Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 11:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe
-
Size
408KB
-
MD5
c9af3b9034cede8ad3f7a25aaa0932a9
-
SHA1
60e511859cf79847d4d3bd659ff092f1a6d6686a
-
SHA256
2a1df51a9805d1f7353ae8132c6aaf3c1b8ec56afc8898e76afaab8b593b753d
-
SHA512
a7aeb1d18605da928e0269b8501934cd24ed8651b381e72ba468a9ee508ede6c0d134d54424bf6a8af5f29d48a24d4d6faccce4853c7547ab0275c8344471ab9
-
SSDEEP
3072:CEGh0oel3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGMldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000a000000012280-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x001a000000016a8a-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000b000000012280-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000c000000012280-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000d000000012280-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e000000012280-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000a000000016c6f-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000f000000012280-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A28DBE3-5A05-44f6-B306-1C199E24E515} {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{40C39E72-E01E-4008-BED2-B5A351CAB0EF} {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{580CAB8F-59F1-4c03-8C48-C7424DC0A089} {B5117498-00C4-4522-A104-E65B63842C65}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{580CAB8F-59F1-4c03-8C48-C7424DC0A089}\stubpath = "C:\\Windows\\{580CAB8F-59F1-4c03-8C48-C7424DC0A089}.exe" {B5117498-00C4-4522-A104-E65B63842C65}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F277521-D65F-4aa8-A8EE-96B21BEF9492} {580CAB8F-59F1-4c03-8C48-C7424DC0A089}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A20AA0AD-03D0-4fc2-953A-4C6B6DD6B077} {8F277521-D65F-4aa8-A8EE-96B21BEF9492}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5117498-00C4-4522-A104-E65B63842C65} {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{40C39E72-E01E-4008-BED2-B5A351CAB0EF}\stubpath = "C:\\Windows\\{40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe" {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5117498-00C4-4522-A104-E65B63842C65}\stubpath = "C:\\Windows\\{B5117498-00C4-4522-A104-E65B63842C65}.exe" {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4A31304-9532-473c-8B45-B35DCA76B206} 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB} {A4A31304-9532-473c-8B45-B35DCA76B206}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{90C7555E-F8D5-41a8-BFF8-601C64ECFDCD} {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}\stubpath = "C:\\Windows\\{90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe" {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1D922A98-4688-4b49-8A48-306EFEE35B63} {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1D922A98-4688-4b49-8A48-306EFEE35B63}\stubpath = "C:\\Windows\\{1D922A98-4688-4b49-8A48-306EFEE35B63}.exe" {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F277521-D65F-4aa8-A8EE-96B21BEF9492}\stubpath = "C:\\Windows\\{8F277521-D65F-4aa8-A8EE-96B21BEF9492}.exe" {580CAB8F-59F1-4c03-8C48-C7424DC0A089}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4A31304-9532-473c-8B45-B35DCA76B206}\stubpath = "C:\\Windows\\{A4A31304-9532-473c-8B45-B35DCA76B206}.exe" 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}\stubpath = "C:\\Windows\\{71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe" {A4A31304-9532-473c-8B45-B35DCA76B206}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{74118C5B-9C94-4f51-8742-CA4E2A4E09BB} {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{74118C5B-9C94-4f51-8742-CA4E2A4E09BB}\stubpath = "C:\\Windows\\{74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe" {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A28DBE3-5A05-44f6-B306-1C199E24E515}\stubpath = "C:\\Windows\\{0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe" {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A20AA0AD-03D0-4fc2-953A-4C6B6DD6B077}\stubpath = "C:\\Windows\\{A20AA0AD-03D0-4fc2-953A-4C6B6DD6B077}.exe" {8F277521-D65F-4aa8-A8EE-96B21BEF9492}.exe -
Deletes itself 1 IoCs
pid Process 1728 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2476 {A4A31304-9532-473c-8B45-B35DCA76B206}.exe 3064 {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe 1972 {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe 2520 {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe 3024 {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe 1668 {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe 2192 {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe 264 {B5117498-00C4-4522-A104-E65B63842C65}.exe 844 {580CAB8F-59F1-4c03-8C48-C7424DC0A089}.exe 2732 {8F277521-D65F-4aa8-A8EE-96B21BEF9492}.exe 2340 {A20AA0AD-03D0-4fc2-953A-4C6B6DD6B077}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe File created C:\Windows\{A20AA0AD-03D0-4fc2-953A-4C6B6DD6B077}.exe {8F277521-D65F-4aa8-A8EE-96B21BEF9492}.exe File created C:\Windows\{580CAB8F-59F1-4c03-8C48-C7424DC0A089}.exe {B5117498-00C4-4522-A104-E65B63842C65}.exe File created C:\Windows\{A4A31304-9532-473c-8B45-B35DCA76B206}.exe 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe File created C:\Windows\{71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe {A4A31304-9532-473c-8B45-B35DCA76B206}.exe File created C:\Windows\{74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe File created C:\Windows\{0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe File created C:\Windows\{90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe File created C:\Windows\{1D922A98-4688-4b49-8A48-306EFEE35B63}.exe {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe File created C:\Windows\{B5117498-00C4-4522-A104-E65B63842C65}.exe {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe File created C:\Windows\{8F277521-D65F-4aa8-A8EE-96B21BEF9492}.exe {580CAB8F-59F1-4c03-8C48-C7424DC0A089}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1252 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe Token: SeIncBasePriorityPrivilege 2476 {A4A31304-9532-473c-8B45-B35DCA76B206}.exe Token: SeIncBasePriorityPrivilege 3064 {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe Token: SeIncBasePriorityPrivilege 1972 {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe Token: SeIncBasePriorityPrivilege 2520 {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe Token: SeIncBasePriorityPrivilege 3024 {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe Token: SeIncBasePriorityPrivilege 1668 {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe Token: SeIncBasePriorityPrivilege 2192 {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe Token: SeIncBasePriorityPrivilege 264 {B5117498-00C4-4522-A104-E65B63842C65}.exe Token: SeIncBasePriorityPrivilege 844 {580CAB8F-59F1-4c03-8C48-C7424DC0A089}.exe Token: SeIncBasePriorityPrivilege 2732 {8F277521-D65F-4aa8-A8EE-96B21BEF9492}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2476 1252 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe 28 PID 1252 wrote to memory of 2476 1252 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe 28 PID 1252 wrote to memory of 2476 1252 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe 28 PID 1252 wrote to memory of 2476 1252 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe 28 PID 1252 wrote to memory of 1728 1252 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe 29 PID 1252 wrote to memory of 1728 1252 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe 29 PID 1252 wrote to memory of 1728 1252 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe 29 PID 1252 wrote to memory of 1728 1252 2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe 29 PID 2476 wrote to memory of 3064 2476 {A4A31304-9532-473c-8B45-B35DCA76B206}.exe 30 PID 2476 wrote to memory of 3064 2476 {A4A31304-9532-473c-8B45-B35DCA76B206}.exe 30 PID 2476 wrote to memory of 3064 2476 {A4A31304-9532-473c-8B45-B35DCA76B206}.exe 30 PID 2476 wrote to memory of 3064 2476 {A4A31304-9532-473c-8B45-B35DCA76B206}.exe 30 PID 2476 wrote to memory of 2744 2476 {A4A31304-9532-473c-8B45-B35DCA76B206}.exe 31 PID 2476 wrote to memory of 2744 2476 {A4A31304-9532-473c-8B45-B35DCA76B206}.exe 31 PID 2476 wrote to memory of 2744 2476 {A4A31304-9532-473c-8B45-B35DCA76B206}.exe 31 PID 2476 wrote to memory of 2744 2476 {A4A31304-9532-473c-8B45-B35DCA76B206}.exe 31 PID 3064 wrote to memory of 1972 3064 {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe 32 PID 3064 wrote to memory of 1972 3064 {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe 32 PID 3064 wrote to memory of 1972 3064 {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe 32 PID 3064 wrote to memory of 1972 3064 {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe 32 PID 3064 wrote to memory of 3040 3064 {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe 33 PID 3064 wrote to memory of 3040 3064 {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe 33 PID 3064 wrote to memory of 3040 3064 {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe 33 PID 3064 wrote to memory of 3040 3064 {71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe 33 PID 1972 wrote to memory of 2520 1972 {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe 36 PID 1972 wrote to memory of 2520 1972 {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe 36 PID 1972 wrote to memory of 2520 1972 {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe 36 PID 1972 wrote to memory of 2520 1972 {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe 36 PID 1972 wrote to memory of 2580 1972 {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe 37 PID 1972 wrote to memory of 2580 1972 {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe 37 PID 1972 wrote to memory of 2580 1972 {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe 37 PID 1972 wrote to memory of 2580 1972 {74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe 37 PID 2520 wrote to memory of 3024 2520 {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe 38 PID 2520 wrote to memory of 3024 2520 {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe 38 PID 2520 wrote to memory of 3024 2520 {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe 38 PID 2520 wrote to memory of 3024 2520 {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe 38 PID 2520 wrote to memory of 1628 2520 {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe 39 PID 2520 wrote to memory of 1628 2520 {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe 39 PID 2520 wrote to memory of 1628 2520 {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe 39 PID 2520 wrote to memory of 1628 2520 {0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe 39 PID 3024 wrote to memory of 1668 3024 {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe 40 PID 3024 wrote to memory of 1668 3024 {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe 40 PID 3024 wrote to memory of 1668 3024 {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe 40 PID 3024 wrote to memory of 1668 3024 {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe 40 PID 3024 wrote to memory of 1028 3024 {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe 41 PID 3024 wrote to memory of 1028 3024 {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe 41 PID 3024 wrote to memory of 1028 3024 {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe 41 PID 3024 wrote to memory of 1028 3024 {90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe 41 PID 1668 wrote to memory of 2192 1668 {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe 42 PID 1668 wrote to memory of 2192 1668 {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe 42 PID 1668 wrote to memory of 2192 1668 {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe 42 PID 1668 wrote to memory of 2192 1668 {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe 42 PID 1668 wrote to memory of 2176 1668 {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe 43 PID 1668 wrote to memory of 2176 1668 {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe 43 PID 1668 wrote to memory of 2176 1668 {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe 43 PID 1668 wrote to memory of 2176 1668 {1D922A98-4688-4b49-8A48-306EFEE35B63}.exe 43 PID 2192 wrote to memory of 264 2192 {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe 44 PID 2192 wrote to memory of 264 2192 {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe 44 PID 2192 wrote to memory of 264 2192 {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe 44 PID 2192 wrote to memory of 264 2192 {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe 44 PID 2192 wrote to memory of 980 2192 {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe 45 PID 2192 wrote to memory of 980 2192 {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe 45 PID 2192 wrote to memory of 980 2192 {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe 45 PID 2192 wrote to memory of 980 2192 {40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-01_c9af3b9034cede8ad3f7a25aaa0932a9_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\{A4A31304-9532-473c-8B45-B35DCA76B206}.exeC:\Windows\{A4A31304-9532-473c-8B45-B35DCA76B206}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\{71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exeC:\Windows\{71CC0AEB-7CE6-47b0-95EB-A17CD97EC7EB}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\{74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exeC:\Windows\{74118C5B-9C94-4f51-8742-CA4E2A4E09BB}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\{0A28DBE3-5A05-44f6-B306-1C199E24E515}.exeC:\Windows\{0A28DBE3-5A05-44f6-B306-1C199E24E515}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\{90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exeC:\Windows\{90C7555E-F8D5-41a8-BFF8-601C64ECFDCD}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{1D922A98-4688-4b49-8A48-306EFEE35B63}.exeC:\Windows\{1D922A98-4688-4b49-8A48-306EFEE35B63}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\{40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exeC:\Windows\{40C39E72-E01E-4008-BED2-B5A351CAB0EF}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\{B5117498-00C4-4522-A104-E65B63842C65}.exeC:\Windows\{B5117498-00C4-4522-A104-E65B63842C65}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:264 -
C:\Windows\{580CAB8F-59F1-4c03-8C48-C7424DC0A089}.exeC:\Windows\{580CAB8F-59F1-4c03-8C48-C7424DC0A089}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:844 -
C:\Windows\{8F277521-D65F-4aa8-A8EE-96B21BEF9492}.exeC:\Windows\{8F277521-D65F-4aa8-A8EE-96B21BEF9492}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2732 -
C:\Windows\{A20AA0AD-03D0-4fc2-953A-4C6B6DD6B077}.exeC:\Windows\{A20AA0AD-03D0-4fc2-953A-4C6B6DD6B077}.exe12⤵
- Executes dropped EXE
PID:2340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F277~1.EXE > nul12⤵PID:1468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{580CA~1.EXE > nul11⤵PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5117~1.EXE > nul10⤵PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{40C39~1.EXE > nul9⤵PID:980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1D922~1.EXE > nul8⤵PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{90C75~1.EXE > nul7⤵PID:1028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0A28D~1.EXE > nul6⤵PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{74118~1.EXE > nul5⤵PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71CC0~1.EXE > nul4⤵PID:3040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A4A31~1.EXE > nul3⤵PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD58351997c1cc158e16a97600a15355028
SHA1de312b3bb7f05914316907f2d07d67d7cb170573
SHA256440e179ea7048cb327800484757af64795f619a3fa2b81cc1aef5d834d7a5af3
SHA51200c59d3bc5cf8ab4798731b3fb6f8253354b0919ab44137f1463ea2f0574c421d8a972b81ed3b994772bfd884cc582735031b2b48e638252a9ef41b45583b716
-
Filesize
408KB
MD5b09eb3413a802e71c6a9faa4596f4ca6
SHA1e3e8e8a8de53404f2c6a761d819f28edaf50122a
SHA256b84f644bdf569e05504b1724f1bb7329f7e767f4e781736aba649aa638cf21f9
SHA5127e8be1501d349cd976a6ec18d4350daf23974f46cf5ccc29db03e0504be03c76cfeef67bc1ea61f1a40f281b411bcfe21fd9651ddfd58f38bdf4b39f3a436cab
-
Filesize
408KB
MD5dd77fd6f501db8f65653b1d7e84e002f
SHA10f41f94298b177e5d9dc6d95ec074b6e7434621a
SHA2564d618465dddb2e35e974f3e8da9ef559372c762a5c3a1cdd24e4e83356d21d0c
SHA51262154adaa9370eab60dc31dc171a72f6bc95fbb1d82cbaa7738e47c991a74ce36a6c384e50061474b58600a1ff27ed37e154543601673e679ddf278fba0fdda4
-
Filesize
408KB
MD5e2399b1c36a47736c88269872e79362d
SHA1aabf203941d26630ed163393bd7642718a8350ae
SHA25650464fa9fba565de4ff2e0ad4a731fa4acc6daa9a4775568234cc1b439d0be0f
SHA512979d5f994cf3beedf63923f4729b7325941d299f16ec3a66d305a6f7536b7680cf52f1f9ea413104251fc2f6f64a78a9c4f7d7d8feb162daec6b6a250feac940
-
Filesize
408KB
MD5c6b4acaf7128725b8269f519db68f589
SHA1e9a04d964bff60e80baa4676c45bd1217c2de773
SHA256105d9f6b81c5da120f3afe4d8769c77497e7a2847853407526ca696d1a737416
SHA512738763d620ed6db7baf1178b8a8a44382e35da43834be7775b437e1ff6b928a758550baf23a58ca79bb83f48d54022fd436f454f1cb4e2e0af010aed45e39080
-
Filesize
408KB
MD5abf8ae672bd01617a9cad5d32cc0da35
SHA15dc0ba7dd5daf48a862b2153f03b93c6b84e87b5
SHA2568d84bbab77be15c813e644acceda5055a985b9b12a42baf7dcfdd838a137faab
SHA5124a922dd34e142acc9221712e2b6e05ef807d272aa9af9687f18e9097809ffdab1ef3935887c6fef1331ff07a7306e5efbf57716194ff2aba74d29c91750d6971
-
Filesize
408KB
MD5cce579daa44575fe3470bd30c927163f
SHA18d0bac4d800710577a1bd305e4ebc3cd24d346c9
SHA2563546bba2557e8f7ba8a71ef7ccecdad4a5df42f5e32ea0830a3b31140c56252d
SHA5123ba91aec15431121fe5aa0fc27d9d52449d249a5fe12d02a0e20e4c8b2b898ffd3d497bb834b14f0b0fb42e3d6659886128352770adeff683134d2b9c36d2a17
-
Filesize
408KB
MD5fae5ce13156fde520c78c0fadaa48791
SHA1a659709588a543eecb4fca492d04432a82476414
SHA256b28e77e0775af42d159f9ea0c9d8fc31a55c3510e0b8d002085ab14487a66d63
SHA512f519563b0f59afdbcffed8340b2c2e1d414e8fb6c072e80e7d4038ca61ce2f84c8ca513e6affe157d1e778987affeb83037a228d0f71e0ba2d107ca7a9a681b3
-
Filesize
408KB
MD51ad9e7af34cfa3bf8ff3fdb1e692f57d
SHA120025caeb0a803bff593c7fc9eea095307c46664
SHA25634d80cf945fc74efa48a7d1728fffe710f24799886362025be27cb13ecf0d9ee
SHA512b86ea389194400a24ca9a8cb46b2fe0a352757ab9b4bc92f37ad6071cdaf39d2ee7c5631c6acee53c92e58aa6de5ea9036b2238b62a64652c14f7fe365b4cd53
-
Filesize
408KB
MD572f054dc6289a499946c958c4e842d6d
SHA182ca109e6e9d1c886bb824c998c664c250d75147
SHA2562a8fe2cb281a27a0123528f642599e2597046571fc355c20a174a1c32e1474ee
SHA512a6f2c60237d7963413675f300123ea4497e0f7fdb8d8b66d4255cf891762f6fde9323527c8bf3e4595241b16c77193ed659fa3bdf3f6bb6bd62a98448de405bc
-
Filesize
408KB
MD50023f392177042fc82cf174a38f391b8
SHA112db6d7d6043d072212a7ce49874e8c015b94c3a
SHA256b7ea88a1100f109e02893537f6ca480bc7f3855493ff9605756cbc1110dd7b68
SHA512e2e6a517e7c28e97b74f0e74859a8ae11e5afbff58bb1608076210c9c96634c2fe8d4985f5b042f23e8c6851c7a969ea10660e91aa885a37a43e998e2a9348a6