Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe
-
Size
344KB
-
MD5
18c6c72a6cd0f4c5467ecd508f1d0589
-
SHA1
67f029f42d97b862814c633916d39c8a870c534b
-
SHA256
d98641d61dacb607746b68bc86a2da88b87e7081deeeba22902deda5de6adf58
-
SHA512
64de8a0ea565e108af99e8464fe4d84cfcc6df21525d09b4b179774dc6b2f1bd00491952cf2365a6fc03a394f238aabb204481cb9f5f7db679a4095adc1c1a9e
-
SSDEEP
3072:mEGh0o3QlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEc:mEGKlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Auto-generated rule 10 IoCs
resource yara_rule behavioral1/files/0x0009000000016d24-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000016d84-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000016d24-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000016d84-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000016d24-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000016d89-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000016d24-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000700000001704f-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000016d24-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000017090-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C99AAD80-7566-4162-9192-E706CB3CDCE7} {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07FA35F6-425F-4d2f-86E6-84414D803807}\stubpath = "C:\\Windows\\{07FA35F6-425F-4d2f-86E6-84414D803807}.exe" {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{724257DB-95F4-404b-8CA3-7984792C727E} {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{724257DB-95F4-404b-8CA3-7984792C727E}\stubpath = "C:\\Windows\\{724257DB-95F4-404b-8CA3-7984792C727E}.exe" {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{48B75BB2-62F5-400b-9728-A5ACB98CD792}\stubpath = "C:\\Windows\\{48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe" {07FA35F6-425F-4d2f-86E6-84414D803807}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E27EFBB-8893-47d0-A286-F43BFEA9A2F0} {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}\stubpath = "C:\\Windows\\{9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe" {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{78D941AE-A97A-4e5c-B517-45CC558CED66}\stubpath = "C:\\Windows\\{78D941AE-A97A-4e5c-B517-45CC558CED66}.exe" {724257DB-95F4-404b-8CA3-7984792C727E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07FA35F6-425F-4d2f-86E6-84414D803807} {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF7CDA4B-0A37-4414-9C67-4A628D6770B7} {233DDC87-093D-4cca-A955-4DA99D91F433}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF7CDA4B-0A37-4414-9C67-4A628D6770B7}\stubpath = "C:\\Windows\\{EF7CDA4B-0A37-4414-9C67-4A628D6770B7}.exe" {233DDC87-093D-4cca-A955-4DA99D91F433}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}\stubpath = "C:\\Windows\\{8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe" 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{233DDC87-093D-4cca-A955-4DA99D91F433} {02DB3B4D-2A73-43bf-B137-0539CEA8224C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C99AAD80-7566-4162-9192-E706CB3CDCE7}\stubpath = "C:\\Windows\\{C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe" {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{48B75BB2-62F5-400b-9728-A5ACB98CD792} {07FA35F6-425F-4d2f-86E6-84414D803807}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{02DB3B4D-2A73-43bf-B137-0539CEA8224C} {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{02DB3B4D-2A73-43bf-B137-0539CEA8224C}\stubpath = "C:\\Windows\\{02DB3B4D-2A73-43bf-B137-0539CEA8224C}.exe" {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{233DDC87-093D-4cca-A955-4DA99D91F433}\stubpath = "C:\\Windows\\{233DDC87-093D-4cca-A955-4DA99D91F433}.exe" {02DB3B4D-2A73-43bf-B137-0539CEA8224C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A} 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{78D941AE-A97A-4e5c-B517-45CC558CED66} {724257DB-95F4-404b-8CA3-7984792C727E}.exe -
Deletes itself 1 IoCs
pid Process 1532 cmd.exe -
Executes dropped EXE 10 IoCs
pid Process 1116 {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe 1964 {724257DB-95F4-404b-8CA3-7984792C727E}.exe 592 {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe 1736 {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe 696 {07FA35F6-425F-4d2f-86E6-84414D803807}.exe 1136 {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe 2628 {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe 2700 {02DB3B4D-2A73-43bf-B137-0539CEA8224C}.exe 1824 {233DDC87-093D-4cca-A955-4DA99D91F433}.exe 2964 {EF7CDA4B-0A37-4414-9C67-4A628D6770B7}.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\{8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe File created C:\Windows\{724257DB-95F4-404b-8CA3-7984792C727E}.exe {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe File created C:\Windows\{78D941AE-A97A-4e5c-B517-45CC558CED66}.exe {724257DB-95F4-404b-8CA3-7984792C727E}.exe File created C:\Windows\{C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe File created C:\Windows\{233DDC87-093D-4cca-A955-4DA99D91F433}.exe {02DB3B4D-2A73-43bf-B137-0539CEA8224C}.exe File created C:\Windows\{07FA35F6-425F-4d2f-86E6-84414D803807}.exe {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe File created C:\Windows\{48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe {07FA35F6-425F-4d2f-86E6-84414D803807}.exe File created C:\Windows\{9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe File created C:\Windows\{02DB3B4D-2A73-43bf-B137-0539CEA8224C}.exe {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe File created C:\Windows\{EF7CDA4B-0A37-4414-9C67-4A628D6770B7}.exe {233DDC87-093D-4cca-A955-4DA99D91F433}.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2336 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe Token: SeIncBasePriorityPrivilege 1116 {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe Token: SeIncBasePriorityPrivilege 1964 {724257DB-95F4-404b-8CA3-7984792C727E}.exe Token: SeIncBasePriorityPrivilege 592 {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe Token: SeIncBasePriorityPrivilege 1736 {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe Token: SeIncBasePriorityPrivilege 696 {07FA35F6-425F-4d2f-86E6-84414D803807}.exe Token: SeIncBasePriorityPrivilege 1136 {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe Token: SeIncBasePriorityPrivilege 2628 {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe Token: SeIncBasePriorityPrivilege 2700 {02DB3B4D-2A73-43bf-B137-0539CEA8224C}.exe Token: SeIncBasePriorityPrivilege 1824 {233DDC87-093D-4cca-A955-4DA99D91F433}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1116 2336 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe 30 PID 2336 wrote to memory of 1116 2336 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe 30 PID 2336 wrote to memory of 1116 2336 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe 30 PID 2336 wrote to memory of 1116 2336 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe 30 PID 2336 wrote to memory of 1532 2336 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe 31 PID 2336 wrote to memory of 1532 2336 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe 31 PID 2336 wrote to memory of 1532 2336 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe 31 PID 2336 wrote to memory of 1532 2336 2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe 31 PID 1116 wrote to memory of 1964 1116 {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe 32 PID 1116 wrote to memory of 1964 1116 {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe 32 PID 1116 wrote to memory of 1964 1116 {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe 32 PID 1116 wrote to memory of 1964 1116 {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe 32 PID 1116 wrote to memory of 2032 1116 {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe 33 PID 1116 wrote to memory of 2032 1116 {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe 33 PID 1116 wrote to memory of 2032 1116 {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe 33 PID 1116 wrote to memory of 2032 1116 {8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe 33 PID 1964 wrote to memory of 592 1964 {724257DB-95F4-404b-8CA3-7984792C727E}.exe 34 PID 1964 wrote to memory of 592 1964 {724257DB-95F4-404b-8CA3-7984792C727E}.exe 34 PID 1964 wrote to memory of 592 1964 {724257DB-95F4-404b-8CA3-7984792C727E}.exe 34 PID 1964 wrote to memory of 592 1964 {724257DB-95F4-404b-8CA3-7984792C727E}.exe 34 PID 1964 wrote to memory of 464 1964 {724257DB-95F4-404b-8CA3-7984792C727E}.exe 35 PID 1964 wrote to memory of 464 1964 {724257DB-95F4-404b-8CA3-7984792C727E}.exe 35 PID 1964 wrote to memory of 464 1964 {724257DB-95F4-404b-8CA3-7984792C727E}.exe 35 PID 1964 wrote to memory of 464 1964 {724257DB-95F4-404b-8CA3-7984792C727E}.exe 35 PID 592 wrote to memory of 1736 592 {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe 36 PID 592 wrote to memory of 1736 592 {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe 36 PID 592 wrote to memory of 1736 592 {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe 36 PID 592 wrote to memory of 1736 592 {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe 36 PID 592 wrote to memory of 564 592 {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe 37 PID 592 wrote to memory of 564 592 {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe 37 PID 592 wrote to memory of 564 592 {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe 37 PID 592 wrote to memory of 564 592 {78D941AE-A97A-4e5c-B517-45CC558CED66}.exe 37 PID 1736 wrote to memory of 696 1736 {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe 38 PID 1736 wrote to memory of 696 1736 {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe 38 PID 1736 wrote to memory of 696 1736 {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe 38 PID 1736 wrote to memory of 696 1736 {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe 38 PID 1736 wrote to memory of 2660 1736 {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe 39 PID 1736 wrote to memory of 2660 1736 {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe 39 PID 1736 wrote to memory of 2660 1736 {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe 39 PID 1736 wrote to memory of 2660 1736 {C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe 39 PID 696 wrote to memory of 1136 696 {07FA35F6-425F-4d2f-86E6-84414D803807}.exe 40 PID 696 wrote to memory of 1136 696 {07FA35F6-425F-4d2f-86E6-84414D803807}.exe 40 PID 696 wrote to memory of 1136 696 {07FA35F6-425F-4d2f-86E6-84414D803807}.exe 40 PID 696 wrote to memory of 1136 696 {07FA35F6-425F-4d2f-86E6-84414D803807}.exe 40 PID 696 wrote to memory of 2828 696 {07FA35F6-425F-4d2f-86E6-84414D803807}.exe 41 PID 696 wrote to memory of 2828 696 {07FA35F6-425F-4d2f-86E6-84414D803807}.exe 41 PID 696 wrote to memory of 2828 696 {07FA35F6-425F-4d2f-86E6-84414D803807}.exe 41 PID 696 wrote to memory of 2828 696 {07FA35F6-425F-4d2f-86E6-84414D803807}.exe 41 PID 1136 wrote to memory of 2628 1136 {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe 42 PID 1136 wrote to memory of 2628 1136 {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe 42 PID 1136 wrote to memory of 2628 1136 {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe 42 PID 1136 wrote to memory of 2628 1136 {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe 42 PID 1136 wrote to memory of 2856 1136 {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe 43 PID 1136 wrote to memory of 2856 1136 {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe 43 PID 1136 wrote to memory of 2856 1136 {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe 43 PID 1136 wrote to memory of 2856 1136 {48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe 43 PID 2628 wrote to memory of 2700 2628 {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe 44 PID 2628 wrote to memory of 2700 2628 {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe 44 PID 2628 wrote to memory of 2700 2628 {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe 44 PID 2628 wrote to memory of 2700 2628 {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe 44 PID 2628 wrote to memory of 2684 2628 {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe 45 PID 2628 wrote to memory of 2684 2628 {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe 45 PID 2628 wrote to memory of 2684 2628 {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe 45 PID 2628 wrote to memory of 2684 2628 {9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-20_18c6c72a6cd0f4c5467ecd508f1d0589_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\{8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exeC:\Windows\{8BC4DAFB-426E-4d88-A23E-D2EDFD98BE8A}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\{724257DB-95F4-404b-8CA3-7984792C727E}.exeC:\Windows\{724257DB-95F4-404b-8CA3-7984792C727E}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\{78D941AE-A97A-4e5c-B517-45CC558CED66}.exeC:\Windows\{78D941AE-A97A-4e5c-B517-45CC558CED66}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\{C99AAD80-7566-4162-9192-E706CB3CDCE7}.exeC:\Windows\{C99AAD80-7566-4162-9192-E706CB3CDCE7}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\{07FA35F6-425F-4d2f-86E6-84414D803807}.exeC:\Windows\{07FA35F6-425F-4d2f-86E6-84414D803807}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\{48B75BB2-62F5-400b-9728-A5ACB98CD792}.exeC:\Windows\{48B75BB2-62F5-400b-9728-A5ACB98CD792}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\{9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exeC:\Windows\{9E27EFBB-8893-47d0-A286-F43BFEA9A2F0}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\{02DB3B4D-2A73-43bf-B137-0539CEA8224C}.exeC:\Windows\{02DB3B4D-2A73-43bf-B137-0539CEA8224C}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Windows\{233DDC87-093D-4cca-A955-4DA99D91F433}.exeC:\Windows\{233DDC87-093D-4cca-A955-4DA99D91F433}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1824 -
C:\Windows\{EF7CDA4B-0A37-4414-9C67-4A628D6770B7}.exeC:\Windows\{EF7CDA4B-0A37-4414-9C67-4A628D6770B7}.exe11⤵
- Executes dropped EXE
PID:2964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{233DD~1.EXE > nul11⤵PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{02DB3~1.EXE > nul10⤵PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E27E~1.EXE > nul9⤵PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{48B75~1.EXE > nul8⤵PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{07FA3~1.EXE > nul7⤵PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C99AA~1.EXE > nul6⤵PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{78D94~1.EXE > nul5⤵PID:564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72425~1.EXE > nul4⤵PID:464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8BC4D~1.EXE > nul3⤵PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD51512021c6ee7e2409f3eaea6c2a5a241
SHA1121d02ab7b54198d90fcef09eca0b44a7132a200
SHA256ba7a9e7fa0b66dd756ccc6fb45785f7e6ea4b43c18cad21bfdb9ed280549cf90
SHA51213fb7a223e97be2c8678b801d7e629277329f97d30ef387042b29d6bbe282cb719fad8cb0cd80d4a87feeccb273ad62af5380607d684e916d0d9dad0596cf85a
-
Filesize
344KB
MD50de7f42ffbce7e3628d53c15ce5adefc
SHA11a5488b7f3df0ff5015b8195b23e40bcfc52e80b
SHA2566bdb11a2b1cb63bbe8a2413bcce6ff1a7c8d3f5a22255091d1c1b695899495cd
SHA512bcd5938a5184e6ece793e75ba7c17e02c7af0399e61bfbcc13d88baab5fd10b1d02efa5e2941c720c925ffa53c600e458e84ad19c941ac4ce0c2fc2ea885e07a
-
Filesize
344KB
MD5596d4a5d3a204122985092267cca8241
SHA1327617d21bba768a46655c04240a333bdca4bff1
SHA256c48eb158e6560a26fe3d1db0ca7b911ce93d7eb5dd50d63fa16d54403d53fa69
SHA512cbc1502b17889f017e2c0f1dbb7541178f68efb4bd36ed70341e20998ccbdf914dc1cc85260fd0e1524ba7f420c8d4b6ef0c0e67816c48d20389a002b9bb30fe
-
Filesize
344KB
MD54a6ff6f62c3c1e658e1c53212b1351ef
SHA16f364fe2855772f072eee2344be24922ce862bd4
SHA256785db4ac0390e7a66ccf85c247fd5e7de93e8a31bff1d2086b0af57b31acfe2a
SHA512c82fb1e4ebd25bf92101ad55a10e27bc89c3ff7e676c8b404257b4fe98ca339902baa2cb4f681dcecee0f332000c29c3da15386a6c34c7678f2cd8c490aaf67a
-
Filesize
344KB
MD57e88b98fbee366f7c022a537dadc9713
SHA1e3cd601a6c56602be7bdfd01eb7ce4bd07a49286
SHA256664588a69850f8799cb0f2c4e57cce2b224f0581b8b2543eec9e463f89a30ea4
SHA512fb7e5df68a9e6f989f2d4685f7743f4998a4de223089ba3c8b2c249d7c6775d56be7c230f54b818436f231e483f86f5a5d25090f16b9bffb1e13adcdeddf1f3c
-
Filesize
344KB
MD5cb5012b56edace7e0aad306f9bd3314b
SHA1ae3e53977319b73ea9825fb3c727c8d60800cfc3
SHA2566d2e062fd375a5e45c063e96e6dbaf10de93ef0eff7b06806574f35190b1bf25
SHA5123622fa90377262f5ebd63cd1e8651c1193cc73bb04486b7d97517d5c14ea8cc322091895144f3b976297cbde1d8c058d695c06b480fa91c01a96c376c1e7f519
-
Filesize
344KB
MD55f3fd5cde2148b7ff4975151e1b2c6cc
SHA1d421f49f70f7254a87e531de9c61770498cc4d3f
SHA2569261b47607119c14a7e0a0453aa8d30fdb573ba3909193822d47eadaa29d24db
SHA512f24616c67e7cb4d293a164a69346c0bce3e291fab8837761870ae15297d0b5a251f8ea980dc2868492ad20e993483af451b65ddb0a6937f629a59c028047ec63
-
Filesize
344KB
MD54e079a11df3b9a54711746217506af32
SHA127a2cae878955a654f594dbf7336665b59ed5501
SHA256dc317b84dc755571e3ded73f831cb141225c5161cd8cc296c57a1e9ff75f393c
SHA5127c8bd6ecc97d90179c315848032a1315e440859f81014d06b3b15d584d777a1423ee2287e2959298aa68d6b746e8236754f95e844abbbc642a664640af3378fd
-
Filesize
344KB
MD56e6fd5e64af16e201098fcfa8b15e669
SHA1c8c0e1da26417e19de66660a872a6d6e5c900ad0
SHA2569878535f242ea9f4a626da1c237b4e9b3c1fad8e654b44ce2ece96409fa60409
SHA51272717ea47126e2efe632191f1cf0ed401a27975c096df197cf7bfd6acd626c21aeafb30bb8d71a81bf905abcc6cca390cd6c6b9254acf17ce87843159c1c431a
-
Filesize
344KB
MD53cdddea88b1e7997b3146662f2eaa1bd
SHA1c35ff7db2e5a847abbd2e79d3ce21b52f68cdc08
SHA256b2720b07cc15da9c1ee0c742202284d28782ccb7661fe08e617f3c24aa371aee
SHA512d22ab97111f5f2bc6801997d5da1be278a32b99879c17976bbcf91d2ab0edd64517bcea776b2ceb91029e1a8c75a910e9ef6cf8d2b7f1d80db05879aa1c83abf