Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe
-
Size
180KB
-
MD5
22ae0262479564b3aa7853c3116e3cb6
-
SHA1
27f5e58de2f28ee0092e0ef6abdb1a794c1f6d3c
-
SHA256
a5b5d0a3070703147b2324226ace02f4828a8d39db78c9659c6e914ecde014d2
-
SHA512
12f380284051359c217f7e7dd9f6005a621e470ea50a05c5d2105796d5a155f93b06994388979fa56a31024f2f7a9691b8725ce955204ebebbbb6da90fc520cf
-
SSDEEP
3072:jEGh0oJlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGjl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral2/files/0x0008000000023249-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000200000001e32b-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023255-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002325f-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0011000000023261-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00020000000219e9-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070d-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070f-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0006000000000026-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000000507-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070d-41.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C0648872-A980-427e-86EE-EDFBB74E5326}\stubpath = "C:\\Windows\\{C0648872-A980-427e-86EE-EDFBB74E5326}.exe" 2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1E9B885-33B7-402a-87A0-5D5FC24FC4DC} {C0648872-A980-427e-86EE-EDFBB74E5326}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C3A9DC4D-DF20-441e-B486-052437B96E92}\stubpath = "C:\\Windows\\{C3A9DC4D-DF20-441e-B486-052437B96E92}.exe" {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}\stubpath = "C:\\Windows\\{A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe" {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{67742FCA-5064-4b11-9340-7818BA5641A9} {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{36CDABFB-5F14-426c-B799-BA3D7C5FEC63}\stubpath = "C:\\Windows\\{36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe" {67742FCA-5064-4b11-9340-7818BA5641A9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{70D3EE8C-4FF5-4e98-9EB9-252466197041} {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C3A9DC4D-DF20-441e-B486-052437B96E92} {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A37F4A7B-CAD3-4d48-A222-C97E5D6435DA} {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4D67837-9B2D-4eba-9341-2DF0A549976E} {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4D67837-9B2D-4eba-9341-2DF0A549976E}\stubpath = "C:\\Windows\\{B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe" {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{70D3EE8C-4FF5-4e98-9EB9-252466197041}\stubpath = "C:\\Windows\\{70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe" {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{011FD78F-D37C-4721-BB5B-B573D3E79766} {70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}\stubpath = "C:\\Windows\\{F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe" {C0648872-A980-427e-86EE-EDFBB74E5326}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{36CDABFB-5F14-426c-B799-BA3D7C5FEC63} {67742FCA-5064-4b11-9340-7818BA5641A9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D11C0415-D193-4ad9-98E0-5390E63580B4} {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E2CCD4D7-ED04-4a97-BCB3-68944CBEA775} {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{011FD78F-D37C-4721-BB5B-B573D3E79766}\stubpath = "C:\\Windows\\{011FD78F-D37C-4721-BB5B-B573D3E79766}.exe" {70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C0648872-A980-427e-86EE-EDFBB74E5326} 2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{67742FCA-5064-4b11-9340-7818BA5641A9}\stubpath = "C:\\Windows\\{67742FCA-5064-4b11-9340-7818BA5641A9}.exe" {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D11C0415-D193-4ad9-98E0-5390E63580B4}\stubpath = "C:\\Windows\\{D11C0415-D193-4ad9-98E0-5390E63580B4}.exe" {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}\stubpath = "C:\\Windows\\{E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe" {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe -
Executes dropped EXE 11 IoCs
pid Process 4420 {C0648872-A980-427e-86EE-EDFBB74E5326}.exe 2400 {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe 4620 {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe 4876 {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe 4296 {67742FCA-5064-4b11-9340-7818BA5641A9}.exe 2236 {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe 732 {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe 3960 {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe 1076 {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe 4844 {70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe 572 {011FD78F-D37C-4721-BB5B-B573D3E79766}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe File created C:\Windows\{011FD78F-D37C-4721-BB5B-B573D3E79766}.exe {70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe File created C:\Windows\{F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe {C0648872-A980-427e-86EE-EDFBB74E5326}.exe File created C:\Windows\{C3A9DC4D-DF20-441e-B486-052437B96E92}.exe {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe File created C:\Windows\{A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe File created C:\Windows\{67742FCA-5064-4b11-9340-7818BA5641A9}.exe {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe File created C:\Windows\{D11C0415-D193-4ad9-98E0-5390E63580B4}.exe {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe File created C:\Windows\{B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe File created C:\Windows\{C0648872-A980-427e-86EE-EDFBB74E5326}.exe 2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe File created C:\Windows\{36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe {67742FCA-5064-4b11-9340-7818BA5641A9}.exe File created C:\Windows\{E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 452 2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe Token: SeIncBasePriorityPrivilege 4420 {C0648872-A980-427e-86EE-EDFBB74E5326}.exe Token: SeIncBasePriorityPrivilege 2400 {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe Token: SeIncBasePriorityPrivilege 4620 {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe Token: SeIncBasePriorityPrivilege 4876 {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe Token: SeIncBasePriorityPrivilege 4296 {67742FCA-5064-4b11-9340-7818BA5641A9}.exe Token: SeIncBasePriorityPrivilege 2236 {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe Token: SeIncBasePriorityPrivilege 732 {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe Token: SeIncBasePriorityPrivilege 3960 {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe Token: SeIncBasePriorityPrivilege 1076 {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe Token: SeIncBasePriorityPrivilege 4844 {70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 452 wrote to memory of 4420 452 2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe 91 PID 452 wrote to memory of 4420 452 2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe 91 PID 452 wrote to memory of 4420 452 2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe 91 PID 452 wrote to memory of 732 452 2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe 92 PID 452 wrote to memory of 732 452 2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe 92 PID 452 wrote to memory of 732 452 2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe 92 PID 4420 wrote to memory of 2400 4420 {C0648872-A980-427e-86EE-EDFBB74E5326}.exe 95 PID 4420 wrote to memory of 2400 4420 {C0648872-A980-427e-86EE-EDFBB74E5326}.exe 95 PID 4420 wrote to memory of 2400 4420 {C0648872-A980-427e-86EE-EDFBB74E5326}.exe 95 PID 4420 wrote to memory of 3960 4420 {C0648872-A980-427e-86EE-EDFBB74E5326}.exe 96 PID 4420 wrote to memory of 3960 4420 {C0648872-A980-427e-86EE-EDFBB74E5326}.exe 96 PID 4420 wrote to memory of 3960 4420 {C0648872-A980-427e-86EE-EDFBB74E5326}.exe 96 PID 2400 wrote to memory of 4620 2400 {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe 102 PID 2400 wrote to memory of 4620 2400 {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe 102 PID 2400 wrote to memory of 4620 2400 {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe 102 PID 2400 wrote to memory of 2492 2400 {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe 103 PID 2400 wrote to memory of 2492 2400 {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe 103 PID 2400 wrote to memory of 2492 2400 {F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe 103 PID 4620 wrote to memory of 4876 4620 {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe 106 PID 4620 wrote to memory of 4876 4620 {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe 106 PID 4620 wrote to memory of 4876 4620 {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe 106 PID 4620 wrote to memory of 5008 4620 {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe 107 PID 4620 wrote to memory of 5008 4620 {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe 107 PID 4620 wrote to memory of 5008 4620 {C3A9DC4D-DF20-441e-B486-052437B96E92}.exe 107 PID 4876 wrote to memory of 4296 4876 {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe 108 PID 4876 wrote to memory of 4296 4876 {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe 108 PID 4876 wrote to memory of 4296 4876 {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe 108 PID 4876 wrote to memory of 2168 4876 {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe 109 PID 4876 wrote to memory of 2168 4876 {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe 109 PID 4876 wrote to memory of 2168 4876 {A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe 109 PID 4296 wrote to memory of 2236 4296 {67742FCA-5064-4b11-9340-7818BA5641A9}.exe 110 PID 4296 wrote to memory of 2236 4296 {67742FCA-5064-4b11-9340-7818BA5641A9}.exe 110 PID 4296 wrote to memory of 2236 4296 {67742FCA-5064-4b11-9340-7818BA5641A9}.exe 110 PID 4296 wrote to memory of 2500 4296 {67742FCA-5064-4b11-9340-7818BA5641A9}.exe 111 PID 4296 wrote to memory of 2500 4296 {67742FCA-5064-4b11-9340-7818BA5641A9}.exe 111 PID 4296 wrote to memory of 2500 4296 {67742FCA-5064-4b11-9340-7818BA5641A9}.exe 111 PID 2236 wrote to memory of 732 2236 {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe 112 PID 2236 wrote to memory of 732 2236 {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe 112 PID 2236 wrote to memory of 732 2236 {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe 112 PID 2236 wrote to memory of 3080 2236 {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe 113 PID 2236 wrote to memory of 3080 2236 {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe 113 PID 2236 wrote to memory of 3080 2236 {36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe 113 PID 732 wrote to memory of 3960 732 {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe 114 PID 732 wrote to memory of 3960 732 {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe 114 PID 732 wrote to memory of 3960 732 {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe 114 PID 732 wrote to memory of 4068 732 {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe 115 PID 732 wrote to memory of 4068 732 {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe 115 PID 732 wrote to memory of 4068 732 {D11C0415-D193-4ad9-98E0-5390E63580B4}.exe 115 PID 3960 wrote to memory of 1076 3960 {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe 116 PID 3960 wrote to memory of 1076 3960 {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe 116 PID 3960 wrote to memory of 1076 3960 {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe 116 PID 3960 wrote to memory of 2380 3960 {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe 117 PID 3960 wrote to memory of 2380 3960 {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe 117 PID 3960 wrote to memory of 2380 3960 {E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe 117 PID 1076 wrote to memory of 4844 1076 {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe 118 PID 1076 wrote to memory of 4844 1076 {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe 118 PID 1076 wrote to memory of 4844 1076 {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe 118 PID 1076 wrote to memory of 3160 1076 {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe 119 PID 1076 wrote to memory of 3160 1076 {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe 119 PID 1076 wrote to memory of 3160 1076 {B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe 119 PID 4844 wrote to memory of 572 4844 {70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe 120 PID 4844 wrote to memory of 572 4844 {70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe 120 PID 4844 wrote to memory of 572 4844 {70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe 120 PID 4844 wrote to memory of 2304 4844 {70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_22ae0262479564b3aa7853c3116e3cb6_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\{C0648872-A980-427e-86EE-EDFBB74E5326}.exeC:\Windows\{C0648872-A980-427e-86EE-EDFBB74E5326}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\{F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exeC:\Windows\{F1E9B885-33B7-402a-87A0-5D5FC24FC4DC}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\{C3A9DC4D-DF20-441e-B486-052437B96E92}.exeC:\Windows\{C3A9DC4D-DF20-441e-B486-052437B96E92}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\{A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exeC:\Windows\{A37F4A7B-CAD3-4d48-A222-C97E5D6435DA}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\{67742FCA-5064-4b11-9340-7818BA5641A9}.exeC:\Windows\{67742FCA-5064-4b11-9340-7818BA5641A9}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\{36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exeC:\Windows\{36CDABFB-5F14-426c-B799-BA3D7C5FEC63}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\{D11C0415-D193-4ad9-98E0-5390E63580B4}.exeC:\Windows\{D11C0415-D193-4ad9-98E0-5390E63580B4}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\{E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exeC:\Windows\{E2CCD4D7-ED04-4a97-BCB3-68944CBEA775}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\{B4D67837-9B2D-4eba-9341-2DF0A549976E}.exeC:\Windows\{B4D67837-9B2D-4eba-9341-2DF0A549976E}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\{70D3EE8C-4FF5-4e98-9EB9-252466197041}.exeC:\Windows\{70D3EE8C-4FF5-4e98-9EB9-252466197041}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\{011FD78F-D37C-4721-BB5B-B573D3E79766}.exeC:\Windows\{011FD78F-D37C-4721-BB5B-B573D3E79766}.exe12⤵
- Executes dropped EXE
PID:572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70D3E~1.EXE > nul12⤵PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B4D67~1.EXE > nul11⤵PID:3160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E2CCD~1.EXE > nul10⤵PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D11C0~1.EXE > nul9⤵PID:4068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{36CDA~1.EXE > nul8⤵PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67742~1.EXE > nul7⤵PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A37F4~1.EXE > nul6⤵PID:2168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C3A9D~1.EXE > nul5⤵PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1E9B~1.EXE > nul4⤵PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0648~1.EXE > nul3⤵PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5096734d53dbefe1101a44b311f744aa5
SHA13b241a7cc4486da026d54c9e04bf0e02053781a1
SHA256f5d050a0a08446f3f12e8c1aa1d2a408d28e2c444edf007df3f192329a446541
SHA5124d5908e6d159650fa61a93cb96eca1b6cb2f8cb6ae316cb82b7627c97470fd97b29a810ed023a1f558763968501568f143e0425a73ca29e54061ad1b2d928b26
-
Filesize
180KB
MD5b63b014b25708d64f6342af3f8a21249
SHA15d22bbe2bda13bd65fbcc3d23b8507799baf5ec4
SHA256eca7fee64857ac88b4b1e96e35efa1db0b675c64aa411e045ca227716ab2f7ec
SHA512bb8b7da2c93c414cd0135983b95065b2457df4d5a4050eb9f6b477708c917863796c3c2690f80da12f29a5edda971ddddb8dfe56fc577e31d975e95d9f2b306b
-
Filesize
180KB
MD512f0351f17d64f22ac039c13ff9c13ea
SHA119b79c045657445b8852b807b358140dac26b278
SHA256d8ccbeb467d2da682fa55305e93e8d9a88b7612262c724ca6e3baf89fffe0072
SHA512899ea15a3f91c354c4cfd6eb524319fb7fde3e79ceca971ec8ce7474fb7be3fb34e7e62d4d9b99254f6c889b439eafddd4a9364ba1db18e71683b73bb210f9d6
-
Filesize
180KB
MD52a543be6189e5c78312c9a9f6f1b08f0
SHA1cb5b3bd79033af39894fd7e477ba2ebc578d1837
SHA2563de8d24b9212a5a1cec63c18c8c07ddbfe56906e5408dd0dd285eff50390d81c
SHA51288922e040fa37edf291b69d6c1c3f9109a360404b9dce016acbf06e887da9bba1cc5f14c204f4b5945cf97f9e1f25c751c0396fccf25f0a9330e2de26a2d2105
-
Filesize
180KB
MD50325f56e3a7f0a95d3536b751e7adb30
SHA126dc063ae0c7e909dea139013245a58e3fb43d1e
SHA256af3275e740e1ba2ff0d14d523a1ed342788792e30e4955f488fe6c2d69df3327
SHA512a1abd6d90c6b4372e470456d95cd87a1c661b5a8d292bc548fd54bb9b5fab0c9abeef4946243c7222d5d6a50e6877b1356be80edbceb2875be6d53bd6d6f0512
-
Filesize
180KB
MD583f8e39a8a12dbdade350053dc3170b8
SHA11aa94fb21e0bd98032a3af1f03411b93e34f61c2
SHA256e3b5f19edc089f66288c167c570b9cba3d073bf2b622741566889699d2093963
SHA51202c7894bb175cd2be67551365c7042002ce09e572cde64f75986e121a807ef345fbe8fbe997a2d297695433c4a14a93c4e12ad5bca6c47938b0bfaad56525b2c
-
Filesize
180KB
MD5aa7a3741a4b0359b62faa0c8bb7f09ea
SHA13307646afa3decfa63c7aadb521e2ddcfdfe1fe0
SHA25632d22078663b5409a426d77d724b229246c28adf6e7860284cb59836be31ac93
SHA51252452735589b4a6aea54c5b5122a78dcce162cda25362ba119491bc4823f196c6f5e192d439964a13cec6acbe3c2d55258ef93db3ca6bbc472a85563c45e24eb
-
Filesize
180KB
MD502a810b96db0ee757a7938720ad70065
SHA168cf7dfc3a31ac23d16a5476c9ec54131c6aa1b1
SHA256e59021ce60fccdccc31130294c6552f9b453fbdc84a818ec339f37c3fa9850ec
SHA512f44c8c9d6f880b267bffba95b5fa4e945ff5375fc545057410e4a2933e3338a57c70d6bd05b7cfa7ed4a6df9d32e56cd54b358a97b65f560ded34df3b019876b
-
Filesize
180KB
MD58011804d39b8dd3828c641992c481da1
SHA17b7776472659ba24682bfdd8f826d316a98703cd
SHA256a2afa760e96765e7ffe88273f2f45b3083489b81fb7d27510232ed3e07262807
SHA512268c917f3269b1c5c26253a5d66bd69634d071a7f9ab53698093329b0c00f46003a896b0564396a997a3363704eaf1a9b76a33947d6a536f5404e41070ff40c2
-
Filesize
180KB
MD58760452446e26af1ee58e090b3aa6186
SHA1545dc81989f0bdede3d01271a300c6f993c72b5e
SHA256ea375dae22a9e3356746b807e1b94c5dc2fe7edd597d41c4399f85c86c80c4fb
SHA512b50bc72e9f91a7a2132333880bcd15991e7ddcf8a243958dcfd490b825ab65c93e019024ee08c8da689fa4f5d3f356197bc160fb35422d9962d05735498a5ba7
-
Filesize
180KB
MD5f5a7fe93d1693b784c20d99124f712be
SHA1c53de40d5fbb24ae7deeabb148a3cd73d5ae45f6
SHA256bcd1a81a583f132c315df5c59bd52395f49bd0673627d9ca461992065b8509a0
SHA512df001a39011466ebe4a26cb2b8a9f5400552676edc1d748518245d64d2a6d3aa3f9a58670075efd1c4206d8d6a6b0c8ae1b27fb0c6135e4ddba332d7c65547f1