Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe
-
Size
180KB
-
MD5
3ecb98997e6967564b1d7f73cedb06c6
-
SHA1
bcc490265cfae2b57320288ec667f5e430d23a9a
-
SHA256
13b6dfe89177ed6631fdb5529854367728c35f6238e581e7e15a7f4ddd2f4c48
-
SHA512
e73271831df16e26a52ce4f260581feec5c162b8dc98dcd43de9ccf7982b538273f21ab4d6fb5aa7e35e783d87331f49b5fa137041f7a67b97344c2746c82fc5
-
SSDEEP
3072:jEGh0o5lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGHl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c0000000122ee-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x003700000001640f-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000122ee-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x003700000001650f-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e0000000122ee-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f0000000122ee-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00100000000122ee-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7DFA6820-86B4-477c-986F-5C6DE174CCC4}\stubpath = "C:\\Windows\\{7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe" {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D47C66E-840E-4c0c-92BD-0CFA11418CC3} {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{571D4766-CF35-4487-81F7-37549C943EDF}\stubpath = "C:\\Windows\\{571D4766-CF35-4487-81F7-37549C943EDF}.exe" {A5C32E2F-333D-4475-B627-3A73836324F3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E1FC529-E3AE-4b02-9165-F416D6A100BF} 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7DFA6820-86B4-477c-986F-5C6DE174CCC4} {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707} {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF5C63D8-F475-48dd-A73A-474E83ED1BDE} {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF5C63D8-F475-48dd-A73A-474E83ED1BDE}\stubpath = "C:\\Windows\\{CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe" {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0095DF1-3382-4344-AD3E-402D378210C5}\stubpath = "C:\\Windows\\{F0095DF1-3382-4344-AD3E-402D378210C5}.exe" {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37093803-C5FE-46ee-A0B8-4FF07AB78318}\stubpath = "C:\\Windows\\{37093803-C5FE-46ee-A0B8-4FF07AB78318}.exe" {F0095DF1-3382-4344-AD3E-402D378210C5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A5C32E2F-333D-4475-B627-3A73836324F3} {37093803-C5FE-46ee-A0B8-4FF07AB78318}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A5C32E2F-333D-4475-B627-3A73836324F3}\stubpath = "C:\\Windows\\{A5C32E2F-333D-4475-B627-3A73836324F3}.exe" {37093803-C5FE-46ee-A0B8-4FF07AB78318}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{571D4766-CF35-4487-81F7-37549C943EDF} {A5C32E2F-333D-4475-B627-3A73836324F3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37093803-C5FE-46ee-A0B8-4FF07AB78318} {F0095DF1-3382-4344-AD3E-402D378210C5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{300372D5-2D63-4ec4-BE00-2E15F5925547} {571D4766-CF35-4487-81F7-37549C943EDF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E1FC529-E3AE-4b02-9165-F416D6A100BF}\stubpath = "C:\\Windows\\{7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe" 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}\stubpath = "C:\\Windows\\{3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe" {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B37FE445-1F46-4376-8D29-FEEC9234E848} {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B37FE445-1F46-4376-8D29-FEEC9234E848}\stubpath = "C:\\Windows\\{B37FE445-1F46-4376-8D29-FEEC9234E848}.exe" {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D47C66E-840E-4c0c-92BD-0CFA11418CC3}\stubpath = "C:\\Windows\\{3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe" {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0095DF1-3382-4344-AD3E-402D378210C5} {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{300372D5-2D63-4ec4-BE00-2E15F5925547}\stubpath = "C:\\Windows\\{300372D5-2D63-4ec4-BE00-2E15F5925547}.exe" {571D4766-CF35-4487-81F7-37549C943EDF}.exe -
Deletes itself 1 IoCs
pid Process 2656 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2580 {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe 2588 {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe 2584 {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe 1572 {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe 1548 {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe 544 {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe 1944 {F0095DF1-3382-4344-AD3E-402D378210C5}.exe 876 {37093803-C5FE-46ee-A0B8-4FF07AB78318}.exe 2252 {A5C32E2F-333D-4475-B627-3A73836324F3}.exe 696 {571D4766-CF35-4487-81F7-37549C943EDF}.exe 2452 {300372D5-2D63-4ec4-BE00-2E15F5925547}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe File created C:\Windows\{B37FE445-1F46-4376-8D29-FEEC9234E848}.exe {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe File created C:\Windows\{F0095DF1-3382-4344-AD3E-402D378210C5}.exe {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe File created C:\Windows\{37093803-C5FE-46ee-A0B8-4FF07AB78318}.exe {F0095DF1-3382-4344-AD3E-402D378210C5}.exe File created C:\Windows\{A5C32E2F-333D-4475-B627-3A73836324F3}.exe {37093803-C5FE-46ee-A0B8-4FF07AB78318}.exe File created C:\Windows\{7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe File created C:\Windows\{7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe File created C:\Windows\{3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe File created C:\Windows\{3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe File created C:\Windows\{571D4766-CF35-4487-81F7-37549C943EDF}.exe {A5C32E2F-333D-4475-B627-3A73836324F3}.exe File created C:\Windows\{300372D5-2D63-4ec4-BE00-2E15F5925547}.exe {571D4766-CF35-4487-81F7-37549C943EDF}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2032 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe Token: SeIncBasePriorityPrivilege 2580 {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe Token: SeIncBasePriorityPrivilege 2588 {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe Token: SeIncBasePriorityPrivilege 2584 {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe Token: SeIncBasePriorityPrivilege 1572 {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe Token: SeIncBasePriorityPrivilege 1548 {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe Token: SeIncBasePriorityPrivilege 544 {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe Token: SeIncBasePriorityPrivilege 1944 {F0095DF1-3382-4344-AD3E-402D378210C5}.exe Token: SeIncBasePriorityPrivilege 876 {37093803-C5FE-46ee-A0B8-4FF07AB78318}.exe Token: SeIncBasePriorityPrivilege 2252 {A5C32E2F-333D-4475-B627-3A73836324F3}.exe Token: SeIncBasePriorityPrivilege 696 {571D4766-CF35-4487-81F7-37549C943EDF}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2580 2032 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe 28 PID 2032 wrote to memory of 2580 2032 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe 28 PID 2032 wrote to memory of 2580 2032 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe 28 PID 2032 wrote to memory of 2580 2032 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe 28 PID 2032 wrote to memory of 2656 2032 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe 29 PID 2032 wrote to memory of 2656 2032 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe 29 PID 2032 wrote to memory of 2656 2032 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe 29 PID 2032 wrote to memory of 2656 2032 2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe 29 PID 2580 wrote to memory of 2588 2580 {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe 30 PID 2580 wrote to memory of 2588 2580 {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe 30 PID 2580 wrote to memory of 2588 2580 {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe 30 PID 2580 wrote to memory of 2588 2580 {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe 30 PID 2580 wrote to memory of 2504 2580 {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe 31 PID 2580 wrote to memory of 2504 2580 {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe 31 PID 2580 wrote to memory of 2504 2580 {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe 31 PID 2580 wrote to memory of 2504 2580 {7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe 31 PID 2588 wrote to memory of 2584 2588 {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe 32 PID 2588 wrote to memory of 2584 2588 {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe 32 PID 2588 wrote to memory of 2584 2588 {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe 32 PID 2588 wrote to memory of 2584 2588 {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe 32 PID 2588 wrote to memory of 2468 2588 {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe 33 PID 2588 wrote to memory of 2468 2588 {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe 33 PID 2588 wrote to memory of 2468 2588 {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe 33 PID 2588 wrote to memory of 2468 2588 {7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe 33 PID 2584 wrote to memory of 1572 2584 {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe 36 PID 2584 wrote to memory of 1572 2584 {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe 36 PID 2584 wrote to memory of 1572 2584 {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe 36 PID 2584 wrote to memory of 1572 2584 {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe 36 PID 2584 wrote to memory of 1464 2584 {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe 37 PID 2584 wrote to memory of 1464 2584 {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe 37 PID 2584 wrote to memory of 1464 2584 {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe 37 PID 2584 wrote to memory of 1464 2584 {3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe 37 PID 1572 wrote to memory of 1548 1572 {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe 38 PID 1572 wrote to memory of 1548 1572 {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe 38 PID 1572 wrote to memory of 1548 1572 {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe 38 PID 1572 wrote to memory of 1548 1572 {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe 38 PID 1572 wrote to memory of 2768 1572 {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe 39 PID 1572 wrote to memory of 2768 1572 {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe 39 PID 1572 wrote to memory of 2768 1572 {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe 39 PID 1572 wrote to memory of 2768 1572 {CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe 39 PID 1548 wrote to memory of 544 1548 {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe 40 PID 1548 wrote to memory of 544 1548 {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe 40 PID 1548 wrote to memory of 544 1548 {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe 40 PID 1548 wrote to memory of 544 1548 {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe 40 PID 1548 wrote to memory of 324 1548 {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe 41 PID 1548 wrote to memory of 324 1548 {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe 41 PID 1548 wrote to memory of 324 1548 {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe 41 PID 1548 wrote to memory of 324 1548 {B37FE445-1F46-4376-8D29-FEEC9234E848}.exe 41 PID 544 wrote to memory of 1944 544 {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe 42 PID 544 wrote to memory of 1944 544 {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe 42 PID 544 wrote to memory of 1944 544 {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe 42 PID 544 wrote to memory of 1944 544 {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe 42 PID 544 wrote to memory of 2208 544 {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe 43 PID 544 wrote to memory of 2208 544 {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe 43 PID 544 wrote to memory of 2208 544 {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe 43 PID 544 wrote to memory of 2208 544 {3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe 43 PID 1944 wrote to memory of 876 1944 {F0095DF1-3382-4344-AD3E-402D378210C5}.exe 44 PID 1944 wrote to memory of 876 1944 {F0095DF1-3382-4344-AD3E-402D378210C5}.exe 44 PID 1944 wrote to memory of 876 1944 {F0095DF1-3382-4344-AD3E-402D378210C5}.exe 44 PID 1944 wrote to memory of 876 1944 {F0095DF1-3382-4344-AD3E-402D378210C5}.exe 44 PID 1944 wrote to memory of 2904 1944 {F0095DF1-3382-4344-AD3E-402D378210C5}.exe 45 PID 1944 wrote to memory of 2904 1944 {F0095DF1-3382-4344-AD3E-402D378210C5}.exe 45 PID 1944 wrote to memory of 2904 1944 {F0095DF1-3382-4344-AD3E-402D378210C5}.exe 45 PID 1944 wrote to memory of 2904 1944 {F0095DF1-3382-4344-AD3E-402D378210C5}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-25_3ecb98997e6967564b1d7f73cedb06c6_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\{7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exeC:\Windows\{7E1FC529-E3AE-4b02-9165-F416D6A100BF}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\{7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exeC:\Windows\{7DFA6820-86B4-477c-986F-5C6DE174CCC4}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\{3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exeC:\Windows\{3B9C3F2D-AC1D-4c2e-9BC0-391A2B998707}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\{CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exeC:\Windows\{CF5C63D8-F475-48dd-A73A-474E83ED1BDE}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\{B37FE445-1F46-4376-8D29-FEEC9234E848}.exeC:\Windows\{B37FE445-1F46-4376-8D29-FEEC9234E848}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\{3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exeC:\Windows\{3D47C66E-840E-4c0c-92BD-0CFA11418CC3}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\{F0095DF1-3382-4344-AD3E-402D378210C5}.exeC:\Windows\{F0095DF1-3382-4344-AD3E-402D378210C5}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\{37093803-C5FE-46ee-A0B8-4FF07AB78318}.exeC:\Windows\{37093803-C5FE-46ee-A0B8-4FF07AB78318}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:876 -
C:\Windows\{A5C32E2F-333D-4475-B627-3A73836324F3}.exeC:\Windows\{A5C32E2F-333D-4475-B627-3A73836324F3}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2252 -
C:\Windows\{571D4766-CF35-4487-81F7-37549C943EDF}.exeC:\Windows\{571D4766-CF35-4487-81F7-37549C943EDF}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:696 -
C:\Windows\{300372D5-2D63-4ec4-BE00-2E15F5925547}.exeC:\Windows\{300372D5-2D63-4ec4-BE00-2E15F5925547}.exe12⤵
- Executes dropped EXE
PID:2452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{571D4~1.EXE > nul12⤵PID:848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A5C32~1.EXE > nul11⤵PID:1028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37093~1.EXE > nul10⤵PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F0095~1.EXE > nul9⤵PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3D47C~1.EXE > nul8⤵PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B37FE~1.EXE > nul7⤵PID:324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CF5C6~1.EXE > nul6⤵PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3B9C3~1.EXE > nul5⤵PID:1464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7DFA6~1.EXE > nul4⤵PID:2468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E1FC~1.EXE > nul3⤵PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5f2be88bc842ce2246a7a1c7846eb29be
SHA1a4377fc868188238dcfacab7cff8333b32b8a11e
SHA2563a2dad26b80aa8cd388d0dda361a074bdd1f122eb17248f44ad58f53130ed02e
SHA512134062f9fd843e0b10e5fb1ecc082f1cbb624b848d73aa277764044b60535fb89434976f505d2e2617672db549bba8015f6463701785f8d7aa13a1a3d88b4009
-
Filesize
180KB
MD5dfec3a5fefbcb7c975289c1c0463cb2f
SHA10cf8946fdf178fe6f67826fe47b7d11ec60c4732
SHA256eb9697a10f07067fe0bf0e8810a9d1ccac3466200ab5263091896b0634e68712
SHA512fc87fad9f1a536bd4ab6747f56cdd7687f4f35381549166b549f711ab535bb7a77e5f652f88109e20879137a9be9e914d6dbc79e6f3d911114618ee49eed7a0d
-
Filesize
180KB
MD54ce3babdbe0212fba7aaa9836dbabad4
SHA10163080302ea86c66af97f42af200b5f8fcea817
SHA25681d630add1360d4d7874e2ef1c963441630f0559ff6f5c255ae1302999a0ed1c
SHA5123d58bc643efb0b2ffb50664ba9d0618cacd00e4753647fe2862bd3ffa328173b6ad9e10be6b7b89949c85dc5cae5733960b2a451ee6c141da71e2b7b2a8c0cb0
-
Filesize
180KB
MD51bfb90d9bdb6578b3803af27afb73df3
SHA1925a0d7cba5559cce428d5ac15d5345d229f9233
SHA256627fea05aa365a759fd598478c3dd50deadbdf8c5b33e4e7eb4cd199810dfa53
SHA51230edece4d881aa4481f27f25ff9c26c986f0717025c595685affbcdfc4aebcb33656dd4bfd89ea7a82a338cfd7afe9b137e56039dc90e8bbe18ae13402fd05de
-
Filesize
180KB
MD5aac07d434b63a95282cd71c9cf2f6209
SHA1f8ef79b0bbf2f9976c029d9326794499220c4526
SHA256180dfbffb2b1d6076d5f9f3f56a32dab2a6f86be3ebd24778459331ed9b188d5
SHA512d16ef0353b2298a8b2e9451068f28f41de18c18233c7059b257a4f64c8f2280703a7cb20f570fa67b1ad286d692858133f7fe8c7a045269eb2182f06dfb33523
-
Filesize
180KB
MD55a0936ca8ce55e73b899b29c273e8027
SHA1a3341534179308d350928f12c2a211ffbe02f945
SHA25610a49693b82c7fbbc22319ab82f6a181573db8f33b609ac9ffa94cc89cefee47
SHA5123ef84733661efab45334ef1f0c2d00408c3a04d1320e8cb6e516eb063f051003de8ea7ec8b111df35a4200551397e3b8d2a5a98c093cbe248ed9cd6ff8d3049c
-
Filesize
180KB
MD5230e42f4e06c41559d6224a29fe49938
SHA15c1e56c6647977acfb4f7467be6c89ea39ee2923
SHA2565d2fde6819064eaa53c01cde9b59a0f2219755504a6edb2ff51d9644211a9af1
SHA51202c108482d76423fcc7f54dfffe821118a5c978fcb3cd335c88a65e41295bd2d7e74c56e2ae6d898c3bbd4646a580d276d0227ba207743de8a9fcd123dc2757f
-
Filesize
180KB
MD558e3cf91e3f7c33df26752fdb8ae14d1
SHA149aa6679b57df36c96e16ed187bee06fa2ce5bb7
SHA25627845242b36e7e8bf2aa8f8c44cf30ac46f3bff544f2ed8251030e7e7f8fe184
SHA5126813278983121a904663ebd894c5cd87eb84f0da6f01032f2a13466c1b0a7895455737fc3e024807866ece2038c05460de17e0c4ccec7e34bc03a075cd19df27
-
Filesize
180KB
MD5260beba83e79e1f520caaedf7e553d3d
SHA139605f3e7655d3dc613ad6c64ca13db286ddc025
SHA25665078c4df2587c3ce030bb3e071466b169024b15c80e97975dc251f023f92144
SHA5126768155ff760e86d376e65d7beb1bc4949fe73ce6500318d692162514593d10a7a04a29180cce1f9773642ec74fdabff2d47ca00eacd2d50717a3437ae671eb4
-
Filesize
180KB
MD55cc6b8df2c6cef918fd78e086a855623
SHA1cc25b24f8c478571238ecc44710f302ddd7a6a8d
SHA256f74b27a235a3f20de0596fe8d51c102faa7d8aa587a3f89cb563ff593a6980df
SHA51227a5c0368f102625df016d2fabf720b2dacff723faa4fd7b849494510661af9b71b8996ecc277cf88935a08692e9668a5ae6a72ea10158391feb345966c2bc7d
-
Filesize
180KB
MD523cac6d2bd5ce9e731f957c3d6255f0b
SHA10f7a46a6b02a1e5b27bb212b416387f6645c8bdc
SHA2565a9f133c9e612082e0acf3eb0f26e4713b7067e596f36c908f73126959bba14d
SHA51297964bc1bb1cd6ca6b6c27469f33fb0beda1234ef37af499a93fcdefef17df496a5a09fc4867d0d75197cf65728fbba3b24091a7735f320c1552f3189bc9df91