Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe
-
Size
204KB
-
MD5
c35bdb14c71df2b3388908bd921e1edc
-
SHA1
0fe10ff868dff1424ea4e382b563fd4a33d795c8
-
SHA256
2b80bb7e550f7e684c8371bdbfa8eb89194427229e5dbcb79fb106249e6db328
-
SHA512
36c9980271136fd41c8b7720bf764e61544f6a9554ff392cebb83acb1190558a10be360cb380e758dcff4f8231ad688781a9e72735a4c7be1dcf7132a579b781
-
SSDEEP
1536:1EGh0ocl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0ocl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x000d000000023b3e-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023b96-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023b9b-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023b9e-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023ba9-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023b9e-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023ba9-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c000000023b9e-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c000000023ba9-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d000000023b9e-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d000000023ba9-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000e000000023b9e-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DAC93B6-C2DA-4910-82B9-CFD563502866} {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DAC93B6-C2DA-4910-82B9-CFD563502866}\stubpath = "C:\\Windows\\{4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe" {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B74CA0BA-5F10-4299-8465-DCC3959E513D} {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FBA95611-7C16-4bc9-807A-DFC439960629} {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FBA95611-7C16-4bc9-807A-DFC439960629}\stubpath = "C:\\Windows\\{FBA95611-7C16-4bc9-807A-DFC439960629}.exe" {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8F071465-CE49-4dca-9452-E40F491EB162}\stubpath = "C:\\Windows\\{8F071465-CE49-4dca-9452-E40F491EB162}.exe" {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F33983C2-17A1-412d-A614-925E9ECD1233}\stubpath = "C:\\Windows\\{F33983C2-17A1-412d-A614-925E9ECD1233}.exe" 2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FC9382D-7F85-489d-819B-E3EC5EFBA00E}\stubpath = "C:\\Windows\\{4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe" {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FEDDAEF9-B0F6-47a0-8045-9C161424D186} {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BB5448F-A3D7-4871-AE57-2C267B934D38}\stubpath = "C:\\Windows\\{4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe" {FBA95611-7C16-4bc9-807A-DFC439960629}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8F071465-CE49-4dca-9452-E40F491EB162} {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{04819858-58ED-419e-A267-F97BDFEF3AC2} {8F071465-CE49-4dca-9452-E40F491EB162}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{051F2A8A-20C3-4b81-B979-A4805C64D1E7}\stubpath = "C:\\Windows\\{051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe" {F33983C2-17A1-412d-A614-925E9ECD1233}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{051F2A8A-20C3-4b81-B979-A4805C64D1E7} {F33983C2-17A1-412d-A614-925E9ECD1233}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FC9382D-7F85-489d-819B-E3EC5EFBA00E} {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B74CA0BA-5F10-4299-8465-DCC3959E513D}\stubpath = "C:\\Windows\\{B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe" {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BB5448F-A3D7-4871-AE57-2C267B934D38} {FBA95611-7C16-4bc9-807A-DFC439960629}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{04819858-58ED-419e-A267-F97BDFEF3AC2}\stubpath = "C:\\Windows\\{04819858-58ED-419e-A267-F97BDFEF3AC2}.exe" {8F071465-CE49-4dca-9452-E40F491EB162}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A} {04819858-58ED-419e-A267-F97BDFEF3AC2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A}\stubpath = "C:\\Windows\\{2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A}.exe" {04819858-58ED-419e-A267-F97BDFEF3AC2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F33983C2-17A1-412d-A614-925E9ECD1233} 2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1DD9D8BE-73DB-4cc4-AF68-CCBE06162ED7} {2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1DD9D8BE-73DB-4cc4-AF68-CCBE06162ED7}\stubpath = "C:\\Windows\\{1DD9D8BE-73DB-4cc4-AF68-CCBE06162ED7}.exe" {2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FEDDAEF9-B0F6-47a0-8045-9C161424D186}\stubpath = "C:\\Windows\\{FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe" {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe -
Executes dropped EXE 12 IoCs
pid Process 2036 {F33983C2-17A1-412d-A614-925E9ECD1233}.exe 5012 {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe 1952 {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe 1012 {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe 1452 {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe 4144 {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe 2588 {FBA95611-7C16-4bc9-807A-DFC439960629}.exe 2636 {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe 1020 {8F071465-CE49-4dca-9452-E40F491EB162}.exe 664 {04819858-58ED-419e-A267-F97BDFEF3AC2}.exe 3248 {2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A}.exe 4272 {1DD9D8BE-73DB-4cc4-AF68-CCBE06162ED7}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe File created C:\Windows\{B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe File created C:\Windows\{FBA95611-7C16-4bc9-807A-DFC439960629}.exe {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe File created C:\Windows\{8F071465-CE49-4dca-9452-E40F491EB162}.exe {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe File created C:\Windows\{F33983C2-17A1-412d-A614-925E9ECD1233}.exe 2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe File created C:\Windows\{051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe {F33983C2-17A1-412d-A614-925E9ECD1233}.exe File created C:\Windows\{4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe File created C:\Windows\{FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe File created C:\Windows\{2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A}.exe {04819858-58ED-419e-A267-F97BDFEF3AC2}.exe File created C:\Windows\{1DD9D8BE-73DB-4cc4-AF68-CCBE06162ED7}.exe {2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A}.exe File created C:\Windows\{4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe {FBA95611-7C16-4bc9-807A-DFC439960629}.exe File created C:\Windows\{04819858-58ED-419e-A267-F97BDFEF3AC2}.exe {8F071465-CE49-4dca-9452-E40F491EB162}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1000 2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe Token: SeIncBasePriorityPrivilege 2036 {F33983C2-17A1-412d-A614-925E9ECD1233}.exe Token: SeIncBasePriorityPrivilege 5012 {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe Token: SeIncBasePriorityPrivilege 1952 {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe Token: SeIncBasePriorityPrivilege 1012 {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe Token: SeIncBasePriorityPrivilege 1452 {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe Token: SeIncBasePriorityPrivilege 4144 {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe Token: SeIncBasePriorityPrivilege 2588 {FBA95611-7C16-4bc9-807A-DFC439960629}.exe Token: SeIncBasePriorityPrivilege 2636 {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe Token: SeIncBasePriorityPrivilege 1020 {8F071465-CE49-4dca-9452-E40F491EB162}.exe Token: SeIncBasePriorityPrivilege 664 {04819858-58ED-419e-A267-F97BDFEF3AC2}.exe Token: SeIncBasePriorityPrivilege 3248 {2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1000 wrote to memory of 2036 1000 2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe 86 PID 1000 wrote to memory of 2036 1000 2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe 86 PID 1000 wrote to memory of 2036 1000 2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe 86 PID 1000 wrote to memory of 1980 1000 2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe 87 PID 1000 wrote to memory of 1980 1000 2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe 87 PID 1000 wrote to memory of 1980 1000 2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe 87 PID 2036 wrote to memory of 5012 2036 {F33983C2-17A1-412d-A614-925E9ECD1233}.exe 88 PID 2036 wrote to memory of 5012 2036 {F33983C2-17A1-412d-A614-925E9ECD1233}.exe 88 PID 2036 wrote to memory of 5012 2036 {F33983C2-17A1-412d-A614-925E9ECD1233}.exe 88 PID 2036 wrote to memory of 3248 2036 {F33983C2-17A1-412d-A614-925E9ECD1233}.exe 89 PID 2036 wrote to memory of 3248 2036 {F33983C2-17A1-412d-A614-925E9ECD1233}.exe 89 PID 2036 wrote to memory of 3248 2036 {F33983C2-17A1-412d-A614-925E9ECD1233}.exe 89 PID 5012 wrote to memory of 1952 5012 {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe 92 PID 5012 wrote to memory of 1952 5012 {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe 92 PID 5012 wrote to memory of 1952 5012 {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe 92 PID 5012 wrote to memory of 4528 5012 {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe 93 PID 5012 wrote to memory of 4528 5012 {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe 93 PID 5012 wrote to memory of 4528 5012 {051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe 93 PID 1952 wrote to memory of 1012 1952 {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe 98 PID 1952 wrote to memory of 1012 1952 {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe 98 PID 1952 wrote to memory of 1012 1952 {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe 98 PID 1952 wrote to memory of 1232 1952 {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe 99 PID 1952 wrote to memory of 1232 1952 {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe 99 PID 1952 wrote to memory of 1232 1952 {4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe 99 PID 1012 wrote to memory of 1452 1012 {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe 101 PID 1012 wrote to memory of 1452 1012 {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe 101 PID 1012 wrote to memory of 1452 1012 {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe 101 PID 1012 wrote to memory of 4816 1012 {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe 102 PID 1012 wrote to memory of 4816 1012 {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe 102 PID 1012 wrote to memory of 4816 1012 {FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe 102 PID 1452 wrote to memory of 4144 1452 {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe 105 PID 1452 wrote to memory of 4144 1452 {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe 105 PID 1452 wrote to memory of 4144 1452 {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe 105 PID 1452 wrote to memory of 4896 1452 {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe 106 PID 1452 wrote to memory of 4896 1452 {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe 106 PID 1452 wrote to memory of 4896 1452 {4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe 106 PID 4144 wrote to memory of 2588 4144 {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe 107 PID 4144 wrote to memory of 2588 4144 {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe 107 PID 4144 wrote to memory of 2588 4144 {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe 107 PID 4144 wrote to memory of 1616 4144 {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe 108 PID 4144 wrote to memory of 1616 4144 {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe 108 PID 4144 wrote to memory of 1616 4144 {B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe 108 PID 2588 wrote to memory of 2636 2588 {FBA95611-7C16-4bc9-807A-DFC439960629}.exe 109 PID 2588 wrote to memory of 2636 2588 {FBA95611-7C16-4bc9-807A-DFC439960629}.exe 109 PID 2588 wrote to memory of 2636 2588 {FBA95611-7C16-4bc9-807A-DFC439960629}.exe 109 PID 2588 wrote to memory of 5060 2588 {FBA95611-7C16-4bc9-807A-DFC439960629}.exe 110 PID 2588 wrote to memory of 5060 2588 {FBA95611-7C16-4bc9-807A-DFC439960629}.exe 110 PID 2588 wrote to memory of 5060 2588 {FBA95611-7C16-4bc9-807A-DFC439960629}.exe 110 PID 2636 wrote to memory of 1020 2636 {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe 111 PID 2636 wrote to memory of 1020 2636 {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe 111 PID 2636 wrote to memory of 1020 2636 {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe 111 PID 2636 wrote to memory of 1660 2636 {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe 112 PID 2636 wrote to memory of 1660 2636 {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe 112 PID 2636 wrote to memory of 1660 2636 {4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe 112 PID 1020 wrote to memory of 664 1020 {8F071465-CE49-4dca-9452-E40F491EB162}.exe 113 PID 1020 wrote to memory of 664 1020 {8F071465-CE49-4dca-9452-E40F491EB162}.exe 113 PID 1020 wrote to memory of 664 1020 {8F071465-CE49-4dca-9452-E40F491EB162}.exe 113 PID 1020 wrote to memory of 2304 1020 {8F071465-CE49-4dca-9452-E40F491EB162}.exe 114 PID 1020 wrote to memory of 2304 1020 {8F071465-CE49-4dca-9452-E40F491EB162}.exe 114 PID 1020 wrote to memory of 2304 1020 {8F071465-CE49-4dca-9452-E40F491EB162}.exe 114 PID 664 wrote to memory of 3248 664 {04819858-58ED-419e-A267-F97BDFEF3AC2}.exe 115 PID 664 wrote to memory of 3248 664 {04819858-58ED-419e-A267-F97BDFEF3AC2}.exe 115 PID 664 wrote to memory of 3248 664 {04819858-58ED-419e-A267-F97BDFEF3AC2}.exe 115 PID 664 wrote to memory of 5016 664 {04819858-58ED-419e-A267-F97BDFEF3AC2}.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-27_c35bdb14c71df2b3388908bd921e1edc_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\{F33983C2-17A1-412d-A614-925E9ECD1233}.exeC:\Windows\{F33983C2-17A1-412d-A614-925E9ECD1233}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\{051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exeC:\Windows\{051F2A8A-20C3-4b81-B979-A4805C64D1E7}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\{4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exeC:\Windows\{4FC9382D-7F85-489d-819B-E3EC5EFBA00E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\{FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exeC:\Windows\{FEDDAEF9-B0F6-47a0-8045-9C161424D186}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\{4DAC93B6-C2DA-4910-82B9-CFD563502866}.exeC:\Windows\{4DAC93B6-C2DA-4910-82B9-CFD563502866}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\{B74CA0BA-5F10-4299-8465-DCC3959E513D}.exeC:\Windows\{B74CA0BA-5F10-4299-8465-DCC3959E513D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\{FBA95611-7C16-4bc9-807A-DFC439960629}.exeC:\Windows\{FBA95611-7C16-4bc9-807A-DFC439960629}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\{4BB5448F-A3D7-4871-AE57-2C267B934D38}.exeC:\Windows\{4BB5448F-A3D7-4871-AE57-2C267B934D38}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\{8F071465-CE49-4dca-9452-E40F491EB162}.exeC:\Windows\{8F071465-CE49-4dca-9452-E40F491EB162}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\{04819858-58ED-419e-A267-F97BDFEF3AC2}.exeC:\Windows\{04819858-58ED-419e-A267-F97BDFEF3AC2}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\{2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A}.exeC:\Windows\{2F1BC0CE-C6A7-4e76-B896-D19A517A0D1A}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3248 -
C:\Windows\{1DD9D8BE-73DB-4cc4-AF68-CCBE06162ED7}.exeC:\Windows\{1DD9D8BE-73DB-4cc4-AF68-CCBE06162ED7}.exe13⤵
- Executes dropped EXE
PID:4272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2F1BC~1.EXE > nul13⤵PID:1528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{04819~1.EXE > nul12⤵PID:5016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F071~1.EXE > nul11⤵PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4BB54~1.EXE > nul10⤵PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FBA95~1.EXE > nul9⤵PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B74CA~1.EXE > nul8⤵PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4DAC9~1.EXE > nul7⤵PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FEDDA~1.EXE > nul6⤵PID:4816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4FC93~1.EXE > nul5⤵PID:1232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{051F2~1.EXE > nul4⤵PID:4528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F3398~1.EXE > nul3⤵PID:3248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5d6fe51e407069d98581f4194b34278c4
SHA1b6f7c626546a4deb850fbee951aee206582bf52c
SHA256d3c2d4b78d8595acb7bece9fb399889287f8ecd001be6220ee98b5ac50e20a76
SHA512e9f076f53a77d39fb41657613d2d29d40adbd5d66bc77eadcd33014f587dc1fb2414c133bbcb84ed63b0f59d3d6a023f6d71bfd588cb012f401465154245808b
-
Filesize
204KB
MD58d9b269ea0899c346ba9398edba26583
SHA11cd36cd5a8184eb94198f7263491a4e3de73bec6
SHA2568fd58886a97eaff75321607b4b98210a23db959881111558579cacc5f5645893
SHA512a45d544bc756eba7130c6192fa48898c1ea0fe8c5dde83f61514760df581aae10440121cd9070bdbb93f7f9266ec29113694c1b3b876ea86b1f76d4c3b248db1
-
Filesize
204KB
MD5bc6bcef086da0066de9e8e36053c917f
SHA144f6073c6fd19199ab4838a40b345eba10ba48a5
SHA2561d9c8d8ba4814d5ec5b8fc65f4f067066c9bf0147e571a2da6549e45d0aacaac
SHA5127b0a338f25edc091e796f2e81aa01681797ed4ac0c368263b088c877c6f79ebffb05d6ee90317fde86194f123eea07cc4a8766bd7e43f1ca256b348d51c6a9c9
-
Filesize
204KB
MD59dac8ed8ea53b6fb2303d44749db29d6
SHA1f21fc85a5772b42386c2cc45df7084ee81c523f9
SHA256cbd4cf2e34fe9252312e4d6d6f19e219b5a7780d8a8656a15d6dc622b3e5594d
SHA5124d32be7a082008a7a76a35a9c48017eeeeaef83197051287d5ecc3a034dd042d98e228f2c4fd67dad01e61ae60c7895c29a674818ce6ef8d868eff78f67514b4
-
Filesize
204KB
MD5ad64797d9b659ff802fdc8709547c0ad
SHA1291e4d1f7dfcd1f01add7af664d2e74c7a5cfe9c
SHA256e45b8441ef70fdcd204705346b2dfec9a3ab4fa2ed4c5b0adce4538885c1da81
SHA512b850ac3da1769e53bcf42c5e6809a7b92edd9f11392b22ad07c4eb5cbd3eb9d02440cdc2565ce47a09bde2d18f3c7953d9bc0b1581852fea1eeffc1747be84f3
-
Filesize
204KB
MD5e16376071bdcff45e94d4e00f6327167
SHA1bd9d184a15b8e7d15f454569c84a26232f15e543
SHA256a25a82c09952d6a8122a50917ca9707e95104ceb2426d1aa383bce00f9b1d2b6
SHA5127cebec3f819f2faffc3496f9500763b59bfdd7ad7c52df138bc581575f6d860d286b814f15ef93e071adc33004ceb3866b1c02ba38309f2a0d8235cf95b42155
-
Filesize
204KB
MD501578570b344ef6534a11bea6b6b2637
SHA1953c47f0ba6c1d74835f50be3af796f307ad2ef6
SHA2565603ff5a1c6ace8e8d60f90898df5db17a909ed5c60a92dee22dfcc5eb896542
SHA5123b426098588a0115515834c091e20d893a65c8f8d66f0e9f3b97b9f1ca54b923afa447165fedbbe2c783752b37c1ffba9203f0b5e42fd7e3293e907cf882db75
-
Filesize
204KB
MD5b762a242d8e7cd060f1795180a40c3d9
SHA1065a4cc697c71bae95155009c6ae3a9d3555d1f1
SHA2568c2e6dee4cbf3d8333d427e6e3575b0dff5d833dd649d37849f99a325c18c126
SHA512689d0dfe25f3678773504df271a02c2e0cde3fe5ff5f12c3143ba74eb0d01bc3f94d6cb7cf34dab587256b150e63bf8fc810ef0dc496fb58337c8b084080a4a8
-
Filesize
204KB
MD5355b04954f34908ea24cf8cf021cacc2
SHA17f8091337ee64098391b1b92c6c4a32c93d568ef
SHA25653712d1b721182334f7f9fd0fe4293089ee52d5a5546d636c0701038d1812e16
SHA51264f9abb37a8958156a5d514f53d36692739e164b08a7e7c07c86ef5fd3df4dedcc2f68cc9fad8ea57db55bf840fd0fdc78d3fa13c40bdb8863bc21057d8ee17d
-
Filesize
204KB
MD598ab7c38a74da7c45a4051b5a3e283b5
SHA1600ec505e2de80bec47600914fb8b2500dbd5ea1
SHA256510752dc1483f0d8b89459151aaf8abea3ea93619f1d1727da3c255410e3e037
SHA512ba42c815084e26aa04631dfe0e5a483576aad66d35d0fd083a3a247201b05d19023b951b67379d329d23bf93d42a0781b3197adc0f07a8cbd40df4aa908caf6b
-
Filesize
204KB
MD51389cd6672e0c3167b608c19ff3f1083
SHA178f0405c7548fdce09bad4840105ca92a5ebe2f6
SHA256e94d5769cf90acae42b3c5aa042de5c2ac380711eb4e0aa1db81f979f62d755f
SHA51266d014cdb252aa0a0501147792b15f77e2dcfd0743630c6fd64c32084e1f1bb749b5289c4244814a8b47a3d42bbaf55296ce545171697400c4621dad1be24bd6
-
Filesize
204KB
MD5831294f59640a3d622ce2530c27925fb
SHA121a181790a162b46b621f5629a91625e5ae292d2
SHA256ab778b0c8def75d6b54b5601bd3a472f8cc325ceaf8f261ee06b664deb09ab09
SHA512efa7f2a572dbb20bc1c0138bc8af461f4cc175f64a0ba328f399bd6275d8a5d7253ea7d44a3561c24f243dd6a66710ae8b91b7b97a9a3fe4afc7d7a740d17661