Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 13:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe
-
Size
197KB
-
MD5
636a990fb1e379e3e3040850d4051c85
-
SHA1
46e15982169a5abece2ef00c8d54f5cb0e97b020
-
SHA256
948e9189acdf78f1322f86ea95ca77bb45d9f39ec19cdc8cdf3caaf6618123b5
-
SHA512
6458b541cd286796bf43a70428bdf76301be24d9294c83300a955036d10a486dd54bb6caffc920c3b7754fae09be9f8b38c0be33f575143498132b7c9b2b541d
-
SSDEEP
3072:jEGh0o4l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGalEeKcAEca
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{791C884A-1D88-435a-8F7E-139F8C371BA0} {C242975F-B735-4798-8C34-771952CA1940}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7190E1D0-DB9B-4d70-9893-C59CEE8AF177}\stubpath = "C:\\Windows\\{7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe" {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{77A0D099-3EC1-4093-88FA-DF055794844A} {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DE0F8D78-C962-4395-A401-B5A1AFEFB2BC} {498A4987-1D23-4806-9A27-491A276A6845}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C242975F-B735-4798-8C34-771952CA1940}\stubpath = "C:\\Windows\\{C242975F-B735-4798-8C34-771952CA1940}.exe" {114F3409-4A28-4eff-A542-A3D4817CE865}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C242975F-B735-4798-8C34-771952CA1940} {114F3409-4A28-4eff-A542-A3D4817CE865}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{77A0D099-3EC1-4093-88FA-DF055794844A}\stubpath = "C:\\Windows\\{77A0D099-3EC1-4093-88FA-DF055794844A}.exe" {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF20663C-1D5E-4425-9CEF-92A2E4AF3F5D} {1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}\stubpath = "C:\\Windows\\{1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe" 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{791C884A-1D88-435a-8F7E-139F8C371BA0}\stubpath = "C:\\Windows\\{791C884A-1D88-435a-8F7E-139F8C371BA0}.exe" {C242975F-B735-4798-8C34-771952CA1940}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A} {DE0F8D78-C962-4395-A401-B5A1AFEFB2BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A}\stubpath = "C:\\Windows\\{1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A}.exe" {DE0F8D78-C962-4395-A401-B5A1AFEFB2BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{114F3409-4A28-4eff-A542-A3D4817CE865}\stubpath = "C:\\Windows\\{114F3409-4A28-4eff-A542-A3D4817CE865}.exe" {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1637F82B-6D09-4d5f-A169-35A621F52EA9} {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1637F82B-6D09-4d5f-A169-35A621F52EA9}\stubpath = "C:\\Windows\\{1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe" {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{114F3409-4A28-4eff-A542-A3D4817CE865} {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7190E1D0-DB9B-4d70-9893-C59CEE8AF177} {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{498A4987-1D23-4806-9A27-491A276A6845} {77A0D099-3EC1-4093-88FA-DF055794844A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{498A4987-1D23-4806-9A27-491A276A6845}\stubpath = "C:\\Windows\\{498A4987-1D23-4806-9A27-491A276A6845}.exe" {77A0D099-3EC1-4093-88FA-DF055794844A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DE0F8D78-C962-4395-A401-B5A1AFEFB2BC}\stubpath = "C:\\Windows\\{DE0F8D78-C962-4395-A401-B5A1AFEFB2BC}.exe" {498A4987-1D23-4806-9A27-491A276A6845}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC} 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF20663C-1D5E-4425-9CEF-92A2E4AF3F5D}\stubpath = "C:\\Windows\\{CF20663C-1D5E-4425-9CEF-92A2E4AF3F5D}.exe" {1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A}.exe -
Deletes itself 1 IoCs
pid Process 1916 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2352 {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe 2820 {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe 2708 {114F3409-4A28-4eff-A542-A3D4817CE865}.exe 2892 {C242975F-B735-4798-8C34-771952CA1940}.exe 2204 {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe 2884 {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe 2868 {77A0D099-3EC1-4093-88FA-DF055794844A}.exe 608 {498A4987-1D23-4806-9A27-491A276A6845}.exe 2068 {DE0F8D78-C962-4395-A401-B5A1AFEFB2BC}.exe 1268 {1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A}.exe 628 {CF20663C-1D5E-4425-9CEF-92A2E4AF3F5D}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{CF20663C-1D5E-4425-9CEF-92A2E4AF3F5D}.exe {1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A}.exe File created C:\Windows\{C242975F-B735-4798-8C34-771952CA1940}.exe {114F3409-4A28-4eff-A542-A3D4817CE865}.exe File created C:\Windows\{7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe File created C:\Windows\{498A4987-1D23-4806-9A27-491A276A6845}.exe {77A0D099-3EC1-4093-88FA-DF055794844A}.exe File created C:\Windows\{DE0F8D78-C962-4395-A401-B5A1AFEFB2BC}.exe {498A4987-1D23-4806-9A27-491A276A6845}.exe File created C:\Windows\{77A0D099-3EC1-4093-88FA-DF055794844A}.exe {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe File created C:\Windows\{1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A}.exe {DE0F8D78-C962-4395-A401-B5A1AFEFB2BC}.exe File created C:\Windows\{1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe File created C:\Windows\{1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe File created C:\Windows\{114F3409-4A28-4eff-A542-A3D4817CE865}.exe {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe File created C:\Windows\{791C884A-1D88-435a-8F7E-139F8C371BA0}.exe {C242975F-B735-4798-8C34-771952CA1940}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1952 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe Token: SeIncBasePriorityPrivilege 2352 {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe Token: SeIncBasePriorityPrivilege 2820 {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe Token: SeIncBasePriorityPrivilege 2708 {114F3409-4A28-4eff-A542-A3D4817CE865}.exe Token: SeIncBasePriorityPrivilege 2892 {C242975F-B735-4798-8C34-771952CA1940}.exe Token: SeIncBasePriorityPrivilege 2204 {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe Token: SeIncBasePriorityPrivilege 2884 {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe Token: SeIncBasePriorityPrivilege 2868 {77A0D099-3EC1-4093-88FA-DF055794844A}.exe Token: SeIncBasePriorityPrivilege 608 {498A4987-1D23-4806-9A27-491A276A6845}.exe Token: SeIncBasePriorityPrivilege 2068 {DE0F8D78-C962-4395-A401-B5A1AFEFB2BC}.exe Token: SeIncBasePriorityPrivilege 1268 {1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2352 1952 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe 30 PID 1952 wrote to memory of 2352 1952 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe 30 PID 1952 wrote to memory of 2352 1952 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe 30 PID 1952 wrote to memory of 2352 1952 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe 30 PID 1952 wrote to memory of 1916 1952 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe 31 PID 1952 wrote to memory of 1916 1952 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe 31 PID 1952 wrote to memory of 1916 1952 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe 31 PID 1952 wrote to memory of 1916 1952 2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe 31 PID 2352 wrote to memory of 2820 2352 {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe 33 PID 2352 wrote to memory of 2820 2352 {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe 33 PID 2352 wrote to memory of 2820 2352 {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe 33 PID 2352 wrote to memory of 2820 2352 {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe 33 PID 2352 wrote to memory of 2804 2352 {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe 34 PID 2352 wrote to memory of 2804 2352 {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe 34 PID 2352 wrote to memory of 2804 2352 {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe 34 PID 2352 wrote to memory of 2804 2352 {1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe 34 PID 2820 wrote to memory of 2708 2820 {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe 35 PID 2820 wrote to memory of 2708 2820 {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe 35 PID 2820 wrote to memory of 2708 2820 {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe 35 PID 2820 wrote to memory of 2708 2820 {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe 35 PID 2820 wrote to memory of 2964 2820 {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe 36 PID 2820 wrote to memory of 2964 2820 {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe 36 PID 2820 wrote to memory of 2964 2820 {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe 36 PID 2820 wrote to memory of 2964 2820 {1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe 36 PID 2708 wrote to memory of 2892 2708 {114F3409-4A28-4eff-A542-A3D4817CE865}.exe 37 PID 2708 wrote to memory of 2892 2708 {114F3409-4A28-4eff-A542-A3D4817CE865}.exe 37 PID 2708 wrote to memory of 2892 2708 {114F3409-4A28-4eff-A542-A3D4817CE865}.exe 37 PID 2708 wrote to memory of 2892 2708 {114F3409-4A28-4eff-A542-A3D4817CE865}.exe 37 PID 2708 wrote to memory of 2604 2708 {114F3409-4A28-4eff-A542-A3D4817CE865}.exe 38 PID 2708 wrote to memory of 2604 2708 {114F3409-4A28-4eff-A542-A3D4817CE865}.exe 38 PID 2708 wrote to memory of 2604 2708 {114F3409-4A28-4eff-A542-A3D4817CE865}.exe 38 PID 2708 wrote to memory of 2604 2708 {114F3409-4A28-4eff-A542-A3D4817CE865}.exe 38 PID 2892 wrote to memory of 2204 2892 {C242975F-B735-4798-8C34-771952CA1940}.exe 39 PID 2892 wrote to memory of 2204 2892 {C242975F-B735-4798-8C34-771952CA1940}.exe 39 PID 2892 wrote to memory of 2204 2892 {C242975F-B735-4798-8C34-771952CA1940}.exe 39 PID 2892 wrote to memory of 2204 2892 {C242975F-B735-4798-8C34-771952CA1940}.exe 39 PID 2892 wrote to memory of 2164 2892 {C242975F-B735-4798-8C34-771952CA1940}.exe 40 PID 2892 wrote to memory of 2164 2892 {C242975F-B735-4798-8C34-771952CA1940}.exe 40 PID 2892 wrote to memory of 2164 2892 {C242975F-B735-4798-8C34-771952CA1940}.exe 40 PID 2892 wrote to memory of 2164 2892 {C242975F-B735-4798-8C34-771952CA1940}.exe 40 PID 2204 wrote to memory of 2884 2204 {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe 41 PID 2204 wrote to memory of 2884 2204 {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe 41 PID 2204 wrote to memory of 2884 2204 {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe 41 PID 2204 wrote to memory of 2884 2204 {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe 41 PID 2204 wrote to memory of 2864 2204 {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe 42 PID 2204 wrote to memory of 2864 2204 {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe 42 PID 2204 wrote to memory of 2864 2204 {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe 42 PID 2204 wrote to memory of 2864 2204 {791C884A-1D88-435a-8F7E-139F8C371BA0}.exe 42 PID 2884 wrote to memory of 2868 2884 {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe 43 PID 2884 wrote to memory of 2868 2884 {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe 43 PID 2884 wrote to memory of 2868 2884 {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe 43 PID 2884 wrote to memory of 2868 2884 {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe 43 PID 2884 wrote to memory of 680 2884 {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe 44 PID 2884 wrote to memory of 680 2884 {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe 44 PID 2884 wrote to memory of 680 2884 {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe 44 PID 2884 wrote to memory of 680 2884 {7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe 44 PID 2868 wrote to memory of 608 2868 {77A0D099-3EC1-4093-88FA-DF055794844A}.exe 45 PID 2868 wrote to memory of 608 2868 {77A0D099-3EC1-4093-88FA-DF055794844A}.exe 45 PID 2868 wrote to memory of 608 2868 {77A0D099-3EC1-4093-88FA-DF055794844A}.exe 45 PID 2868 wrote to memory of 608 2868 {77A0D099-3EC1-4093-88FA-DF055794844A}.exe 45 PID 2868 wrote to memory of 1904 2868 {77A0D099-3EC1-4093-88FA-DF055794844A}.exe 46 PID 2868 wrote to memory of 1904 2868 {77A0D099-3EC1-4093-88FA-DF055794844A}.exe 46 PID 2868 wrote to memory of 1904 2868 {77A0D099-3EC1-4093-88FA-DF055794844A}.exe 46 PID 2868 wrote to memory of 1904 2868 {77A0D099-3EC1-4093-88FA-DF055794844A}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-23_636a990fb1e379e3e3040850d4051c85_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\{1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exeC:\Windows\{1854C5FD-4FE7-4a58-A2C1-CEE24E4F94EC}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\{1637F82B-6D09-4d5f-A169-35A621F52EA9}.exeC:\Windows\{1637F82B-6D09-4d5f-A169-35A621F52EA9}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\{114F3409-4A28-4eff-A542-A3D4817CE865}.exeC:\Windows\{114F3409-4A28-4eff-A542-A3D4817CE865}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\{C242975F-B735-4798-8C34-771952CA1940}.exeC:\Windows\{C242975F-B735-4798-8C34-771952CA1940}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\{791C884A-1D88-435a-8F7E-139F8C371BA0}.exeC:\Windows\{791C884A-1D88-435a-8F7E-139F8C371BA0}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\{7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exeC:\Windows\{7190E1D0-DB9B-4d70-9893-C59CEE8AF177}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\{77A0D099-3EC1-4093-88FA-DF055794844A}.exeC:\Windows\{77A0D099-3EC1-4093-88FA-DF055794844A}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\{498A4987-1D23-4806-9A27-491A276A6845}.exeC:\Windows\{498A4987-1D23-4806-9A27-491A276A6845}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:608 -
C:\Windows\{DE0F8D78-C962-4395-A401-B5A1AFEFB2BC}.exeC:\Windows\{DE0F8D78-C962-4395-A401-B5A1AFEFB2BC}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2068 -
C:\Windows\{1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A}.exeC:\Windows\{1786AAF6-C0EA-43c1-AD74-2B4FCB790B8A}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1268 -
C:\Windows\{CF20663C-1D5E-4425-9CEF-92A2E4AF3F5D}.exeC:\Windows\{CF20663C-1D5E-4425-9CEF-92A2E4AF3F5D}.exe12⤵
- Executes dropped EXE
PID:628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1786A~1.EXE > nul12⤵PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DE0F8~1.EXE > nul11⤵PID:876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{498A4~1.EXE > nul10⤵PID:1316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{77A0D~1.EXE > nul9⤵PID:1904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7190E~1.EXE > nul8⤵PID:680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{791C8~1.EXE > nul7⤵PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2429~1.EXE > nul6⤵PID:2164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{114F3~1.EXE > nul5⤵PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1637F~1.EXE > nul4⤵PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1854C~1.EXE > nul3⤵PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD50d656f0bc5f3ce79e64adb4bd9388656
SHA1928000d28c37c8a04df386ccfd02156c255735d9
SHA256ffc264610d14e12f35389a8220f8f5025fd71687380241d48a24dc6a3fc86ba7
SHA5129ee1e3137f15328829b7e71891feb0fd935f476b4aa6839699e1d2263876ac3b371b8be8110472de19c2df4b08eb470ef58ea3a72ea884621f69ce99b8fec21e
-
Filesize
197KB
MD5f244a40e8cee6da2ceb65724c59cd2a3
SHA1fabc1e98eaa1e083d510529f1db92bcc56bc5586
SHA256d2b1272be7259d9d9c827a536351ecbba722b70c2e72da2df23f9d2d67f178fd
SHA5126c31e945adb7e7ae5edbe5365d70d330f5f25f8336d7bd1ca51149fa93813c86da300e4328fbd5fbbb3587ac7d502f44df4ed205ef9dfe27fce3e33312404968
-
Filesize
197KB
MD548329801155be2ec3f6961798d280c34
SHA190ddb79d561495fbd6d0f7fb3a69bb4a75b2bba6
SHA256341e154cca0eea146a4d23143cf8efedee24cee2a226e9926c083c95dbf75841
SHA5127188a145864c2f8fbc91eb2d91b57c196df45177b6b46d8e69c424bb0d49f5f738e63aae6129d6a873ff9d358bea6af4697197eadcc0db03d6349c412cfedea8
-
Filesize
197KB
MD54122d6452ec551e751a91a505c505059
SHA1366bc2dc6d101d1a0ba2826839281f083c15c11f
SHA256bac57fbd4efca4c94549d6e87411dd3ea755c07e65f6386088def2cabe681c9a
SHA51230eae00a8f625655ec75e7deef98a15feb9ed89cc9bacccfcbe9e6a039779eb3d86c8522e4b2bd767166beac05db309f1cb4af77796a3bb42e2106457d5dbda7
-
Filesize
197KB
MD5d3d9f6d31890fa4beaf0db2bf1e6ecb8
SHA1141a9c54833d0cbf15b2cf348b4fe0e96f898eac
SHA256c320922efd70c5cf7792950bc51087d770831c313a733ae1cd5e96fc7dc54495
SHA512341baa097294d1b9a39676e36ace05f3277c20ecddb4856657eea4fb62841b18c3ec0038639a6706774dc2d22878978e583a9d6866fc759f2854a94ea0a55b58
-
Filesize
197KB
MD589f700a9194ca894c0bdf28e4313b919
SHA1e19143efe140b0c4623d7b641df2b19c9cd51cd6
SHA2565e00e14cf9c0a0f435d4aab03d888e515541c8a19b7d595feb47f57ce0bdf38e
SHA5127f0fce86e542ee203dc296c5cac2d3757b87101de5dc6e6f1b02411d541251c5721263678b0ffc31d9b07076038fa5bd2391714fd802144da821f9a3c8b851a6
-
Filesize
197KB
MD52b7f2e7d196c10965e3c7af141861b64
SHA15f2aa1abd96120c41b13a990baedc58f1fa4d248
SHA256ec821af216e1fcdf93a2bd71f9981539a321eacc37159b4bf7db842090a15e45
SHA51208e019824e398a61f300c3ca73be7eec42bb14d926e8d9074b527a9b1a2006c0cf84655af405351cbb8bb370560ca33a36775b07b3032c2360864aa8daf722ee
-
Filesize
197KB
MD59ac678f741a6e1b0de6af8425f35490a
SHA127dddafd2e4f0774e25a4d9827a13bdbe36e03f5
SHA256c89185736fbfdb810b031ed693afdc21f8787c8b99344842b9290ed2cae13426
SHA51284aa9cae91efd6689b75039b23b2876ed42d76ee384c536dee4fad8550aa4b39272a94797ba783c4ac3079b9d3e46971e1ec560ba92d30d01daa4971a01ac935
-
Filesize
197KB
MD53b1e1126bae3d542a7ebcecd5441a932
SHA1f314c7a1c4017b77fceaa032c4d4532a2d2a89b4
SHA2563afa48d013f62b565ffc14db0dc992b500782bfdd628095e98b8fb61d23ec138
SHA512975aef143002925df0c65d0f6aa76de41c03e85bc569bce90b1af019a9f2451255e66713eb2dd8519894ed72679da112125a0bf737fa2c879337c583c5b62405
-
Filesize
197KB
MD59e0c71e57c05b5f538cc2667fc128f2d
SHA1c4ca04c5cf9300632e3b4f36f6de32f26e552356
SHA256ce5f63cd024e1d3fcab3fd94eb59f9974e7f9d26b76e3487acc880add72bca41
SHA5123e98eb0233f64c5d7b2196809244113fe34cd128a7cb5d4384881fd1c931f0b127147487d4361594d3314638142921136edff4b04fc9c01d600fd183b79d81b4
-
Filesize
197KB
MD50815a00f76ba4aaf4a892dc137e7e9d8
SHA1fa9ba501c48452cdecf4818007529910bcf1231d
SHA256891f53c54a13c3e19a8bda554af55eca90d91a19b2a087f82b641ff5fb43772c
SHA512fbedc9f2985f4c8c9c274e163c903cabcec083cb018d4f6a66d11a8a1703e3316f7fb4229ee95dd12634a72c731311c9d29705c9a9a21b8918abc914728f523c