Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe
-
Size
180KB
-
MD5
a2a279fa32b834ce1c07a447d6bd7d67
-
SHA1
d4be69638bb09ac0f866daa941a4df86a57e6ef4
-
SHA256
60dac2a67a382ae6abd327f10e327a77da52b65c89bbc2240c2581f9a3f61b63
-
SHA512
234e733849b0aa6c941c9933ef71a1a12854c51b230ef6d89e791d96eb9780966079a786d511565996dabd53b9db70c8cb8721d9ef52c57c20dd0a4ecebbce71
-
SSDEEP
3072:jEGh0oalfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGkl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c00000001227b-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0037000000016d3d-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001227b-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001227b-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0036000000016d45-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000016d4e-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000016d69-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000016dda-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000016dde-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6278B4A-C145-43b8-90A3-294D6092BFEF}\stubpath = "C:\\Windows\\{B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe" {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}\stubpath = "C:\\Windows\\{B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe" {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}\stubpath = "C:\\Windows\\{6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe" {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84CC8D1F-9031-45e7-9880-0183210B3EA5}\stubpath = "C:\\Windows\\{84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe" {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{871D712A-9737-4b87-BD9D-50CCF857E935}\stubpath = "C:\\Windows\\{871D712A-9737-4b87-BD9D-50CCF857E935}.exe" {BE86DD43-32D1-48a1-A168-80BA7307F664}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C82BFB40-B0A3-4b85-BA0B-E27353FB4988}\stubpath = "C:\\Windows\\{C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe" 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6278B4A-C145-43b8-90A3-294D6092BFEF} {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BE86DD43-32D1-48a1-A168-80BA7307F664}\stubpath = "C:\\Windows\\{BE86DD43-32D1-48a1-A168-80BA7307F664}.exe" {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{871D712A-9737-4b87-BD9D-50CCF857E935} {BE86DD43-32D1-48a1-A168-80BA7307F664}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ABD8FE3-E391-4573-98EF-86954D7D8450}\stubpath = "C:\\Windows\\{5ABD8FE3-E391-4573-98EF-86954D7D8450}.exe" {858D5B76-7517-42ef-BE57-D4549034FC6E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C82BFB40-B0A3-4b85-BA0B-E27353FB4988} 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C56331DD-D66D-4285-BE80-CA78A12C7677} {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E80DA832-D2DD-42bd-BB7A-04AD086DED85} {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5ABD8FE3-E391-4573-98EF-86954D7D8450} {858D5B76-7517-42ef-BE57-D4549034FC6E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{858D5B76-7517-42ef-BE57-D4549034FC6E}\stubpath = "C:\\Windows\\{858D5B76-7517-42ef-BE57-D4549034FC6E}.exe" {871D712A-9737-4b87-BD9D-50CCF857E935}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0} {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C56331DD-D66D-4285-BE80-CA78A12C7677}\stubpath = "C:\\Windows\\{C56331DD-D66D-4285-BE80-CA78A12C7677}.exe" {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E80DA832-D2DD-42bd-BB7A-04AD086DED85}\stubpath = "C:\\Windows\\{E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe" {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F16805A-70C6-4584-8EB1-DF7EA64CEB4F} {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84CC8D1F-9031-45e7-9880-0183210B3EA5} {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BE86DD43-32D1-48a1-A168-80BA7307F664} {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{858D5B76-7517-42ef-BE57-D4549034FC6E} {871D712A-9737-4b87-BD9D-50CCF857E935}.exe -
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3024 {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe 2580 {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe 2832 {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe 1236 {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe 2764 {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe 1216 {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe 2188 {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe 480 {BE86DD43-32D1-48a1-A168-80BA7307F664}.exe 1684 {871D712A-9737-4b87-BD9D-50CCF857E935}.exe 2200 {858D5B76-7517-42ef-BE57-D4549034FC6E}.exe 1392 {5ABD8FE3-E391-4573-98EF-86954D7D8450}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe File created C:\Windows\{BE86DD43-32D1-48a1-A168-80BA7307F664}.exe {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe File created C:\Windows\{871D712A-9737-4b87-BD9D-50CCF857E935}.exe {BE86DD43-32D1-48a1-A168-80BA7307F664}.exe File created C:\Windows\{B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe File created C:\Windows\{C56331DD-D66D-4285-BE80-CA78A12C7677}.exe {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe File created C:\Windows\{E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe File created C:\Windows\{858D5B76-7517-42ef-BE57-D4549034FC6E}.exe {871D712A-9737-4b87-BD9D-50CCF857E935}.exe File created C:\Windows\{5ABD8FE3-E391-4573-98EF-86954D7D8450}.exe {858D5B76-7517-42ef-BE57-D4549034FC6E}.exe File created C:\Windows\{C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe File created C:\Windows\{B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe File created C:\Windows\{84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2976 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe Token: SeIncBasePriorityPrivilege 3024 {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe Token: SeIncBasePriorityPrivilege 2580 {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe Token: SeIncBasePriorityPrivilege 2832 {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe Token: SeIncBasePriorityPrivilege 1236 {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe Token: SeIncBasePriorityPrivilege 2764 {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe Token: SeIncBasePriorityPrivilege 1216 {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe Token: SeIncBasePriorityPrivilege 2188 {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe Token: SeIncBasePriorityPrivilege 480 {BE86DD43-32D1-48a1-A168-80BA7307F664}.exe Token: SeIncBasePriorityPrivilege 1684 {871D712A-9737-4b87-BD9D-50CCF857E935}.exe Token: SeIncBasePriorityPrivilege 2200 {858D5B76-7517-42ef-BE57-D4549034FC6E}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3024 2976 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe 28 PID 2976 wrote to memory of 3024 2976 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe 28 PID 2976 wrote to memory of 3024 2976 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe 28 PID 2976 wrote to memory of 3024 2976 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe 28 PID 2976 wrote to memory of 2564 2976 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe 29 PID 2976 wrote to memory of 2564 2976 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe 29 PID 2976 wrote to memory of 2564 2976 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe 29 PID 2976 wrote to memory of 2564 2976 2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe 29 PID 3024 wrote to memory of 2580 3024 {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe 30 PID 3024 wrote to memory of 2580 3024 {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe 30 PID 3024 wrote to memory of 2580 3024 {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe 30 PID 3024 wrote to memory of 2580 3024 {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe 30 PID 3024 wrote to memory of 3032 3024 {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe 31 PID 3024 wrote to memory of 3032 3024 {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe 31 PID 3024 wrote to memory of 3032 3024 {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe 31 PID 3024 wrote to memory of 3032 3024 {C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe 31 PID 2580 wrote to memory of 2832 2580 {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe 32 PID 2580 wrote to memory of 2832 2580 {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe 32 PID 2580 wrote to memory of 2832 2580 {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe 32 PID 2580 wrote to memory of 2832 2580 {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe 32 PID 2580 wrote to memory of 2668 2580 {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe 33 PID 2580 wrote to memory of 2668 2580 {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe 33 PID 2580 wrote to memory of 2668 2580 {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe 33 PID 2580 wrote to memory of 2668 2580 {B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe 33 PID 2832 wrote to memory of 1236 2832 {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe 36 PID 2832 wrote to memory of 1236 2832 {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe 36 PID 2832 wrote to memory of 1236 2832 {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe 36 PID 2832 wrote to memory of 1236 2832 {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe 36 PID 2832 wrote to memory of 1256 2832 {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe 37 PID 2832 wrote to memory of 1256 2832 {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe 37 PID 2832 wrote to memory of 1256 2832 {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe 37 PID 2832 wrote to memory of 1256 2832 {B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe 37 PID 1236 wrote to memory of 2764 1236 {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe 38 PID 1236 wrote to memory of 2764 1236 {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe 38 PID 1236 wrote to memory of 2764 1236 {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe 38 PID 1236 wrote to memory of 2764 1236 {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe 38 PID 1236 wrote to memory of 2788 1236 {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe 39 PID 1236 wrote to memory of 2788 1236 {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe 39 PID 1236 wrote to memory of 2788 1236 {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe 39 PID 1236 wrote to memory of 2788 1236 {C56331DD-D66D-4285-BE80-CA78A12C7677}.exe 39 PID 2764 wrote to memory of 1216 2764 {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe 40 PID 2764 wrote to memory of 1216 2764 {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe 40 PID 2764 wrote to memory of 1216 2764 {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe 40 PID 2764 wrote to memory of 1216 2764 {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe 40 PID 2764 wrote to memory of 272 2764 {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe 41 PID 2764 wrote to memory of 272 2764 {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe 41 PID 2764 wrote to memory of 272 2764 {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe 41 PID 2764 wrote to memory of 272 2764 {E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe 41 PID 1216 wrote to memory of 2188 1216 {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe 42 PID 1216 wrote to memory of 2188 1216 {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe 42 PID 1216 wrote to memory of 2188 1216 {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe 42 PID 1216 wrote to memory of 2188 1216 {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe 42 PID 1216 wrote to memory of 2700 1216 {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe 43 PID 1216 wrote to memory of 2700 1216 {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe 43 PID 1216 wrote to memory of 2700 1216 {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe 43 PID 1216 wrote to memory of 2700 1216 {6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe 43 PID 2188 wrote to memory of 480 2188 {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe 44 PID 2188 wrote to memory of 480 2188 {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe 44 PID 2188 wrote to memory of 480 2188 {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe 44 PID 2188 wrote to memory of 480 2188 {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe 44 PID 2188 wrote to memory of 668 2188 {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe 45 PID 2188 wrote to memory of 668 2188 {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe 45 PID 2188 wrote to memory of 668 2188 {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe 45 PID 2188 wrote to memory of 668 2188 {84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-15_a2a279fa32b834ce1c07a447d6bd7d67_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\{C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exeC:\Windows\{C82BFB40-B0A3-4b85-BA0B-E27353FB4988}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{B6278B4A-C145-43b8-90A3-294D6092BFEF}.exeC:\Windows\{B6278B4A-C145-43b8-90A3-294D6092BFEF}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\{B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exeC:\Windows\{B1F3DED9-6C89-4b3e-ACEE-67F3197EECA0}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\{C56331DD-D66D-4285-BE80-CA78A12C7677}.exeC:\Windows\{C56331DD-D66D-4285-BE80-CA78A12C7677}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\{E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exeC:\Windows\{E80DA832-D2DD-42bd-BB7A-04AD086DED85}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\{6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exeC:\Windows\{6F16805A-70C6-4584-8EB1-DF7EA64CEB4F}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\{84CC8D1F-9031-45e7-9880-0183210B3EA5}.exeC:\Windows\{84CC8D1F-9031-45e7-9880-0183210B3EA5}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\{BE86DD43-32D1-48a1-A168-80BA7307F664}.exeC:\Windows\{BE86DD43-32D1-48a1-A168-80BA7307F664}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:480 -
C:\Windows\{871D712A-9737-4b87-BD9D-50CCF857E935}.exeC:\Windows\{871D712A-9737-4b87-BD9D-50CCF857E935}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Windows\{858D5B76-7517-42ef-BE57-D4549034FC6E}.exeC:\Windows\{858D5B76-7517-42ef-BE57-D4549034FC6E}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Windows\{5ABD8FE3-E391-4573-98EF-86954D7D8450}.exeC:\Windows\{5ABD8FE3-E391-4573-98EF-86954D7D8450}.exe12⤵
- Executes dropped EXE
PID:1392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{858D5~1.EXE > nul12⤵PID:856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{871D7~1.EXE > nul11⤵PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BE86D~1.EXE > nul10⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{84CC8~1.EXE > nul9⤵PID:668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6F168~1.EXE > nul8⤵PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E80DA~1.EXE > nul7⤵PID:272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C5633~1.EXE > nul6⤵PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1F3D~1.EXE > nul5⤵PID:1256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6278~1.EXE > nul4⤵PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C82BF~1.EXE > nul3⤵PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5fa1a6b90666058d86521d638781b3fab
SHA13cc2f9d6fb63e61653ee40ec347e55cf0c42541f
SHA256300a9bde2a8cf9d472ee3b50d8e5025f54ba6f6b13b7857835ea9b5be2f982f9
SHA512c62f30668025a2fd3df693e630c9ea58e2996fb2707231449394693e93effe9a66c48f4c0427efc0456caa8bdc5c54aac3649f8fae9fb3379894a8ef6bfaee77
-
Filesize
180KB
MD5564d9cafa9419c4700a357c0a31a4223
SHA18d37b0977a741fd12db5f92beb594830d2549d8b
SHA256c1c8e51fe83bd57b21e63005be167709bb6566a782b4d55d36151bd4f5f752d6
SHA512ce297661e99962c879e65868eb02eeddf1c5f0892c8d16cd6e71e3b9f8bb981fbbe0014eadd084239985ece01c0fe447b0816bec82f15ebcd614406a6b25e7b9
-
Filesize
180KB
MD542267a19cc380b930cdd73446b010c00
SHA1117c8240c9c5cf3a8de7dc52a7dbe3a3f9351f8f
SHA256b77d23404aa982d6de7f3c8047dc685f43ba81931ca721ab6d182f71d3f08f66
SHA512f7a010eeeb2712fa1ad53b73352f7d50488da817ab065ffee39bdf14d236180354fc5b7679643385c36342925e31892a26320acdad3a6205977eebffa4749884
-
Filesize
180KB
MD53a3f9059ba3f431fef5f7a93f713e02d
SHA1b113adfc69cca5051c0af01bc60d84fcb0485207
SHA256ac36b43e5c85c3ab15df0f6196e9c7ee905ec4255a9b0dd966dbc1ab14b13d45
SHA512d9f3e7cbaf939fd9af73f6d29bb7f02b44156456e69cbe6b68cf0ef254e86cf58f9b69ae75a1dfa334ec043bb9884de2908d312067bb8b3020b248a66942c801
-
Filesize
180KB
MD5e231e7a08092edc135293b1bfdd37320
SHA1b22a39a393686a74a7c371cf5a8a6819ab4292da
SHA256bbab0c2804019b339a585cdb77a097a7d1063aacd5e1b8783076a0b17e287b4d
SHA5124f0bff1e0d34cd93ba8723cfedc37b88769e62af9ee9ed60b1f67c33476ecc424a3503fb5d51006f64d35f211462367758afe5baf77780e530c559ddd26571df
-
Filesize
180KB
MD5db6b602d1c8b330342bb07de4f3c74e7
SHA1be9ae9ad41c863267582eb721adccbe89c8d217f
SHA256cfa422005c28b23048e02a485fa7ae2485926b0ea5fa1839cf12d0022a822fb2
SHA5127cd52aec549e2b14f8f48277e143067eee247775c10394c837eecff167a8b9910a649a9add249b56f25d360c646f793ddd545d6ff64af48fb820ad6985e50f83
-
Filesize
180KB
MD595d5751eb91faaed282e63a871c9e812
SHA15d6aa0a3bd4cc5e25090158b183feb11b9a875f4
SHA256e895c85bfc00ccab7be7c44f3ef6d2cecabc4f5559b7fa8a54a17870bff3121a
SHA51212186e00836c0ce4a6fa1ce5dbbc8109ff1efdaa8c8f28d63770fc2efa7d0446ea6b00e82dd32ff63489c0ec3f5bb4fed6697e5f6590897dbd1cc5e13888ad5d
-
Filesize
180KB
MD56da7072d400c51e83a405cbab89b793c
SHA18382848cff8f190231519d36b6d50129a69fd849
SHA25648dd882e3472395dc047c33c0669f2a038bc4425c41b7e67451384952d4d2bdc
SHA5126ff377ed572b4a25af4f1acc83787655ad478ee7ad67a2c2d08697248ba0435345723156c1cee1206985c8515f88d2d82801a11e34624fd42a7d3302c9bbfbfc
-
Filesize
180KB
MD5f41d6048840bfd0a610c79c42741f630
SHA1686cee9500cf7c59024db1ec34d1b09e7f77db28
SHA2566869fae8f2f34ca24dcb9bb92256724e5fd29f382ef35338aa84f4cb1f090802
SHA51234bfa42ef8240d8ede16188d312f1b6214c09cf80efe61ae4573afc71b5fe6407d5bc1327bd7a5f4e98d683c1ec800b90fd72e06a287e88db97690ff126cdc98
-
Filesize
180KB
MD5b596bd20025ad7c1fcdae99f68e96c23
SHA185b7bb82e670b9a8482355644891806d2ee37a28
SHA256450fc5e600aa014adff75d2623eee32a1d6ee3460322f7102f4f2ed80bdc1ddf
SHA512056db2f7b894b9d3ed7e0d9a4f2dcbf488371ce837471187a84be1bdd7e2c82596638ec87d7a8e9b34de63775d384dcd4c5e0bb69918a83dd0c12fe1241ff9ae
-
Filesize
180KB
MD5cd95ff1cae34c5f19d34123f23dfd6a5
SHA1f1001aa37cb0eaee4640053da1dc9a40f774b349
SHA2564d4c769682f03ffd35f171b38cc6e5083e3c0d4052a3432d205eb6937d825e0f
SHA512964ff8037b0d8ce5966f3fce8b92ac81aa581721243d8850acc8ca34a5bf59da5d4cdfdd11b570c6cc37bd3054f7c9a2db40cd537c1af47cc455828db02b4c97