Analysis
-
max time kernel
164s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe
-
Size
372KB
-
MD5
f1e60aa596eb60939085f33ae13e3120
-
SHA1
aad82b114d279da0f0192ba71aaf1be9a3bf9d1e
-
SHA256
b5329c84ca73b52df9c4a7310625c6d6455865d9b6a97f462bc946a52c48ef64
-
SHA512
eb52302a68c72fb2dc79f08ba2fa834b5e522b92503089cedcdc54e87290a929a24dbb33a8df28586bac69c1032aeadc3a4c4a92bda2f9b496a422189ccf00d4
-
SSDEEP
3072:CEGh0oXmlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGcl/Oe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x000600000002321c-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023223-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000600000002322a-11.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002322f-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0006000000023230-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002322f-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070b-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070d-29.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070b-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070d-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00030000000006e1-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000000070b-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C898C7F6-D512-4ff3-85F1-C81337ADE47B}\stubpath = "C:\\Windows\\{C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe" {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}\stubpath = "C:\\Windows\\{4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe" {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7609DAC7-53A0-446b-9C2F-381D3CD23985}\stubpath = "C:\\Windows\\{7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe" {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1} {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1C97613B-90F0-4451-9F02-8F370C41DC08} {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3BBB0E07-1197-4b2a-97F0-46D9744601A7}\stubpath = "C:\\Windows\\{3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe" {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA138FAA-1181-4579-B2A3-DF5761B042C8} {3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA138FAA-1181-4579-B2A3-DF5761B042C8}\stubpath = "C:\\Windows\\{AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe" {3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{010802DF-9471-4972-B95A-155AFFE58E66} {AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{010802DF-9471-4972-B95A-155AFFE58E66}\stubpath = "C:\\Windows\\{010802DF-9471-4972-B95A-155AFFE58E66}.exe" {AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A3F4EED-13C4-4c7a-B230-7E4CC49DF905} {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7609DAC7-53A0-446b-9C2F-381D3CD23985} {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EE78EC6B-BB21-444e-8D5B-A12088C457A5}\stubpath = "C:\\Windows\\{EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe" 2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6FB900B5-196C-4b17-851F-8306F2B8E85B}\stubpath = "C:\\Windows\\{6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe" {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1C97613B-90F0-4451-9F02-8F370C41DC08}\stubpath = "C:\\Windows\\{1C97613B-90F0-4451-9F02-8F370C41DC08}.exe" {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{19FAEF6D-15CE-4fdf-930D-D204C22B2803} {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D4BB092-B8B9-46ed-84FA-18D7C84AE63C} {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3BBB0E07-1197-4b2a-97F0-46D9744601A7} {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EE78EC6B-BB21-444e-8D5B-A12088C457A5} 2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C898C7F6-D512-4ff3-85F1-C81337ADE47B} {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6FB900B5-196C-4b17-851F-8306F2B8E85B} {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}\stubpath = "C:\\Windows\\{5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe" {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{19FAEF6D-15CE-4fdf-930D-D204C22B2803}\stubpath = "C:\\Windows\\{19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe" {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}\stubpath = "C:\\Windows\\{8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe" {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe -
Executes dropped EXE 12 IoCs
pid Process 5056 {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe 4232 {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe 3104 {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe 772 {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe 1568 {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe 980 {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe 2868 {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe 4428 {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe 3468 {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe 2972 {3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe 456 {AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe 4792 {010802DF-9471-4972-B95A-155AFFE58E66}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe File created C:\Windows\{1C97613B-90F0-4451-9F02-8F370C41DC08}.exe {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe File created C:\Windows\{8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe File created C:\Windows\{AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe {3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe File created C:\Windows\{C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe File created C:\Windows\{6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe File created C:\Windows\{7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe File created C:\Windows\{5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe File created C:\Windows\{19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe File created C:\Windows\{3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe File created C:\Windows\{010802DF-9471-4972-B95A-155AFFE58E66}.exe {AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe File created C:\Windows\{EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe 2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 644 2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe Token: SeIncBasePriorityPrivilege 5056 {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe Token: SeIncBasePriorityPrivilege 4232 {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe Token: SeIncBasePriorityPrivilege 3104 {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe Token: SeIncBasePriorityPrivilege 772 {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe Token: SeIncBasePriorityPrivilege 1568 {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe Token: SeIncBasePriorityPrivilege 980 {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe Token: SeIncBasePriorityPrivilege 2868 {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe Token: SeIncBasePriorityPrivilege 4428 {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe Token: SeIncBasePriorityPrivilege 3468 {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe Token: SeIncBasePriorityPrivilege 2972 {3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe Token: SeIncBasePriorityPrivilege 456 {AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 5056 644 2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe 84 PID 644 wrote to memory of 5056 644 2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe 84 PID 644 wrote to memory of 5056 644 2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe 84 PID 644 wrote to memory of 4808 644 2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe 85 PID 644 wrote to memory of 4808 644 2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe 85 PID 644 wrote to memory of 4808 644 2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe 85 PID 5056 wrote to memory of 4232 5056 {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe 91 PID 5056 wrote to memory of 4232 5056 {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe 91 PID 5056 wrote to memory of 4232 5056 {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe 91 PID 5056 wrote to memory of 1932 5056 {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe 90 PID 5056 wrote to memory of 1932 5056 {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe 90 PID 5056 wrote to memory of 1932 5056 {EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe 90 PID 4232 wrote to memory of 3104 4232 {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe 97 PID 4232 wrote to memory of 3104 4232 {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe 97 PID 4232 wrote to memory of 3104 4232 {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe 97 PID 4232 wrote to memory of 3420 4232 {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe 96 PID 4232 wrote to memory of 3420 4232 {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe 96 PID 4232 wrote to memory of 3420 4232 {C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe 96 PID 3104 wrote to memory of 772 3104 {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe 98 PID 3104 wrote to memory of 772 3104 {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe 98 PID 3104 wrote to memory of 772 3104 {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe 98 PID 3104 wrote to memory of 1656 3104 {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe 99 PID 3104 wrote to memory of 1656 3104 {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe 99 PID 3104 wrote to memory of 1656 3104 {6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe 99 PID 772 wrote to memory of 1568 772 {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe 100 PID 772 wrote to memory of 1568 772 {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe 100 PID 772 wrote to memory of 1568 772 {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe 100 PID 772 wrote to memory of 2912 772 {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe 101 PID 772 wrote to memory of 2912 772 {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe 101 PID 772 wrote to memory of 2912 772 {4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe 101 PID 1568 wrote to memory of 980 1568 {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe 102 PID 1568 wrote to memory of 980 1568 {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe 102 PID 1568 wrote to memory of 980 1568 {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe 102 PID 1568 wrote to memory of 3472 1568 {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe 103 PID 1568 wrote to memory of 3472 1568 {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe 103 PID 1568 wrote to memory of 3472 1568 {7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe 103 PID 980 wrote to memory of 2868 980 {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe 104 PID 980 wrote to memory of 2868 980 {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe 104 PID 980 wrote to memory of 2868 980 {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe 104 PID 980 wrote to memory of 1160 980 {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe 105 PID 980 wrote to memory of 1160 980 {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe 105 PID 980 wrote to memory of 1160 980 {5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe 105 PID 2868 wrote to memory of 4428 2868 {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe 106 PID 2868 wrote to memory of 4428 2868 {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe 106 PID 2868 wrote to memory of 4428 2868 {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe 106 PID 2868 wrote to memory of 1964 2868 {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe 107 PID 2868 wrote to memory of 1964 2868 {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe 107 PID 2868 wrote to memory of 1964 2868 {1C97613B-90F0-4451-9F02-8F370C41DC08}.exe 107 PID 4428 wrote to memory of 3468 4428 {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe 108 PID 4428 wrote to memory of 3468 4428 {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe 108 PID 4428 wrote to memory of 3468 4428 {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe 108 PID 4428 wrote to memory of 2876 4428 {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe 109 PID 4428 wrote to memory of 2876 4428 {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe 109 PID 4428 wrote to memory of 2876 4428 {19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe 109 PID 3468 wrote to memory of 2972 3468 {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe 110 PID 3468 wrote to memory of 2972 3468 {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe 110 PID 3468 wrote to memory of 2972 3468 {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe 110 PID 3468 wrote to memory of 4208 3468 {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe 111 PID 3468 wrote to memory of 4208 3468 {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe 111 PID 3468 wrote to memory of 4208 3468 {8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe 111 PID 2972 wrote to memory of 456 2972 {3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe 112 PID 2972 wrote to memory of 456 2972 {3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe 112 PID 2972 wrote to memory of 456 2972 {3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe 112 PID 2972 wrote to memory of 4352 2972 {3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\{EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exeC:\Windows\{EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EE78E~1.EXE > nul3⤵PID:1932
-
-
C:\Windows\{C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exeC:\Windows\{C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C898C~1.EXE > nul4⤵PID:3420
-
-
C:\Windows\{6FB900B5-196C-4b17-851F-8306F2B8E85B}.exeC:\Windows\{6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\{4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exeC:\Windows\{4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\{7609DAC7-53A0-446b-9C2F-381D3CD23985}.exeC:\Windows\{7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\{5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exeC:\Windows\{5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\{1C97613B-90F0-4451-9F02-8F370C41DC08}.exeC:\Windows\{1C97613B-90F0-4451-9F02-8F370C41DC08}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\{19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exeC:\Windows\{19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\{8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exeC:\Windows\{8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\{3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exeC:\Windows\{3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{AA138FAA-1181-4579-B2A3-DF5761B042C8}.exeC:\Windows\{AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:456 -
C:\Windows\{010802DF-9471-4972-B95A-155AFFE58E66}.exeC:\Windows\{010802DF-9471-4972-B95A-155AFFE58E66}.exe13⤵
- Executes dropped EXE
PID:4792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA138~1.EXE > nul13⤵PID:4952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3BBB0~1.EXE > nul12⤵PID:4352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D4BB~1.EXE > nul11⤵PID:4208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{19FAE~1.EXE > nul10⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C976~1.EXE > nul9⤵PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5F189~1.EXE > nul8⤵PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7609D~1.EXE > nul7⤵PID:3472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4A3F4~1.EXE > nul6⤵PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6FB90~1.EXE > nul5⤵PID:1656
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD58ca34a26b3b05e52ba7948fde94383ba
SHA15304ca082eee2b3fd73594735966ee95623f022b
SHA2565ca91fbb28f558d081b8d94e1031ad7d603cc1a2efbd0f0db38dc78e9a804676
SHA51280f58d745e8b401fce2021cb4c15b357ab3b8b03f34c66f859e422d021188ef5ac48c3c434e90878b0355513b1aeb7d90edfc178202c5f9e4669b8104eac44a2
-
Filesize
372KB
MD56bea467ca9980467fff59fb9cda1c72b
SHA184b81032acdc9d577e9997514542d10a75f083c4
SHA2560c5f588d51ff1b842434e056db04c4551a77daa8588491daa299ab7442802102
SHA512fd8c504f8e4b9a0978fa65f16020a1b47d5d8d046745b470a14b7c07d953f3b00545c9d5a64af4b254883736441baa32e83e71bdfa431643ef40035e3f7b080e
-
Filesize
372KB
MD5fb926a7922536986c6e364e3da071d76
SHA1a95ee5bdab5ffc8fde57b8d4de242329986f9f70
SHA2567f2af5c1b3c98e5953a6e4420239b27f4e225f052d76d53a2fef0fa5bdd4f731
SHA51293833f4c1ee91dd7abfa838560e4bcb28b07991ccaa9d9408e410f94114f7814d499b6fb7000ae9971f9058bcc0bd23666bbd427594fc9a391af33c792b05d1a
-
Filesize
372KB
MD5c45b064c2415f3a87cd949454b959289
SHA12ccf231cd885e86cf327b1b8640246665a7cb608
SHA256a930537b40920b39d99caed13e92f62354174f847a93e4287c04173ed6cfa505
SHA5120e942d6797abeb212a97bae3cd98d712650781a49bc3962f230423b057f6c006bf22122e6ffd4d2991ddc703a736c1478134303e1e6b19d01851b3344ebfa7f3
-
Filesize
372KB
MD58bc0a6eb3ea97ea88a83e02f46ca3167
SHA152250ce560638672f50b654c3b75d0d3f56bb9e6
SHA25675beab2fca47086536e903c52abf70be4d3855328cb997f4d4f04a1ceb601ba7
SHA5120319993522503f7e9b4bc607d69558220b0233728a954344c8c3d5ee72774e1d5805afec9867e3595e70fce4bf5e5f6e6491b5cbc8a72a63e960f28e4cf1a877
-
Filesize
372KB
MD532fd2c3fc10f5acbf6a1af7c71ec58d2
SHA1333dfc4154f1281f5645127d7696bb06e568519e
SHA256291cbd369e1686fa1244e071ecdfc8b3204c936ef8f2f8e0f9eae9457a8022d7
SHA512dd8005630c106d85e55b93b93a502673a8e715936378a158b9510081aa74196cafaaa223d6d4c10b1a003db05299d54222433e31070deaf639f99efc9f2ac376
-
Filesize
372KB
MD556bfc9ba5613b2f7035a68cd95fc3ae8
SHA1ac9277d1d682bac8e7b5a4f71592788f1c621ffd
SHA256e5203151317d9f9329bcdb03efc49d79ebd9395cc0fb701cf939d36b87010fe3
SHA51272a880b0a721738467a03d6e66c7ccff29da32f5f076996ce86d5e8195a6746b432d9c32001ac6102c501392d3a05030d0b505e7c03a58211233301dce1dcca2
-
Filesize
372KB
MD59a4ad2e339653cea3bc0b578fa5f7ae2
SHA1e7d5e71f86abd1ba52492fc505e10e9fd0523ae2
SHA256d6275a7fcd0c25daa67ee41d56a88854ec9d7b94bf167f160ffead56ea2944f2
SHA512815fee01623b6a2cd5a195c172bd4631c9ebd3e6d52c8d6c5837b49101c6fa2f09e79d8f1c840072e833030c0d4696cd1b8e99c8fe58e2f269fea51cb0e8339e
-
Filesize
372KB
MD5350c6e5b7cd1a6757ed0a42c6f0c33d2
SHA14b0ffd17e3d24b70074a42429a285ef3c30ef544
SHA25640765cc2906665f69f5cad067a3d7c8523208fac8db4cfe09005e395c782b962
SHA51277b8b507735668b4072cca261c578a0cb9850fbf73e19cb2d98d0fa7d27b33fee754fec03ce1466f48ae9568f2db90fa1e1bb2a1d153f9c489ec28e0d1d8a9bf
-
Filesize
372KB
MD5e3fda891dda7a45e273b61b24cc1d1f3
SHA11eeb59b8d164c798c25cfd07167be1fac76f69fa
SHA2565c59c0434990254a09def6887cff9c50f52f652d9660de6d52ca834eb44705eb
SHA512de593ff016397b42b24112747c43be5ec2284b733c1af56dddbdd071606cabfd4ea43295aea3ec48a7d442d05a625e54eccd3f6897222034386dd9b6fcda167f
-
Filesize
372KB
MD510331438899cd9666b4d281ea9a1c63a
SHA18948c32cb6393e141fd323cf21694f427786d441
SHA25632128f9d702d80ecb315917dc8387aa475ef3267ea07acfadd91313e77ffbc7e
SHA5120dc6a466ea15ab694e8313abfadee9fe2cbc3287ec47bfce1f73e9bf4a01cbf37e2a315f33dfff19d11bad84761bdb147707d5b6407dcacf3a314eded55a15a0
-
Filesize
372KB
MD5498e88d76dcf421a37a8721b70e38b25
SHA1e37ab6110db24f43038b9228f1044ec10b2f977e
SHA256499c6eb2aede8ad72891f5cc1a1477e306b7397515a5edff518acf3e58818e03
SHA5121d3c261b7740b0caf354413bbe997332ab82708e2d61131bb1f76fe835eefe5d95461486f16b33fae8fb89795e4dc241d502df9e439209167cd674f8ca6d5027