Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe
-
Size
408KB
-
MD5
35d1fe284d252d28f54228f89533265d
-
SHA1
2608bf047c19ff47248b21f140b8c8e7e123fa24
-
SHA256
bb6047a97ea1c5b1a2e13b80f098cf662edc63d3d9a9a86d2f9011d88728a04f
-
SHA512
3321ae750f86adb2a9bb87177e89336e60f756dfeadbe430fd291b7126e7b581cf1c1bb205809e5a0f0eee6faebc30718561d41046a06bc613197fbdf4eaa088
-
SSDEEP
3072:CEGh0odl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGTldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000a00000001224e-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012671-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b00000001224e-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c00000001224e-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001224e-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001224e-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001224e-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38EF0F6C-3B06-47b7-AE51-9A20B1A92174}\stubpath = "C:\\Windows\\{38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe" {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8D6B6050-E21A-41a8-8F4B-2937446E9E55}\stubpath = "C:\\Windows\\{8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe" {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{978DC600-828A-40a1-9ACA-AFA6129A73A5}\stubpath = "C:\\Windows\\{978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe" {5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8D1CEAB9-C42D-44fe-ACE0-4A811972399B}\stubpath = "C:\\Windows\\{8D1CEAB9-C42D-44fe-ACE0-4A811972399B}.exe" {E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{610BE5FE-B309-46ea-9390-BDEE1FE4A018}\stubpath = "C:\\Windows\\{610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe" {570FFB51-02A7-4076-A7E9-841E54505851}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B4B6E13C-C912-4bfa-B034-DFB91B8F5A68} {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EFD11312-D8CA-4958-B642-314473BA1145} {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{570FFB51-02A7-4076-A7E9-841E54505851} 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{035FCB0D-B574-4d88-B726-0E0EF40F148F} {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8D6B6050-E21A-41a8-8F4B-2937446E9E55} {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EFD11312-D8CA-4958-B642-314473BA1145}\stubpath = "C:\\Windows\\{EFD11312-D8CA-4958-B642-314473BA1145}.exe" {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}\stubpath = "C:\\Windows\\{5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe" {EFD11312-D8CA-4958-B642-314473BA1145}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E7ECC38F-82A2-49f2-9068-4942F409FABD} {978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{610BE5FE-B309-46ea-9390-BDEE1FE4A018} {570FFB51-02A7-4076-A7E9-841E54505851}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{035FCB0D-B574-4d88-B726-0E0EF40F148F}\stubpath = "C:\\Windows\\{035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe" {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38EF0F6C-3B06-47b7-AE51-9A20B1A92174} {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}\stubpath = "C:\\Windows\\{B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe" {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4} {EFD11312-D8CA-4958-B642-314473BA1145}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{978DC600-828A-40a1-9ACA-AFA6129A73A5} {5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E7ECC38F-82A2-49f2-9068-4942F409FABD}\stubpath = "C:\\Windows\\{E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe" {978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8D1CEAB9-C42D-44fe-ACE0-4A811972399B} {E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{570FFB51-02A7-4076-A7E9-841E54505851}\stubpath = "C:\\Windows\\{570FFB51-02A7-4076-A7E9-841E54505851}.exe" 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe -
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2208 {570FFB51-02A7-4076-A7E9-841E54505851}.exe 2652 {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe 2732 {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe 3024 {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe 2780 {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe 800 {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe 2308 {EFD11312-D8CA-4958-B642-314473BA1145}.exe 2708 {5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe 2300 {978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe 1944 {E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe 648 {8D1CEAB9-C42D-44fe-ACE0-4A811972399B}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe {570FFB51-02A7-4076-A7E9-841E54505851}.exe File created C:\Windows\{035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe File created C:\Windows\{8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe File created C:\Windows\{EFD11312-D8CA-4958-B642-314473BA1145}.exe {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe File created C:\Windows\{978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe {5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe File created C:\Windows\{E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe {978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe File created C:\Windows\{8D1CEAB9-C42D-44fe-ACE0-4A811972399B}.exe {E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe File created C:\Windows\{570FFB51-02A7-4076-A7E9-841E54505851}.exe 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe File created C:\Windows\{B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe File created C:\Windows\{5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe {EFD11312-D8CA-4958-B642-314473BA1145}.exe File created C:\Windows\{38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3008 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe Token: SeIncBasePriorityPrivilege 2208 {570FFB51-02A7-4076-A7E9-841E54505851}.exe Token: SeIncBasePriorityPrivilege 2652 {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe Token: SeIncBasePriorityPrivilege 2732 {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe Token: SeIncBasePriorityPrivilege 3024 {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe Token: SeIncBasePriorityPrivilege 2780 {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe Token: SeIncBasePriorityPrivilege 800 {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe Token: SeIncBasePriorityPrivilege 2308 {EFD11312-D8CA-4958-B642-314473BA1145}.exe Token: SeIncBasePriorityPrivilege 2708 {5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe Token: SeIncBasePriorityPrivilege 2300 {978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe Token: SeIncBasePriorityPrivilege 1944 {E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2208 3008 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe 28 PID 3008 wrote to memory of 2208 3008 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe 28 PID 3008 wrote to memory of 2208 3008 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe 28 PID 3008 wrote to memory of 2208 3008 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe 28 PID 3008 wrote to memory of 2608 3008 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe 29 PID 3008 wrote to memory of 2608 3008 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe 29 PID 3008 wrote to memory of 2608 3008 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe 29 PID 3008 wrote to memory of 2608 3008 2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe 29 PID 2208 wrote to memory of 2652 2208 {570FFB51-02A7-4076-A7E9-841E54505851}.exe 30 PID 2208 wrote to memory of 2652 2208 {570FFB51-02A7-4076-A7E9-841E54505851}.exe 30 PID 2208 wrote to memory of 2652 2208 {570FFB51-02A7-4076-A7E9-841E54505851}.exe 30 PID 2208 wrote to memory of 2652 2208 {570FFB51-02A7-4076-A7E9-841E54505851}.exe 30 PID 2208 wrote to memory of 2576 2208 {570FFB51-02A7-4076-A7E9-841E54505851}.exe 31 PID 2208 wrote to memory of 2576 2208 {570FFB51-02A7-4076-A7E9-841E54505851}.exe 31 PID 2208 wrote to memory of 2576 2208 {570FFB51-02A7-4076-A7E9-841E54505851}.exe 31 PID 2208 wrote to memory of 2576 2208 {570FFB51-02A7-4076-A7E9-841E54505851}.exe 31 PID 2652 wrote to memory of 2732 2652 {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe 32 PID 2652 wrote to memory of 2732 2652 {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe 32 PID 2652 wrote to memory of 2732 2652 {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe 32 PID 2652 wrote to memory of 2732 2652 {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe 32 PID 2652 wrote to memory of 2704 2652 {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe 33 PID 2652 wrote to memory of 2704 2652 {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe 33 PID 2652 wrote to memory of 2704 2652 {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe 33 PID 2652 wrote to memory of 2704 2652 {610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe 33 PID 2732 wrote to memory of 3024 2732 {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe 36 PID 2732 wrote to memory of 3024 2732 {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe 36 PID 2732 wrote to memory of 3024 2732 {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe 36 PID 2732 wrote to memory of 3024 2732 {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe 36 PID 2732 wrote to memory of 2264 2732 {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe 37 PID 2732 wrote to memory of 2264 2732 {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe 37 PID 2732 wrote to memory of 2264 2732 {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe 37 PID 2732 wrote to memory of 2264 2732 {035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe 37 PID 3024 wrote to memory of 2780 3024 {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe 38 PID 3024 wrote to memory of 2780 3024 {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe 38 PID 3024 wrote to memory of 2780 3024 {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe 38 PID 3024 wrote to memory of 2780 3024 {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe 38 PID 3024 wrote to memory of 2820 3024 {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe 39 PID 3024 wrote to memory of 2820 3024 {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe 39 PID 3024 wrote to memory of 2820 3024 {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe 39 PID 3024 wrote to memory of 2820 3024 {38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe 39 PID 2780 wrote to memory of 800 2780 {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe 40 PID 2780 wrote to memory of 800 2780 {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe 40 PID 2780 wrote to memory of 800 2780 {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe 40 PID 2780 wrote to memory of 800 2780 {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe 40 PID 2780 wrote to memory of 1700 2780 {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe 41 PID 2780 wrote to memory of 1700 2780 {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe 41 PID 2780 wrote to memory of 1700 2780 {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe 41 PID 2780 wrote to memory of 1700 2780 {8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe 41 PID 800 wrote to memory of 2308 800 {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe 42 PID 800 wrote to memory of 2308 800 {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe 42 PID 800 wrote to memory of 2308 800 {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe 42 PID 800 wrote to memory of 2308 800 {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe 42 PID 800 wrote to memory of 1984 800 {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe 43 PID 800 wrote to memory of 1984 800 {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe 43 PID 800 wrote to memory of 1984 800 {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe 43 PID 800 wrote to memory of 1984 800 {B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe 43 PID 2308 wrote to memory of 2708 2308 {EFD11312-D8CA-4958-B642-314473BA1145}.exe 44 PID 2308 wrote to memory of 2708 2308 {EFD11312-D8CA-4958-B642-314473BA1145}.exe 44 PID 2308 wrote to memory of 2708 2308 {EFD11312-D8CA-4958-B642-314473BA1145}.exe 44 PID 2308 wrote to memory of 2708 2308 {EFD11312-D8CA-4958-B642-314473BA1145}.exe 44 PID 2308 wrote to memory of 1604 2308 {EFD11312-D8CA-4958-B642-314473BA1145}.exe 45 PID 2308 wrote to memory of 1604 2308 {EFD11312-D8CA-4958-B642-314473BA1145}.exe 45 PID 2308 wrote to memory of 1604 2308 {EFD11312-D8CA-4958-B642-314473BA1145}.exe 45 PID 2308 wrote to memory of 1604 2308 {EFD11312-D8CA-4958-B642-314473BA1145}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\{570FFB51-02A7-4076-A7E9-841E54505851}.exeC:\Windows\{570FFB51-02A7-4076-A7E9-841E54505851}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\{610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exeC:\Windows\{610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\{035FCB0D-B574-4d88-B726-0E0EF40F148F}.exeC:\Windows\{035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\{38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exeC:\Windows\{38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exeC:\Windows\{8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exeC:\Windows\{B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\{EFD11312-D8CA-4958-B642-314473BA1145}.exeC:\Windows\{EFD11312-D8CA-4958-B642-314473BA1145}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\{5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exeC:\Windows\{5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\{978DC600-828A-40a1-9ACA-AFA6129A73A5}.exeC:\Windows\{978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2300 -
C:\Windows\{E7ECC38F-82A2-49f2-9068-4942F409FABD}.exeC:\Windows\{E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\{8D1CEAB9-C42D-44fe-ACE0-4A811972399B}.exeC:\Windows\{8D1CEAB9-C42D-44fe-ACE0-4A811972399B}.exe12⤵
- Executes dropped EXE
PID:648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E7ECC~1.EXE > nul12⤵PID:2240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{978DC~1.EXE > nul11⤵PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5ED2B~1.EXE > nul10⤵PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EFD11~1.EXE > nul9⤵PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B4B6E~1.EXE > nul8⤵PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D6B6~1.EXE > nul7⤵PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{38EF0~1.EXE > nul6⤵PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{035FC~1.EXE > nul5⤵PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{610BE~1.EXE > nul4⤵PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{570FF~1.EXE > nul3⤵PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD557a161b0d6c8bb3ed55079bfb0a2a13c
SHA15e03a13656f3fb80b55a7daba75a02fb4b23655a
SHA256ba06dbd09c4facd879879bbc8acbbfd8c7931f2e7f0053836da342b4af63d70c
SHA512bd665570b4be089c9a695639da26f6e802b64b5bf9e119827ad8826a5bab68ab6a5f480388dfe73255c238caca77493f42391ac382b02f3e7e4b610f50f5543f
-
Filesize
408KB
MD547945ada1ec433f36cc02c25c9c218e9
SHA1b8e76e514ed50a89c9bb9104fe39c9d341e95697
SHA2568182e0ce7146cffbeada87714b14e95a2cf4729972054bfa78a72b22e951a541
SHA51265171f32b2eeaa76a68d44415e098b52e6a908abe590c225ffd366e2b4503f915a20cd4f18f1b2b94bb104b507bcdd574cb1860c134d8e26e7e986b4210352b9
-
Filesize
408KB
MD50f3dfd64c6af04e1cd48a0541c8c67a5
SHA18ee70e072cd8b585c943fb2b4dc169153b17fd0d
SHA256e3708b2368d924a09c3cdd85b22a13893d8ce5c4acddde431e5d783c0d7d9d72
SHA512347437961a479ab091112d7907a8182cac4e074f899cd3da871160e9a0b4de943d2e9fba1b10f30aa4a13f03c5e66e3d0a4b93c73b6d43750bc4efc8804755f9
-
Filesize
408KB
MD5f50085e97fd01b17bca9fef69385fbfe
SHA17a837111f1e14c4106420331177ee37db91243be
SHA2566633ccdb5d8dd10840fe57d467d143ee9d73dad5c1592e0fff4c3d7451527d18
SHA5126dc58c55a01fb1f653217ea87185fc6950916210de798d0019fdbf09798c95d9c3eac648c296a5cf85d4f6127021fbc7265b25bf2607d93f13169328cf7b7fa1
-
Filesize
408KB
MD539c45f314aec281ee4b211e9c0c61ca5
SHA1b2edde503af10b647b316a7efff1d5e46a41a43c
SHA256f9b482c800e382d2c6e3d9f99c1435f6586eaac4667f0bdb15195cbcb4ba5094
SHA512c288b982ce5279697d2bc4942daec5c4e517706e2fe338f84e159adf19d9406195a6672805ca3f80057aa48d7730d7b41f5c3a1224e52eb9b71d6f1c323e6c1f
-
Filesize
408KB
MD54039d13e9df9286ace18440623f653dc
SHA1e425c6641ad6e573ead6fe14f12f162574374a09
SHA25673e3f4db346f45cd5c4b4d023339cbc107768b5662c989d4bf3afd062c03ad03
SHA512ca68bb52f6fcedd7eef54b881482943f4aa1f4c73946960348f4b356d3cdbaf2384d65b41bd3c7062dd0b7785ba881b03fa3dc7ffbe55d32431084cdaefa00e7
-
Filesize
408KB
MD591ab1b54220a7cb109b21ec342c62ac9
SHA171bfd12eaffe7e1aa60c78f6f7a202c2d2ca3d25
SHA2560b87d3449f060f295f6f85b9d68864cb9944f5c7c9dc6fa23c153a82c8cf32cf
SHA5127370fedfc2d506e71ffa20d59ec1b55d929ffd4a8f7159e6a49d4c89868a28228100e81f578fc32c8c22e1c5c580f090f2590fedbb91a99d3716a6333fdc6ffb
-
Filesize
408KB
MD56fde59c8295fc9a33493bd2178ab2d77
SHA18c13eec49fe4fb280ee64c683b00c55e22d3d92a
SHA256332c601713681a943d4257ee81ef8f65a4011074ad53e47716982901d76b341f
SHA5124729d114a1f305dda127c23805d4e697b5ad4f33b90409ffa736228818caa430d50a05fdd9a77d8755ce30763206ab40d9b65e6cf218b84816a0efef3b4e8f06
-
Filesize
408KB
MD53f508b170f7944874ac7679af498dfe8
SHA1194355782a17624763c741be99decb6f57d1b4f8
SHA256ad42df1b9ac058d5aff7e2c477bfc8f8480c8562a87efcd686465eda75f7168e
SHA512dddf30a36608bb94c0767e7aa9de6dcdbad2dfb5eabee3fdec6f1c1eaba2719eac9d2dad626d82d3e3ef4024b4bfa956aab1f4001cd8c89e8beb8ff46c6d62d2
-
Filesize
408KB
MD52d5d7de64832c7b20f8aabcd40a569ba
SHA1d56d51ee09535c86042247e45384164c3d350d08
SHA256a063b8693a02e52e47822d692b3d7cfc3b556c63f68c360334f593357a273fc6
SHA512af1ad0dd36597e0407288051c2627be4b00bc0a525740c6a7b3b056f667fa025fc56598d4ad330314ccb1a2adeeae7617fe30e834cfc282ed547d9c12f79e4c1
-
Filesize
408KB
MD5f3f4ccdc41b701f468388eaf7e10cc55
SHA12be069ef923678888fead133b82c43e01d0039e8
SHA2566b261080b4fda57de76bebbe0724a962373041f8acee9f8d6cc5d20abf19441d
SHA512d28756178d46bc44047a5321964ed7b36ecd66b6e642cfa1b822c1abdff4092ac1d4a9bed0489cacd3739000caaf05a60e6fe67ec2d3bc5fdf05054e802a55f6