Analysis
-
max time kernel
144s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 12:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe
-
Size
380KB
-
MD5
1e2ee3259aa8bfd6429f823ba6b4e786
-
SHA1
b4f4db469d323a2a66952bee3c0dd6afbacdc809
-
SHA256
27e5de44444f637e46c8d6dfaf1e1afa298cde345693fdf83f0f338ce59d30bc
-
SHA512
961874e1fb5987a06c001a86d19861af19a9ce6d6a375fd2fcc896b6eab0f2647d314612741dbd5fc02a54b8980d36e832277e76bc22d7d91b7c5c4f99841854
-
SSDEEP
3072:mEGh0o+ZlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEct:mEGMl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15E8EFC2-BC89-4338-8339-0E85FC730422}\stubpath = "C:\\Windows\\{15E8EFC2-BC89-4338-8339-0E85FC730422}.exe" {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{125A0783-0DB1-48d2-9624-694597725BA3}\stubpath = "C:\\Windows\\{125A0783-0DB1-48d2-9624-694597725BA3}.exe" {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1AEB3FAC-623A-47b3-A91B-002286E2C09D} {125A0783-0DB1-48d2-9624-694597725BA3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C55AB83-4986-4c52-8398-AF859B0CC9DC} {5A8AAE8F-90F2-40e4-B938-C348DBC06A82}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{699B8BA3-83B3-40d8-B0CD-142704D86DC0}\stubpath = "C:\\Windows\\{699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe" 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15E8EFC2-BC89-4338-8339-0E85FC730422} {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38B124F5-440D-444e-A64F-2FD056F021A6} {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B} {38B124F5-440D-444e-A64F-2FD056F021A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1AEB3FAC-623A-47b3-A91B-002286E2C09D}\stubpath = "C:\\Windows\\{1AEB3FAC-623A-47b3-A91B-002286E2C09D}.exe" {125A0783-0DB1-48d2-9624-694597725BA3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A7E1A79-72D2-400e-A904-ED05CC6CCD9A} {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38B124F5-440D-444e-A64F-2FD056F021A6}\stubpath = "C:\\Windows\\{38B124F5-440D-444e-A64F-2FD056F021A6}.exe" {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4} {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{366ABE2F-60CD-4224-B621-1C3BDE58DD2B} {1AEB3FAC-623A-47b3-A91B-002286E2C09D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{366ABE2F-60CD-4224-B621-1C3BDE58DD2B}\stubpath = "C:\\Windows\\{366ABE2F-60CD-4224-B621-1C3BDE58DD2B}.exe" {1AEB3FAC-623A-47b3-A91B-002286E2C09D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C55AB83-4986-4c52-8398-AF859B0CC9DC}\stubpath = "C:\\Windows\\{8C55AB83-4986-4c52-8398-AF859B0CC9DC}.exe" {5A8AAE8F-90F2-40e4-B938-C348DBC06A82}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{699B8BA3-83B3-40d8-B0CD-142704D86DC0} 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}\stubpath = "C:\\Windows\\{8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe" {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}\stubpath = "C:\\Windows\\{0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe" {38B124F5-440D-444e-A64F-2FD056F021A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}\stubpath = "C:\\Windows\\{8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe" {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{125A0783-0DB1-48d2-9624-694597725BA3} {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A8AAE8F-90F2-40e4-B938-C348DBC06A82} {366ABE2F-60CD-4224-B621-1C3BDE58DD2B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A8AAE8F-90F2-40e4-B938-C348DBC06A82}\stubpath = "C:\\Windows\\{5A8AAE8F-90F2-40e4-B938-C348DBC06A82}.exe" {366ABE2F-60CD-4224-B621-1C3BDE58DD2B}.exe -
Deletes itself 1 IoCs
pid Process 1944 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 604 {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe 2864 {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe 2892 {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe 2880 {38B124F5-440D-444e-A64F-2FD056F021A6}.exe 2532 {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe 2348 {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe 1144 {125A0783-0DB1-48d2-9624-694597725BA3}.exe 664 {1AEB3FAC-623A-47b3-A91B-002286E2C09D}.exe 2980 {366ABE2F-60CD-4224-B621-1C3BDE58DD2B}.exe 2584 {5A8AAE8F-90F2-40e4-B938-C348DBC06A82}.exe 2408 {8C55AB83-4986-4c52-8398-AF859B0CC9DC}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe {38B124F5-440D-444e-A64F-2FD056F021A6}.exe File created C:\Windows\{125A0783-0DB1-48d2-9624-694597725BA3}.exe {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe File created C:\Windows\{1AEB3FAC-623A-47b3-A91B-002286E2C09D}.exe {125A0783-0DB1-48d2-9624-694597725BA3}.exe File created C:\Windows\{5A8AAE8F-90F2-40e4-B938-C348DBC06A82}.exe {366ABE2F-60CD-4224-B621-1C3BDE58DD2B}.exe File created C:\Windows\{8C55AB83-4986-4c52-8398-AF859B0CC9DC}.exe {5A8AAE8F-90F2-40e4-B938-C348DBC06A82}.exe File created C:\Windows\{38B124F5-440D-444e-A64F-2FD056F021A6}.exe {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe File created C:\Windows\{8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe File created C:\Windows\{15E8EFC2-BC89-4338-8339-0E85FC730422}.exe {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe File created C:\Windows\{8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe File created C:\Windows\{366ABE2F-60CD-4224-B621-1C3BDE58DD2B}.exe {1AEB3FAC-623A-47b3-A91B-002286E2C09D}.exe File created C:\Windows\{699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1476 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe Token: SeIncBasePriorityPrivilege 604 {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe Token: SeIncBasePriorityPrivilege 2864 {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe Token: SeIncBasePriorityPrivilege 2892 {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe Token: SeIncBasePriorityPrivilege 2880 {38B124F5-440D-444e-A64F-2FD056F021A6}.exe Token: SeIncBasePriorityPrivilege 2532 {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe Token: SeIncBasePriorityPrivilege 2348 {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe Token: SeIncBasePriorityPrivilege 1144 {125A0783-0DB1-48d2-9624-694597725BA3}.exe Token: SeIncBasePriorityPrivilege 664 {1AEB3FAC-623A-47b3-A91B-002286E2C09D}.exe Token: SeIncBasePriorityPrivilege 2980 {366ABE2F-60CD-4224-B621-1C3BDE58DD2B}.exe Token: SeIncBasePriorityPrivilege 2584 {5A8AAE8F-90F2-40e4-B938-C348DBC06A82}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1476 wrote to memory of 604 1476 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe 29 PID 1476 wrote to memory of 604 1476 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe 29 PID 1476 wrote to memory of 604 1476 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe 29 PID 1476 wrote to memory of 604 1476 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe 29 PID 1476 wrote to memory of 1944 1476 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe 30 PID 1476 wrote to memory of 1944 1476 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe 30 PID 1476 wrote to memory of 1944 1476 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe 30 PID 1476 wrote to memory of 1944 1476 2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe 30 PID 604 wrote to memory of 2864 604 {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe 31 PID 604 wrote to memory of 2864 604 {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe 31 PID 604 wrote to memory of 2864 604 {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe 31 PID 604 wrote to memory of 2864 604 {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe 31 PID 604 wrote to memory of 2708 604 {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe 32 PID 604 wrote to memory of 2708 604 {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe 32 PID 604 wrote to memory of 2708 604 {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe 32 PID 604 wrote to memory of 2708 604 {699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe 32 PID 2864 wrote to memory of 2892 2864 {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe 33 PID 2864 wrote to memory of 2892 2864 {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe 33 PID 2864 wrote to memory of 2892 2864 {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe 33 PID 2864 wrote to memory of 2892 2864 {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe 33 PID 2864 wrote to memory of 2992 2864 {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe 34 PID 2864 wrote to memory of 2992 2864 {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe 34 PID 2864 wrote to memory of 2992 2864 {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe 34 PID 2864 wrote to memory of 2992 2864 {8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe 34 PID 2892 wrote to memory of 2880 2892 {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe 35 PID 2892 wrote to memory of 2880 2892 {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe 35 PID 2892 wrote to memory of 2880 2892 {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe 35 PID 2892 wrote to memory of 2880 2892 {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe 35 PID 2892 wrote to memory of 2620 2892 {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe 36 PID 2892 wrote to memory of 2620 2892 {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe 36 PID 2892 wrote to memory of 2620 2892 {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe 36 PID 2892 wrote to memory of 2620 2892 {15E8EFC2-BC89-4338-8339-0E85FC730422}.exe 36 PID 2880 wrote to memory of 2532 2880 {38B124F5-440D-444e-A64F-2FD056F021A6}.exe 37 PID 2880 wrote to memory of 2532 2880 {38B124F5-440D-444e-A64F-2FD056F021A6}.exe 37 PID 2880 wrote to memory of 2532 2880 {38B124F5-440D-444e-A64F-2FD056F021A6}.exe 37 PID 2880 wrote to memory of 2532 2880 {38B124F5-440D-444e-A64F-2FD056F021A6}.exe 37 PID 2880 wrote to memory of 3004 2880 {38B124F5-440D-444e-A64F-2FD056F021A6}.exe 38 PID 2880 wrote to memory of 3004 2880 {38B124F5-440D-444e-A64F-2FD056F021A6}.exe 38 PID 2880 wrote to memory of 3004 2880 {38B124F5-440D-444e-A64F-2FD056F021A6}.exe 38 PID 2880 wrote to memory of 3004 2880 {38B124F5-440D-444e-A64F-2FD056F021A6}.exe 38 PID 2532 wrote to memory of 2348 2532 {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe 39 PID 2532 wrote to memory of 2348 2532 {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe 39 PID 2532 wrote to memory of 2348 2532 {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe 39 PID 2532 wrote to memory of 2348 2532 {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe 39 PID 2532 wrote to memory of 1364 2532 {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe 40 PID 2532 wrote to memory of 1364 2532 {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe 40 PID 2532 wrote to memory of 1364 2532 {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe 40 PID 2532 wrote to memory of 1364 2532 {0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe 40 PID 2348 wrote to memory of 1144 2348 {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe 41 PID 2348 wrote to memory of 1144 2348 {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe 41 PID 2348 wrote to memory of 1144 2348 {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe 41 PID 2348 wrote to memory of 1144 2348 {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe 41 PID 2348 wrote to memory of 3016 2348 {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe 42 PID 2348 wrote to memory of 3016 2348 {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe 42 PID 2348 wrote to memory of 3016 2348 {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe 42 PID 2348 wrote to memory of 3016 2348 {8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe 42 PID 1144 wrote to memory of 664 1144 {125A0783-0DB1-48d2-9624-694597725BA3}.exe 43 PID 1144 wrote to memory of 664 1144 {125A0783-0DB1-48d2-9624-694597725BA3}.exe 43 PID 1144 wrote to memory of 664 1144 {125A0783-0DB1-48d2-9624-694597725BA3}.exe 43 PID 1144 wrote to memory of 664 1144 {125A0783-0DB1-48d2-9624-694597725BA3}.exe 43 PID 1144 wrote to memory of 2392 1144 {125A0783-0DB1-48d2-9624-694597725BA3}.exe 44 PID 1144 wrote to memory of 2392 1144 {125A0783-0DB1-48d2-9624-694597725BA3}.exe 44 PID 1144 wrote to memory of 2392 1144 {125A0783-0DB1-48d2-9624-694597725BA3}.exe 44 PID 1144 wrote to memory of 2392 1144 {125A0783-0DB1-48d2-9624-694597725BA3}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-23_1e2ee3259aa8bfd6429f823ba6b4e786_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\{699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exeC:\Windows\{699B8BA3-83B3-40d8-B0CD-142704D86DC0}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\{8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exeC:\Windows\{8A7E1A79-72D2-400e-A904-ED05CC6CCD9A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\{15E8EFC2-BC89-4338-8339-0E85FC730422}.exeC:\Windows\{15E8EFC2-BC89-4338-8339-0E85FC730422}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\{38B124F5-440D-444e-A64F-2FD056F021A6}.exeC:\Windows\{38B124F5-440D-444e-A64F-2FD056F021A6}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\{0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exeC:\Windows\{0DFCBDC9-6CD1-4e41-9FBE-99FA40A2A46B}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\{8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exeC:\Windows\{8F2E2F04-B0AA-4204-8AA1-9CF8EB18A6D4}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\{125A0783-0DB1-48d2-9624-694597725BA3}.exeC:\Windows\{125A0783-0DB1-48d2-9624-694597725BA3}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\{1AEB3FAC-623A-47b3-A91B-002286E2C09D}.exeC:\Windows\{1AEB3FAC-623A-47b3-A91B-002286E2C09D}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:664 -
C:\Windows\{366ABE2F-60CD-4224-B621-1C3BDE58DD2B}.exeC:\Windows\{366ABE2F-60CD-4224-B621-1C3BDE58DD2B}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2980 -
C:\Windows\{5A8AAE8F-90F2-40e4-B938-C348DBC06A82}.exeC:\Windows\{5A8AAE8F-90F2-40e4-B938-C348DBC06A82}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2584 -
C:\Windows\{8C55AB83-4986-4c52-8398-AF859B0CC9DC}.exeC:\Windows\{8C55AB83-4986-4c52-8398-AF859B0CC9DC}.exe12⤵
- Executes dropped EXE
PID:2408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A8AA~1.EXE > nul12⤵PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{366AB~1.EXE > nul11⤵PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1AEB3~1.EXE > nul10⤵PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{125A0~1.EXE > nul9⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F2E2~1.EXE > nul8⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0DFCB~1.EXE > nul7⤵PID:1364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{38B12~1.EXE > nul6⤵PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{15E8E~1.EXE > nul5⤵PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8A7E1~1.EXE > nul4⤵PID:2992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{699B8~1.EXE > nul3⤵PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD535ebf3afa6fbc42274cd98b9e7204293
SHA1324cbd4f3bbf6b361bb80e6a93551a5e6f946bb5
SHA2560620c82aa9ca20a96eb200e6e5a7d2d25ebd24a668b8ea64fc178abb86910e59
SHA512839b347d225a59d3632ad7d06a1038ff09595d817b99411f9404ac4970c3825793506e00095b9729e03a2219fc0058a90aaef45b81ebdd83855d7271cd0d08e1
-
Filesize
380KB
MD55afabff251dad55cd3c217472a491206
SHA159dbc90ad03a58f9e84ca97462b6807faf3ba371
SHA256dad9012c3781b70223965d8f84722c801983b5a5e75ff74ad961a07d37c80b00
SHA51231c618152f8e1ca2369c3d574ba76fef500a00de59ebf24769f46c0b99cd4c52dffa202c4751edb34d60c1037859b2c14a5946bf73c3e3369849f8f5fbaf1980
-
Filesize
380KB
MD5f107e9fdc97d1f0eac9a7917dc7afcfb
SHA1149aeff01ea6126e094c9772be586a1df80c289e
SHA256d56f5595d675f124f743e1ae92b555159c3e2909424d038f75b96ac2076a0e61
SHA5128735b8b5ad5511b84841641d7af9fd694f9659f2b54a00ff5ed71c11d2b7ba72241747e3f648e5889fe328182657758541bad29ff85ef02b3da2898ecc3d8192
-
Filesize
380KB
MD5335c3afdad6c10e6ce2706ca7722e513
SHA1b7b2b15b3cd9a36f2914dcbb61f48287d39944ba
SHA256c551ab17e77208464645abe13ad0d9e41f48872cea2980431a3bcfb7bc400d90
SHA5122e9b08507756150bf6bba9c430ac311a084df67af2137d98331cb8aa49d3813fa5864f413762d3a0189995ea8c8501a90397f6afc55ef278455c93401b6942c7
-
Filesize
380KB
MD50c8c04a520bcb3f4923ea06c88abe709
SHA1bf04a95c13016cfd6d6d97502273f5283bcd4d52
SHA256cb5732ccb2b86f1bb283989dce8dd62fbfdfd074eeb5d3fcbf725b5bffc2d905
SHA51263b3cda195280a54616dada13b5b1bdf3a10a9587f359bfa3c99a87e194c5b2c9e483f883b7d68146acc31d0931b5d3bafd6bd5fd2a8af9e89a5ee65684e2961
-
Filesize
380KB
MD5876f09a6d1712d041079a904453267ef
SHA16e84dd8d9989f96e1438e64af051725f1bdcca6c
SHA256d2769ec628b450b66c0d10106f3710dfb59042b6f5177201a690261c0d5f3104
SHA512f399465488be40cea8be6687fae0e69e1da4285780843c9105157bfe1b228721987d0a81b96ba02fc87fc7d688c236899468b41bf602807880af4e3b8dfd6285
-
Filesize
380KB
MD536222fb9c5779ed877819fa6c3954b0e
SHA1143d6b9aedf6ac638d66412eea3eebd187ed820e
SHA256917b00f5d11fcced8e20329d5a3b88aaac9bcbc967f67640d3abaefcd55cf43d
SHA5129941c378c56184457d0a79da1f565227db3757cec128851954fdeb08b76dc46eeffd8d8de279227e0298046ae442e947c4df257ed57def8286d7f77caa55f7e0
-
Filesize
380KB
MD56ce1728216b95d440a38831d6e728cfa
SHA139dee73f7254dd8cbd6f6528783d12ef2ac58810
SHA256f916633b74625f380d7c21ca2c9eeb55c84beeaa4d8f4ec5507afbae8ade56ec
SHA5129f711ec1336bbcdd42b124194c5bfa36e9c2d26a5ff2ac3d64e3301c993da7ba45aac295786c0e54f0a32a50299ca32484b04c209131d67295907c4e1c7faaec
-
Filesize
380KB
MD5685feabc64a8fb7ef68bb4edd6ec1ce9
SHA1a4a67e453d7d5745203aafd5c0214fb143dc8763
SHA256170de818179bc7dc732399d3557a386525f587203883a39a943630bd1d14bceb
SHA5128f3b38d4e547700a98a17987dc3459810d440b7456cb285b903f23f0f536cb3029a6975496d7bbe66a388647e69d621191353ced7c9345c8d4ce4d0ed1a23404
-
Filesize
380KB
MD598df69b04f1ccfdc7798788a97448654
SHA1b77aa4b46277d1c0cb115ad9da0088b1b0925d99
SHA256badc6674f6be365d38d29c9286f39222153d44455c7539b15c38e7e7ed421b9f
SHA512c57ce7e083a82bc604e5676d45e06296d3dc4d3f9d1b2209e5678972493806b9361cc353e3c543e31606e33a4519777c1a44d60b0843aa069790d4e05ce54c1c
-
Filesize
380KB
MD5eaba2cfbb27626998978e7342e6199ba
SHA19fe707ae21a8b14e6ebcd6dc072008614c45892d
SHA25662a10aa3bc02f3b68419c18e6dfaf91265cd8ec8932e7901bdaca21d25cbcb8c
SHA512019d934b9042077db169198297531f7597fc59c97d64544dc4a7c9cb6ca78f9d0bd2f6e6a4e2c8e31bd2d21b6f358a9ed956d0d094db797936332cccf775c590