Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe
-
Size
216KB
-
MD5
9d1fe7d17517bd7369f642e839235c31
-
SHA1
781bdaa49ba7f4629cdf00251be01b2c35c4b27f
-
SHA256
0867ba00b210a2b2e44f258f9b8fb43a4fb44ca59e0fa3c0c29ebd412c2895ce
-
SHA512
85b1f3257671ed384421b9a960722dbd3217191fd1fdbb6441699e382505197ae650fe03892d47eb7992b3d7ec5673772652cf3f0e2a752b5f9ee3e33c741417
-
SSDEEP
3072:jEGh0oEl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGGlEeKcAEcGy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}\stubpath = "C:\\Windows\\{C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe" {948956D8-E935-428b-9274-DED021B62FDB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{905E0B7F-29EE-4949-84E1-701235E247E0}\stubpath = "C:\\Windows\\{905E0B7F-29EE-4949-84E1-701235E247E0}.exe" {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5239B356-5775-4cf7-9B86-11C2CE5E1894}\stubpath = "C:\\Windows\\{5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe" 2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DCEDF1AC-194B-4b60-A629-AD731063EAEA}\stubpath = "C:\\Windows\\{DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe" {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD27FBC6-DDA4-484a-AFF4-89868DA2A061}\stubpath = "C:\\Windows\\{CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe" {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{95BA367D-152F-459a-B4D7-D31658381145}\stubpath = "C:\\Windows\\{95BA367D-152F-459a-B4D7-D31658381145}.exe" {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{948956D8-E935-428b-9274-DED021B62FDB} {95BA367D-152F-459a-B4D7-D31658381145}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C5D77862-0BB3-41b1-AC52-07FE15B1CE3F} {948956D8-E935-428b-9274-DED021B62FDB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F9967C80-ED98-4d4f-8961-F0E614F0FC0D} {905E0B7F-29EE-4949-84E1-701235E247E0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD27FBC6-DDA4-484a-AFF4-89868DA2A061} {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F755348-6794-48d7-97C3-C65CBB3A8ECA}\stubpath = "C:\\Windows\\{4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe" {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{948956D8-E935-428b-9274-DED021B62FDB}\stubpath = "C:\\Windows\\{948956D8-E935-428b-9274-DED021B62FDB}.exe" {95BA367D-152F-459a-B4D7-D31658381145}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1C40F88-D9C4-4d56-862D-D8D83227267D} {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DCEDF1AC-194B-4b60-A629-AD731063EAEA} {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{905E0B7F-29EE-4949-84E1-701235E247E0} {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F9967C80-ED98-4d4f-8961-F0E614F0FC0D}\stubpath = "C:\\Windows\\{F9967C80-ED98-4d4f-8961-F0E614F0FC0D}.exe" {905E0B7F-29EE-4949-84E1-701235E247E0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5239B356-5775-4cf7-9B86-11C2CE5E1894} 2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E4331B1-A65C-4a41-B18C-0A6952DC87DD} {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E4331B1-A65C-4a41-B18C-0A6952DC87DD}\stubpath = "C:\\Windows\\{8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe" {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F755348-6794-48d7-97C3-C65CBB3A8ECA} {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{95BA367D-152F-459a-B4D7-D31658381145} {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1C40F88-D9C4-4d56-862D-D8D83227267D}\stubpath = "C:\\Windows\\{E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe" {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe -
Executes dropped EXE 10 IoCs
pid Process 4908 {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe 2656 {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe 3176 {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe 4928 {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe 5076 {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe 1796 {95BA367D-152F-459a-B4D7-D31658381145}.exe 1272 {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe 384 {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe 4912 {905E0B7F-29EE-4949-84E1-701235E247E0}.exe 2216 {F9967C80-ED98-4d4f-8961-F0E614F0FC0D}.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\{8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe File created C:\Windows\{CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe File created C:\Windows\{4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe File created C:\Windows\{95BA367D-152F-459a-B4D7-D31658381145}.exe {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe File created C:\Windows\{C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe {948956D8-E935-428b-9274-DED021B62FDB}.exe File created C:\Windows\{E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe File created C:\Windows\{F9967C80-ED98-4d4f-8961-F0E614F0FC0D}.exe {905E0B7F-29EE-4949-84E1-701235E247E0}.exe File created C:\Windows\{DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe File created C:\Windows\{905E0B7F-29EE-4949-84E1-701235E247E0}.exe {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe File created C:\Windows\{5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe 2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2220 2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe Token: SeIncBasePriorityPrivilege 4908 {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe Token: SeIncBasePriorityPrivilege 2656 {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe Token: SeIncBasePriorityPrivilege 3176 {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe Token: SeIncBasePriorityPrivilege 4928 {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe Token: SeIncBasePriorityPrivilege 5076 {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe Token: SeIncBasePriorityPrivilege 1224 {948956D8-E935-428b-9274-DED021B62FDB}.exe Token: SeIncBasePriorityPrivilege 1272 {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe Token: SeIncBasePriorityPrivilege 384 {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe Token: SeIncBasePriorityPrivilege 4912 {905E0B7F-29EE-4949-84E1-701235E247E0}.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4908 2220 2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe 94 PID 2220 wrote to memory of 4908 2220 2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe 94 PID 2220 wrote to memory of 4908 2220 2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe 94 PID 2220 wrote to memory of 1272 2220 2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe 95 PID 2220 wrote to memory of 1272 2220 2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe 95 PID 2220 wrote to memory of 1272 2220 2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe 95 PID 4908 wrote to memory of 2656 4908 {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe 100 PID 4908 wrote to memory of 2656 4908 {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe 100 PID 4908 wrote to memory of 2656 4908 {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe 100 PID 4908 wrote to memory of 2628 4908 {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe 101 PID 4908 wrote to memory of 2628 4908 {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe 101 PID 4908 wrote to memory of 2628 4908 {5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe 101 PID 2656 wrote to memory of 3176 2656 {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe 103 PID 2656 wrote to memory of 3176 2656 {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe 103 PID 2656 wrote to memory of 3176 2656 {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe 103 PID 2656 wrote to memory of 4620 2656 {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe 104 PID 2656 wrote to memory of 4620 2656 {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe 104 PID 2656 wrote to memory of 4620 2656 {DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe 104 PID 3176 wrote to memory of 4928 3176 {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe 106 PID 3176 wrote to memory of 4928 3176 {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe 106 PID 3176 wrote to memory of 4928 3176 {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe 106 PID 3176 wrote to memory of 3524 3176 {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe 107 PID 3176 wrote to memory of 3524 3176 {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe 107 PID 3176 wrote to memory of 3524 3176 {8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe 107 PID 4928 wrote to memory of 5076 4928 {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe 108 PID 4928 wrote to memory of 5076 4928 {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe 108 PID 4928 wrote to memory of 5076 4928 {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe 108 PID 4928 wrote to memory of 2016 4928 {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe 109 PID 4928 wrote to memory of 2016 4928 {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe 109 PID 4928 wrote to memory of 2016 4928 {CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe 109 PID 5076 wrote to memory of 1796 5076 {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe 110 PID 5076 wrote to memory of 1796 5076 {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe 110 PID 5076 wrote to memory of 1796 5076 {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe 110 PID 5076 wrote to memory of 4348 5076 {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe 111 PID 5076 wrote to memory of 4348 5076 {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe 111 PID 5076 wrote to memory of 4348 5076 {4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe 111 PID 1224 wrote to memory of 1272 1224 {948956D8-E935-428b-9274-DED021B62FDB}.exe 114 PID 1224 wrote to memory of 1272 1224 {948956D8-E935-428b-9274-DED021B62FDB}.exe 114 PID 1224 wrote to memory of 1272 1224 {948956D8-E935-428b-9274-DED021B62FDB}.exe 114 PID 1224 wrote to memory of 860 1224 {948956D8-E935-428b-9274-DED021B62FDB}.exe 115 PID 1224 wrote to memory of 860 1224 {948956D8-E935-428b-9274-DED021B62FDB}.exe 115 PID 1224 wrote to memory of 860 1224 {948956D8-E935-428b-9274-DED021B62FDB}.exe 115 PID 1272 wrote to memory of 384 1272 {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe 116 PID 1272 wrote to memory of 384 1272 {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe 116 PID 1272 wrote to memory of 384 1272 {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe 116 PID 1272 wrote to memory of 3172 1272 {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe 117 PID 1272 wrote to memory of 3172 1272 {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe 117 PID 1272 wrote to memory of 3172 1272 {C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe 117 PID 384 wrote to memory of 4912 384 {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe 118 PID 384 wrote to memory of 4912 384 {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe 118 PID 384 wrote to memory of 4912 384 {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe 118 PID 384 wrote to memory of 1332 384 {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe 119 PID 384 wrote to memory of 1332 384 {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe 119 PID 384 wrote to memory of 1332 384 {E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe 119 PID 4912 wrote to memory of 2216 4912 {905E0B7F-29EE-4949-84E1-701235E247E0}.exe 120 PID 4912 wrote to memory of 2216 4912 {905E0B7F-29EE-4949-84E1-701235E247E0}.exe 120 PID 4912 wrote to memory of 2216 4912 {905E0B7F-29EE-4949-84E1-701235E247E0}.exe 120 PID 4912 wrote to memory of 3016 4912 {905E0B7F-29EE-4949-84E1-701235E247E0}.exe 121 PID 4912 wrote to memory of 3016 4912 {905E0B7F-29EE-4949-84E1-701235E247E0}.exe 121 PID 4912 wrote to memory of 3016 4912 {905E0B7F-29EE-4949-84E1-701235E247E0}.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-01_9d1fe7d17517bd7369f642e839235c31_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\{5239B356-5775-4cf7-9B86-11C2CE5E1894}.exeC:\Windows\{5239B356-5775-4cf7-9B86-11C2CE5E1894}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\{DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exeC:\Windows\{DCEDF1AC-194B-4b60-A629-AD731063EAEA}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\{8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exeC:\Windows\{8E4331B1-A65C-4a41-B18C-0A6952DC87DD}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\{CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exeC:\Windows\{CD27FBC6-DDA4-484a-AFF4-89868DA2A061}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\{4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exeC:\Windows\{4F755348-6794-48d7-97C3-C65CBB3A8ECA}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\{95BA367D-152F-459a-B4D7-D31658381145}.exeC:\Windows\{95BA367D-152F-459a-B4D7-D31658381145}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
PID:1796 -
C:\Windows\{948956D8-E935-428b-9274-DED021B62FDB}.exeC:\Windows\{948956D8-E935-428b-9274-DED021B62FDB}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\{C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exeC:\Windows\{C5D77862-0BB3-41b1-AC52-07FE15B1CE3F}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\{E1C40F88-D9C4-4d56-862D-D8D83227267D}.exeC:\Windows\{E1C40F88-D9C4-4d56-862D-D8D83227267D}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\{905E0B7F-29EE-4949-84E1-701235E247E0}.exeC:\Windows\{905E0B7F-29EE-4949-84E1-701235E247E0}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\{F9967C80-ED98-4d4f-8961-F0E614F0FC0D}.exeC:\Windows\{F9967C80-ED98-4d4f-8961-F0E614F0FC0D}.exe12⤵
- Executes dropped EXE
PID:2216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{905E0~1.EXE > nul12⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1C40~1.EXE > nul11⤵PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C5D77~1.EXE > nul10⤵PID:3172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{94895~1.EXE > nul9⤵PID:860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{95BA3~1.EXE > nul8⤵PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4F755~1.EXE > nul7⤵PID:4348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CD27F~1.EXE > nul6⤵PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E433~1.EXE > nul5⤵PID:3524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DCEDF~1.EXE > nul4⤵PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5239B~1.EXE > nul3⤵PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5284c1d889fc5263e97d6f86a94d6b60f
SHA14a3890468daab87035fbe4a364412c289948a934
SHA256e8d6aef2af055f56efc19794209cc885b1e1b19db47a06d64992d9fa9500685c
SHA512a25524fd59639a9caeabe0256e648ba6c1785b5827d4591eb514db530a81c17e7790b7fd8b12adec191a960f907d60b6b6b187dd8a22bec38285a3d1f05a3e41
-
Filesize
216KB
MD5d5725a6ed4b958962dd489d471be7e99
SHA18abd5b398f911ca80412c833d3e32bedee002179
SHA256d9458909ee5c71eaea70b88866cb494531d946aff413730e8948096358b3b190
SHA51285ff959a30ca7c7281fd55303633e4d75dca133e67eb1766da2b78f8dbe27c8f7aa510c47c2d42fb7acf3313c8904fa3a1332bbfc30ed1ac5275b9cc1b753266
-
Filesize
216KB
MD527a646569f113b727c1520b103a1584a
SHA1d4b509b780d5a1a55c7f23913627cf22d1fb52bc
SHA2568f2e466e0b422f6382180a5d5463dc0437c0822e95220d0fa04efbb61da664cb
SHA51207a8e7755f77fc3898accd38e68d8957e4ed849cf6c302fce7091a859ce9788bdda5306289e7a5b496d911d7c48366ee41530a16d61d5575eb942ddb12a50f8d
-
Filesize
216KB
MD543400db13ecc0144f62f8b65b81dbaad
SHA1415c93833ffd63899815d2b9cbb833f69340db1c
SHA256e278f70ffeac20abe653ceabfa1433e45477891dc98c0b7fb5e853a324de4ebd
SHA5129d73cf0165f333cd5838896ecc491d6b51010ecd907d08464af8da321111cfdf22437bf573e311a64481a7dc763efd3b6b954630b9a848fc1530bc075bc56650
-
Filesize
216KB
MD5b3f84a02e0e92563f4fdd505c32735c3
SHA156e8699aa9b14b0e39aa8e90aa861f9ff3fd8934
SHA256a2490675dfc7dc873190687fe801619d5b07a0570fd38e990166238721b1c5cc
SHA512e8121d3c6fe3fa9c3d83fde4a4ddc56aa06ab5302209f63c8e96c8d6e70472366432bc43035f39c6069a907dc338e68a96b8077fc7834df41bd6d1c5d971b595
-
Filesize
216KB
MD58dbc9bf57f78bf8248cc80cbb2d21006
SHA1b72d07fd28c57bb78a5744bd8aed3914ab86e305
SHA2562886d556580eb304c03365205645a8592bd1f84131c1b598de93d4fcbbb01f12
SHA5122c3f88e61e4f98d58afdf076eb15bbd3761587fe4f745739d4e07e2eef4c1881c6c046dcc5abf5e0744645da829e790186f0db3ad3c2e2379c0e0a5e1521d827
-
Filesize
216KB
MD5dd43603f164da13c2acc98d281a0fbc9
SHA1d7c085b8c438400a6cad66a69b6beec704ced005
SHA256b1cb07a3a7d206666972f1e1ec471fd1fead5d93498f6dc723d94cd0bb38ffca
SHA512901114f0a09bd09cdc2b22d4e3be35c2dfb7e946731056873a2b44526d0024892460a73614780a5f56fbf878c9f1aea9052042409972e6e4a29c28c9945b3b26
-
Filesize
216KB
MD5530055f037bac9c76ab8fc6c92d2c958
SHA1dc2b64cea9714eb86131fad2a99a478827f50581
SHA256c8f2690c52b0cc22b5265bc4009c78e6efa22d07b32a6519096daa0e6f725689
SHA5120085ce4063a2f86835288b6253c9187d5491e3292db0287a1ab893f2958f33fc67cf8657bc991ed08450181530b01ac8b803dcb03a36ef9d080e90c627eac4f2
-
Filesize
216KB
MD512dcf55484e15d397309185479b0f0e7
SHA1c758f27e50719c795d9a2493393283caada28cba
SHA25694c9891a8470078bfff563dda2a185a91a9dce19c703306ff271ab7b41127260
SHA5127307eeebb8d9f44da94295b256c9593cf1e9931eeeeba225ca49bbc2155cf601114343746277c1db545781f12e0003b4b14eac994a996a3a6de528947a08a79c
-
Filesize
216KB
MD592b192234e8ab3994f8157c1fed5d89d
SHA1299c3cfc5dbe4a64d5bba9c9bf14ff241c77423d
SHA25648af58fd53fdc25d32967dd7c3068ba05f4e0b35dca776350540d40170e8c2da
SHA512d0b725807ee26552e232037df605018c024d50c5768d25b1c5c3cc057e2d31600c12f9bd762fb9d0beba788c2fb9c93352b3551864d0d7b38088eacf87762ed4