Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe
-
Size
168KB
-
MD5
64124de5280f768f171f2d73632e45a4
-
SHA1
866d77ae1eef1529b0787ca3e1598bd07f4c548b
-
SHA256
c2e7b7a1887ff2c3015780e9a4fef10ade061fe33c191ffd8096c41d6cfb4413
-
SHA512
b864a3821b223f997465104622e731a4a01584d13361f02e4b6f9c83c011b8fe33ac668ec038c3e848fa206321e2ca8934f87d3778f79bbb97904c878528d7f6
-
SSDEEP
1536:1EGh0o7lq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o7lqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F7861547-FD43-4fa6-A3BD-7C24A8A3611C}\stubpath = "C:\\Windows\\{F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe" 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4144706F-78DD-46dc-BABF-421BA419CE90} {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8654A07B-C82C-4687-B2B3-C024B9585629}\stubpath = "C:\\Windows\\{8654A07B-C82C-4687-B2B3-C024B9585629}.exe" {F9D1E751-B1B3-4e48-BD78-355708A67F8C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{40AF2CCE-02DE-44c2-B628-44B2C6AD67EC} {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8654A07B-C82C-4687-B2B3-C024B9585629} {F9D1E751-B1B3-4e48-BD78-355708A67F8C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B841EDD-5714-4af9-BB05-438DD60348BF} {8654A07B-C82C-4687-B2B3-C024B9585629}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F7861547-FD43-4fa6-A3BD-7C24A8A3611C} 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C08CFA0C-2027-442d-8257-BBD2C02A5DCE} {192288A7-6738-4940-9370-69FDA5467860}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C08CFA0C-2027-442d-8257-BBD2C02A5DCE}\stubpath = "C:\\Windows\\{C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe" {192288A7-6738-4940-9370-69FDA5467860}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B4986A1B-09DD-4ba3-A004-BC2C42FCCE52} {0109F88C-0512-4f22-924D-0863479A0C18}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{40AF2CCE-02DE-44c2-B628-44B2C6AD67EC}\stubpath = "C:\\Windows\\{40AF2CCE-02DE-44c2-B628-44B2C6AD67EC}.exe" {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9D1E751-B1B3-4e48-BD78-355708A67F8C} {40AF2CCE-02DE-44c2-B628-44B2C6AD67EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B841EDD-5714-4af9-BB05-438DD60348BF}\stubpath = "C:\\Windows\\{8B841EDD-5714-4af9-BB05-438DD60348BF}.exe" {8654A07B-C82C-4687-B2B3-C024B9585629}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4144706F-78DD-46dc-BABF-421BA419CE90}\stubpath = "C:\\Windows\\{4144706F-78DD-46dc-BABF-421BA419CE90}.exe" {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{008BB4E4-F489-49ed-B5B0-4B54DD559DBF}\stubpath = "C:\\Windows\\{008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe" {4144706F-78DD-46dc-BABF-421BA419CE90}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{192288A7-6738-4940-9370-69FDA5467860}\stubpath = "C:\\Windows\\{192288A7-6738-4940-9370-69FDA5467860}.exe" {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0109F88C-0512-4f22-924D-0863479A0C18} {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9D1E751-B1B3-4e48-BD78-355708A67F8C}\stubpath = "C:\\Windows\\{F9D1E751-B1B3-4e48-BD78-355708A67F8C}.exe" {40AF2CCE-02DE-44c2-B628-44B2C6AD67EC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{008BB4E4-F489-49ed-B5B0-4B54DD559DBF} {4144706F-78DD-46dc-BABF-421BA419CE90}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{192288A7-6738-4940-9370-69FDA5467860} {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0109F88C-0512-4f22-924D-0863479A0C18}\stubpath = "C:\\Windows\\{0109F88C-0512-4f22-924D-0863479A0C18}.exe" {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}\stubpath = "C:\\Windows\\{B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe" {0109F88C-0512-4f22-924D-0863479A0C18}.exe -
Deletes itself 1 IoCs
pid Process 1976 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2084 {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe 2104 {4144706F-78DD-46dc-BABF-421BA419CE90}.exe 2736 {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe 2772 {192288A7-6738-4940-9370-69FDA5467860}.exe 2724 {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe 1132 {0109F88C-0512-4f22-924D-0863479A0C18}.exe 1604 {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe 624 {40AF2CCE-02DE-44c2-B628-44B2C6AD67EC}.exe 3040 {F9D1E751-B1B3-4e48-BD78-355708A67F8C}.exe 1792 {8654A07B-C82C-4687-B2B3-C024B9585629}.exe 1428 {8B841EDD-5714-4af9-BB05-438DD60348BF}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe File created C:\Windows\{4144706F-78DD-46dc-BABF-421BA419CE90}.exe {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe File created C:\Windows\{008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe {4144706F-78DD-46dc-BABF-421BA419CE90}.exe File created C:\Windows\{192288A7-6738-4940-9370-69FDA5467860}.exe {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe File created C:\Windows\{40AF2CCE-02DE-44c2-B628-44B2C6AD67EC}.exe {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe File created C:\Windows\{8654A07B-C82C-4687-B2B3-C024B9585629}.exe {F9D1E751-B1B3-4e48-BD78-355708A67F8C}.exe File created C:\Windows\{C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe {192288A7-6738-4940-9370-69FDA5467860}.exe File created C:\Windows\{0109F88C-0512-4f22-924D-0863479A0C18}.exe {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe File created C:\Windows\{B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe {0109F88C-0512-4f22-924D-0863479A0C18}.exe File created C:\Windows\{F9D1E751-B1B3-4e48-BD78-355708A67F8C}.exe {40AF2CCE-02DE-44c2-B628-44B2C6AD67EC}.exe File created C:\Windows\{8B841EDD-5714-4af9-BB05-438DD60348BF}.exe {8654A07B-C82C-4687-B2B3-C024B9585629}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1952 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe Token: SeIncBasePriorityPrivilege 2084 {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe Token: SeIncBasePriorityPrivilege 2104 {4144706F-78DD-46dc-BABF-421BA419CE90}.exe Token: SeIncBasePriorityPrivilege 2736 {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe Token: SeIncBasePriorityPrivilege 2772 {192288A7-6738-4940-9370-69FDA5467860}.exe Token: SeIncBasePriorityPrivilege 2724 {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe Token: SeIncBasePriorityPrivilege 1132 {0109F88C-0512-4f22-924D-0863479A0C18}.exe Token: SeIncBasePriorityPrivilege 1604 {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe Token: SeIncBasePriorityPrivilege 624 {40AF2CCE-02DE-44c2-B628-44B2C6AD67EC}.exe Token: SeIncBasePriorityPrivilege 3040 {F9D1E751-B1B3-4e48-BD78-355708A67F8C}.exe Token: SeIncBasePriorityPrivilege 1792 {8654A07B-C82C-4687-B2B3-C024B9585629}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2084 1952 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe 31 PID 1952 wrote to memory of 2084 1952 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe 31 PID 1952 wrote to memory of 2084 1952 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe 31 PID 1952 wrote to memory of 2084 1952 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe 31 PID 1952 wrote to memory of 1976 1952 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe 32 PID 1952 wrote to memory of 1976 1952 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe 32 PID 1952 wrote to memory of 1976 1952 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe 32 PID 1952 wrote to memory of 1976 1952 2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe 32 PID 2084 wrote to memory of 2104 2084 {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe 33 PID 2084 wrote to memory of 2104 2084 {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe 33 PID 2084 wrote to memory of 2104 2084 {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe 33 PID 2084 wrote to memory of 2104 2084 {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe 33 PID 2084 wrote to memory of 2880 2084 {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe 34 PID 2084 wrote to memory of 2880 2084 {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe 34 PID 2084 wrote to memory of 2880 2084 {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe 34 PID 2084 wrote to memory of 2880 2084 {F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe 34 PID 2104 wrote to memory of 2736 2104 {4144706F-78DD-46dc-BABF-421BA419CE90}.exe 35 PID 2104 wrote to memory of 2736 2104 {4144706F-78DD-46dc-BABF-421BA419CE90}.exe 35 PID 2104 wrote to memory of 2736 2104 {4144706F-78DD-46dc-BABF-421BA419CE90}.exe 35 PID 2104 wrote to memory of 2736 2104 {4144706F-78DD-46dc-BABF-421BA419CE90}.exe 35 PID 2104 wrote to memory of 2916 2104 {4144706F-78DD-46dc-BABF-421BA419CE90}.exe 36 PID 2104 wrote to memory of 2916 2104 {4144706F-78DD-46dc-BABF-421BA419CE90}.exe 36 PID 2104 wrote to memory of 2916 2104 {4144706F-78DD-46dc-BABF-421BA419CE90}.exe 36 PID 2104 wrote to memory of 2916 2104 {4144706F-78DD-46dc-BABF-421BA419CE90}.exe 36 PID 2736 wrote to memory of 2772 2736 {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe 37 PID 2736 wrote to memory of 2772 2736 {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe 37 PID 2736 wrote to memory of 2772 2736 {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe 37 PID 2736 wrote to memory of 2772 2736 {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe 37 PID 2736 wrote to memory of 1268 2736 {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe 38 PID 2736 wrote to memory of 1268 2736 {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe 38 PID 2736 wrote to memory of 1268 2736 {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe 38 PID 2736 wrote to memory of 1268 2736 {008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe 38 PID 2772 wrote to memory of 2724 2772 {192288A7-6738-4940-9370-69FDA5467860}.exe 39 PID 2772 wrote to memory of 2724 2772 {192288A7-6738-4940-9370-69FDA5467860}.exe 39 PID 2772 wrote to memory of 2724 2772 {192288A7-6738-4940-9370-69FDA5467860}.exe 39 PID 2772 wrote to memory of 2724 2772 {192288A7-6738-4940-9370-69FDA5467860}.exe 39 PID 2772 wrote to memory of 1908 2772 {192288A7-6738-4940-9370-69FDA5467860}.exe 40 PID 2772 wrote to memory of 1908 2772 {192288A7-6738-4940-9370-69FDA5467860}.exe 40 PID 2772 wrote to memory of 1908 2772 {192288A7-6738-4940-9370-69FDA5467860}.exe 40 PID 2772 wrote to memory of 1908 2772 {192288A7-6738-4940-9370-69FDA5467860}.exe 40 PID 2724 wrote to memory of 1132 2724 {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe 41 PID 2724 wrote to memory of 1132 2724 {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe 41 PID 2724 wrote to memory of 1132 2724 {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe 41 PID 2724 wrote to memory of 1132 2724 {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe 41 PID 2724 wrote to memory of 3012 2724 {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe 42 PID 2724 wrote to memory of 3012 2724 {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe 42 PID 2724 wrote to memory of 3012 2724 {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe 42 PID 2724 wrote to memory of 3012 2724 {C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe 42 PID 1132 wrote to memory of 1604 1132 {0109F88C-0512-4f22-924D-0863479A0C18}.exe 43 PID 1132 wrote to memory of 1604 1132 {0109F88C-0512-4f22-924D-0863479A0C18}.exe 43 PID 1132 wrote to memory of 1604 1132 {0109F88C-0512-4f22-924D-0863479A0C18}.exe 43 PID 1132 wrote to memory of 1604 1132 {0109F88C-0512-4f22-924D-0863479A0C18}.exe 43 PID 1132 wrote to memory of 2840 1132 {0109F88C-0512-4f22-924D-0863479A0C18}.exe 44 PID 1132 wrote to memory of 2840 1132 {0109F88C-0512-4f22-924D-0863479A0C18}.exe 44 PID 1132 wrote to memory of 2840 1132 {0109F88C-0512-4f22-924D-0863479A0C18}.exe 44 PID 1132 wrote to memory of 2840 1132 {0109F88C-0512-4f22-924D-0863479A0C18}.exe 44 PID 1604 wrote to memory of 624 1604 {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe 45 PID 1604 wrote to memory of 624 1604 {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe 45 PID 1604 wrote to memory of 624 1604 {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe 45 PID 1604 wrote to memory of 624 1604 {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe 45 PID 1604 wrote to memory of 1228 1604 {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe 46 PID 1604 wrote to memory of 1228 1604 {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe 46 PID 1604 wrote to memory of 1228 1604 {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe 46 PID 1604 wrote to memory of 1228 1604 {B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-09_64124de5280f768f171f2d73632e45a4_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\{F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exeC:\Windows\{F7861547-FD43-4fa6-A3BD-7C24A8A3611C}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\{4144706F-78DD-46dc-BABF-421BA419CE90}.exeC:\Windows\{4144706F-78DD-46dc-BABF-421BA419CE90}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\{008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exeC:\Windows\{008BB4E4-F489-49ed-B5B0-4B54DD559DBF}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{192288A7-6738-4940-9370-69FDA5467860}.exeC:\Windows\{192288A7-6738-4940-9370-69FDA5467860}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\{C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exeC:\Windows\{C08CFA0C-2027-442d-8257-BBD2C02A5DCE}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\{0109F88C-0512-4f22-924D-0863479A0C18}.exeC:\Windows\{0109F88C-0512-4f22-924D-0863479A0C18}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\{B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exeC:\Windows\{B4986A1B-09DD-4ba3-A004-BC2C42FCCE52}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\{40AF2CCE-02DE-44c2-B628-44B2C6AD67EC}.exeC:\Windows\{40AF2CCE-02DE-44c2-B628-44B2C6AD67EC}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Windows\{F9D1E751-B1B3-4e48-BD78-355708A67F8C}.exeC:\Windows\{F9D1E751-B1B3-4e48-BD78-355708A67F8C}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\{8654A07B-C82C-4687-B2B3-C024B9585629}.exeC:\Windows\{8654A07B-C82C-4687-B2B3-C024B9585629}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\{8B841EDD-5714-4af9-BB05-438DD60348BF}.exeC:\Windows\{8B841EDD-5714-4af9-BB05-438DD60348BF}.exe12⤵
- Executes dropped EXE
PID:1428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8654A~1.EXE > nul12⤵PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9D1E~1.EXE > nul11⤵PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{40AF2~1.EXE > nul10⤵PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B4986~1.EXE > nul9⤵PID:1228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0109F~1.EXE > nul8⤵PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C08CF~1.EXE > nul7⤵PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{19228~1.EXE > nul6⤵PID:1908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{008BB~1.EXE > nul5⤵PID:1268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41447~1.EXE > nul4⤵PID:2916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F7861~1.EXE > nul3⤵PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5360766b460b6809fab4402e3fb4b1751
SHA193f6a9deb655d123b568c4c8e327360e596f49fa
SHA2564917dbe0340743b1a23af4c8ac689dae2b11a6b9fc3ab1bd3c21c58f1159ea19
SHA5122f93f508d45c647af9e88c398193c375b4fc3cd8229f1307b09aedfe1386ea8aefcded702bea294af0c0ade0c71d63fa3d4193b4056212efb1c433c14c119d34
-
Filesize
168KB
MD510858d5a41ac7468ff4ca137d7abdc6e
SHA1a2f8a770875a9bcecae4be6f56f828a542cab8b0
SHA256b158dac44a28f0e68ad4989d2c26c4cb2001c2598e17a8656c16a0527a2292be
SHA512bb899ca89590fdd4d95e7072d79551f4cd12577775a7b141a0dddd81b7b68bde9c4e4706a26f619a51438280e11dcf5f3bde629f82b06df6231d26dc5bf22919
-
Filesize
168KB
MD5662f11eb2587b2a27079e97309bfc158
SHA11e4b8255847d728ff2779f956f3b3c1806107262
SHA2562b435065159e87396197af85edfab96968b88758b860955f39853352552d0884
SHA5128e390ed2dfbdb2db3aad3a9aba38bde200978e4c617fee0299a55073d5e5b6cd85efa2576f10bee6ab671944c375ccb0eac7abb25d20ea499c44be2f949e487d
-
Filesize
168KB
MD54ec88f1e6df3161d80dd6ef752f58e6d
SHA10ea96a0f180afffb32cab94d093fa82d7ed652c2
SHA256481929f9112db52ed490d7b2f642e608e1c5aee7abb5c76e887db43ee108887c
SHA512be12d8915191cb674f4c9d089d53adb834d9a3b806e956e52a82d520bab1726a717137635447ec531e168043952e9711e3b22af4efb1933af821f2f6abbe6b46
-
Filesize
168KB
MD5680f5d3107180a259fc81dd48b671249
SHA16390ccd10d146f095c38e78b2612b7ad97cb93b9
SHA2561d770d4a9e54446978a1fcf02120d6928a1a43ca38c6c55ce0b7c25f0589c8f5
SHA5129e4c595f54daf1a44fb2c73f1919972118349a134f8217a90c9f0f9d4748ec64a5b6b049012e04d2051db6293d4dbacd5460b79b83eb6beaae819a71dfb4380f
-
Filesize
168KB
MD52e94c7ca7e1ce297d59f578c5f79271d
SHA17b2808ce9d11fa1e9c30f76e8491d023eb9d137a
SHA25638560d9cfcd3951538cbb90b2920a097e93107b6e62f090d3c93d1b03dac036e
SHA5127b997661f3b517d6f103ada5009fa4dde7d14cb97368cfd8d88c69d6df8599197dbbea18fe5e9e6bbd7e92bf7e992832c7d7fd52f73b94bf92023229d5f7c6aa
-
Filesize
168KB
MD512601d1e8d6e18275cee96df05033c98
SHA1e8edb6395bb26c28d4edb4363fa7e32a1ce569d3
SHA2564ec1099868a3db3a787976c5b10895b264af72b66aeafd6bf41a190f81e9c31f
SHA51297e03a0ace55f09d2871c0033c87f7216d542c1febea3d887f746073d30946101229b50dced5262e1c93516719f388d9df2562573ce17b2464164207815d9c4e
-
Filesize
168KB
MD578d83f6dffb2cdd160bc3ce1f00bdd39
SHA1269562d5d17a8c067d6998d0a94834f8d2642c98
SHA2565606b33c6fa8317bdc2c598766d117590fc9fc5d9d8859e5334dc1d62b6c6553
SHA512419bb6b5f84ae9a41f817a6dccd0b0b9421f780ff41df2ae78912aef9b1b8d8d99fdad3d4bbb2b798bafbc5498e5b205957199b83a31a003e0b3454a2fd2f994
-
Filesize
168KB
MD5f077a528ca506d27c48cbf4adc38e26b
SHA1c89ed3008e8c61c05813fb8f2ad8f77e77634675
SHA256c25307b4ea4d9397911d8562e5bc4befa3201aee5d02019f444da0d8cddb473b
SHA512d087e69cd2c98c1de857b255fa340c6482586ed008be992e1670de5ea694ffe1422c7cfbf5c48d59d57e32c50d73bde1934a49e1a21d1864bc100de31822e331
-
Filesize
168KB
MD533a86d6d6683e48a4bc229a6ae8c073a
SHA1ce83a13f268c0dde932c22452e1d208b66eb58f3
SHA256ed3ddda18064919a219ae5a688752bf7607f30d810dccc20ca342365ec4c6df5
SHA512052a241e70b4cbef9043dbd8b8e86950334f806f853dccfe325714022cf76f59a3ab30e6a85d2113312629de8b8641b3e53ccb6eb9ceb3cfe4065989a0d6af50
-
Filesize
168KB
MD5d40dd8a25565f35b3d0385173d732404
SHA1310d529e2a6c16e0f5c89a04745173559360fb80
SHA2563ba8bbd71d5c8280f7654a1e15c9f698eb7e1ad99a1a13ccbc38931cb3ff3a31
SHA512e551da8416b460103d403eaedc9747eee166323c2bb4f9a3986a4f16f95a4f4202e4059a5673cd155c9e66fceefbb89bc1afcc0b04e40718b036f86f72b1f371