Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe
-
Size
197KB
-
MD5
19ff94abde1f2f976ede0fb076ba666d
-
SHA1
30d997c7010e392248833444410a3680f8a80b71
-
SHA256
1ee7387805bdfdb6d145033d4c5df25235eb204f81699ff69613b840922f8c52
-
SHA512
2890da9ceddbc6528107eb161f876cfaed015e1e1084320d4e4254cc5cc02559927e252d5494db366e61f155e6f8965415bb074c5bc43814809a4202eca87865
-
SSDEEP
3072:jEGh0orl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEG5lEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral1/files/0x000c0000000122ac-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000300000000b1f2-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000b1f2-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000500000000b1f2-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000b1f2-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000700000000b1f2-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000800000000b1f2-82.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9615AB74-9258-4921-BE87-94D61C975FB4} 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}\stubpath = "C:\\Windows\\{8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe" {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F51AB4E0-06AC-4a5e-8494-8968DF5E9454} {8E110445-950F-4206-876D-7F72012C4371}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C98D13B5-4318-4ac0-A28A-F3DC7E22E362}\stubpath = "C:\\Windows\\{C98D13B5-4318-4ac0-A28A-F3DC7E22E362}.exe" {10C2C68F-BC58-4b55-BAFE-AE0209B7E554}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{740B7DD7-7383-4c77-86B5-023D0ED182E8}\stubpath = "C:\\Windows\\{740B7DD7-7383-4c77-86B5-023D0ED182E8}.exe" {C98D13B5-4318-4ac0-A28A-F3DC7E22E362}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9615AB74-9258-4921-BE87-94D61C975FB4}\stubpath = "C:\\Windows\\{9615AB74-9258-4921-BE87-94D61C975FB4}.exe" 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4F6F3536-FC5B-404a-83F9-0E179A62F2EB}\stubpath = "C:\\Windows\\{4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe" {9615AB74-9258-4921-BE87-94D61C975FB4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE} {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84455BA4-9931-43ef-8DDE-48B00CBA1838}\stubpath = "C:\\Windows\\{84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe" {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E110445-950F-4206-876D-7F72012C4371}\stubpath = "C:\\Windows\\{8E110445-950F-4206-876D-7F72012C4371}.exe" {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FFE8DE68-BEA7-4046-8E74-6177C9EF7023}\stubpath = "C:\\Windows\\{FFE8DE68-BEA7-4046-8E74-6177C9EF7023}.exe" {740B7DD7-7383-4c77-86B5-023D0ED182E8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84455BA4-9931-43ef-8DDE-48B00CBA1838} {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E110445-950F-4206-876D-7F72012C4371} {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F51AB4E0-06AC-4a5e-8494-8968DF5E9454}\stubpath = "C:\\Windows\\{F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe" {8E110445-950F-4206-876D-7F72012C4371}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{24293A5C-D7F1-4048-BB28-CD8270434699} {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{61F7F39E-063D-4562-9282-BCC587B111B5}\stubpath = "C:\\Windows\\{61F7F39E-063D-4562-9282-BCC587B111B5}.exe" {24293A5C-D7F1-4048-BB28-CD8270434699}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10C2C68F-BC58-4b55-BAFE-AE0209B7E554} {61F7F39E-063D-4562-9282-BCC587B111B5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10C2C68F-BC58-4b55-BAFE-AE0209B7E554}\stubpath = "C:\\Windows\\{10C2C68F-BC58-4b55-BAFE-AE0209B7E554}.exe" {61F7F39E-063D-4562-9282-BCC587B111B5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4F6F3536-FC5B-404a-83F9-0E179A62F2EB} {9615AB74-9258-4921-BE87-94D61C975FB4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{24293A5C-D7F1-4048-BB28-CD8270434699}\stubpath = "C:\\Windows\\{24293A5C-D7F1-4048-BB28-CD8270434699}.exe" {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{61F7F39E-063D-4562-9282-BCC587B111B5} {24293A5C-D7F1-4048-BB28-CD8270434699}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C98D13B5-4318-4ac0-A28A-F3DC7E22E362} {10C2C68F-BC58-4b55-BAFE-AE0209B7E554}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{740B7DD7-7383-4c77-86B5-023D0ED182E8} {C98D13B5-4318-4ac0-A28A-F3DC7E22E362}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FFE8DE68-BEA7-4046-8E74-6177C9EF7023} {740B7DD7-7383-4c77-86B5-023D0ED182E8}.exe -
Deletes itself 1 IoCs
pid Process 2856 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2620 {9615AB74-9258-4921-BE87-94D61C975FB4}.exe 2540 {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe 1292 {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe 2792 {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe 3012 {8E110445-950F-4206-876D-7F72012C4371}.exe 1996 {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe 2500 {24293A5C-D7F1-4048-BB28-CD8270434699}.exe 1608 {61F7F39E-063D-4562-9282-BCC587B111B5}.exe 1384 {10C2C68F-BC58-4b55-BAFE-AE0209B7E554}.exe 2092 {C98D13B5-4318-4ac0-A28A-F3DC7E22E362}.exe 2264 {740B7DD7-7383-4c77-86B5-023D0ED182E8}.exe 436 {FFE8DE68-BEA7-4046-8E74-6177C9EF7023}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe File created C:\Windows\{84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe File created C:\Windows\{F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe {8E110445-950F-4206-876D-7F72012C4371}.exe File created C:\Windows\{24293A5C-D7F1-4048-BB28-CD8270434699}.exe {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe File created C:\Windows\{61F7F39E-063D-4562-9282-BCC587B111B5}.exe {24293A5C-D7F1-4048-BB28-CD8270434699}.exe File created C:\Windows\{10C2C68F-BC58-4b55-BAFE-AE0209B7E554}.exe {61F7F39E-063D-4562-9282-BCC587B111B5}.exe File created C:\Windows\{C98D13B5-4318-4ac0-A28A-F3DC7E22E362}.exe {10C2C68F-BC58-4b55-BAFE-AE0209B7E554}.exe File created C:\Windows\{4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe {9615AB74-9258-4921-BE87-94D61C975FB4}.exe File created C:\Windows\{740B7DD7-7383-4c77-86B5-023D0ED182E8}.exe {C98D13B5-4318-4ac0-A28A-F3DC7E22E362}.exe File created C:\Windows\{8E110445-950F-4206-876D-7F72012C4371}.exe {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe File created C:\Windows\{FFE8DE68-BEA7-4046-8E74-6177C9EF7023}.exe {740B7DD7-7383-4c77-86B5-023D0ED182E8}.exe File created C:\Windows\{9615AB74-9258-4921-BE87-94D61C975FB4}.exe 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3048 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe Token: SeIncBasePriorityPrivilege 2620 {9615AB74-9258-4921-BE87-94D61C975FB4}.exe Token: SeIncBasePriorityPrivilege 2540 {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe Token: SeIncBasePriorityPrivilege 1292 {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe Token: SeIncBasePriorityPrivilege 2792 {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe Token: SeIncBasePriorityPrivilege 3012 {8E110445-950F-4206-876D-7F72012C4371}.exe Token: SeIncBasePriorityPrivilege 1996 {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe Token: SeIncBasePriorityPrivilege 2500 {24293A5C-D7F1-4048-BB28-CD8270434699}.exe Token: SeIncBasePriorityPrivilege 1608 {61F7F39E-063D-4562-9282-BCC587B111B5}.exe Token: SeIncBasePriorityPrivilege 1384 {10C2C68F-BC58-4b55-BAFE-AE0209B7E554}.exe Token: SeIncBasePriorityPrivilege 2092 {C98D13B5-4318-4ac0-A28A-F3DC7E22E362}.exe Token: SeIncBasePriorityPrivilege 2264 {740B7DD7-7383-4c77-86B5-023D0ED182E8}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2620 3048 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe 27 PID 3048 wrote to memory of 2620 3048 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe 27 PID 3048 wrote to memory of 2620 3048 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe 27 PID 3048 wrote to memory of 2620 3048 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe 27 PID 3048 wrote to memory of 2856 3048 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe 28 PID 3048 wrote to memory of 2856 3048 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe 28 PID 3048 wrote to memory of 2856 3048 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe 28 PID 3048 wrote to memory of 2856 3048 2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe 28 PID 2620 wrote to memory of 2540 2620 {9615AB74-9258-4921-BE87-94D61C975FB4}.exe 31 PID 2620 wrote to memory of 2540 2620 {9615AB74-9258-4921-BE87-94D61C975FB4}.exe 31 PID 2620 wrote to memory of 2540 2620 {9615AB74-9258-4921-BE87-94D61C975FB4}.exe 31 PID 2620 wrote to memory of 2540 2620 {9615AB74-9258-4921-BE87-94D61C975FB4}.exe 31 PID 2620 wrote to memory of 2444 2620 {9615AB74-9258-4921-BE87-94D61C975FB4}.exe 32 PID 2620 wrote to memory of 2444 2620 {9615AB74-9258-4921-BE87-94D61C975FB4}.exe 32 PID 2620 wrote to memory of 2444 2620 {9615AB74-9258-4921-BE87-94D61C975FB4}.exe 32 PID 2620 wrote to memory of 2444 2620 {9615AB74-9258-4921-BE87-94D61C975FB4}.exe 32 PID 2540 wrote to memory of 1292 2540 {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe 33 PID 2540 wrote to memory of 1292 2540 {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe 33 PID 2540 wrote to memory of 1292 2540 {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe 33 PID 2540 wrote to memory of 1292 2540 {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe 33 PID 2540 wrote to memory of 2416 2540 {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe 34 PID 2540 wrote to memory of 2416 2540 {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe 34 PID 2540 wrote to memory of 2416 2540 {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe 34 PID 2540 wrote to memory of 2416 2540 {4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe 34 PID 1292 wrote to memory of 2792 1292 {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe 35 PID 1292 wrote to memory of 2792 1292 {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe 35 PID 1292 wrote to memory of 2792 1292 {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe 35 PID 1292 wrote to memory of 2792 1292 {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe 35 PID 1292 wrote to memory of 2780 1292 {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe 36 PID 1292 wrote to memory of 2780 1292 {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe 36 PID 1292 wrote to memory of 2780 1292 {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe 36 PID 1292 wrote to memory of 2780 1292 {8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe 36 PID 2792 wrote to memory of 3012 2792 {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe 37 PID 2792 wrote to memory of 3012 2792 {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe 37 PID 2792 wrote to memory of 3012 2792 {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe 37 PID 2792 wrote to memory of 3012 2792 {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe 37 PID 2792 wrote to memory of 2216 2792 {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe 38 PID 2792 wrote to memory of 2216 2792 {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe 38 PID 2792 wrote to memory of 2216 2792 {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe 38 PID 2792 wrote to memory of 2216 2792 {84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe 38 PID 3012 wrote to memory of 1996 3012 {8E110445-950F-4206-876D-7F72012C4371}.exe 39 PID 3012 wrote to memory of 1996 3012 {8E110445-950F-4206-876D-7F72012C4371}.exe 39 PID 3012 wrote to memory of 1996 3012 {8E110445-950F-4206-876D-7F72012C4371}.exe 39 PID 3012 wrote to memory of 1996 3012 {8E110445-950F-4206-876D-7F72012C4371}.exe 39 PID 3012 wrote to memory of 1656 3012 {8E110445-950F-4206-876D-7F72012C4371}.exe 40 PID 3012 wrote to memory of 1656 3012 {8E110445-950F-4206-876D-7F72012C4371}.exe 40 PID 3012 wrote to memory of 1656 3012 {8E110445-950F-4206-876D-7F72012C4371}.exe 40 PID 3012 wrote to memory of 1656 3012 {8E110445-950F-4206-876D-7F72012C4371}.exe 40 PID 1996 wrote to memory of 2500 1996 {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe 41 PID 1996 wrote to memory of 2500 1996 {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe 41 PID 1996 wrote to memory of 2500 1996 {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe 41 PID 1996 wrote to memory of 2500 1996 {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe 41 PID 1996 wrote to memory of 1388 1996 {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe 42 PID 1996 wrote to memory of 1388 1996 {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe 42 PID 1996 wrote to memory of 1388 1996 {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe 42 PID 1996 wrote to memory of 1388 1996 {F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe 42 PID 2500 wrote to memory of 1608 2500 {24293A5C-D7F1-4048-BB28-CD8270434699}.exe 43 PID 2500 wrote to memory of 1608 2500 {24293A5C-D7F1-4048-BB28-CD8270434699}.exe 43 PID 2500 wrote to memory of 1608 2500 {24293A5C-D7F1-4048-BB28-CD8270434699}.exe 43 PID 2500 wrote to memory of 1608 2500 {24293A5C-D7F1-4048-BB28-CD8270434699}.exe 43 PID 2500 wrote to memory of 1540 2500 {24293A5C-D7F1-4048-BB28-CD8270434699}.exe 44 PID 2500 wrote to memory of 1540 2500 {24293A5C-D7F1-4048-BB28-CD8270434699}.exe 44 PID 2500 wrote to memory of 1540 2500 {24293A5C-D7F1-4048-BB28-CD8270434699}.exe 44 PID 2500 wrote to memory of 1540 2500 {24293A5C-D7F1-4048-BB28-CD8270434699}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\{9615AB74-9258-4921-BE87-94D61C975FB4}.exeC:\Windows\{9615AB74-9258-4921-BE87-94D61C975FB4}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\{4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exeC:\Windows\{4F6F3536-FC5B-404a-83F9-0E179A62F2EB}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\{8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exeC:\Windows\{8C8FED8F-88CA-4f93-B215-A7A8EE2C9CFE}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\{84455BA4-9931-43ef-8DDE-48B00CBA1838}.exeC:\Windows\{84455BA4-9931-43ef-8DDE-48B00CBA1838}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\{8E110445-950F-4206-876D-7F72012C4371}.exeC:\Windows\{8E110445-950F-4206-876D-7F72012C4371}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\{F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exeC:\Windows\{F51AB4E0-06AC-4a5e-8494-8968DF5E9454}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\{24293A5C-D7F1-4048-BB28-CD8270434699}.exeC:\Windows\{24293A5C-D7F1-4048-BB28-CD8270434699}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\{61F7F39E-063D-4562-9282-BCC587B111B5}.exeC:\Windows\{61F7F39E-063D-4562-9282-BCC587B111B5}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1608 -
C:\Windows\{10C2C68F-BC58-4b55-BAFE-AE0209B7E554}.exeC:\Windows\{10C2C68F-BC58-4b55-BAFE-AE0209B7E554}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1384 -
C:\Windows\{C98D13B5-4318-4ac0-A28A-F3DC7E22E362}.exeC:\Windows\{C98D13B5-4318-4ac0-A28A-F3DC7E22E362}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\{740B7DD7-7383-4c77-86B5-023D0ED182E8}.exeC:\Windows\{740B7DD7-7383-4c77-86B5-023D0ED182E8}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Windows\{FFE8DE68-BEA7-4046-8E74-6177C9EF7023}.exeC:\Windows\{FFE8DE68-BEA7-4046-8E74-6177C9EF7023}.exe13⤵
- Executes dropped EXE
PID:436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{740B7~1.EXE > nul13⤵PID:1520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C98D1~1.EXE > nul12⤵PID:592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{10C2C~1.EXE > nul11⤵PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{61F7F~1.EXE > nul10⤵PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{24293~1.EXE > nul9⤵PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F51AB~1.EXE > nul8⤵PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E110~1.EXE > nul7⤵PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{84455~1.EXE > nul6⤵PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C8FE~1.EXE > nul5⤵PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4F6F3~1.EXE > nul4⤵PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9615A~1.EXE > nul3⤵PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD510f54c98fb08c7107ce393d81c814f5e
SHA11ab1f5f899644d20cd8d92e0b864077dedf144f5
SHA256f69aef79d2f0d1568d78194c008e5558aa45b6c0a766eba7a63d5f307b689cb3
SHA512d0e6e4adc6a84fde0d478bd6951468c0da7937bf845f65f407f125f80418535496b9b17f4946752df8abfff5b17ee2478f0b48ae28b514180dc1723bc3f42a30
-
Filesize
197KB
MD5edfb1275e01400b3706be6246f3c5865
SHA1f575bc6c6b2d56e79ed845f8e97e366816ed23eb
SHA2565a9f9a0db996f023481380998f63724bf63bb490b026700ef55e8c0ed95189bd
SHA5122799143073f7033181a5a69b9b884d74b74e36b05c33cf170d72f9ddc62f4ef49fcdfa520c3ae1426ace71b870a7074267b860555cb3572609e35babb72572b6
-
Filesize
197KB
MD5c3db96df45196a40c294ce2a7bd9807a
SHA142fc6d42daf5935c655fb1255d1ed43830eedae5
SHA256c4d28dc8b184c5727a31509ba243ee717c884c5728db61d0dec4ba6c02cf6f55
SHA512993af84a4370c4ed6bb4df522ae9feda469a748f242f8177df5ae1d9684e9dc57f64d8936482ffb0f015af271bbc98de56a7ffc74b2da7d01ce1cd8680aed5a1
-
Filesize
197KB
MD58a2f3a47a649addf80e67c27f5ea921b
SHA17c5334d7c0932afff329dae4f54e6d08d7496ee6
SHA256cf1d8538a6427b4ab1be9ea38fba9908ae4d8316150eb0283eb23f6965298fac
SHA5121c52b4804b8b023a998bfe335f91cb5c6ee60e8bf3680f565458415443fc48743c458eb0340b1efa3b922bd36c65368fb8f5688179e01e8223a7e30517f1d67d
-
Filesize
197KB
MD5079a6f64e23570ae17d6804eab4a6fe4
SHA1456cb6a48bcdc32f9f5302e900d1531289ee443b
SHA256eedc68ece9501088b4dd62f4697824dbddd6188204a9487cbcfa8e9a0be1508e
SHA5120d4fdeaa7e5089383fcb30cb2fdfe2a198e31b15a464d3bb2a3ec4d9704aac6608f413a018ce46a940e3c2d1b3fcd071817aa81501e48699b6f6b196c46cb723
-
Filesize
197KB
MD52b31de9a552dc43ee00e9519494330b0
SHA1e80f0409769e9dbd7ea46193fa632e2170f508e3
SHA2565a4b16c9ad91afedca8b897ed2bac36139b600866a83bf7e502c4eb3bc5d385e
SHA5120ec7d50ec39819106e8c68f9169b72c52d8c1461d90460b8cb74d76ad38df0ea1211acfeb91fc4afb17d9a4896fe060fe2a4a4b6f172bfa9189f303555c93376
-
Filesize
197KB
MD57223b835c2b707f73b59d05c2717cd83
SHA1f07b08a9a5286538a635412ac88eeb00454cbdad
SHA256bc5339dea120f342ac79840861c0b7af65c9b9bec7df62af74c302a12cf16fd3
SHA51231833dbda14059b99bbe641c76f4fa45c14f6ec04dcf6d60a82452143cc7aedc13550b6cd3216704230ab24a15ce882f0c9db520569b117379b93183a4c4dd60
-
Filesize
197KB
MD570a0054fdae24ca02450b23db0c6b9e2
SHA1398cca838c76d4dfe8f6be77f55f394102fe95d4
SHA256e3172b79c5e0ead791baea44613ed3f74fc84d1d91e4b81680c413464e1cc3f3
SHA5124775b7b8d6b74dc2272962a52858a48db1da11b4440b13f02ecb135a8fc37757e0378e280556c8d541e62bdb671e52bbc3bb48e30948b3a8d28b582823c3b7f5
-
Filesize
197KB
MD5d6aafbe99801755febfd7ed1de3c76a2
SHA1920d7012a2097df8d439cd3a858e0acc67a29db1
SHA256b10e46d45450b7fc034c7f75a59541bc33454f9117cc2501d4cb1c526f19ff61
SHA5122c9f91ee1bfc092a7ffce450c1f0851dc01c1783fb763f1f73cba3cb485d21f12b3ee5ea2d591dda5a027ec54abeb9d11fb945455f34e06ad3e28b44eb87a1e9
-
Filesize
197KB
MD548d68666a0d809dbf5e9419e0bac75ac
SHA120fba1b42f9553c44396ee863e6a4c9a2bbdd925
SHA2561727c36044feb9f420623d96cbfb8e305b2a50b514eaaa94a9b90c66e13fdd43
SHA512475a6440c610f2cca780c1f474b824bbe21e3980ea2381aa05ea3549f25d5afe782366d2be3c2e9f60ea637df927aaa6b60492d7a206c1f9dabdc4abd42dd591
-
Filesize
197KB
MD52db9fece82e030a444e3a63ec2741ce3
SHA1f6c184ee5769c6535233516c72bf20ea59bf1dd2
SHA2564db4fb1d44de6f3823bb0701222178293e8f577dbdb2637ff9ae2da2c7211f42
SHA51288cf4c73eeead450ef43020d5f924f9191b9966fb32fff27d5b57ed4c229a18b07705497a27d70b4c526b0f78b55ba0de5a3df38de554d8c53f5b124e3d4d26f
-
Filesize
197KB
MD595010e3c197eb638612d799569470716
SHA1bc29c00db86597f42f0d62a46ae9d4a052037269
SHA25699cd23a974cd9120f53c9a55ed4dc47848e0edf79e40728cbd90c64af64151e1
SHA5129bf9ce2c30addcaf4d91f4762baaba48ce549aab7e6b74d84d36735415be18627514e8fdcd4ce16da109f2083f3fda502be8a7b7e86116cd39b3360ff3207253