Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe
-
Size
204KB
-
MD5
e842df2e149d65afcc8e40a43d7ce684
-
SHA1
575594b48341bc6ced47314c0e3bbc43ccb2276b
-
SHA256
17df57b00bf37994bcb9fdb61ee02bce1f0eeaf87c6e130d77630ab33c57cbcf
-
SHA512
5b442f23b41ca36b4dfc41bd5635c6078ffc096291ae5a48d27d480fe975ae1085d0194df820ff131e91a2fbd993ea25edcf03a45af50b49916acdb781de3015
-
SSDEEP
1536:1EGh0oJl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oJl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000b000000015d59-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002f000000016122-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002f0000000161ee-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00070000000167bf-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00080000000167bf-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00090000000167bf-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a0000000167bf-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B2302A2A-3AF2-49c8-B2DF-74373133B2B7}\stubpath = "C:\\Windows\\{B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe" {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A9C76F2-E930-4fcc-833F-7C244607F714} {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AB0AF7E9-8C72-445e-B264-E3647A623B06}\stubpath = "C:\\Windows\\{AB0AF7E9-8C72-445e-B264-E3647A623B06}.exe" {56F7AEA1-A401-4321-9D08-947B40BC7531}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6D88CF4-EF00-47b5-9B9F-C244F92FB86B}\stubpath = "C:\\Windows\\{A6D88CF4-EF00-47b5-9B9F-C244F92FB86B}.exe" {AB0AF7E9-8C72-445e-B264-E3647A623B06}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2D6CD512-0D70-4acd-929D-74254F6AB3C3} {A6D88CF4-EF00-47b5-9B9F-C244F92FB86B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2D6CD512-0D70-4acd-929D-74254F6AB3C3}\stubpath = "C:\\Windows\\{2D6CD512-0D70-4acd-929D-74254F6AB3C3}.exe" {A6D88CF4-EF00-47b5-9B9F-C244F92FB86B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CAD8214C-C4D6-48f8-8DA3-695E6689493A}\stubpath = "C:\\Windows\\{CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe" 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA110502-FBE4-4234-9D63-8E9171D50CB9}\stubpath = "C:\\Windows\\{AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe" {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6914447D-20CE-4e78-B9B5-A992BD42232C} {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56F7AEA1-A401-4321-9D08-947B40BC7531} {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56F7AEA1-A401-4321-9D08-947B40BC7531}\stubpath = "C:\\Windows\\{56F7AEA1-A401-4321-9D08-947B40BC7531}.exe" {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6D88CF4-EF00-47b5-9B9F-C244F92FB86B} {AB0AF7E9-8C72-445e-B264-E3647A623B06}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CAD8214C-C4D6-48f8-8DA3-695E6689493A} 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B2302A2A-3AF2-49c8-B2DF-74373133B2B7} {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A6243D7-9BC9-4795-99EC-C1640393A5A4} {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6914447D-20CE-4e78-B9B5-A992BD42232C}\stubpath = "C:\\Windows\\{6914447D-20CE-4e78-B9B5-A992BD42232C}.exe" {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AB0AF7E9-8C72-445e-B264-E3647A623B06} {56F7AEA1-A401-4321-9D08-947B40BC7531}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A6243D7-9BC9-4795-99EC-C1640393A5A4}\stubpath = "C:\\Windows\\{6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe" {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B38288CB-F48D-44f5-BC5D-0564C1CB010B} {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B38288CB-F48D-44f5-BC5D-0564C1CB010B}\stubpath = "C:\\Windows\\{B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe" {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A9C76F2-E930-4fcc-833F-7C244607F714}\stubpath = "C:\\Windows\\{6A9C76F2-E930-4fcc-833F-7C244607F714}.exe" {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA110502-FBE4-4234-9D63-8E9171D50CB9} {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe -
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2556 {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe 2620 {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe 2608 {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe 1692 {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe 1856 {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe 2308 {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe 1752 {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe 580 {56F7AEA1-A401-4321-9D08-947B40BC7531}.exe 2696 {AB0AF7E9-8C72-445e-B264-E3647A623B06}.exe 2768 {A6D88CF4-EF00-47b5-9B9F-C244F92FB86B}.exe 1696 {2D6CD512-0D70-4acd-929D-74254F6AB3C3}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe File created C:\Windows\{CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe File created C:\Windows\{B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe File created C:\Windows\{B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe File created C:\Windows\{56F7AEA1-A401-4321-9D08-947B40BC7531}.exe {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe File created C:\Windows\{AB0AF7E9-8C72-445e-B264-E3647A623B06}.exe {56F7AEA1-A401-4321-9D08-947B40BC7531}.exe File created C:\Windows\{A6D88CF4-EF00-47b5-9B9F-C244F92FB86B}.exe {AB0AF7E9-8C72-445e-B264-E3647A623B06}.exe File created C:\Windows\{2D6CD512-0D70-4acd-929D-74254F6AB3C3}.exe {A6D88CF4-EF00-47b5-9B9F-C244F92FB86B}.exe File created C:\Windows\{6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe File created C:\Windows\{6A9C76F2-E930-4fcc-833F-7C244607F714}.exe {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe File created C:\Windows\{6914447D-20CE-4e78-B9B5-A992BD42232C}.exe {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2836 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe Token: SeIncBasePriorityPrivilege 2556 {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe Token: SeIncBasePriorityPrivilege 2620 {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe Token: SeIncBasePriorityPrivilege 2608 {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe Token: SeIncBasePriorityPrivilege 1692 {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe Token: SeIncBasePriorityPrivilege 1856 {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe Token: SeIncBasePriorityPrivilege 2308 {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe Token: SeIncBasePriorityPrivilege 1752 {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe Token: SeIncBasePriorityPrivilege 580 {56F7AEA1-A401-4321-9D08-947B40BC7531}.exe Token: SeIncBasePriorityPrivilege 2696 {AB0AF7E9-8C72-445e-B264-E3647A623B06}.exe Token: SeIncBasePriorityPrivilege 2768 {A6D88CF4-EF00-47b5-9B9F-C244F92FB86B}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2556 2836 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe 28 PID 2836 wrote to memory of 2556 2836 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe 28 PID 2836 wrote to memory of 2556 2836 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe 28 PID 2836 wrote to memory of 2556 2836 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe 28 PID 2836 wrote to memory of 2640 2836 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe 29 PID 2836 wrote to memory of 2640 2836 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe 29 PID 2836 wrote to memory of 2640 2836 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe 29 PID 2836 wrote to memory of 2640 2836 2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe 29 PID 2556 wrote to memory of 2620 2556 {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe 30 PID 2556 wrote to memory of 2620 2556 {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe 30 PID 2556 wrote to memory of 2620 2556 {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe 30 PID 2556 wrote to memory of 2620 2556 {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe 30 PID 2556 wrote to memory of 2712 2556 {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe 31 PID 2556 wrote to memory of 2712 2556 {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe 31 PID 2556 wrote to memory of 2712 2556 {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe 31 PID 2556 wrote to memory of 2712 2556 {CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe 31 PID 2620 wrote to memory of 2608 2620 {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe 32 PID 2620 wrote to memory of 2608 2620 {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe 32 PID 2620 wrote to memory of 2608 2620 {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe 32 PID 2620 wrote to memory of 2608 2620 {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe 32 PID 2620 wrote to memory of 2428 2620 {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe 33 PID 2620 wrote to memory of 2428 2620 {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe 33 PID 2620 wrote to memory of 2428 2620 {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe 33 PID 2620 wrote to memory of 2428 2620 {B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe 33 PID 2608 wrote to memory of 1692 2608 {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe 36 PID 2608 wrote to memory of 1692 2608 {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe 36 PID 2608 wrote to memory of 1692 2608 {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe 36 PID 2608 wrote to memory of 1692 2608 {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe 36 PID 2608 wrote to memory of 1564 2608 {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe 37 PID 2608 wrote to memory of 1564 2608 {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe 37 PID 2608 wrote to memory of 1564 2608 {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe 37 PID 2608 wrote to memory of 1564 2608 {6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe 37 PID 1692 wrote to memory of 1856 1692 {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe 38 PID 1692 wrote to memory of 1856 1692 {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe 38 PID 1692 wrote to memory of 1856 1692 {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe 38 PID 1692 wrote to memory of 1856 1692 {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe 38 PID 1692 wrote to memory of 1944 1692 {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe 39 PID 1692 wrote to memory of 1944 1692 {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe 39 PID 1692 wrote to memory of 1944 1692 {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe 39 PID 1692 wrote to memory of 1944 1692 {B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe 39 PID 1856 wrote to memory of 2308 1856 {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe 40 PID 1856 wrote to memory of 2308 1856 {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe 40 PID 1856 wrote to memory of 2308 1856 {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe 40 PID 1856 wrote to memory of 2308 1856 {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe 40 PID 1856 wrote to memory of 776 1856 {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe 41 PID 1856 wrote to memory of 776 1856 {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe 41 PID 1856 wrote to memory of 776 1856 {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe 41 PID 1856 wrote to memory of 776 1856 {6A9C76F2-E930-4fcc-833F-7C244607F714}.exe 41 PID 2308 wrote to memory of 1752 2308 {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe 42 PID 2308 wrote to memory of 1752 2308 {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe 42 PID 2308 wrote to memory of 1752 2308 {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe 42 PID 2308 wrote to memory of 1752 2308 {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe 42 PID 2308 wrote to memory of 536 2308 {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe 43 PID 2308 wrote to memory of 536 2308 {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe 43 PID 2308 wrote to memory of 536 2308 {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe 43 PID 2308 wrote to memory of 536 2308 {AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe 43 PID 1752 wrote to memory of 580 1752 {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe 44 PID 1752 wrote to memory of 580 1752 {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe 44 PID 1752 wrote to memory of 580 1752 {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe 44 PID 1752 wrote to memory of 580 1752 {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe 44 PID 1752 wrote to memory of 1292 1752 {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe 45 PID 1752 wrote to memory of 1292 1752 {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe 45 PID 1752 wrote to memory of 1292 1752 {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe 45 PID 1752 wrote to memory of 1292 1752 {6914447D-20CE-4e78-B9B5-A992BD42232C}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-25_e842df2e149d65afcc8e40a43d7ce684_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\{CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exeC:\Windows\{CAD8214C-C4D6-48f8-8DA3-695E6689493A}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\{B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exeC:\Windows\{B2302A2A-3AF2-49c8-B2DF-74373133B2B7}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\{6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exeC:\Windows\{6A6243D7-9BC9-4795-99EC-C1640393A5A4}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\{B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exeC:\Windows\{B38288CB-F48D-44f5-BC5D-0564C1CB010B}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\{6A9C76F2-E930-4fcc-833F-7C244607F714}.exeC:\Windows\{6A9C76F2-E930-4fcc-833F-7C244607F714}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\{AA110502-FBE4-4234-9D63-8E9171D50CB9}.exeC:\Windows\{AA110502-FBE4-4234-9D63-8E9171D50CB9}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\{6914447D-20CE-4e78-B9B5-A992BD42232C}.exeC:\Windows\{6914447D-20CE-4e78-B9B5-A992BD42232C}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\{56F7AEA1-A401-4321-9D08-947B40BC7531}.exeC:\Windows\{56F7AEA1-A401-4321-9D08-947B40BC7531}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:580 -
C:\Windows\{AB0AF7E9-8C72-445e-B264-E3647A623B06}.exeC:\Windows\{AB0AF7E9-8C72-445e-B264-E3647A623B06}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Windows\{A6D88CF4-EF00-47b5-9B9F-C244F92FB86B}.exeC:\Windows\{A6D88CF4-EF00-47b5-9B9F-C244F92FB86B}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Windows\{2D6CD512-0D70-4acd-929D-74254F6AB3C3}.exeC:\Windows\{2D6CD512-0D70-4acd-929D-74254F6AB3C3}.exe12⤵
- Executes dropped EXE
PID:1696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6D88~1.EXE > nul12⤵PID:620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AB0AF~1.EXE > nul11⤵PID:2508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56F7A~1.EXE > nul10⤵PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69144~1.EXE > nul9⤵PID:1292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA110~1.EXE > nul8⤵PID:536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6A9C7~1.EXE > nul7⤵PID:776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B3828~1.EXE > nul6⤵PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6A624~1.EXE > nul5⤵PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B2302~1.EXE > nul4⤵PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CAD82~1.EXE > nul3⤵PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD59bc56524dff1536fcc5fc453ba9a5715
SHA11e0065d0677da027531ff3cbf1966b8c8de0609e
SHA25633dcf3f3d8b00cfb3dafa8e64c40244239d2bc3701293e7c95b2a982d314f10e
SHA512b084f57e0ede7214eeace4904a6d04637400a5882f7aceba3524cff8f5d9c74eda342525654a33288503c63952c6e88ab55dc90040b25074699ccdc877525bde
-
Filesize
204KB
MD5d74652dd9f53728e29704a6457212fbb
SHA1197b7d1ae54f61923c082cb56d3c3a2edb8f38e3
SHA25647a343273373cea0dd3a4fdd6d1bf88e70f8e99d07e2b84be6a218a1b77f4351
SHA5126560dbbe2a5bff037846a1b46332cf974af2316e747699e07481cf7e64db844a7e1887e5fdac471eee149186a88b9cfe995f128f4493d96c3f1b79bb0d56f089
-
Filesize
204KB
MD570520bdd07be73b6974c00102d7d4a38
SHA13a677282b1975f13ff54ef6677f953c0291c88ae
SHA25616b3363e52bb24cae6ca288a9c538451ffdb1735dd42ddf8fff411d8eaa4af2c
SHA512bb1e73b247b106ae8097e47a91753246da3447c4dbe43fdf3bd6a9516847e6eb672bcfc7798f65e503727adebf9152cfab2a6ffbde7f8b43e3cadb0e17de59c3
-
Filesize
204KB
MD573e36c020ba0bfd814b2607376b54b1f
SHA1a06c580bb2a6b6ec62f8794be215224e35290987
SHA25646b69beb451c28b41317d5d63473229435afc829c632e4e0fc425c0ecf7ab85f
SHA512272f4cba71993588efb1fcb01ee4b41d6a138306bfb3d9db4f2eb66e07e787cd804d0748b6b8c5628142ebb9b605e60db5165a7c20590d1089bf468017b5263f
-
Filesize
204KB
MD52613801f049434d640ca73be4445cf23
SHA1a1d45f6ff33ad424e269bcc8ea5ee820467e0682
SHA256d379e977ee956773d0e21fda5dbeca2d6d74973f36bd3bbda229eae3afbf8888
SHA5125c84a7247f210f07244ef0ae7e10e4cb2ee2b07cce843ac0f2ca2b55f1ea1b036c08c7bef1a722f96becb0737998d124c04342aa2f7ec36df5792c45d318be5b
-
Filesize
204KB
MD5408a4187d2641746db4b010d76f1b0d5
SHA130fb214966c861faf4b78f7b8ed38d71eb9ccf09
SHA256f16f8163f64241af6cd618fd62475783c2b442c7f781125052cc1dce37322c03
SHA5121f02dd86ae7533589cbe5cb8a81bff7b10c1e75038ae3f0784b6cd3e9327e226502f5f51c7c150db2988d3e644cbb37c23f2b9fdece22a5691c7188697384e8c
-
Filesize
204KB
MD500a23b14c4978f37d1a85c19d185a641
SHA13caa8e6c762cf9e4271e80b4a4d66cba574575e8
SHA256e277401f5474f5e089b701b2886b0cac514979c1464b941222ab92d4bb0143b2
SHA512a2a6f5f167a2c2bf1b652d01e77c84879c39c430bf4e02c025798e351489bf0998a38015f3a00f9273332e97c5f798227c7ce50ed27a5de3449402819bcec28b
-
Filesize
204KB
MD597fcd12fb9bc2814905347a607a540f7
SHA1aeb53bf49c8474616a09466c429a15757ae1fd27
SHA256c260f8cde3e67a02a946162debee67beb27ed70670e9e79e34b80ccce2fe4d93
SHA512c3a49f16650f7de661a2964529a57b61c713cf7f9e7371f15ed25187e81457f1e47e42591a30491c8a8d2638fd153a2763a46fb0becaac80ddfa7b4f931c3c3f
-
Filesize
204KB
MD5eaf19dd0bb4ded4f5b47583df83d16c8
SHA1f6c37dfa7222cbc013d0a7179e98f9db385b5ce0
SHA256d10ea00a66710b2d1241309a78a064bab990a60ded65484f1c7a874d24433b41
SHA51286801e2951bb8d6613acb9d82f7fc9b4e21dfda5bc50a027d4355d1042a389721e2bde4c505f65a757a1ff582613ce6d560a353f64795f701b085546c0580cad
-
Filesize
204KB
MD5ecd302dd40aba9f29c329676c3f2670b
SHA1f85382d395191041ae4d8c238bbae5b22aa59eb8
SHA2562383395135f73c9c15f2d85a04cf3725b7107bf8e08710e98fb949a774a01999
SHA512a3cd5b4ffda8f9c34d20ec2bab707e771ea9074410f4093b451122b4212d3fdb9ac1ea7be6ea262d1cc239352c27dac1c7e23bc817268990bf42706be98347e1
-
Filesize
204KB
MD5912c57f936c56769b5adcded1412d429
SHA1d7cad48203d1371f244d31d2c2f867e56f075fdf
SHA25696c53875971bb7b094ec3c398548d1413213cb8c8912921548e33b5dd0b2a819
SHA5128f08bbd0460c63c1b6653de343298f7269675e2ccdb3f26979893e82787c07c91a648c95b43ab712a15342b779f1ea5d6e3aa724352aec0171de3ac356adc0c7