Analysis
-
max time kernel
144s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe
-
Size
180KB
-
MD5
9bd223db2855b3132105851b1eab8c6c
-
SHA1
bc9fba551d039a6c5b5b61aee62c34ee35c7fdb4
-
SHA256
bf29b2f520b9fdbe5614450d4fb05da7fd54b8f0edccd8d80dc3d5f1bc787eef
-
SHA512
54e6b019c2e0c08ab5f130bf95dc8fe9c1d4a9298d664fa1296575331a2fa9a34e381599de6c548840da9a99215bf45e8b786dd4ac419cbc3d726c134a3436cd
-
SSDEEP
3072:jEGh0o0lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG6l5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
Processes:
resource yara_rule C:\Windows\{E364790D-49C4-4807-B814-1592F002290A}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{FC438743-566A-498c-8C72-3339D64D656F}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{4ABE6B66-D861-4052-9EC9-0E563903F940}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{85D1B3AD-0CEE-4981-82F5-29C8D182A09D}.exe GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
Processes:
{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe{4ABE6B66-D861-4052-9EC9-0E563903F940}.exe{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe{B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe{D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe{E364790D-49C4-4807-B814-1592F002290A}.exe{FC438743-566A-498c-8C72-3339D64D656F}.exe{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4ABE6B66-D861-4052-9EC9-0E563903F940} {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B27C2678-3D65-4415-B6D8-2271AF3BB0F2}\stubpath = "C:\\Windows\\{B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe" {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D041CFF6-E10F-457d-A2B3-7F7047A4EF10} {7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0} {B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{85D1B3AD-0CEE-4981-82F5-29C8D182A09D}\stubpath = "C:\\Windows\\{85D1B3AD-0CEE-4981-82F5-29C8D182A09D}.exe" {D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E364790D-49C4-4807-B814-1592F002290A}\stubpath = "C:\\Windows\\{E364790D-49C4-4807-B814-1592F002290A}.exe" 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC438743-566A-498c-8C72-3339D64D656F} {E364790D-49C4-4807-B814-1592F002290A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9} {FC438743-566A-498c-8C72-3339D64D656F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}\stubpath = "C:\\Windows\\{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe" {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}\stubpath = "C:\\Windows\\{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe" {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}\stubpath = "C:\\Windows\\{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe" {FC438743-566A-498c-8C72-3339D64D656F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4} {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4ABE6B66-D861-4052-9EC9-0E563903F940}\stubpath = "C:\\Windows\\{4ABE6B66-D861-4052-9EC9-0E563903F940}.exe" {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B27C2678-3D65-4415-B6D8-2271AF3BB0F2} {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}\stubpath = "C:\\Windows\\{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe" {B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D041CFF6-E10F-457d-A2B3-7F7047A4EF10}\stubpath = "C:\\Windows\\{D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe" {7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{85D1B3AD-0CEE-4981-82F5-29C8D182A09D} {D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E364790D-49C4-4807-B814-1592F002290A} 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC438743-566A-498c-8C72-3339D64D656F}\stubpath = "C:\\Windows\\{FC438743-566A-498c-8C72-3339D64D656F}.exe" {E364790D-49C4-4807-B814-1592F002290A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175} {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF} {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}\stubpath = "C:\\Windows\\{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe" {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe -
Executes dropped EXE 11 IoCs
Processes:
{E364790D-49C4-4807-B814-1592F002290A}.exe{FC438743-566A-498c-8C72-3339D64D656F}.exe{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe{4ABE6B66-D861-4052-9EC9-0E563903F940}.exe{B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe{D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe{85D1B3AD-0CEE-4981-82F5-29C8D182A09D}.exepid process 2796 {E364790D-49C4-4807-B814-1592F002290A}.exe 2760 {FC438743-566A-498c-8C72-3339D64D656F}.exe 2788 {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe 2128 {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe 2824 {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe 2072 {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe 2496 {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe 2804 {B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe 2088 {7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe 2808 {D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe 1140 {85D1B3AD-0CEE-4981-82F5-29C8D182A09D}.exe -
Drops file in Windows directory 11 IoCs
Processes:
{E364790D-49C4-4807-B814-1592F002290A}.exe{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe{4ABE6B66-D861-4052-9EC9-0E563903F940}.exe{D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe{FC438743-566A-498c-8C72-3339D64D656F}.exe{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe{B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exedescription ioc process File created C:\Windows\{FC438743-566A-498c-8C72-3339D64D656F}.exe {E364790D-49C4-4807-B814-1592F002290A}.exe File created C:\Windows\{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe File created C:\Windows\{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe File created C:\Windows\{B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe File created C:\Windows\{85D1B3AD-0CEE-4981-82F5-29C8D182A09D}.exe {D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe File created C:\Windows\{E364790D-49C4-4807-B814-1592F002290A}.exe 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe File created C:\Windows\{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe {FC438743-566A-498c-8C72-3339D64D656F}.exe File created C:\Windows\{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe File created C:\Windows\{4ABE6B66-D861-4052-9EC9-0E563903F940}.exe {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe File created C:\Windows\{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe {B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe File created C:\Windows\{D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe {7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe{E364790D-49C4-4807-B814-1592F002290A}.exe{FC438743-566A-498c-8C72-3339D64D656F}.exe{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe{4ABE6B66-D861-4052-9EC9-0E563903F940}.exe{B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe{D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exedescription pid process Token: SeIncBasePriorityPrivilege 1320 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe Token: SeIncBasePriorityPrivilege 2796 {E364790D-49C4-4807-B814-1592F002290A}.exe Token: SeIncBasePriorityPrivilege 2760 {FC438743-566A-498c-8C72-3339D64D656F}.exe Token: SeIncBasePriorityPrivilege 2788 {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe Token: SeIncBasePriorityPrivilege 2128 {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe Token: SeIncBasePriorityPrivilege 2824 {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe Token: SeIncBasePriorityPrivilege 2072 {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe Token: SeIncBasePriorityPrivilege 2496 {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe Token: SeIncBasePriorityPrivilege 2804 {B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe Token: SeIncBasePriorityPrivilege 2088 {7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe Token: SeIncBasePriorityPrivilege 2808 {D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe{E364790D-49C4-4807-B814-1592F002290A}.exe{FC438743-566A-498c-8C72-3339D64D656F}.exe{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe{4ABE6B66-D861-4052-9EC9-0E563903F940}.exedescription pid process target process PID 1320 wrote to memory of 2796 1320 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe {E364790D-49C4-4807-B814-1592F002290A}.exe PID 1320 wrote to memory of 2796 1320 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe {E364790D-49C4-4807-B814-1592F002290A}.exe PID 1320 wrote to memory of 2796 1320 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe {E364790D-49C4-4807-B814-1592F002290A}.exe PID 1320 wrote to memory of 2796 1320 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe {E364790D-49C4-4807-B814-1592F002290A}.exe PID 1320 wrote to memory of 2468 1320 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe cmd.exe PID 1320 wrote to memory of 2468 1320 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe cmd.exe PID 1320 wrote to memory of 2468 1320 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe cmd.exe PID 1320 wrote to memory of 2468 1320 2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe cmd.exe PID 2796 wrote to memory of 2760 2796 {E364790D-49C4-4807-B814-1592F002290A}.exe {FC438743-566A-498c-8C72-3339D64D656F}.exe PID 2796 wrote to memory of 2760 2796 {E364790D-49C4-4807-B814-1592F002290A}.exe {FC438743-566A-498c-8C72-3339D64D656F}.exe PID 2796 wrote to memory of 2760 2796 {E364790D-49C4-4807-B814-1592F002290A}.exe {FC438743-566A-498c-8C72-3339D64D656F}.exe PID 2796 wrote to memory of 2760 2796 {E364790D-49C4-4807-B814-1592F002290A}.exe {FC438743-566A-498c-8C72-3339D64D656F}.exe PID 2796 wrote to memory of 3020 2796 {E364790D-49C4-4807-B814-1592F002290A}.exe cmd.exe PID 2796 wrote to memory of 3020 2796 {E364790D-49C4-4807-B814-1592F002290A}.exe cmd.exe PID 2796 wrote to memory of 3020 2796 {E364790D-49C4-4807-B814-1592F002290A}.exe cmd.exe PID 2796 wrote to memory of 3020 2796 {E364790D-49C4-4807-B814-1592F002290A}.exe cmd.exe PID 2760 wrote to memory of 2788 2760 {FC438743-566A-498c-8C72-3339D64D656F}.exe {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe PID 2760 wrote to memory of 2788 2760 {FC438743-566A-498c-8C72-3339D64D656F}.exe {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe PID 2760 wrote to memory of 2788 2760 {FC438743-566A-498c-8C72-3339D64D656F}.exe {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe PID 2760 wrote to memory of 2788 2760 {FC438743-566A-498c-8C72-3339D64D656F}.exe {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe PID 2760 wrote to memory of 2196 2760 {FC438743-566A-498c-8C72-3339D64D656F}.exe cmd.exe PID 2760 wrote to memory of 2196 2760 {FC438743-566A-498c-8C72-3339D64D656F}.exe cmd.exe PID 2760 wrote to memory of 2196 2760 {FC438743-566A-498c-8C72-3339D64D656F}.exe cmd.exe PID 2760 wrote to memory of 2196 2760 {FC438743-566A-498c-8C72-3339D64D656F}.exe cmd.exe PID 2788 wrote to memory of 2128 2788 {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe PID 2788 wrote to memory of 2128 2788 {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe PID 2788 wrote to memory of 2128 2788 {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe PID 2788 wrote to memory of 2128 2788 {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe PID 2788 wrote to memory of 1980 2788 {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe cmd.exe PID 2788 wrote to memory of 1980 2788 {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe cmd.exe PID 2788 wrote to memory of 1980 2788 {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe cmd.exe PID 2788 wrote to memory of 1980 2788 {DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe cmd.exe PID 2128 wrote to memory of 2824 2128 {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe PID 2128 wrote to memory of 2824 2128 {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe PID 2128 wrote to memory of 2824 2128 {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe PID 2128 wrote to memory of 2824 2128 {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe PID 2128 wrote to memory of 2784 2128 {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe cmd.exe PID 2128 wrote to memory of 2784 2128 {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe cmd.exe PID 2128 wrote to memory of 2784 2128 {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe cmd.exe PID 2128 wrote to memory of 2784 2128 {BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe cmd.exe PID 2824 wrote to memory of 2072 2824 {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe PID 2824 wrote to memory of 2072 2824 {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe PID 2824 wrote to memory of 2072 2824 {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe PID 2824 wrote to memory of 2072 2824 {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe PID 2824 wrote to memory of 1992 2824 {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe cmd.exe PID 2824 wrote to memory of 1992 2824 {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe cmd.exe PID 2824 wrote to memory of 1992 2824 {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe cmd.exe PID 2824 wrote to memory of 1992 2824 {FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe cmd.exe PID 2072 wrote to memory of 2496 2072 {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe PID 2072 wrote to memory of 2496 2072 {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe PID 2072 wrote to memory of 2496 2072 {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe PID 2072 wrote to memory of 2496 2072 {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe PID 2072 wrote to memory of 548 2072 {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe cmd.exe PID 2072 wrote to memory of 548 2072 {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe cmd.exe PID 2072 wrote to memory of 548 2072 {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe cmd.exe PID 2072 wrote to memory of 548 2072 {0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe cmd.exe PID 2496 wrote to memory of 2804 2496 {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe {B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe PID 2496 wrote to memory of 2804 2496 {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe {B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe PID 2496 wrote to memory of 2804 2496 {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe {B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe PID 2496 wrote to memory of 2804 2496 {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe {B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe PID 2496 wrote to memory of 1736 2496 {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe cmd.exe PID 2496 wrote to memory of 1736 2496 {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe cmd.exe PID 2496 wrote to memory of 1736 2496 {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe cmd.exe PID 2496 wrote to memory of 1736 2496 {4ABE6B66-D861-4052-9EC9-0E563903F940}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-12_9bd223db2855b3132105851b1eab8c6c_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\{E364790D-49C4-4807-B814-1592F002290A}.exeC:\Windows\{E364790D-49C4-4807-B814-1592F002290A}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\{FC438743-566A-498c-8C72-3339D64D656F}.exeC:\Windows\{FC438743-566A-498c-8C72-3339D64D656F}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exeC:\Windows\{DCD1923D-6446-41ad-BAE7-C500A3DBC5A9}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exeC:\Windows\{BF1D99D6-BE4D-47fd-B99D-D18C07F1D175}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BF1D9~1.EXE > nul6⤵PID:2784
-
C:\Windows\{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exeC:\Windows\{FD710072-AD4F-41f7-9BF7-F80D0E85C7EF}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD710~1.EXE > nul7⤵PID:1992
-
C:\Windows\{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exeC:\Windows\{0E3CBA3F-7224-4692-AC71-37A8EB1E40B4}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0E3CB~1.EXE > nul8⤵PID:548
-
C:\Windows\{4ABE6B66-D861-4052-9EC9-0E563903F940}.exeC:\Windows\{4ABE6B66-D861-4052-9EC9-0E563903F940}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\{B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exeC:\Windows\{B27C2678-3D65-4415-B6D8-2271AF3BB0F2}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B27C2~1.EXE > nul10⤵PID:2440
-
C:\Windows\{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exeC:\Windows\{7B05688D-5BAF-43d0-978D-57DBAB4BB3B0}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\{D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exeC:\Windows\{D041CFF6-E10F-457d-A2B3-7F7047A4EF10}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D041C~1.EXE > nul12⤵PID:1100
-
C:\Windows\{85D1B3AD-0CEE-4981-82F5-29C8D182A09D}.exeC:\Windows\{85D1B3AD-0CEE-4981-82F5-29C8D182A09D}.exe12⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7B056~1.EXE > nul11⤵PID:2112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4ABE6~1.EXE > nul9⤵PID:1736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DCD19~1.EXE > nul5⤵PID:1980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FC438~1.EXE > nul4⤵PID:2196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E3647~1.EXE > nul3⤵PID:3020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD53ff592689db0acf6c46092e5ce8d773e
SHA1e0c49056b7a7f7d2667c6adb3ff811302cd2a873
SHA256f38d2d2366fec36cce0961af34cb17b06141b494d103ca6ca92843db3c7db03c
SHA512008bf14eb88698e013c1efc702b4651a097fc65c41cb623888cd74d1cc4604336a2be50a33df27caff590688c976d82578ac6a33b9d36c9c6f4bd6594b943e66
-
Filesize
180KB
MD5b7dd3ec2b0449ea381e7345482628f42
SHA161d83a3bff658ac7d8ba863692f298771fffda96
SHA2566c5cd05140305f66ebf091740726f92bb06d3b5588b6f84e1c70d2ff24b224b5
SHA512da9275c37c69c0c5814dfeae37ae05f154cd97ef0598258bd333d590ca414f74b51726ebb1be52655a0a413445f10533708292c30dcb1adb6a05662f13aea3c4
-
Filesize
180KB
MD535bd6cab45335ca29b27b7ee2c1cb212
SHA108a05ed0a85279cf9b1a8a3aa29b94278dc1d9c0
SHA256dedc47f3c7f934700a315f51e369a08f44cdb0e93529da5b6f0ca1d8e555323e
SHA5124d24612b177cc629adbfef2f63f69eddf8f04683167e79b266835c8e4dc6d51a97e4aaf1bebb1e9ce37b67709075e424378f09ce6265796e1aa54926f94f42b9
-
Filesize
180KB
MD537e8a1ded78e60ceecb108d90d66c05c
SHA1612b73ff96bb7bf06298989a41914ef7862bf9a1
SHA25630e8accbb3e6c35fb85b11e4014705232d6ebed8d68c5605bf3b91d7dba9c154
SHA5120ee39e26e2adb75f0e2e30406df017719a6bb70acf2136c381c87458bf319cf7736e68c268271167607083b68422e9c918821a4a21c856a994c42890d42bfb64
-
Filesize
180KB
MD56e14648c787caaae9c6b8244e91e8cee
SHA1ddf074ddd9f7cb727a6f5e149453b9a138a48f97
SHA256c55367a7f70eccd471040a29600c160f52535261a2007372f35cede459e01124
SHA5129cdc0848fbd14545c5c5cc977b18a6ef04d80447d1832508c4fe048ce769e1f0b9659b5f619ecc146a77c3cb582124e3faf3bbdbff4a85249244738ba5b62d17
-
Filesize
180KB
MD503338e08ad31b248b46229e6e412e249
SHA1e5e8e25cf8c453f6923406962f408979f2690972
SHA256035524f8b7668d0c4797e9417dc68a481b0696f26ac24cdc1819755ec9de069e
SHA512a81cff34682bf70574e50fdfd20ac22ce85370ae74f738fd33a74acccd41ccc5fea3c840257a30a457e1f124a9abb6e021e1ddb23f85d51c29d20f0155de1fca
-
Filesize
180KB
MD582a944f400f6b793acc31347af182fc7
SHA1531b2e3eea0b03955ba287f3c5df48adf37fc878
SHA256e39007bda10dfb9cc0a05a94bb6595a04b3683f0a4e1a902facc05740940e561
SHA5125ae8bc75570c412923135e302110d42f3b738a660ee6be85ff9531c10d9ec6904e1dfd493ce2a01be68ce87f5c7ddb75635187e2409561c532671bb177ad46f8
-
Filesize
180KB
MD56c004e4017549b1877d2bd97a99aba49
SHA1ba503ccc4953ecb228a70f585ee56b8e7923a751
SHA256f5a3363be1390cbf442b4cd8da2341f5965cdf25eb6a6440ad9be092fad93191
SHA5120ad264b0cbd3091ae0de195d7877e0aa30509f6c9058c15b4ba2fc99fb99bf3468b61020b9698b943bdfff26d37f2b48676c911451bed20573a9e89fc6078c8d
-
Filesize
180KB
MD52177e166ca9a9c2cf048d6758af7c0d4
SHA1867bfed5a688a12626482d3aa517bf828a26a23c
SHA2567179773354a524747de88e5354d56919feb7ab83d2144968773fd9f84a059732
SHA512ec8e129d9333a0232ec5cfdfe0e686ed0d805c4d03f0b0b0ea3b0a36bf741f243f106d659c585c72b91f8a49a7287d4a9ac8ec5945abf0aaaa22ee449fafc22e
-
Filesize
180KB
MD56ce9668a6b5ccea16620266468ad2857
SHA14fe56cc5adb2e98e26ccf01dba54edcab4a54c17
SHA2564317e8c98fd9c1245da49fc01f73a0f9ec8c17ab228cd79b24ac87d635d3a477
SHA512365ee4ef2836a668e83ec77eca9de75d5b6c20d92de860284d5fc5da5d7dd976715acb6a8f7f57212ae8d391c503fa661a92925d0a4543c308ccc1d4dd709d7e
-
Filesize
180KB
MD5be36fa99dfd0f4cbb1fccfa70b4cea81
SHA102d094e22a5acd9a63fe1b45a879ea8ca96fa990
SHA256f44302b6c54ac3eb924fddb64aab1b65a6f888993aa6a8c409b30d74d22c35d3
SHA5122c41eb09aa7adfac8f6005a968d977bcb681e510987303d4522aa03457321ca0bd7989397dafd6edbc53174443ba1c6f1d22b6840d03dc1da7a9432b64257ecf