Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe
-
Size
408KB
-
MD5
2ac8f98cf65f94bd698cdca803e6ea7c
-
SHA1
bb043d61d39ef15db486f5aef70d9f269604fcfe
-
SHA256
b32070931fb6dcb1a68dbdf756f473dbb19ea11621a0a96981015347ddbc9d96
-
SHA512
012d3c30cf0139413d60d8e17ebd935f771556a92cb9098b842d046f48231cc7fe274628c4e5de85e59f11bbb45c9066ddc307f1a2246d9188926b05a9078bad
-
SSDEEP
3072:CEGh0oSl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEG4ldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B75E55D4-BEA6-49e1-8B5D-72E31179CB25}\stubpath = "C:\\Windows\\{B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe" 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F3590CAC-CDD8-4f8b-A115-61D5869915E6} {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}\stubpath = "C:\\Windows\\{B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe" {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{373A8672-1575-4bd3-8395-D71653092EB9} {9844CE02-60C4-4799-9FC6-420037BEAA28}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70A340B8-1874-40ea-A3E0-91D99D76C6D2}\stubpath = "C:\\Windows\\{70A340B8-1874-40ea-A3E0-91D99D76C6D2}.exe" {373A8672-1575-4bd3-8395-D71653092EB9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E5386D3A-5E61-4e1b-8415-553E7101969E}\stubpath = "C:\\Windows\\{E5386D3A-5E61-4e1b-8415-553E7101969E}.exe" {70A340B8-1874-40ea-A3E0-91D99D76C6D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECBFAA53-B7A4-400c-8D3E-D1A94B48C767} {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9B627ED3-8AFA-47e0-B312-9D873B177F3A}\stubpath = "C:\\Windows\\{9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe" {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B92379C0-11B2-43fc-81D7-6D0C94F2D9FB} {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9844CE02-60C4-4799-9FC6-420037BEAA28} {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70A340B8-1874-40ea-A3E0-91D99D76C6D2} {373A8672-1575-4bd3-8395-D71653092EB9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70} {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F3590CAC-CDD8-4f8b-A115-61D5869915E6}\stubpath = "C:\\Windows\\{F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe" {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80D671C4-4E2D-40fa-8861-60867C7F7202} {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80D671C4-4E2D-40fa-8861-60867C7F7202}\stubpath = "C:\\Windows\\{80D671C4-4E2D-40fa-8861-60867C7F7202}.exe" {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E5386D3A-5E61-4e1b-8415-553E7101969E} {70A340B8-1874-40ea-A3E0-91D99D76C6D2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{373A8672-1575-4bd3-8395-D71653092EB9}\stubpath = "C:\\Windows\\{373A8672-1575-4bd3-8395-D71653092EB9}.exe" {9844CE02-60C4-4799-9FC6-420037BEAA28}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B75E55D4-BEA6-49e1-8B5D-72E31179CB25} 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}\stubpath = "C:\\Windows\\{A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe" {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}\stubpath = "C:\\Windows\\{ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe" {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9B627ED3-8AFA-47e0-B312-9D873B177F3A} {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9844CE02-60C4-4799-9FC6-420037BEAA28}\stubpath = "C:\\Windows\\{9844CE02-60C4-4799-9FC6-420037BEAA28}.exe" {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe -
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2872 {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe 2616 {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe 2432 {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe 2064 {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe 2060 {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe 2972 {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe 1068 {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe 1948 {9844CE02-60C4-4799-9FC6-420037BEAA28}.exe 2364 {373A8672-1575-4bd3-8395-D71653092EB9}.exe 548 {70A340B8-1874-40ea-A3E0-91D99D76C6D2}.exe 1060 {E5386D3A-5E61-4e1b-8415-553E7101969E}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{9844CE02-60C4-4799-9FC6-420037BEAA28}.exe {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe File created C:\Windows\{373A8672-1575-4bd3-8395-D71653092EB9}.exe {9844CE02-60C4-4799-9FC6-420037BEAA28}.exe File created C:\Windows\{E5386D3A-5E61-4e1b-8415-553E7101969E}.exe {70A340B8-1874-40ea-A3E0-91D99D76C6D2}.exe File created C:\Windows\{F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe File created C:\Windows\{ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe File created C:\Windows\{9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe File created C:\Windows\{80D671C4-4E2D-40fa-8861-60867C7F7202}.exe {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe File created C:\Windows\{70A340B8-1874-40ea-A3E0-91D99D76C6D2}.exe {373A8672-1575-4bd3-8395-D71653092EB9}.exe File created C:\Windows\{B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe File created C:\Windows\{A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe File created C:\Windows\{B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2760 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe Token: SeIncBasePriorityPrivilege 2872 {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe Token: SeIncBasePriorityPrivilege 2616 {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe Token: SeIncBasePriorityPrivilege 2432 {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe Token: SeIncBasePriorityPrivilege 2064 {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe Token: SeIncBasePriorityPrivilege 2060 {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe Token: SeIncBasePriorityPrivilege 2972 {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe Token: SeIncBasePriorityPrivilege 1068 {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe Token: SeIncBasePriorityPrivilege 1948 {9844CE02-60C4-4799-9FC6-420037BEAA28}.exe Token: SeIncBasePriorityPrivilege 2364 {373A8672-1575-4bd3-8395-D71653092EB9}.exe Token: SeIncBasePriorityPrivilege 548 {70A340B8-1874-40ea-A3E0-91D99D76C6D2}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2872 2760 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe 30 PID 2760 wrote to memory of 2872 2760 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe 30 PID 2760 wrote to memory of 2872 2760 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe 30 PID 2760 wrote to memory of 2872 2760 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe 30 PID 2760 wrote to memory of 2748 2760 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe 31 PID 2760 wrote to memory of 2748 2760 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe 31 PID 2760 wrote to memory of 2748 2760 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe 31 PID 2760 wrote to memory of 2748 2760 2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe 31 PID 2872 wrote to memory of 2616 2872 {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe 33 PID 2872 wrote to memory of 2616 2872 {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe 33 PID 2872 wrote to memory of 2616 2872 {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe 33 PID 2872 wrote to memory of 2616 2872 {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe 33 PID 2872 wrote to memory of 2660 2872 {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe 34 PID 2872 wrote to memory of 2660 2872 {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe 34 PID 2872 wrote to memory of 2660 2872 {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe 34 PID 2872 wrote to memory of 2660 2872 {B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe 34 PID 2616 wrote to memory of 2432 2616 {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe 35 PID 2616 wrote to memory of 2432 2616 {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe 35 PID 2616 wrote to memory of 2432 2616 {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe 35 PID 2616 wrote to memory of 2432 2616 {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe 35 PID 2616 wrote to memory of 1088 2616 {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe 36 PID 2616 wrote to memory of 1088 2616 {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe 36 PID 2616 wrote to memory of 1088 2616 {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe 36 PID 2616 wrote to memory of 1088 2616 {A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe 36 PID 2432 wrote to memory of 2064 2432 {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe 37 PID 2432 wrote to memory of 2064 2432 {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe 37 PID 2432 wrote to memory of 2064 2432 {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe 37 PID 2432 wrote to memory of 2064 2432 {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe 37 PID 2432 wrote to memory of 2160 2432 {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe 38 PID 2432 wrote to memory of 2160 2432 {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe 38 PID 2432 wrote to memory of 2160 2432 {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe 38 PID 2432 wrote to memory of 2160 2432 {F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe 38 PID 2064 wrote to memory of 2060 2064 {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe 39 PID 2064 wrote to memory of 2060 2064 {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe 39 PID 2064 wrote to memory of 2060 2064 {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe 39 PID 2064 wrote to memory of 2060 2064 {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe 39 PID 2064 wrote to memory of 3016 2064 {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe 40 PID 2064 wrote to memory of 3016 2064 {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe 40 PID 2064 wrote to memory of 3016 2064 {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe 40 PID 2064 wrote to memory of 3016 2064 {ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe 40 PID 2060 wrote to memory of 2972 2060 {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe 41 PID 2060 wrote to memory of 2972 2060 {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe 41 PID 2060 wrote to memory of 2972 2060 {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe 41 PID 2060 wrote to memory of 2972 2060 {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe 41 PID 2060 wrote to memory of 2992 2060 {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe 42 PID 2060 wrote to memory of 2992 2060 {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe 42 PID 2060 wrote to memory of 2992 2060 {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe 42 PID 2060 wrote to memory of 2992 2060 {9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe 42 PID 2972 wrote to memory of 1068 2972 {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe 43 PID 2972 wrote to memory of 1068 2972 {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe 43 PID 2972 wrote to memory of 1068 2972 {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe 43 PID 2972 wrote to memory of 1068 2972 {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe 43 PID 2972 wrote to memory of 2584 2972 {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe 44 PID 2972 wrote to memory of 2584 2972 {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe 44 PID 2972 wrote to memory of 2584 2972 {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe 44 PID 2972 wrote to memory of 2584 2972 {B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe 44 PID 1068 wrote to memory of 1948 1068 {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe 45 PID 1068 wrote to memory of 1948 1068 {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe 45 PID 1068 wrote to memory of 1948 1068 {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe 45 PID 1068 wrote to memory of 1948 1068 {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe 45 PID 1068 wrote to memory of 1224 1068 {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe 46 PID 1068 wrote to memory of 1224 1068 {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe 46 PID 1068 wrote to memory of 1224 1068 {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe 46 PID 1068 wrote to memory of 1224 1068 {80D671C4-4E2D-40fa-8861-60867C7F7202}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-23_2ac8f98cf65f94bd698cdca803e6ea7c_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\{B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exeC:\Windows\{B75E55D4-BEA6-49e1-8B5D-72E31179CB25}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exeC:\Windows\{A65CF6B0-6AC2-4118-A2BF-6DF21E01FB70}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\{F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exeC:\Windows\{F3590CAC-CDD8-4f8b-A115-61D5869915E6}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\{ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exeC:\Windows\{ECBFAA53-B7A4-400c-8D3E-D1A94B48C767}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\{9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exeC:\Windows\{9B627ED3-8AFA-47e0-B312-9D873B177F3A}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\{B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exeC:\Windows\{B92379C0-11B2-43fc-81D7-6D0C94F2D9FB}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{80D671C4-4E2D-40fa-8861-60867C7F7202}.exeC:\Windows\{80D671C4-4E2D-40fa-8861-60867C7F7202}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\{9844CE02-60C4-4799-9FC6-420037BEAA28}.exeC:\Windows\{9844CE02-60C4-4799-9FC6-420037BEAA28}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1948 -
C:\Windows\{373A8672-1575-4bd3-8395-D71653092EB9}.exeC:\Windows\{373A8672-1575-4bd3-8395-D71653092EB9}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2364 -
C:\Windows\{70A340B8-1874-40ea-A3E0-91D99D76C6D2}.exeC:\Windows\{70A340B8-1874-40ea-A3E0-91D99D76C6D2}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:548 -
C:\Windows\{E5386D3A-5E61-4e1b-8415-553E7101969E}.exeC:\Windows\{E5386D3A-5E61-4e1b-8415-553E7101969E}.exe12⤵
- Executes dropped EXE
PID:1060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70A34~1.EXE > nul12⤵PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{373A8~1.EXE > nul11⤵PID:2244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9844C~1.EXE > nul10⤵PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80D67~1.EXE > nul9⤵PID:1224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B9237~1.EXE > nul8⤵PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9B627~1.EXE > nul7⤵PID:2992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ECBFA~1.EXE > nul6⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F3590~1.EXE > nul5⤵PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A65CF~1.EXE > nul4⤵PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B75E5~1.EXE > nul3⤵PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD577d5ee2e77569d7e6a8e3205f101932b
SHA17111806810dcf4bcaae51ee12f7219ada70b49bb
SHA256dc161d544388b5b22d4daddfca5587dd5d6ea4bb0f0dc66b18a94cee7d085d50
SHA512d8b178da38f96632f6272abbf3613d3690679b889cd5ca03ac2d20671494a1378b2c34444cc703d296fa45656f2bf7eb5b2439be9b43a9afb1468cdbfad14f38
-
Filesize
408KB
MD51a22400fd572414037b58b966a2d36be
SHA1d70e3d8fc03ea78c3fa419a4ba975c7be28c6a4a
SHA256b30f3b54ca48a0076ef1611b2cac87a4e7f71c3b14d52cb65c9002c6d7b6646a
SHA512b8520aad439b88b99779d09d096ee8b796084e7afb9dcdda4a9d9245951703d8cb3f3d45c800d800b7913bf81405bb970b9872881640a303fd72aba9ca2ead60
-
Filesize
408KB
MD54881332b17f842e361198f4267f35ea1
SHA119e0943a96e291f0adfd4e2d61997f3696db8f49
SHA256fe77d2968f4d5752eb8c30861543f9419b50c4da4bb93995467d9accc5d0f255
SHA512bdb0d66d5bd80903970c6ed961b390c5849bf192353265ecb47eda39467900e01834a3adc048aeed75fee61c35c5a435753a128568fe5d2c7d3ac03f151a727f
-
Filesize
408KB
MD5cc71d640869a8718c8696c8939130d78
SHA13fcbd5b31c973d4657fdd43d19fd31addaabc921
SHA256da380f525d9227a7f8b312c7bcbfe50fd4d0e0a64117b2005594d82a179291dd
SHA5120549c3e42b36b52e31ff8dd9a1a4a06d9efa05f98153ae7ad0d8c8fe31e96576a8f606bfef6adf6ea6621955107a1c78a9eeea7927f5947c8ba525a2453ae5d7
-
Filesize
408KB
MD57dd1b45deb55db2112ae456829d34c80
SHA1e208d466f357fdc7d69da812e6469f31907d359a
SHA256c81cb8efb12100af38cb0884a1babe93630fecd7509a4ed194e4060676741f5f
SHA5126675fc9894835b3ea4e126e3f11e2d4015569ac8cee9809f3c8eb61f89a4de3952b2ba04539ac5c80ea96b8e008a8d936287980a846dffce5149ce14dd04435f
-
Filesize
408KB
MD54a137a8ebb03bce6133f262dd559a996
SHA1e03b2b951e830725b1032e46a39d77cd731f00b9
SHA256c00e6c6bb71a43f792d130f95211a386843f973cc9c48ca7a79aaa7c870d9c05
SHA5124888b6c4d4800efd4454725214fc982396f15436413ce61410d53d7d808c5335adfa9fd229e64850c17eabdb8bc0dd2c3b01fedaef8d621b12e9e5abc130852d
-
Filesize
408KB
MD5b8164dd39d5071461d69993daac5fbd1
SHA1b28d39b846b7fedf944aa1ef952e2511bef09e79
SHA2565a6ae7a65ab1e714625534b8c8fcd42c4f9cf8be39096a98ecb563d6e86a2365
SHA5126a70c2ec6901df838dfd3fcd95fe21939cda8778d724fd536c5a84f0125e528c6ee0077f2af40d801612bae696229f3f932dd3c527e82f41ee08c50dba166d44
-
Filesize
408KB
MD5165bc17adbc913d4793fae5e52c90f97
SHA13544136a34fa7bd7687b649498d8681109e58ffd
SHA256653109ecc3127c8af1321651a5b8b81caacc777233014a4ee3ef8e9e92a6e41f
SHA5126c7d0ab391c3eff382031cc9fcc64616f117b6c12a77c5bb26bb822f79ace6eda1aba9ac16082a31e0b82372c2c25d862f5f4c9581edb886cf9da5bc2f72b5d7
-
Filesize
408KB
MD5f09d89dbb63fe4978f5c912966df8da3
SHA1ec8a1ed3cbd8a0adb53c6673fc7625ec202d2ba9
SHA2560ecc60f41f997cc15b72519b2c81ac8f0b0e86a9c4a0c83cb19a2d61394f3fa8
SHA512233a7f8699809a7e562461c23dfa6d2145cbe9d35986279d1b69125e4a0fb45d087b19ec1188f3f8154f87f3255c6ebad15c280c437581aaed8cd4c2f74ccedd
-
Filesize
408KB
MD59b2aad803c821846bb5524ec9d9d3578
SHA130f978a9bae19a34ad317a60be4a4a25973461b6
SHA25654d57edbd3daea28f8b6917ea84d59c42ec15c688f87839ff198d61d57383652
SHA512769bf2dba82caf814509f043b3468cc1bc02a4643782b83c16871f9722e6efc8f4258e6734cabd7b51b26e743d39f5e66a49b82821674986b51b5de8980b2ccb
-
Filesize
408KB
MD55620a4ef4ea989e017c5afde39bb7946
SHA13dea4f6ad8c9fbb34f3247d47fc0f38a340c60d8
SHA2563cadcd1e65610d6877fb48c9ec88d9b91129f78d23f5fbf99b0496361e61a8a0
SHA512969325e154fc2708b140643c953ab06f002ea0435e1a1b4b74be0addcdf4b390500ec7bf5c1d00cc0f7cb0baa8590166a2365e2c8f3129453cfb8204d8ce19d0