Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe
-
Size
197KB
-
MD5
20044cb9ceb4146700223b0bac616a7d
-
SHA1
b18fd5d2373a34884c5f418652706dd6de676ced
-
SHA256
be33315be151410b5b07c1975edede05ba2595c3c6bb7314224d8afc55bdaeed
-
SHA512
fe390ea9988c0a917acf18b859e64b34ae4f35314533973850d2dca407213c119fbd078febbdfd917ab04e0c1aff8a7959f8189ebefd199c26b5d1696ade33fc
-
SSDEEP
3072:jEGh0o1l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGrlEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x00060000000231f6-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b00000001e0b8-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023201-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c00000001e0b8-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x004600000001e0be-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d00000001e0b8-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x004700000001e0be-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070b-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070d-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070b-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070d-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000000070b-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D4A3E008-4D6F-4a1d-9C9F-982452973E09} {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE76B1F6-D604-4e8f-8F69-5CA590B0BBC0} {A5597FE5-F796-41ca-ADAD-7E0C5BAD3957}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{010B1AAC-489C-4d43-8324-5B995EFF2294} {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{010B1AAC-489C-4d43-8324-5B995EFF2294}\stubpath = "C:\\Windows\\{010B1AAC-489C-4d43-8324-5B995EFF2294}.exe" {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0832B709-37D3-4087-9AD0-44CE6C99A8CA}\stubpath = "C:\\Windows\\{0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe" {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9CDB50FF-B86E-4826-A120-98424B93F989} {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{33DA965C-F39B-494f-9B59-B3CDD587720C}\stubpath = "C:\\Windows\\{33DA965C-F39B-494f-9B59-B3CDD587720C}.exe" {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A5597FE5-F796-41ca-ADAD-7E0C5BAD3957} {D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ABD53B1D-E1A3-40a5-86F2-C20705EE3576}\stubpath = "C:\\Windows\\{ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe" 2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0832B709-37D3-4087-9AD0-44CE6C99A8CA} {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9CDB50FF-B86E-4826-A120-98424B93F989}\stubpath = "C:\\Windows\\{9CDB50FF-B86E-4826-A120-98424B93F989}.exe" {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE} {9CDB50FF-B86E-4826-A120-98424B93F989}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8BB886EF-F5B5-4e8c-BC57-E06892904B33} {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D4A3E008-4D6F-4a1d-9C9F-982452973E09}\stubpath = "C:\\Windows\\{D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe" {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A5597FE5-F796-41ca-ADAD-7E0C5BAD3957}\stubpath = "C:\\Windows\\{A5597FE5-F796-41ca-ADAD-7E0C5BAD3957}.exe" {D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE76B1F6-D604-4e8f-8F69-5CA590B0BBC0}\stubpath = "C:\\Windows\\{FE76B1F6-D604-4e8f-8F69-5CA590B0BBC0}.exe" {A5597FE5-F796-41ca-ADAD-7E0C5BAD3957}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}\stubpath = "C:\\Windows\\{5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe" {9CDB50FF-B86E-4826-A120-98424B93F989}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F9E90D9-966A-49c7-942E-F3449A107E64} {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F9E90D9-966A-49c7-942E-F3449A107E64}\stubpath = "C:\\Windows\\{1F9E90D9-966A-49c7-942E-F3449A107E64}.exe" {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8BB886EF-F5B5-4e8c-BC57-E06892904B33}\stubpath = "C:\\Windows\\{8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe" {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{19A46163-3F4F-4b13-BCDB-9A0D18D9F936} {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ABD53B1D-E1A3-40a5-86F2-C20705EE3576} 2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{19A46163-3F4F-4b13-BCDB-9A0D18D9F936}\stubpath = "C:\\Windows\\{19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe" {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{33DA965C-F39B-494f-9B59-B3CDD587720C} {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe -
Executes dropped EXE 12 IoCs
pid Process 2504 {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe 4260 {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe 540 {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe 4424 {9CDB50FF-B86E-4826-A120-98424B93F989}.exe 768 {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe 1600 {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe 904 {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe 2524 {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe 3216 {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe 3100 {D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe 1164 {A5597FE5-F796-41ca-ADAD-7E0C5BAD3957}.exe 3812 {FE76B1F6-D604-4e8f-8F69-5CA590B0BBC0}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{A5597FE5-F796-41ca-ADAD-7E0C5BAD3957}.exe {D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe File created C:\Windows\{ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe 2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe File created C:\Windows\{010B1AAC-489C-4d43-8324-5B995EFF2294}.exe {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe File created C:\Windows\{0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe File created C:\Windows\{5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe {9CDB50FF-B86E-4826-A120-98424B93F989}.exe File created C:\Windows\{8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe File created C:\Windows\{D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe File created C:\Windows\{9CDB50FF-B86E-4826-A120-98424B93F989}.exe {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe File created C:\Windows\{1F9E90D9-966A-49c7-942E-F3449A107E64}.exe {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe File created C:\Windows\{19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe File created C:\Windows\{33DA965C-F39B-494f-9B59-B3CDD587720C}.exe {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe File created C:\Windows\{FE76B1F6-D604-4e8f-8F69-5CA590B0BBC0}.exe {A5597FE5-F796-41ca-ADAD-7E0C5BAD3957}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4556 2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe Token: SeIncBasePriorityPrivilege 2504 {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe Token: SeIncBasePriorityPrivilege 4260 {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe Token: SeIncBasePriorityPrivilege 540 {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe Token: SeIncBasePriorityPrivilege 4424 {9CDB50FF-B86E-4826-A120-98424B93F989}.exe Token: SeIncBasePriorityPrivilege 768 {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe Token: SeIncBasePriorityPrivilege 1600 {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe Token: SeIncBasePriorityPrivilege 904 {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe Token: SeIncBasePriorityPrivilege 2524 {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe Token: SeIncBasePriorityPrivilege 3216 {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe Token: SeIncBasePriorityPrivilege 3100 {D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe Token: SeIncBasePriorityPrivilege 1164 {A5597FE5-F796-41ca-ADAD-7E0C5BAD3957}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2504 4556 2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe 90 PID 4556 wrote to memory of 2504 4556 2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe 90 PID 4556 wrote to memory of 2504 4556 2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe 90 PID 4556 wrote to memory of 3740 4556 2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe 91 PID 4556 wrote to memory of 3740 4556 2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe 91 PID 4556 wrote to memory of 3740 4556 2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe 91 PID 2504 wrote to memory of 4260 2504 {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe 92 PID 2504 wrote to memory of 4260 2504 {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe 92 PID 2504 wrote to memory of 4260 2504 {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe 92 PID 2504 wrote to memory of 4736 2504 {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe 93 PID 2504 wrote to memory of 4736 2504 {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe 93 PID 2504 wrote to memory of 4736 2504 {ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe 93 PID 4260 wrote to memory of 540 4260 {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe 96 PID 4260 wrote to memory of 540 4260 {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe 96 PID 4260 wrote to memory of 540 4260 {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe 96 PID 4260 wrote to memory of 2304 4260 {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe 95 PID 4260 wrote to memory of 2304 4260 {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe 95 PID 4260 wrote to memory of 2304 4260 {010B1AAC-489C-4d43-8324-5B995EFF2294}.exe 95 PID 540 wrote to memory of 4424 540 {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe 97 PID 540 wrote to memory of 4424 540 {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe 97 PID 540 wrote to memory of 4424 540 {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe 97 PID 540 wrote to memory of 4692 540 {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe 98 PID 540 wrote to memory of 4692 540 {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe 98 PID 540 wrote to memory of 4692 540 {0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe 98 PID 4424 wrote to memory of 768 4424 {9CDB50FF-B86E-4826-A120-98424B93F989}.exe 99 PID 4424 wrote to memory of 768 4424 {9CDB50FF-B86E-4826-A120-98424B93F989}.exe 99 PID 4424 wrote to memory of 768 4424 {9CDB50FF-B86E-4826-A120-98424B93F989}.exe 99 PID 4424 wrote to memory of 2848 4424 {9CDB50FF-B86E-4826-A120-98424B93F989}.exe 100 PID 4424 wrote to memory of 2848 4424 {9CDB50FF-B86E-4826-A120-98424B93F989}.exe 100 PID 4424 wrote to memory of 2848 4424 {9CDB50FF-B86E-4826-A120-98424B93F989}.exe 100 PID 768 wrote to memory of 1600 768 {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe 101 PID 768 wrote to memory of 1600 768 {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe 101 PID 768 wrote to memory of 1600 768 {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe 101 PID 768 wrote to memory of 944 768 {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe 102 PID 768 wrote to memory of 944 768 {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe 102 PID 768 wrote to memory of 944 768 {5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe 102 PID 1600 wrote to memory of 904 1600 {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe 103 PID 1600 wrote to memory of 904 1600 {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe 103 PID 1600 wrote to memory of 904 1600 {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe 103 PID 1600 wrote to memory of 3860 1600 {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe 104 PID 1600 wrote to memory of 3860 1600 {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe 104 PID 1600 wrote to memory of 3860 1600 {1F9E90D9-966A-49c7-942E-F3449A107E64}.exe 104 PID 904 wrote to memory of 2524 904 {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe 105 PID 904 wrote to memory of 2524 904 {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe 105 PID 904 wrote to memory of 2524 904 {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe 105 PID 904 wrote to memory of 3468 904 {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe 106 PID 904 wrote to memory of 3468 904 {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe 106 PID 904 wrote to memory of 3468 904 {8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe 106 PID 2524 wrote to memory of 3216 2524 {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe 107 PID 2524 wrote to memory of 3216 2524 {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe 107 PID 2524 wrote to memory of 3216 2524 {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe 107 PID 2524 wrote to memory of 4964 2524 {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe 108 PID 2524 wrote to memory of 4964 2524 {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe 108 PID 2524 wrote to memory of 4964 2524 {19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe 108 PID 3216 wrote to memory of 3100 3216 {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe 109 PID 3216 wrote to memory of 3100 3216 {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe 109 PID 3216 wrote to memory of 3100 3216 {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe 109 PID 3216 wrote to memory of 2216 3216 {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe 110 PID 3216 wrote to memory of 2216 3216 {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe 110 PID 3216 wrote to memory of 2216 3216 {33DA965C-F39B-494f-9B59-B3CDD587720C}.exe 110 PID 3100 wrote to memory of 1164 3100 {D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe 112 PID 3100 wrote to memory of 1164 3100 {D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe 112 PID 3100 wrote to memory of 1164 3100 {D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe 112 PID 3100 wrote to memory of 2072 3100 {D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\{ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exeC:\Windows\{ABD53B1D-E1A3-40a5-86F2-C20705EE3576}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\{010B1AAC-489C-4d43-8324-5B995EFF2294}.exeC:\Windows\{010B1AAC-489C-4d43-8324-5B995EFF2294}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{010B1~1.EXE > nul4⤵PID:2304
-
-
C:\Windows\{0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exeC:\Windows\{0832B709-37D3-4087-9AD0-44CE6C99A8CA}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\{9CDB50FF-B86E-4826-A120-98424B93F989}.exeC:\Windows\{9CDB50FF-B86E-4826-A120-98424B93F989}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\{5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exeC:\Windows\{5AA0AB73-CB0E-49b9-BCBA-AFE84D8FDDFE}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\{1F9E90D9-966A-49c7-942E-F3449A107E64}.exeC:\Windows\{1F9E90D9-966A-49c7-942E-F3449A107E64}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\{8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exeC:\Windows\{8BB886EF-F5B5-4e8c-BC57-E06892904B33}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\{19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exeC:\Windows\{19A46163-3F4F-4b13-BCDB-9A0D18D9F936}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\{33DA965C-F39B-494f-9B59-B3CDD587720C}.exeC:\Windows\{33DA965C-F39B-494f-9B59-B3CDD587720C}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\{D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exeC:\Windows\{D4A3E008-4D6F-4a1d-9C9F-982452973E09}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4A3E~1.EXE > nul12⤵PID:2072
-
-
C:\Windows\{A5597FE5-F796-41ca-ADAD-7E0C5BAD3957}.exeC:\Windows\{A5597FE5-F796-41ca-ADAD-7E0C5BAD3957}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Windows\{FE76B1F6-D604-4e8f-8F69-5CA590B0BBC0}.exeC:\Windows\{FE76B1F6-D604-4e8f-8F69-5CA590B0BBC0}.exe13⤵
- Executes dropped EXE
PID:3812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A5597~1.EXE > nul13⤵PID:656
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{33DA9~1.EXE > nul11⤵PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{19A46~1.EXE > nul10⤵PID:4964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8BB88~1.EXE > nul9⤵PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1F9E9~1.EXE > nul8⤵PID:3860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5AA0A~1.EXE > nul7⤵PID:944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9CDB5~1.EXE > nul6⤵PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0832B~1.EXE > nul5⤵PID:4692
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ABD53~1.EXE > nul3⤵PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD504c6e4718c135d08edbb9aa114d8fbf0
SHA13d9bdb341cf8e1c6e4f54782c6e580959dde403d
SHA25637409e8d3c25433e9f68eb4bff0f03a25f504439309e3e216b7834d2881843f6
SHA512767ce8835f59895c9871e5e91421e7794ff0dcfe40283420f335177f953f07726ebb6a3d76c5c995badc6fcdc212b1f18947f2e8f18096cffe1fd4b1f65ce4da
-
Filesize
197KB
MD55e2ea72dcd409ce549e0cb009bd0c3c2
SHA133dbff40a0c0bf7bb31c1cd5d7446f1b0ce9e63f
SHA256b358704b15429e1c14bc95d0b2c4acbb6215c49674c6cd59dce5b180b12b768f
SHA5123aa32bc0a0db40e08cec63578b73dd361fbf65888a0a1d50468e582e285a8f3ec8abaf71391c7eb4321ccc0b7e6bb505b92e0c242954ee56709920c82de71a21
-
Filesize
197KB
MD56d0c649352064318417cb503f2ee04b0
SHA189a6e34e449bdc067dc20581ceb73f34a56579fb
SHA2565ff194d93650bd39d5156cbf8a5dc33feada93492eb0b96f6b91c4f31c582afa
SHA51251b0f380b1b1500fc5fab2da43785ef81457d994e95161adede09d4a3b8a7b8fa98d019adc3111d9aec0a3c70e470d414437312f8a64de8f7f67b84b427a06a6
-
Filesize
197KB
MD593a784c721bb90725e0f43cef521ca9e
SHA1469e7609d3a4f255619ade5d34a6072e2618f905
SHA25643696938ed911d26d33c23a5240bdb185ec2e18151b6edc3c425bd2696caca2e
SHA5125bc8e51ee0172643cb629ff8c2a477794c18c2822c2564a594cec19f9296a63df1f3fcda2df147ee681477607cf28dd303865a7b7e552d681963c68df0c3cb46
-
Filesize
197KB
MD552dd43b6910568e9a35fc6ae7b6bb770
SHA16d25f650a5baca60cbad5c9914d38691520ac096
SHA2561baaacdfce22eab9c2547621c2f1f83f1ac7d84571a1fd8f40ac3b8c1a8600fd
SHA5126758cf015c07ec4cb759cae7b724d36df0bf0aa77cce300c0f60adbf13ab7c9ddd377c3789a582495dbca2037e1b03d5d5a5f74eebc51ae6b087898a55f52f3c
-
Filesize
197KB
MD543723973680368e5f1f268f32dc5bac1
SHA1a54e171ea66de970f1a7bdb9930a7567116c0889
SHA256353374690606abb901aa8c1e8c49ed1528d82ee800fd507b312d5e000c251596
SHA5121a651d3eb433d5fc21de4e8f1dffdbd1bab52928f640e0afb93e46124ad02202e1f87e18024c2c6a14ac8177a51ff4163f90c49364025e239845b9ccffbdc24e
-
Filesize
197KB
MD5fa2497b76fbe1ce0b682f300e4db6086
SHA174643d1fc1365c37d6726bce62dc8bd22cd88744
SHA256150a341fedd4ccd4e7a69ea60663dd7571034146bdc4cd3b5ccb91c03a74c0da
SHA51292584a0a938550b7f175b647a12ab72bdc04a49e876a4f4b181d8baf3b06abd867894b48853e1cc3c249f2d8f6e37ceadbb5217f1de8c9a392fc4995591ba286
-
Filesize
197KB
MD59af5cd644802b73afb08bed99fcc6cf9
SHA1df4bb4c087d2c9314394e1c521ef12f6dd102d48
SHA25646113425dc4790f1c58632841848d50ac49cce29b0677c8137b85d3a1ad92b88
SHA512122e857c044fa180c41ab5c4376274db37975e65e62d042993eb751d93bc12eacc03b103c0ae8e5c0dd9460e037080d2e34f6808f33a841e8f1ca1396e55a7c2
-
Filesize
197KB
MD5ab41a94010d944a01e1e74231dcdcf29
SHA10adbc486e06d0ff6fe16441cd66858c2240163a7
SHA2560673ab112f2fc109cf7647e5bea575d509e6250ccb9449168df374ea8d7756b6
SHA512529afb4de26a19492e2a42314619f2a7c858ca5d4a6fe303a2a4f7ea261fb5bf18200263c4d726b260d74526e5b6a77710922e1558aa557780173c536dc7c5bf
-
Filesize
197KB
MD5635d015e62b98b0a96ab1a7976fc1099
SHA10a45c60196b787452849a7dbf4ed7367d8083e89
SHA256b40a6dced92725848d70722280c6a5cd9d7e188d4fc227a7dc2e012d7e212aa8
SHA512a3530adc57397cfbb8e6cff48a74d64a2a752a14ee24ec3b6b67ba07f2c17e25618fb983767fd8fb0be6889618af3cd731661b9059fd96bd8e406f9a4afcd211
-
Filesize
197KB
MD5776f4a6bfaa71d25178b8714f44de652
SHA15e0e55b772a968203d3a785c500d1702e81757ce
SHA2564e6f72320135d63d89547c90033ab2c187fd0842653db68ee612a7acab11fcd3
SHA512057b279e089c675213c1f7b07f2b6407e7ab497cc75ad45fb9f4eb4e101a3e64e28b64c17ad438396c159a7b42f9c5bf094532e307f5a0ce0a663f4e6aed6fe1
-
Filesize
197KB
MD55a8363626daeea6cd26684a22e4f608b
SHA164963eca23be0de94359e7a1acee92a2266f987d
SHA25681805546b5b6794cc1448d5cbb49ab2673f9aafc8b307e46277c24641681d5a2
SHA512eb4c78fe9737d2036c9b7936b7fc193be0a237a7bb21db880e580be7c6c51e35c4a1cf92832f51cf9d90fc4f36e821ea639998fffdede0a0d3a035228118ceca