Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/06/2024, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe
-
Size
180KB
-
MD5
89a13f46ca4dff7017918cab50c5ef8a
-
SHA1
27371619132c228b626eb84ce33acfd86c8387b9
-
SHA256
09b0afd19d6eca63059543a218f0dc5cd79e0dec501214ae5b6941b5706fdfc0
-
SHA512
999951ab6910b50b1ecaa26c0b73d1303c412ed3332d273cd86bdd951fa3f676db765c16dd139ee8a2b4c1cbd6efe83bcef59c16c7d18272413847b9c805570f
-
SSDEEP
3072:jEGh0o1lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGHl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c0000000141c0-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00090000000143ec-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d0000000141c0-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000900000001448a-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000005a59-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e0000000141c0-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000005a59-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f0000000141c0-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000005a59-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x00100000000141c0-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0009000000005a59-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E12FCEA8-5BB6-4db8-990F-D9A478711D13} {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{23497DCE-7D18-483b-991F-F4F0AABC62AA} {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{266E16C8-F58E-4d35-9411-20B702DA5A93}\stubpath = "C:\\Windows\\{266E16C8-F58E-4d35-9411-20B702DA5A93}.exe" {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{349DCDA8-F06F-427b-B01F-59121ADEC831} {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9B0695A-955E-4aa4-832C-4282DCFB6196}\stubpath = "C:\\Windows\\{B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe" {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4AA21FE7-BA02-4207-B512-FE35DD65DE8E} {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4AA21FE7-BA02-4207-B512-FE35DD65DE8E}\stubpath = "C:\\Windows\\{4AA21FE7-BA02-4207-B512-FE35DD65DE8E}.exe" {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DD6EA1F-013E-49cf-86F4-D46991D6D571} {4AA21FE7-BA02-4207-B512-FE35DD65DE8E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF} 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}\stubpath = "C:\\Windows\\{7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe" 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E12FCEA8-5BB6-4db8-990F-D9A478711D13}\stubpath = "C:\\Windows\\{E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe" {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5915F0AF-50EC-4ec7-8428-F7A9D9B299F4} {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA953496-BF35-486e-A8FB-ADA5EFF579C8}\stubpath = "C:\\Windows\\{FA953496-BF35-486e-A8FB-ADA5EFF579C8}.exe" {2DD6EA1F-013E-49cf-86F4-D46991D6D571}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{16383315-6FF7-41e5-BEE1-1057E6A5FB67}\stubpath = "C:\\Windows\\{16383315-6FF7-41e5-BEE1-1057E6A5FB67}.exe" {FA953496-BF35-486e-A8FB-ADA5EFF579C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}\stubpath = "C:\\Windows\\{5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe" {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DD6EA1F-013E-49cf-86F4-D46991D6D571}\stubpath = "C:\\Windows\\{2DD6EA1F-013E-49cf-86F4-D46991D6D571}.exe" {4AA21FE7-BA02-4207-B512-FE35DD65DE8E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA953496-BF35-486e-A8FB-ADA5EFF579C8} {2DD6EA1F-013E-49cf-86F4-D46991D6D571}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{23497DCE-7D18-483b-991F-F4F0AABC62AA}\stubpath = "C:\\Windows\\{23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe" {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{266E16C8-F58E-4d35-9411-20B702DA5A93} {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{349DCDA8-F06F-427b-B01F-59121ADEC831}\stubpath = "C:\\Windows\\{349DCDA8-F06F-427b-B01F-59121ADEC831}.exe" {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9B0695A-955E-4aa4-832C-4282DCFB6196} {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{16383315-6FF7-41e5-BEE1-1057E6A5FB67} {FA953496-BF35-486e-A8FB-ADA5EFF579C8}.exe -
Deletes itself 1 IoCs
pid Process 2416 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2224 {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe 2592 {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe 2752 {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe 2528 {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe 936 {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe 1688 {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe 2436 {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe 1524 {4AA21FE7-BA02-4207-B512-FE35DD65DE8E}.exe 2964 {2DD6EA1F-013E-49cf-86F4-D46991D6D571}.exe 2284 {FA953496-BF35-486e-A8FB-ADA5EFF579C8}.exe 1444 {16383315-6FF7-41e5-BEE1-1057E6A5FB67}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{16383315-6FF7-41e5-BEE1-1057E6A5FB67}.exe {FA953496-BF35-486e-A8FB-ADA5EFF579C8}.exe File created C:\Windows\{7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe File created C:\Windows\{266E16C8-F58E-4d35-9411-20B702DA5A93}.exe {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe File created C:\Windows\{349DCDA8-F06F-427b-B01F-59121ADEC831}.exe {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe File created C:\Windows\{B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe File created C:\Windows\{FA953496-BF35-486e-A8FB-ADA5EFF579C8}.exe {2DD6EA1F-013E-49cf-86F4-D46991D6D571}.exe File created C:\Windows\{E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe File created C:\Windows\{23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe File created C:\Windows\{5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe File created C:\Windows\{4AA21FE7-BA02-4207-B512-FE35DD65DE8E}.exe {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe File created C:\Windows\{2DD6EA1F-013E-49cf-86F4-D46991D6D571}.exe {4AA21FE7-BA02-4207-B512-FE35DD65DE8E}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2360 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe Token: SeIncBasePriorityPrivilege 2224 {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe Token: SeIncBasePriorityPrivilege 2592 {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe Token: SeIncBasePriorityPrivilege 2752 {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe Token: SeIncBasePriorityPrivilege 2528 {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe Token: SeIncBasePriorityPrivilege 936 {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe Token: SeIncBasePriorityPrivilege 1688 {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe Token: SeIncBasePriorityPrivilege 2436 {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe Token: SeIncBasePriorityPrivilege 1524 {4AA21FE7-BA02-4207-B512-FE35DD65DE8E}.exe Token: SeIncBasePriorityPrivilege 2964 {2DD6EA1F-013E-49cf-86F4-D46991D6D571}.exe Token: SeIncBasePriorityPrivilege 2284 {FA953496-BF35-486e-A8FB-ADA5EFF579C8}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2224 2360 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe 28 PID 2360 wrote to memory of 2224 2360 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe 28 PID 2360 wrote to memory of 2224 2360 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe 28 PID 2360 wrote to memory of 2224 2360 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe 28 PID 2360 wrote to memory of 2416 2360 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe 29 PID 2360 wrote to memory of 2416 2360 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe 29 PID 2360 wrote to memory of 2416 2360 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe 29 PID 2360 wrote to memory of 2416 2360 2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe 29 PID 2224 wrote to memory of 2592 2224 {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe 30 PID 2224 wrote to memory of 2592 2224 {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe 30 PID 2224 wrote to memory of 2592 2224 {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe 30 PID 2224 wrote to memory of 2592 2224 {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe 30 PID 2224 wrote to memory of 2656 2224 {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe 31 PID 2224 wrote to memory of 2656 2224 {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe 31 PID 2224 wrote to memory of 2656 2224 {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe 31 PID 2224 wrote to memory of 2656 2224 {7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe 31 PID 2592 wrote to memory of 2752 2592 {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe 32 PID 2592 wrote to memory of 2752 2592 {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe 32 PID 2592 wrote to memory of 2752 2592 {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe 32 PID 2592 wrote to memory of 2752 2592 {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe 32 PID 2592 wrote to memory of 2740 2592 {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe 33 PID 2592 wrote to memory of 2740 2592 {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe 33 PID 2592 wrote to memory of 2740 2592 {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe 33 PID 2592 wrote to memory of 2740 2592 {E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe 33 PID 2752 wrote to memory of 2528 2752 {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe 36 PID 2752 wrote to memory of 2528 2752 {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe 36 PID 2752 wrote to memory of 2528 2752 {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe 36 PID 2752 wrote to memory of 2528 2752 {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe 36 PID 2752 wrote to memory of 2492 2752 {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe 37 PID 2752 wrote to memory of 2492 2752 {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe 37 PID 2752 wrote to memory of 2492 2752 {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe 37 PID 2752 wrote to memory of 2492 2752 {23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe 37 PID 2528 wrote to memory of 936 2528 {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe 38 PID 2528 wrote to memory of 936 2528 {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe 38 PID 2528 wrote to memory of 936 2528 {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe 38 PID 2528 wrote to memory of 936 2528 {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe 38 PID 2528 wrote to memory of 2672 2528 {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe 39 PID 2528 wrote to memory of 2672 2528 {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe 39 PID 2528 wrote to memory of 2672 2528 {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe 39 PID 2528 wrote to memory of 2672 2528 {266E16C8-F58E-4d35-9411-20B702DA5A93}.exe 39 PID 936 wrote to memory of 1688 936 {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe 40 PID 936 wrote to memory of 1688 936 {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe 40 PID 936 wrote to memory of 1688 936 {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe 40 PID 936 wrote to memory of 1688 936 {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe 40 PID 936 wrote to memory of 1312 936 {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe 41 PID 936 wrote to memory of 1312 936 {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe 41 PID 936 wrote to memory of 1312 936 {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe 41 PID 936 wrote to memory of 1312 936 {5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe 41 PID 1688 wrote to memory of 2436 1688 {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe 42 PID 1688 wrote to memory of 2436 1688 {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe 42 PID 1688 wrote to memory of 2436 1688 {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe 42 PID 1688 wrote to memory of 2436 1688 {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe 42 PID 1688 wrote to memory of 2780 1688 {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe 43 PID 1688 wrote to memory of 2780 1688 {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe 43 PID 1688 wrote to memory of 2780 1688 {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe 43 PID 1688 wrote to memory of 2780 1688 {349DCDA8-F06F-427b-B01F-59121ADEC831}.exe 43 PID 2436 wrote to memory of 1524 2436 {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe 44 PID 2436 wrote to memory of 1524 2436 {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe 44 PID 2436 wrote to memory of 1524 2436 {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe 44 PID 2436 wrote to memory of 1524 2436 {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe 44 PID 2436 wrote to memory of 1628 2436 {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe 45 PID 2436 wrote to memory of 1628 2436 {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe 45 PID 2436 wrote to memory of 1628 2436 {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe 45 PID 2436 wrote to memory of 1628 2436 {B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-30_89a13f46ca4dff7017918cab50c5ef8a_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\{7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exeC:\Windows\{7E9E09C4-3C19-4263-AAC6-8DDDC75AC4EF}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\{E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exeC:\Windows\{E12FCEA8-5BB6-4db8-990F-D9A478711D13}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\{23497DCE-7D18-483b-991F-F4F0AABC62AA}.exeC:\Windows\{23497DCE-7D18-483b-991F-F4F0AABC62AA}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\{266E16C8-F58E-4d35-9411-20B702DA5A93}.exeC:\Windows\{266E16C8-F58E-4d35-9411-20B702DA5A93}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\{5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exeC:\Windows\{5915F0AF-50EC-4ec7-8428-F7A9D9B299F4}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\{349DCDA8-F06F-427b-B01F-59121ADEC831}.exeC:\Windows\{349DCDA8-F06F-427b-B01F-59121ADEC831}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\{B9B0695A-955E-4aa4-832C-4282DCFB6196}.exeC:\Windows\{B9B0695A-955E-4aa4-832C-4282DCFB6196}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\{4AA21FE7-BA02-4207-B512-FE35DD65DE8E}.exeC:\Windows\{4AA21FE7-BA02-4207-B512-FE35DD65DE8E}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Windows\{2DD6EA1F-013E-49cf-86F4-D46991D6D571}.exeC:\Windows\{2DD6EA1F-013E-49cf-86F4-D46991D6D571}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Windows\{FA953496-BF35-486e-A8FB-ADA5EFF579C8}.exeC:\Windows\{FA953496-BF35-486e-A8FB-ADA5EFF579C8}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\{16383315-6FF7-41e5-BEE1-1057E6A5FB67}.exeC:\Windows\{16383315-6FF7-41e5-BEE1-1057E6A5FB67}.exe12⤵
- Executes dropped EXE
PID:1444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FA953~1.EXE > nul12⤵PID:1424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2DD6E~1.EXE > nul11⤵PID:696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4AA21~1.EXE > nul10⤵PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B9B06~1.EXE > nul9⤵PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{349DC~1.EXE > nul8⤵PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5915F~1.EXE > nul7⤵PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{266E1~1.EXE > nul6⤵PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{23497~1.EXE > nul5⤵PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E12FC~1.EXE > nul4⤵PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E9E0~1.EXE > nul3⤵PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD52405cea7dd82977cea535e1c1d39fbff
SHA14c3d5c1e1ea3d1234394d895433039984277ae07
SHA25642a6a304e3080b311a4a55e9a578b6842b6af019c9e3f8810f5298872392f73e
SHA5129a271104ad6207bc878bc5646d3711bedd620b872e660d2d297bfba45fb359ebd8d6313fe904020193d7481c83c6c3227ad3839e6dc8e60b109ba66e51c659d4
-
Filesize
180KB
MD57053d6b372fbecc146728ac2ee11ea2e
SHA1bbb9b05ec05478f2fb49fd7786b3afcaba04a607
SHA256b69203e8ce434a949abade6cacc1cdb01bbe8f477510094f7b14c2544a408886
SHA5122c7de7bc1bbf92a709b2b4d9376fa97a7bda79c58cc88d811f4df7405fe9889ad44524cdeee6da48f7c0042ba8aae0b8738f313dc460652d40345bd8851c2ad6
-
Filesize
180KB
MD5e91039408c06a5e070671bab0acaa6c6
SHA177c61ff93c4fa1d4c05a75e150f017c5e75d427e
SHA25615f4d64ef338110b22b34244e521b990101bd0912c11dcd955dc38b8abec508f
SHA5123be770918d51c63e6f3f8be92b0dc258eb12d5367a15a8d4651b4b82578cc31046f4f83e0244c15fc3bbcb47277fa892c75debe70d4ce3a91aa55da03e88be9d
-
Filesize
180KB
MD57353d4d53ec440f5dc3b8b4e2c0cec51
SHA12124541458b8897f05b66f0368c9d2fef7b5dc9b
SHA2562111a8fb8983aba1500ad81f79914ed7cc0a9ecf779a660d9b1146708d1c4bd9
SHA512ab7757caa379065dbca3b0bf459b199f18f825bde52c6194cdd0702eeca2c80dbe7126f3adcf1cb91284fae7046624d218f1be95c4d47622be9a974c32889348
-
Filesize
180KB
MD57b6145a851a953f1919df3e55ac19d02
SHA15055f33190d6c7b521a6962ad72e804fa29cd61d
SHA256bf684557803d894f861dceea38a494a65b4d3772cc0f1c282bc63702999ae6ca
SHA512b5416c5196d75b8f7c9d83d232a4b0f086b9a594d69dc03af52cab46c32ff22c97985974f500f393ee28e2780c196c13be02766b4835581b7062bbfa7af6abff
-
Filesize
180KB
MD55f9f4c47da64efc4c6ee6581bf1ae087
SHA124dc3f67b3db4398a30e4caa2b709ca490c3bc0f
SHA25671fc82ef42475a48e106ab02593d8c4d754d614ca621b62b15eee4c023394c2c
SHA512eed6eb66b76b05fd907bc45d20bf9ee584c50cee847afd636b0c3afd3551e58b6a57320c98a342c052cab7d96904c60217bb6e651206a4c93512ff9714b2affa
-
Filesize
180KB
MD553da3e50cce0c2b51cad74472817f657
SHA182b81bd71facc5f42a42a387f7106974a7eb95a0
SHA256b94945094bdba091d96f6158bf593fec483654257a23eb6be2e6b0c64b519ae6
SHA5122543e84cb67cdd6daea3d598f9a63079a42ed3f9a72f449086f126dfa782bde2488ef2469ea0adff3e309dff730a5a85a20f7262a7ddd78a4a70198aa01a5ebf
-
Filesize
180KB
MD50f201a4e6f8a435f6aac18f6160c9521
SHA1fd0052b2f0c7125bf62f34d91e9fcd5039ef7150
SHA256a9e4f8e1d6719a329e728445c9bc82d287cc51de9bfc46a936e2f7bf880f32f1
SHA512016003f8f6397c122f9ef26e6a874a396a21e24912eafddae4f0ebd2319bd27ec27db2d7b27cb59fc419f4d861d0ead7c86a18cb7adcd3cae935e7b6202ad3f6
-
Filesize
180KB
MD5e6dba7cf6194355e89c094ead9c5720c
SHA1cd26ec7168ac06303b2afabd0738a39ee75db566
SHA25653d5da5db264bf62ab96b3d40b5546c30b50008a7358c401ab90e1f019ae8a89
SHA5126ba6255657d4c67eb3c97b7fc474dfc19ae5a6bc1ff8a5cc2b0cd2296710d1bbf1cc885869abb90d6257dce8e0e378197b2774731cd807c8057cd4ca45e9e40e
-
Filesize
180KB
MD5b72ddf607051f905d1c26946f341bde9
SHA18a2fc3e38eb4dd26cbe243a85519d14fa777339d
SHA2563f462093ca95681c29b348db6f5239a4a87a78c2395b3c6e87e696039171b217
SHA51266d818ece8c706c2f3d3f795565a17b53a1a61cb52e4f2e1edbcc588f2622fb98e1b248dae4c44e5d5f2cfe0fc09dd5cf6d6df02ad6891a11e06df603b9d304d
-
Filesize
180KB
MD5bb86149a72068de22e8a414190918ab6
SHA14dc145e1420e997da1c65a434ecd1a262ad080a5
SHA25668e006d79e06fe6c109d981836838f625efa903c4628a6984a3022bd11d13ad4
SHA512c808905c3bac84fa6711a15adb4bc49cabd0c9760c5feff031d242ae05969ca3bbaf73252c573c9fe3053859a280cc8b4ff5e74bbf14f6bd4465b2f7e90d6d38