Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 10:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe
-
Size
216KB
-
MD5
73809c92ced956e3951db1d789db4afe
-
SHA1
1bcc10c25b3f91a3584427fe6cce10dc939df888
-
SHA256
fbff0538e269160091e723f0fcd080efc71435b443c775585d8e6aca9a3280c1
-
SHA512
e2c2d2a306f0bdec4f3a2374dbaef9c50e55e4ceb8d8bb1150a19cb0782fa36c26d003528866658d045a7c47dc82c57b6cac0f89fcf58907269d294a9ef40e93
-
SSDEEP
3072:jEGh0ovl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGZlEeKcAEcGy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral2/files/0x0007000000023263-3.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000f000000023270-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000022ff6-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0011000000023270-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c000000022ff6-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00020000000219e9-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070d-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070f-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070d-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0006000000000026-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000000070d-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}\stubpath = "C:\\Windows\\{1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe" {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}\stubpath = "C:\\Windows\\{3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe" {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}\stubpath = "C:\\Windows\\{A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe" {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0DC5AE62-6D82-4594-9F20-E1570F3B7062}\stubpath = "C:\\Windows\\{0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe" {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{802FBB04-38D3-44a2-8CEE-736269E7BEB3}\stubpath = "C:\\Windows\\{802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe" 2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3} {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3DC450EA-E399-488f-A717-6834613D36CF}\stubpath = "C:\\Windows\\{3DC450EA-E399-488f-A717-6834613D36CF}.exe" {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{67C3A941-0A5B-46d0-A67C-7B26F5E9A986}\stubpath = "C:\\Windows\\{67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe" {3DC450EA-E399-488f-A717-6834613D36CF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0DC5AE62-6D82-4594-9F20-E1570F3B7062} {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3ADD3C87-1C07-433d-B5DF-69AA50BE5F71} {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4274B0F-36F1-4b5b-913F-010B16C4FC8C} {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}\stubpath = "C:\\Windows\\{4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe" {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4274B0F-36F1-4b5b-913F-010B16C4FC8C}\stubpath = "C:\\Windows\\{F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe" {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3DC450EA-E399-488f-A717-6834613D36CF} {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{67C3A941-0A5B-46d0-A67C-7B26F5E9A986} {3DC450EA-E399-488f-A717-6834613D36CF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD} {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22C47FD9-3664-4ca4-92DC-5A1CDD30AACA} {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{802FBB04-38D3-44a2-8CEE-736269E7BEB3} 2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1441221E-0E57-4c8e-AEDC-FAB6A6EF2329} {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{856ED978-3E6C-458e-A0FB-08A6038FCC7F}\stubpath = "C:\\Windows\\{856ED978-3E6C-458e-A0FB-08A6038FCC7F}.exe" {22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}\stubpath = "C:\\Windows\\{22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe" {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{856ED978-3E6C-458e-A0FB-08A6038FCC7F} {22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe -
Executes dropped EXE 11 IoCs
pid Process 4984 {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe 1328 {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe 3436 {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe 4364 {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe 1860 {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe 2916 {3DC450EA-E399-488f-A717-6834613D36CF}.exe 4576 {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe 1828 {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe 4760 {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe 3572 {22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe 888 {856ED978-3E6C-458e-A0FB-08A6038FCC7F}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe File created C:\Windows\{F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe File created C:\Windows\{67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe {3DC450EA-E399-488f-A717-6834613D36CF}.exe File created C:\Windows\{856ED978-3E6C-458e-A0FB-08A6038FCC7F}.exe {22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe File created C:\Windows\{0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe File created C:\Windows\{22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe File created C:\Windows\{802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe 2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe File created C:\Windows\{1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe File created C:\Windows\{4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe File created C:\Windows\{3DC450EA-E399-488f-A717-6834613D36CF}.exe {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe File created C:\Windows\{A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5076 2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe Token: SeIncBasePriorityPrivilege 4984 {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe Token: SeIncBasePriorityPrivilege 1328 {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe Token: SeIncBasePriorityPrivilege 3436 {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe Token: SeIncBasePriorityPrivilege 4364 {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe Token: SeIncBasePriorityPrivilege 1860 {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe Token: SeIncBasePriorityPrivilege 2916 {3DC450EA-E399-488f-A717-6834613D36CF}.exe Token: SeIncBasePriorityPrivilege 4576 {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe Token: SeIncBasePriorityPrivilege 1828 {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe Token: SeIncBasePriorityPrivilege 4760 {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe Token: SeIncBasePriorityPrivilege 3572 {22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4984 5076 2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe 94 PID 5076 wrote to memory of 4984 5076 2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe 94 PID 5076 wrote to memory of 4984 5076 2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe 94 PID 5076 wrote to memory of 3000 5076 2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe 95 PID 5076 wrote to memory of 3000 5076 2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe 95 PID 5076 wrote to memory of 3000 5076 2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe 95 PID 4984 wrote to memory of 1328 4984 {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe 100 PID 4984 wrote to memory of 1328 4984 {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe 100 PID 4984 wrote to memory of 1328 4984 {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe 100 PID 4984 wrote to memory of 4184 4984 {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe 101 PID 4984 wrote to memory of 4184 4984 {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe 101 PID 4984 wrote to memory of 4184 4984 {802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe 101 PID 1328 wrote to memory of 3436 1328 {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe 103 PID 1328 wrote to memory of 3436 1328 {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe 103 PID 1328 wrote to memory of 3436 1328 {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe 103 PID 1328 wrote to memory of 2516 1328 {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe 104 PID 1328 wrote to memory of 2516 1328 {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe 104 PID 1328 wrote to memory of 2516 1328 {1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe 104 PID 3436 wrote to memory of 4364 3436 {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe 106 PID 3436 wrote to memory of 4364 3436 {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe 106 PID 3436 wrote to memory of 4364 3436 {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe 106 PID 3436 wrote to memory of 1944 3436 {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe 107 PID 3436 wrote to memory of 1944 3436 {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe 107 PID 3436 wrote to memory of 1944 3436 {4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe 107 PID 4364 wrote to memory of 1860 4364 {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe 108 PID 4364 wrote to memory of 1860 4364 {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe 108 PID 4364 wrote to memory of 1860 4364 {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe 108 PID 4364 wrote to memory of 3696 4364 {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe 109 PID 4364 wrote to memory of 3696 4364 {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe 109 PID 4364 wrote to memory of 3696 4364 {3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe 109 PID 1860 wrote to memory of 2916 1860 {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe 110 PID 1860 wrote to memory of 2916 1860 {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe 110 PID 1860 wrote to memory of 2916 1860 {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe 110 PID 1860 wrote to memory of 3852 1860 {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe 111 PID 1860 wrote to memory of 3852 1860 {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe 111 PID 1860 wrote to memory of 3852 1860 {F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe 111 PID 2916 wrote to memory of 4576 2916 {3DC450EA-E399-488f-A717-6834613D36CF}.exe 112 PID 2916 wrote to memory of 4576 2916 {3DC450EA-E399-488f-A717-6834613D36CF}.exe 112 PID 2916 wrote to memory of 4576 2916 {3DC450EA-E399-488f-A717-6834613D36CF}.exe 112 PID 2916 wrote to memory of 832 2916 {3DC450EA-E399-488f-A717-6834613D36CF}.exe 113 PID 2916 wrote to memory of 832 2916 {3DC450EA-E399-488f-A717-6834613D36CF}.exe 113 PID 2916 wrote to memory of 832 2916 {3DC450EA-E399-488f-A717-6834613D36CF}.exe 113 PID 4576 wrote to memory of 1828 4576 {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe 114 PID 4576 wrote to memory of 1828 4576 {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe 114 PID 4576 wrote to memory of 1828 4576 {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe 114 PID 4576 wrote to memory of 4940 4576 {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe 115 PID 4576 wrote to memory of 4940 4576 {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe 115 PID 4576 wrote to memory of 4940 4576 {67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe 115 PID 1828 wrote to memory of 4760 1828 {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe 116 PID 1828 wrote to memory of 4760 1828 {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe 116 PID 1828 wrote to memory of 4760 1828 {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe 116 PID 1828 wrote to memory of 2948 1828 {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe 117 PID 1828 wrote to memory of 2948 1828 {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe 117 PID 1828 wrote to memory of 2948 1828 {A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe 117 PID 4760 wrote to memory of 3572 4760 {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe 118 PID 4760 wrote to memory of 3572 4760 {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe 118 PID 4760 wrote to memory of 3572 4760 {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe 118 PID 4760 wrote to memory of 656 4760 {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe 119 PID 4760 wrote to memory of 656 4760 {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe 119 PID 4760 wrote to memory of 656 4760 {0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe 119 PID 3572 wrote to memory of 888 3572 {22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe 120 PID 3572 wrote to memory of 888 3572 {22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe 120 PID 3572 wrote to memory of 888 3572 {22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe 120 PID 3572 wrote to memory of 5104 3572 {22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-14_73809c92ced956e3951db1d789db4afe_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\{802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exeC:\Windows\{802FBB04-38D3-44a2-8CEE-736269E7BEB3}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\{1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exeC:\Windows\{1441221E-0E57-4c8e-AEDC-FAB6A6EF2329}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\{4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exeC:\Windows\{4C1D3782-BC3E-4a17-81A1-CA9DFC0302D3}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\{3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exeC:\Windows\{3ADD3C87-1C07-433d-B5DF-69AA50BE5F71}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\{F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exeC:\Windows\{F4274B0F-36F1-4b5b-913F-010B16C4FC8C}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\{3DC450EA-E399-488f-A717-6834613D36CF}.exeC:\Windows\{3DC450EA-E399-488f-A717-6834613D36CF}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\{67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exeC:\Windows\{67C3A941-0A5B-46d0-A67C-7B26F5E9A986}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\{A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exeC:\Windows\{A8DD0BF6-5B39-4caa-818E-0E5CCA855ABD}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\{0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exeC:\Windows\{0DC5AE62-6D82-4594-9F20-E1570F3B7062}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\{22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exeC:\Windows\{22C47FD9-3664-4ca4-92DC-5A1CDD30AACA}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\{856ED978-3E6C-458e-A0FB-08A6038FCC7F}.exeC:\Windows\{856ED978-3E6C-458e-A0FB-08A6038FCC7F}.exe12⤵
- Executes dropped EXE
PID:888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{22C47~1.EXE > nul12⤵PID:5104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0DC5A~1.EXE > nul11⤵PID:656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8DD0~1.EXE > nul10⤵PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67C3A~1.EXE > nul9⤵PID:4940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3DC45~1.EXE > nul8⤵PID:832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4274~1.EXE > nul7⤵PID:3852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3ADD3~1.EXE > nul6⤵PID:3696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4C1D3~1.EXE > nul5⤵PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{14412~1.EXE > nul4⤵PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{802FB~1.EXE > nul3⤵PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1328 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:3124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD576afa1ba80699380193f39ee03f7ca49
SHA11256cfa431a56f18194bd3742d70ae4a567600e5
SHA2569018dc859dc9ce04d28b65aec12afae8bf601ef77d5f109f5787576646d77867
SHA51285b657801b7584ded27169e55df8b3b9355ec7b7dd8a7afb754dd0d7bc2803f1b348c340e22847b7a07a2ccb84215a9bbbb5d44d34cdad56c96010e17eaf8e1e
-
Filesize
216KB
MD5bc48d6c538e2c3732316a2d0a2d266ce
SHA12f6c2a7f966e0b6d6c58ade8e44d6e04251cd72c
SHA256d8e3e1293d0399af881d932fbe9fc437fc552478cbeb2113be994bb5f75453f1
SHA51211552401da1199a241f540f14bd1e5946b64dd552f44086995bf012881e28cc20160219650704dc8d5ffaa157ef3019d5425136665a4b6146420b194f0b0332f
-
Filesize
216KB
MD567700d9395f69fd7a8c261be26586be9
SHA1120282bd125443bd7bf955a19c74ee134b04cafb
SHA2568153b94839fcac7dbfc771138522f1bfbb8d11316028c45d0f285ceb9043ca26
SHA51256ebf4178a5d24bbc36f5bb8d3c98d8cbe06120804367244620deebc3a8fa02ff4dcd8c737813c07e49675320faaa5b27c40d2c2acf1a1b48547339f0aee5c6f
-
Filesize
216KB
MD55211cac53761d1de552a0c760f114a67
SHA197064d4f483d6bac63d6d8d789af7e0dfde41ad9
SHA256b0c8771cdf52f97e53f58521d9cc8fb63d11fba712b700dbfe405e7037765a62
SHA512e38d3f9040952a3d3d80d60cc7b4936e1045cb95820aed6a2f4e72c7b26f1a535b4501a01db97cc61d7fcf8f71e7ae88a1f27b9d26c9d421ff18072d1ca0f981
-
Filesize
216KB
MD5c6b63ad72255253273abbdc18315139f
SHA1dec66a81804e52a433717d19d4ebce85b2fba9b2
SHA25664f616c96938ac9d8b219441a7a58120dbf39d9c6a5452ef93ba25559e094089
SHA512a2612ffea50c736f855deff45f424c92878391aadc83c51901b1d07a831b8d077e1be00583b4c71b2d01cc252c5adc37968de432d5d7c1ff2393fd574ca506c7
-
Filesize
216KB
MD553cbe995b55a065c5b93fbf71b335d23
SHA1044e0df982de2f6d9f9af1c14069c38c7419c22f
SHA2567d7194f44dcdddebd6098c06efcee6ea3359a12a7913fad1eb7a29b520d4394b
SHA512a5f48f0d88ae4ad4abee4801207e21b57ec2f95fd884a1717f2b074c446d371f694164f9528800c981ee3298b5761b7fbfe9907bc3692c1c9f6d85ec6c4498be
-
Filesize
216KB
MD5d2c4bba36f35f8f35f3cb85d43fbaa9f
SHA18a8a10769fad0218f0bb70b6dc9998527d23be9e
SHA256e24c05046bd87e88ac3104185aff98f4c5b26523c96911f5875de88a4dd902f1
SHA5127c32b30ace20102c6268acf2f1c57abe1b15f452a4881a2aec7f37591f15023dbcebfa70a3a9bdab4f0271cc4ffd7f623a8a33acd414ca426c7f3a9b52e8b54d
-
Filesize
216KB
MD588d06efbd52d9329455462cfabe23fcc
SHA1b2cb9ffd7535447f48b1f76b6372fed9dfe750c9
SHA256b915c57dce248edde26de8b87b2d5c010f2c088c3a6904eef411c65a91f87846
SHA5120e394a754de080c64bb3a62d7d87708853cbc480817f14b379e18a8ce3ed0541ee82c23cbfb6c61b18cbd87455f77366867ac2a24fccf15d986be5fd6dd80cfb
-
Filesize
216KB
MD5467cd8eccbfad846397036c901cb1c75
SHA122e98f0bc90cb9f4df84d35bbb254c2ef3f25bfa
SHA25663f8a088acbf43978d7330d802a330a7a40aba0738459b69edaa229caebfe2b5
SHA51285d047363c026b54d267449780e881ad4b4528d2de7b15643410e4e3af8b0eb41d84823225cebe8e0046b9d5beaf8c0bbdf312834718a510a8c09ca1ee68e36f
-
Filesize
216KB
MD5d1ad1e285e9e1e9c2634e920bb8ede14
SHA18320918f413ee60f2b8ebc89a9d487d6bfe572a7
SHA256ffb8aa96088d5562600ef5ede76b11dd68fbd5be957264e1053dd401ca80ded9
SHA51280157a9c0e30913e42e236fd88d715b284908d5a8ca6922c0044a5338d1d2d2b39b8db271ccf9a2d96ee5d9b2afb915f0e1f400677c64ef21f8d300349aa2587
-
Filesize
216KB
MD52de8c1e36d6be49afa3fbfd7fb70f8a4
SHA1d68b4693bb514cb8bf4f9ae48802a695da019793
SHA25664eb06569d78b0380038fa4f4bf1c4d4a22c6f25f5dc794ee438e88bc49a6886
SHA512b73b6125618f182c09b535cf2a29edbeda110e59198a570a872401d383c44915c08c4fa0f8739b22227f8e00aff93a7566e6edc5b95926db7faf6ec701ec12a4