Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe
-
Size
380KB
-
MD5
1fd7e3cca40c7f82df0600b0cbaf9e6b
-
SHA1
598f362a5be790be66a9e98bfe1d086bc098ad97
-
SHA256
1552e79932ec94fadc185809463989d8e2aa37662b0aa4169ae40000704700ed
-
SHA512
d271c87ecf74240f3e1de2076fc861afebb630cff0bb36ae000e9595e5575fcfdc8135496bed183edf64401b4ebcde2b34c184411d14745a8424628380a0ce91
-
SSDEEP
3072:mEGh0oPlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEG5l7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral1/files/0x000c000000016cac-4.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002e000000016d2d-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000300000000b1f7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000b1f7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x002f000000016d2d-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000500000000b1f7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0030000000016d2d-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000b1f7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0031000000016d2d-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0} 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3FD1E643-3115-4e2b-B9B0-1A5368BC027B} {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E37AB46-D88A-442b-890B-2479923BDA8F} {9F9A10D2-603A-4910-9A8F-D87FA705741B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D5F6D1E-548B-4d25-9991-884D9ED3C2A6}\stubpath = "C:\\Windows\\{5D5F6D1E-548B-4d25-9991-884D9ED3C2A6}.exe" {44CE1C8D-B505-4477-AAB5-F738BB4C5D95}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}\stubpath = "C:\\Windows\\{26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe" {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC} {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A} {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9F9A10D2-603A-4910-9A8F-D87FA705741B}\stubpath = "C:\\Windows\\{9F9A10D2-603A-4910-9A8F-D87FA705741B}.exe" {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44CE1C8D-B505-4477-AAB5-F738BB4C5D95} {6E37AB46-D88A-442b-890B-2479923BDA8F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}\stubpath = "C:\\Windows\\{F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe" {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3FD1E643-3115-4e2b-B9B0-1A5368BC027B}\stubpath = "C:\\Windows\\{3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe" {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA} {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}\stubpath = "C:\\Windows\\{0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe" {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}\stubpath = "C:\\Windows\\{83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe" {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9F9A10D2-603A-4910-9A8F-D87FA705741B} {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E37AB46-D88A-442b-890B-2479923BDA8F}\stubpath = "C:\\Windows\\{6E37AB46-D88A-442b-890B-2479923BDA8F}.exe" {9F9A10D2-603A-4910-9A8F-D87FA705741B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44CE1C8D-B505-4477-AAB5-F738BB4C5D95}\stubpath = "C:\\Windows\\{44CE1C8D-B505-4477-AAB5-F738BB4C5D95}.exe" {6E37AB46-D88A-442b-890B-2479923BDA8F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}\stubpath = "C:\\Windows\\{F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe" 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26CDBDDA-ADDA-44d0-B907-70BE44F8BE32} {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96} {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}\stubpath = "C:\\Windows\\{2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe" {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D5F6D1E-548B-4d25-9991-884D9ED3C2A6} {44CE1C8D-B505-4477-AAB5-F738BB4C5D95}.exe -
Deletes itself 1 IoCs
pid Process 1820 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3040 {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe 2984 {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe 2556 {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe 1972 {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe 1508 {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe 2900 {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe 1952 {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe 1720 {9F9A10D2-603A-4910-9A8F-D87FA705741B}.exe 2472 {6E37AB46-D88A-442b-890B-2479923BDA8F}.exe 2232 {44CE1C8D-B505-4477-AAB5-F738BB4C5D95}.exe 2340 {5D5F6D1E-548B-4d25-9991-884D9ED3C2A6}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{5D5F6D1E-548B-4d25-9991-884D9ED3C2A6}.exe {44CE1C8D-B505-4477-AAB5-F738BB4C5D95}.exe File created C:\Windows\{F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe File created C:\Windows\{3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe File created C:\Windows\{2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe File created C:\Windows\{83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe File created C:\Windows\{9F9A10D2-603A-4910-9A8F-D87FA705741B}.exe {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe File created C:\Windows\{26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe File created C:\Windows\{F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe File created C:\Windows\{0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe File created C:\Windows\{6E37AB46-D88A-442b-890B-2479923BDA8F}.exe {9F9A10D2-603A-4910-9A8F-D87FA705741B}.exe File created C:\Windows\{44CE1C8D-B505-4477-AAB5-F738BB4C5D95}.exe {6E37AB46-D88A-442b-890B-2479923BDA8F}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2044 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe Token: SeIncBasePriorityPrivilege 3040 {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe Token: SeIncBasePriorityPrivilege 2984 {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe Token: SeIncBasePriorityPrivilege 2556 {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe Token: SeIncBasePriorityPrivilege 1972 {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe Token: SeIncBasePriorityPrivilege 1508 {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe Token: SeIncBasePriorityPrivilege 2900 {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe Token: SeIncBasePriorityPrivilege 1952 {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe Token: SeIncBasePriorityPrivilege 1720 {9F9A10D2-603A-4910-9A8F-D87FA705741B}.exe Token: SeIncBasePriorityPrivilege 2472 {6E37AB46-D88A-442b-890B-2479923BDA8F}.exe Token: SeIncBasePriorityPrivilege 2232 {44CE1C8D-B505-4477-AAB5-F738BB4C5D95}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 3040 2044 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe 28 PID 2044 wrote to memory of 3040 2044 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe 28 PID 2044 wrote to memory of 3040 2044 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe 28 PID 2044 wrote to memory of 3040 2044 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe 28 PID 2044 wrote to memory of 1820 2044 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe 29 PID 2044 wrote to memory of 1820 2044 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe 29 PID 2044 wrote to memory of 1820 2044 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe 29 PID 2044 wrote to memory of 1820 2044 2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe 29 PID 3040 wrote to memory of 2984 3040 {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe 30 PID 3040 wrote to memory of 2984 3040 {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe 30 PID 3040 wrote to memory of 2984 3040 {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe 30 PID 3040 wrote to memory of 2984 3040 {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe 30 PID 3040 wrote to memory of 2768 3040 {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe 31 PID 3040 wrote to memory of 2768 3040 {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe 31 PID 3040 wrote to memory of 2768 3040 {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe 31 PID 3040 wrote to memory of 2768 3040 {F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe 31 PID 2984 wrote to memory of 2556 2984 {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe 34 PID 2984 wrote to memory of 2556 2984 {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe 34 PID 2984 wrote to memory of 2556 2984 {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe 34 PID 2984 wrote to memory of 2556 2984 {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe 34 PID 2984 wrote to memory of 2500 2984 {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe 35 PID 2984 wrote to memory of 2500 2984 {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe 35 PID 2984 wrote to memory of 2500 2984 {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe 35 PID 2984 wrote to memory of 2500 2984 {26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe 35 PID 2556 wrote to memory of 1972 2556 {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe 36 PID 2556 wrote to memory of 1972 2556 {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe 36 PID 2556 wrote to memory of 1972 2556 {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe 36 PID 2556 wrote to memory of 1972 2556 {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe 36 PID 2556 wrote to memory of 560 2556 {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe 37 PID 2556 wrote to memory of 560 2556 {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe 37 PID 2556 wrote to memory of 560 2556 {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe 37 PID 2556 wrote to memory of 560 2556 {F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe 37 PID 1972 wrote to memory of 1508 1972 {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe 38 PID 1972 wrote to memory of 1508 1972 {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe 38 PID 1972 wrote to memory of 1508 1972 {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe 38 PID 1972 wrote to memory of 1508 1972 {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe 38 PID 1972 wrote to memory of 1504 1972 {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe 39 PID 1972 wrote to memory of 1504 1972 {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe 39 PID 1972 wrote to memory of 1504 1972 {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe 39 PID 1972 wrote to memory of 1504 1972 {3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe 39 PID 1508 wrote to memory of 2900 1508 {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe 40 PID 1508 wrote to memory of 2900 1508 {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe 40 PID 1508 wrote to memory of 2900 1508 {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe 40 PID 1508 wrote to memory of 2900 1508 {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe 40 PID 1508 wrote to memory of 2912 1508 {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe 41 PID 1508 wrote to memory of 2912 1508 {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe 41 PID 1508 wrote to memory of 2912 1508 {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe 41 PID 1508 wrote to memory of 2912 1508 {2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe 41 PID 2900 wrote to memory of 1952 2900 {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe 42 PID 2900 wrote to memory of 1952 2900 {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe 42 PID 2900 wrote to memory of 1952 2900 {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe 42 PID 2900 wrote to memory of 1952 2900 {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe 42 PID 2900 wrote to memory of 1944 2900 {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe 43 PID 2900 wrote to memory of 1944 2900 {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe 43 PID 2900 wrote to memory of 1944 2900 {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe 43 PID 2900 wrote to memory of 1944 2900 {0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe 43 PID 1952 wrote to memory of 1720 1952 {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe 44 PID 1952 wrote to memory of 1720 1952 {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe 44 PID 1952 wrote to memory of 1720 1952 {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe 44 PID 1952 wrote to memory of 1720 1952 {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe 44 PID 1952 wrote to memory of 1860 1952 {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe 45 PID 1952 wrote to memory of 1860 1952 {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe 45 PID 1952 wrote to memory of 1860 1952 {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe 45 PID 1952 wrote to memory of 1860 1952 {83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_1fd7e3cca40c7f82df0600b0cbaf9e6b_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\{F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exeC:\Windows\{F0C056FA-C55C-436f-AC2A-A2D9E0BB53B0}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\{26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exeC:\Windows\{26CDBDDA-ADDA-44d0-B907-70BE44F8BE32}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\{F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exeC:\Windows\{F12B51A8-CF7B-4e2c-A25F-8280FA0EAE96}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\{3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exeC:\Windows\{3FD1E643-3115-4e2b-B9B0-1A5368BC027B}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\{2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exeC:\Windows\{2F462AA5-B3D0-4965-B79B-5B0A9ECA5AEC}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\{0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exeC:\Windows\{0969A439-7D35-4e8a-86DB-E8DDE0CEDBEA}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\{83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exeC:\Windows\{83BBD5F1-82D9-4d4b-A1BF-87FE7A78DD7A}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\{9F9A10D2-603A-4910-9A8F-D87FA705741B}.exeC:\Windows\{9F9A10D2-603A-4910-9A8F-D87FA705741B}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1720 -
C:\Windows\{6E37AB46-D88A-442b-890B-2479923BDA8F}.exeC:\Windows\{6E37AB46-D88A-442b-890B-2479923BDA8F}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2472 -
C:\Windows\{44CE1C8D-B505-4477-AAB5-F738BB4C5D95}.exeC:\Windows\{44CE1C8D-B505-4477-AAB5-F738BB4C5D95}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2232 -
C:\Windows\{5D5F6D1E-548B-4d25-9991-884D9ED3C2A6}.exeC:\Windows\{5D5F6D1E-548B-4d25-9991-884D9ED3C2A6}.exe12⤵
- Executes dropped EXE
PID:2340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{44CE1~1.EXE > nul12⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E37A~1.EXE > nul11⤵PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9F9A1~1.EXE > nul10⤵PID:2564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{83BBD~1.EXE > nul9⤵PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0969A~1.EXE > nul8⤵PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2F462~1.EXE > nul7⤵PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3FD1E~1.EXE > nul6⤵PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F12B5~1.EXE > nul5⤵PID:560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26CDB~1.EXE > nul4⤵PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F0C05~1.EXE > nul3⤵PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5a4d17a681b99dd64c1565c80662a3303
SHA1e7a577ea9c6bc5174f22e08b4d4960a740ef6fa8
SHA2569aa2967d03bccff51ae0e05bc214c6d04b00c7426197f4c9eeb08db282cd1c30
SHA512ee0317d4b4c54b28385f56dab95eb1d9a2c6c07196698e105fc345e2f04e4130af79725e3d0909cf9f947c449eee3651c10877fd49437581de1fe33ed6d790f6
-
Filesize
380KB
MD52514599c99ff43dc9b0386e371bf9b09
SHA1f5e2bc6a7f0136559446fa5c3782bce6365067d8
SHA256d1c0044f9e33002cc4cb4e471512b18d31f427cc13f6b311459b0b1f5c1a4908
SHA5125db9aafdd0fb6ee4b0280275fc3e747d23207fc2aa6701e7bdb2f260244cbd207a27a78d8b63927cc5c1b773908d65dcb0f39ff711ce4694db36070f3ece2fea
-
Filesize
380KB
MD515c04a42dbcfc6770af614e2c581f786
SHA194ff55948f932be3d0b2d1bf33dc04f91758cc78
SHA2568f5b6db0c9e2667cafeaeedb134130d3a0e79e56b17b77ee82dedadecb1d51af
SHA512be621e16bc86cfbf868ccf57633ffc5b5c8f641a4cbaa10fe1c950b853f3e421e3a86fa37a2594bd6394b9737bb934e02f334fb1de3cf3a9a1f7ce9d410cfb0f
-
Filesize
380KB
MD57e53f8dbe8d722e3b3a32bfaa66d4340
SHA18be6a44a5e0a4b260c6ab67bf2ff1a614cc0932f
SHA25629eed82eb95708020a5ca6fdccd942bb3837848ea50c9d9a1725992106b28dff
SHA512365338455d2899dc81948e99fd4f668ea470e5f41ecdd450a3b4420ae3aab4636b7f5bf8213047dda8abc5a9ffb8a6ca31f5f978f6f7c6622046565b307e988e
-
Filesize
380KB
MD51eefe2fd05c17d3e53dfeeb718d84af1
SHA1c9dd6bddb6523c5296bfd8c30f65ca0c3a16745d
SHA25604abdce60381de8fc06ce2a41f79e07bda4aefa10699b8707b6efd30e002012e
SHA51217f73265965c8e7ea89cc42cc84449345a8b1859fed88993a89665cac51e90164548321e8ed2f2f8ae924951a571b9f8cf49d558b4fe6b0ff5257360ed08b871
-
Filesize
380KB
MD590a4db6c5a915955f8b555a14c7b9cf0
SHA1a2a83c3a5370dfb6a9173997ed6e2acaa04ab2bf
SHA256caa5fa9e443e267e292f891cf1a95d82089913ceec061ea8d8eda2b2386b5ad7
SHA512f9c0164c501a00b80d2c3a7f492f3ec2c3e78611f48ad025573fdad1da68bc175cfa9dcc4d587785c49c83233798e5eeb66aedf95a1dcb7793891ae44035c35b
-
Filesize
380KB
MD510b544e4c9470d24c0467aded39b9780
SHA1d63e229f01f1f0fdc3a037ca29260f7f31bbdf67
SHA256e64419949b275f3557c2658301413e86c0344759ded8fe1d57337351c4271b58
SHA512d04b40e58d7feab50b16cbc569227fd95217afa1b166d40510b3f45543fb7f1b38e93a7d48026ccab09d8ae41d089c7fd1319c776acb977a84c6d2585160b918
-
Filesize
380KB
MD5474482e56425cf3c6d8ea6d9505488d6
SHA14692289876c4e89c864e79229e4d70cf4ee4ad19
SHA256d6fb84461ec7309a4dddc75ea12fc387b2e7398134516da6f517fb681fdb5e89
SHA512b687a9d1b9acb1d0c1bcb854219007cfbbd96604b00503b91f07d5bac26ea1a363de0ddd9f5a0afd60da1e8c6b36cb892f6de19f4e4a23f6bca925c4d43f6cf7
-
Filesize
380KB
MD5568a7ea52dbecfc4fd5b4fe355b4bf9f
SHA11f43723f1f195abc82f4457766c996c1b74b9176
SHA256ccb65b2384b9dd72bb9c25649e051690bb2673398bcfd66540419ee4df5cd7a2
SHA51216e2e52f42daaf30734f47888ae6db34fa5672434aab39e5158657779c68072362e7b71099e7f79276a3795207aa069c680bd25ab54477e9b095cc1aebd9eedc
-
Filesize
380KB
MD5372ca42566e9a92934df551313422dcc
SHA1af19eeaeaf3e094414339caa1a93a67ced6e9fd2
SHA256c1388327e992c25ec6d4270737ff2da8c4eb892549bc018f80ce8f6362675efe
SHA5123e6592a40059238050a46f7e282fb610aa924340b4d0c9d19d70545ee86e9ca3612dfdc485f5da8fe9c7101400bf742d4b5c8e8d9b6482c35418e69325264fac
-
Filesize
380KB
MD57272f47d02d361bb3eb78932e8c74dd5
SHA1af0ffae7c7d1f85b1914917168845c2e99ef6c40
SHA256bb897997f0f644dd6ccce7e53f4c13f397c3b5ba4fff15ba9df9b27d716ba27e
SHA5128901093f0f64a7d4ad29de0f54b73aba22f1b316a2865ea5b1184ea1a6b9b020d56d3bc0b6bd9eb3c923928dbe4ed8f2cae893e04f6371603512f2cb8e1d00ff