Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe
-
Size
372KB
-
MD5
59f9380af5f5c128880eabd072f29eb6
-
SHA1
b6c491e8953749262484bb88f45505b17b4ff9b7
-
SHA256
be2db5017c986643b34d51b1a90aff35e4555b6f2a2bd8529fd0e08fe5489269
-
SHA512
154da84aa6cb419d73d716cfe5a361744baf686351c084a7debd0a77b75757f0d3c05441cf5c4e28599a19a243775b24b74107ebc941089d41bce064502828d7
-
SSDEEP
3072:CEGh0oLlMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGBlkOe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c000000013a3f-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000013a88-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000013a3f-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0032000000014251-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000013a3f-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000013a3f-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0010000000013a3f-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4499410-10DF-43ef-86D6-A2382A0EEC33}\stubpath = "C:\\Windows\\{A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe" 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F} {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FD45E0A-43EB-42bc-A7B7-557A54D452E4} {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9840D128-AFB7-4d37-BCF4-787866B5E11E}\stubpath = "C:\\Windows\\{9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe" {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}\stubpath = "C:\\Windows\\{EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe" {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D3D84DA4-3885-4da5-BF87-F66C2B313A0F} {830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D3D84DA4-3885-4da5-BF87-F66C2B313A0F}\stubpath = "C:\\Windows\\{D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe" {830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B4FA8F1-1380-4cd6-A207-F181F9E701C4}\stubpath = "C:\\Windows\\{8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe" {D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{999EDEB9-2171-46f6-B612-6B5AC9EE6A5C} {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}\stubpath = "C:\\Windows\\{999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe" {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{360D5561-3D6D-4a3d-B50B-8A283566BB52} {9CA032F2-AB3F-4299-807B-D20522F74990}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{360D5561-3D6D-4a3d-B50B-8A283566BB52}\stubpath = "C:\\Windows\\{360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe" {9CA032F2-AB3F-4299-807B-D20522F74990}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{830E4CCF-5BCE-4138-9C0C-E8E4A718AD55} {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}\stubpath = "C:\\Windows\\{830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe" {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B4FA8F1-1380-4cd6-A207-F181F9E701C4} {D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4499410-10DF-43ef-86D6-A2382A0EEC33} 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9FD45E0A-43EB-42bc-A7B7-557A54D452E4}\stubpath = "C:\\Windows\\{9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe" {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9840D128-AFB7-4d37-BCF4-787866B5E11E} {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9CA032F2-AB3F-4299-807B-D20522F74990} {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9CA032F2-AB3F-4299-807B-D20522F74990}\stubpath = "C:\\Windows\\{9CA032F2-AB3F-4299-807B-D20522F74990}.exe" {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E7893BB-B833-43f1-B8B4-08209DBBD8B9} {8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E7893BB-B833-43f1-B8B4-08209DBBD8B9}\stubpath = "C:\\Windows\\{9E7893BB-B833-43f1-B8B4-08209DBBD8B9}.exe" {8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe -
Deletes itself 1 IoCs
pid Process 1712 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1964 {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe 2644 {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe 2992 {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe 2900 {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe 2428 {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe 2880 {9CA032F2-AB3F-4299-807B-D20522F74990}.exe 320 {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe 1584 {830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe 1316 {D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe 1952 {8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe 488 {9E7893BB-B833-43f1-B8B4-08209DBBD8B9}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe File created C:\Windows\{9CA032F2-AB3F-4299-807B-D20522F74990}.exe {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe File created C:\Windows\{8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe {D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe File created C:\Windows\{9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe File created C:\Windows\{360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe {9CA032F2-AB3F-4299-807B-D20522F74990}.exe File created C:\Windows\{830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe File created C:\Windows\{D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe {830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe File created C:\Windows\{9E7893BB-B833-43f1-B8B4-08209DBBD8B9}.exe {8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe File created C:\Windows\{A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe File created C:\Windows\{999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe File created C:\Windows\{9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2060 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe Token: SeIncBasePriorityPrivilege 1964 {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe Token: SeIncBasePriorityPrivilege 2644 {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe Token: SeIncBasePriorityPrivilege 2992 {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe Token: SeIncBasePriorityPrivilege 2900 {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe Token: SeIncBasePriorityPrivilege 2428 {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe Token: SeIncBasePriorityPrivilege 2880 {9CA032F2-AB3F-4299-807B-D20522F74990}.exe Token: SeIncBasePriorityPrivilege 320 {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe Token: SeIncBasePriorityPrivilege 1584 {830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe Token: SeIncBasePriorityPrivilege 1316 {D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe Token: SeIncBasePriorityPrivilege 1952 {8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1964 2060 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe 28 PID 2060 wrote to memory of 1964 2060 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe 28 PID 2060 wrote to memory of 1964 2060 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe 28 PID 2060 wrote to memory of 1964 2060 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe 28 PID 2060 wrote to memory of 1712 2060 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe 29 PID 2060 wrote to memory of 1712 2060 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe 29 PID 2060 wrote to memory of 1712 2060 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe 29 PID 2060 wrote to memory of 1712 2060 2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe 29 PID 1964 wrote to memory of 2644 1964 {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe 30 PID 1964 wrote to memory of 2644 1964 {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe 30 PID 1964 wrote to memory of 2644 1964 {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe 30 PID 1964 wrote to memory of 2644 1964 {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe 30 PID 1964 wrote to memory of 2628 1964 {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe 31 PID 1964 wrote to memory of 2628 1964 {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe 31 PID 1964 wrote to memory of 2628 1964 {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe 31 PID 1964 wrote to memory of 2628 1964 {A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe 31 PID 2644 wrote to memory of 2992 2644 {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe 32 PID 2644 wrote to memory of 2992 2644 {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe 32 PID 2644 wrote to memory of 2992 2644 {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe 32 PID 2644 wrote to memory of 2992 2644 {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe 32 PID 2644 wrote to memory of 2732 2644 {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe 33 PID 2644 wrote to memory of 2732 2644 {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe 33 PID 2644 wrote to memory of 2732 2644 {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe 33 PID 2644 wrote to memory of 2732 2644 {999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe 33 PID 2992 wrote to memory of 2900 2992 {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe 36 PID 2992 wrote to memory of 2900 2992 {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe 36 PID 2992 wrote to memory of 2900 2992 {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe 36 PID 2992 wrote to memory of 2900 2992 {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe 36 PID 2992 wrote to memory of 1808 2992 {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe 37 PID 2992 wrote to memory of 1808 2992 {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe 37 PID 2992 wrote to memory of 1808 2992 {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe 37 PID 2992 wrote to memory of 1808 2992 {9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe 37 PID 2900 wrote to memory of 2428 2900 {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe 38 PID 2900 wrote to memory of 2428 2900 {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe 38 PID 2900 wrote to memory of 2428 2900 {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe 38 PID 2900 wrote to memory of 2428 2900 {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe 38 PID 2900 wrote to memory of 2744 2900 {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe 39 PID 2900 wrote to memory of 2744 2900 {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe 39 PID 2900 wrote to memory of 2744 2900 {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe 39 PID 2900 wrote to memory of 2744 2900 {9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe 39 PID 2428 wrote to memory of 2880 2428 {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe 40 PID 2428 wrote to memory of 2880 2428 {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe 40 PID 2428 wrote to memory of 2880 2428 {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe 40 PID 2428 wrote to memory of 2880 2428 {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe 40 PID 2428 wrote to memory of 2888 2428 {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe 41 PID 2428 wrote to memory of 2888 2428 {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe 41 PID 2428 wrote to memory of 2888 2428 {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe 41 PID 2428 wrote to memory of 2888 2428 {EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe 41 PID 2880 wrote to memory of 320 2880 {9CA032F2-AB3F-4299-807B-D20522F74990}.exe 42 PID 2880 wrote to memory of 320 2880 {9CA032F2-AB3F-4299-807B-D20522F74990}.exe 42 PID 2880 wrote to memory of 320 2880 {9CA032F2-AB3F-4299-807B-D20522F74990}.exe 42 PID 2880 wrote to memory of 320 2880 {9CA032F2-AB3F-4299-807B-D20522F74990}.exe 42 PID 2880 wrote to memory of 2208 2880 {9CA032F2-AB3F-4299-807B-D20522F74990}.exe 43 PID 2880 wrote to memory of 2208 2880 {9CA032F2-AB3F-4299-807B-D20522F74990}.exe 43 PID 2880 wrote to memory of 2208 2880 {9CA032F2-AB3F-4299-807B-D20522F74990}.exe 43 PID 2880 wrote to memory of 2208 2880 {9CA032F2-AB3F-4299-807B-D20522F74990}.exe 43 PID 320 wrote to memory of 1584 320 {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe 44 PID 320 wrote to memory of 1584 320 {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe 44 PID 320 wrote to memory of 1584 320 {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe 44 PID 320 wrote to memory of 1584 320 {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe 44 PID 320 wrote to memory of 2200 320 {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe 45 PID 320 wrote to memory of 2200 320 {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe 45 PID 320 wrote to memory of 2200 320 {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe 45 PID 320 wrote to memory of 2200 320 {360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\{A4499410-10DF-43ef-86D6-A2382A0EEC33}.exeC:\Windows\{A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\{999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exeC:\Windows\{999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\{9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exeC:\Windows\{9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\{9840D128-AFB7-4d37-BCF4-787866B5E11E}.exeC:\Windows\{9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\{EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exeC:\Windows\{EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\{9CA032F2-AB3F-4299-807B-D20522F74990}.exeC:\Windows\{9CA032F2-AB3F-4299-807B-D20522F74990}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\{360D5561-3D6D-4a3d-B50B-8A283566BB52}.exeC:\Windows\{360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\{830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exeC:\Windows\{830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1584 -
C:\Windows\{D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exeC:\Windows\{D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1316 -
C:\Windows\{8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exeC:\Windows\{8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\{9E7893BB-B833-43f1-B8B4-08209DBBD8B9}.exeC:\Windows\{9E7893BB-B833-43f1-B8B4-08209DBBD8B9}.exe12⤵
- Executes dropped EXE
PID:488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B4FA~1.EXE > nul12⤵PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3D84~1.EXE > nul11⤵PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{830E4~1.EXE > nul10⤵PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{360D5~1.EXE > nul9⤵PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9CA03~1.EXE > nul8⤵PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EC25F~1.EXE > nul7⤵PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9840D~1.EXE > nul6⤵PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9FD45~1.EXE > nul5⤵PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{999ED~1.EXE > nul4⤵PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A4499~1.EXE > nul3⤵PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5516d42169aed18d0f29eedea74e758c0
SHA18a17d0f445ab54a239119c9ee61ebd566418cdd4
SHA256cbd4b4af740af1b0c4ef9542fd64241646ba4ef6b44f090aa68a12d437aee4c3
SHA512759f18fa0d347df7ad835c9f4a3c3696b479ee57bbf3e520c48b1629320482454bd7694d97afeed1223c5df18f45dc9c255576a1ddb829d2a3cf64ecaa3b2eb8
-
Filesize
372KB
MD510aab34dd5d4478adaecf0ca41f521ec
SHA19bed507c44da3bdd0da5897207b92c381e9d510d
SHA25608d298ab62afe26fac13cf62820785320dca5126bcddc01d12756835efef2e37
SHA512c8fe40aa34f04b713f36fb44591afe13c8118574d809e507ea77dfc3effcaf038170a95c5736226e1d971b6b4e5ab88a211cfba2c37f56fbf06f52f123ecdf3f
-
Filesize
372KB
MD58f21b2bde1b836e60b912beace11e35d
SHA199583e19146ca45074ccc25355ea245297e931b8
SHA2565a9a5064570ec62336d165b6405650490dd7366da233f2225dc1f18820b14aa0
SHA512cabcf373c8247ead91c6b11f03a13eee990e24ede2480d79312bed9ffb213e4d3b63c029489e63074fc1f85289a2a5b93ce49eaa159bca75711c8f8f68dea74d
-
Filesize
372KB
MD53ad4b869e7daf6238288956053b6e3d5
SHA13002f6ca18b234ab7d0a099f6c51e52abae025ca
SHA2561497d8b48484db37ace8fc1a970e040898d6485ef4fc680fa543ee45192cf0eb
SHA51212c65702227e9e24531ad802699a660748411b4434b27bc737fc89554a9c6987ad7d4399c8ba12e2537f4cd99b6662e23e9bb8b392869e06dda71af5780250ea
-
Filesize
372KB
MD5ef54d32afbe4fb3057215eb477bea6f1
SHA15eac8a7efaeb21f6773c596343380cc75c38ddb0
SHA256de54f1a340bbd7c41338bff8050e8ec3affdfaaf72c25a8f558c2530a90fbd48
SHA51239ed4f69c679bc6f22ce4c205126a50fdae861061be1bdcad68f0c7ae882e721afa7265a7d9a9f101cb1ed6dc113dbdbfe9f9b10ebabac0b602119a3281c8041
-
Filesize
372KB
MD5c0ad62e57e155d99a370209aecc8793f
SHA162d292fb02e63626032946bf53ca31838fe55ba5
SHA2564393135b895adb293b2a38b08812229b2b6008353a10f4b2c1dd36065400624c
SHA5127f1d54b654d5b01976f138eb909b29ffb96ab7010c03dd0429fd0676b6bcd146000993b6582eed2a68a62870905c0dd844d3e319a59279b5b40eadb70e072803
-
Filesize
372KB
MD527da59ec0492dd45d3f8dda50619c2c7
SHA179eadf748d4743c75404a7427d6e70dd7a3f1f11
SHA256d19ced4db49d90483d38af1c7567cce92d366eaadf9974cc2e0285e648b60e5b
SHA5123303aead19a2fa68eed77b40932cfd01b21f345ffe2f765d92e33b6480fa7917c07effc8f266e810b0900029d06f7dcd85626a64684c42d19e26ebdc22683035
-
Filesize
372KB
MD5def7e9ed12ffb49d24d220fee750c1b6
SHA1ea48c1126ffa167e037fa17efde8564b5d144037
SHA2567d349c36e928ea998f5dbde9b6fd1d117b7b33a6f268b56af61d16249e1ef902
SHA51209de3db7a9dde791eb17613c75b598e2c00ebfac1800b5ae06e9f30ea1db34e75d1ee55dc89b49289144fd9e9882bd44b7c80cc289533ca9e33eb66511164694
-
Filesize
372KB
MD545232c1e05b3dee31578b3693d41c75e
SHA14342800fb2938bf3fe7bf8670c6eb848bf478db9
SHA2561fd05e008fe2b14af911c58de3429e17623281923af017e2c3cb93df66acbd74
SHA51204f913a59e3ce65417613ef7a8cef7a2af9791c68f0a9979f813068f968f9b148610289797f13de3485d701e9c7273b1360b50a0ab1e632c1cd3bc7c54d020af
-
Filesize
372KB
MD5266d41e1f67cfe99f06673ef26c67998
SHA1aea900b6ddbba74c4ce59ea32765d2a4c3eb7f07
SHA256e35e81d4df89d8a99bd49c65fc0fe2758056d43054d135a68cac9c7d1c4d287b
SHA512cfd9a8c208372d4722db3363b1d7d97fbb67186d11d01b0cd538ec955443d99bc54bca3d14b98f5f5319c6f6a9bfffac7e8d379de15e7347ad4db72a4dc893cf
-
Filesize
372KB
MD583bbe4247e2be0242a800cd4f3034a30
SHA1a9a0726c935a90e5381a9dc117ad709bebe409d8
SHA256fade603a553451fd5dd6ed9ea6d900a330f06a29d7fc4f6c371417769b1a8128
SHA512dbe6bc8606968cf4a091c4bf1aa5b043613230ae5078b28e3c9d1fbbf70e8306b1c4a43cdf0f7eeddc322a1e4059f2d7f4a33e847f0e84b5136b348c2f5fa384