Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe
-
Size
168KB
-
MD5
967bf0a45c55b443bdc00c8d5667fbfe
-
SHA1
052c944b5801fdf63751b561bb970d676108efe9
-
SHA256
177eaae3c62e10d2edb9952de087b2d0657377b7d778fc90422673535da54391
-
SHA512
797b4ace057f3e5dad73864c562d15042bbf86539040b8270455943f351eb55344132f149c75d64e34d2cc9ba9d4e83edfc488beb4f47847265f0fb0d9947ac3
-
SSDEEP
1536:1EGh0oylq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oylqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000b000000012280-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b00000001561c-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000300000000f6e4-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d00000001561c-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000f6e4-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e00000001561c-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000500000000f6e4-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f00000001561c-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000f6e4-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000015c58-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000700000000f6e4-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{89BF531D-E516-407e-8209-B9CCDDD98AC9} {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A682471C-366C-48c4-8400-21CAC1BE29D5} {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11672AFB-78C4-46b7-88AF-5E8C6CDA8C67} {AC1F6F59-6582-4601-A429-12AC39DCC921}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DC508A35-0910-4e7a-88DC-45973E17DC06} 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26E77711-A642-4c80-8F60-66A6C409436A}\stubpath = "C:\\Windows\\{26E77711-A642-4c80-8F60-66A6C409436A}.exe" {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C20D1D31-0AD0-480f-8649-EE8C967C1BB1} {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AC1F6F59-6582-4601-A429-12AC39DCC921}\stubpath = "C:\\Windows\\{AC1F6F59-6582-4601-A429-12AC39DCC921}.exe" {C20D1D31-0AD0-480f-8649-EE8C967C1BB1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2} {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{52FD406C-68C6-42ca-8E4B-8CD38A09951A} {26E77711-A642-4c80-8F60-66A6C409436A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{52FD406C-68C6-42ca-8E4B-8CD38A09951A}\stubpath = "C:\\Windows\\{52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe" {26E77711-A642-4c80-8F60-66A6C409436A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}\stubpath = "C:\\Windows\\{BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe" {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C20D1D31-0AD0-480f-8649-EE8C967C1BB1}\stubpath = "C:\\Windows\\{C20D1D31-0AD0-480f-8649-EE8C967C1BB1}.exe" {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11672AFB-78C4-46b7-88AF-5E8C6CDA8C67}\stubpath = "C:\\Windows\\{11672AFB-78C4-46b7-88AF-5E8C6CDA8C67}.exe" {AC1F6F59-6582-4601-A429-12AC39DCC921}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DC508A35-0910-4e7a-88DC-45973E17DC06}\stubpath = "C:\\Windows\\{DC508A35-0910-4e7a-88DC-45973E17DC06}.exe" 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}\stubpath = "C:\\Windows\\{F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe" {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26E77711-A642-4c80-8F60-66A6C409436A} {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926} {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{89BF531D-E516-407e-8209-B9CCDDD98AC9}\stubpath = "C:\\Windows\\{89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe" {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A682471C-366C-48c4-8400-21CAC1BE29D5}\stubpath = "C:\\Windows\\{A682471C-366C-48c4-8400-21CAC1BE29D5}.exe" {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AC1F6F59-6582-4601-A429-12AC39DCC921} {C20D1D31-0AD0-480f-8649-EE8C967C1BB1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{814690F1-6176-437b-BC60-8353FE440038} {11672AFB-78C4-46b7-88AF-5E8C6CDA8C67}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{814690F1-6176-437b-BC60-8353FE440038}\stubpath = "C:\\Windows\\{814690F1-6176-437b-BC60-8353FE440038}.exe" {11672AFB-78C4-46b7-88AF-5E8C6CDA8C67}.exe -
Deletes itself 1 IoCs
pid Process 1152 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2452 {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe 2948 {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe 2480 {26E77711-A642-4c80-8F60-66A6C409436A}.exe 1864 {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe 1460 {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe 2896 {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe 1076 {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe 2564 {C20D1D31-0AD0-480f-8649-EE8C967C1BB1}.exe 3032 {AC1F6F59-6582-4601-A429-12AC39DCC921}.exe 3048 {11672AFB-78C4-46b7-88AF-5E8C6CDA8C67}.exe 2108 {814690F1-6176-437b-BC60-8353FE440038}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{11672AFB-78C4-46b7-88AF-5E8C6CDA8C67}.exe {AC1F6F59-6582-4601-A429-12AC39DCC921}.exe File created C:\Windows\{814690F1-6176-437b-BC60-8353FE440038}.exe {11672AFB-78C4-46b7-88AF-5E8C6CDA8C67}.exe File created C:\Windows\{DC508A35-0910-4e7a-88DC-45973E17DC06}.exe 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe File created C:\Windows\{26E77711-A642-4c80-8F60-66A6C409436A}.exe {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe File created C:\Windows\{52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe {26E77711-A642-4c80-8F60-66A6C409436A}.exe File created C:\Windows\{BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe File created C:\Windows\{AC1F6F59-6582-4601-A429-12AC39DCC921}.exe {C20D1D31-0AD0-480f-8649-EE8C967C1BB1}.exe File created C:\Windows\{F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe File created C:\Windows\{89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe File created C:\Windows\{A682471C-366C-48c4-8400-21CAC1BE29D5}.exe {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe File created C:\Windows\{C20D1D31-0AD0-480f-8649-EE8C967C1BB1}.exe {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1784 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe Token: SeIncBasePriorityPrivilege 2452 {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe Token: SeIncBasePriorityPrivilege 2948 {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe Token: SeIncBasePriorityPrivilege 2480 {26E77711-A642-4c80-8F60-66A6C409436A}.exe Token: SeIncBasePriorityPrivilege 1864 {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe Token: SeIncBasePriorityPrivilege 1460 {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe Token: SeIncBasePriorityPrivilege 2896 {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe Token: SeIncBasePriorityPrivilege 1076 {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe Token: SeIncBasePriorityPrivilege 2564 {C20D1D31-0AD0-480f-8649-EE8C967C1BB1}.exe Token: SeIncBasePriorityPrivilege 3032 {AC1F6F59-6582-4601-A429-12AC39DCC921}.exe Token: SeIncBasePriorityPrivilege 3048 {11672AFB-78C4-46b7-88AF-5E8C6CDA8C67}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2452 1784 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 28 PID 1784 wrote to memory of 2452 1784 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 28 PID 1784 wrote to memory of 2452 1784 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 28 PID 1784 wrote to memory of 2452 1784 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 28 PID 1784 wrote to memory of 1152 1784 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 29 PID 1784 wrote to memory of 1152 1784 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 29 PID 1784 wrote to memory of 1152 1784 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 29 PID 1784 wrote to memory of 1152 1784 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 29 PID 2452 wrote to memory of 2948 2452 {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe 30 PID 2452 wrote to memory of 2948 2452 {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe 30 PID 2452 wrote to memory of 2948 2452 {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe 30 PID 2452 wrote to memory of 2948 2452 {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe 30 PID 2452 wrote to memory of 2600 2452 {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe 31 PID 2452 wrote to memory of 2600 2452 {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe 31 PID 2452 wrote to memory of 2600 2452 {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe 31 PID 2452 wrote to memory of 2600 2452 {DC508A35-0910-4e7a-88DC-45973E17DC06}.exe 31 PID 2948 wrote to memory of 2480 2948 {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe 34 PID 2948 wrote to memory of 2480 2948 {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe 34 PID 2948 wrote to memory of 2480 2948 {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe 34 PID 2948 wrote to memory of 2480 2948 {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe 34 PID 2948 wrote to memory of 2528 2948 {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe 35 PID 2948 wrote to memory of 2528 2948 {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe 35 PID 2948 wrote to memory of 2528 2948 {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe 35 PID 2948 wrote to memory of 2528 2948 {F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe 35 PID 2480 wrote to memory of 1864 2480 {26E77711-A642-4c80-8F60-66A6C409436A}.exe 36 PID 2480 wrote to memory of 1864 2480 {26E77711-A642-4c80-8F60-66A6C409436A}.exe 36 PID 2480 wrote to memory of 1864 2480 {26E77711-A642-4c80-8F60-66A6C409436A}.exe 36 PID 2480 wrote to memory of 1864 2480 {26E77711-A642-4c80-8F60-66A6C409436A}.exe 36 PID 2480 wrote to memory of 676 2480 {26E77711-A642-4c80-8F60-66A6C409436A}.exe 37 PID 2480 wrote to memory of 676 2480 {26E77711-A642-4c80-8F60-66A6C409436A}.exe 37 PID 2480 wrote to memory of 676 2480 {26E77711-A642-4c80-8F60-66A6C409436A}.exe 37 PID 2480 wrote to memory of 676 2480 {26E77711-A642-4c80-8F60-66A6C409436A}.exe 37 PID 1864 wrote to memory of 1460 1864 {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe 38 PID 1864 wrote to memory of 1460 1864 {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe 38 PID 1864 wrote to memory of 1460 1864 {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe 38 PID 1864 wrote to memory of 1460 1864 {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe 38 PID 1864 wrote to memory of 812 1864 {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe 39 PID 1864 wrote to memory of 812 1864 {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe 39 PID 1864 wrote to memory of 812 1864 {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe 39 PID 1864 wrote to memory of 812 1864 {52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe 39 PID 1460 wrote to memory of 2896 1460 {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe 40 PID 1460 wrote to memory of 2896 1460 {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe 40 PID 1460 wrote to memory of 2896 1460 {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe 40 PID 1460 wrote to memory of 2896 1460 {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe 40 PID 1460 wrote to memory of 2544 1460 {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe 41 PID 1460 wrote to memory of 2544 1460 {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe 41 PID 1460 wrote to memory of 2544 1460 {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe 41 PID 1460 wrote to memory of 2544 1460 {BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe 41 PID 2896 wrote to memory of 1076 2896 {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe 42 PID 2896 wrote to memory of 1076 2896 {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe 42 PID 2896 wrote to memory of 1076 2896 {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe 42 PID 2896 wrote to memory of 1076 2896 {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe 42 PID 2896 wrote to memory of 2536 2896 {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe 43 PID 2896 wrote to memory of 2536 2896 {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe 43 PID 2896 wrote to memory of 2536 2896 {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe 43 PID 2896 wrote to memory of 2536 2896 {89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe 43 PID 1076 wrote to memory of 2564 1076 {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe 44 PID 1076 wrote to memory of 2564 1076 {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe 44 PID 1076 wrote to memory of 2564 1076 {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe 44 PID 1076 wrote to memory of 2564 1076 {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe 44 PID 1076 wrote to memory of 2852 1076 {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe 45 PID 1076 wrote to memory of 2852 1076 {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe 45 PID 1076 wrote to memory of 2852 1076 {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe 45 PID 1076 wrote to memory of 2852 1076 {A682471C-366C-48c4-8400-21CAC1BE29D5}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\{DC508A35-0910-4e7a-88DC-45973E17DC06}.exeC:\Windows\{DC508A35-0910-4e7a-88DC-45973E17DC06}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\{F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exeC:\Windows\{F0C8F3FC-0E5B-4d1b-AE65-1FAF94FE52F2}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\{26E77711-A642-4c80-8F60-66A6C409436A}.exeC:\Windows\{26E77711-A642-4c80-8F60-66A6C409436A}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\{52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exeC:\Windows\{52FD406C-68C6-42ca-8E4B-8CD38A09951A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\{BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exeC:\Windows\{BDDF6B15-BD0A-4f29-8F62-E94EBE4DC926}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\{89BF531D-E516-407e-8209-B9CCDDD98AC9}.exeC:\Windows\{89BF531D-E516-407e-8209-B9CCDDD98AC9}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\{A682471C-366C-48c4-8400-21CAC1BE29D5}.exeC:\Windows\{A682471C-366C-48c4-8400-21CAC1BE29D5}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\{C20D1D31-0AD0-480f-8649-EE8C967C1BB1}.exeC:\Windows\{C20D1D31-0AD0-480f-8649-EE8C967C1BB1}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Windows\{AC1F6F59-6582-4601-A429-12AC39DCC921}.exeC:\Windows\{AC1F6F59-6582-4601-A429-12AC39DCC921}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Windows\{11672AFB-78C4-46b7-88AF-5E8C6CDA8C67}.exeC:\Windows\{11672AFB-78C4-46b7-88AF-5E8C6CDA8C67}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3048 -
C:\Windows\{814690F1-6176-437b-BC60-8353FE440038}.exeC:\Windows\{814690F1-6176-437b-BC60-8353FE440038}.exe12⤵
- Executes dropped EXE
PID:2108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11672~1.EXE > nul12⤵PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AC1F6~1.EXE > nul11⤵PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C20D1~1.EXE > nul10⤵PID:920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6824~1.EXE > nul9⤵PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{89BF5~1.EXE > nul8⤵PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BDDF6~1.EXE > nul7⤵PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{52FD4~1.EXE > nul6⤵PID:812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26E77~1.EXE > nul5⤵PID:676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F0C8F~1.EXE > nul4⤵PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DC508~1.EXE > nul3⤵PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD583fb647744c4a07192b79fe24f0524ff
SHA144e57fd58f44731503cc715f4615821a32620176
SHA256a62247fc02ed40d91a4ea7cd923f2ad5331b1f47ac5a2751aba6630b89d26b1c
SHA512f71fd5d81e7844262c0507d7e4a56be106f34a021e8d0a7d616045b4e1d17103a68305360b1b3e38a2b493a91a1c4244589e9dd308fffa8a078fe8d6db7afa47
-
Filesize
168KB
MD5768645a9313515bd0c209140a5c9337b
SHA1ec04525aa0c52ab5ba83dbcf2dff8fe7568709cc
SHA2560b8b1b465acab3442d6d289b4fadd2b0cb94cefa18208622c49f7fff8aae006e
SHA51244af46923cb3535912b46107e5f908c84eaf1679ceaa36512b17490b632204c1ad4c0baa57b84f2dd4e9f515417d203ded16c4b60f9757a4fee6467af9d5bb11
-
Filesize
168KB
MD5929b7322e7762ab4571c0d905fd47d76
SHA174be090f74b8a4a0846f6e768eea37044893e5c2
SHA256395819956f5652e3edf64dd02dbc771b4fcf68ff64e0894d9bdbde37d7c7b6a7
SHA512aca241606ab70fb17f9d450692b4527f0849e5d5b2f46b6873e6e6ce67e8dfc011f0c1d583c02a5c4e9cbf9d3572f9346b991db42b255ca8071b280a73f7a09e
-
Filesize
168KB
MD5cebd008b540d150ca4caf6f9732f89f0
SHA1c34f8a8a352299bb2263c3d6e1ff55bc4feafbf4
SHA2567aabb47ab027c623a691f23a1fbea8f1570cb5acfe605f7569280857d4364d0a
SHA512477f8a82fce2ee24d6d235edcf164764185292cd4b735bf4f57d79fd80048f99d6fb722594b2aa69641a777d6cf2ef71970238bc4380a24210b02748ec01a1b1
-
Filesize
168KB
MD5885de19611dce37715527404f7a862fa
SHA10054de92b8e7325e552a113d3f961e775d969232
SHA2562a164ecc1f60dfad5f6cfe4b01d9f4d1379a117e02406a131c41de6bf02f55ac
SHA512515d85d454eba253d35706e58b50b9c525442f50cda1b897874e7a39c15837c203c8689410dd54b0d0b257bf399a96da7a4d85a2d623a4ca1ca11c0c94599ef3
-
Filesize
168KB
MD55f56ddcce38e0da348729d30a50266a3
SHA119ed918bd01a6d3602f9c9bb26aff9153a0be238
SHA2568d8c0b7e45865eef8e7052d0b8e0c6a58595b591d9cacd2e525340821cd3dee8
SHA512415da620cb46633716b6bea7cbe7226672ff2e2ccb9e3e80416e2508c1be969e2b447727ee3e7e062c4b3ec8388ad4135dc398962a4dcb4534286c742b4fcbec
-
Filesize
168KB
MD5b08c61694c925810d7b836805383922d
SHA1aa1ba3a4f42f5fb22ec5cd7ee5b0161d1895ad48
SHA2566db64a0c13519dad2d6c28cf1881abb447b525a138117a009e19a2801a8a216e
SHA51288c2f013bd5158e15aaba3dc68ede0de74a1917a88cdd6c868934104da08c49aa1398745a8dfe58a2e05dac2247ae7761d883eb18a433c7da27a19a87a8f5ad0
-
Filesize
168KB
MD55aa75e7bb9bc3e8163a758dc75a74030
SHA1e9916548f236882edd1a0fa184531125537ea5be
SHA25658c09144e6a31a7d4889c290c9c7f6af97b1f8330a4087ee2b8c8c101e4d2d5e
SHA5123922688e59634b3b7262d147bdeee67dc3b5a5260a0219395c2306aeb41373945a2055a8e00b76d6c41d883a1d6b2168c9038375fa7cc93bdb28e6e84da292f8
-
Filesize
168KB
MD560a9f20298e2ff263425c24154773cfa
SHA1a98348ff191dfb6dd4c1b9f87a0a51fd42789637
SHA25640dd227294e05ecfeb3c2466b3dc003b65a2960965bbf48a8cbd536ec67040a6
SHA512d0a87c697877f8ea3781a92151f36073858641cd7867b530edbebc9f29448e6faa7161142478857b6f57c7d4fc4d267906d90a5e5ffe8acff1e79298456faad0
-
Filesize
168KB
MD5e2bfc1d697a30cd0ae0c791fef9b64d7
SHA11b179fa067c08c1fe4adca12c9b196b407ec76c0
SHA256197e11455a0b7731ba794b10c63d99ea084c7420f76eb2723cbc1a878e253b5c
SHA5123f4e2df1edfe0b635a601187d281eda18faf0c34b3814ec36bc74247f5e4d74b53dc5dab69b44bc7c012d8ef1c76555d6db674c5c88add93cfe17d962fb98629
-
Filesize
168KB
MD581a5ac051bf9a128158926b52681c977
SHA1dea63ea75dff5bc5ea5f3ec534c9f4465dfeaa0f
SHA256f2b9c4133e58b4e7527f421a8f382727e8dda69f392e3f51a0f52c4e89f4f0a4
SHA5124a70f5b1fe6966039813cd72791856733755ed9ee877540b96135bfd3e325a5a9a7a3edbdfc3ea210b085cebf612da2ae38ef7b29f90c64f412e1ff6a07f20b3