Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe
-
Size
380KB
-
MD5
e39403bcc0ea77af619c2a4a8501949e
-
SHA1
04b5e385cd6c75892a5397df786ab4160ed4d77c
-
SHA256
efe0ece8e69aaecbda78c13bf5cbb26a9ab862413fbd4e8885ffa9d481659c90
-
SHA512
c0b7b03094e85180f4ecc1ede6a971a06e5a42873fdacfc658ea3451388d7d8fe99e3ec0c55bfb6449175ed13799d6aee8b9e827c2acab69d1c5afa55841a1d5
-
SSDEEP
3072:mEGh0oslPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGWl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c00000001226d-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0038000000016d05-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001226d-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001226d-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001226d-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0038000000016d1a-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000016d22-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0039000000016d1a-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E71CE282-C23F-4289-9132-E6C01DFB42B8}\stubpath = "C:\\Windows\\{E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe" {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C647B793-2863-4f79-8F47-2520498AD6F7} {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C647B793-2863-4f79-8F47-2520498AD6F7}\stubpath = "C:\\Windows\\{C647B793-2863-4f79-8F47-2520498AD6F7}.exe" {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59C6BBDB-0F59-4948-9C3C-19ECA174078E} {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{35180AC3-3E71-4118-BAD8-3CA388EBB821} {D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E} {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81060FA4-D79D-460e-9F47-8E74E5978E6C} {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81060FA4-D79D-460e-9F47-8E74E5978E6C}\stubpath = "C:\\Windows\\{81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe" {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E71CE282-C23F-4289-9132-E6C01DFB42B8} {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D47EDF44-C322-490f-BDD9-FA7CF21EC009} {79B80C7D-2140-4384-B484-502600728171}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{313B8C54-3BCF-417e-BD79-662A1A68B0EF} 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B} {C647B793-2863-4f79-8F47-2520498AD6F7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}\stubpath = "C:\\Windows\\{2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe" {C647B793-2863-4f79-8F47-2520498AD6F7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3} {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}\stubpath = "C:\\Windows\\{D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe" {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D47EDF44-C322-490f-BDD9-FA7CF21EC009}\stubpath = "C:\\Windows\\{D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe" {79B80C7D-2140-4384-B484-502600728171}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{313B8C54-3BCF-417e-BD79-662A1A68B0EF}\stubpath = "C:\\Windows\\{313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe" 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59C6BBDB-0F59-4948-9C3C-19ECA174078E}\stubpath = "C:\\Windows\\{59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe" {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79B80C7D-2140-4384-B484-502600728171} {D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79B80C7D-2140-4384-B484-502600728171}\stubpath = "C:\\Windows\\{79B80C7D-2140-4384-B484-502600728171}.exe" {D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{35180AC3-3E71-4118-BAD8-3CA388EBB821}\stubpath = "C:\\Windows\\{35180AC3-3E71-4118-BAD8-3CA388EBB821}.exe" {D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}\stubpath = "C:\\Windows\\{FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe" {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe -
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2568 {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe 2468 {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe 2632 {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe 1020 {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe 2788 {C647B793-2863-4f79-8F47-2520498AD6F7}.exe 1532 {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe 2192 {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe 744 {D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe 2832 {79B80C7D-2140-4384-B484-502600728171}.exe 2228 {D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe 2824 {35180AC3-3E71-4118-BAD8-3CA388EBB821}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe File created C:\Windows\{E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe File created C:\Windows\{C647B793-2863-4f79-8F47-2520498AD6F7}.exe {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe File created C:\Windows\{59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe File created C:\Windows\{79B80C7D-2140-4384-B484-502600728171}.exe {D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe File created C:\Windows\{D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe {79B80C7D-2140-4384-B484-502600728171}.exe File created C:\Windows\{35180AC3-3E71-4118-BAD8-3CA388EBB821}.exe {D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe File created C:\Windows\{81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe File created C:\Windows\{FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe File created C:\Windows\{2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe {C647B793-2863-4f79-8F47-2520498AD6F7}.exe File created C:\Windows\{D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1832 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe Token: SeIncBasePriorityPrivilege 2568 {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe Token: SeIncBasePriorityPrivilege 2468 {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe Token: SeIncBasePriorityPrivilege 2632 {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe Token: SeIncBasePriorityPrivilege 1020 {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe Token: SeIncBasePriorityPrivilege 2788 {C647B793-2863-4f79-8F47-2520498AD6F7}.exe Token: SeIncBasePriorityPrivilege 1532 {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe Token: SeIncBasePriorityPrivilege 2192 {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe Token: SeIncBasePriorityPrivilege 744 {D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe Token: SeIncBasePriorityPrivilege 2832 {79B80C7D-2140-4384-B484-502600728171}.exe Token: SeIncBasePriorityPrivilege 2228 {D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2568 1832 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe 28 PID 1832 wrote to memory of 2568 1832 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe 28 PID 1832 wrote to memory of 2568 1832 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe 28 PID 1832 wrote to memory of 2568 1832 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe 28 PID 1832 wrote to memory of 2616 1832 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe 29 PID 1832 wrote to memory of 2616 1832 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe 29 PID 1832 wrote to memory of 2616 1832 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe 29 PID 1832 wrote to memory of 2616 1832 2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe 29 PID 2568 wrote to memory of 2468 2568 {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe 30 PID 2568 wrote to memory of 2468 2568 {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe 30 PID 2568 wrote to memory of 2468 2568 {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe 30 PID 2568 wrote to memory of 2468 2568 {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe 30 PID 2568 wrote to memory of 2620 2568 {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe 31 PID 2568 wrote to memory of 2620 2568 {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe 31 PID 2568 wrote to memory of 2620 2568 {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe 31 PID 2568 wrote to memory of 2620 2568 {313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe 31 PID 2468 wrote to memory of 2632 2468 {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe 32 PID 2468 wrote to memory of 2632 2468 {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe 32 PID 2468 wrote to memory of 2632 2468 {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe 32 PID 2468 wrote to memory of 2632 2468 {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe 32 PID 2468 wrote to memory of 2120 2468 {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe 33 PID 2468 wrote to memory of 2120 2468 {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe 33 PID 2468 wrote to memory of 2120 2468 {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe 33 PID 2468 wrote to memory of 2120 2468 {81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe 33 PID 2632 wrote to memory of 1020 2632 {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe 36 PID 2632 wrote to memory of 1020 2632 {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe 36 PID 2632 wrote to memory of 1020 2632 {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe 36 PID 2632 wrote to memory of 1020 2632 {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe 36 PID 2632 wrote to memory of 2528 2632 {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe 37 PID 2632 wrote to memory of 2528 2632 {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe 37 PID 2632 wrote to memory of 2528 2632 {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe 37 PID 2632 wrote to memory of 2528 2632 {FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe 37 PID 1020 wrote to memory of 2788 1020 {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe 38 PID 1020 wrote to memory of 2788 1020 {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe 38 PID 1020 wrote to memory of 2788 1020 {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe 38 PID 1020 wrote to memory of 2788 1020 {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe 38 PID 1020 wrote to memory of 2364 1020 {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe 39 PID 1020 wrote to memory of 2364 1020 {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe 39 PID 1020 wrote to memory of 2364 1020 {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe 39 PID 1020 wrote to memory of 2364 1020 {E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe 39 PID 2788 wrote to memory of 1532 2788 {C647B793-2863-4f79-8F47-2520498AD6F7}.exe 40 PID 2788 wrote to memory of 1532 2788 {C647B793-2863-4f79-8F47-2520498AD6F7}.exe 40 PID 2788 wrote to memory of 1532 2788 {C647B793-2863-4f79-8F47-2520498AD6F7}.exe 40 PID 2788 wrote to memory of 1532 2788 {C647B793-2863-4f79-8F47-2520498AD6F7}.exe 40 PID 2788 wrote to memory of 2196 2788 {C647B793-2863-4f79-8F47-2520498AD6F7}.exe 41 PID 2788 wrote to memory of 2196 2788 {C647B793-2863-4f79-8F47-2520498AD6F7}.exe 41 PID 2788 wrote to memory of 2196 2788 {C647B793-2863-4f79-8F47-2520498AD6F7}.exe 41 PID 2788 wrote to memory of 2196 2788 {C647B793-2863-4f79-8F47-2520498AD6F7}.exe 41 PID 1532 wrote to memory of 2192 1532 {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe 42 PID 1532 wrote to memory of 2192 1532 {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe 42 PID 1532 wrote to memory of 2192 1532 {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe 42 PID 1532 wrote to memory of 2192 1532 {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe 42 PID 1532 wrote to memory of 2352 1532 {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe 43 PID 1532 wrote to memory of 2352 1532 {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe 43 PID 1532 wrote to memory of 2352 1532 {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe 43 PID 1532 wrote to memory of 2352 1532 {2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe 43 PID 2192 wrote to memory of 744 2192 {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe 44 PID 2192 wrote to memory of 744 2192 {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe 44 PID 2192 wrote to memory of 744 2192 {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe 44 PID 2192 wrote to memory of 744 2192 {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe 44 PID 2192 wrote to memory of 2828 2192 {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe 45 PID 2192 wrote to memory of 2828 2192 {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe 45 PID 2192 wrote to memory of 2828 2192 {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe 45 PID 2192 wrote to memory of 2828 2192 {59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\{313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exeC:\Windows\{313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\{81060FA4-D79D-460e-9F47-8E74E5978E6C}.exeC:\Windows\{81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\{FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exeC:\Windows\{FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\{E71CE282-C23F-4289-9132-E6C01DFB42B8}.exeC:\Windows\{E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\{C647B793-2863-4f79-8F47-2520498AD6F7}.exeC:\Windows\{C647B793-2863-4f79-8F47-2520498AD6F7}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\{2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exeC:\Windows\{2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\{59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exeC:\Windows\{59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\{D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exeC:\Windows\{D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:744 -
C:\Windows\{79B80C7D-2140-4384-B484-502600728171}.exeC:\Windows\{79B80C7D-2140-4384-B484-502600728171}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Windows\{D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exeC:\Windows\{D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\{35180AC3-3E71-4118-BAD8-3CA388EBB821}.exeC:\Windows\{35180AC3-3E71-4118-BAD8-3CA388EBB821}.exe12⤵
- Executes dropped EXE
PID:2824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D47ED~1.EXE > nul12⤵PID:892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79B80~1.EXE > nul11⤵PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3CD4~1.EXE > nul10⤵PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{59C6B~1.EXE > nul9⤵PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2C6BB~1.EXE > nul8⤵PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C647B~1.EXE > nul7⤵PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E71CE~1.EXE > nul6⤵PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FB001~1.EXE > nul5⤵PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81060~1.EXE > nul4⤵PID:2120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{313B8~1.EXE > nul3⤵PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD581e5b8e73dee0bf5ef2b3ad68681c104
SHA1feda9fce36c5a3c58ade9c4e944ea84fd518bd6f
SHA256480bb2d6ed5b043fb3bd59e68c2bef121cfccaf047b7697abada57154e0303e3
SHA512779391a5d037172fa8f5b07ce518b485a436154684b1a6192adb72dbcfa3e8270f067a1b021e746c0a78069ce0cb67dafd826ff2b11ef48537bb11ef2330d00f
-
Filesize
380KB
MD55a83f8b8638cf9ad8c69754d45773d2c
SHA1b95ae5409805e726a220b24a2c06916d26365d75
SHA256b7df14cf2ac76c716e3deef3cd94a3899cda82666eb9e89f4627d8d37d03d2cc
SHA512505e15f33680b9de0195f42143fd2b49f712d5c6ff1eaf966f8b3d60f703b57e35c895a4473e1706deff0b2956695572819d98c35234cf77851c408c788e7148
-
Filesize
380KB
MD5de33eb3140777a45736a7383fdbe4634
SHA11f9f82f412c583675e130c5e5e3122c7b4eaf510
SHA256c7fe3bae7a9690623ed79ae8f8628c622bf994f3123066dc84a0cd305000b889
SHA512fd0515ccf06ae81bc85e51d8514a66466a99d19edb1766494350e3ea5f679b9aabc50ea03f32e0b50630bdd9dfad1936ab8de009ea94c0e81cb2908f11af146a
-
Filesize
380KB
MD50d0cb4d1f8f2abc3040224eb7d54223f
SHA108eed8a28baab327c448509d97a54c3c928e46d6
SHA2568ac701923912972a932ef0cb69f26f2103aac56afe4d6943c1e9673b765520a3
SHA5123af04d76c6cc8c31ad3f9cf61758391c0f89a8cd8b8f5f580811584745389f13bf5586ff8777091accb37848323701f78f984b7c23695bb45f9606159cd6a874
-
Filesize
380KB
MD5567ff46190129c1ebff5824d614f55c7
SHA10c05fa5e9db1b60c06cba1aec467143958781604
SHA25639821d39e625f332e64e9e3f2c3186f8d43e8a3c301c1563c322a40a53af192a
SHA51295aa6af712218128968263f0630c593d5b91191b01276abc956d79d1f3beb9788579545f0cd8a13114bdc40aa0aa9c55d7569830fdc39c8c887d90eba8255c69
-
Filesize
380KB
MD55ac497d0d7d417c769bbfff43b58940e
SHA128d04eeb8e3aa7e64d24b2a1d35a004f94f95479
SHA2567a8daa5ad21f323baaf5bdfa26d9fac6f39485606bbd7fb25d86b2f0789a825a
SHA51269c101cfc05ee6b5a87f3378bd91dd384b63e3748413255f11885956ca9bf3fd79f9c3626634a23659a019353900f7651284f70bebc6aaeffeb015a4de0f7526
-
Filesize
380KB
MD5fa78adeb4463b2ac0c126a84b4282216
SHA1a8377f065008768dae1a25dd509b3368a9e43cbf
SHA256da59bef7f241019d672ede884b9e931c58980dcceb03023de73eba9241639499
SHA51260a01874bf0eebacba7851ca7c0cc48034c41dea819510ae88cad5ce3279517230da9efc9bf371666d57e0437a1582ee7980211397e1338e9c37b6ebb4b371f0
-
Filesize
380KB
MD56e9a7f269245d286a6caee0fbc31382f
SHA173e49e8dca60982950de82c34cb69e6983ad2d42
SHA25664ad950c2b4d63b1d52ccd5dab6907963622556fae4b88a3f7873fbeae0b75d6
SHA5127bea9571c09d5150ed67b60a44f71f3c10ddafd973901c6ba5101bbed7ac15198ff96a8aebc9f07b538434b62d11dff5317cc26a0f60a29c2f73a787d1805034
-
Filesize
380KB
MD593e3edc64d9d7c0cd88d8259b6c73cbf
SHA12de3caf4b9e573c1f520ffc555a05324ad1adb1a
SHA2563d69271047801318fe00a716c7aa99cec9c52c822350c7289b9741f3ab24f423
SHA512c1c5a83dfb08c2914bd58711c858c4365ad7fd2bd9db4775ed4b9ef60a07be1bfc72a44f6c969af27e90a05a3c6386d2f0ceb3662af6c8d1910f19a9aa0ffca5
-
Filesize
380KB
MD5408c6b91ae1757543fe89f71e67e2db6
SHA1975c430acda27b109ebc45944ada6c3f8f9360ff
SHA256364e3abd195dcf70a8848a974607b6cad98b69ff6a2ccb6866cda8940e876ffc
SHA51208d0999ebd18750d766c4e7cf058adad4b97440da9b9bdd1d36ba79959f6f30fbb390e979f5b63c299f109ac0e9c3654b7482518b4490dd2059004d9d7f37d61
-
Filesize
380KB
MD5292dc5af29fe5afbf54d84e394d8a959
SHA180b9f0da2f842373e26d7fb5eb8dd2b06d02245f
SHA256965327bd333022c47dcd04f0624a7a3ee3a4c188dc58e8ebc1a353fbc6662b2b
SHA512b06b9244c9c9af040399e8a2ce3140802f06eb13d72266177106ebe3d6a85a2a278aa5e1cbccd2262513006bc25b58cf332ef4c7f7ccf447c7ba629a63a272fc