Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe
-
Size
372KB
-
MD5
596d8ad771323b80defcf075819737eb
-
SHA1
28ad828668e0e658d316697bfe926f83302d3636
-
SHA256
9867a7dd061feb1106d0d9a370d639f8aad95bab3f5adce714e415193f3d330c
-
SHA512
aabe0f94ccf70f5ced06e9aa7e365cc7e346d427bfd21eac9b07d63ebabb5490d2d45f804e0a0eda55701ed26411a66c0080f6d248ed52c61362fb64139fd948
-
SSDEEP
3072:CEGh0oblMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGllkOe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000a000000015f7a-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00090000000167d5-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000015f7a-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000016a29-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000005a59-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000015f7a-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000005a59-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000015f7a-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000005a59-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000015f7a-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000005a59-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}\stubpath = "C:\\Windows\\{7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe" {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{68902AD2-5EEC-4c7c-B740-A36BC52D0788} {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFBA49FE-D4E5-48d2-B909-1123F8CC36AC} {7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1401E8C1-EFE9-4c32-89BA-329CD3AEFF0D} {CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EEF27E5D-8996-4870-ADFE-440BA28D7C5D} 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9AB9872C-F246-46d7-A14C-029F26C71FAF} {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05F0CFA5-937D-4490-9705-33F154697F34} {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF} {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1401E8C1-EFE9-4c32-89BA-329CD3AEFF0D}\stubpath = "C:\\Windows\\{1401E8C1-EFE9-4c32-89BA-329CD3AEFF0D}.exe" {CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EEF27E5D-8996-4870-ADFE-440BA28D7C5D}\stubpath = "C:\\Windows\\{EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe" 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F1E1F73C-2052-4788-A254-8F2A538C6A0C} {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDAA379B-81CE-41c9-800B-782D45E0B8B6} {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDAA379B-81CE-41c9-800B-782D45E0B8B6}\stubpath = "C:\\Windows\\{BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe" {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D1E32BC3-6E27-4685-9EF4-1A65BB854C91}\stubpath = "C:\\Windows\\{D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe" {05F0CFA5-937D-4490-9705-33F154697F34}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{68902AD2-5EEC-4c7c-B740-A36BC52D0788}\stubpath = "C:\\Windows\\{68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe" {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7DC11C69-9D08-4eab-A62C-FB37E45437C4} {68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7DC11C69-9D08-4eab-A62C-FB37E45437C4}\stubpath = "C:\\Windows\\{7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe" {68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}\stubpath = "C:\\Windows\\{CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe" {7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9AB9872C-F246-46d7-A14C-029F26C71FAF}\stubpath = "C:\\Windows\\{9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe" {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F1E1F73C-2052-4788-A254-8F2A538C6A0C}\stubpath = "C:\\Windows\\{F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe" {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05F0CFA5-937D-4490-9705-33F154697F34}\stubpath = "C:\\Windows\\{05F0CFA5-937D-4490-9705-33F154697F34}.exe" {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D1E32BC3-6E27-4685-9EF4-1A65BB854C91} {05F0CFA5-937D-4490-9705-33F154697F34}.exe -
Deletes itself 1 IoCs
pid Process 2396 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2660 {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe 2532 {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe 2632 {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe 2452 {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe 1676 {05F0CFA5-937D-4490-9705-33F154697F34}.exe 1920 {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe 1436 {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe 1996 {68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe 2816 {7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe 936 {CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe 288 {1401E8C1-EFE9-4c32-89BA-329CD3AEFF0D}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe File created C:\Windows\{D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe {05F0CFA5-937D-4490-9705-33F154697F34}.exe File created C:\Windows\{68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe File created C:\Windows\{CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe {7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe File created C:\Windows\{1401E8C1-EFE9-4c32-89BA-329CD3AEFF0D}.exe {CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe File created C:\Windows\{EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe File created C:\Windows\{9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe File created C:\Windows\{F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe File created C:\Windows\{05F0CFA5-937D-4490-9705-33F154697F34}.exe {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe File created C:\Windows\{7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe File created C:\Windows\{7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe {68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3060 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe Token: SeIncBasePriorityPrivilege 2660 {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe Token: SeIncBasePriorityPrivilege 2532 {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe Token: SeIncBasePriorityPrivilege 2632 {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe Token: SeIncBasePriorityPrivilege 2452 {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe Token: SeIncBasePriorityPrivilege 1676 {05F0CFA5-937D-4490-9705-33F154697F34}.exe Token: SeIncBasePriorityPrivilege 1920 {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe Token: SeIncBasePriorityPrivilege 1436 {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe Token: SeIncBasePriorityPrivilege 1996 {68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe Token: SeIncBasePriorityPrivilege 2816 {7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe Token: SeIncBasePriorityPrivilege 936 {CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2660 3060 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe 28 PID 3060 wrote to memory of 2660 3060 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe 28 PID 3060 wrote to memory of 2660 3060 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe 28 PID 3060 wrote to memory of 2660 3060 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe 28 PID 3060 wrote to memory of 2396 3060 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe 29 PID 3060 wrote to memory of 2396 3060 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe 29 PID 3060 wrote to memory of 2396 3060 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe 29 PID 3060 wrote to memory of 2396 3060 2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe 29 PID 2660 wrote to memory of 2532 2660 {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe 30 PID 2660 wrote to memory of 2532 2660 {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe 30 PID 2660 wrote to memory of 2532 2660 {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe 30 PID 2660 wrote to memory of 2532 2660 {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe 30 PID 2660 wrote to memory of 2548 2660 {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe 31 PID 2660 wrote to memory of 2548 2660 {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe 31 PID 2660 wrote to memory of 2548 2660 {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe 31 PID 2660 wrote to memory of 2548 2660 {EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe 31 PID 2532 wrote to memory of 2632 2532 {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe 32 PID 2532 wrote to memory of 2632 2532 {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe 32 PID 2532 wrote to memory of 2632 2532 {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe 32 PID 2532 wrote to memory of 2632 2532 {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe 32 PID 2532 wrote to memory of 2572 2532 {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe 33 PID 2532 wrote to memory of 2572 2532 {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe 33 PID 2532 wrote to memory of 2572 2532 {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe 33 PID 2532 wrote to memory of 2572 2532 {9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe 33 PID 2632 wrote to memory of 2452 2632 {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe 36 PID 2632 wrote to memory of 2452 2632 {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe 36 PID 2632 wrote to memory of 2452 2632 {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe 36 PID 2632 wrote to memory of 2452 2632 {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe 36 PID 2632 wrote to memory of 2512 2632 {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe 37 PID 2632 wrote to memory of 2512 2632 {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe 37 PID 2632 wrote to memory of 2512 2632 {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe 37 PID 2632 wrote to memory of 2512 2632 {F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe 37 PID 2452 wrote to memory of 1676 2452 {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe 38 PID 2452 wrote to memory of 1676 2452 {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe 38 PID 2452 wrote to memory of 1676 2452 {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe 38 PID 2452 wrote to memory of 1676 2452 {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe 38 PID 2452 wrote to memory of 1716 2452 {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe 39 PID 2452 wrote to memory of 1716 2452 {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe 39 PID 2452 wrote to memory of 1716 2452 {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe 39 PID 2452 wrote to memory of 1716 2452 {BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe 39 PID 1676 wrote to memory of 1920 1676 {05F0CFA5-937D-4490-9705-33F154697F34}.exe 40 PID 1676 wrote to memory of 1920 1676 {05F0CFA5-937D-4490-9705-33F154697F34}.exe 40 PID 1676 wrote to memory of 1920 1676 {05F0CFA5-937D-4490-9705-33F154697F34}.exe 40 PID 1676 wrote to memory of 1920 1676 {05F0CFA5-937D-4490-9705-33F154697F34}.exe 40 PID 1676 wrote to memory of 1936 1676 {05F0CFA5-937D-4490-9705-33F154697F34}.exe 41 PID 1676 wrote to memory of 1936 1676 {05F0CFA5-937D-4490-9705-33F154697F34}.exe 41 PID 1676 wrote to memory of 1936 1676 {05F0CFA5-937D-4490-9705-33F154697F34}.exe 41 PID 1676 wrote to memory of 1936 1676 {05F0CFA5-937D-4490-9705-33F154697F34}.exe 41 PID 1920 wrote to memory of 1436 1920 {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe 42 PID 1920 wrote to memory of 1436 1920 {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe 42 PID 1920 wrote to memory of 1436 1920 {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe 42 PID 1920 wrote to memory of 1436 1920 {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe 42 PID 1920 wrote to memory of 1948 1920 {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe 43 PID 1920 wrote to memory of 1948 1920 {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe 43 PID 1920 wrote to memory of 1948 1920 {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe 43 PID 1920 wrote to memory of 1948 1920 {D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe 43 PID 1436 wrote to memory of 1996 1436 {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe 44 PID 1436 wrote to memory of 1996 1436 {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe 44 PID 1436 wrote to memory of 1996 1436 {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe 44 PID 1436 wrote to memory of 1996 1436 {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe 44 PID 1436 wrote to memory of 1664 1436 {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe 45 PID 1436 wrote to memory of 1664 1436 {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe 45 PID 1436 wrote to memory of 1664 1436 {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe 45 PID 1436 wrote to memory of 1664 1436 {7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\{EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exeC:\Windows\{EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\{9AB9872C-F246-46d7-A14C-029F26C71FAF}.exeC:\Windows\{9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\{F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exeC:\Windows\{F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\{BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exeC:\Windows\{BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\{05F0CFA5-937D-4490-9705-33F154697F34}.exeC:\Windows\{05F0CFA5-937D-4490-9705-33F154697F34}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\{D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exeC:\Windows\{D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\{7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exeC:\Windows\{7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\{68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exeC:\Windows\{68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\{7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exeC:\Windows\{7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2816 -
C:\Windows\{CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exeC:\Windows\{CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:936 -
C:\Windows\{1401E8C1-EFE9-4c32-89BA-329CD3AEFF0D}.exeC:\Windows\{1401E8C1-EFE9-4c32-89BA-329CD3AEFF0D}.exe12⤵
- Executes dropped EXE
PID:288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CFBA4~1.EXE > nul12⤵PID:1468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7DC11~1.EXE > nul11⤵PID:3040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{68902~1.EXE > nul10⤵PID:808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7F879~1.EXE > nul9⤵PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D1E32~1.EXE > nul8⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{05F0C~1.EXE > nul7⤵PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BDAA3~1.EXE > nul6⤵PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1E1F~1.EXE > nul5⤵PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9AB98~1.EXE > nul4⤵PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EEF27~1.EXE > nul3⤵PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5bdb75836541de2d3ef6d5ba2d3591b8e
SHA11e23c287dc7979908a334cc3e48d0086422ce1f0
SHA256445ee628de98ba2674bd71bc3d98f6d36d31e0888a7f0352c4fb8a3755d1a6b3
SHA512ce8f1764f7d628545a7934ceb998849441e784e977a02ba275edda5dd52d33c85d433d637c1db2cd93dccb7898a09675b27d3d6df66c51f5baf8703ce8dd5768
-
Filesize
372KB
MD545dec889bf05aa25932e2b97ffec0bb0
SHA1df8d4e397fe71c4e9a9aacce257a9c21acc73f50
SHA256a8447c3d905d23aabd6cde21f68b0bb837bf6a0f93d70348926a8426ac57b826
SHA5124c1cd209e786eef73ac6dfb090b3dc26814f6f828386dbaa59b5349fa4b23f5ec89888e32cfa384b14375875f8cd833cd13e01cd051621aa8c19187ae71ee6d4
-
Filesize
372KB
MD56ab3d7cc9432b8d58280860c84234fa9
SHA162e4c70fabd65470227087cec80d67b5e5285176
SHA256089b300317bf7325b2e2b2b1e32f2fa14041984a55aebf057a134109943bcb7f
SHA51292717c90518d5f580fb389ed134f0931a3ec1534143b91d00cb81c4be6330accc193cdd25ab036040d9882802a7206ae176e7566003ecf3c61aa83942702ec72
-
Filesize
372KB
MD5cebdd0cb03d753e7a37aebaf58116656
SHA1bb3333ea83ed3d0a05287f51729a5ffdd1a97115
SHA2566e04a45daf117af7715dd13f49324b52f59f9fa8b97e5c28aa21a67a4c7c7b91
SHA512ad29413cc9133ae929e5a9f6d64effeaaa05c3181c79e66a805d9d600659195cfd43b5aeeafb90f9955b1ae7719f0c536177d0d5c0819bf67691628ab3a6185e
-
Filesize
372KB
MD57574a45c573409c0196f920f689cf0f1
SHA1fa9da685db0e413c9e45577745b0b4b2cf95421a
SHA256f75b1f4edeff433a4dc895712f65192b7a1277f959d860188ecc6093f177469b
SHA5126d00ec753d00130710d9f33336ca51e7dc8624a49973c367c89896b7aead06577735b1b2195a354ddcee1b3c4227cea1aaab83ceacd5a8fa6153047a482adb41
-
Filesize
372KB
MD5783eed6d817f52944ad60c6445a2ccca
SHA1fc99660d765b91fb5bda81ac5b66dc72a0c36ddf
SHA2560b8388409a2b21221f6c38cd877374ebd21e0b74662843e6972ef1cb5d1f3dd0
SHA51231ce841bee5f399b9aaee531e9720c862bf9febcad1a328b75bd034dab016dc9c2e56f8159a5f4cae8cead3985777b2a31245ba67e20532caada9470d0ab9590
-
Filesize
372KB
MD593aadbb825596a1643f48607f86ef6dc
SHA19d60bf30aed5b4949fe39dcca4e2c27b784f7207
SHA256c9ec279a0ba820a8a9619cebc2c336f7240cd5836af34e0dee619cb9839c3680
SHA512a60e08dccda5de4749a06d73b712a0cbf009780f822ffce49889a925fe66e76bd8f631977814beba3432fd04cfcce9de095395d1a6b8bff44101272874052746
-
Filesize
372KB
MD5a23b811519ceafe4481a9aec9d3f53bb
SHA1b8476a1f224388503ff703d676fd886ebaeb2500
SHA25644268c66652f9883f2881e3c4d1472793e80d8aaff421d73b6a0b3a1ebffe98e
SHA512470c6c41bd469ca42946c39c48be02c5dec0aaf92636e9a548ab8bb6c74db41eac718a21cee5078c6f968a26a07d475eb9b63f2a1196d5e94948011567ef8551
-
Filesize
372KB
MD5a99cd1611a05fa479dda7b0277130ff9
SHA1527c48b64a37c0dd57e35f87c9bf2b3c1f118e69
SHA256d3c213feb1fa0f02eacc1d34efd00d2e977f8850f9208bc69b2a267c030158c7
SHA51222174f7272c192497c0f41420299e7467f822f002e8f11582e0971cba581db4a6e03aee63b3237515b29187ab813d1d22559eef38c927b5d5f2eb6b18ec0e599
-
Filesize
372KB
MD547cb32ccfffc3c75c1c0f5b5fd078399
SHA17b68a98e1f681b5c8c41677503d7fde34e0833cd
SHA256f53b6e11ece475af42b42abbd68203db458574d81130825ea89e6966cf6f2ba4
SHA5123eb34fabae2ce5c1f201a8c175c4fe43268316c8c439d2445baf9629a2dc4329e476449c20ffdc320a1b0e74dda8acb06f3893add22e46475dbed65941c7680c
-
Filesize
372KB
MD5d3d6e960380d1023889146cacd744f12
SHA1664d94b36c6ecc35de151d0f01f0717a521e3f8b
SHA2565db841460e78b8876811ab69271c716340c3f69621f149ad84790714d970f762
SHA512f66682cbef688e4122c864fde03f988b2fb933b3746c40d1a7893bfddcfae71acdae7b80d71c036bd8c0327d31747979ba67f9008adbaa4adb102892c78ffe4a