Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe
-
Size
380KB
-
MD5
8d8e5fbb390ed26cc694d682c7a09d50
-
SHA1
313d09cabfafc69a678f34d1eef3ea373e110f5f
-
SHA256
964349fda40fa6ab312a9e1b07f2190e2f3fd4f6e2108a191a86f6ee48ea334d
-
SHA512
0443759bcbce03e420a37a4a5f80dc733ea708157b469242020518b8cb0a36247d4eabd1b045ae6a4dc3d5539682c72cdc0b23a548df00bcb836f845b42d5c04
-
SSDEEP
3072:mEGh0oWlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGUl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c0000000144e4-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x003400000001471d-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000144e4-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e0000000144e4-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f0000000144e4-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00100000000144e4-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00110000000144e4-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E} {7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{219365C9-CAC4-479f-871B-162810B78FEC} 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}\stubpath = "C:\\Windows\\{8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe" {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{86F80281-7034-4334-A8AD-F4BC9D7301CB}\stubpath = "C:\\Windows\\{86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe" {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7ACDEEB-87D8-4291-90E4-13D6805205D4} {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F38532F5-C162-4d36-96B7-04DA1A636CC4}\stubpath = "C:\\Windows\\{F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe" {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E4D37BB9-146E-4570-A2F8-EFACB11DC43A} {219365C9-CAC4-479f-871B-162810B78FEC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1DFDA04F-9389-43a5-9EEC-93837B13120F} {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54198E71-3320-4f54-9FD5-20C54CA31AAC}\stubpath = "C:\\Windows\\{54198E71-3320-4f54-9FD5-20C54CA31AAC}.exe" {8836FDDB-A80E-402e-AF13-5637963C777A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7ACDEEB-87D8-4291-90E4-13D6805205D4}\stubpath = "C:\\Windows\\{A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe" {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F38532F5-C162-4d36-96B7-04DA1A636CC4} {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1DFDA04F-9389-43a5-9EEC-93837B13120F}\stubpath = "C:\\Windows\\{1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe" {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E}\stubpath = "C:\\Windows\\{3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E}.exe" {7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54198E71-3320-4f54-9FD5-20C54CA31AAC} {8836FDDB-A80E-402e-AF13-5637963C777A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3}\stubpath = "C:\\Windows\\{7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3}.exe" {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8836FDDB-A80E-402e-AF13-5637963C777A} {3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8836FDDB-A80E-402e-AF13-5637963C777A}\stubpath = "C:\\Windows\\{8836FDDB-A80E-402e-AF13-5637963C777A}.exe" {3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{219365C9-CAC4-479f-871B-162810B78FEC}\stubpath = "C:\\Windows\\{219365C9-CAC4-479f-871B-162810B78FEC}.exe" 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E4D37BB9-146E-4570-A2F8-EFACB11DC43A}\stubpath = "C:\\Windows\\{E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe" {219365C9-CAC4-479f-871B-162810B78FEC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648} {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{86F80281-7034-4334-A8AD-F4BC9D7301CB} {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3} {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe -
Deletes itself 1 IoCs
pid Process 3068 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2064 {219365C9-CAC4-479f-871B-162810B78FEC}.exe 2656 {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe 2748 {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe 2952 {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe 2972 {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe 2080 {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe 1332 {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe 2812 {7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3}.exe 1764 {3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E}.exe 2876 {8836FDDB-A80E-402e-AF13-5637963C777A}.exe 984 {54198E71-3320-4f54-9FD5-20C54CA31AAC}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe File created C:\Windows\{7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3}.exe {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe File created C:\Windows\{8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe File created C:\Windows\{A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe File created C:\Windows\{86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe File created C:\Windows\{F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe File created C:\Windows\{3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E}.exe {7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3}.exe File created C:\Windows\{8836FDDB-A80E-402e-AF13-5637963C777A}.exe {3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E}.exe File created C:\Windows\{54198E71-3320-4f54-9FD5-20C54CA31AAC}.exe {8836FDDB-A80E-402e-AF13-5637963C777A}.exe File created C:\Windows\{219365C9-CAC4-479f-871B-162810B78FEC}.exe 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe File created C:\Windows\{E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe {219365C9-CAC4-479f-871B-162810B78FEC}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1960 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe Token: SeIncBasePriorityPrivilege 2064 {219365C9-CAC4-479f-871B-162810B78FEC}.exe Token: SeIncBasePriorityPrivilege 2656 {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe Token: SeIncBasePriorityPrivilege 2748 {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe Token: SeIncBasePriorityPrivilege 2952 {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe Token: SeIncBasePriorityPrivilege 2972 {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe Token: SeIncBasePriorityPrivilege 2080 {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe Token: SeIncBasePriorityPrivilege 1332 {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe Token: SeIncBasePriorityPrivilege 2812 {7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3}.exe Token: SeIncBasePriorityPrivilege 1764 {3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E}.exe Token: SeIncBasePriorityPrivilege 2876 {8836FDDB-A80E-402e-AF13-5637963C777A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2064 1960 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe 28 PID 1960 wrote to memory of 2064 1960 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe 28 PID 1960 wrote to memory of 2064 1960 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe 28 PID 1960 wrote to memory of 2064 1960 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe 28 PID 1960 wrote to memory of 3068 1960 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe 29 PID 1960 wrote to memory of 3068 1960 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe 29 PID 1960 wrote to memory of 3068 1960 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe 29 PID 1960 wrote to memory of 3068 1960 2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe 29 PID 2064 wrote to memory of 2656 2064 {219365C9-CAC4-479f-871B-162810B78FEC}.exe 30 PID 2064 wrote to memory of 2656 2064 {219365C9-CAC4-479f-871B-162810B78FEC}.exe 30 PID 2064 wrote to memory of 2656 2064 {219365C9-CAC4-479f-871B-162810B78FEC}.exe 30 PID 2064 wrote to memory of 2656 2064 {219365C9-CAC4-479f-871B-162810B78FEC}.exe 30 PID 2064 wrote to memory of 2592 2064 {219365C9-CAC4-479f-871B-162810B78FEC}.exe 31 PID 2064 wrote to memory of 2592 2064 {219365C9-CAC4-479f-871B-162810B78FEC}.exe 31 PID 2064 wrote to memory of 2592 2064 {219365C9-CAC4-479f-871B-162810B78FEC}.exe 31 PID 2064 wrote to memory of 2592 2064 {219365C9-CAC4-479f-871B-162810B78FEC}.exe 31 PID 2656 wrote to memory of 2748 2656 {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe 32 PID 2656 wrote to memory of 2748 2656 {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe 32 PID 2656 wrote to memory of 2748 2656 {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe 32 PID 2656 wrote to memory of 2748 2656 {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe 32 PID 2656 wrote to memory of 2792 2656 {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe 33 PID 2656 wrote to memory of 2792 2656 {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe 33 PID 2656 wrote to memory of 2792 2656 {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe 33 PID 2656 wrote to memory of 2792 2656 {E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe 33 PID 2748 wrote to memory of 2952 2748 {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe 36 PID 2748 wrote to memory of 2952 2748 {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe 36 PID 2748 wrote to memory of 2952 2748 {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe 36 PID 2748 wrote to memory of 2952 2748 {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe 36 PID 2748 wrote to memory of 2960 2748 {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe 37 PID 2748 wrote to memory of 2960 2748 {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe 37 PID 2748 wrote to memory of 2960 2748 {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe 37 PID 2748 wrote to memory of 2960 2748 {8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe 37 PID 2952 wrote to memory of 2972 2952 {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe 38 PID 2952 wrote to memory of 2972 2952 {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe 38 PID 2952 wrote to memory of 2972 2952 {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe 38 PID 2952 wrote to memory of 2972 2952 {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe 38 PID 2952 wrote to memory of 2968 2952 {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe 39 PID 2952 wrote to memory of 2968 2952 {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe 39 PID 2952 wrote to memory of 2968 2952 {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe 39 PID 2952 wrote to memory of 2968 2952 {86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe 39 PID 2972 wrote to memory of 2080 2972 {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe 40 PID 2972 wrote to memory of 2080 2972 {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe 40 PID 2972 wrote to memory of 2080 2972 {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe 40 PID 2972 wrote to memory of 2080 2972 {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe 40 PID 2972 wrote to memory of 1632 2972 {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe 41 PID 2972 wrote to memory of 1632 2972 {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe 41 PID 2972 wrote to memory of 1632 2972 {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe 41 PID 2972 wrote to memory of 1632 2972 {A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe 41 PID 2080 wrote to memory of 1332 2080 {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe 42 PID 2080 wrote to memory of 1332 2080 {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe 42 PID 2080 wrote to memory of 1332 2080 {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe 42 PID 2080 wrote to memory of 1332 2080 {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe 42 PID 2080 wrote to memory of 2684 2080 {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe 43 PID 2080 wrote to memory of 2684 2080 {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe 43 PID 2080 wrote to memory of 2684 2080 {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe 43 PID 2080 wrote to memory of 2684 2080 {F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe 43 PID 1332 wrote to memory of 2812 1332 {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe 44 PID 1332 wrote to memory of 2812 1332 {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe 44 PID 1332 wrote to memory of 2812 1332 {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe 44 PID 1332 wrote to memory of 2812 1332 {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe 44 PID 1332 wrote to memory of 1952 1332 {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe 45 PID 1332 wrote to memory of 1952 1332 {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe 45 PID 1332 wrote to memory of 1952 1332 {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe 45 PID 1332 wrote to memory of 1952 1332 {1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-15_8d8e5fbb390ed26cc694d682c7a09d50_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\{219365C9-CAC4-479f-871B-162810B78FEC}.exeC:\Windows\{219365C9-CAC4-479f-871B-162810B78FEC}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\{E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exeC:\Windows\{E4D37BB9-146E-4570-A2F8-EFACB11DC43A}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\{8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exeC:\Windows\{8C50BBAE-4B5E-4d8b-8844-AE8B11DA5648}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\{86F80281-7034-4334-A8AD-F4BC9D7301CB}.exeC:\Windows\{86F80281-7034-4334-A8AD-F4BC9D7301CB}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\{A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exeC:\Windows\{A7ACDEEB-87D8-4291-90E4-13D6805205D4}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{F38532F5-C162-4d36-96B7-04DA1A636CC4}.exeC:\Windows\{F38532F5-C162-4d36-96B7-04DA1A636CC4}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\{1DFDA04F-9389-43a5-9EEC-93837B13120F}.exeC:\Windows\{1DFDA04F-9389-43a5-9EEC-93837B13120F}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\{7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3}.exeC:\Windows\{7EAFE0C7-FF72-4b8e-8DF0-188A63177CD3}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2812 -
C:\Windows\{3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E}.exeC:\Windows\{3DE5B6ED-717D-4c04-BDE3-0FCF0F20837E}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\{8836FDDB-A80E-402e-AF13-5637963C777A}.exeC:\Windows\{8836FDDB-A80E-402e-AF13-5637963C777A}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\{54198E71-3320-4f54-9FD5-20C54CA31AAC}.exeC:\Windows\{54198E71-3320-4f54-9FD5-20C54CA31AAC}.exe12⤵
- Executes dropped EXE
PID:984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8836F~1.EXE > nul12⤵PID:704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3DE5B~1.EXE > nul11⤵PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7EAFE~1.EXE > nul10⤵PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1DFDA~1.EXE > nul9⤵PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F3853~1.EXE > nul8⤵PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A7ACD~1.EXE > nul7⤵PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{86F80~1.EXE > nul6⤵PID:2968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C50B~1.EXE > nul5⤵PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E4D37~1.EXE > nul4⤵PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{21936~1.EXE > nul3⤵PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5bc82d7925d7fa69d62f450ab58d7b9b8
SHA1fac64e433fff549d5d0353d55143baf17f2d2d7a
SHA2562d65d0fafdbe986fd4f664428351569f223857f8b93f2cf1dec90f8825cb20ad
SHA512b09f8ef140ae14a11ad97ba7d9eac3ed6828be02fba65525c87c5c6ba5ec7b280487e48bcbc2f0db998e0e6bfee2e6d32eba0b81eb1482ee26ccf0a832bda204
-
Filesize
380KB
MD5f5d13f0d10d0575c626ed027593f1767
SHA170d7a99c1857b0ca2159cf698edb633996428ba4
SHA25670de17924e35788c603bb73b697e84eec62815737d25526db776f22aba581245
SHA512278b8cc8a396b4db6205fd558ccc6171ffdc1c21722b416a42e4faa0abf01d99b226052ca9d967d62adc1ec4d1fe8678fe02bd100c828e26781512e722dbd5d7
-
Filesize
380KB
MD516c310f2f20c57fc03399604307a8770
SHA17947b57ec439fb44ef926f05ef378ba575aa7cbe
SHA256ab6fd817ac3813669d0bfa354f8a67bf2ac42a1ff32de69d1f4db8944f6b12fb
SHA5126282d55955107225aa7e4a57fea9f550ebc832512013d570b700f914d842c04c2d55b6d9297e52cf33cbcfc42cc448d1ca397d79a64753a71a56d265c35b8e8d
-
Filesize
380KB
MD58f2c11bb5965830659c9219ea637b148
SHA15016994c04a7041ea482eda57adb63cb763913b2
SHA25649d65dc8625dee1f0baf805c40acd480d86ba407036942318fbe50ce66033ca5
SHA512fd05d9b58715d2c4ddd1a4c4c4d84567d93407faa16527e82e9cecff2bf58ed655188526aa14095a0c03d7d054d24844cee38042aac99a46e68decd6af59ba78
-
Filesize
380KB
MD50c8d40f164eb86d842977d4ea74872d6
SHA1ced27aa79c9fb86cdece34c57ea99be51e34b397
SHA2566fd038f88d6b3b181d2bccc3cb78f0950895de76e6c587666a1a15bbfb98755b
SHA512ca9d079b8bd43014f613ca3c981c29cd39b541b894e57de3f42f8eb5da8ae2bb5688563091166261120062a760b0d7c8d79ca06cb93269f1615cf28ba0c93fc1
-
Filesize
380KB
MD571da122c260b7326852a41660e4e87e4
SHA12b4570a4828bc88d9fb065d89670e8981101297d
SHA256d66a40e982cb25f7a982a1dd73625235fefa801ffd59ae75b5aad84cf0a20c4a
SHA5128e368a22329f6849fd689c1698e379167eb52835bdd1227720fe1e6ced60892c38e94dd942a9e5ecec4b022e0453f5fda17eee00696c5fb171057c2934004141
-
Filesize
380KB
MD5956de02d477c21305b50d5babc1b053b
SHA133036d7c504d400f9c9eb178a61e176ec5678a9a
SHA2561c6b42bd70d113b2007f74a1b94bff7830c5b2fcef1e2694c6ce63a463020d7c
SHA512ba2ef3ab3dd4f9db4e8f5b1893664aef79185e0b69fa2b9c63dee1493b6a7a719c6112f6c2890cca6dd9bad5708ea66108d0d77385d5c774221273bc28566c3c
-
Filesize
380KB
MD531536f77a012124f17e2326380c3b38f
SHA1823f78da0a0c0edf25c2af053487398281de7542
SHA2565e0cc7b025c899ae32c6e284e2b99ad8300464e2140861a0d730e27c0b76535c
SHA512192c1e3a1d75a8232b709ac15af56754aa530d4f82867f7a79a509b29051303cc966df5444e23b995023f1b428fb11d640b22aac999b1de194dbfe6ad2f7a746
-
Filesize
380KB
MD54837595385209381d42515d8e1589886
SHA18230bce700fe5397cfb9e88ddc2f2ff9afb2657b
SHA256d70478b227380acab006186573917cd171f7c954eb2c54fc6b94ed5a659ea6b0
SHA51270d80de3a042fbab61b91bf09cc106fe025c0dd8cb3c95c12ab340cfcce230b63f27c42a9e24c8e1d43604924a4ad696e87444bc39bd19fc77f9625e27182567
-
Filesize
380KB
MD5d3d6d321b9bc2197066f0d51354738dd
SHA1d17b6c774a99d93f40dfc7147e1b50d64cb5b689
SHA256bdc0430facb6a6fec280aa0f8cc4aa86aef491661fe048ab9cedb9f77806cf8e
SHA512028b73d397155be1d1d8c27471321cdd6281116e5da608e21c4f733bc9483afa94bd4da850e8ff3c0fd832c242354e5f520c45b987152d02871594f5006b4e35
-
Filesize
380KB
MD55d646abb8cb7d734900043a67e01ee93
SHA102fddec7c21c9858f9b777951a314f9b5d2be2a1
SHA256014a226a35c423f322dcf66369df574db3ba11d3920e907435a36101c706f272
SHA5120fe75180cd7c7221c083ad5302bb5b369500c66bb0cb80d8a44763f830bd2ca442f20e5105e2d97d6624e825f8858dee897ef6000fbd8c4f6156095efe729400