Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe
-
Size
180KB
-
MD5
aad8dbcce138384b45cc793c0e96c2e5
-
SHA1
bdecdad5ea9d82519726354a97233e334958a987
-
SHA256
dde49b4b65f0dab017a8f046e18a1b7e010a6aeb7e477cdfdb30594e2eb34eb1
-
SHA512
f0d25f0c3efe00956730e1e426ad55a21318894dd82ebd33dab82e7dc3ea1a33f198f09486c616e987705343a8e18c4e146528ac7898bc74d931e74edf399c47
-
SSDEEP
3072:jEGh0ohlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGPl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000d000000014708-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002f000000014b63-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000014708-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0013000000014bea-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000014f71-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0014000000014bea-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000015653-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0015000000014bea-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000015659-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000015661-74.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{776D19F0-A920-4b8f-B453-163492443C96}\stubpath = "C:\\Windows\\{776D19F0-A920-4b8f-B453-163492443C96}.exe" {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{830DCA46-05C6-40e9-9C64-275BB397580A}\stubpath = "C:\\Windows\\{830DCA46-05C6-40e9-9C64-275BB397580A}.exe" {72132E60-B685-45a0-8D3C-9DCA3DA42649}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93166571-4A1B-4f05-9CC2-1F23BEAF82BC}\stubpath = "C:\\Windows\\{93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe" {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}\stubpath = "C:\\Windows\\{1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe" {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{290D955C-12CC-4114-BAD2-33D12462F4AE} {776D19F0-A920-4b8f-B453-163492443C96}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{290D955C-12CC-4114-BAD2-33D12462F4AE}\stubpath = "C:\\Windows\\{290D955C-12CC-4114-BAD2-33D12462F4AE}.exe" {776D19F0-A920-4b8f-B453-163492443C96}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6157BA8C-6133-4adc-B9BC-41545F8D94D3} {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{93166571-4A1B-4f05-9CC2-1F23BEAF82BC} {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{72132E60-B685-45a0-8D3C-9DCA3DA42649}\stubpath = "C:\\Windows\\{72132E60-B685-45a0-8D3C-9DCA3DA42649}.exe" {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38D133F2-7D11-46d3-9E76-1F4F2912F4CF} {830DCA46-05C6-40e9-9C64-275BB397580A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BA11751E-5248-4be0-A892-1A0C0B8BF8B6} 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BA11751E-5248-4be0-A892-1A0C0B8BF8B6}\stubpath = "C:\\Windows\\{BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe" 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6157BA8C-6133-4adc-B9BC-41545F8D94D3}\stubpath = "C:\\Windows\\{6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe" {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C8BDC8E-F472-4e95-96C7-EC99F7791F5E} {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{72132E60-B685-45a0-8D3C-9DCA3DA42649} {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{830DCA46-05C6-40e9-9C64-275BB397580A} {72132E60-B685-45a0-8D3C-9DCA3DA42649}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38D133F2-7D11-46d3-9E76-1F4F2912F4CF}\stubpath = "C:\\Windows\\{38D133F2-7D11-46d3-9E76-1F4F2912F4CF}.exe" {830DCA46-05C6-40e9-9C64-275BB397580A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4632A10-6206-44fc-B356-22574AA0E343} {38D133F2-7D11-46d3-9E76-1F4F2912F4CF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{776D19F0-A920-4b8f-B453-163492443C96} {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F187EB5-AD49-4aac-8A47-A0764EC9681A} {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F187EB5-AD49-4aac-8A47-A0764EC9681A}\stubpath = "C:\\Windows\\{8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe" {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4632A10-6206-44fc-B356-22574AA0E343}\stubpath = "C:\\Windows\\{A4632A10-6206-44fc-B356-22574AA0E343}.exe" {38D133F2-7D11-46d3-9E76-1F4F2912F4CF}.exe -
Deletes itself 1 IoCs
pid Process 2556 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1336 {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe 2572 {776D19F0-A920-4b8f-B453-163492443C96}.exe 2840 {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe 2332 {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe 3000 {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe 2516 {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe 1532 {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe 776 {72132E60-B685-45a0-8D3C-9DCA3DA42649}.exe 960 {830DCA46-05C6-40e9-9C64-275BB397580A}.exe 1472 {38D133F2-7D11-46d3-9E76-1F4F2912F4CF}.exe 1496 {A4632A10-6206-44fc-B356-22574AA0E343}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{38D133F2-7D11-46d3-9E76-1F4F2912F4CF}.exe {830DCA46-05C6-40e9-9C64-275BB397580A}.exe File created C:\Windows\{BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe File created C:\Windows\{776D19F0-A920-4b8f-B453-163492443C96}.exe {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe File created C:\Windows\{6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe File created C:\Windows\{93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe File created C:\Windows\{8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe File created C:\Windows\{1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe File created C:\Windows\{72132E60-B685-45a0-8D3C-9DCA3DA42649}.exe {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe File created C:\Windows\{290D955C-12CC-4114-BAD2-33D12462F4AE}.exe {776D19F0-A920-4b8f-B453-163492443C96}.exe File created C:\Windows\{830DCA46-05C6-40e9-9C64-275BB397580A}.exe {72132E60-B685-45a0-8D3C-9DCA3DA42649}.exe File created C:\Windows\{A4632A10-6206-44fc-B356-22574AA0E343}.exe {38D133F2-7D11-46d3-9E76-1F4F2912F4CF}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1996 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe Token: SeIncBasePriorityPrivilege 1336 {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe Token: SeIncBasePriorityPrivilege 2572 {776D19F0-A920-4b8f-B453-163492443C96}.exe Token: SeIncBasePriorityPrivilege 2840 {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe Token: SeIncBasePriorityPrivilege 2332 {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe Token: SeIncBasePriorityPrivilege 3000 {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe Token: SeIncBasePriorityPrivilege 2516 {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe Token: SeIncBasePriorityPrivilege 1532 {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe Token: SeIncBasePriorityPrivilege 776 {72132E60-B685-45a0-8D3C-9DCA3DA42649}.exe Token: SeIncBasePriorityPrivilege 960 {830DCA46-05C6-40e9-9C64-275BB397580A}.exe Token: SeIncBasePriorityPrivilege 1472 {38D133F2-7D11-46d3-9E76-1F4F2912F4CF}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1336 1996 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe 28 PID 1996 wrote to memory of 1336 1996 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe 28 PID 1996 wrote to memory of 1336 1996 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe 28 PID 1996 wrote to memory of 1336 1996 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe 28 PID 1996 wrote to memory of 2556 1996 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe 29 PID 1996 wrote to memory of 2556 1996 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe 29 PID 1996 wrote to memory of 2556 1996 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe 29 PID 1996 wrote to memory of 2556 1996 2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe 29 PID 1336 wrote to memory of 2572 1336 {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe 30 PID 1336 wrote to memory of 2572 1336 {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe 30 PID 1336 wrote to memory of 2572 1336 {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe 30 PID 1336 wrote to memory of 2572 1336 {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe 30 PID 1336 wrote to memory of 2920 1336 {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe 31 PID 1336 wrote to memory of 2920 1336 {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe 31 PID 1336 wrote to memory of 2920 1336 {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe 31 PID 1336 wrote to memory of 2920 1336 {BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe 31 PID 2572 wrote to memory of 2840 2572 {776D19F0-A920-4b8f-B453-163492443C96}.exe 32 PID 2572 wrote to memory of 2840 2572 {776D19F0-A920-4b8f-B453-163492443C96}.exe 32 PID 2572 wrote to memory of 2840 2572 {776D19F0-A920-4b8f-B453-163492443C96}.exe 32 PID 2572 wrote to memory of 2840 2572 {776D19F0-A920-4b8f-B453-163492443C96}.exe 32 PID 2572 wrote to memory of 2612 2572 {776D19F0-A920-4b8f-B453-163492443C96}.exe 33 PID 2572 wrote to memory of 2612 2572 {776D19F0-A920-4b8f-B453-163492443C96}.exe 33 PID 2572 wrote to memory of 2612 2572 {776D19F0-A920-4b8f-B453-163492443C96}.exe 33 PID 2572 wrote to memory of 2612 2572 {776D19F0-A920-4b8f-B453-163492443C96}.exe 33 PID 2840 wrote to memory of 2332 2840 {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe 36 PID 2840 wrote to memory of 2332 2840 {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe 36 PID 2840 wrote to memory of 2332 2840 {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe 36 PID 2840 wrote to memory of 2332 2840 {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe 36 PID 2840 wrote to memory of 2844 2840 {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe 37 PID 2840 wrote to memory of 2844 2840 {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe 37 PID 2840 wrote to memory of 2844 2840 {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe 37 PID 2840 wrote to memory of 2844 2840 {290D955C-12CC-4114-BAD2-33D12462F4AE}.exe 37 PID 2332 wrote to memory of 3000 2332 {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe 38 PID 2332 wrote to memory of 3000 2332 {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe 38 PID 2332 wrote to memory of 3000 2332 {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe 38 PID 2332 wrote to memory of 3000 2332 {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe 38 PID 2332 wrote to memory of 2996 2332 {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe 39 PID 2332 wrote to memory of 2996 2332 {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe 39 PID 2332 wrote to memory of 2996 2332 {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe 39 PID 2332 wrote to memory of 2996 2332 {6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe 39 PID 3000 wrote to memory of 2516 3000 {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe 40 PID 3000 wrote to memory of 2516 3000 {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe 40 PID 3000 wrote to memory of 2516 3000 {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe 40 PID 3000 wrote to memory of 2516 3000 {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe 40 PID 3000 wrote to memory of 1940 3000 {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe 41 PID 3000 wrote to memory of 1940 3000 {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe 41 PID 3000 wrote to memory of 1940 3000 {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe 41 PID 3000 wrote to memory of 1940 3000 {93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe 41 PID 2516 wrote to memory of 1532 2516 {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe 42 PID 2516 wrote to memory of 1532 2516 {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe 42 PID 2516 wrote to memory of 1532 2516 {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe 42 PID 2516 wrote to memory of 1532 2516 {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe 42 PID 2516 wrote to memory of 2860 2516 {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe 43 PID 2516 wrote to memory of 2860 2516 {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe 43 PID 2516 wrote to memory of 2860 2516 {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe 43 PID 2516 wrote to memory of 2860 2516 {8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe 43 PID 1532 wrote to memory of 776 1532 {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe 44 PID 1532 wrote to memory of 776 1532 {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe 44 PID 1532 wrote to memory of 776 1532 {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe 44 PID 1532 wrote to memory of 776 1532 {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe 44 PID 1532 wrote to memory of 1320 1532 {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe 45 PID 1532 wrote to memory of 1320 1532 {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe 45 PID 1532 wrote to memory of 1320 1532 {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe 45 PID 1532 wrote to memory of 1320 1532 {1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-01_aad8dbcce138384b45cc793c0e96c2e5_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\{BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exeC:\Windows\{BA11751E-5248-4be0-A892-1A0C0B8BF8B6}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\{776D19F0-A920-4b8f-B453-163492443C96}.exeC:\Windows\{776D19F0-A920-4b8f-B453-163492443C96}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\{290D955C-12CC-4114-BAD2-33D12462F4AE}.exeC:\Windows\{290D955C-12CC-4114-BAD2-33D12462F4AE}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\{6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exeC:\Windows\{6157BA8C-6133-4adc-B9BC-41545F8D94D3}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\{93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exeC:\Windows\{93166571-4A1B-4f05-9CC2-1F23BEAF82BC}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\{8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exeC:\Windows\{8F187EB5-AD49-4aac-8A47-A0764EC9681A}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\{1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exeC:\Windows\{1C8BDC8E-F472-4e95-96C7-EC99F7791F5E}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\{72132E60-B685-45a0-8D3C-9DCA3DA42649}.exeC:\Windows\{72132E60-B685-45a0-8D3C-9DCA3DA42649}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:776 -
C:\Windows\{830DCA46-05C6-40e9-9C64-275BB397580A}.exeC:\Windows\{830DCA46-05C6-40e9-9C64-275BB397580A}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\Windows\{38D133F2-7D11-46d3-9E76-1F4F2912F4CF}.exeC:\Windows\{38D133F2-7D11-46d3-9E76-1F4F2912F4CF}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1472 -
C:\Windows\{A4632A10-6206-44fc-B356-22574AA0E343}.exeC:\Windows\{A4632A10-6206-44fc-B356-22574AA0E343}.exe12⤵
- Executes dropped EXE
PID:1496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{38D13~1.EXE > nul12⤵PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{830DC~1.EXE > nul11⤵PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72132~1.EXE > nul10⤵PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C8BD~1.EXE > nul9⤵PID:1320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F187~1.EXE > nul8⤵PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{93166~1.EXE > nul7⤵PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6157B~1.EXE > nul6⤵PID:2996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{290D9~1.EXE > nul5⤵PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{776D1~1.EXE > nul4⤵PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BA117~1.EXE > nul3⤵PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5e7b439dcd05d6eda87712e2d761de3b9
SHA118d12928385ab8b7f1d0ef94f21d91b4af63a33b
SHA25648e642220562e85d60b68379c7cd53ab7356ccf2647f58427aa6ccb32e194bae
SHA512c2b1d30aa1dbd3a1e273232790110ff1f89e6f9cd0d9ba1522444e662b50171473cf4711c5ea057f6d044d80b6890636c4ea7602f3f4d87e8fe3f01f775154f5
-
Filesize
180KB
MD5a15dc0bdaaca90b962696d078304357d
SHA17f9cd7ea9aa8e100f326f51b071d94ef8d32a9ae
SHA25606fa59b13aec88109903c87c7b7dc4764205f39ede5ac644877560cae97aa87a
SHA5126031a2d48e8cf583c97c8c55b875b767ea7e7ce46841271c69b64bf760aba4b234dd7bff586ed6627d22af602f84b123ee581bf6ba5f8859271018bf249bb48f
-
Filesize
180KB
MD5ca8fbb6157344dffac28babcf891cfcc
SHA14f9261799199d75c8840af964924b15a3b8dfba3
SHA25655f3c012dbdb5bdb14b165f86202fbf4384bfd4e21d2f4d0538b2ea0177a0ed3
SHA512b577ed8d39b723b9f456f539431b7ecedc372d2a1840c55a1714dcd8c9195e74ff68b0eb6db2a9ab7490545524ee455446a8d3614dc17d4cfd1c77998b122f3c
-
Filesize
180KB
MD5cf1b5c8c5b3c47e5337ba3dad5d0e6de
SHA1693557bfb07b64f56ecd68759143789ac5294220
SHA2562b0558603e8e4c7191c020a7f6171662d0f2595c553e5bf7d9e2c7b07d349e55
SHA5123869cc78ec91b39015b51a26e80a2a303b8a2761af61502fb3cc1d5dcbe480c137aac5bdbaab4da806b9edd45a21b48e04da4a68679b7b71d7e1f192ec5df123
-
Filesize
180KB
MD5d03b694a958b5542af7f45edec03d91d
SHA13ac31d4b1f6c0a79ca74056f912d0fbd98dafe68
SHA2560f6f83d46c1e4e37cf6959af3a75673a0f7412ae078e3417c60c8918b4729e68
SHA5125484558980b948d87d0b4e9d6bf6944534cd0fc0daa29b77db9e4a2895bf8d32b97f3efe5626cfcaf423c1aed2229534f41e04a310c353a6c1ebd78e4e261bde
-
Filesize
180KB
MD55a3f83201b63fb41938c3a1e0ac83dd1
SHA12c643a9539df42d6319a7c938cd5f2dd53411519
SHA256aafcbffc52d4c594b97b049dfd32f576f0cb8c20fbdce9d4af62e98c46d784ed
SHA512b9e662f465c5db5b7837fe180729d72f16e6eb1955f59d0b85e7710dd445dca66feb78a4d54909ffb8e11b42eca12ce416cee590577190c6b17ae9676841585c
-
Filesize
180KB
MD56a629fa13c0ee20e36723836cffc36e1
SHA1530da9e0d79e319ccda4dd97b66ac7420fa8cefd
SHA2568dd171951eda1166cd7b930312660ead7d599c6518d49dc742e9ad79d13d3a33
SHA512c947c72e815da00d470ac9fe6b0811495450cf8b21c1a51e7cb75f93d6820fc022605dbf79dacf9129aecb151a6baa32b18b2a8eef563588d22460db6e2d4e39
-
Filesize
180KB
MD50fec45402f134e7d065eb39721200e98
SHA15e9ac37eedfe91da814f721c7e38566e56cbc035
SHA2562cec2bfab00fa97b21fd3b15121f787b8970ad7d614d8c0a18fe0b23c8641ff9
SHA512e84c90f874a66762fe21e7332e0309cb3c8902c92a40aea275f47ccbcf09704fc719abeb804dc02556a5fbdb98b85c96d6c2832f829306e6879dbec443d44e38
-
Filesize
180KB
MD514615f966cc6325d914e840a515fb5f8
SHA1ba46d35ba6e1e437fb08d4ccc6076325888f0b9f
SHA256b99ad4cd606baf4825639ca14f8177aeb7c2f1cb860cfe09f0939864f53f3ed4
SHA512b632ed9fcce143c16102a52f91995260d10b5c698687a74b1127f70692e0d70c55e60de9e43ed72471f44b6f349fef198358797f61110f1f37ec094cddd5a650
-
Filesize
180KB
MD5c5d33f004d10f627850861e7a426e094
SHA131d73a83efd3a32951c992b4ebbc447ac5dfa751
SHA2569237df83ae2ac7aad68f9f94c4a83de6a57f5e5465aae72ef4f089386dfa2ee0
SHA512900449a3b54126289b37279ca731e5187c6e3b3de413924230200974f1c85611a2c5c496c1b7f7eedd3cdc277abb48e48909565559b7ac8e6b222a03a22909d4
-
Filesize
180KB
MD5cff9c70b391626e4332c6fdc621a0bfd
SHA1d2c285aa59b41924967a3cd3f2596d1928614519
SHA256d80d99aec812fd470614c0868224048fa872873fb2046a9e817e2a5e97e900d1
SHA51232172a1919b6c07fffa3d71408d2acf348420c2cff75e770ff505163511727a70a918f00761b51071a67afcf48d28be32494ceaee0f554cdced95583def5b663