Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe
-
Size
180KB
-
MD5
f3741bca08a664227f2437f039d7dd2c
-
SHA1
5c5e4b7d12fd0eca38003009060469747874cc63
-
SHA256
e7f44ca2e2b667c4028c7b783dbbe402b768051eab6396318f057cfd7d6f0360
-
SHA512
6fb6741c34d2ce0bb26c2fff13d8877f7936fcfa752f7e6039373ff4c076658bb5a1358c5d9ffa603511832a3ebc4d921afaf4bb667613fee93f61146d11c95b
-
SSDEEP
3072:jEGh0orlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG9l5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c000000014f71-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x003500000001567f-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000014f71-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000014f71-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000014f71-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x003500000001568c-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000015be6-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x003600000001568c-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2CBA760-C8FB-4348-837B-D116568ED2D7}\stubpath = "C:\\Windows\\{C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe" {AF079D74-E86D-45d6-857B-20D730082351}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33CF3776-7F0E-400f-AF35-A2E94CCD41DA}\stubpath = "C:\\Windows\\{33CF3776-7F0E-400f-AF35-A2E94CCD41DA}.exe" {069ACB54-7AD1-4cc7-9225-3373EE6447C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}\stubpath = "C:\\Windows\\{444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe" {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C} {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}\stubpath = "C:\\Windows\\{FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe" {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF079D74-E86D-45d6-857B-20D730082351} {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33CF3776-7F0E-400f-AF35-A2E94CCD41DA} {069ACB54-7AD1-4cc7-9225-3373EE6447C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{47753917-BF15-4b43-A41D-28128EA731EC}\stubpath = "C:\\Windows\\{47753917-BF15-4b43-A41D-28128EA731EC}.exe" {33CF3776-7F0E-400f-AF35-A2E94CCD41DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E10C772-DC86-421c-AAF5-D13BE5A16A43}\stubpath = "C:\\Windows\\{1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe" {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{444E4D91-4A04-4a4e-ADFA-6A18DE7EB458} {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E6AB1FD-2974-47a6-82EB-C7E73EB661E6} {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF079D74-E86D-45d6-857B-20D730082351}\stubpath = "C:\\Windows\\{AF079D74-E86D-45d6-857B-20D730082351}.exe" {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{069ACB54-7AD1-4cc7-9225-3373EE6447C9} {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{47753917-BF15-4b43-A41D-28128EA731EC} {33CF3776-7F0E-400f-AF35-A2E94CCD41DA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3F596A77-33D7-4111-8EF0-37AE1E4E2F8D} 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}\stubpath = "C:\\Windows\\{3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe" 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2CBA760-C8FB-4348-837B-D116568ED2D7} {AF079D74-E86D-45d6-857B-20D730082351}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{069ACB54-7AD1-4cc7-9225-3373EE6447C9}\stubpath = "C:\\Windows\\{069ACB54-7AD1-4cc7-9225-3373EE6447C9}.exe" {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A851B03-B13E-4896-8E88-8FD638D0F976} {47753917-BF15-4b43-A41D-28128EA731EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A851B03-B13E-4896-8E88-8FD638D0F976}\stubpath = "C:\\Windows\\{3A851B03-B13E-4896-8E88-8FD638D0F976}.exe" {47753917-BF15-4b43-A41D-28128EA731EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}\stubpath = "C:\\Windows\\{8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe" {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1E10C772-DC86-421c-AAF5-D13BE5A16A43} {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe -
Deletes itself 1 IoCs
pid Process 1160 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1816 {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe 2640 {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe 2748 {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe 2148 {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe 2720 {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe 2160 {AF079D74-E86D-45d6-857B-20D730082351}.exe 308 {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe 540 {069ACB54-7AD1-4cc7-9225-3373EE6447C9}.exe 2276 {33CF3776-7F0E-400f-AF35-A2E94CCD41DA}.exe 1404 {47753917-BF15-4b43-A41D-28128EA731EC}.exe 1624 {3A851B03-B13E-4896-8E88-8FD638D0F976}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe File created C:\Windows\{8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe File created C:\Windows\{1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe File created C:\Windows\{444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe File created C:\Windows\{FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe File created C:\Windows\{AF079D74-E86D-45d6-857B-20D730082351}.exe {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe File created C:\Windows\{C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe {AF079D74-E86D-45d6-857B-20D730082351}.exe File created C:\Windows\{3A851B03-B13E-4896-8E88-8FD638D0F976}.exe {47753917-BF15-4b43-A41D-28128EA731EC}.exe File created C:\Windows\{069ACB54-7AD1-4cc7-9225-3373EE6447C9}.exe {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe File created C:\Windows\{33CF3776-7F0E-400f-AF35-A2E94CCD41DA}.exe {069ACB54-7AD1-4cc7-9225-3373EE6447C9}.exe File created C:\Windows\{47753917-BF15-4b43-A41D-28128EA731EC}.exe {33CF3776-7F0E-400f-AF35-A2E94CCD41DA}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2756 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe Token: SeIncBasePriorityPrivilege 1816 {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe Token: SeIncBasePriorityPrivilege 2640 {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe Token: SeIncBasePriorityPrivilege 2748 {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe Token: SeIncBasePriorityPrivilege 2148 {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe Token: SeIncBasePriorityPrivilege 2720 {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe Token: SeIncBasePriorityPrivilege 2160 {AF079D74-E86D-45d6-857B-20D730082351}.exe Token: SeIncBasePriorityPrivilege 308 {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe Token: SeIncBasePriorityPrivilege 540 {069ACB54-7AD1-4cc7-9225-3373EE6447C9}.exe Token: SeIncBasePriorityPrivilege 2276 {33CF3776-7F0E-400f-AF35-A2E94CCD41DA}.exe Token: SeIncBasePriorityPrivilege 1404 {47753917-BF15-4b43-A41D-28128EA731EC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1816 2756 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe 28 PID 2756 wrote to memory of 1816 2756 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe 28 PID 2756 wrote to memory of 1816 2756 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe 28 PID 2756 wrote to memory of 1816 2756 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe 28 PID 2756 wrote to memory of 1160 2756 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe 29 PID 2756 wrote to memory of 1160 2756 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe 29 PID 2756 wrote to memory of 1160 2756 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe 29 PID 2756 wrote to memory of 1160 2756 2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe 29 PID 1816 wrote to memory of 2640 1816 {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe 30 PID 1816 wrote to memory of 2640 1816 {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe 30 PID 1816 wrote to memory of 2640 1816 {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe 30 PID 1816 wrote to memory of 2640 1816 {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe 30 PID 1816 wrote to memory of 2556 1816 {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe 31 PID 1816 wrote to memory of 2556 1816 {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe 31 PID 1816 wrote to memory of 2556 1816 {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe 31 PID 1816 wrote to memory of 2556 1816 {3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe 31 PID 2640 wrote to memory of 2748 2640 {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe 32 PID 2640 wrote to memory of 2748 2640 {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe 32 PID 2640 wrote to memory of 2748 2640 {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe 32 PID 2640 wrote to memory of 2748 2640 {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe 32 PID 2640 wrote to memory of 2456 2640 {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe 33 PID 2640 wrote to memory of 2456 2640 {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe 33 PID 2640 wrote to memory of 2456 2640 {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe 33 PID 2640 wrote to memory of 2456 2640 {8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe 33 PID 2748 wrote to memory of 2148 2748 {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe 36 PID 2748 wrote to memory of 2148 2748 {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe 36 PID 2748 wrote to memory of 2148 2748 {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe 36 PID 2748 wrote to memory of 2148 2748 {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe 36 PID 2748 wrote to memory of 1800 2748 {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe 37 PID 2748 wrote to memory of 1800 2748 {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe 37 PID 2748 wrote to memory of 1800 2748 {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe 37 PID 2748 wrote to memory of 1800 2748 {1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe 37 PID 2148 wrote to memory of 2720 2148 {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe 38 PID 2148 wrote to memory of 2720 2148 {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe 38 PID 2148 wrote to memory of 2720 2148 {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe 38 PID 2148 wrote to memory of 2720 2148 {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe 38 PID 2148 wrote to memory of 2780 2148 {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe 39 PID 2148 wrote to memory of 2780 2148 {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe 39 PID 2148 wrote to memory of 2780 2148 {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe 39 PID 2148 wrote to memory of 2780 2148 {444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe 39 PID 2720 wrote to memory of 2160 2720 {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe 40 PID 2720 wrote to memory of 2160 2720 {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe 40 PID 2720 wrote to memory of 2160 2720 {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe 40 PID 2720 wrote to memory of 2160 2720 {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe 40 PID 2720 wrote to memory of 1996 2720 {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe 41 PID 2720 wrote to memory of 1996 2720 {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe 41 PID 2720 wrote to memory of 1996 2720 {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe 41 PID 2720 wrote to memory of 1996 2720 {FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe 41 PID 2160 wrote to memory of 308 2160 {AF079D74-E86D-45d6-857B-20D730082351}.exe 42 PID 2160 wrote to memory of 308 2160 {AF079D74-E86D-45d6-857B-20D730082351}.exe 42 PID 2160 wrote to memory of 308 2160 {AF079D74-E86D-45d6-857B-20D730082351}.exe 42 PID 2160 wrote to memory of 308 2160 {AF079D74-E86D-45d6-857B-20D730082351}.exe 42 PID 2160 wrote to memory of 2256 2160 {AF079D74-E86D-45d6-857B-20D730082351}.exe 43 PID 2160 wrote to memory of 2256 2160 {AF079D74-E86D-45d6-857B-20D730082351}.exe 43 PID 2160 wrote to memory of 2256 2160 {AF079D74-E86D-45d6-857B-20D730082351}.exe 43 PID 2160 wrote to memory of 2256 2160 {AF079D74-E86D-45d6-857B-20D730082351}.exe 43 PID 308 wrote to memory of 540 308 {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe 44 PID 308 wrote to memory of 540 308 {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe 44 PID 308 wrote to memory of 540 308 {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe 44 PID 308 wrote to memory of 540 308 {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe 44 PID 308 wrote to memory of 2216 308 {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe 45 PID 308 wrote to memory of 2216 308 {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe 45 PID 308 wrote to memory of 2216 308 {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe 45 PID 308 wrote to memory of 2216 308 {C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\{3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exeC:\Windows\{3F596A77-33D7-4111-8EF0-37AE1E4E2F8D}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\{8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exeC:\Windows\{8E6AB1FD-2974-47a6-82EB-C7E73EB661E6}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\{1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exeC:\Windows\{1E10C772-DC86-421c-AAF5-D13BE5A16A43}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\{444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exeC:\Windows\{444E4D91-4A04-4a4e-ADFA-6A18DE7EB458}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\{FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exeC:\Windows\{FF94BB12-CB25-4df2-92DB-4AE8A5F6A69C}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\{AF079D74-E86D-45d6-857B-20D730082351}.exeC:\Windows\{AF079D74-E86D-45d6-857B-20D730082351}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\{C2CBA760-C8FB-4348-837B-D116568ED2D7}.exeC:\Windows\{C2CBA760-C8FB-4348-837B-D116568ED2D7}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\{069ACB54-7AD1-4cc7-9225-3373EE6447C9}.exeC:\Windows\{069ACB54-7AD1-4cc7-9225-3373EE6447C9}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:540 -
C:\Windows\{33CF3776-7F0E-400f-AF35-A2E94CCD41DA}.exeC:\Windows\{33CF3776-7F0E-400f-AF35-A2E94CCD41DA}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\{47753917-BF15-4b43-A41D-28128EA731EC}.exeC:\Windows\{47753917-BF15-4b43-A41D-28128EA731EC}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1404 -
C:\Windows\{3A851B03-B13E-4896-8E88-8FD638D0F976}.exeC:\Windows\{3A851B03-B13E-4896-8E88-8FD638D0F976}.exe12⤵
- Executes dropped EXE
PID:1624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{47753~1.EXE > nul12⤵PID:576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{33CF3~1.EXE > nul11⤵PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{069AC~1.EXE > nul10⤵PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2CBA~1.EXE > nul9⤵PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AF079~1.EXE > nul8⤵PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FF94B~1.EXE > nul7⤵PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{444E4~1.EXE > nul6⤵PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1E10C~1.EXE > nul5⤵PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E6AB~1.EXE > nul4⤵PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3F596~1.EXE > nul3⤵PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5d09990d220af7f36d72c038a10e6efd0
SHA1e25782e9140b9c51753bbcd894de4001cf22281a
SHA256df5ceea9c010032ea64edbf9b84f439264423e20d7e22dbfc1e7915efcab5445
SHA512a3a81461a29ca71b59057118cac662a7c4324e0bc5c5b1fc2e77ef75b5bfb829459df4cb37d12e29b5882c35d3c944b28977e949316b9e42fce25444b61df5c8
-
Filesize
180KB
MD54f3e584af01851e361fdfdb954f4bd88
SHA178fbd76d95f8ed569d3630f080808c2595061c82
SHA2562a14974c7ee5095f2181872d52744c7869c5578a24d5d442f28e31307b213391
SHA512850d9fe8a74350b852be1c039f29ff608458e5fb563b98a8f85a53a4109d36e14b9b380e7feffd42b33823416e5703b3629d185e4546cb10721fbcba92608ab5
-
Filesize
180KB
MD565c410696293ef971edbbdb24924b6de
SHA12c233c5d6e9eea275ab017b84d6fff74916ae624
SHA25676c02a6105b38a1744b666ec0048f06219f90564bdd1ff1979e9c8d78e24185d
SHA5120c1d4d6214f2a95df391d11e8b087bdfcdcf6867bdf6db279245d44517172a008d4ab5927c834056feb0684c3391b637f3bd23d696ffeffe909972f73cc79a63
-
Filesize
180KB
MD58d2ed3e0b45b809db0041e3901d733df
SHA1b5024ef4de88a5554ed1b47ce2a0186a9238018e
SHA2567957dc42a4573b08930426db50e7ab597356b66764a9547741838bcf2e461bc3
SHA512a99d71724aae2809c05aa45842906b36f26505d2768fcea88eb7dc9ae4ead82542544f081d0b5046fc6584d8ea17ee5c97c852e80203af1712c8aa1e34317813
-
Filesize
180KB
MD5e68edd86428944e81c17829c4de2b6ab
SHA1417570f158f370b51e9a06ccf10affad35c22e3d
SHA2564eb488d6d057cdca6d54647ce5f39ba86dae0726065590a0f3f75772ebeb8b3a
SHA5127488c1a7a1f4f117e3eceea1ed3f026a07f0c86e34a68dfde6da551b5e728af85e59c2f771eda8c823f4301b85533a5c1d87a9714d63065e05f663426d51ce82
-
Filesize
180KB
MD53c9cf5813f740b7c88b593c7bdb268cf
SHA1d0422405fbcfcbfb58ae9a6df78bf4fa09ea2d37
SHA2569868bd24fa47c4c1c193d86180cf5b7b086f1fc1df874e34518bc353e7c3cee2
SHA51203302e1d62ccd4ea23998b69d249c69de1a0317b7bafab3ef789d0dca184e77734f7ff823283a5757b9792b80c050a20363139dbc7d27405449a41e39a425e94
-
Filesize
180KB
MD51affd24b004ad0462af7b469187a3f3f
SHA1c8a739a3c0b68a42713d07f69040934a44161b83
SHA256e0b62d3448043c08e9fdc7dad315400881d66b1020066ce8f19890cd48c8da7a
SHA512d5ee3cfaa1d16270a777341c998d05158c3d5d162aa16a71a8adcb20ce27b13e1d904703c06e11bf6f107857074eab9fa7b1266b8bf4ecf3fbcf6e9dcb7be5b8
-
Filesize
180KB
MD517cb8a5a984f99ff2944c788b5e0dcae
SHA142749619197a31e8db927a510dfcc5bc5a8e8488
SHA2562fddae8c3e6d164900db6048830ed3fdc05ec3f8b46a20c5c351db560f8d5468
SHA51235a7fa43ec7af762e00bab82acc37385cedf565336d27f5b73c7cad488d35edcdb0fd1226458f585bc79ed4b3a4d945eb2dc6ab5483135cd6dfa309f96278b7c
-
Filesize
180KB
MD5d83721428a5a0243c6e9325f90d582c2
SHA1c19a54ec03dde7068f5609a97db18d5edba3358c
SHA256df688311ee7174e4cba4316172a384fee24cab1a5c681f53e70c5760aca8b772
SHA5126afc89a37d110368252c9831e9701c0defe4923b88b404d40893febe6181a219f4306f2247ca8c109f0685d7b7fe9cbdcc5c165c72f8bbc4ce9b4e015d23bae5
-
Filesize
180KB
MD5898feacf389ed239ef60b3d3de3b826f
SHA17655f3f256aef131a87126c5b81be626182ba04e
SHA2563752b1e708f0d97b9182b4ce0987bb82749d5c07699a4e4de771832d9511f0b8
SHA512bb3763651823ccfe96c1bee6ca4b2cc765d69cf688e0ffb247cf3fa18e21d617ad956a5f67b9713c846b5a38707d4f44fd3ff183bc18308c8e45e49118544e30
-
Filesize
180KB
MD585ea1f9671ca1fcfd0af6cabfc1920c6
SHA1713c1502f59508f133196703b19877ed42814fc8
SHA2561d984c4fb279ff8d21b9553f2a4cc2825d6299c15196a8e101bbfb1cf3ed0b2f
SHA512532b49106141a283fe5e3bf5a29eb6e69b11ca7ca8d00e969f24f4abaf9f4b0f580580881a29f930df887ee0fae188c9fa7c1bb0cc917d1905c80c6ad2f649b9