Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe
-
Size
408KB
-
MD5
d347e93647fb0cb41a7b5329aadc8f5d
-
SHA1
15c6ff6cb2b501e94ad995e790317385ddb23fe9
-
SHA256
ac91611cfd6272234d9750476dfeb8bee0476762ce67df1b5c77d78e845e107a
-
SHA512
fbde6a557a60d8b32c80585914ce9ea64ae1d2b349781db7db3399f3857afe9f7822136d1c74b05d13bb30a99bf2ab97050680d3ef4638af2d335e836d07e713
-
SSDEEP
3072:CEGh0oDl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEG9ldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF} {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C7B25855-07D0-4e67-BC12-D6033C9DCB1D} {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C289797-6F2D-45a8-8AEF-AC2E937FAFF2}\stubpath = "C:\\Windows\\{1C289797-6F2D-45a8-8AEF-AC2E937FAFF2}.exe" {CF1903B5-011B-4e00-8345-58C7F19DAF06}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{85E5461C-2F5B-463e-9672-CAAB477CD837} 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99} {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}\stubpath = "C:\\Windows\\{59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe" {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF1903B5-011B-4e00-8345-58C7F19DAF06} {D4BCC94C-5EDB-49f8-B784-799759423142}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D0EAD72-2D6A-4049-A4A0-E70EF277817A} {F8D18618-8FBB-4eb0-B3FD-43427F07B479}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4BCC94C-5EDB-49f8-B784-799759423142}\stubpath = "C:\\Windows\\{D4BCC94C-5EDB-49f8-B784-799759423142}.exe" {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1C289797-6F2D-45a8-8AEF-AC2E937FAFF2} {CF1903B5-011B-4e00-8345-58C7F19DAF06}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F8D18618-8FBB-4eb0-B3FD-43427F07B479} {1C289797-6F2D-45a8-8AEF-AC2E937FAFF2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{85E5461C-2F5B-463e-9672-CAAB477CD837}\stubpath = "C:\\Windows\\{85E5461C-2F5B-463e-9672-CAAB477CD837}.exe" 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}\stubpath = "C:\\Windows\\{4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe" {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}\stubpath = "C:\\Windows\\{9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe" {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59ACF3CB-EE3A-4b81-B81D-266C4A11F11B} {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D854A3FD-58F0-42f4-925F-38175DA9B004} {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F8D18618-8FBB-4eb0-B3FD-43427F07B479}\stubpath = "C:\\Windows\\{F8D18618-8FBB-4eb0-B3FD-43427F07B479}.exe" {1C289797-6F2D-45a8-8AEF-AC2E937FAFF2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C7B25855-07D0-4e67-BC12-D6033C9DCB1D}\stubpath = "C:\\Windows\\{C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe" {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D854A3FD-58F0-42f4-925F-38175DA9B004}\stubpath = "C:\\Windows\\{D854A3FD-58F0-42f4-925F-38175DA9B004}.exe" {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4BCC94C-5EDB-49f8-B784-799759423142} {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF1903B5-011B-4e00-8345-58C7F19DAF06}\stubpath = "C:\\Windows\\{CF1903B5-011B-4e00-8345-58C7F19DAF06}.exe" {D4BCC94C-5EDB-49f8-B784-799759423142}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D0EAD72-2D6A-4049-A4A0-E70EF277817A}\stubpath = "C:\\Windows\\{4D0EAD72-2D6A-4049-A4A0-E70EF277817A}.exe" {F8D18618-8FBB-4eb0-B3FD-43427F07B479}.exe -
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2504 {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe 864 {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe 2716 {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe 2616 {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe 2120 {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe 1896 {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe 540 {D4BCC94C-5EDB-49f8-B784-799759423142}.exe 988 {CF1903B5-011B-4e00-8345-58C7F19DAF06}.exe 1480 {1C289797-6F2D-45a8-8AEF-AC2E937FAFF2}.exe 2936 {F8D18618-8FBB-4eb0-B3FD-43427F07B479}.exe 2136 {4D0EAD72-2D6A-4049-A4A0-E70EF277817A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{CF1903B5-011B-4e00-8345-58C7F19DAF06}.exe {D4BCC94C-5EDB-49f8-B784-799759423142}.exe File created C:\Windows\{85E5461C-2F5B-463e-9672-CAAB477CD837}.exe 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe File created C:\Windows\{4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe File created C:\Windows\{9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe File created C:\Windows\{59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe File created C:\Windows\{C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe File created C:\Windows\{D854A3FD-58F0-42f4-925F-38175DA9B004}.exe {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe File created C:\Windows\{D4BCC94C-5EDB-49f8-B784-799759423142}.exe {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe File created C:\Windows\{F8D18618-8FBB-4eb0-B3FD-43427F07B479}.exe {1C289797-6F2D-45a8-8AEF-AC2E937FAFF2}.exe File created C:\Windows\{4D0EAD72-2D6A-4049-A4A0-E70EF277817A}.exe {F8D18618-8FBB-4eb0-B3FD-43427F07B479}.exe File created C:\Windows\{1C289797-6F2D-45a8-8AEF-AC2E937FAFF2}.exe {CF1903B5-011B-4e00-8345-58C7F19DAF06}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2044 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe Token: SeIncBasePriorityPrivilege 2504 {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe Token: SeIncBasePriorityPrivilege 864 {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe Token: SeIncBasePriorityPrivilege 2716 {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe Token: SeIncBasePriorityPrivilege 2616 {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe Token: SeIncBasePriorityPrivilege 2120 {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe Token: SeIncBasePriorityPrivilege 1896 {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe Token: SeIncBasePriorityPrivilege 540 {D4BCC94C-5EDB-49f8-B784-799759423142}.exe Token: SeIncBasePriorityPrivilege 988 {CF1903B5-011B-4e00-8345-58C7F19DAF06}.exe Token: SeIncBasePriorityPrivilege 1480 {1C289797-6F2D-45a8-8AEF-AC2E937FAFF2}.exe Token: SeIncBasePriorityPrivilege 2936 {F8D18618-8FBB-4eb0-B3FD-43427F07B479}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2504 2044 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe 28 PID 2044 wrote to memory of 2504 2044 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe 28 PID 2044 wrote to memory of 2504 2044 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe 28 PID 2044 wrote to memory of 2504 2044 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe 28 PID 2044 wrote to memory of 2668 2044 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe 29 PID 2044 wrote to memory of 2668 2044 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe 29 PID 2044 wrote to memory of 2668 2044 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe 29 PID 2044 wrote to memory of 2668 2044 2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe 29 PID 2504 wrote to memory of 864 2504 {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe 30 PID 2504 wrote to memory of 864 2504 {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe 30 PID 2504 wrote to memory of 864 2504 {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe 30 PID 2504 wrote to memory of 864 2504 {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe 30 PID 2504 wrote to memory of 2660 2504 {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe 31 PID 2504 wrote to memory of 2660 2504 {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe 31 PID 2504 wrote to memory of 2660 2504 {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe 31 PID 2504 wrote to memory of 2660 2504 {85E5461C-2F5B-463e-9672-CAAB477CD837}.exe 31 PID 864 wrote to memory of 2716 864 {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe 32 PID 864 wrote to memory of 2716 864 {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe 32 PID 864 wrote to memory of 2716 864 {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe 32 PID 864 wrote to memory of 2716 864 {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe 32 PID 864 wrote to memory of 2396 864 {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe 33 PID 864 wrote to memory of 2396 864 {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe 33 PID 864 wrote to memory of 2396 864 {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe 33 PID 864 wrote to memory of 2396 864 {4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe 33 PID 2716 wrote to memory of 2616 2716 {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe 36 PID 2716 wrote to memory of 2616 2716 {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe 36 PID 2716 wrote to memory of 2616 2716 {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe 36 PID 2716 wrote to memory of 2616 2716 {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe 36 PID 2716 wrote to memory of 2612 2716 {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe 37 PID 2716 wrote to memory of 2612 2716 {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe 37 PID 2716 wrote to memory of 2612 2716 {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe 37 PID 2716 wrote to memory of 2612 2716 {9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe 37 PID 2616 wrote to memory of 2120 2616 {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe 38 PID 2616 wrote to memory of 2120 2616 {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe 38 PID 2616 wrote to memory of 2120 2616 {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe 38 PID 2616 wrote to memory of 2120 2616 {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe 38 PID 2616 wrote to memory of 1584 2616 {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe 39 PID 2616 wrote to memory of 1584 2616 {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe 39 PID 2616 wrote to memory of 1584 2616 {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe 39 PID 2616 wrote to memory of 1584 2616 {59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe 39 PID 2120 wrote to memory of 1896 2120 {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe 40 PID 2120 wrote to memory of 1896 2120 {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe 40 PID 2120 wrote to memory of 1896 2120 {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe 40 PID 2120 wrote to memory of 1896 2120 {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe 40 PID 2120 wrote to memory of 1900 2120 {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe 41 PID 2120 wrote to memory of 1900 2120 {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe 41 PID 2120 wrote to memory of 1900 2120 {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe 41 PID 2120 wrote to memory of 1900 2120 {C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe 41 PID 1896 wrote to memory of 540 1896 {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe 42 PID 1896 wrote to memory of 540 1896 {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe 42 PID 1896 wrote to memory of 540 1896 {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe 42 PID 1896 wrote to memory of 540 1896 {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe 42 PID 1896 wrote to memory of 808 1896 {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe 43 PID 1896 wrote to memory of 808 1896 {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe 43 PID 1896 wrote to memory of 808 1896 {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe 43 PID 1896 wrote to memory of 808 1896 {D854A3FD-58F0-42f4-925F-38175DA9B004}.exe 43 PID 540 wrote to memory of 988 540 {D4BCC94C-5EDB-49f8-B784-799759423142}.exe 44 PID 540 wrote to memory of 988 540 {D4BCC94C-5EDB-49f8-B784-799759423142}.exe 44 PID 540 wrote to memory of 988 540 {D4BCC94C-5EDB-49f8-B784-799759423142}.exe 44 PID 540 wrote to memory of 988 540 {D4BCC94C-5EDB-49f8-B784-799759423142}.exe 44 PID 540 wrote to memory of 1416 540 {D4BCC94C-5EDB-49f8-B784-799759423142}.exe 45 PID 540 wrote to memory of 1416 540 {D4BCC94C-5EDB-49f8-B784-799759423142}.exe 45 PID 540 wrote to memory of 1416 540 {D4BCC94C-5EDB-49f8-B784-799759423142}.exe 45 PID 540 wrote to memory of 1416 540 {D4BCC94C-5EDB-49f8-B784-799759423142}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-04_d347e93647fb0cb41a7b5329aadc8f5d_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\{85E5461C-2F5B-463e-9672-CAAB477CD837}.exeC:\Windows\{85E5461C-2F5B-463e-9672-CAAB477CD837}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\{4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exeC:\Windows\{4CB9FE17-4368-429b-9DC9-62F2B6AC3EBF}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\{9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exeC:\Windows\{9739DCC4-79FB-4e26-8DD0-15E6D0B2EA99}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\{59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exeC:\Windows\{59ACF3CB-EE3A-4b81-B81D-266C4A11F11B}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\{C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exeC:\Windows\{C7B25855-07D0-4e67-BC12-D6033C9DCB1D}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\{D854A3FD-58F0-42f4-925F-38175DA9B004}.exeC:\Windows\{D854A3FD-58F0-42f4-925F-38175DA9B004}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\{D4BCC94C-5EDB-49f8-B784-799759423142}.exeC:\Windows\{D4BCC94C-5EDB-49f8-B784-799759423142}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\{CF1903B5-011B-4e00-8345-58C7F19DAF06}.exeC:\Windows\{CF1903B5-011B-4e00-8345-58C7F19DAF06}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:988 -
C:\Windows\{1C289797-6F2D-45a8-8AEF-AC2E937FAFF2}.exeC:\Windows\{1C289797-6F2D-45a8-8AEF-AC2E937FAFF2}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\{F8D18618-8FBB-4eb0-B3FD-43427F07B479}.exeC:\Windows\{F8D18618-8FBB-4eb0-B3FD-43427F07B479}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\{4D0EAD72-2D6A-4049-A4A0-E70EF277817A}.exeC:\Windows\{4D0EAD72-2D6A-4049-A4A0-E70EF277817A}.exe12⤵
- Executes dropped EXE
PID:2136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F8D18~1.EXE > nul12⤵PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C289~1.EXE > nul11⤵PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CF190~1.EXE > nul10⤵PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4BCC~1.EXE > nul9⤵PID:1416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D854A~1.EXE > nul8⤵PID:808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C7B25~1.EXE > nul7⤵PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{59ACF~1.EXE > nul6⤵PID:1584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9739D~1.EXE > nul5⤵PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4CB9F~1.EXE > nul4⤵PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{85E54~1.EXE > nul3⤵PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD54b0f74a91113e592d963455642f02df1
SHA103d0a0e4d557a9c92fecb45f58b24e6596e5384a
SHA256e4825553490f3071f0c398bca20849ae81ed6a8ccf75f560fd272b54045a43a6
SHA512759bc0497923b733e94861de786a14931c167e3fc1355e9163a7151c2041b7b599ecdca546fe01a7190fa90755c408cc01de0aecd2759872814657c03ed22513
-
Filesize
408KB
MD5fb91ba3cac6fc262fb00d77f6385d595
SHA19107b9d4eee17f661ca05ec2247588a0225b534b
SHA2564228906c0057548ae7d2d6c81fdc722f177ebdbfa51bc6524c46d6422f32358c
SHA512c808593ca4284dffa31b95cad8a7a76edd733d65c8b55d57bee1b2e7caef643c38f8b01db8d23eed2b0696b1d66ba283c8b675b439471052ff01424df3491949
-
Filesize
408KB
MD5fab78c1ff5c2b76c5a17a24662e77fe9
SHA1a2696e067d88ac679c64d08ab022e369b359c24d
SHA25681a1b29376502a00c2979f0bc2ca9f78c1006adffb695bac2c54e0d6f1cc83cc
SHA51244325a640e6ffa7bdc5f2c55b40c27cf580fc847ff645ca259a2867f88825a83be1fa14aea3d89da99e7cf7af6335418e1a9ca884ca1c2aa4b14a2918216c4a2
-
Filesize
408KB
MD516f4fc40a51fcc177465b414fe75bfa9
SHA153d602c53a6e3a3f1d0226b5208a4077dce5dd84
SHA25688894855a859908f9fa9e462b4736dae717ff8a77c2fd17d46a49ede25710cbc
SHA512ac228be5f9f93b2a548aa77bf94cebd7509910b48039d65fb2f7eb0c0ca72a1da24b82b83d7b27fa8a5b4e10b3d6d48e670a514717e9c9dedd13aecfa91c866d
-
Filesize
408KB
MD56f2ac54d6b8d67d538cf1fcf7ddc9b8c
SHA114bc7b971a35d60a68433bc83c43d18f66fb0b16
SHA2564f87d132dec5ea6337ab8dd613661c175a4a47a1a80801bc10015c647d74a226
SHA51283299f7ce7d06960917711dd936a3df52728080bec3fb0fd6234b1ee826b2a65981ded032d7c481879075643046bdd470b495e7d30cb168fb3f2ce09213158af
-
Filesize
408KB
MD5dd61ba002025d58562a8f5e6db1d5190
SHA1df17260556cf04dbcbcde9978ff7c58b78271ed0
SHA256656c26627cfe862882af8e4c7930d5489b719b2958033338ca529fef0167c990
SHA512c0b069fa1505dd9d19d22a5dece67ae1bbd284913bd4c60b68f53e68c6175f748c71fcf54f1ae8180948bb1319fbdd7b074069024dea66d375606b3c12981870
-
Filesize
408KB
MD560fca218672f7bf799c76fa57727f46b
SHA1531909cd2f95d1be158257976f5b628ecffef50e
SHA256e0adc616d6252674aad9865915594387e0dc43e7e54ff6372f1583e6dbf953ed
SHA512c82398cee619828b20c709ab82bd9797bac2a5357ce6d9c25dd108cfe7c32a53130becb34a3e5f90b3507568aeca2be797e29300b5d4bb33ea7de148f5812670
-
Filesize
408KB
MD5439e4a2eaada4d1020c6a3a30161ce32
SHA10ae29e52b7d5d0b44b291adcc05b42cb16f61fc7
SHA256de4bf50075af242b8e00f798ca1f2a18ca250fd10e3395bb190cef76f31dbb88
SHA512cfbf86bff0f799c06184ba1a3cdc5f93ba5331ff8836a93e2cd93b4ae0c7fb357680a9cda34aa91ce138f915d219aefb9c645c0030033b5658568b156b6be8c8
-
Filesize
408KB
MD537e2b7197d612ba75a40f875722255f1
SHA1297e2b0e4b58e7b48069740b7c0ed2fd118cee6f
SHA25623631900db20b02978d20a39a0eea68fdceb9b450af2be064bb7080ffc6c981b
SHA5129044e1a444589842f37abfe3e57d34e90a2e9a93ca5f20c53b048572f85879d55e8fd8f831c032d50dfdfde140c856bba706c2e2e187c849dfeb0185e0d87ce2
-
Filesize
408KB
MD5627a48d31263b4b3ceeae07fc33f75d0
SHA12e1eb19d7a2b09692616ce18f765b174f3ca5c27
SHA256a1ccce4c2e3f7202fbed6b8e2b449f0208d40e7a4e24e6fd57e7d388aa0c199e
SHA5127df75efb5d23760a77f56fd0ff94c061c1d5ae3987a52b494ff06ea2c533e222fccf86c576f194bfae2e0ffe42776d3cdcd081a94ba3f5bc935e978a0378aae5
-
Filesize
408KB
MD51460a5bdefb628ae797133e88b26d9c9
SHA179fea55ba866502e9f0e791f7ed7e83a66b1e57d
SHA2560728431a3f921db45f07c67e034a4e6f4a33163a4110a7fcfd143efb3c08284b
SHA5124581b1c09eabb3a00d0e733a4b08ff06b97a2a72aa954429d4b0a8d7926405bec12e91d0c1553150f4a79713f3e8aef3d7c714a8d8d457238a5d02f5dc2dde38