Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe
-
Size
380KB
-
MD5
0170e6ffd4d5d9148d1d68372991e16e
-
SHA1
f4517115864083c914c33a29d09aaad42bcef407
-
SHA256
9b3bc1442e90e58ee7b33616cce548023135b289aafadba1ba44af466699fb92
-
SHA512
f283324558f651987cfa56de11738a9dcf79437aad5757963401434a5c281a8f201fc9165cda4dfaccbea412da9298e3c22f62eb6581d814139f44bd412a3fda
-
SSDEEP
3072:mEGh0o/lPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGpl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0007000000023434-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002352c-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023532-11.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000001db28-13.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000001db58-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000600000001db5c-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000001db58-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000001db5c-29.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000001db72-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000001db5c-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000001db72-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c00000002337b-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0DE17AAB-E32A-4567-8434-7EC65E3D8960} {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E819A1C6-EA17-4438-97F6-1F55CB99CE87}\stubpath = "C:\\Windows\\{E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe" {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{85A60A3C-360C-4797-843D-7CE40473BA8B} {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22CB62F3-D38D-410f-AF26-81480654B765} {71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED5ED3AE-B009-4f6c-9251-B084304CD3A0} {282D9756-7628-4327-A520-EE7A0329A19B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED5ED3AE-B009-4f6c-9251-B084304CD3A0}\stubpath = "C:\\Windows\\{ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe" {282D9756-7628-4327-A520-EE7A0329A19B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0965DFB8-7B8B-4a32-934B-33FCD4F9F009} {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0965DFB8-7B8B-4a32-934B-33FCD4F9F009}\stubpath = "C:\\Windows\\{0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe" {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C945458D-82DB-4673-85F0-342996C6CE81} {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}\stubpath = "C:\\Windows\\{71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe" {C945458D-82DB-4673-85F0-342996C6CE81}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44D96DEF-0FD2-427e-9BC6-7CA892F28BED}\stubpath = "C:\\Windows\\{44D96DEF-0FD2-427e-9BC6-7CA892F28BED}.exe" {22CB62F3-D38D-410f-AF26-81480654B765}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22CB62F3-D38D-410f-AF26-81480654B765}\stubpath = "C:\\Windows\\{22CB62F3-D38D-410f-AF26-81480654B765}.exe" {71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF1239F4-8671-4b4a-AAF4-7DB925086442}\stubpath = "C:\\Windows\\{FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe" 2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E819A1C6-EA17-4438-97F6-1F55CB99CE87} {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{85A60A3C-360C-4797-843D-7CE40473BA8B}\stubpath = "C:\\Windows\\{85A60A3C-360C-4797-843D-7CE40473BA8B}.exe" {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{282D9756-7628-4327-A520-EE7A0329A19B} {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{282D9756-7628-4327-A520-EE7A0329A19B}\stubpath = "C:\\Windows\\{282D9756-7628-4327-A520-EE7A0329A19B}.exe" {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C945458D-82DB-4673-85F0-342996C6CE81}\stubpath = "C:\\Windows\\{C945458D-82DB-4673-85F0-342996C6CE81}.exe" {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{71872FDE-D4F4-4e40-AEDE-838F8A0BDC81} {C945458D-82DB-4673-85F0-342996C6CE81}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF1239F4-8671-4b4a-AAF4-7DB925086442} 2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0DE17AAB-E32A-4567-8434-7EC65E3D8960}\stubpath = "C:\\Windows\\{0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe" {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C2630DCD-D65D-478f-82A4-0A3CC11BBD71} {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C2630DCD-D65D-478f-82A4-0A3CC11BBD71}\stubpath = "C:\\Windows\\{C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe" {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44D96DEF-0FD2-427e-9BC6-7CA892F28BED} {22CB62F3-D38D-410f-AF26-81480654B765}.exe -
Executes dropped EXE 12 IoCs
pid Process 1512 {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe 3148 {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe 3364 {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe 4088 {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe 3032 {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe 1540 {282D9756-7628-4327-A520-EE7A0329A19B}.exe 4608 {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe 4468 {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe 2088 {C945458D-82DB-4673-85F0-342996C6CE81}.exe 4992 {71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe 924 {22CB62F3-D38D-410f-AF26-81480654B765}.exe 3828 {44D96DEF-0FD2-427e-9BC6-7CA892F28BED}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe {282D9756-7628-4327-A520-EE7A0329A19B}.exe File created C:\Windows\{C945458D-82DB-4673-85F0-342996C6CE81}.exe {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe File created C:\Windows\{FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe 2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe File created C:\Windows\{0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe File created C:\Windows\{E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe File created C:\Windows\{0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe File created C:\Windows\{71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe {C945458D-82DB-4673-85F0-342996C6CE81}.exe File created C:\Windows\{22CB62F3-D38D-410f-AF26-81480654B765}.exe {71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe File created C:\Windows\{44D96DEF-0FD2-427e-9BC6-7CA892F28BED}.exe {22CB62F3-D38D-410f-AF26-81480654B765}.exe File created C:\Windows\{85A60A3C-360C-4797-843D-7CE40473BA8B}.exe {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe File created C:\Windows\{C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe File created C:\Windows\{282D9756-7628-4327-A520-EE7A0329A19B}.exe {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2220 2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe Token: SeIncBasePriorityPrivilege 1512 {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe Token: SeIncBasePriorityPrivilege 3148 {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe Token: SeIncBasePriorityPrivilege 3364 {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe Token: SeIncBasePriorityPrivilege 4088 {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe Token: SeIncBasePriorityPrivilege 3032 {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe Token: SeIncBasePriorityPrivilege 1540 {282D9756-7628-4327-A520-EE7A0329A19B}.exe Token: SeIncBasePriorityPrivilege 4608 {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe Token: SeIncBasePriorityPrivilege 4468 {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe Token: SeIncBasePriorityPrivilege 2088 {C945458D-82DB-4673-85F0-342996C6CE81}.exe Token: SeIncBasePriorityPrivilege 4992 {71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe Token: SeIncBasePriorityPrivilege 924 {22CB62F3-D38D-410f-AF26-81480654B765}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1512 2220 2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe 97 PID 2220 wrote to memory of 1512 2220 2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe 97 PID 2220 wrote to memory of 1512 2220 2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe 97 PID 2220 wrote to memory of 3068 2220 2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe 98 PID 2220 wrote to memory of 3068 2220 2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe 98 PID 2220 wrote to memory of 3068 2220 2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe 98 PID 1512 wrote to memory of 3148 1512 {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe 100 PID 1512 wrote to memory of 3148 1512 {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe 100 PID 1512 wrote to memory of 3148 1512 {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe 100 PID 1512 wrote to memory of 4184 1512 {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe 101 PID 1512 wrote to memory of 4184 1512 {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe 101 PID 1512 wrote to memory of 4184 1512 {FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe 101 PID 3148 wrote to memory of 3364 3148 {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe 104 PID 3148 wrote to memory of 3364 3148 {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe 104 PID 3148 wrote to memory of 3364 3148 {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe 104 PID 3148 wrote to memory of 4652 3148 {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe 105 PID 3148 wrote to memory of 4652 3148 {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe 105 PID 3148 wrote to memory of 4652 3148 {0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe 105 PID 3364 wrote to memory of 4088 3364 {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe 106 PID 3364 wrote to memory of 4088 3364 {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe 106 PID 3364 wrote to memory of 4088 3364 {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe 106 PID 3364 wrote to memory of 1192 3364 {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe 107 PID 3364 wrote to memory of 1192 3364 {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe 107 PID 3364 wrote to memory of 1192 3364 {E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe 107 PID 4088 wrote to memory of 3032 4088 {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe 108 PID 4088 wrote to memory of 3032 4088 {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe 108 PID 4088 wrote to memory of 3032 4088 {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe 108 PID 4088 wrote to memory of 2532 4088 {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe 109 PID 4088 wrote to memory of 2532 4088 {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe 109 PID 4088 wrote to memory of 2532 4088 {85A60A3C-360C-4797-843D-7CE40473BA8B}.exe 109 PID 3032 wrote to memory of 1540 3032 {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe 114 PID 3032 wrote to memory of 1540 3032 {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe 114 PID 3032 wrote to memory of 1540 3032 {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe 114 PID 3032 wrote to memory of 5104 3032 {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe 115 PID 3032 wrote to memory of 5104 3032 {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe 115 PID 3032 wrote to memory of 5104 3032 {C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe 115 PID 1540 wrote to memory of 4608 1540 {282D9756-7628-4327-A520-EE7A0329A19B}.exe 116 PID 1540 wrote to memory of 4608 1540 {282D9756-7628-4327-A520-EE7A0329A19B}.exe 116 PID 1540 wrote to memory of 4608 1540 {282D9756-7628-4327-A520-EE7A0329A19B}.exe 116 PID 1540 wrote to memory of 1444 1540 {282D9756-7628-4327-A520-EE7A0329A19B}.exe 117 PID 1540 wrote to memory of 1444 1540 {282D9756-7628-4327-A520-EE7A0329A19B}.exe 117 PID 1540 wrote to memory of 1444 1540 {282D9756-7628-4327-A520-EE7A0329A19B}.exe 117 PID 4608 wrote to memory of 4468 4608 {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe 118 PID 4608 wrote to memory of 4468 4608 {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe 118 PID 4608 wrote to memory of 4468 4608 {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe 118 PID 4608 wrote to memory of 1852 4608 {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe 119 PID 4608 wrote to memory of 1852 4608 {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe 119 PID 4608 wrote to memory of 1852 4608 {ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe 119 PID 4468 wrote to memory of 2088 4468 {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe 127 PID 4468 wrote to memory of 2088 4468 {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe 127 PID 4468 wrote to memory of 2088 4468 {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe 127 PID 4468 wrote to memory of 2848 4468 {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe 128 PID 4468 wrote to memory of 2848 4468 {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe 128 PID 4468 wrote to memory of 2848 4468 {0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe 128 PID 2088 wrote to memory of 4992 2088 {C945458D-82DB-4673-85F0-342996C6CE81}.exe 129 PID 2088 wrote to memory of 4992 2088 {C945458D-82DB-4673-85F0-342996C6CE81}.exe 129 PID 2088 wrote to memory of 4992 2088 {C945458D-82DB-4673-85F0-342996C6CE81}.exe 129 PID 2088 wrote to memory of 5072 2088 {C945458D-82DB-4673-85F0-342996C6CE81}.exe 130 PID 2088 wrote to memory of 5072 2088 {C945458D-82DB-4673-85F0-342996C6CE81}.exe 130 PID 2088 wrote to memory of 5072 2088 {C945458D-82DB-4673-85F0-342996C6CE81}.exe 130 PID 4992 wrote to memory of 924 4992 {71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe 131 PID 4992 wrote to memory of 924 4992 {71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe 131 PID 4992 wrote to memory of 924 4992 {71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe 131 PID 4992 wrote to memory of 1852 4992 {71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-26_0170e6ffd4d5d9148d1d68372991e16e_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\{FF1239F4-8671-4b4a-AAF4-7DB925086442}.exeC:\Windows\{FF1239F4-8671-4b4a-AAF4-7DB925086442}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\{0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exeC:\Windows\{0DE17AAB-E32A-4567-8434-7EC65E3D8960}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\{E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exeC:\Windows\{E819A1C6-EA17-4438-97F6-1F55CB99CE87}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\{85A60A3C-360C-4797-843D-7CE40473BA8B}.exeC:\Windows\{85A60A3C-360C-4797-843D-7CE40473BA8B}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\{C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exeC:\Windows\{C2630DCD-D65D-478f-82A4-0A3CC11BBD71}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\{282D9756-7628-4327-A520-EE7A0329A19B}.exeC:\Windows\{282D9756-7628-4327-A520-EE7A0329A19B}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\{ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exeC:\Windows\{ED5ED3AE-B009-4f6c-9251-B084304CD3A0}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\{0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exeC:\Windows\{0965DFB8-7B8B-4a32-934B-33FCD4F9F009}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\{C945458D-82DB-4673-85F0-342996C6CE81}.exeC:\Windows\{C945458D-82DB-4673-85F0-342996C6CE81}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\{71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exeC:\Windows\{71872FDE-D4F4-4e40-AEDE-838F8A0BDC81}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\{22CB62F3-D38D-410f-AF26-81480654B765}.exeC:\Windows\{22CB62F3-D38D-410f-AF26-81480654B765}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:924 -
C:\Windows\{44D96DEF-0FD2-427e-9BC6-7CA892F28BED}.exeC:\Windows\{44D96DEF-0FD2-427e-9BC6-7CA892F28BED}.exe13⤵
- Executes dropped EXE
PID:3828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{22CB6~1.EXE > nul13⤵PID:388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71872~1.EXE > nul12⤵PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C9454~1.EXE > nul11⤵PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0965D~1.EXE > nul10⤵PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ED5ED~1.EXE > nul9⤵PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{282D9~1.EXE > nul8⤵PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2630~1.EXE > nul7⤵PID:5104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{85A60~1.EXE > nul6⤵PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E819A~1.EXE > nul5⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0DE17~1.EXE > nul4⤵PID:4652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FF123~1.EXE > nul3⤵PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5d1913277ca16b0575dfbd01774d4c2d0
SHA18754eb2d0a4522a41accfc2bee7f86f0518cdc04
SHA25603d815bac813c95aa8ef27a3a581d2df6e5e8b718b34a2793804197c40562528
SHA5125cd2a538c7d1a0adeb15628b855f3b6443012bc71d2daae0b750c11a35b5c67b21dcd7e531dc1755c7064a09413b6bc5799d425f06f3fcd3564b37c5165d5409
-
Filesize
380KB
MD50c93256181d68bb40a3c338dfc737af6
SHA1f09e8b709776ccc6a78891f09e2f0c2f489304ac
SHA2560b94d2c151b208fb8304eee1bb2fe1cffcb18cbd94f51477eb2415152ae2ba10
SHA5122b65e53ec46aa2f7b0a335d9f515391ce19cdef2d70b7fd087c56588efb242caa05e882fca383a7f635ea083a17869fe000c099d55422fb551fb40200f449a59
-
Filesize
380KB
MD5350115f1bb8361d54f881c0067be922d
SHA1afd5d0c9d24b0a6153041debb770f845fa05bc1b
SHA256f4eb88e8c21759218c34893456f78d717412455a1d1eba35d3914035b6975f86
SHA5120d1d05f371f834da5b705dccd0cc4bb499b55a169a2a3a14e90dbb7125cac54712aa7d0fd277f3c543a3ce91d4b1799f862ec22001445e42aeb8c8281fca9f08
-
Filesize
380KB
MD5a7d7e5755b3fe407e13c9bc388ab5cae
SHA19dc137bbb42611221ea9db5dce3e95c7aef17ff3
SHA256085607d0b9c8d7db81d22bec45c1abd975a2487c1b03ca596a8f17d6d311f922
SHA512b8b122ea0a8a7d080dd1ed4d354a40a9faf29910d59b3bab5f957fdf3566870386953c24ac63d68495941b9bdeeaa2b6d72929144b9f7f3eb8296f8632c7af33
-
Filesize
380KB
MD5aad68f70a5c1820a5240e85824dbc6ac
SHA16b93c73d0da4d519b8ef23bf875fae23ddc5e8e2
SHA2568d9fe86fe8bf3384a6dadeee96dfa08151b3e7de7ee63f4a1b2f54d36748fbfa
SHA512612cd22d78fbfe80f8435bd121550f8481fc569c57fbdf85a923d3c04975dbe06e3d381952bb80c13ff68f6e17b668ef9240799bc6df53a55eaa17e4445f2ac5
-
Filesize
380KB
MD5854ee4bb59e6a9ac290d7cc6d78a986e
SHA1aa75a1cb71db1dabcf22ed1d8788d2eb6808788a
SHA25614e7165e2636e207d4763e48dd4774c2cac60faf25eaa3a33262afb1ca53f5c8
SHA512f38e363abf28bd70eb1a585c9c07c6355e58cc795d7e7f79be44ff9b96233a5e60cf6ac30e1d3702797baf1a0fb26f9888e7313db96305f18787dad5cdf4fd33
-
Filesize
380KB
MD54bc255c939bdf50d93b22a5d146a16dd
SHA1003eff9d09eb0dc9f0ad69dbf0e56cc0f1e3f78f
SHA256982666a1153d10d89cd5bcf76fa1befc694e18bff2a979f400a089540b3a033d
SHA51233a31f7b0aebdcaf127213482fa7f7f63455a600f3648f0f141ab4646f4ace98dec53bac7063ac5d7e9968b0fb0473ced5318989d2db583a744c3a9da1895cd9
-
Filesize
380KB
MD5e10e230ff5711417b32376c899ece117
SHA1f9c6b081204342a0d0ce0ecee676c55432483eab
SHA25623ccb7787d625dcf11ee42ac074a7fc071df6961a68a015a1bf418b46ff1c858
SHA512be09eb0138d63aaafc3716a7088b86d1a271f1d957d7c8dc5a479b905aa72014d472d8f1a903da1321451dee721c244b25589d02e4e318b8fb70d8089f927ef3
-
Filesize
380KB
MD5031d12974d30efc21248d33aca8647a9
SHA1bf96dce077eda7ed143b359499f36ec6959713ae
SHA256e6ba8b9b229b115f7e76b3e96f898f3b74fbf032a603f7f407086ba2fe7b0e3a
SHA512311001b7bbcf5bc52a0e935cf0c7f6f5862c3f27acbc8321d3336e287f372915e6f2106c5ec270b281217f51fc425fa322e8ffca2eca1bce6810cea4e94aa232
-
Filesize
380KB
MD5135b68793351965c54d1c84b1d315eb9
SHA10157953fb7e64118dde9aef60c9f32e7fbae6f04
SHA2565a96d3138009a90b8fb5b78c68e2196867d104d7dbf5825341381e0dd6b8af54
SHA512ceb2b46c3822b0b4d1aa81cda7023949e2261fa5763e778bebd3822bcadacfd076e0acff29e1b626c4ec263dd47cd88071a40a618827ed68b527de24bdc08422
-
Filesize
380KB
MD5532114fa642478b08275b8d69c414b4f
SHA14d34e959ad3b207c4f12073477a3718959aa4cf6
SHA256bf7a22a1b6c03b80b0b40ec0d128ccc817c28633e7902d0484513c82f3c21cc4
SHA512a7065e0933ea818e72d801cd38e370bede23d7818fa4adbb4f1ddcf5ec99c5df760856b354a95d2997159f4c087e532de9926f7006614d726fd2fda946863051
-
Filesize
380KB
MD5230758f8d273de95ea2e6634f086ad51
SHA1da22ecc0ae6675116d4d04e8636689f05116daa4
SHA256e584ff678dd245b78c8fc20316f7f7eee627a4b58700ba0e98249660512540bd
SHA512e390c95994f99ad91f8cb8340782b976d5babec568f298bede3034eb4b88683079d221e55da79671c650d84b947a0d952f2faad16d55672f67de1f133c4ececa