 {43F0D561-DF03-4bb5-998F-24A2DD138545}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\{9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exeC:\Windows\{9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exeC:\Windows\{D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\{CC7883D1-D76D-4091-A508-FA0BBCB73652}.exeC:\Windows\{CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\{09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exeC:\Windows\{09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\{E28D3203-8296-42b9-B602-286772860395}.exeC:\Windows\{E28D3203-8296-42b9-B602-286772860395}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\{D0355316-283D-49e2-915C-ED47CC63BDA1}.exeC:\Windows\{D0355316-283D-49e2-915C-ED47CC63BDA1}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{43F0D561-DF03-4bb5-998F-24A2DD138545}.exeC:\Windows\{43F0D561-DF03-4bb5-998F-24A2DD138545}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\{1002196C-014B-49d9-8723-572E35DA31A3}.exeC:\Windows\{1002196C-014B-49d9-8723-572E35DA31A3}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2632 -
C:\Windows\{4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exeC:\Windows\{4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1360 -
C:\Windows\{ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exeC:\Windows\{ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\{59C8E642-5C12-4292-AE4F-045E6B2C4E21}.exeC:\Windows\{59C8E642-5C12-4292-AE4F-045E6B2C4E21}.exe12⤵
- Executes dropped EXE
PID:2256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ACCE3~1.EXE > nul12⤵PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4E5CF~1.EXE > nul11⤵PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{10021~1.EXE > nul10⤵PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{43F0D~1.EXE > nul9⤵PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D0355~1.EXE > nul8⤵PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E28D3~1.EXE > nul7⤵PID:2420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{09A52~1.EXE > nul6⤵PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CC788~1.EXE > nul5⤵PID:1524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D87F2~1.EXE > nul4⤵PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9F412~1.EXE > nul3⤵PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD56b5baaebb953824c74c366dc3b24047f
SHA16ef2cb916a6b0ca4d464db45717afb96b36fb2a1
SHA256ee4f6df86f2b794697b203eda5f1bb28751ad25553d99eb3bc150cb2469c2c5d
SHA512be5f1ed125c2ee98848eecf3ab447d9ca05f90cc0b8173930b647177eb4daa76f3304021895329fd14dca34dfc385687269e611230a43b96cb0631f040baa907
-
Filesize
216KB
MD5e3a6bd7924161921f0c977848ec3bb18
SHA1bce67a2c35c304c83e3d02aca30d6f4bedf0b41f
SHA256a1fa8b0a79c3b917c6d3a3a2b53a3d01c46a4737f0cbf5604d7a3dbe85c54dff
SHA5128598db13fa1dd3909429d2fade3807c38f14813090d22b262d105011e10fcea58882d4a81143c5b966346cc567aa52fd040398a2a806e20d03f13caf569093f8
-
Filesize
216KB
MD5e4dea4d8915ca86a0f8bfa8fcc4cfad4
SHA14a0d223256c011eb7497d347c54daf9c81d05212
SHA256afa211a801e8102efc4dac893b3cdad52216a717092682e66f44de770ce14ebe
SHA512f6eb2454498ac7a11fb43f90e1b7b3170f4732382b2accb05a36213df223a637480755ee7145df20354ff9c6c67dd899161fb0c25c36c0aa04d8e55aabdae038
-
Filesize
216KB
MD59a031c8832df78e4bf468007128e3bb2
SHA1762823a74a9d32b04ebc511ab7a9d4b725cd8b01
SHA2565290801e16b9907151018a7c12594cff8788fc5dbceb9a85a4ac6a262de37e98
SHA51210af691e634690d1cb828f4e1ba5036e102b3e2bb2e34b547499326d59d70083c90fa2b771c855f7311b68b19cd255baac81242591a5c9a7aa196d65e8d5c70f
-
Filesize
216KB
MD53b4a7f0c4e84d3646e101199c85be96c
SHA1cfe80773f48c7651ee8e5fde9402f8c4c2387d67
SHA256efe27a3f995e8bd4c72616f30e1e5b84825c0c42e585a496fc78f441dc01f035
SHA5127b501f3e0a6e1b40483f222869fdc819db526e60a7b8e98f64337cc84f3a7db79f4a4b98e3339209f844aa41d8549bf6f5e0153df16dc1c7eb20a0a6b4a530d0
-
Filesize
216KB
MD5d6b01aec91969fae44720303d9a95ef7
SHA1deb4c26ef5e83e16d12fed6d56d67652c80d325f
SHA256ca38985f1068b69bc343028e17cf8308f5b2bc710e5cd8968c5388788c1fc3e4
SHA512f56a53bfd367a4530783095e1842d479e801b4f3adfa144cbfc17c89bf5a57a57d5b6a8008401d096a06a6eb4a158cbd7640819841f12892c089ce9b9baa2fa4
-
Filesize
216KB
MD5c68d9ac4f8a088b719334dcfbcde7c63
SHA1b5bf8c6fcd978fee071b03021d8d3f7d6d63b03b
SHA25634386f5621fd9f3c919bd55759e0f3422296697cc829e59636a8ab3bf32c2eb7
SHA512be786505aefdfc950de25f9c51e501b30f4b67bae67da14945b2b817200fa7079a4276a477b5a32f1993c4a17e721fd3a31ab17ec4911ba83460bf79b0286a0e
-
Filesize
216KB
MD5b9ada6c37079cb9bc2839e07acce5526
SHA116776f72c9350dd6f28d3a101a7f9840e50aaf3c
SHA256a1f8b783d217b87fb0ef9543eac25fbc001672a897ad453f3808f61e93789e41
SHA512297d92376d881347a56026107ba70ee336d09dbbcd152bfe0b58a7179958b27a24d55903105c257ae76671d13e13c351863592b216e2f638c5085a78b691d56e
-
Filesize
216KB
MD516e43bc5b47377c8422f0361ae480535
SHA1064eb085f28a1f3ca450b34ca5d13e164bc1da81
SHA25677aae83b487a443c218f0ded8ce76a8159969f2069c76cf3c03574050d588994
SHA5126f1380bb1cfcd3066d53812b1f81afa89b8fa6f4668fc84282ffa918871646f6c2c777fba4c6de063d1923c283282a637110fbf98bb586c31378580650bb4dcd
-
Filesize
216KB
MD51fc935b6078052d51a689a04c464effe
SHA1ea536badbea8a9bd28920c0ca83d8204d1c50473
SHA256d8454747276b845bda0160d8844854308bfcc776e273578051b50f332317437f
SHA512095f13999dee486ef5d76a5ece91e72e231493421076924c1d72b7d5a0ad2d0eca488921c422c7a45957109aed2f03f0954897c4a150a44cd79b85a51d5a2411
-
Filesize
216KB
MD5852a9b6fe96f1cc0d6d85f17d0fad455
SHA1e76cf95ea36d62772a7f7afa91c3a0f16a70fc7f
SHA256374cee1da738488d0d74d93e193dd1d68fbda909c2a907629d33ac177586d473
SHA5123acecf4ea7047308dbebeee839999c3b6f427d6dfcd67be77a1bee1f0507940cdec062cb06c199209073d2646ee2dd2dc0c2340e60d3180afe6e20bb74217f58