Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe
-
Size
168KB
-
MD5
bf34fe5653620d819c36d8021645042f
-
SHA1
f9c76764c6de4d234ccd5c0a473640946e214b0f
-
SHA256
c9f4efee4e8425e0a6f6196c7cb3a1069dceb985dd9fa46009ccd31419380f6c
-
SHA512
7ac69d7bec02dfb6df0192c678148c038c709493736fec3f718beec4b0be7d3c3e253217ee71d64f87c7395109d87b9416cee96ac245b2818e786032d9a0dcac
-
SSDEEP
1536:1EGh0oQli5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oQliOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral2/files/0x00080000000233ca-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000233ba-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000233d2-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000001e790-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000233d2-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000001e790-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a0000000233d2-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000001e790-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b0000000233d2-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000600000001e790-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000233cf-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06490F41-D9F4-499b-88D4-CD25AC567E31}\stubpath = "C:\\Windows\\{06490F41-D9F4-499b-88D4-CD25AC567E31}.exe" {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FBB2294-7F2A-42b1-8EE7-0BE727530C44}\stubpath = "C:\\Windows\\{8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe" {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}\stubpath = "C:\\Windows\\{7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe" {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9604F947-9BD9-494a-AAC5-89EC49D0207A}\stubpath = "C:\\Windows\\{9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe" {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B2B7E813-B830-4830-98FF-303671539B5C} {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B2B7E813-B830-4830-98FF-303671539B5C}\stubpath = "C:\\Windows\\{B2B7E813-B830-4830-98FF-303671539B5C}.exe" {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{662F9D5F-1EAB-4719-AC17-8D8DF39205E0} {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06B11888-DDE3-499a-AE86-31C50BF67700}\stubpath = "C:\\Windows\\{06B11888-DDE3-499a-AE86-31C50BF67700}.exe" {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{676768EA-F725-44bd-A84C-C31AAFCA849D}\stubpath = "C:\\Windows\\{676768EA-F725-44bd-A84C-C31AAFCA849D}.exe" {06B11888-DDE3-499a-AE86-31C50BF67700}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FBB2294-7F2A-42b1-8EE7-0BE727530C44} {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{662F9D5F-1EAB-4719-AC17-8D8DF39205E0}\stubpath = "C:\\Windows\\{662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe" {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB} {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5123591D-6FE0-4b6c-8CA4-0190EF0B2511} 2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5123591D-6FE0-4b6c-8CA4-0190EF0B2511}\stubpath = "C:\\Windows\\{5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe" 2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C} {B2B7E813-B830-4830-98FF-303671539B5C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}\stubpath = "C:\\Windows\\{9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe" {B2B7E813-B830-4830-98FF-303671539B5C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06490F41-D9F4-499b-88D4-CD25AC567E31} {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B8B5FFC-9559-4b88-A2A2-D6F318363B57} {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06B11888-DDE3-499a-AE86-31C50BF67700} {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B8B5FFC-9559-4b88-A2A2-D6F318363B57}\stubpath = "C:\\Windows\\{9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe" {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9604F947-9BD9-494a-AAC5-89EC49D0207A} {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{676768EA-F725-44bd-A84C-C31AAFCA849D} {06B11888-DDE3-499a-AE86-31C50BF67700}.exe -
Executes dropped EXE 11 IoCs
pid Process 512 {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe 404 {B2B7E813-B830-4830-98FF-303671539B5C}.exe 4904 {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe 1948 {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe 1844 {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe 1860 {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe 3540 {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe 4912 {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe 4456 {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe 4868 {06B11888-DDE3-499a-AE86-31C50BF67700}.exe 3104 {676768EA-F725-44bd-A84C-C31AAFCA849D}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe File created C:\Windows\{7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe File created C:\Windows\{9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe File created C:\Windows\{9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe {B2B7E813-B830-4830-98FF-303671539B5C}.exe File created C:\Windows\{06490F41-D9F4-499b-88D4-CD25AC567E31}.exe {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe File created C:\Windows\{8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe File created C:\Windows\{06B11888-DDE3-499a-AE86-31C50BF67700}.exe {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe File created C:\Windows\{676768EA-F725-44bd-A84C-C31AAFCA849D}.exe {06B11888-DDE3-499a-AE86-31C50BF67700}.exe File created C:\Windows\{5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe 2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe File created C:\Windows\{B2B7E813-B830-4830-98FF-303671539B5C}.exe {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe File created C:\Windows\{9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3736 2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe Token: SeIncBasePriorityPrivilege 512 {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe Token: SeIncBasePriorityPrivilege 404 {B2B7E813-B830-4830-98FF-303671539B5C}.exe Token: SeIncBasePriorityPrivilege 4904 {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe Token: SeIncBasePriorityPrivilege 1948 {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe Token: SeIncBasePriorityPrivilege 1844 {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe Token: SeIncBasePriorityPrivilege 1860 {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe Token: SeIncBasePriorityPrivilege 3540 {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe Token: SeIncBasePriorityPrivilege 4912 {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe Token: SeIncBasePriorityPrivilege 4456 {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe Token: SeIncBasePriorityPrivilege 4868 {06B11888-DDE3-499a-AE86-31C50BF67700}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 512 3736 2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe 88 PID 3736 wrote to memory of 512 3736 2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe 88 PID 3736 wrote to memory of 512 3736 2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe 88 PID 3736 wrote to memory of 4296 3736 2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe 89 PID 3736 wrote to memory of 4296 3736 2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe 89 PID 3736 wrote to memory of 4296 3736 2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe 89 PID 512 wrote to memory of 404 512 {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe 90 PID 512 wrote to memory of 404 512 {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe 90 PID 512 wrote to memory of 404 512 {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe 90 PID 512 wrote to memory of 4992 512 {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe 91 PID 512 wrote to memory of 4992 512 {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe 91 PID 512 wrote to memory of 4992 512 {5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe 91 PID 404 wrote to memory of 4904 404 {B2B7E813-B830-4830-98FF-303671539B5C}.exe 94 PID 404 wrote to memory of 4904 404 {B2B7E813-B830-4830-98FF-303671539B5C}.exe 94 PID 404 wrote to memory of 4904 404 {B2B7E813-B830-4830-98FF-303671539B5C}.exe 94 PID 404 wrote to memory of 320 404 {B2B7E813-B830-4830-98FF-303671539B5C}.exe 95 PID 404 wrote to memory of 320 404 {B2B7E813-B830-4830-98FF-303671539B5C}.exe 95 PID 404 wrote to memory of 320 404 {B2B7E813-B830-4830-98FF-303671539B5C}.exe 95 PID 4904 wrote to memory of 1948 4904 {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe 97 PID 4904 wrote to memory of 1948 4904 {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe 97 PID 4904 wrote to memory of 1948 4904 {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe 97 PID 4904 wrote to memory of 3180 4904 {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe 98 PID 4904 wrote to memory of 3180 4904 {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe 98 PID 4904 wrote to memory of 3180 4904 {9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe 98 PID 1948 wrote to memory of 1844 1948 {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe 99 PID 1948 wrote to memory of 1844 1948 {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe 99 PID 1948 wrote to memory of 1844 1948 {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe 99 PID 1948 wrote to memory of 2816 1948 {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe 100 PID 1948 wrote to memory of 2816 1948 {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe 100 PID 1948 wrote to memory of 2816 1948 {06490F41-D9F4-499b-88D4-CD25AC567E31}.exe 100 PID 1844 wrote to memory of 1860 1844 {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe 101 PID 1844 wrote to memory of 1860 1844 {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe 101 PID 1844 wrote to memory of 1860 1844 {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe 101 PID 1844 wrote to memory of 3184 1844 {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe 102 PID 1844 wrote to memory of 3184 1844 {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe 102 PID 1844 wrote to memory of 3184 1844 {8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe 102 PID 1860 wrote to memory of 3540 1860 {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe 103 PID 1860 wrote to memory of 3540 1860 {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe 103 PID 1860 wrote to memory of 3540 1860 {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe 103 PID 1860 wrote to memory of 3804 1860 {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe 104 PID 1860 wrote to memory of 3804 1860 {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe 104 PID 1860 wrote to memory of 3804 1860 {662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe 104 PID 3540 wrote to memory of 4912 3540 {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe 105 PID 3540 wrote to memory of 4912 3540 {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe 105 PID 3540 wrote to memory of 4912 3540 {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe 105 PID 3540 wrote to memory of 1476 3540 {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe 106 PID 3540 wrote to memory of 1476 3540 {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe 106 PID 3540 wrote to memory of 1476 3540 {7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe 106 PID 4912 wrote to memory of 4456 4912 {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe 107 PID 4912 wrote to memory of 4456 4912 {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe 107 PID 4912 wrote to memory of 4456 4912 {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe 107 PID 4912 wrote to memory of 2492 4912 {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe 108 PID 4912 wrote to memory of 2492 4912 {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe 108 PID 4912 wrote to memory of 2492 4912 {9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe 108 PID 4456 wrote to memory of 4868 4456 {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe 109 PID 4456 wrote to memory of 4868 4456 {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe 109 PID 4456 wrote to memory of 4868 4456 {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe 109 PID 4456 wrote to memory of 4372 4456 {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe 110 PID 4456 wrote to memory of 4372 4456 {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe 110 PID 4456 wrote to memory of 4372 4456 {9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe 110 PID 4868 wrote to memory of 3104 4868 {06B11888-DDE3-499a-AE86-31C50BF67700}.exe 111 PID 4868 wrote to memory of 3104 4868 {06B11888-DDE3-499a-AE86-31C50BF67700}.exe 111 PID 4868 wrote to memory of 3104 4868 {06B11888-DDE3-499a-AE86-31C50BF67700}.exe 111 PID 4868 wrote to memory of 4768 4868 {06B11888-DDE3-499a-AE86-31C50BF67700}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-17_bf34fe5653620d819c36d8021645042f_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\{5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exeC:\Windows\{5123591D-6FE0-4b6c-8CA4-0190EF0B2511}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\{B2B7E813-B830-4830-98FF-303671539B5C}.exeC:\Windows\{B2B7E813-B830-4830-98FF-303671539B5C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\{9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exeC:\Windows\{9AF7EE16-BD7F-475a-BBBB-D48F74A5BC5C}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\{06490F41-D9F4-499b-88D4-CD25AC567E31}.exeC:\Windows\{06490F41-D9F4-499b-88D4-CD25AC567E31}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\{8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exeC:\Windows\{8FBB2294-7F2A-42b1-8EE7-0BE727530C44}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\{662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exeC:\Windows\{662F9D5F-1EAB-4719-AC17-8D8DF39205E0}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\{7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exeC:\Windows\{7C5D9EBF-83BF-4704-BFF3-A81A2BA48FCB}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\{9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exeC:\Windows\{9B8B5FFC-9559-4b88-A2A2-D6F318363B57}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\{9604F947-9BD9-494a-AAC5-89EC49D0207A}.exeC:\Windows\{9604F947-9BD9-494a-AAC5-89EC49D0207A}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\{06B11888-DDE3-499a-AE86-31C50BF67700}.exeC:\Windows\{06B11888-DDE3-499a-AE86-31C50BF67700}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\{676768EA-F725-44bd-A84C-C31AAFCA849D}.exeC:\Windows\{676768EA-F725-44bd-A84C-C31AAFCA849D}.exe12⤵
- Executes dropped EXE
PID:3104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06B11~1.EXE > nul12⤵PID:4768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9604F~1.EXE > nul11⤵PID:4372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9B8B5~1.EXE > nul10⤵PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C5D9~1.EXE > nul9⤵PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{662F9~1.EXE > nul8⤵PID:3804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8FBB2~1.EXE > nul7⤵PID:3184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06490~1.EXE > nul6⤵PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9AF7E~1.EXE > nul5⤵PID:3180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B2B7E~1.EXE > nul4⤵PID:320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{51235~1.EXE > nul3⤵PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD586cdd270d1d71baf2af85b8f9c50a69b
SHA1275725b2eae4212d533f3ad0c895b118a3c8b6bc
SHA2564e8493fe2e258aebc9d5abf9d3d1c1b6e4086a77a6fcd18a3e5926c507f57466
SHA512ff7a7ee75205b272c727f85d2a2e154e2855a95e4fedf5212d3bdda7a225795b481a65e237004d98982826de9667c017c1d5291ef645ea836e3968a2e13da163
-
Filesize
168KB
MD58d115c66f67ef1993f4acf017d1c75b2
SHA14aa7451814b0990710c2d9e20ba258558dcd82a3
SHA2567f6b01730331446eb6977d31b36cdf65ce02c012944f9be8f48903885775f484
SHA5123b154a7b154ef915b275ee547873494920c9b39d442d2d6507130a165f6ff1852e7e6e941f2869e4b4d2f00f606044d6b9c6fcd37b9af45a4e5969dbe089a3c9
-
Filesize
168KB
MD5bb8f703f993d29c38751e942ce29c570
SHA1370d04b5421b0a501b25ef77332b3dc7f34bcd0a
SHA2565ed7004bda6393018cc3630e80d986677cc491c52c4f1fbf7775249d6ad404f6
SHA51214a21c8e23303cb8fae3e691e97d4ce438fd59cea24edd8956452333edcd6ac1b157101338c8344921321203cff725a5c20c3926c061a9f157e373a16d3e120e
-
Filesize
168KB
MD56087766bb01799949629a4f0f34b2d74
SHA1e9b48038d1126fb163c60a9b8c3e380a9346f6fc
SHA256c72292d983f2463ebef64f8f243b97af362edc7ed3660f3cb718983a7fc10c73
SHA512222b4e223f84cb27de57d53cc6bb3d17725d5ea2c0303136fb42d263ec3642c310b2bd16137b96d24a70f0a987b45dbe52205e113df5d9fc1704462d16453c92
-
Filesize
168KB
MD58c64c2a7f64d94a1e6a522ae3a543d5e
SHA197de36d6a11619d5f8ff7e3e61e74d3c0541d875
SHA256bf690ea967b5490bacc87866667451d51bbe27eebfb4472f35369853d534dbc8
SHA5120a2f359713806b587bd0ed2f6f184b76af6ce9400e8d1da61ecb511f5f1ec911eb303b99a6b3143f376b289bd2d4290bf07519435c835efacabfa52ef91b57c6
-
Filesize
168KB
MD5e408c5da58b631ddc4584d36ee5cf6b3
SHA1271e8c57ca2eeca4013a8a49a6b7506b6543fcf9
SHA256861c0832d168d178e89a2ac0aae58d50abb526214852a19a25bcd4c9a868b9ef
SHA51285a79a3642b866632b70acab16c99c5380e0567aff3e41def1264dfb5d4b343b196cf21dbc55803673a92e5b08376981a022b34e2d54bf26d3e768ba0b675092
-
Filesize
168KB
MD5d29d11bb099b9aede471ba6fe6a29192
SHA1e45e226907346a44e0e0e9f3226043073a5c42f5
SHA256a741217d14991289d99b38ae0c6c489b02328fdefa0f0076282966b00f25e373
SHA512f89ab7534537b00e73da07b806d7dd5d73683354f922db85b39a7983cdb8e693305dcacddfcd8a33c8f27a7b8287eb85b578453dc356f9eec3bd76a7def2bdd4
-
Filesize
168KB
MD5ad4d632f0039a4c40c1f0ea8487f8fd6
SHA132aa4d0ad64856bad2337d51fed471baee55a3d3
SHA256569aeb38ce890edd42dfac3a760f61a8f86a7a45eeffdd71917833776441c9df
SHA51248fe70adf62b8a342d64151249911b29505c5f97cda75957789843c469d4b91aeeefd1022570fafbf3512b32d2963d79646fa41d5d4c58dff99644906ccd7a41
-
Filesize
168KB
MD5c3ec167ffa45e8dac967ca8e53bbb58d
SHA1d5a3bfcc45bcf54f7875e3794135b44abd705cc1
SHA2565a8818abdca5b6a85faa1373be1e0ca4c3c5023a8777eb8a584b7e84f434cdbe
SHA512d71b1a0f0cf21fcfd914cecb97c9c45be7d6756fd0564e574fa991548d4fdf345387fa25883667c6866e18a595ac9a4994e23b423996569487f91e688750254e
-
Filesize
168KB
MD5aa5e3ae10736e2139296561ebc9e270d
SHA1a37f627d1acb09f17f941ebd15441e264cdc72c9
SHA2561c72bda0b6c16107a591aaf9f130bf0ebad5c2aea4e8835697683b6901ec15de
SHA512038abb101eb694771bf721ad0cc65decd1e2170895fff100eea24bb639a48edc3d1a2f48dd9f4a94fb82d0e450c92946f2c3e01e1135b19473c1cb12b0ac36ac
-
Filesize
168KB
MD50c24f1a1de17ff8978200875f4779ea9
SHA176fa7aca89157c2e7d6c62a7e4192b08f56bf718
SHA256e3cad99cb75e8fa089b6740ab9436d5859ef20a6de17e143ffbe471a9bb10a26
SHA51295059de0c121bb9d963a88177a864a2463c3dcb6dc305f3fb1c632e5572180422a1a7436e95884a30ff29d37439057eb4f778bfdf65db2f396c43c2aa36558bf