Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe
-
Size
197KB
-
MD5
8ce1951ccb871f83d69381b504acc994
-
SHA1
26a30140e353968d907cb9a7a4edd2ab85d4cc4e
-
SHA256
9ead615da1cebcbd0fbe53d49d225ea77d42c67bd189a33ea2ad9b23b260c319
-
SHA512
35882422c5da722b6ccade579e092639bfc6557040ad9c49c17e5fcdd374c16960a9019a5e9fb9724b248aae7302d497d33200a3a7f2aecd9b837efceb44fd7c
-
SSDEEP
3072:jEGh0o5l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGblEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x0008000000012262-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001466c-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000000f680-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000001466c-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000000f680-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000014738-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000014a55-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000014a94-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000014a55-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000014a94-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000014aec-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{393EF6C6-FC4F-4508-823F-9347DC065C39}\stubpath = "C:\\Windows\\{393EF6C6-FC4F-4508-823F-9347DC065C39}.exe" {64118DD7-3937-4a27-AF22-17D23331122B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A091726B-8068-40a9-9E53-221B4BA0D8D2} 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{322505D3-D3C6-4f68-AEE7-3D8C644ADBDA} {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}\stubpath = "C:\\Windows\\{A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe" {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CE4AF260-A957-42a7-8D43-71D49E9DEFCA}\stubpath = "C:\\Windows\\{CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe" {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}\stubpath = "C:\\Windows\\{9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe" {9B900FFD-9221-4c74-B807-8BE051D3227F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A9F3F18-393C-4d2d-B039-DF9D02687EA2} {9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A9F3F18-393C-4d2d-B039-DF9D02687EA2}\stubpath = "C:\\Windows\\{5A9F3F18-393C-4d2d-B039-DF9D02687EA2}.exe" {9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}\stubpath = "C:\\Windows\\{322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe" {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA1607AB-5AD8-4706-B55C-76A272E76BB4} {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CE4AF260-A957-42a7-8D43-71D49E9DEFCA} {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{64118DD7-3937-4a27-AF22-17D23331122B}\stubpath = "C:\\Windows\\{64118DD7-3937-4a27-AF22-17D23331122B}.exe" {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9B900FFD-9221-4c74-B807-8BE051D3227F} {393EF6C6-FC4F-4508-823F-9347DC065C39}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9B900FFD-9221-4c74-B807-8BE051D3227F}\stubpath = "C:\\Windows\\{9B900FFD-9221-4c74-B807-8BE051D3227F}.exe" {393EF6C6-FC4F-4508-823F-9347DC065C39}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA1607AB-5AD8-4706-B55C-76A272E76BB4}\stubpath = "C:\\Windows\\{AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe" {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7AA35824-ADAF-4be8-8654-ACECEB589456} {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7AA35824-ADAF-4be8-8654-ACECEB589456}\stubpath = "C:\\Windows\\{7AA35824-ADAF-4be8-8654-ACECEB589456}.exe" {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{64118DD7-3937-4a27-AF22-17D23331122B} {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A091726B-8068-40a9-9E53-221B4BA0D8D2}\stubpath = "C:\\Windows\\{A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe" 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A2F048BD-AA2B-4424-A3CA-DEE56ABADBED} {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{393EF6C6-FC4F-4508-823F-9347DC065C39} {64118DD7-3937-4a27-AF22-17D23331122B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9DD04A7B-34A6-4223-A5CB-4949A50C3FF1} {9B900FFD-9221-4c74-B807-8BE051D3227F}.exe -
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2352 {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe 2540 {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe 2424 {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe 3048 {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe 1084 {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe 2512 {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe 1980 {64118DD7-3937-4a27-AF22-17D23331122B}.exe 1048 {393EF6C6-FC4F-4508-823F-9347DC065C39}.exe 2520 {9B900FFD-9221-4c74-B807-8BE051D3227F}.exe 2320 {9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe 592 {5A9F3F18-393C-4d2d-B039-DF9D02687EA2}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe File created C:\Windows\{AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe File created C:\Windows\{5A9F3F18-393C-4d2d-B039-DF9D02687EA2}.exe {9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe File created C:\Windows\{9B900FFD-9221-4c74-B807-8BE051D3227F}.exe {393EF6C6-FC4F-4508-823F-9347DC065C39}.exe File created C:\Windows\{9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe {9B900FFD-9221-4c74-B807-8BE051D3227F}.exe File created C:\Windows\{A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe File created C:\Windows\{A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe File created C:\Windows\{CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe File created C:\Windows\{7AA35824-ADAF-4be8-8654-ACECEB589456}.exe {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe File created C:\Windows\{64118DD7-3937-4a27-AF22-17D23331122B}.exe {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe File created C:\Windows\{393EF6C6-FC4F-4508-823F-9347DC065C39}.exe {64118DD7-3937-4a27-AF22-17D23331122B}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1612 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe Token: SeIncBasePriorityPrivilege 2352 {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe Token: SeIncBasePriorityPrivilege 2540 {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe Token: SeIncBasePriorityPrivilege 2424 {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe Token: SeIncBasePriorityPrivilege 3048 {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe Token: SeIncBasePriorityPrivilege 1084 {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe Token: SeIncBasePriorityPrivilege 2512 {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe Token: SeIncBasePriorityPrivilege 1980 {64118DD7-3937-4a27-AF22-17D23331122B}.exe Token: SeIncBasePriorityPrivilege 1048 {393EF6C6-FC4F-4508-823F-9347DC065C39}.exe Token: SeIncBasePriorityPrivilege 2520 {9B900FFD-9221-4c74-B807-8BE051D3227F}.exe Token: SeIncBasePriorityPrivilege 2320 {9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2352 1612 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe 28 PID 1612 wrote to memory of 2352 1612 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe 28 PID 1612 wrote to memory of 2352 1612 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe 28 PID 1612 wrote to memory of 2352 1612 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe 28 PID 1612 wrote to memory of 2916 1612 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe 29 PID 1612 wrote to memory of 2916 1612 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe 29 PID 1612 wrote to memory of 2916 1612 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe 29 PID 1612 wrote to memory of 2916 1612 2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe 29 PID 2352 wrote to memory of 2540 2352 {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe 32 PID 2352 wrote to memory of 2540 2352 {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe 32 PID 2352 wrote to memory of 2540 2352 {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe 32 PID 2352 wrote to memory of 2540 2352 {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe 32 PID 2352 wrote to memory of 2732 2352 {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe 33 PID 2352 wrote to memory of 2732 2352 {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe 33 PID 2352 wrote to memory of 2732 2352 {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe 33 PID 2352 wrote to memory of 2732 2352 {A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe 33 PID 2540 wrote to memory of 2424 2540 {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe 34 PID 2540 wrote to memory of 2424 2540 {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe 34 PID 2540 wrote to memory of 2424 2540 {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe 34 PID 2540 wrote to memory of 2424 2540 {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe 34 PID 2540 wrote to memory of 2456 2540 {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe 35 PID 2540 wrote to memory of 2456 2540 {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe 35 PID 2540 wrote to memory of 2456 2540 {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe 35 PID 2540 wrote to memory of 2456 2540 {322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe 35 PID 2424 wrote to memory of 3048 2424 {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe 36 PID 2424 wrote to memory of 3048 2424 {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe 36 PID 2424 wrote to memory of 3048 2424 {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe 36 PID 2424 wrote to memory of 3048 2424 {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe 36 PID 2424 wrote to memory of 2404 2424 {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe 37 PID 2424 wrote to memory of 2404 2424 {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe 37 PID 2424 wrote to memory of 2404 2424 {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe 37 PID 2424 wrote to memory of 2404 2424 {AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe 37 PID 3048 wrote to memory of 1084 3048 {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe 38 PID 3048 wrote to memory of 1084 3048 {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe 38 PID 3048 wrote to memory of 1084 3048 {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe 38 PID 3048 wrote to memory of 1084 3048 {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe 38 PID 3048 wrote to memory of 1728 3048 {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe 39 PID 3048 wrote to memory of 1728 3048 {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe 39 PID 3048 wrote to memory of 1728 3048 {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe 39 PID 3048 wrote to memory of 1728 3048 {A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe 39 PID 1084 wrote to memory of 2512 1084 {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe 40 PID 1084 wrote to memory of 2512 1084 {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe 40 PID 1084 wrote to memory of 2512 1084 {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe 40 PID 1084 wrote to memory of 2512 1084 {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe 40 PID 1084 wrote to memory of 2712 1084 {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe 41 PID 1084 wrote to memory of 2712 1084 {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe 41 PID 1084 wrote to memory of 2712 1084 {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe 41 PID 1084 wrote to memory of 2712 1084 {CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe 41 PID 2512 wrote to memory of 1980 2512 {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe 42 PID 2512 wrote to memory of 1980 2512 {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe 42 PID 2512 wrote to memory of 1980 2512 {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe 42 PID 2512 wrote to memory of 1980 2512 {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe 42 PID 2512 wrote to memory of 1444 2512 {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe 43 PID 2512 wrote to memory of 1444 2512 {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe 43 PID 2512 wrote to memory of 1444 2512 {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe 43 PID 2512 wrote to memory of 1444 2512 {7AA35824-ADAF-4be8-8654-ACECEB589456}.exe 43 PID 1980 wrote to memory of 1048 1980 {64118DD7-3937-4a27-AF22-17D23331122B}.exe 44 PID 1980 wrote to memory of 1048 1980 {64118DD7-3937-4a27-AF22-17D23331122B}.exe 44 PID 1980 wrote to memory of 1048 1980 {64118DD7-3937-4a27-AF22-17D23331122B}.exe 44 PID 1980 wrote to memory of 1048 1980 {64118DD7-3937-4a27-AF22-17D23331122B}.exe 44 PID 1980 wrote to memory of 1176 1980 {64118DD7-3937-4a27-AF22-17D23331122B}.exe 45 PID 1980 wrote to memory of 1176 1980 {64118DD7-3937-4a27-AF22-17D23331122B}.exe 45 PID 1980 wrote to memory of 1176 1980 {64118DD7-3937-4a27-AF22-17D23331122B}.exe 45 PID 1980 wrote to memory of 1176 1980 {64118DD7-3937-4a27-AF22-17D23331122B}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\{A091726B-8068-40a9-9E53-221B4BA0D8D2}.exeC:\Windows\{A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\{322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exeC:\Windows\{322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\{AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exeC:\Windows\{AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\{A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exeC:\Windows\{A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\{CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exeC:\Windows\{CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\{7AA35824-ADAF-4be8-8654-ACECEB589456}.exeC:\Windows\{7AA35824-ADAF-4be8-8654-ACECEB589456}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\{64118DD7-3937-4a27-AF22-17D23331122B}.exeC:\Windows\{64118DD7-3937-4a27-AF22-17D23331122B}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\{393EF6C6-FC4F-4508-823F-9347DC065C39}.exeC:\Windows\{393EF6C6-FC4F-4508-823F-9347DC065C39}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\{9B900FFD-9221-4c74-B807-8BE051D3227F}.exeC:\Windows\{9B900FFD-9221-4c74-B807-8BE051D3227F}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\{9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exeC:\Windows\{9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2320 -
C:\Windows\{5A9F3F18-393C-4d2d-B039-DF9D02687EA2}.exeC:\Windows\{5A9F3F18-393C-4d2d-B039-DF9D02687EA2}.exe12⤵
- Executes dropped EXE
PID:592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9DD04~1.EXE > nul12⤵PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9B900~1.EXE > nul11⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{393EF~1.EXE > nul10⤵PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{64118~1.EXE > nul9⤵PID:1176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7AA35~1.EXE > nul8⤵PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CE4AF~1.EXE > nul7⤵PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A2F04~1.EXE > nul6⤵PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA160~1.EXE > nul5⤵PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{32250~1.EXE > nul4⤵PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A0917~1.EXE > nul3⤵PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5b6d3aec92b0bf07ba0821eaef66db54f
SHA1592b3bd67416b0cd4cc3e34614f258349750c0a1
SHA256ef15ff8ba109ee76dd41ba2bde2fcdf1034aa3b0475a0c06145b16c2584583f9
SHA512eec27c6c1e1d7d14a1f1b4ed1caaccc6409f8db90d289cd019a6a7d75750002160f7776029a69fdccfc6717069d99337979ba74ea1ca899940ba01628c2d8370
-
Filesize
197KB
MD59d9854330f1cf40ea37a73d5377e6fcd
SHA1d6f6d4a6c59f8db1e9b5b9a341833dd962c6ae27
SHA256f30add2a092d2b6a45a12a4768b9a4b160198bae244d141566cb382ca7b566ec
SHA5120f1840835529dfbdfc91879162c71ad6facf8de3da639f3228d7b764845e1d874f4773950d31e38902917ba9acaf1258bf2249d54df35cadfe3512e5fdab093d
-
Filesize
197KB
MD5e4f1ec5be0ec57bb4abccb7bb40b9468
SHA138ee06579a343ffc48b7c892a589912221b85ee6
SHA256caa59b2519a4ae44786a62dc2b8f0ddcf4e7e3ce700488eff50252b214c90801
SHA5122da3b3751d2d47a7fa27597a2db6ac68f19ec4a5bd42e38f228f7771b7827f1f8b716ecbaec4a3d8eec9a7088b3c543dd8ddc3e778a41d4271d78a03a6de154c
-
Filesize
197KB
MD5ca89bff29235d19ab329d6a44cdd7d76
SHA15d50e38b5108d18bb64665238727be8d5807c1e3
SHA256cafc08eb840b22647f0ac32ddc2bd9cbd90411c65c2b61c1535b7a357fb299c5
SHA51275c0a498e70b3b83dec18640bf9071139327510f156051f2f212bd461bef71539c18efcaebdb58b44eb54e01367238d219d4b764f2d402d580e01b4d2a39aa7c
-
Filesize
197KB
MD51933eb1101192d81bf34e248e0de7c43
SHA1e6ddccf9bcd7d1bc6683a8505996eca1fbf6d617
SHA25690ebeeffbcf55ee99df8c64deee5b8ed90c8457a0aafb6fa3c0f4f0285c21a4f
SHA5122582ac8c2d1fd05a52b7364bcf593b23b9b41778b24863dddc9240c6f011c0a45aa67d4da8a2cbc91c5de6f5048fe3305181784fb2cda87c45eef00aeb73f98f
-
Filesize
197KB
MD5597da01be46eccd94d8ce3f6bb3ba0c1
SHA1fd861993b0da3253beb586b328a4812140dc76bf
SHA2566ee3aae8e6e6d2426ad2ae9b786b9a6e9ccafc5aed332ef0c5613ba43460ace2
SHA512420e3534ebd058b47012738ed44bd58209910fce01ceb15f19c9d57493a9fc8eb293242d887613039b0b4be8a20eff46ba4343b8c743a4c6c591b8815cb611c8
-
Filesize
197KB
MD5076c7a404db97470d10ef74958dc492a
SHA126555623235b0dfa30b4991b0ee81dc9dbb89674
SHA256689992d7b295aa333edac195540f9e1491881e5a4eb56934a57350c59e0e8534
SHA512efeb92f2576454d9be4de05ef8ffa00c53b5b99d362457ce11b901e8aa9326803e5706e0831608b8f1c2bb59ac13b848e7abdc6a3e937cad3fa2a1de8796f06c
-
Filesize
197KB
MD52b7fe065190b3a5de9f3874bd3317d9a
SHA198383fea558f9abeea4347c60becd2ab810f3a9b
SHA2568f89185fe6b170d4bfa62f6c85a8a3d1d24f3538bd4970fee78f3b2ad310e019
SHA512beee88dc8667305d74ff4364d379dde88ff31ea51217f3fd7ab07cc65d13dd7aec694a498b4e8f66436708accf37f301bb4b8df8391683122953bdae8a40ae36
-
Filesize
197KB
MD53219147e3f631d74fe57d3e04e13b75a
SHA13bbb25f3b7b5071c0e40ebc6e2ac5f68588895c5
SHA2560aaaa437cdedb681a19e23d3fae2ab28e1d75102d259b4980e437db8d6f9a632
SHA5129931de782dc4466afd4bbf314285b7d9462cdf890cc43fa3ab8bbd0704bf4ca1b5cf8778e28b379c08150b6df16603ffc2ee2c2479b88ea36a2d7b314c3396fb
-
Filesize
197KB
MD58a94b541c734de909e0324dc35277e8f
SHA16653607ea702939bf474c6b0bd1a9e723106c2ac
SHA25697b6bd681a410882ad8ba4fd647abed2ee293ca724a1939e8ce631108403782a
SHA512ae74721037bb440b4d014c04584236ab3b5d3cdf8ee0cd77337274c10d8dc7b18094f7dc390561fc1b3037df2ae080285aa289e69c243179c41967118c381562
-
Filesize
197KB
MD5cd094bc9929cf7d227cd41f396ee6cc4
SHA113595728619bc8b0cc4a8ad4b4b09c2b747a4c49
SHA256548da506373377779e5a7beebe985b2e69499c31a0c2bc9decea1bca1e8db500
SHA512c5df5c169a92ffa2287b3d45f763629e7333b745b8370a338a2f722f21aa4c471ce6d147c8434cb00301d2162ab5da45fe402a0821d8affa7c61419538ea391b