Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe
General
-
Target
2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe
-
Size
216KB
-
MD5
71f0eaeec932b5b6cd4ce3152a9d825a
-
SHA1
18952eacb6ac0043a439c1aa97c37f620b0222a6
-
SHA256
7f57968da7a0d6e44266af66f129b789defb9cfc2aff35fc8e8e3a10a6907343
-
SHA512
078400ff872d9e780577c63abec95ab6d2ed38312678d0f43ef891343f7cb8a79688e9130e7d7c7a52980f31c931bdcb74cea1f0996a6574f97f2c7282ea5d91
-
SSDEEP
3072:jEGh0oll+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGXlEeKcAEcGy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D01060FE-A73C-48b3-8A57-7863B93F94D9}\stubpath = "C:\\Windows\\{D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe" {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{727F70B9-EC36-499c-A2F4-C1238D72E99B} {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D5306A58-9DF3-46f2-9AF7-750A17368BB6} {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2BF055E-F57C-4d3a-B716-274065036853} {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{19D8DD34-B62B-4f89-AB28-0617B8DC967D}\stubpath = "C:\\Windows\\{19D8DD34-B62B-4f89-AB28-0617B8DC967D}.exe" {FA2ED679-1DEF-415f-974E-0C812B62C5AC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AFABDC94-BF56-4651-8B06-A25579F802A0} {19D8DD34-B62B-4f89-AB28-0617B8DC967D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AFABDC94-BF56-4651-8B06-A25579F802A0}\stubpath = "C:\\Windows\\{AFABDC94-BF56-4651-8B06-A25579F802A0}.exe" {19D8DD34-B62B-4f89-AB28-0617B8DC967D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{452FE4A3-267E-4a6e-8DDA-EA9BC6479301}\stubpath = "C:\\Windows\\{452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe" 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2BF055E-F57C-4d3a-B716-274065036853}\stubpath = "C:\\Windows\\{D2BF055E-F57C-4d3a-B716-274065036853}.exe" {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{191E0E70-FACE-4b25-A036-552B412A47A6}\stubpath = "C:\\Windows\\{191E0E70-FACE-4b25-A036-552B412A47A6}.exe" {D2BF055E-F57C-4d3a-B716-274065036853}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{727F70B9-EC36-499c-A2F4-C1238D72E99B}\stubpath = "C:\\Windows\\{727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe" {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{597FAD63-FA25-4742-8182-C20F1B4CAD78}\stubpath = "C:\\Windows\\{597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe" {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{191E0E70-FACE-4b25-A036-552B412A47A6} {D2BF055E-F57C-4d3a-B716-274065036853}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B42E687D-92AD-4d3b-A98F-51383CA87BCC}\stubpath = "C:\\Windows\\{B42E687D-92AD-4d3b-A98F-51383CA87BCC}.exe" {191E0E70-FACE-4b25-A036-552B412A47A6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{19D8DD34-B62B-4f89-AB28-0617B8DC967D} {FA2ED679-1DEF-415f-974E-0C812B62C5AC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{452FE4A3-267E-4a6e-8DDA-EA9BC6479301} 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D01060FE-A73C-48b3-8A57-7863B93F94D9} {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D5306A58-9DF3-46f2-9AF7-750A17368BB6}\stubpath = "C:\\Windows\\{D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe" {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{597FAD63-FA25-4742-8182-C20F1B4CAD78} {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B42E687D-92AD-4d3b-A98F-51383CA87BCC} {191E0E70-FACE-4b25-A036-552B412A47A6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA2ED679-1DEF-415f-974E-0C812B62C5AC} {B42E687D-92AD-4d3b-A98F-51383CA87BCC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA2ED679-1DEF-415f-974E-0C812B62C5AC}\stubpath = "C:\\Windows\\{FA2ED679-1DEF-415f-974E-0C812B62C5AC}.exe" {B42E687D-92AD-4d3b-A98F-51383CA87BCC}.exe -
Deletes itself 1 IoCs
pid Process 2104 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2692 {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe 2768 {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe 2844 {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe 2644 {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe 1844 {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe 1524 {D2BF055E-F57C-4d3a-B716-274065036853}.exe 2424 {191E0E70-FACE-4b25-A036-552B412A47A6}.exe 2420 {B42E687D-92AD-4d3b-A98F-51383CA87BCC}.exe 2116 {FA2ED679-1DEF-415f-974E-0C812B62C5AC}.exe 3008 {19D8DD34-B62B-4f89-AB28-0617B8DC967D}.exe 952 {AFABDC94-BF56-4651-8B06-A25579F802A0}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe File created C:\Windows\{597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe File created C:\Windows\{D2BF055E-F57C-4d3a-B716-274065036853}.exe {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe File created C:\Windows\{FA2ED679-1DEF-415f-974E-0C812B62C5AC}.exe {B42E687D-92AD-4d3b-A98F-51383CA87BCC}.exe File created C:\Windows\{AFABDC94-BF56-4651-8B06-A25579F802A0}.exe {19D8DD34-B62B-4f89-AB28-0617B8DC967D}.exe File created C:\Windows\{D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe File created C:\Windows\{727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe File created C:\Windows\{B42E687D-92AD-4d3b-A98F-51383CA87BCC}.exe {191E0E70-FACE-4b25-A036-552B412A47A6}.exe File created C:\Windows\{19D8DD34-B62B-4f89-AB28-0617B8DC967D}.exe {FA2ED679-1DEF-415f-974E-0C812B62C5AC}.exe File created C:\Windows\{452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe File created C:\Windows\{191E0E70-FACE-4b25-A036-552B412A47A6}.exe {D2BF055E-F57C-4d3a-B716-274065036853}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1724 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe Token: SeIncBasePriorityPrivilege 2692 {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe Token: SeIncBasePriorityPrivilege 2768 {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe Token: SeIncBasePriorityPrivilege 2844 {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe Token: SeIncBasePriorityPrivilege 2644 {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe Token: SeIncBasePriorityPrivilege 1844 {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe Token: SeIncBasePriorityPrivilege 1524 {D2BF055E-F57C-4d3a-B716-274065036853}.exe Token: SeIncBasePriorityPrivilege 2424 {191E0E70-FACE-4b25-A036-552B412A47A6}.exe Token: SeIncBasePriorityPrivilege 2420 {B42E687D-92AD-4d3b-A98F-51383CA87BCC}.exe Token: SeIncBasePriorityPrivilege 2116 {FA2ED679-1DEF-415f-974E-0C812B62C5AC}.exe Token: SeIncBasePriorityPrivilege 3008 {19D8DD34-B62B-4f89-AB28-0617B8DC967D}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2692 1724 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe 30 PID 1724 wrote to memory of 2692 1724 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe 30 PID 1724 wrote to memory of 2692 1724 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe 30 PID 1724 wrote to memory of 2692 1724 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe 30 PID 1724 wrote to memory of 2104 1724 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe 31 PID 1724 wrote to memory of 2104 1724 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe 31 PID 1724 wrote to memory of 2104 1724 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe 31 PID 1724 wrote to memory of 2104 1724 2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe 31 PID 2692 wrote to memory of 2768 2692 {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe 33 PID 2692 wrote to memory of 2768 2692 {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe 33 PID 2692 wrote to memory of 2768 2692 {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe 33 PID 2692 wrote to memory of 2768 2692 {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe 33 PID 2692 wrote to memory of 2932 2692 {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe 34 PID 2692 wrote to memory of 2932 2692 {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe 34 PID 2692 wrote to memory of 2932 2692 {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe 34 PID 2692 wrote to memory of 2932 2692 {452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe 34 PID 2768 wrote to memory of 2844 2768 {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe 35 PID 2768 wrote to memory of 2844 2768 {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe 35 PID 2768 wrote to memory of 2844 2768 {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe 35 PID 2768 wrote to memory of 2844 2768 {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe 35 PID 2768 wrote to memory of 1956 2768 {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe 36 PID 2768 wrote to memory of 1956 2768 {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe 36 PID 2768 wrote to memory of 1956 2768 {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe 36 PID 2768 wrote to memory of 1956 2768 {D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe 36 PID 2844 wrote to memory of 2644 2844 {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe 37 PID 2844 wrote to memory of 2644 2844 {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe 37 PID 2844 wrote to memory of 2644 2844 {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe 37 PID 2844 wrote to memory of 2644 2844 {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe 37 PID 2844 wrote to memory of 1732 2844 {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe 38 PID 2844 wrote to memory of 1732 2844 {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe 38 PID 2844 wrote to memory of 1732 2844 {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe 38 PID 2844 wrote to memory of 1732 2844 {727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe 38 PID 2644 wrote to memory of 1844 2644 {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe 39 PID 2644 wrote to memory of 1844 2644 {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe 39 PID 2644 wrote to memory of 1844 2644 {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe 39 PID 2644 wrote to memory of 1844 2644 {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe 39 PID 2644 wrote to memory of 1248 2644 {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe 40 PID 2644 wrote to memory of 1248 2644 {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe 40 PID 2644 wrote to memory of 1248 2644 {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe 40 PID 2644 wrote to memory of 1248 2644 {D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe 40 PID 1844 wrote to memory of 1524 1844 {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe 41 PID 1844 wrote to memory of 1524 1844 {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe 41 PID 1844 wrote to memory of 1524 1844 {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe 41 PID 1844 wrote to memory of 1524 1844 {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe 41 PID 1844 wrote to memory of 2948 1844 {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe 42 PID 1844 wrote to memory of 2948 1844 {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe 42 PID 1844 wrote to memory of 2948 1844 {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe 42 PID 1844 wrote to memory of 2948 1844 {597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe 42 PID 1524 wrote to memory of 2424 1524 {D2BF055E-F57C-4d3a-B716-274065036853}.exe 43 PID 1524 wrote to memory of 2424 1524 {D2BF055E-F57C-4d3a-B716-274065036853}.exe 43 PID 1524 wrote to memory of 2424 1524 {D2BF055E-F57C-4d3a-B716-274065036853}.exe 43 PID 1524 wrote to memory of 2424 1524 {D2BF055E-F57C-4d3a-B716-274065036853}.exe 43 PID 1524 wrote to memory of 1972 1524 {D2BF055E-F57C-4d3a-B716-274065036853}.exe 44 PID 1524 wrote to memory of 1972 1524 {D2BF055E-F57C-4d3a-B716-274065036853}.exe 44 PID 1524 wrote to memory of 1972 1524 {D2BF055E-F57C-4d3a-B716-274065036853}.exe 44 PID 1524 wrote to memory of 1972 1524 {D2BF055E-F57C-4d3a-B716-274065036853}.exe 44 PID 2424 wrote to memory of 2420 2424 {191E0E70-FACE-4b25-A036-552B412A47A6}.exe 45 PID 2424 wrote to memory of 2420 2424 {191E0E70-FACE-4b25-A036-552B412A47A6}.exe 45 PID 2424 wrote to memory of 2420 2424 {191E0E70-FACE-4b25-A036-552B412A47A6}.exe 45 PID 2424 wrote to memory of 2420 2424 {191E0E70-FACE-4b25-A036-552B412A47A6}.exe 45 PID 2424 wrote to memory of 1904 2424 {191E0E70-FACE-4b25-A036-552B412A47A6}.exe 46 PID 2424 wrote to memory of 1904 2424 {191E0E70-FACE-4b25-A036-552B412A47A6}.exe 46 PID 2424 wrote to memory of 1904 2424 {191E0E70-FACE-4b25-A036-552B412A47A6}.exe 46 PID 2424 wrote to memory of 1904 2424 {191E0E70-FACE-4b25-A036-552B412A47A6}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-09_71f0eaeec932b5b6cd4ce3152a9d825a_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\{452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exeC:\Windows\{452FE4A3-267E-4a6e-8DDA-EA9BC6479301}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\{D01060FE-A73C-48b3-8A57-7863B93F94D9}.exeC:\Windows\{D01060FE-A73C-48b3-8A57-7863B93F94D9}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\{727F70B9-EC36-499c-A2F4-C1238D72E99B}.exeC:\Windows\{727F70B9-EC36-499c-A2F4-C1238D72E99B}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\{D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exeC:\Windows\{D5306A58-9DF3-46f2-9AF7-750A17368BB6}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\{597FAD63-FA25-4742-8182-C20F1B4CAD78}.exeC:\Windows\{597FAD63-FA25-4742-8182-C20F1B4CAD78}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\{D2BF055E-F57C-4d3a-B716-274065036853}.exeC:\Windows\{D2BF055E-F57C-4d3a-B716-274065036853}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\{191E0E70-FACE-4b25-A036-552B412A47A6}.exeC:\Windows\{191E0E70-FACE-4b25-A036-552B412A47A6}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\{B42E687D-92AD-4d3b-A98F-51383CA87BCC}.exeC:\Windows\{B42E687D-92AD-4d3b-A98F-51383CA87BCC}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2420 -
C:\Windows\{FA2ED679-1DEF-415f-974E-0C812B62C5AC}.exeC:\Windows\{FA2ED679-1DEF-415f-974E-0C812B62C5AC}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\{19D8DD34-B62B-4f89-AB28-0617B8DC967D}.exeC:\Windows\{19D8DD34-B62B-4f89-AB28-0617B8DC967D}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\{AFABDC94-BF56-4651-8B06-A25579F802A0}.exeC:\Windows\{AFABDC94-BF56-4651-8B06-A25579F802A0}.exe12⤵
- Executes dropped EXE
PID:952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{19D8D~1.EXE > nul12⤵PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FA2ED~1.EXE > nul11⤵PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B42E6~1.EXE > nul10⤵PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{191E0~1.EXE > nul9⤵PID:1904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2BF0~1.EXE > nul8⤵PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{597FA~1.EXE > nul7⤵PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D5306~1.EXE > nul6⤵PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{727F7~1.EXE > nul5⤵PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D0106~1.EXE > nul4⤵PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{452FE~1.EXE > nul3⤵PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD554c71f2c41b7ad5277c0fa26648435be
SHA193d7b0383d39080fde362e53a1af445b3bfd68da
SHA2563d269bb4a346465b4e7ac49161fdd801652bac0299ef82b31d4c827f36059721
SHA5127ebcc320d80d57347fdc35f8f78c0d1fabcc4d5f338067c0358d2c5fd743b0b5742e4babca8ed618a8a0657c9e96d60f1b06c2a0ce1a6e2f21d4ad994a08473e
-
Filesize
216KB
MD577f324e2bb47d5396205529e0256c3eb
SHA173ee72d90d421f8f522562983c888e99c2ac76ac
SHA25614e485375ed9fa287feb40b7c222e91601817c41b764a3e7c4de90f32e3c9547
SHA51235ccca551d88a6653d980f00d6435a96f5d766eb2b89ff2d4f20dd9539c4c840a3908f267938cdb9ab323375de4909eddf42e409bb97e7d7700020ca719794dc
-
Filesize
216KB
MD514133e6d9f936bd83bddc537c571b506
SHA1160b3b5f5115a8b8e30a7498c5000dc8fb37ba4e
SHA2563152d86c0077ce492cbb39dfd8893fb69987c27da44866d226648c4fbdca9e04
SHA51235a6198605ad1ac94e1b0ec266673df304a65b1416264d72722b6320f17457cab722aef8fa9e9df6dcbf481d22cc578a2a2e4060bdb0a5a89102e7050f0946a0
-
Filesize
216KB
MD587c7f07a4a82de48f6d611d372729ba0
SHA1f2c5cd5a9b9d907b16dbb3cc06232dd0edee1bf0
SHA256e5c36330b6fc407d2a0988f847a66a6728e571235a9d12b761cfced99cc4c531
SHA5123f5f001b6368e5b68705ef59da58f17f35dd34dac2b0fdcca44fc2ac30d463e0dba37427f49ec05566814d83d6ba48c03fd1ffa519b1f17dfd63f0866add510f
-
Filesize
216KB
MD562e115d4720f71b6daf726fa4b15293d
SHA11e53b3cd8f76bd7eba70afad02556883d82ecb76
SHA2566f144981ef34a3a0ac3f6e6e50ab7a1fb8f9e6eecd9c479e6a3fbc87f8155f63
SHA512e7f51db762f5f732efde8da478818eacb8e974682c7bf9da8a86949e0cc21dca7c6e6cef40f0cc861bfa634678338a4ffb0de1412a84de9a8b6d0e606f02e26d
-
Filesize
216KB
MD524f6172cf63a5b4ea3a85020ae236cf2
SHA186553de6984cebee87729b9bfc5bd3953a12e503
SHA25629cc8c58e610bbdef435c97ca4363312a7bc1b3247e3d90936720c6ddee848e5
SHA5128e624d99b4a8a064b6ddf49922b6b5ff22c583dd283948dfe07ee1e03435ce2992b660ec34fa750ee003c597f63ad07ee3655d084fc6ab10f256e2c87aaf7aba
-
Filesize
216KB
MD5083ab3c64111caa24668acb5e60f87b5
SHA116e3ca36bf02771ca0e330051d44170945b1a876
SHA256f6b2f3a7fc4e7f1cda9f7d8f79ea6666765823c5485ef09de99270784f92188d
SHA512ac22a3997fea7ed17f7a17fe5a204d213fea6c139c49713a84f6b8c9330408e6c6bfe847ae9d536f34d6137329bbd697ec0297af076ab4b04dc08d6339814f43
-
Filesize
216KB
MD5b26b0b5e5212917706ad4d1973f2f5d1
SHA106198046bb3d64315920784de5dd7f78d578dcf4
SHA256ebb468c738c5c3ec64335dd6ead9c382b2b9563b611667be788f4bf6560dedc7
SHA51213c1a99b138fffa4743d78fe711ba5df5ef5061d5a5bb401f0c4e2bc4f10a97c8b17c1a238b6e1bbb3e06a7517327e7a6abe11816855317fecf754c2db8beac1
-
Filesize
216KB
MD56f164277c825bcabdd23b26f3892f210
SHA10e87cc65280fcadeab91ed5e8df9dd71ce8f5ea4
SHA256099f324d97ca1e8f8bbd342dc100f6bd004efd936384f7338855da4b67c1c3ee
SHA512d1022160a881d147c50fcfe1e6cd92015c53b79ed0a29740ebc412af938b15a3f158c657b8b086331f643722d9f326c177de0f2a84a0155781dde675a6445a2e
-
Filesize
216KB
MD5c83419d28f189a3abd09c7651c607c4f
SHA1cf74c1dc4cb3ba0667762418927fa12c7001d8a5
SHA256439ae52ed62dcd10af5461a4d15f76755265216cb8abbca410e0de9e2ab99cbd
SHA5122fa05adef84847e433baa11f78e07fb2547f409e159a69090d3d21b730056d1bb0712baa6ffbef468d84d9302978a4f52823a60e0deb727b90b44eb423c654f8
-
Filesize
216KB
MD57fd91ab050e49bab2414f990bfc4eb72
SHA1f1f5c3347949c93279e9d571b0ba9aa1235e8186
SHA256ebb1501e7999beb8768e680b695f0b6fc58cae912c236b59fd1c631213738803
SHA51293a216d5cceef748004c0fbed741dfe67ece99229590a70dd3e50c34ea46172274fe41ad37dea6a14e5dc547f01bf4fb851bac50a8a1457353ee307bfed118ee