Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe
-
Size
180KB
-
MD5
c0d85563429873aed4792bf8e410cf0a
-
SHA1
a3ec535d02fb032aa326d99dfa5f5c44371dff56
-
SHA256
e1f7b2bb0d646204d14ca0f1e313c4ccb7be6acc6755a095dd89153d8e77d8d1
-
SHA512
7d8e14b575584673280de8b86b27a806ba291c069248495fb9a02cc1cce459ff4a034d817c4f25420ae2fab77e71005a6f4d3cfac085172fd980112a59ed9424
-
SSDEEP
3072:jEGh0o4lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGml5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000b00000001227c-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0039000000013362-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c00000001227c-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x003900000001340e-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001227c-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001227c-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001227c-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1B79F929-1622-461c-8C3F-C2F578971F92}\stubpath = "C:\\Windows\\{1B79F929-1622-461c-8C3F-C2F578971F92}.exe" {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4142B9A1-7174-4a55-8998-563559FACF2B}\stubpath = "C:\\Windows\\{4142B9A1-7174-4a55-8998-563559FACF2B}.exe" {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{291900EA-5EE0-47c6-A0E7-E7799C881407} {4142B9A1-7174-4a55-8998-563559FACF2B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}\stubpath = "C:\\Windows\\{C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe" {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{663B39D8-7116-4fb3-B375-AF1A308B06BD} {0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FC0FC1C-D127-490e-8F0C-696B125D5FFF} 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BFD60732-EEB8-4166-B5FB-8FF8A0C915A5} {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4142B9A1-7174-4a55-8998-563559FACF2B} {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C213864B-C9BD-414f-BD7F-7C0BF67B8E0C} {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4}\stubpath = "C:\\Windows\\{0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4}.exe" {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21406433-6936-41e3-9456-5DF91D71C33C}\stubpath = "C:\\Windows\\{21406433-6936-41e3-9456-5DF91D71C33C}.exe" {663B39D8-7116-4fb3-B375-AF1A308B06BD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D1269C31-9341-457f-ADE0-C59B55DC3808} {21406433-6936-41e3-9456-5DF91D71C33C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA958FB3-6B41-49a4-B707-DDC24ACD6A13} {1B79F929-1622-461c-8C3F-C2F578971F92}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4} {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{21406433-6936-41e3-9456-5DF91D71C33C} {663B39D8-7116-4fb3-B375-AF1A308B06BD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0FC0FC1C-D127-490e-8F0C-696B125D5FFF}\stubpath = "C:\\Windows\\{0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe" 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}\stubpath = "C:\\Windows\\{BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe" {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1B79F929-1622-461c-8C3F-C2F578971F92} {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA958FB3-6B41-49a4-B707-DDC24ACD6A13}\stubpath = "C:\\Windows\\{FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe" {1B79F929-1622-461c-8C3F-C2F578971F92}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{291900EA-5EE0-47c6-A0E7-E7799C881407}\stubpath = "C:\\Windows\\{291900EA-5EE0-47c6-A0E7-E7799C881407}.exe" {4142B9A1-7174-4a55-8998-563559FACF2B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{663B39D8-7116-4fb3-B375-AF1A308B06BD}\stubpath = "C:\\Windows\\{663B39D8-7116-4fb3-B375-AF1A308B06BD}.exe" {0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D1269C31-9341-457f-ADE0-C59B55DC3808}\stubpath = "C:\\Windows\\{D1269C31-9341-457f-ADE0-C59B55DC3808}.exe" {21406433-6936-41e3-9456-5DF91D71C33C}.exe -
Executes dropped EXE 11 IoCs
pid Process 2832 {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe 2120 {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe 2560 {1B79F929-1622-461c-8C3F-C2F578971F92}.exe 2480 {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe 2284 {4142B9A1-7174-4a55-8998-563559FACF2B}.exe 2256 {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe 2736 {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe 1580 {0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4}.exe 1820 {663B39D8-7116-4fb3-B375-AF1A308B06BD}.exe 2912 {21406433-6936-41e3-9456-5DF91D71C33C}.exe 1028 {D1269C31-9341-457f-ADE0-C59B55DC3808}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe File created C:\Windows\{0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4}.exe {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe File created C:\Windows\{D1269C31-9341-457f-ADE0-C59B55DC3808}.exe {21406433-6936-41e3-9456-5DF91D71C33C}.exe File created C:\Windows\{1B79F929-1622-461c-8C3F-C2F578971F92}.exe {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe File created C:\Windows\{FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe {1B79F929-1622-461c-8C3F-C2F578971F92}.exe File created C:\Windows\{4142B9A1-7174-4a55-8998-563559FACF2B}.exe {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe File created C:\Windows\{663B39D8-7116-4fb3-B375-AF1A308B06BD}.exe {0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4}.exe File created C:\Windows\{21406433-6936-41e3-9456-5DF91D71C33C}.exe {663B39D8-7116-4fb3-B375-AF1A308B06BD}.exe File created C:\Windows\{0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe File created C:\Windows\{BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe File created C:\Windows\{291900EA-5EE0-47c6-A0E7-E7799C881407}.exe {4142B9A1-7174-4a55-8998-563559FACF2B}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2440 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe Token: SeIncBasePriorityPrivilege 2832 {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe Token: SeIncBasePriorityPrivilege 2120 {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe Token: SeIncBasePriorityPrivilege 2560 {1B79F929-1622-461c-8C3F-C2F578971F92}.exe Token: SeIncBasePriorityPrivilege 2480 {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe Token: SeIncBasePriorityPrivilege 2284 {4142B9A1-7174-4a55-8998-563559FACF2B}.exe Token: SeIncBasePriorityPrivilege 2256 {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe Token: SeIncBasePriorityPrivilege 2736 {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe Token: SeIncBasePriorityPrivilege 1580 {0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4}.exe Token: SeIncBasePriorityPrivilege 1820 {663B39D8-7116-4fb3-B375-AF1A308B06BD}.exe Token: SeIncBasePriorityPrivilege 2912 {21406433-6936-41e3-9456-5DF91D71C33C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2832 2440 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe 28 PID 2440 wrote to memory of 2832 2440 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe 28 PID 2440 wrote to memory of 2832 2440 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe 28 PID 2440 wrote to memory of 2832 2440 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe 28 PID 2440 wrote to memory of 2620 2440 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe 29 PID 2440 wrote to memory of 2620 2440 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe 29 PID 2440 wrote to memory of 2620 2440 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe 29 PID 2440 wrote to memory of 2620 2440 2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe 29 PID 2832 wrote to memory of 2120 2832 {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe 30 PID 2832 wrote to memory of 2120 2832 {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe 30 PID 2832 wrote to memory of 2120 2832 {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe 30 PID 2832 wrote to memory of 2120 2832 {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe 30 PID 2832 wrote to memory of 2532 2832 {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe 31 PID 2832 wrote to memory of 2532 2832 {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe 31 PID 2832 wrote to memory of 2532 2832 {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe 31 PID 2832 wrote to memory of 2532 2832 {0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe 31 PID 2120 wrote to memory of 2560 2120 {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe 32 PID 2120 wrote to memory of 2560 2120 {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe 32 PID 2120 wrote to memory of 2560 2120 {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe 32 PID 2120 wrote to memory of 2560 2120 {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe 32 PID 2120 wrote to memory of 3060 2120 {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe 33 PID 2120 wrote to memory of 3060 2120 {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe 33 PID 2120 wrote to memory of 3060 2120 {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe 33 PID 2120 wrote to memory of 3060 2120 {BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe 33 PID 2560 wrote to memory of 2480 2560 {1B79F929-1622-461c-8C3F-C2F578971F92}.exe 36 PID 2560 wrote to memory of 2480 2560 {1B79F929-1622-461c-8C3F-C2F578971F92}.exe 36 PID 2560 wrote to memory of 2480 2560 {1B79F929-1622-461c-8C3F-C2F578971F92}.exe 36 PID 2560 wrote to memory of 2480 2560 {1B79F929-1622-461c-8C3F-C2F578971F92}.exe 36 PID 2560 wrote to memory of 760 2560 {1B79F929-1622-461c-8C3F-C2F578971F92}.exe 37 PID 2560 wrote to memory of 760 2560 {1B79F929-1622-461c-8C3F-C2F578971F92}.exe 37 PID 2560 wrote to memory of 760 2560 {1B79F929-1622-461c-8C3F-C2F578971F92}.exe 37 PID 2560 wrote to memory of 760 2560 {1B79F929-1622-461c-8C3F-C2F578971F92}.exe 37 PID 2480 wrote to memory of 2284 2480 {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe 38 PID 2480 wrote to memory of 2284 2480 {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe 38 PID 2480 wrote to memory of 2284 2480 {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe 38 PID 2480 wrote to memory of 2284 2480 {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe 38 PID 2480 wrote to memory of 856 2480 {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe 39 PID 2480 wrote to memory of 856 2480 {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe 39 PID 2480 wrote to memory of 856 2480 {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe 39 PID 2480 wrote to memory of 856 2480 {FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe 39 PID 2284 wrote to memory of 2256 2284 {4142B9A1-7174-4a55-8998-563559FACF2B}.exe 40 PID 2284 wrote to memory of 2256 2284 {4142B9A1-7174-4a55-8998-563559FACF2B}.exe 40 PID 2284 wrote to memory of 2256 2284 {4142B9A1-7174-4a55-8998-563559FACF2B}.exe 40 PID 2284 wrote to memory of 2256 2284 {4142B9A1-7174-4a55-8998-563559FACF2B}.exe 40 PID 2284 wrote to memory of 2164 2284 {4142B9A1-7174-4a55-8998-563559FACF2B}.exe 41 PID 2284 wrote to memory of 2164 2284 {4142B9A1-7174-4a55-8998-563559FACF2B}.exe 41 PID 2284 wrote to memory of 2164 2284 {4142B9A1-7174-4a55-8998-563559FACF2B}.exe 41 PID 2284 wrote to memory of 2164 2284 {4142B9A1-7174-4a55-8998-563559FACF2B}.exe 41 PID 2256 wrote to memory of 2736 2256 {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe 42 PID 2256 wrote to memory of 2736 2256 {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe 42 PID 2256 wrote to memory of 2736 2256 {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe 42 PID 2256 wrote to memory of 2736 2256 {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe 42 PID 2256 wrote to memory of 2828 2256 {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe 43 PID 2256 wrote to memory of 2828 2256 {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe 43 PID 2256 wrote to memory of 2828 2256 {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe 43 PID 2256 wrote to memory of 2828 2256 {291900EA-5EE0-47c6-A0E7-E7799C881407}.exe 43 PID 2736 wrote to memory of 1580 2736 {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe 44 PID 2736 wrote to memory of 1580 2736 {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe 44 PID 2736 wrote to memory of 1580 2736 {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe 44 PID 2736 wrote to memory of 1580 2736 {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe 44 PID 2736 wrote to memory of 1708 2736 {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe 45 PID 2736 wrote to memory of 1708 2736 {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe 45 PID 2736 wrote to memory of 1708 2736 {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe 45 PID 2736 wrote to memory of 1708 2736 {C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-27_c0d85563429873aed4792bf8e410cf0a_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\{0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exeC:\Windows\{0FC0FC1C-D127-490e-8F0C-696B125D5FFF}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\{BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exeC:\Windows\{BFD60732-EEB8-4166-B5FB-8FF8A0C915A5}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\{1B79F929-1622-461c-8C3F-C2F578971F92}.exeC:\Windows\{1B79F929-1622-461c-8C3F-C2F578971F92}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\{FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exeC:\Windows\{FA958FB3-6B41-49a4-B707-DDC24ACD6A13}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\{4142B9A1-7174-4a55-8998-563559FACF2B}.exeC:\Windows\{4142B9A1-7174-4a55-8998-563559FACF2B}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\{291900EA-5EE0-47c6-A0E7-E7799C881407}.exeC:\Windows\{291900EA-5EE0-47c6-A0E7-E7799C881407}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\{C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exeC:\Windows\{C213864B-C9BD-414f-BD7F-7C0BF67B8E0C}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4}.exeC:\Windows\{0D36CE3C-E008-4ec7-8EA8-88E3DFE0FFB4}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1580 -
C:\Windows\{663B39D8-7116-4fb3-B375-AF1A308B06BD}.exeC:\Windows\{663B39D8-7116-4fb3-B375-AF1A308B06BD}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\{21406433-6936-41e3-9456-5DF91D71C33C}.exeC:\Windows\{21406433-6936-41e3-9456-5DF91D71C33C}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Windows\{D1269C31-9341-457f-ADE0-C59B55DC3808}.exeC:\Windows\{D1269C31-9341-457f-ADE0-C59B55DC3808}.exe12⤵
- Executes dropped EXE
PID:1028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{21406~1.EXE > nul12⤵PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{663B3~1.EXE > nul11⤵PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D36C~1.EXE > nul10⤵PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2138~1.EXE > nul9⤵PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{29190~1.EXE > nul8⤵PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4142B~1.EXE > nul7⤵PID:2164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FA958~1.EXE > nul6⤵PID:856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1B79F~1.EXE > nul5⤵PID:760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BFD60~1.EXE > nul4⤵PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0FC0F~1.EXE > nul3⤵PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD581c39d74ebee5d4c28cef10bd12db52a
SHA10486a42f4ea34f6e1d97dbf50b883cc3e8573b2f
SHA256d4093248bfbe1a523267adb1deec849a898d9d3979206612c1d5805155273a68
SHA5125972a613094dcd47aa259cf4ed76787661af0849e3b3c5529b148d22b0fe68f9f5774928024233efc55049626f226dba7433f9d4b7bd8bec0cd08d3f0e1a594b
-
Filesize
180KB
MD58a23f3574551ecb3ff879e8388e59b6c
SHA1e58d820b3cfc316829ed4849737c73c839c045f3
SHA25656dab7e2d2bcf2b45d33bbfddb86bc22cc7cd42b4e256450a3265fe77a9cb34e
SHA512ff8d47e129f2d7f218e96724454fc0e7989961bd76a924962a6210b56ac6587a95fea192b3aef32ee574e76f04b52ccbe0f8ea72758c3268d9071131626a0ab9
-
Filesize
180KB
MD56424bab9a7c6125a13dbdabfd801620c
SHA163a7f3a04459a2831631d16b81174d86f3330801
SHA256a591629374fd5dfac5ee3e5f0a2783864958ed036bdc8012ad64853b90c15e23
SHA512a373103e2898f88cf61b4a77ae342c84aafc1d6e79c389931b9edf3a4b2e27459289ec2e9e0c6979e2c4d4e9299abfb2b1013aab14ad1694692f1c0a28586ffe
-
Filesize
180KB
MD58654fa5b630c6768f4de7214d5197457
SHA1c767e9e108dd4a4eed2b5c5ab687217dce4ebd62
SHA256b5d8bb3b61b69cd0ddd64b0b69d50a06173c75173b93fbf154aa55683f49a20f
SHA512b7ed9c383b538893729a91dde8614e027329053ac4efad029fac616b254d9ea8dda600d0a26c68786b788dd2e25df6976ae978669bd706697a4fdc628279c4f9
-
Filesize
180KB
MD538cddee7893e629ae04fd85a9d666eb4
SHA1923770da3e975c39452388374a4ae013fd0e5587
SHA256a6de3f912e8af525a02b93cb5152c9985bbb22bc739ae7ea1fb176c45bc75823
SHA51264d96fb3933c887c06fa45b204e169f85b4496dab6ec5f60aa1323ccc9316639e46e30f5e9b41549c7d444524892e49fdfc3875e64d2bdc96432cb99f5aaaad2
-
Filesize
180KB
MD55ecaee91e7934b253e8511e49baf7ae9
SHA1bbc9877a3e33b40793abbd15965cead21cc40f07
SHA256b8d25ed7c10f6403e3ac29f924cefc512472098b738d3de4a0863b253b22f6cd
SHA512a11487ce89652714cae876f90cdd010fd5fbcb0ddcc756c763d5627c643a2ce14f3747726dbd79ee42ed0a62dd4c17ccfb15184fec011b7f9eedc57095e05613
-
Filesize
180KB
MD5f24d5aa9f0e40a67ee6e783837f67155
SHA11f937fe08dfa8bf314a09e862242db50c5a2133c
SHA2561d092a64dd2d135bdf9618160555ef3d8e3e07dd0020b3b003f496a73d10bd9f
SHA512880a7c70a4b025a49b8b518dcb8341037cdc23498a32da95ec6c8c4d452de2f1de665936ff872390983203cef1d1609474956a85268a118c8ececa37b80d889d
-
Filesize
180KB
MD523fd37f84913cfea8b9389fb2dfed8af
SHA18ea19884e986d5da6377843548b7a0159eff4cc8
SHA25614b33139670e660ab944392fbf4cbbe46f12aee6d23f29fd7ab95704cb9d7569
SHA5125bca7f20808f676ef3c39178bc995f9b6a73bb9c4a136c3d0e6c07a23266617f844fda4c998a059cfc85bcda15f195e8498b6b87761960320730367b09a2221d
-
Filesize
180KB
MD591e0b65866bdb7f42b7d5db7a8d2e1fc
SHA14bb10cc877c0f486ba16c54477e763506872216a
SHA256a717070c281cdc828ab17415d3f19fa9f7d3e435cdb92bcdc2691cd134cba4af
SHA512442af90e3cf276b3c35291a811e1249b9feabeb95f8f411c50b031819f93d0297ec2cc0ea46e969f306acf12ba6a0ff70d28130f121374700ad24a2bfac23053
-
Filesize
180KB
MD5d1323ddc86ea79ee97e1ee2620ae26e2
SHA1444c847552e6b5fc72dcf9971e6f49f46a4330c3
SHA256bd9dc5aa500ceacd43936854d42e5df1b5be73884f5bd409350599ce18a72c5b
SHA51299bb9885e77a724b0b0ff610caa12119f0a9e3000a35de0d528f2c6ea8c51f8f1c1f2ecfe6dc03203bb7cfabfb7f08bd5eac7032f1af4b5e9bf48313bc23cee3
-
Filesize
180KB
MD55c05841d12d4a49a3a93dbd8cee1814d
SHA15e652a522005b59a93b6b32de67fc67e3516ae66
SHA256ea8bc8f2052c707cdba25691835c5344eba842dcd5160bb99c7367d36e33884e
SHA512998959498cafaa8e54145071e4e1ce9ef4c537c21ee307709a962f2d7e08be02b2df4368b690d6057f31648cc476c21a6f4d0408bf45a3d97ffdc405bf31ff4f