Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 15:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe
-
Size
197KB
-
MD5
a6a6c6a7a55cefd0235aad1ddff45bff
-
SHA1
a5e8cc5603244f21808646fb0fd44aafc648d160
-
SHA256
c7688f50d6cffe2a151e13461a876e9eb58e3e2dfee23d80e60f4925db3adfdd
-
SHA512
e982e78a244a4600fc33003439d352e4773925925bbe5a113cf2f6bcc45bf6d45a3533a497f74b0be4848e29fcf2c2f9527f26fb5ee0604d43eda3db27cd9f35
-
SSDEEP
3072:jEGh0oJ5l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGplEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 13 IoCs
Processes:
resource yara_rule C:\Windows\{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{F7BE0743-039C-417b-9070-DB43F3488FA3}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{C81B4663-0F96-4bf6-9BEE-243844519071}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{883976AB-830E-4675-AE83-C0C5B9D172F0}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{D4E58070-32DD-4d13-810E-84096889C1F2}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{B1446858-5364-4376-9C30-E52A44DB1821}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{3805EBDC-50C3-4704-A885-53D6D5031A13}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{FF6DAD88-6AE8-40cd-98C3-7E28E8016DBD}.exe GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
Processes:
{3805EBDC-50C3-4704-A885-53D6D5031A13}.exe{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe{D4E58070-32DD-4d13-810E-84096889C1F2}.exe{B1446858-5364-4376-9C30-E52A44DB1821}.exe{883976AB-830E-4675-AE83-C0C5B9D172F0}.exe2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe{C81B4663-0F96-4bf6-9BEE-243844519071}.exe{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe{F7BE0743-039C-417b-9070-DB43F3488FA3}.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}\stubpath = "C:\\Windows\\{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe" {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF6DAD88-6AE8-40cd-98C3-7E28E8016DBD} {7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF6DAD88-6AE8-40cd-98C3-7E28E8016DBD}\stubpath = "C:\\Windows\\{FF6DAD88-6AE8-40cd-98C3-7E28E8016DBD}.exe" {7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1446858-5364-4376-9C30-E52A44DB1821} {D4E58070-32DD-4d13-810E-84096889C1F2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1446858-5364-4376-9C30-E52A44DB1821}\stubpath = "C:\\Windows\\{B1446858-5364-4376-9C30-E52A44DB1821}.exe" {D4E58070-32DD-4d13-810E-84096889C1F2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3805EBDC-50C3-4704-A885-53D6D5031A13}\stubpath = "C:\\Windows\\{3805EBDC-50C3-4704-A885-53D6D5031A13}.exe" {B1446858-5364-4376-9C30-E52A44DB1821}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9} {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D4E58070-32DD-4d13-810E-84096889C1F2} {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D} 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2B709AF-038E-4594-BE43-EE77C3B4B118}\stubpath = "C:\\Windows\\{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe" {C81B4663-0F96-4bf6-9BEE-243844519071}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{64D517B6-10C6-4953-8B1A-9100FBBE7606}\stubpath = "C:\\Windows\\{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe" {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{883976AB-830E-4675-AE83-C0C5B9D172F0} {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2B709AF-038E-4594-BE43-EE77C3B4B118} {C81B4663-0F96-4bf6-9BEE-243844519071}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{64D517B6-10C6-4953-8B1A-9100FBBE7606} {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{883976AB-830E-4675-AE83-C0C5B9D172F0}\stubpath = "C:\\Windows\\{883976AB-830E-4675-AE83-C0C5B9D172F0}.exe" {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D4E58070-32DD-4d13-810E-84096889C1F2}\stubpath = "C:\\Windows\\{D4E58070-32DD-4d13-810E-84096889C1F2}.exe" {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}\stubpath = "C:\\Windows\\{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe" 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{530B4F51-0136-4aae-965C-D3DD70A2BF1A} {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F7BE0743-039C-417b-9070-DB43F3488FA3} {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F7BE0743-039C-417b-9070-DB43F3488FA3}\stubpath = "C:\\Windows\\{F7BE0743-039C-417b-9070-DB43F3488FA3}.exe" {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3805EBDC-50C3-4704-A885-53D6D5031A13} {B1446858-5364-4376-9C30-E52A44DB1821}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{530B4F51-0136-4aae-965C-D3DD70A2BF1A}\stubpath = "C:\\Windows\\{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe" {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C81B4663-0F96-4bf6-9BEE-243844519071} {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C81B4663-0F96-4bf6-9BEE-243844519071}\stubpath = "C:\\Windows\\{C81B4663-0F96-4bf6-9BEE-243844519071}.exe" {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe -
Executes dropped EXE 12 IoCs
Processes:
{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe{F7BE0743-039C-417b-9070-DB43F3488FA3}.exe{C81B4663-0F96-4bf6-9BEE-243844519071}.exe{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe{883976AB-830E-4675-AE83-C0C5B9D172F0}.exe{D4E58070-32DD-4d13-810E-84096889C1F2}.exe{B1446858-5364-4376-9C30-E52A44DB1821}.exe{3805EBDC-50C3-4704-A885-53D6D5031A13}.exe{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe{FF6DAD88-6AE8-40cd-98C3-7E28E8016DBD}.exepid process 3408 {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe 2264 {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe 4556 {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe 1204 {C81B4663-0F96-4bf6-9BEE-243844519071}.exe 676 {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe 3748 {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe 3724 {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe 2060 {D4E58070-32DD-4d13-810E-84096889C1F2}.exe 1552 {B1446858-5364-4376-9C30-E52A44DB1821}.exe 548 {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe 3212 {7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe 1584 {FF6DAD88-6AE8-40cd-98C3-7E28E8016DBD}.exe -
Drops file in Windows directory 12 IoCs
Processes:
{D4E58070-32DD-4d13-810E-84096889C1F2}.exe{B1446858-5364-4376-9C30-E52A44DB1821}.exe2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe{F7BE0743-039C-417b-9070-DB43F3488FA3}.exe{C81B4663-0F96-4bf6-9BEE-243844519071}.exe{883976AB-830E-4675-AE83-C0C5B9D172F0}.exe{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe{3805EBDC-50C3-4704-A885-53D6D5031A13}.exe{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exedescription ioc process File created C:\Windows\{B1446858-5364-4376-9C30-E52A44DB1821}.exe {D4E58070-32DD-4d13-810E-84096889C1F2}.exe File created C:\Windows\{3805EBDC-50C3-4704-A885-53D6D5031A13}.exe {B1446858-5364-4376-9C30-E52A44DB1821}.exe File created C:\Windows\{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe File created C:\Windows\{F7BE0743-039C-417b-9070-DB43F3488FA3}.exe {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe File created C:\Windows\{C81B4663-0F96-4bf6-9BEE-243844519071}.exe {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe File created C:\Windows\{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe {C81B4663-0F96-4bf6-9BEE-243844519071}.exe File created C:\Windows\{D4E58070-32DD-4d13-810E-84096889C1F2}.exe {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe File created C:\Windows\{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe File created C:\Windows\{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe File created C:\Windows\{883976AB-830E-4675-AE83-C0C5B9D172F0}.exe {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe File created C:\Windows\{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe File created C:\Windows\{FF6DAD88-6AE8-40cd-98C3-7E28E8016DBD}.exe {7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe{F7BE0743-039C-417b-9070-DB43F3488FA3}.exe{C81B4663-0F96-4bf6-9BEE-243844519071}.exe{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe{883976AB-830E-4675-AE83-C0C5B9D172F0}.exe{D4E58070-32DD-4d13-810E-84096889C1F2}.exe{B1446858-5364-4376-9C30-E52A44DB1821}.exe{3805EBDC-50C3-4704-A885-53D6D5031A13}.exe{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exedescription pid process Token: SeIncBasePriorityPrivilege 3776 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe Token: SeIncBasePriorityPrivilege 3408 {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe Token: SeIncBasePriorityPrivilege 2264 {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe Token: SeIncBasePriorityPrivilege 4556 {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe Token: SeIncBasePriorityPrivilege 1204 {C81B4663-0F96-4bf6-9BEE-243844519071}.exe Token: SeIncBasePriorityPrivilege 676 {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe Token: SeIncBasePriorityPrivilege 3748 {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe Token: SeIncBasePriorityPrivilege 3724 {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe Token: SeIncBasePriorityPrivilege 2060 {D4E58070-32DD-4d13-810E-84096889C1F2}.exe Token: SeIncBasePriorityPrivilege 1552 {B1446858-5364-4376-9C30-E52A44DB1821}.exe Token: SeIncBasePriorityPrivilege 548 {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe Token: SeIncBasePriorityPrivilege 3212 {7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe{F7BE0743-039C-417b-9070-DB43F3488FA3}.exe{C81B4663-0F96-4bf6-9BEE-243844519071}.exe{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe{883976AB-830E-4675-AE83-C0C5B9D172F0}.exe{D4E58070-32DD-4d13-810E-84096889C1F2}.exe{B1446858-5364-4376-9C30-E52A44DB1821}.exe{3805EBDC-50C3-4704-A885-53D6D5031A13}.exedescription pid process target process PID 3776 wrote to memory of 3408 3776 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe PID 3776 wrote to memory of 3408 3776 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe PID 3776 wrote to memory of 3408 3776 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe PID 3776 wrote to memory of 1488 3776 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe cmd.exe PID 3776 wrote to memory of 1488 3776 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe cmd.exe PID 3776 wrote to memory of 1488 3776 2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe cmd.exe PID 3408 wrote to memory of 2264 3408 {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe PID 3408 wrote to memory of 2264 3408 {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe PID 3408 wrote to memory of 2264 3408 {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe PID 3408 wrote to memory of 4812 3408 {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe cmd.exe PID 3408 wrote to memory of 4812 3408 {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe cmd.exe PID 3408 wrote to memory of 4812 3408 {80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe cmd.exe PID 2264 wrote to memory of 4556 2264 {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe PID 2264 wrote to memory of 4556 2264 {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe PID 2264 wrote to memory of 4556 2264 {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe PID 2264 wrote to memory of 672 2264 {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe cmd.exe PID 2264 wrote to memory of 672 2264 {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe cmd.exe PID 2264 wrote to memory of 672 2264 {530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe cmd.exe PID 4556 wrote to memory of 1204 4556 {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe {C81B4663-0F96-4bf6-9BEE-243844519071}.exe PID 4556 wrote to memory of 1204 4556 {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe {C81B4663-0F96-4bf6-9BEE-243844519071}.exe PID 4556 wrote to memory of 1204 4556 {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe {C81B4663-0F96-4bf6-9BEE-243844519071}.exe PID 4556 wrote to memory of 3956 4556 {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe cmd.exe PID 4556 wrote to memory of 3956 4556 {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe cmd.exe PID 4556 wrote to memory of 3956 4556 {F7BE0743-039C-417b-9070-DB43F3488FA3}.exe cmd.exe PID 1204 wrote to memory of 676 1204 {C81B4663-0F96-4bf6-9BEE-243844519071}.exe {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe PID 1204 wrote to memory of 676 1204 {C81B4663-0F96-4bf6-9BEE-243844519071}.exe {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe PID 1204 wrote to memory of 676 1204 {C81B4663-0F96-4bf6-9BEE-243844519071}.exe {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe PID 1204 wrote to memory of 4724 1204 {C81B4663-0F96-4bf6-9BEE-243844519071}.exe cmd.exe PID 1204 wrote to memory of 4724 1204 {C81B4663-0F96-4bf6-9BEE-243844519071}.exe cmd.exe PID 1204 wrote to memory of 4724 1204 {C81B4663-0F96-4bf6-9BEE-243844519071}.exe cmd.exe PID 676 wrote to memory of 3748 676 {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe PID 676 wrote to memory of 3748 676 {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe PID 676 wrote to memory of 3748 676 {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe PID 676 wrote to memory of 2724 676 {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe cmd.exe PID 676 wrote to memory of 2724 676 {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe cmd.exe PID 676 wrote to memory of 2724 676 {A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe cmd.exe PID 3748 wrote to memory of 3724 3748 {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe PID 3748 wrote to memory of 3724 3748 {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe PID 3748 wrote to memory of 3724 3748 {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe PID 3748 wrote to memory of 1732 3748 {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe cmd.exe PID 3748 wrote to memory of 1732 3748 {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe cmd.exe PID 3748 wrote to memory of 1732 3748 {64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe cmd.exe PID 3724 wrote to memory of 2060 3724 {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe {D4E58070-32DD-4d13-810E-84096889C1F2}.exe PID 3724 wrote to memory of 2060 3724 {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe {D4E58070-32DD-4d13-810E-84096889C1F2}.exe PID 3724 wrote to memory of 2060 3724 {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe {D4E58070-32DD-4d13-810E-84096889C1F2}.exe PID 3724 wrote to memory of 2884 3724 {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe cmd.exe PID 3724 wrote to memory of 2884 3724 {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe cmd.exe PID 3724 wrote to memory of 2884 3724 {883976AB-830E-4675-AE83-C0C5B9D172F0}.exe cmd.exe PID 2060 wrote to memory of 1552 2060 {D4E58070-32DD-4d13-810E-84096889C1F2}.exe {B1446858-5364-4376-9C30-E52A44DB1821}.exe PID 2060 wrote to memory of 1552 2060 {D4E58070-32DD-4d13-810E-84096889C1F2}.exe {B1446858-5364-4376-9C30-E52A44DB1821}.exe PID 2060 wrote to memory of 1552 2060 {D4E58070-32DD-4d13-810E-84096889C1F2}.exe {B1446858-5364-4376-9C30-E52A44DB1821}.exe PID 2060 wrote to memory of 2288 2060 {D4E58070-32DD-4d13-810E-84096889C1F2}.exe cmd.exe PID 2060 wrote to memory of 2288 2060 {D4E58070-32DD-4d13-810E-84096889C1F2}.exe cmd.exe PID 2060 wrote to memory of 2288 2060 {D4E58070-32DD-4d13-810E-84096889C1F2}.exe cmd.exe PID 1552 wrote to memory of 548 1552 {B1446858-5364-4376-9C30-E52A44DB1821}.exe {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe PID 1552 wrote to memory of 548 1552 {B1446858-5364-4376-9C30-E52A44DB1821}.exe {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe PID 1552 wrote to memory of 548 1552 {B1446858-5364-4376-9C30-E52A44DB1821}.exe {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe PID 1552 wrote to memory of 1976 1552 {B1446858-5364-4376-9C30-E52A44DB1821}.exe cmd.exe PID 1552 wrote to memory of 1976 1552 {B1446858-5364-4376-9C30-E52A44DB1821}.exe cmd.exe PID 1552 wrote to memory of 1976 1552 {B1446858-5364-4376-9C30-E52A44DB1821}.exe cmd.exe PID 548 wrote to memory of 3212 548 {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe {7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe PID 548 wrote to memory of 3212 548 {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe {7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe PID 548 wrote to memory of 3212 548 {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe {7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe PID 548 wrote to memory of 400 548 {3805EBDC-50C3-4704-A885-53D6D5031A13}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_a6a6c6a7a55cefd0235aad1ddff45bff_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exeC:\Windows\{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exeC:\Windows\{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\{F7BE0743-039C-417b-9070-DB43F3488FA3}.exeC:\Windows\{F7BE0743-039C-417b-9070-DB43F3488FA3}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\{C81B4663-0F96-4bf6-9BEE-243844519071}.exeC:\Windows\{C81B4663-0F96-4bf6-9BEE-243844519071}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exeC:\Windows\{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exeC:\Windows\{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\{883976AB-830E-4675-AE83-C0C5B9D172F0}.exeC:\Windows\{883976AB-830E-4675-AE83-C0C5B9D172F0}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\{D4E58070-32DD-4d13-810E-84096889C1F2}.exeC:\Windows\{D4E58070-32DD-4d13-810E-84096889C1F2}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\{B1446858-5364-4376-9C30-E52A44DB1821}.exeC:\Windows\{B1446858-5364-4376-9C30-E52A44DB1821}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\{3805EBDC-50C3-4704-A885-53D6D5031A13}.exeC:\Windows\{3805EBDC-50C3-4704-A885-53D6D5031A13}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exeC:\Windows\{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3212 -
C:\Windows\{FF6DAD88-6AE8-40cd-98C3-7E28E8016DBD}.exeC:\Windows\{FF6DAD88-6AE8-40cd-98C3-7E28E8016DBD}.exe13⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C9BA~1.EXE > nul13⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3805E~1.EXE > nul12⤵PID:400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1446~1.EXE > nul11⤵PID:1976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4E58~1.EXE > nul10⤵PID:2288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{88397~1.EXE > nul9⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{64D51~1.EXE > nul8⤵PID:1732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A2B70~1.EXE > nul7⤵PID:2724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C81B4~1.EXE > nul6⤵PID:4724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F7BE0~1.EXE > nul5⤵PID:3956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{530B4~1.EXE > nul4⤵PID:672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80ED1~1.EXE > nul3⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\{3805EBDC-50C3-4704-A885-53D6D5031A13}.exeFilesize
197KB
MD52025182a5d5a7177f6cf705901924c85
SHA172b43d42a5f33caf749e74b3e72b5affb8bd6520
SHA25688a7779a8d1c45cd77f0d50fa22b55ed6853692ca88b61e4a8cd8da012827ddf
SHA512994f2c9a6c2adabbe5a1571d3a3e0580f44442adeadda55eaa8ff1d20c8f8b63d34963342a4918e98c560c209756bcb18e6863d9db2464297ac5dfe476044a2f
-
C:\Windows\{530B4F51-0136-4aae-965C-D3DD70A2BF1A}.exeFilesize
197KB
MD5ba3a3fc2f86a1d1e088e6e9bfb6413f4
SHA11078e6944b67f26ee24d7404c6e8a7a66d4552b9
SHA2567db783c315b5ee9c65bdbfc6713a258dfe786add8d74288167618aa1404810da
SHA512647a9c9f826212b224c279068b696e6c7fb1dd0f67aae281dc1586ea84bba5ce73f24dbd8e7ee11dec00a6fae59f80f04e63aad7f93c43cacfc94bbed5945136
-
C:\Windows\{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exeFilesize
166KB
MD567115f3600a35c79bb24691d8a0fe556
SHA1e5870fba1be0a0cdd257cc8b227028fdae1e2947
SHA256e0998ec3ef2989ff3bcafbf8985801c2c3b31506c561a8abc84ce9d283e05f73
SHA512a9180b0ee98b54015f0fe73efc0af0c9f303e9fede979a1a4b73c272306f97dc969e8baad9aecf6a8a8b4d33acb899ef780f76ed169d7c683e75b98bf027f102
-
C:\Windows\{64D517B6-10C6-4953-8B1A-9100FBBE7606}.exeFilesize
197KB
MD542b0da8f371ff7aa045977824d2e119d
SHA1cd74e86bdf368aff5aed9331556611c792d309d2
SHA256b5393f4bd13d9108dc296fec7780bbd1a5d49500b86a10e760542d267610d7ab
SHA5123c5b7c0df25c7d4d110252892c22549a7ee020535e483cf3b739a93f4fe49238823a56822e77f7f8a7ae2a962ba1450236ae7ebcf762e136bcfe5ded7033e13e
-
C:\Windows\{7C9BA5F5-409C-4635-8BC4-C5464A7B20D9}.exeFilesize
197KB
MD5a6cbed048100dad874b323dc99964dc4
SHA1398ef3806641c7c9d97ae908ae7e206f0829da4b
SHA256b8802ffee0a5c772fb23f137ddef76b919c58e48b3a471a893ca1ff13e3a7260
SHA51298f6aef37e0b130488d14fe3b507ed455d66836e13753afabca1f708d9d1ab8a48c88ec54ae024c440c8bbac3ce209fb8a3e81c9ffdc0f1e4c3e9846f5acd4ca
-
C:\Windows\{80ED15F7-6DF9-41cb-8BC1-7EC02458CE0D}.exeFilesize
197KB
MD5213b27c8837f7edefd8dc89ae65c3434
SHA188ac95c6766b019f23c1d29e288552cb142ceba4
SHA2565aae9f0b0cdcc3a25741e5a3a61d9daef01fd0c2d2dc38d881e72be64c99d7bf
SHA51225940c61af3a83666626f20682039e32e823ac1cbb36689232e4890841134c41c42c5eb87284eb6478f8fca27df4d8147a7a6642dba2c098af8b24a743c7c3e5
-
C:\Windows\{883976AB-830E-4675-AE83-C0C5B9D172F0}.exeFilesize
197KB
MD5a5f6aafafbc549c80dc2863e8ea1ba8a
SHA1bc087ac3cf71a243540e37342f0a4696a7bb27ff
SHA2566c879099f9fe92851506dbcaba72fd43c282518a425f1204d5a506b58609487b
SHA512f7571c1d70146ed833ae3b2319fcb49cbda56e48179341382dd57fdcc98c6b47257fc6974715508fb9874e6f57fe7f2ba100e6b8704c05ad38bffeb2e66ef449
-
C:\Windows\{A2B709AF-038E-4594-BE43-EE77C3B4B118}.exeFilesize
197KB
MD5e44d78082516ebb2caac4024ca4597dd
SHA1a66cc6e3c0beafefb289aff5295794055eb732d1
SHA256197b896873ea087d19a12319f5131e3d4911e3fcc3cf38fa22b35d2088305998
SHA5125f2e5e5c91c83111aec3b00f8fae0c3a6bc61a3af15bc6e55c081619352cf25dae66db87da2623932090472ad7b7ddc1a05e6c523310100b84268df24541a8e8
-
C:\Windows\{B1446858-5364-4376-9C30-E52A44DB1821}.exeFilesize
197KB
MD59922f77c9942b4b8f0e4a616a7a3a985
SHA138c1954f63d6f05d54fd44f40be358c4e52b67c6
SHA2562efa37b9d4d0242bca170f9ad56b6ae0eca7f18ee70ddf9d4590bc25331b88e0
SHA512b0b24126667ada15be031a4e9672279b17346bfa795bd56ce49c59eff741a9abefeda6fb4420e36db8efc76fad697ba01d741fb4b83af6561df8aca36325beb6
-
C:\Windows\{C81B4663-0F96-4bf6-9BEE-243844519071}.exeFilesize
197KB
MD5a582e85237693655c4edeec6da6a43fc
SHA1fb5c51c5ddd7302e15caaa54ac0ad3e70d7a1158
SHA256f9b2bb9356c51a40871649a185d88ab5281953074ace32112b0a7aed87cb570f
SHA512d61c7b2b1c72c59a075279754ec1231196908ffc1aca8867cae8942ebbbe97428f8eea822a31b02b5c66f62ab3ce29bd220acd639ede5380ad9226aa805dc1e1
-
C:\Windows\{D4E58070-32DD-4d13-810E-84096889C1F2}.exeFilesize
197KB
MD58ac943ac912928c4b92ffab3ecb222db
SHA13c95237eeda09d8454145a187f4ce3bc7a5704bd
SHA25655b71972646db36ecb089bc7d5208555d121532b88580460c2e8fb04f9957b28
SHA512341c78a55b647d643be68ace832f19238340323e6bc9a04ee360a229c7a5ba4bffb68250292a5c22e59e0086b000408a8b7f38f65c2cbae035b819c96b929c51
-
C:\Windows\{F7BE0743-039C-417b-9070-DB43F3488FA3}.exeFilesize
197KB
MD57267f1954e5323750c6991bbfdee5aa9
SHA124f42b3954f301b86d5f4b724d86a740ffb4397c
SHA2569268ffc7958d20454aadca2089d9d9c204a598f35dd25861ad268f420ba1902c
SHA51276e4a9a1d08377f25e2ef50b976b2730d49dabc224018ffda6cd7ee5899ea60892b7196199247607840b763bf8a92090ec51c92181bd24bcd60df17d6dfd8218
-
C:\Windows\{FF6DAD88-6AE8-40cd-98C3-7E28E8016DBD}.exeFilesize
197KB
MD5a4bffe38223e22af21be50b7492a25c1
SHA1f2006489ec4825035e8585685ae4e8a298d02e45
SHA25695b1cf8bf461138dd48938ce50a73bb36721432f3dd071f3bc11ad91abcaf72c
SHA5129cfc3de5ed451ff1ba670c8463772edb6725b6aafc824ecf638aa85348e034920a7cc62a09b329c9cb62259df9f6b5e5ec8720811ab807afe3e9bc3d7fcf3f8e