Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe
-
Size
168KB
-
MD5
967bf0a45c55b443bdc00c8d5667fbfe
-
SHA1
052c944b5801fdf63751b561bb970d676108efe9
-
SHA256
177eaae3c62e10d2edb9952de087b2d0657377b7d778fc90422673535da54391
-
SHA512
797b4ace057f3e5dad73864c562d15042bbf86539040b8270455943f351eb55344132f149c75d64e34d2cc9ba9d4e83edfc488beb4f47847265f0fb0d9947ac3
-
SSDEEP
1536:1EGh0oylq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oylqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral2/files/0x000700000002323e-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023258-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x001200000002323e-11.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002310b-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x001300000002323e-17.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00020000000219e9-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070d-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070f-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070d-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0006000000000026-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000000070d-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A} {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3889642-D400-4bfe-AFF2-931427BC0839}\stubpath = "C:\\Windows\\{D3889642-D400-4bfe-AFF2-931427BC0839}.exe" {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FFA7AD09-5D52-46a8-A92F-83F254C0C148} 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FFA7AD09-5D52-46a8-A92F-83F254C0C148}\stubpath = "C:\\Windows\\{FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe" 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED157924-CC10-4adc-B21B-C6860C5AE716} {F0EEC369-91D1-4691-9D4B-82F291504953}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E2F5FD48-9D67-494d-A59F-8586F1E651AF}\stubpath = "C:\\Windows\\{E2F5FD48-9D67-494d-A59F-8586F1E651AF}.exe" {57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F0EEC369-91D1-4691-9D4B-82F291504953}\stubpath = "C:\\Windows\\{F0EEC369-91D1-4691-9D4B-82F291504953}.exe" {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69DE93CA-C170-4106-A531-BD10D60293C8}\stubpath = "C:\\Windows\\{69DE93CA-C170-4106-A531-BD10D60293C8}.exe" {D3889642-D400-4bfe-AFF2-931427BC0839}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}\stubpath = "C:\\Windows\\{D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe" {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2} {69DE93CA-C170-4106-A531-BD10D60293C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}\stubpath = "C:\\Windows\\{D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe" {69DE93CA-C170-4106-A531-BD10D60293C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0BC7779E-74D3-42cd-BFB7-04B205D0644A} {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0BC7779E-74D3-42cd-BFB7-04B205D0644A}\stubpath = "C:\\Windows\\{0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe" {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED157924-CC10-4adc-B21B-C6860C5AE716}\stubpath = "C:\\Windows\\{ED157924-CC10-4adc-B21B-C6860C5AE716}.exe" {F0EEC369-91D1-4691-9D4B-82F291504953}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3889642-D400-4bfe-AFF2-931427BC0839} {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69DE93CA-C170-4106-A531-BD10D60293C8} {D3889642-D400-4bfe-AFF2-931427BC0839}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57026389-CA3B-4529-8F80-85A5F82BE2F6} {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57026389-CA3B-4529-8F80-85A5F82BE2F6}\stubpath = "C:\\Windows\\{57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe" {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E2F5FD48-9D67-494d-A59F-8586F1E651AF} {57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F0EEC369-91D1-4691-9D4B-82F291504953} {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}\stubpath = "C:\\Windows\\{D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe" {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D1FB8351-FF9F-41fc-ABF0-B74E95C4B732} {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe -
Executes dropped EXE 11 IoCs
pid Process 1344 {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe 4616 {F0EEC369-91D1-4691-9D4B-82F291504953}.exe 1484 {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe 1612 {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe 3916 {D3889642-D400-4bfe-AFF2-931427BC0839}.exe 2348 {69DE93CA-C170-4106-A531-BD10D60293C8}.exe 3816 {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe 1820 {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe 2372 {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe 1244 {57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe 4140 {E2F5FD48-9D67-494d-A59F-8586F1E651AF}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe File created C:\Windows\{E2F5FD48-9D67-494d-A59F-8586F1E651AF}.exe {57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe File created C:\Windows\{FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe File created C:\Windows\{F0EEC369-91D1-4691-9D4B-82F291504953}.exe {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe File created C:\Windows\{ED157924-CC10-4adc-B21B-C6860C5AE716}.exe {F0EEC369-91D1-4691-9D4B-82F291504953}.exe File created C:\Windows\{D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe File created C:\Windows\{D3889642-D400-4bfe-AFF2-931427BC0839}.exe {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe File created C:\Windows\{69DE93CA-C170-4106-A531-BD10D60293C8}.exe {D3889642-D400-4bfe-AFF2-931427BC0839}.exe File created C:\Windows\{D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe {69DE93CA-C170-4106-A531-BD10D60293C8}.exe File created C:\Windows\{D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe File created C:\Windows\{57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2584 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe Token: SeIncBasePriorityPrivilege 1344 {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe Token: SeIncBasePriorityPrivilege 4616 {F0EEC369-91D1-4691-9D4B-82F291504953}.exe Token: SeIncBasePriorityPrivilege 1484 {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe Token: SeIncBasePriorityPrivilege 1612 {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe Token: SeIncBasePriorityPrivilege 3916 {D3889642-D400-4bfe-AFF2-931427BC0839}.exe Token: SeIncBasePriorityPrivilege 2348 {69DE93CA-C170-4106-A531-BD10D60293C8}.exe Token: SeIncBasePriorityPrivilege 3816 {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe Token: SeIncBasePriorityPrivilege 1820 {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe Token: SeIncBasePriorityPrivilege 2372 {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe Token: SeIncBasePriorityPrivilege 1244 {57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1344 2584 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 94 PID 2584 wrote to memory of 1344 2584 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 94 PID 2584 wrote to memory of 1344 2584 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 94 PID 2584 wrote to memory of 2344 2584 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 95 PID 2584 wrote to memory of 2344 2584 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 95 PID 2584 wrote to memory of 2344 2584 2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe 95 PID 1344 wrote to memory of 4616 1344 {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe 100 PID 1344 wrote to memory of 4616 1344 {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe 100 PID 1344 wrote to memory of 4616 1344 {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe 100 PID 1344 wrote to memory of 2372 1344 {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe 101 PID 1344 wrote to memory of 2372 1344 {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe 101 PID 1344 wrote to memory of 2372 1344 {FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe 101 PID 4616 wrote to memory of 1484 4616 {F0EEC369-91D1-4691-9D4B-82F291504953}.exe 103 PID 4616 wrote to memory of 1484 4616 {F0EEC369-91D1-4691-9D4B-82F291504953}.exe 103 PID 4616 wrote to memory of 1484 4616 {F0EEC369-91D1-4691-9D4B-82F291504953}.exe 103 PID 4616 wrote to memory of 2328 4616 {F0EEC369-91D1-4691-9D4B-82F291504953}.exe 104 PID 4616 wrote to memory of 2328 4616 {F0EEC369-91D1-4691-9D4B-82F291504953}.exe 104 PID 4616 wrote to memory of 2328 4616 {F0EEC369-91D1-4691-9D4B-82F291504953}.exe 104 PID 1484 wrote to memory of 1612 1484 {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe 106 PID 1484 wrote to memory of 1612 1484 {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe 106 PID 1484 wrote to memory of 1612 1484 {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe 106 PID 1484 wrote to memory of 1856 1484 {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe 107 PID 1484 wrote to memory of 1856 1484 {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe 107 PID 1484 wrote to memory of 1856 1484 {ED157924-CC10-4adc-B21B-C6860C5AE716}.exe 107 PID 1612 wrote to memory of 3916 1612 {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe 108 PID 1612 wrote to memory of 3916 1612 {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe 108 PID 1612 wrote to memory of 3916 1612 {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe 108 PID 1612 wrote to memory of 2880 1612 {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe 109 PID 1612 wrote to memory of 2880 1612 {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe 109 PID 1612 wrote to memory of 2880 1612 {D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe 109 PID 3916 wrote to memory of 2348 3916 {D3889642-D400-4bfe-AFF2-931427BC0839}.exe 110 PID 3916 wrote to memory of 2348 3916 {D3889642-D400-4bfe-AFF2-931427BC0839}.exe 110 PID 3916 wrote to memory of 2348 3916 {D3889642-D400-4bfe-AFF2-931427BC0839}.exe 110 PID 3916 wrote to memory of 3108 3916 {D3889642-D400-4bfe-AFF2-931427BC0839}.exe 111 PID 3916 wrote to memory of 3108 3916 {D3889642-D400-4bfe-AFF2-931427BC0839}.exe 111 PID 3916 wrote to memory of 3108 3916 {D3889642-D400-4bfe-AFF2-931427BC0839}.exe 111 PID 2348 wrote to memory of 3816 2348 {69DE93CA-C170-4106-A531-BD10D60293C8}.exe 112 PID 2348 wrote to memory of 3816 2348 {69DE93CA-C170-4106-A531-BD10D60293C8}.exe 112 PID 2348 wrote to memory of 3816 2348 {69DE93CA-C170-4106-A531-BD10D60293C8}.exe 112 PID 2348 wrote to memory of 3612 2348 {69DE93CA-C170-4106-A531-BD10D60293C8}.exe 113 PID 2348 wrote to memory of 3612 2348 {69DE93CA-C170-4106-A531-BD10D60293C8}.exe 113 PID 2348 wrote to memory of 3612 2348 {69DE93CA-C170-4106-A531-BD10D60293C8}.exe 113 PID 3816 wrote to memory of 1820 3816 {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe 114 PID 3816 wrote to memory of 1820 3816 {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe 114 PID 3816 wrote to memory of 1820 3816 {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe 114 PID 3816 wrote to memory of 4128 3816 {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe 115 PID 3816 wrote to memory of 4128 3816 {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe 115 PID 3816 wrote to memory of 4128 3816 {D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe 115 PID 1820 wrote to memory of 2372 1820 {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe 116 PID 1820 wrote to memory of 2372 1820 {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe 116 PID 1820 wrote to memory of 2372 1820 {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe 116 PID 1820 wrote to memory of 3672 1820 {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe 117 PID 1820 wrote to memory of 3672 1820 {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe 117 PID 1820 wrote to memory of 3672 1820 {0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe 117 PID 2372 wrote to memory of 1244 2372 {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe 118 PID 2372 wrote to memory of 1244 2372 {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe 118 PID 2372 wrote to memory of 1244 2372 {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe 118 PID 2372 wrote to memory of 2120 2372 {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe 119 PID 2372 wrote to memory of 2120 2372 {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe 119 PID 2372 wrote to memory of 2120 2372 {D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe 119 PID 1244 wrote to memory of 4140 1244 {57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe 120 PID 1244 wrote to memory of 4140 1244 {57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe 120 PID 1244 wrote to memory of 4140 1244 {57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe 120 PID 1244 wrote to memory of 1568 1244 {57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-24_967bf0a45c55b443bdc00c8d5667fbfe_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\{FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exeC:\Windows\{FFA7AD09-5D52-46a8-A92F-83F254C0C148}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\{F0EEC369-91D1-4691-9D4B-82F291504953}.exeC:\Windows\{F0EEC369-91D1-4691-9D4B-82F291504953}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\{ED157924-CC10-4adc-B21B-C6860C5AE716}.exeC:\Windows\{ED157924-CC10-4adc-B21B-C6860C5AE716}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\{D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exeC:\Windows\{D6DDB17E-4DD1-4ebf-90FC-375C23F37D8A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\{D3889642-D400-4bfe-AFF2-931427BC0839}.exeC:\Windows\{D3889642-D400-4bfe-AFF2-931427BC0839}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\{69DE93CA-C170-4106-A531-BD10D60293C8}.exeC:\Windows\{69DE93CA-C170-4106-A531-BD10D60293C8}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\{D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exeC:\Windows\{D4EA96BF-8DA6-4e7a-870E-0526E0B5A8F2}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\{0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exeC:\Windows\{0BC7779E-74D3-42cd-BFB7-04B205D0644A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\{D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exeC:\Windows\{D1FB8351-FF9F-41fc-ABF0-B74E95C4B732}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\{57026389-CA3B-4529-8F80-85A5F82BE2F6}.exeC:\Windows\{57026389-CA3B-4529-8F80-85A5F82BE2F6}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\{E2F5FD48-9D67-494d-A59F-8586F1E651AF}.exeC:\Windows\{E2F5FD48-9D67-494d-A59F-8586F1E651AF}.exe12⤵
- Executes dropped EXE
PID:4140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{57026~1.EXE > nul12⤵PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D1FB8~1.EXE > nul11⤵PID:2120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0BC77~1.EXE > nul10⤵PID:3672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4EA9~1.EXE > nul9⤵PID:4128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69DE9~1.EXE > nul8⤵PID:3612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3889~1.EXE > nul7⤵PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D6DDB~1.EXE > nul6⤵PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ED157~1.EXE > nul5⤵PID:1856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F0EEC~1.EXE > nul4⤵PID:2328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FFA7A~1.EXE > nul3⤵PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:4284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD570ab9429e40f56350b4d0383b477e7b7
SHA1c8b1a1de29ae67c58dc749f507aa21a99947d8c3
SHA2562474fe4a6bdce045c929e74601a6e646b64cfb9151f156415e33d20c6b18efab
SHA5125ff2f1bbcd2e0712ceb49c00a33d92bf74a3d3e1b247c5c488978d5386ab33f3ee55b36b58b3a564c2f65e81c8881d609ab5acb0abdbb5a89a95d4a467608be3
-
Filesize
168KB
MD5d434544e1e871a6d6aefc50ea684886a
SHA11c62c6915025ff6c711a4df5cca11481cc08bd67
SHA25685c831ca1a6f06461246e3891420cf6e4804e5238f09a6df5fe66d588cc01a2d
SHA512273f0502135feabffabe9dc09d14ea166ad99a19f92de0c93274655a455d6b4cc6ea322f0648b9f4e74fd9a790dba5a4d1e2b632c4b72f44ee88f8c14ab9ba2c
-
Filesize
168KB
MD56963d543608695b04bc8367d0b411557
SHA1d073767dd0e6a23f62d3b3e994d55cc105311551
SHA256ca010a495ded5607bea1ef0ac879f979e022be2ce8f5622f13c94c6ae9bca48a
SHA512880a27d00b80e18ece6f98f9ee5a53f99bb19f57dc3b48cec1d25da93cec0f5f95b5903a6a9924bbba248282e22c7c6c26de68c901351086713651725370225d
-
Filesize
168KB
MD5b1529e6f31173d4a3db9586b0c07d7bc
SHA11805195e4a6320f94367806e77565ee6c69edae8
SHA25665c12426c54502b1c0edcccd1e02a38be864fa415a85b03c3a5789c299f2bad8
SHA512780aee4b204dbde304fc07f4bb2bb3c9077aee60d5740da637a0472f75948514365e6a362060cba1212183697cfff32852f69a085177e822fe368c9121394c61
-
Filesize
168KB
MD5caa12efa25241947eb66acfd4762521a
SHA13121be3a7b9a8b82e2d9dae12dc0f505454010f3
SHA25601f6838bb292086e6c591f86e395f53d83f7cd3547f2521b1a24db4116299dca
SHA512dcfa7d8e4c1db89f6902aeffa8d785a20cb93d3a9b42afcfff566420aafa1edc4a42a40ff9901d8209ec5772f9672f1b2792374a72dd7c7dca3da4396178dcc4
-
Filesize
168KB
MD5561d2ad1e7d5f44528c99f403bcf7e8c
SHA15c33211b5c114edb4744803983fa75a124a350ac
SHA2560691ffb2347c2ee7274239f58cf06cb2fdc5c0c9705f91b796da45d8375923ca
SHA5121c2c9677a5a3868b5f9d0dbd00d6e0b094c7359e896137081837e9193a3cdfe76a0c4c479a7d0bc4c6632f8d5e0c8a9d62e7594f58af95cf1485093c020f0dde
-
Filesize
168KB
MD5d2b4230a3945cad3a4ba6ca9bf2740b6
SHA1771b4f97910761c99e1843f829bc32aba1873f2e
SHA256243cf80ffba089214002085cc9e8fcdba46e647a011c2d97be65a73b29bc7911
SHA512cc1ef7f98c264be8483e5633dc8900eb8ecf38a848307788a21c3959a10343f81e56d6cafa16a369343562d12f650accd18f067ae92cb7a8f0d3a1fc1be2008d
-
Filesize
168KB
MD5214db8e3cb917eea55fbac94664df176
SHA191f8c0953384090a5e86b7c1f5e9b5fc6432dc1d
SHA256207ba01edae2f8094ab3f3e07806842649defe58450f340d786b812c6045969f
SHA5124da8ccc59499d2f537d35b1931b04e471c1b22e299c3a3982b262e3f2ecc31ee7af3b70c46cbcedd9185302345537d2ecc1a86b28e4bc024169e0e7c6dbbc476
-
Filesize
168KB
MD5b2f47cade7debc826d08012621ce27c6
SHA1667d2950cef8b5362d1e2fc4c67b22880af879ae
SHA2560551d64d4ee387cd67dedffb5817a36eb99bb84752a0dad565d1515d44bf033a
SHA512eb525c2a9a7ce98f9bbdfad0fc21dfc068391cec291e449e872afda227131375b1b5ca930111545b12d1e96e2889058034ce44203f392d975626470a750d3905
-
Filesize
168KB
MD5691c6b3338e2e3cac32d64a859142be7
SHA137c29b448f522baea77be508d8b7b932d84fdb2a
SHA256d281916fd649444edb6577f765d9687e1c9227d667615b2350abee4ca81f1e6e
SHA512fd00817351b497b74f325690ade31beab9160b277a314588a86d5c5a3ff592788cbafa2c172ede9eb7a0d0c1ed85b1d0a0c1743cf87fe58519fadd2470c9e380
-
Filesize
168KB
MD5b7a12ee2e25e05e92959741285dbaf6f
SHA1682acf7b145c44d7cbdc6fb3064257cfff2c193d
SHA256ca646ea5c1cdd72be02d6bad9bebae78f3a8d7fb99ae2eef1c1b7c2f8bb5194f
SHA5122eff61a5b7b9729dcdbfbecf4370fbe7da0c2d86b17f9613bdd4190cf4a27bea3632aab6012d921cbcc1c8dd4cc217217fcc41d574e8bc1089e5e7cebb1f2d5a