Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe
-
Size
408KB
-
MD5
1dea083728814ed3f6207e6058f86fe8
-
SHA1
33f66f1844a3a16a07dcb1ab5be716f339923dfb
-
SHA256
7e902adc9ab0a2940276369b176db74e2e14d4bc196bb043bdaf594610d6596e
-
SHA512
5e7f271830c5fac73ef767882664923e3070ec9965e82681d946739f1ab670594f064d62e0cc896ea946729128803e827e9e2ecf5cd1eec7acfd87c38fc69a86
-
SSDEEP
3072:CEGh0o6l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGoldOe2MUVg3vTeKcAEciTBqr3jy9
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c00000001226d-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0034000000015b63-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001226d-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0034000000015bc7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001226d-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001226d-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001000000001226d-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34C5D819-375F-4c7e-A83D-B1E6C06306FE}\stubpath = "C:\\Windows\\{34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe" {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9644C5A7-3D37-450c-B9D7-829815BAD97F}\stubpath = "C:\\Windows\\{9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe" {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{06E699E4-A023-4973-9568-834676283596} {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{06E699E4-A023-4973-9568-834676283596}\stubpath = "C:\\Windows\\{06E699E4-A023-4973-9568-834676283596}.exe" {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{106E5DBB-4453-441c-842E-6416B688B2B7}\stubpath = "C:\\Windows\\{106E5DBB-4453-441c-842E-6416B688B2B7}.exe" 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A133630-2E31-4797-A6B9-79EF41A73D77} {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{092F57CC-5AD2-468b-8F86-73B20EDF0E29}\stubpath = "C:\\Windows\\{092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe" {106E5DBB-4453-441c-842E-6416B688B2B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A133630-2E31-4797-A6B9-79EF41A73D77}\stubpath = "C:\\Windows\\{7A133630-2E31-4797-A6B9-79EF41A73D77}.exe" {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F7296825-BED0-42e3-A96E-432D8564E285} {06E699E4-A023-4973-9568-834676283596}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B3A49182-5755-428d-B1C1-92D6639E3DE3}\stubpath = "C:\\Windows\\{B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe" {F7296825-BED0-42e3-A96E-432D8564E285}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70DAE97C-B06F-492f-89AC-EFDC6A86A961} {B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70DAE97C-B06F-492f-89AC-EFDC6A86A961}\stubpath = "C:\\Windows\\{70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe" {B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7708CBFB-ECF3-425e-ACF2-506A3DE711A7} {70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{092F57CC-5AD2-468b-8F86-73B20EDF0E29} {106E5DBB-4453-441c-842E-6416B688B2B7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{72620F2F-7E9D-46f3-8FB2-ECEDDCC1D106} {7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{72620F2F-7E9D-46f3-8FB2-ECEDDCC1D106}\stubpath = "C:\\Windows\\{72620F2F-7E9D-46f3-8FB2-ECEDDCC1D106}.exe" {7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7708CBFB-ECF3-425e-ACF2-506A3DE711A7}\stubpath = "C:\\Windows\\{7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe" {70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34C5D819-375F-4c7e-A83D-B1E6C06306FE} {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9644C5A7-3D37-450c-B9D7-829815BAD97F} {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F7296825-BED0-42e3-A96E-432D8564E285}\stubpath = "C:\\Windows\\{F7296825-BED0-42e3-A96E-432D8564E285}.exe" {06E699E4-A023-4973-9568-834676283596}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B3A49182-5755-428d-B1C1-92D6639E3DE3} {F7296825-BED0-42e3-A96E-432D8564E285}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{106E5DBB-4453-441c-842E-6416B688B2B7} 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe -
Deletes itself 1 IoCs
pid Process 2612 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2564 {106E5DBB-4453-441c-842E-6416B688B2B7}.exe 2464 {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe 2592 {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe 2344 {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe 2356 {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe 1560 {06E699E4-A023-4973-9568-834676283596}.exe 1564 {F7296825-BED0-42e3-A96E-432D8564E285}.exe 1168 {B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe 2240 {70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe 536 {7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe 2864 {72620F2F-7E9D-46f3-8FB2-ECEDDCC1D106}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{106E5DBB-4453-441c-842E-6416B688B2B7}.exe 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe File created C:\Windows\{092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe {106E5DBB-4453-441c-842E-6416B688B2B7}.exe File created C:\Windows\{F7296825-BED0-42e3-A96E-432D8564E285}.exe {06E699E4-A023-4973-9568-834676283596}.exe File created C:\Windows\{7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe {70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe File created C:\Windows\{72620F2F-7E9D-46f3-8FB2-ECEDDCC1D106}.exe {7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe File created C:\Windows\{70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe {B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe File created C:\Windows\{34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe File created C:\Windows\{7A133630-2E31-4797-A6B9-79EF41A73D77}.exe {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe File created C:\Windows\{9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe File created C:\Windows\{06E699E4-A023-4973-9568-834676283596}.exe {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe File created C:\Windows\{B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe {F7296825-BED0-42e3-A96E-432D8564E285}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1904 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe Token: SeIncBasePriorityPrivilege 2564 {106E5DBB-4453-441c-842E-6416B688B2B7}.exe Token: SeIncBasePriorityPrivilege 2464 {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe Token: SeIncBasePriorityPrivilege 2592 {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe Token: SeIncBasePriorityPrivilege 2344 {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe Token: SeIncBasePriorityPrivilege 2356 {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe Token: SeIncBasePriorityPrivilege 1560 {06E699E4-A023-4973-9568-834676283596}.exe Token: SeIncBasePriorityPrivilege 1564 {F7296825-BED0-42e3-A96E-432D8564E285}.exe Token: SeIncBasePriorityPrivilege 1168 {B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe Token: SeIncBasePriorityPrivilege 2240 {70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe Token: SeIncBasePriorityPrivilege 536 {7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2564 1904 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe 28 PID 1904 wrote to memory of 2564 1904 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe 28 PID 1904 wrote to memory of 2564 1904 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe 28 PID 1904 wrote to memory of 2564 1904 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe 28 PID 1904 wrote to memory of 2612 1904 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe 29 PID 1904 wrote to memory of 2612 1904 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe 29 PID 1904 wrote to memory of 2612 1904 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe 29 PID 1904 wrote to memory of 2612 1904 2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe 29 PID 2564 wrote to memory of 2464 2564 {106E5DBB-4453-441c-842E-6416B688B2B7}.exe 30 PID 2564 wrote to memory of 2464 2564 {106E5DBB-4453-441c-842E-6416B688B2B7}.exe 30 PID 2564 wrote to memory of 2464 2564 {106E5DBB-4453-441c-842E-6416B688B2B7}.exe 30 PID 2564 wrote to memory of 2464 2564 {106E5DBB-4453-441c-842E-6416B688B2B7}.exe 30 PID 2564 wrote to memory of 2572 2564 {106E5DBB-4453-441c-842E-6416B688B2B7}.exe 31 PID 2564 wrote to memory of 2572 2564 {106E5DBB-4453-441c-842E-6416B688B2B7}.exe 31 PID 2564 wrote to memory of 2572 2564 {106E5DBB-4453-441c-842E-6416B688B2B7}.exe 31 PID 2564 wrote to memory of 2572 2564 {106E5DBB-4453-441c-842E-6416B688B2B7}.exe 31 PID 2464 wrote to memory of 2592 2464 {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe 32 PID 2464 wrote to memory of 2592 2464 {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe 32 PID 2464 wrote to memory of 2592 2464 {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe 32 PID 2464 wrote to memory of 2592 2464 {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe 32 PID 2464 wrote to memory of 2676 2464 {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe 33 PID 2464 wrote to memory of 2676 2464 {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe 33 PID 2464 wrote to memory of 2676 2464 {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe 33 PID 2464 wrote to memory of 2676 2464 {092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe 33 PID 2592 wrote to memory of 2344 2592 {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe 36 PID 2592 wrote to memory of 2344 2592 {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe 36 PID 2592 wrote to memory of 2344 2592 {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe 36 PID 2592 wrote to memory of 2344 2592 {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe 36 PID 2592 wrote to memory of 860 2592 {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe 37 PID 2592 wrote to memory of 860 2592 {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe 37 PID 2592 wrote to memory of 860 2592 {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe 37 PID 2592 wrote to memory of 860 2592 {34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe 37 PID 2344 wrote to memory of 2356 2344 {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe 38 PID 2344 wrote to memory of 2356 2344 {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe 38 PID 2344 wrote to memory of 2356 2344 {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe 38 PID 2344 wrote to memory of 2356 2344 {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe 38 PID 2344 wrote to memory of 756 2344 {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe 39 PID 2344 wrote to memory of 756 2344 {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe 39 PID 2344 wrote to memory of 756 2344 {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe 39 PID 2344 wrote to memory of 756 2344 {7A133630-2E31-4797-A6B9-79EF41A73D77}.exe 39 PID 2356 wrote to memory of 1560 2356 {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe 40 PID 2356 wrote to memory of 1560 2356 {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe 40 PID 2356 wrote to memory of 1560 2356 {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe 40 PID 2356 wrote to memory of 1560 2356 {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe 40 PID 2356 wrote to memory of 1616 2356 {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe 41 PID 2356 wrote to memory of 1616 2356 {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe 41 PID 2356 wrote to memory of 1616 2356 {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe 41 PID 2356 wrote to memory of 1616 2356 {9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe 41 PID 1560 wrote to memory of 1564 1560 {06E699E4-A023-4973-9568-834676283596}.exe 42 PID 1560 wrote to memory of 1564 1560 {06E699E4-A023-4973-9568-834676283596}.exe 42 PID 1560 wrote to memory of 1564 1560 {06E699E4-A023-4973-9568-834676283596}.exe 42 PID 1560 wrote to memory of 1564 1560 {06E699E4-A023-4973-9568-834676283596}.exe 42 PID 1560 wrote to memory of 1664 1560 {06E699E4-A023-4973-9568-834676283596}.exe 43 PID 1560 wrote to memory of 1664 1560 {06E699E4-A023-4973-9568-834676283596}.exe 43 PID 1560 wrote to memory of 1664 1560 {06E699E4-A023-4973-9568-834676283596}.exe 43 PID 1560 wrote to memory of 1664 1560 {06E699E4-A023-4973-9568-834676283596}.exe 43 PID 1564 wrote to memory of 1168 1564 {F7296825-BED0-42e3-A96E-432D8564E285}.exe 44 PID 1564 wrote to memory of 1168 1564 {F7296825-BED0-42e3-A96E-432D8564E285}.exe 44 PID 1564 wrote to memory of 1168 1564 {F7296825-BED0-42e3-A96E-432D8564E285}.exe 44 PID 1564 wrote to memory of 1168 1564 {F7296825-BED0-42e3-A96E-432D8564E285}.exe 44 PID 1564 wrote to memory of 2024 1564 {F7296825-BED0-42e3-A96E-432D8564E285}.exe 45 PID 1564 wrote to memory of 2024 1564 {F7296825-BED0-42e3-A96E-432D8564E285}.exe 45 PID 1564 wrote to memory of 2024 1564 {F7296825-BED0-42e3-A96E-432D8564E285}.exe 45 PID 1564 wrote to memory of 2024 1564 {F7296825-BED0-42e3-A96E-432D8564E285}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\{106E5DBB-4453-441c-842E-6416B688B2B7}.exeC:\Windows\{106E5DBB-4453-441c-842E-6416B688B2B7}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\{092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exeC:\Windows\{092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\{34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exeC:\Windows\{34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\{7A133630-2E31-4797-A6B9-79EF41A73D77}.exeC:\Windows\{7A133630-2E31-4797-A6B9-79EF41A73D77}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\{9644C5A7-3D37-450c-B9D7-829815BAD97F}.exeC:\Windows\{9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\{06E699E4-A023-4973-9568-834676283596}.exeC:\Windows\{06E699E4-A023-4973-9568-834676283596}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\{F7296825-BED0-42e3-A96E-432D8564E285}.exeC:\Windows\{F7296825-BED0-42e3-A96E-432D8564E285}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\{B3A49182-5755-428d-B1C1-92D6639E3DE3}.exeC:\Windows\{B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\{70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exeC:\Windows\{70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2240 -
C:\Windows\{7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exeC:\Windows\{7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\{72620F2F-7E9D-46f3-8FB2-ECEDDCC1D106}.exeC:\Windows\{72620F2F-7E9D-46f3-8FB2-ECEDDCC1D106}.exe12⤵
- Executes dropped EXE
PID:2864
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7708C~1.EXE > nul12⤵PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70DAE~1.EXE > nul11⤵PID:528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B3A49~1.EXE > nul10⤵PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F7296~1.EXE > nul9⤵PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06E69~1.EXE > nul8⤵PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9644C~1.EXE > nul7⤵PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7A133~1.EXE > nul6⤵PID:756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34C5D~1.EXE > nul5⤵PID:860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{092F5~1.EXE > nul4⤵PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{106E5~1.EXE > nul3⤵PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD582f561a407b3bc98e580a7d1c9faaa8a
SHA1601fc78d0bb9a7787994567b96d03fc78afde0d4
SHA256a8174369225be9d75b77aef72f026476df80a0c42da285325340dbf829310a62
SHA512a79c9d216fd526c14119cc5c0e3f31b64fdb31bff677399f43bb5f26a87320a46a309a4505bc005a485fd059ca04cf67e801567616f5a5edd3398abeed35f07c
-
Filesize
408KB
MD50095086466652fcdd8935b6d5a6a5e0f
SHA1fd6a5186b752563447854e98df32a77dabbc5514
SHA256a887c73295bd26d389b04738fb138134527eda8e3ab6b3cb3b213f9d5efa98ee
SHA5126d9aec25709cc69001bac0093d9a6682ad0c0da2146b8ffdad36fe0225f38e6038ae825a0bd15893f02830bf7f84708aa979785818ef3f8a1013e31fa4565cc5
-
Filesize
408KB
MD5617ff4e7826dd0e0857318673aaf4bda
SHA111e770e0b225e212ae4c79e8c59c96c155e35775
SHA256de8c8622a2654cd22fc663ab25fa3ea59da472e4ca81df917fe6c7e5e51ee307
SHA5129236911e007d9825482b593a87e700a0bd74d93a53a7b0a8475d274cf84b528867707ba45495db1d45627a7008a4fabf9a95411f1c26b698c9691bb72d2fba3f
-
Filesize
408KB
MD5d11decafc947450e10db0ed3a267eca5
SHA1be43cfd5dc0d72ff4ad6853fd8fcfbb1c6349d1b
SHA256b8f80253ce9893ca3aba2d61f52626adb10c66f0a6721a4169b3230d7534a0a8
SHA512d76ca3574364bdfe7a478eb9fe3c3c1cb87d0bf6de796c93eac054a13c6f77a925d92e6654a410ba7683d806f2e1ad9eb1b37c14730ad87097a28480cec5ff0a
-
Filesize
408KB
MD55ee7a23be722f65b581b4681cbea9cef
SHA14fc74a84c4c245cddfbed6734e9f3c1668aec7d6
SHA2560b0b476e6cac675ef0ec4730e700f458f1ab44f33f44299add3e2ea189869d5f
SHA512ce24b526c450f009887fcb1eb1d55be08ea4bb631d2c9edb08588cdd8db9dea81434b4cabede778117869673641f860b1c2983701d695883c116d81f70835f79
-
Filesize
408KB
MD51dc688d59424684494834466d97c2959
SHA15d87dd15745accb8d96708e85edffd8c29ba8db5
SHA256f90774297ec39861648994612f9aa43248022849248f443a179112df14237f4d
SHA5122d5b8e6b2c704e57b8624f567ac8fcc403838e812ae24e2420119b2818bd132f979b7551a9763482c192e47266989886ff7c068e390f7039197e8eb3cafd4439
-
Filesize
408KB
MD5916c1dd2c7736be03fee3ba9dc840116
SHA1650171eff3125a9c045adb93164812e41d4f9e1c
SHA2560dad53303c4ddc92044e56df80cce7e1454ad2c2dc7a46f314da5ffae12a1b26
SHA51295c537e102ea6d3a1ae9e3442d5300bde42e0b244fb6df3a9916e0fd1ff84c06928b5cd57926978103e0b779094b9fd97a4d6c7eaeaaf07423a7c4d27196a9cf
-
Filesize
408KB
MD529a310d4656bf3936311b629ffd4f8de
SHA15f5f05d500d2d9d9b6c5a20a009fc6d54e306fcd
SHA25682b6ced693b228fa28c9b511d14616861ef19cf3ece45eaeeabcc188acad6bfd
SHA5128e6de02cfeede42fd996c1d06675256ad521dc5452e7bee6d69807abf546767ab8dd5350efb3a9b366729adcb9214358667dde2b64940e647234908d57ce1b1c
-
Filesize
408KB
MD5e83606e122fc124cb7f738eedcdcbf82
SHA123287a4eef2333753b89e87b8cbd3754948b19f9
SHA256552e260385bd55e70f89e638823dc210e04c544e8b134ccf4519f2033e206b84
SHA512949bd929f379526d20efc9d6d0e9ac430ae4116eb2d49883d29604f2e08212a0c0803ada158338c70ca7bfd7e563981f03b4edb429355a676a51f882ef70008b
-
Filesize
408KB
MD58f5a18691fd196596883c541e61f75b1
SHA10786bf555bf85e6154084fa9366b186500a1dd51
SHA25653b714f085cfd58f34e8fd699b6d836ac81fd3c91651d7f383359f28eb8107b0
SHA512459f590b2bba0c7bdf25024ef98bba818d1dee4b9d176191e3f74ef77c5445c7d481591f254edd43ef8e286d39024ee0b5f59d24b1a960601b1f9f45c883562f
-
Filesize
408KB
MD54084a9d6fdf4eafea6f5ad251fecebf1
SHA1e10f3a9d9e4d04f4fe290bad0e20dff163bcab47
SHA2560521c5b6c2b18b3f0b8aa46f7dc01dae5ad7e55a0543c661e254164ef264d632
SHA5120f845461ae8f569231fce5039680148080f1db5a27567676eaf0110af681aba80f7acffb00a35936bf41cf8b10c8f68e75931864fd86090cb89068a7c508a167