Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 15:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe
-
Size
197KB
-
MD5
a6a6c6a7a55cefd0235aad1ddff45bff
-
SHA1
a5e8cc5603244f21808646fb0fd44aafc648d160
-
SHA256
c7688f50d6cffe2a151e13461a876e9eb58e3e2dfee23d80e60f4925db3adfdd
-
SHA512
e982e78a244a4600fc33003439d352e4773925925bbe5a113cf2f6bcc45bf6d45a3533a497f74b0be4848e29fcf2c2f9527f26fb5ee0604d43eda3db27cd9f35
-
SSDEEP
3072:jEGh0oJ5l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGplEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
Processes:
resource yara_rule C:\Windows\{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{E271936E-6122-46b5-8380-8CA315573BC5}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{393C52DD-6459-4196-90E7-D5922E08ADF9}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{80159D13-10F5-4252-B8B9-BDF96F954453}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{D48B77F2-FC48-4138-9117-B7236D50E59A}.exe GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
Processes:
{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe{E271936E-6122-46b5-8380-8CA315573BC5}.exe{80159D13-10F5-4252-B8B9-BDF96F954453}.exe{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe{393C52DD-6459-4196-90E7-D5922E08ADF9}.exe{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A50D849-1D0C-4b2a-A551-F48EE6A06008} {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A50D849-1D0C-4b2a-A551-F48EE6A06008}\stubpath = "C:\\Windows\\{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe" {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}\stubpath = "C:\\Windows\\{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe" {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}\stubpath = "C:\\Windows\\{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe" {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B44A2A77-704C-4ea4-9DEC-9670EA68FD03} {E271936E-6122-46b5-8380-8CA315573BC5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}\stubpath = "C:\\Windows\\{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe" {E271936E-6122-46b5-8380-8CA315573BC5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D48B77F2-FC48-4138-9117-B7236D50E59A}\stubpath = "C:\\Windows\\{D48B77F2-FC48-4138-9117-B7236D50E59A}.exe" {80159D13-10F5-4252-B8B9-BDF96F954453}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{92EEED61-5F96-4cfb-AA36-1134D9E05C31} {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{92EEED61-5F96-4cfb-AA36-1134D9E05C31}\stubpath = "C:\\Windows\\{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe" {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E271936E-6122-46b5-8380-8CA315573BC5} {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}\stubpath = "C:\\Windows\\{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe" {393C52DD-6459-4196-90E7-D5922E08ADF9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80159D13-10F5-4252-B8B9-BDF96F954453} {89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80159D13-10F5-4252-B8B9-BDF96F954453}\stubpath = "C:\\Windows\\{80159D13-10F5-4252-B8B9-BDF96F954453}.exe" {89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D48B77F2-FC48-4138-9117-B7236D50E59A} {80159D13-10F5-4252-B8B9-BDF96F954453}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7} 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{393C52DD-6459-4196-90E7-D5922E08ADF9} {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{393C52DD-6459-4196-90E7-D5922E08ADF9}\stubpath = "C:\\Windows\\{393C52DD-6459-4196-90E7-D5922E08ADF9}.exe" {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9} {393C52DD-6459-4196-90E7-D5922E08ADF9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}\stubpath = "C:\\Windows\\{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe" 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4} {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2} {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E271936E-6122-46b5-8380-8CA315573BC5}\stubpath = "C:\\Windows\\{E271936E-6122-46b5-8380-8CA315573BC5}.exe" {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe -
Executes dropped EXE 11 IoCs
Processes:
{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe{E271936E-6122-46b5-8380-8CA315573BC5}.exe{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe{393C52DD-6459-4196-90E7-D5922E08ADF9}.exe{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe{80159D13-10F5-4252-B8B9-BDF96F954453}.exe{D48B77F2-FC48-4138-9117-B7236D50E59A}.exepid process 2168 {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe 3008 {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe 496 {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe 1260 {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe 2612 {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe 1208 {E271936E-6122-46b5-8380-8CA315573BC5}.exe 2796 {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe 2036 {393C52DD-6459-4196-90E7-D5922E08ADF9}.exe 3064 {89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe 536 {80159D13-10F5-4252-B8B9-BDF96F954453}.exe 1768 {D48B77F2-FC48-4138-9117-B7236D50E59A}.exe -
Drops file in Windows directory 11 IoCs
Processes:
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe{E271936E-6122-46b5-8380-8CA315573BC5}.exe{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe{393C52DD-6459-4196-90E7-D5922E08ADF9}.exe{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe{80159D13-10F5-4252-B8B9-BDF96F954453}.exedescription ioc process File created C:\Windows\{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe File created C:\Windows\{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe File created C:\Windows\{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe File created C:\Windows\{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe File created C:\Windows\{E271936E-6122-46b5-8380-8CA315573BC5}.exe {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe File created C:\Windows\{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe {E271936E-6122-46b5-8380-8CA315573BC5}.exe File created C:\Windows\{393C52DD-6459-4196-90E7-D5922E08ADF9}.exe {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe File created C:\Windows\{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe {393C52DD-6459-4196-90E7-D5922E08ADF9}.exe File created C:\Windows\{80159D13-10F5-4252-B8B9-BDF96F954453}.exe {89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe File created C:\Windows\{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe File created C:\Windows\{D48B77F2-FC48-4138-9117-B7236D50E59A}.exe {80159D13-10F5-4252-B8B9-BDF96F954453}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe{E271936E-6122-46b5-8380-8CA315573BC5}.exe{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe{393C52DD-6459-4196-90E7-D5922E08ADF9}.exe{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe{80159D13-10F5-4252-B8B9-BDF96F954453}.exedescription pid process Token: SeIncBasePriorityPrivilege 2432 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe Token: SeIncBasePriorityPrivilege 2168 {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe Token: SeIncBasePriorityPrivilege 3008 {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe Token: SeIncBasePriorityPrivilege 496 {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe Token: SeIncBasePriorityPrivilege 1260 {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe Token: SeIncBasePriorityPrivilege 2612 {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe Token: SeIncBasePriorityPrivilege 1208 {E271936E-6122-46b5-8380-8CA315573BC5}.exe Token: SeIncBasePriorityPrivilege 2796 {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe Token: SeIncBasePriorityPrivilege 2036 {393C52DD-6459-4196-90E7-D5922E08ADF9}.exe Token: SeIncBasePriorityPrivilege 3064 {89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe Token: SeIncBasePriorityPrivilege 536 {80159D13-10F5-4252-B8B9-BDF96F954453}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe{E271936E-6122-46b5-8380-8CA315573BC5}.exe{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exedescription pid process target process PID 2432 wrote to memory of 2168 2432 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe PID 2432 wrote to memory of 2168 2432 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe PID 2432 wrote to memory of 2168 2432 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe PID 2432 wrote to memory of 2168 2432 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe PID 2432 wrote to memory of 1200 2432 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe cmd.exe PID 2432 wrote to memory of 1200 2432 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe cmd.exe PID 2432 wrote to memory of 1200 2432 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe cmd.exe PID 2432 wrote to memory of 1200 2432 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe cmd.exe PID 2168 wrote to memory of 3008 2168 {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe PID 2168 wrote to memory of 3008 2168 {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe PID 2168 wrote to memory of 3008 2168 {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe PID 2168 wrote to memory of 3008 2168 {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe PID 2168 wrote to memory of 2528 2168 {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe cmd.exe PID 2168 wrote to memory of 2528 2168 {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe cmd.exe PID 2168 wrote to memory of 2528 2168 {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe cmd.exe PID 2168 wrote to memory of 2528 2168 {EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe cmd.exe PID 3008 wrote to memory of 496 3008 {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe PID 3008 wrote to memory of 496 3008 {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe PID 3008 wrote to memory of 496 3008 {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe PID 3008 wrote to memory of 496 3008 {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe PID 3008 wrote to memory of 2692 3008 {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe cmd.exe PID 3008 wrote to memory of 2692 3008 {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe cmd.exe PID 3008 wrote to memory of 2692 3008 {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe cmd.exe PID 3008 wrote to memory of 2692 3008 {7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe cmd.exe PID 496 wrote to memory of 1260 496 {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe PID 496 wrote to memory of 1260 496 {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe PID 496 wrote to memory of 1260 496 {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe PID 496 wrote to memory of 1260 496 {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe PID 496 wrote to memory of 2896 496 {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe cmd.exe PID 496 wrote to memory of 2896 496 {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe cmd.exe PID 496 wrote to memory of 2896 496 {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe cmd.exe PID 496 wrote to memory of 2896 496 {9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe cmd.exe PID 1260 wrote to memory of 2612 1260 {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe PID 1260 wrote to memory of 2612 1260 {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe PID 1260 wrote to memory of 2612 1260 {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe PID 1260 wrote to memory of 2612 1260 {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe PID 1260 wrote to memory of 848 1260 {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe cmd.exe PID 1260 wrote to memory of 848 1260 {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe cmd.exe PID 1260 wrote to memory of 848 1260 {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe cmd.exe PID 1260 wrote to memory of 848 1260 {FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe cmd.exe PID 2612 wrote to memory of 1208 2612 {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe {E271936E-6122-46b5-8380-8CA315573BC5}.exe PID 2612 wrote to memory of 1208 2612 {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe {E271936E-6122-46b5-8380-8CA315573BC5}.exe PID 2612 wrote to memory of 1208 2612 {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe {E271936E-6122-46b5-8380-8CA315573BC5}.exe PID 2612 wrote to memory of 1208 2612 {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe {E271936E-6122-46b5-8380-8CA315573BC5}.exe PID 2612 wrote to memory of 2408 2612 {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe cmd.exe PID 2612 wrote to memory of 2408 2612 {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe cmd.exe PID 2612 wrote to memory of 2408 2612 {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe cmd.exe PID 2612 wrote to memory of 2408 2612 {92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe cmd.exe PID 1208 wrote to memory of 2796 1208 {E271936E-6122-46b5-8380-8CA315573BC5}.exe {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe PID 1208 wrote to memory of 2796 1208 {E271936E-6122-46b5-8380-8CA315573BC5}.exe {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe PID 1208 wrote to memory of 2796 1208 {E271936E-6122-46b5-8380-8CA315573BC5}.exe {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe PID 1208 wrote to memory of 2796 1208 {E271936E-6122-46b5-8380-8CA315573BC5}.exe {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe PID 1208 wrote to memory of 2784 1208 {E271936E-6122-46b5-8380-8CA315573BC5}.exe cmd.exe PID 1208 wrote to memory of 2784 1208 {E271936E-6122-46b5-8380-8CA315573BC5}.exe cmd.exe PID 1208 wrote to memory of 2784 1208 {E271936E-6122-46b5-8380-8CA315573BC5}.exe cmd.exe PID 1208 wrote to memory of 2784 1208 {E271936E-6122-46b5-8380-8CA315573BC5}.exe cmd.exe PID 2796 wrote to memory of 2036 2796 {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe {393C52DD-6459-4196-90E7-D5922E08ADF9}.exe PID 2796 wrote to memory of 2036 2796 {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe {393C52DD-6459-4196-90E7-D5922E08ADF9}.exe PID 2796 wrote to memory of 2036 2796 {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe {393C52DD-6459-4196-90E7-D5922E08ADF9}.exe PID 2796 wrote to memory of 2036 2796 {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe {393C52DD-6459-4196-90E7-D5922E08ADF9}.exe PID 2796 wrote to memory of 2008 2796 {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe cmd.exe PID 2796 wrote to memory of 2008 2796 {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe cmd.exe PID 2796 wrote to memory of 2008 2796 {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe cmd.exe PID 2796 wrote to memory of 2008 2796 {B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exeC:\Windows\{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exeC:\Windows\{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7A50D~1.EXE > nul4⤵PID:2692
-
C:\Windows\{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exeC:\Windows\{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exeC:\Windows\{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exeC:\Windows\{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\{E271936E-6122-46b5-8380-8CA315573BC5}.exeC:\Windows\{E271936E-6122-46b5-8380-8CA315573BC5}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exeC:\Windows\{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\{393C52DD-6459-4196-90E7-D5922E08ADF9}.exeC:\Windows\{393C52DD-6459-4196-90E7-D5922E08ADF9}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exeC:\Windows\{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Windows\{80159D13-10F5-4252-B8B9-BDF96F954453}.exeC:\Windows\{80159D13-10F5-4252-B8B9-BDF96F954453}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\{D48B77F2-FC48-4138-9117-B7236D50E59A}.exeC:\Windows\{D48B77F2-FC48-4138-9117-B7236D50E59A}.exe12⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80159~1.EXE > nul12⤵PID:1464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{89409~1.EXE > nul11⤵PID:880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{393C5~1.EXE > nul10⤵PID:1620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B44A2~1.EXE > nul9⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E2719~1.EXE > nul8⤵PID:2784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{92EEE~1.EXE > nul7⤵PID:2408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FDF51~1.EXE > nul6⤵PID:848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9C31D~1.EXE > nul5⤵PID:2896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA1A0~1.EXE > nul3⤵PID:2528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\{393C52DD-6459-4196-90E7-D5922E08ADF9}.exeFilesize
197KB
MD5dec9b02fcd432a3e6ab5287e1a9468cf
SHA1db0004ac790d28f94843ff48ea66af2070a4fefc
SHA25627d476f1f1a757257c28189565b73c3e7a8e42b8a10d80a549565a8f464c349e
SHA51267a50177fd0dbb468c86f6cd258c7e8aca9ca20dbeb6b18efe6c25b9fb560b585820cfec0c0a942a5dd60da2159f094eb5d9422f9d4aac1cfd9872c5bcd8ac12
-
C:\Windows\{7A50D849-1D0C-4b2a-A551-F48EE6A06008}.exeFilesize
197KB
MD5c161b0157c260375f0cc5f8c613cc553
SHA1dcec85775b5c5a9681bada55b520bd0470f2174f
SHA25697fa3a07ab4ba64e4786e3da7875e2a35ee921f651b901c681fe2ed8fe982c1c
SHA51297c4f9d10cd484fded7e0da5aaec376f4d343c70f32bab908246b142deaec2a40184917d37670c5e0dadb26f60c1ee974508d8047b37b7b744910389be624be8
-
C:\Windows\{80159D13-10F5-4252-B8B9-BDF96F954453}.exeFilesize
197KB
MD5a534a0c16b884cf7f369ba09bd1f823b
SHA16ee6384062ccf35383331f475299b1cee3b60891
SHA256cd16277168995820e0945b3680697d7cb1c7092337303d9377e836e23eeede89
SHA5120b7b54a55f938281d6d54bf0ec67d9e61255b553c32f43c552bd5d9ee1c9ac15342359ca6c8ec73ea8347b44be5a9928840ae0babe9b645d07664f27b5e6603e
-
C:\Windows\{89409AE9-4B8E-4c64-B9C8-1B74CC172FF9}.exeFilesize
197KB
MD5d88862faba4c4eac26d19f8958b21acf
SHA1fc803a60cf2ce70cf69e1da23507c30055ecd105
SHA256691b95437718095feb22feab1f2be42700c9d38c75249a10f343cb84188de1c4
SHA5129341b6de24176b24849f4358529af105c737bd66609f6430934f3db791e336334810ca1d183993caf82e3bfd6bc8e6f11f8d82f7d7871f23a25a29d6b5c6d966
-
C:\Windows\{92EEED61-5F96-4cfb-AA36-1134D9E05C31}.exeFilesize
197KB
MD52bb3823ff9a11025d19851d590d42c08
SHA1f28cc2659e48ae0e53ad5d291f191acecac5ddae
SHA256163ae4f1be5770950febeb75174a7140507dce325bb13a7c40c0f5ba44b95067
SHA512d7aad5ce479ca8cd58458133bb4d2fa20a7f6a4f4aade856907dfb61c7ed04369e7fcc53329c2aa30a830188d32f5bf4af3616e4d0c65f52959859b02df20b45
-
C:\Windows\{9C31DEDA-0B6D-4522-A9E3-A5DD00E94FA4}.exeFilesize
197KB
MD5bdcd9df8e8a5bf3779b8d547aef1dd6f
SHA1a8fa603463e4acbddd7044c9485f255659aa2667
SHA256be097820070128610ec221b8e391e31d0810828c6e161e477076cf5f9a5a5668
SHA51270d070e7400c001437f743ea638677cef13b320280e7c15ba1a0d0a9a1376a0de2dd753cd534fcd40550af4d5500ddf8b223d305fd13a88f99964bca7c17226d
-
C:\Windows\{B44A2A77-704C-4ea4-9DEC-9670EA68FD03}.exeFilesize
197KB
MD5410a0b4de2a299ef3085eacce7121aa2
SHA1e8dad3e7f59da1bafe578143e78c2953ddab52f3
SHA256527a0a3d697adf0ba30e8231aa74b9c8d22b6c3471448761eb0b1527d57c77e9
SHA512f30b81f78dd8ae323a2b5a5e76ad54995909cd994aeada0429789bb81dccccb9edffc07f155d110313de401196b70f47f2f801eefa494e36edf6378e46f8c720
-
C:\Windows\{D48B77F2-FC48-4138-9117-B7236D50E59A}.exeFilesize
197KB
MD5a0efbe952fb0b3eeb3b4f9a2859056f8
SHA17a2d61e75891715d05a9d2f72b49ef457cb54ea3
SHA2564f86ddf93f070e91837a3845c6602c3e2ad78d982dc839fcec34feb4aab8319e
SHA512d0c142744093a768e207a79237b53d79efe2528907ea2d41f9be482eb79aa7afacceb22c61ae10bd48b8ad28805ec9c5013c13850e26a73f27b72066ef8e3f02
-
C:\Windows\{E271936E-6122-46b5-8380-8CA315573BC5}.exeFilesize
197KB
MD58c4d198270934ba9cb7472c98ddf89f3
SHA1db2e2b6d889e2ccbe29563e60a2795f6b7d274b3
SHA256573706bd6eaa4d22a199a0b2f3b6bdabeb3a498e02fe00c98536e2519e273860
SHA5122bc95290f2c00f0a978b3b83ccfa36eab99bf820e8a22d14dc3f43dd26ff610c2685b6d24d27d6d247686d0020691e869777e0b86510ec348396b8122d3d4134
-
C:\Windows\{EA1A0A67-A0E4-4fc6-A055-792FC2E01BA7}.exeFilesize
197KB
MD5d00c6b05be541cde2010e473921af85d
SHA1eeb66031701f0b795b8b67b9f291ea92d4e6884f
SHA256bcf8dfb5feb686e08b8e432b3d9eb0672241cf9c0518eb95617d5b1706a3bd85
SHA512ca904f49c40281a0cc07e3d88416148d21e79eb2ff995346f2a15578daf436ff6d9d63b76f2a9685278e7c4db921f988c8764cbab9e248a42d1a546d271cfd11
-
C:\Windows\{FDF51D7D-3F1A-4bc6-9BEB-42E9AF9B14C2}.exeFilesize
197KB
MD542999cd6859f9c640cd704ed2258c5ab
SHA1a7a554adb256df22e88d15c80708b61aaaf33132
SHA256cc8f8c05d243a5d810e84f8a6cd3aff033a933ce29f3fabed8935647cb2e27a1
SHA512b93be1302b374a60bf5a5ec17d918321e33880b40f91fecaf6321de17a6a7f4a4ea99f59f5e3133fe39b31c4c7ee3fffbd2ec4a40b6d8644dfb30f92d1a9bd14