Analysis
-
max time kernel
149s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe
-
Size
204KB
-
MD5
1d6c6704eb0d88b6347cddbf1f93ceb8
-
SHA1
04a49bd444bc171ee46805da8de2db82424e87cb
-
SHA256
8d0152315343f712f4035288bd40689f7829d813d58fe6fe0541b8ca430dec59
-
SHA512
17a58c72f73f43266abc650df27bae775b13d95666529dce12aedee41fe89334d61c7180514be5493ee17fd2a8cdf33140105a8cdf3c45392fd5a391c952fce6
-
SSDEEP
1536:1EGh0oNl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oNl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x000800000002339d-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x001400000002341d-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d000000023382-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x001500000002341d-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000e000000023382-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x001800000002341d-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000f000000023382-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000021ec4-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023431-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000021ec4-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023431-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c000000023383-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B74F11C4-51E8-4d92-BD66-AA8ED7294FFE} {9D385D28-3F59-4928-B230-167B8091F092}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0FD55384-BA27-425a-954A-4FA633AF1DD2} {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0FD55384-BA27-425a-954A-4FA633AF1DD2}\stubpath = "C:\\Windows\\{0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe" {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD21E757-7367-455d-89E0-9E52F6A819A5} {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AB4629D1-476E-453d-BE93-E79C00B13916} {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05623F18-87BC-4e98-BC18-534764F7E3A5} {188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{291B8433-9D43-4533-8AA8-CD66045E8233}\stubpath = "C:\\Windows\\{291B8433-9D43-4533-8AA8-CD66045E8233}.exe" {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AB4629D1-476E-453d-BE93-E79C00B13916}\stubpath = "C:\\Windows\\{AB4629D1-476E-453d-BE93-E79C00B13916}.exe" {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9D385D28-3F59-4928-B230-167B8091F092} {AB4629D1-476E-453d-BE93-E79C00B13916}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9D385D28-3F59-4928-B230-167B8091F092}\stubpath = "C:\\Windows\\{9D385D28-3F59-4928-B230-167B8091F092}.exe" {AB4629D1-476E-453d-BE93-E79C00B13916}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD21E757-7367-455d-89E0-9E52F6A819A5}\stubpath = "C:\\Windows\\{CD21E757-7367-455d-89E0-9E52F6A819A5}.exe" {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4504AF7F-E80D-4f6c-8AE5-937F8BC316E2} {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}\stubpath = "C:\\Windows\\{4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe" {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{188AB7D8-DD04-4a07-8563-ACD305941C0E} {57355278-268E-4283-829C-5F7521FB4E7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F882B550-9354-4ca1-BC24-910196BBB6EA} 2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F882B550-9354-4ca1-BC24-910196BBB6EA}\stubpath = "C:\\Windows\\{F882B550-9354-4ca1-BC24-910196BBB6EA}.exe" 2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92609EF4-7588-4419-A0DE-4FE1340DFD6C} {291B8433-9D43-4533-8AA8-CD66045E8233}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92609EF4-7588-4419-A0DE-4FE1340DFD6C}\stubpath = "C:\\Windows\\{92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe" {291B8433-9D43-4533-8AA8-CD66045E8233}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05623F18-87BC-4e98-BC18-534764F7E3A5}\stubpath = "C:\\Windows\\{05623F18-87BC-4e98-BC18-534764F7E3A5}.exe" {188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{188AB7D8-DD04-4a07-8563-ACD305941C0E}\stubpath = "C:\\Windows\\{188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe" {57355278-268E-4283-829C-5F7521FB4E7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{291B8433-9D43-4533-8AA8-CD66045E8233} {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}\stubpath = "C:\\Windows\\{B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe" {9D385D28-3F59-4928-B230-167B8091F092}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57355278-268E-4283-829C-5F7521FB4E7C} {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57355278-268E-4283-829C-5F7521FB4E7C}\stubpath = "C:\\Windows\\{57355278-268E-4283-829C-5F7521FB4E7C}.exe" {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe -
Executes dropped EXE 12 IoCs
pid Process 4048 {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe 316 {291B8433-9D43-4533-8AA8-CD66045E8233}.exe 1692 {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe 4420 {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe 4500 {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe 3696 {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe 4348 {AB4629D1-476E-453d-BE93-E79C00B13916}.exe 4100 {9D385D28-3F59-4928-B230-167B8091F092}.exe 316 {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe 4492 {57355278-268E-4283-829C-5F7521FB4E7C}.exe 3256 {188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe 4500 {05623F18-87BC-4e98-BC18-534764F7E3A5}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{57355278-268E-4283-829C-5F7521FB4E7C}.exe {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe File created C:\Windows\{188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe {57355278-268E-4283-829C-5F7521FB4E7C}.exe File created C:\Windows\{B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe {9D385D28-3F59-4928-B230-167B8091F092}.exe File created C:\Windows\{291B8433-9D43-4533-8AA8-CD66045E8233}.exe {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe File created C:\Windows\{92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe {291B8433-9D43-4533-8AA8-CD66045E8233}.exe File created C:\Windows\{0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe File created C:\Windows\{CD21E757-7367-455d-89E0-9E52F6A819A5}.exe {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe File created C:\Windows\{4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe File created C:\Windows\{AB4629D1-476E-453d-BE93-E79C00B13916}.exe {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe File created C:\Windows\{9D385D28-3F59-4928-B230-167B8091F092}.exe {AB4629D1-476E-453d-BE93-E79C00B13916}.exe File created C:\Windows\{F882B550-9354-4ca1-BC24-910196BBB6EA}.exe 2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe File created C:\Windows\{05623F18-87BC-4e98-BC18-534764F7E3A5}.exe {188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 312 2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe Token: SeIncBasePriorityPrivilege 4048 {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe Token: SeIncBasePriorityPrivilege 316 {291B8433-9D43-4533-8AA8-CD66045E8233}.exe Token: SeIncBasePriorityPrivilege 1692 {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe Token: SeIncBasePriorityPrivilege 4420 {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe Token: SeIncBasePriorityPrivilege 4500 {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe Token: SeIncBasePriorityPrivilege 3696 {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe Token: SeIncBasePriorityPrivilege 4348 {AB4629D1-476E-453d-BE93-E79C00B13916}.exe Token: SeIncBasePriorityPrivilege 4100 {9D385D28-3F59-4928-B230-167B8091F092}.exe Token: SeIncBasePriorityPrivilege 316 {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe Token: SeIncBasePriorityPrivilege 4492 {57355278-268E-4283-829C-5F7521FB4E7C}.exe Token: SeIncBasePriorityPrivilege 3256 {188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 312 wrote to memory of 4048 312 2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe 95 PID 312 wrote to memory of 4048 312 2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe 95 PID 312 wrote to memory of 4048 312 2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe 95 PID 312 wrote to memory of 944 312 2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe 96 PID 312 wrote to memory of 944 312 2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe 96 PID 312 wrote to memory of 944 312 2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe 96 PID 4048 wrote to memory of 316 4048 {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe 97 PID 4048 wrote to memory of 316 4048 {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe 97 PID 4048 wrote to memory of 316 4048 {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe 97 PID 4048 wrote to memory of 3948 4048 {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe 98 PID 4048 wrote to memory of 3948 4048 {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe 98 PID 4048 wrote to memory of 3948 4048 {F882B550-9354-4ca1-BC24-910196BBB6EA}.exe 98 PID 316 wrote to memory of 1692 316 {291B8433-9D43-4533-8AA8-CD66045E8233}.exe 101 PID 316 wrote to memory of 1692 316 {291B8433-9D43-4533-8AA8-CD66045E8233}.exe 101 PID 316 wrote to memory of 1692 316 {291B8433-9D43-4533-8AA8-CD66045E8233}.exe 101 PID 316 wrote to memory of 2600 316 {291B8433-9D43-4533-8AA8-CD66045E8233}.exe 102 PID 316 wrote to memory of 2600 316 {291B8433-9D43-4533-8AA8-CD66045E8233}.exe 102 PID 316 wrote to memory of 2600 316 {291B8433-9D43-4533-8AA8-CD66045E8233}.exe 102 PID 1692 wrote to memory of 4420 1692 {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe 103 PID 1692 wrote to memory of 4420 1692 {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe 103 PID 1692 wrote to memory of 4420 1692 {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe 103 PID 1692 wrote to memory of 2548 1692 {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe 104 PID 1692 wrote to memory of 2548 1692 {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe 104 PID 1692 wrote to memory of 2548 1692 {92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe 104 PID 4420 wrote to memory of 4500 4420 {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe 105 PID 4420 wrote to memory of 4500 4420 {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe 105 PID 4420 wrote to memory of 4500 4420 {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe 105 PID 4420 wrote to memory of 2180 4420 {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe 106 PID 4420 wrote to memory of 2180 4420 {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe 106 PID 4420 wrote to memory of 2180 4420 {0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe 106 PID 4500 wrote to memory of 3696 4500 {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe 108 PID 4500 wrote to memory of 3696 4500 {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe 108 PID 4500 wrote to memory of 3696 4500 {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe 108 PID 4500 wrote to memory of 4052 4500 {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe 109 PID 4500 wrote to memory of 4052 4500 {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe 109 PID 4500 wrote to memory of 4052 4500 {CD21E757-7367-455d-89E0-9E52F6A819A5}.exe 109 PID 3696 wrote to memory of 4348 3696 {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe 110 PID 3696 wrote to memory of 4348 3696 {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe 110 PID 3696 wrote to memory of 4348 3696 {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe 110 PID 3696 wrote to memory of 2960 3696 {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe 111 PID 3696 wrote to memory of 2960 3696 {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe 111 PID 3696 wrote to memory of 2960 3696 {4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe 111 PID 4348 wrote to memory of 4100 4348 {AB4629D1-476E-453d-BE93-E79C00B13916}.exe 114 PID 4348 wrote to memory of 4100 4348 {AB4629D1-476E-453d-BE93-E79C00B13916}.exe 114 PID 4348 wrote to memory of 4100 4348 {AB4629D1-476E-453d-BE93-E79C00B13916}.exe 114 PID 4348 wrote to memory of 5016 4348 {AB4629D1-476E-453d-BE93-E79C00B13916}.exe 115 PID 4348 wrote to memory of 5016 4348 {AB4629D1-476E-453d-BE93-E79C00B13916}.exe 115 PID 4348 wrote to memory of 5016 4348 {AB4629D1-476E-453d-BE93-E79C00B13916}.exe 115 PID 4100 wrote to memory of 316 4100 {9D385D28-3F59-4928-B230-167B8091F092}.exe 120 PID 4100 wrote to memory of 316 4100 {9D385D28-3F59-4928-B230-167B8091F092}.exe 120 PID 4100 wrote to memory of 316 4100 {9D385D28-3F59-4928-B230-167B8091F092}.exe 120 PID 4100 wrote to memory of 4376 4100 {9D385D28-3F59-4928-B230-167B8091F092}.exe 121 PID 4100 wrote to memory of 4376 4100 {9D385D28-3F59-4928-B230-167B8091F092}.exe 121 PID 4100 wrote to memory of 4376 4100 {9D385D28-3F59-4928-B230-167B8091F092}.exe 121 PID 316 wrote to memory of 4492 316 {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe 122 PID 316 wrote to memory of 4492 316 {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe 122 PID 316 wrote to memory of 4492 316 {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe 122 PID 316 wrote to memory of 5096 316 {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe 123 PID 316 wrote to memory of 5096 316 {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe 123 PID 316 wrote to memory of 5096 316 {B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe 123 PID 4492 wrote to memory of 3256 4492 {57355278-268E-4283-829C-5F7521FB4E7C}.exe 124 PID 4492 wrote to memory of 3256 4492 {57355278-268E-4283-829C-5F7521FB4E7C}.exe 124 PID 4492 wrote to memory of 3256 4492 {57355278-268E-4283-829C-5F7521FB4E7C}.exe 124 PID 4492 wrote to memory of 3768 4492 {57355278-268E-4283-829C-5F7521FB4E7C}.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\{F882B550-9354-4ca1-BC24-910196BBB6EA}.exeC:\Windows\{F882B550-9354-4ca1-BC24-910196BBB6EA}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\{291B8433-9D43-4533-8AA8-CD66045E8233}.exeC:\Windows\{291B8433-9D43-4533-8AA8-CD66045E8233}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\{92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exeC:\Windows\{92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\{0FD55384-BA27-425a-954A-4FA633AF1DD2}.exeC:\Windows\{0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\{CD21E757-7367-455d-89E0-9E52F6A819A5}.exeC:\Windows\{CD21E757-7367-455d-89E0-9E52F6A819A5}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\{4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exeC:\Windows\{4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\{AB4629D1-476E-453d-BE93-E79C00B13916}.exeC:\Windows\{AB4629D1-476E-453d-BE93-E79C00B13916}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\{9D385D28-3F59-4928-B230-167B8091F092}.exeC:\Windows\{9D385D28-3F59-4928-B230-167B8091F092}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\{B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exeC:\Windows\{B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\{57355278-268E-4283-829C-5F7521FB4E7C}.exeC:\Windows\{57355278-268E-4283-829C-5F7521FB4E7C}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\{188AB7D8-DD04-4a07-8563-ACD305941C0E}.exeC:\Windows\{188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3256 -
C:\Windows\{05623F18-87BC-4e98-BC18-534764F7E3A5}.exeC:\Windows\{05623F18-87BC-4e98-BC18-534764F7E3A5}.exe13⤵
- Executes dropped EXE
PID:4500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{188AB~1.EXE > nul13⤵PID:784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{57355~1.EXE > nul12⤵PID:3768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B74F1~1.EXE > nul11⤵PID:5096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9D385~1.EXE > nul10⤵PID:4376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AB462~1.EXE > nul9⤵PID:5016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4504A~1.EXE > nul8⤵PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CD21E~1.EXE > nul7⤵PID:4052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0FD55~1.EXE > nul6⤵PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{92609~1.EXE > nul5⤵PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{291B8~1.EXE > nul4⤵PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F882B~1.EXE > nul3⤵PID:3948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD505af0608ab9667ca82633abecc8f366e
SHA1d69cce6f53c4d59912742cc76cce41596ea3604c
SHA2564fe19aedd9a547d2b34029afe48155de8bf88194c6181276365eef8c78b22fda
SHA5123cce11bab92d115026aef1036ec6373bea863961f9973acddc937523a19fcd6aee26b04cfc4f9ea41a3428329e157348af743acdaf5fde6d0cc0b49d8be520fa
-
Filesize
204KB
MD5dc9493998edd486a10470fe0b62f27a2
SHA179ccdc3132d9a3964526fa0504ec23b841f74951
SHA2564e2da50a2a5a15f28a1f936d91b92fac286ab814d2f6e68efea347250b47eb51
SHA512b982754a9588def3f89814b6c61419472389ca815191ba8a55add9422862bc90ac0466a592535bf76775c8dedc2016c96966af7f1f8c45ea3d46c737d763037a
-
Filesize
204KB
MD5206f241bea3c193cfb3d12fe04b6d61b
SHA169ab27696a62a970cebfd5ca6486b40a6e0a1bc3
SHA2561bcab5bc59757d80265952b49e4bced4b466a99f7fa09308eebaf6e4b39d2981
SHA512b5c5467a647cefa162394d8abc7be21484230b862bfcd26a0cf6517d2431383a2b2d58317a6407cf1b660c4f417e69df28cdedad55d9d2dd447e6a5110a8a3bf
-
Filesize
204KB
MD5ee9de2c4533b5d047bafe4162a981017
SHA1f1b269e40ed846a053a599c08f694f8c3ca2bd4b
SHA256e987a4baa7c31b3878d2f5460487254f25f1b43fea2f39e8fab94f60f699802e
SHA5127cccb5d413350bf68f4ae2156a466612d611737d6633a70310c315d3c5b42ce11bc2b17c6098365ce40b2df5a45f011c0155e4825ca54ef913e4f84f94f46b7f
-
Filesize
204KB
MD591a3ab8d77df33c3b9d85379c351d860
SHA1359f1478953a57fe6fd27173a43967abd13b5f3b
SHA25633794ae6b58a4c2ace2ec870b1b0ce4a1f825927e509412c436e2386cde0b3db
SHA512396090b52f46e2f9052d3c572683f494fc2460f576a8c9751d6d8fbcd3cbd47293c72c6844b47cc2b930a73fab13bc8cfb9e8e82780e12ffed39d3c0eeb1cec2
-
Filesize
204KB
MD520db6cd7ba2285bbd40ff89df7d9685f
SHA1e7cfcdf5c82cec3b30b5780100e89c6cde9c7aef
SHA256867809aa3ba66404bd1426f2b8e8b070a5dcb01a26b8b33a2fb34d63585c76de
SHA512d57eca2449c01cb5f7ae7b28b6acc2cd93c5dad6e94e86ef1bdbf1190cd4b497d61ac289e7f39b9d65dd303ba317b8dae578f276ffb091aa9ec36ca787c10230
-
Filesize
204KB
MD56d34ccf870f9fa14505556951542a311
SHA1111311f5482fe0643fd473303fc486a58ea6dc62
SHA25624a669799e8dfe54eb92dc8b3d66eb946cad2b37f228efdb64c11f41642918a4
SHA512e5c571526c74a5a12a9c51fb123cea7e50777d5c2326a812fafde35ce9f7ba4080f2c16630639ee24797828957763f49eb588ff36a1366409e5374e6c3f627c9
-
Filesize
204KB
MD519858a981b87c9d023acc72bc1a3aca3
SHA1602590edab82afd92a070154f9d97227a2bb9fd9
SHA25678aceac18bca13acbcd4fdf807c0eae9dcf7b8143c49b3f67819f94188720006
SHA5122bf1cac887b45b036b2a138aa3886ef804b63266b3b039e8fb27fdc4493168c8a7c26a367fd89a4093fd6481ff94750c21444f628f15f0eb8249e755b3d679c2
-
Filesize
204KB
MD54b4cbb46ed9240c22bf8c60468f81da9
SHA1622e3d00eb3c5ae720b09ddaaeea2349440706d0
SHA256bf78d25e084974b63a252356954f784c562562fd5e59c0aa85323cb92b7a8991
SHA5124daac03efbe8fd9cf4a885000397d0aa2914b66d980259b3497892e0cdc41650a4190f19609055da6d1f78c83c34a3ca073bfc022c2a9102fd2fcd6adaab6dc6
-
Filesize
204KB
MD5d7ca4ab0573276ad2b085f8e1ccdea64
SHA1939599732898277c99b5a86082d88503da79ac01
SHA2569764224d66a4f20a411da680eaeed1c7e9321588e24f46b734da424e636f9ab0
SHA512ec05b747930aa82fab28639833c0ce54973dbc343f9b01e4642ed0c1d2fe4eb898c9a9690d168bee60a40f56afa9a955df351bd95060e8955169c30b97b86bed
-
Filesize
204KB
MD5bb2731da310e2be3130d8ce7824fb3f5
SHA1aee893239c2dfb3a8760e95927c1e8e798dbb5f1
SHA256d9d0677cb64721c92a3d510975d54a24c097eefbd0a60426eb617ecd545dc00c
SHA512e3422374082b088d241bc773094f216f80cc5b243eb43016649d0cf787e0a4c5d00be0f21da238cd247941cfb8453d195fd88f9e029b42bf6fb55d2ea5565109
-
Filesize
204KB
MD5221ac481105e2e842bacd79cc3afc1ac
SHA16166802baea537b830452f0d6778abd4963a0d63
SHA25609ef0d7680f88351d42088c09ca563db28ffaed643e900fcc1946deea2085a24
SHA512e1f74ad7ce79136c12be3413bbab131064c6a782a59b6259955efc1fdd025a590b2a88f768d0eb24d3ebb049ef0ae732958d1f705103dd0d63234cd3c8b5c3ce