Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe
-
Size
180KB
-
MD5
24471f9a8df3f9edcb678263f3c7d491
-
SHA1
594c5325cc31a26bd2ba29abb3cd8d85ad5a1df9
-
SHA256
bdbd1f0d43f53a3fbf019381c0ccf661401fb7a6bba1914a6f3b400d1ca89480
-
SHA512
6717618ea628c4eb7b99bd0af96d16577a9c88b8781dbe6d35ca4fbb30210577b04e5df1eddd250afa41247ec0ff4f6a36a81278c473e668d1986fe7ea3b50ff
-
SSDEEP
3072:jEGh0onlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGNl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x00060000000231ee-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00060000000231f8-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000231fe-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000231f8-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021e70-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021e71-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000021e70-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000705-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000707-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000705-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000707-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000000705-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B340EF08-2BD6-4205-A187-58A9EEBBB63D}\stubpath = "C:\\Windows\\{B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe" 2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}\stubpath = "C:\\Windows\\{C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe" {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB} {4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{452DBAD8-59BC-4261-BC57-09038BF31A83}\stubpath = "C:\\Windows\\{452DBAD8-59BC-4261-BC57-09038BF31A83}.exe" {10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB}\stubpath = "C:\\Windows\\{10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB}.exe" {4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8F409A45-FC72-4470-83A4-DFEB06428E59}\stubpath = "C:\\Windows\\{8F409A45-FC72-4470-83A4-DFEB06428E59}.exe" {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{40924F63-7C6E-470d-A4BB-9750F3AA3201} {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4} {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}\stubpath = "C:\\Windows\\{7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe" {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}\stubpath = "C:\\Windows\\{4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe" {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8F409A45-FC72-4470-83A4-DFEB06428E59} {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{40924F63-7C6E-470d-A4BB-9750F3AA3201}\stubpath = "C:\\Windows\\{40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe" {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}\stubpath = "C:\\Windows\\{61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe" {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{452DBAD8-59BC-4261-BC57-09038BF31A83} {10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60993E86-70C5-47ea-B07D-2DCCE5AC77FA}\stubpath = "C:\\Windows\\{60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe" {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B8A3068-C258-4f4d-B364-DBEEE1B85BCE} {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{230E22A5-0857-4896-870C-A6D674E9F0ED} {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B340EF08-2BD6-4205-A187-58A9EEBBB63D} 2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763} {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F5E27668-CEDB-444d-9947-5B554B0A9E0C} {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F5E27668-CEDB-444d-9947-5B554B0A9E0C}\stubpath = "C:\\Windows\\{F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe" {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60993E86-70C5-47ea-B07D-2DCCE5AC77FA} {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{230E22A5-0857-4896-870C-A6D674E9F0ED}\stubpath = "C:\\Windows\\{230E22A5-0857-4896-870C-A6D674E9F0ED}.exe" {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF} {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe -
Executes dropped EXE 12 IoCs
pid Process 1768 {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe 4864 {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe 5080 {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe 3132 {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe 4852 {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe 2460 {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe 4776 {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe 2052 {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe 3212 {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe 2076 {4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe 4652 {10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB}.exe 3764 {452DBAD8-59BC-4261-BC57-09038BF31A83}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB}.exe {4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe File created C:\Windows\{452DBAD8-59BC-4261-BC57-09038BF31A83}.exe {10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB}.exe File created C:\Windows\{B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe 2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe File created C:\Windows\{8F409A45-FC72-4470-83A4-DFEB06428E59}.exe {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe File created C:\Windows\{C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe File created C:\Windows\{60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe File created C:\Windows\{230E22A5-0857-4896-870C-A6D674E9F0ED}.exe {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe File created C:\Windows\{4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe File created C:\Windows\{40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe File created C:\Windows\{61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe File created C:\Windows\{F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe File created C:\Windows\{7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3180 2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe Token: SeIncBasePriorityPrivilege 1768 {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe Token: SeIncBasePriorityPrivilege 4864 {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe Token: SeIncBasePriorityPrivilege 5080 {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe Token: SeIncBasePriorityPrivilege 3132 {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe Token: SeIncBasePriorityPrivilege 4852 {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe Token: SeIncBasePriorityPrivilege 2460 {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe Token: SeIncBasePriorityPrivilege 4776 {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe Token: SeIncBasePriorityPrivilege 2052 {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe Token: SeIncBasePriorityPrivilege 3212 {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe Token: SeIncBasePriorityPrivilege 2076 {4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe Token: SeIncBasePriorityPrivilege 4652 {10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3180 wrote to memory of 1768 3180 2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe 87 PID 3180 wrote to memory of 1768 3180 2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe 87 PID 3180 wrote to memory of 1768 3180 2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe 87 PID 3180 wrote to memory of 3848 3180 2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe 88 PID 3180 wrote to memory of 3848 3180 2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe 88 PID 3180 wrote to memory of 3848 3180 2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe 88 PID 1768 wrote to memory of 4864 1768 {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe 94 PID 1768 wrote to memory of 4864 1768 {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe 94 PID 1768 wrote to memory of 4864 1768 {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe 94 PID 1768 wrote to memory of 4648 1768 {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe 95 PID 1768 wrote to memory of 4648 1768 {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe 95 PID 1768 wrote to memory of 4648 1768 {B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe 95 PID 4864 wrote to memory of 5080 4864 {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe 97 PID 4864 wrote to memory of 5080 4864 {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe 97 PID 4864 wrote to memory of 5080 4864 {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe 97 PID 4864 wrote to memory of 4888 4864 {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe 98 PID 4864 wrote to memory of 4888 4864 {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe 98 PID 4864 wrote to memory of 4888 4864 {8F409A45-FC72-4470-83A4-DFEB06428E59}.exe 98 PID 5080 wrote to memory of 3132 5080 {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe 99 PID 5080 wrote to memory of 3132 5080 {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe 99 PID 5080 wrote to memory of 3132 5080 {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe 99 PID 5080 wrote to memory of 508 5080 {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe 100 PID 5080 wrote to memory of 508 5080 {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe 100 PID 5080 wrote to memory of 508 5080 {40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe 100 PID 3132 wrote to memory of 4852 3132 {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe 101 PID 3132 wrote to memory of 4852 3132 {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe 101 PID 3132 wrote to memory of 4852 3132 {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe 101 PID 3132 wrote to memory of 1784 3132 {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe 102 PID 3132 wrote to memory of 1784 3132 {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe 102 PID 3132 wrote to memory of 1784 3132 {61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe 102 PID 4852 wrote to memory of 2460 4852 {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe 103 PID 4852 wrote to memory of 2460 4852 {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe 103 PID 4852 wrote to memory of 2460 4852 {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe 103 PID 4852 wrote to memory of 4084 4852 {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe 104 PID 4852 wrote to memory of 4084 4852 {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe 104 PID 4852 wrote to memory of 4084 4852 {C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe 104 PID 2460 wrote to memory of 4776 2460 {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe 105 PID 2460 wrote to memory of 4776 2460 {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe 105 PID 2460 wrote to memory of 4776 2460 {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe 105 PID 2460 wrote to memory of 4412 2460 {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe 106 PID 2460 wrote to memory of 4412 2460 {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe 106 PID 2460 wrote to memory of 4412 2460 {F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe 106 PID 4776 wrote to memory of 2052 4776 {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe 107 PID 4776 wrote to memory of 2052 4776 {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe 107 PID 4776 wrote to memory of 2052 4776 {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe 107 PID 4776 wrote to memory of 4936 4776 {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe 108 PID 4776 wrote to memory of 4936 4776 {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe 108 PID 4776 wrote to memory of 4936 4776 {60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe 108 PID 2052 wrote to memory of 3212 2052 {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe 109 PID 2052 wrote to memory of 3212 2052 {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe 109 PID 2052 wrote to memory of 3212 2052 {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe 109 PID 2052 wrote to memory of 776 2052 {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe 110 PID 2052 wrote to memory of 776 2052 {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe 110 PID 2052 wrote to memory of 776 2052 {7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe 110 PID 3212 wrote to memory of 2076 3212 {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe 111 PID 3212 wrote to memory of 2076 3212 {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe 111 PID 3212 wrote to memory of 2076 3212 {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe 111 PID 3212 wrote to memory of 2780 3212 {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe 112 PID 3212 wrote to memory of 2780 3212 {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe 112 PID 3212 wrote to memory of 2780 3212 {230E22A5-0857-4896-870C-A6D674E9F0ED}.exe 112 PID 2076 wrote to memory of 4652 2076 {4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe 113 PID 2076 wrote to memory of 4652 2076 {4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe 113 PID 2076 wrote to memory of 4652 2076 {4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe 113 PID 2076 wrote to memory of 4988 2076 {4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-18_24471f9a8df3f9edcb678263f3c7d491_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\{B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exeC:\Windows\{B340EF08-2BD6-4205-A187-58A9EEBBB63D}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\{8F409A45-FC72-4470-83A4-DFEB06428E59}.exeC:\Windows\{8F409A45-FC72-4470-83A4-DFEB06428E59}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\{40924F63-7C6E-470d-A4BB-9750F3AA3201}.exeC:\Windows\{40924F63-7C6E-470d-A4BB-9750F3AA3201}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\{61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exeC:\Windows\{61C1EC8B-8F41-4beb-9DAE-8C6A253F4EB4}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\{C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exeC:\Windows\{C1BBA179-6BE0-47f0-BE4B-73C5B0C0F763}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\{F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exeC:\Windows\{F5E27668-CEDB-444d-9947-5B554B0A9E0C}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\{60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exeC:\Windows\{60993E86-70C5-47ea-B07D-2DCCE5AC77FA}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\{7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exeC:\Windows\{7B8A3068-C258-4f4d-B364-DBEEE1B85BCE}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\{230E22A5-0857-4896-870C-A6D674E9F0ED}.exeC:\Windows\{230E22A5-0857-4896-870C-A6D674E9F0ED}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\{4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exeC:\Windows\{4B137BD1-B2F8-4a00-B3BE-6E8DF24788EF}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\{10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB}.exeC:\Windows\{10A692B7-9CB2-407f-8E0C-BACD5C1C7FCB}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4652 -
C:\Windows\{452DBAD8-59BC-4261-BC57-09038BF31A83}.exeC:\Windows\{452DBAD8-59BC-4261-BC57-09038BF31A83}.exe13⤵
- Executes dropped EXE
PID:3764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{10A69~1.EXE > nul13⤵PID:1196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4B137~1.EXE > nul12⤵PID:4988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{230E2~1.EXE > nul11⤵PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7B8A3~1.EXE > nul10⤵PID:776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{60993~1.EXE > nul9⤵PID:4936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F5E27~1.EXE > nul8⤵PID:4412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C1BBA~1.EXE > nul7⤵PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{61C1E~1.EXE > nul6⤵PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{40924~1.EXE > nul5⤵PID:508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8F409~1.EXE > nul4⤵PID:4888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B340E~1.EXE > nul3⤵PID:4648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5a3374321ecc96ddf7a7bcb3eee39533e
SHA1e1d3bfb5dd1f6965e7a5bf6f3eb2c852ea032c86
SHA2560d128eaf0e5fc5c22fb293036d13b25ee5824a1340d5e7fc51bf7c9ec346e573
SHA512d1e81320bce88b678e546d38ccec720ffd7070c39d3d8f1678e2462a1201b5f4e8796ad4a4ea0eda0d6486d20ad4ca9f00e479d90caa7dd11d681534ba6e7fef
-
Filesize
180KB
MD50d7d92b632bc2a54eb1ffb64c06cdf5e
SHA1abeaeeb4bd875ad76d26139617a16891b749fe10
SHA25616065e97b75f573477c46e47a691b728674145d92039f0bd26717db0ada98ba4
SHA5122854ae250a2d761a083f333460fba3e712778db42abb96f8420be9f6128e1936ebbc35f01225b4289406d799c2d3fb18f2873381942e904d006df4344ef04644
-
Filesize
180KB
MD50f4104b972d7c1c4eaf26f7481726467
SHA1466c60112dc53ef4263ba3164202f87222fddcb9
SHA25607f914cd65d0d6ab681493f2c1702683acd5bb2ff0bd4327f7e8dff1ac32ab1d
SHA5124ad5856a83ea32d5d4c8e6c737d36bb561f16bc3d632c041cc61ff5a9b7bffb8ce6cad00a9fffdac28e6ebcca2fc98b6a565d5b8b2759173222248a3d98d7e0c
-
Filesize
180KB
MD510ac872a318f05478d5bca6413f3639b
SHA1ef77a1cd9540aae0b153abdb5c254eba5f5cf99c
SHA25685cb298e9c37857e2ecfb5f1d87d89e02aca650b17a0ecb6c56148cb013f09f9
SHA512437387b55a5416d5d76cdd462ebbb5f9a4d634046c55f22d9f30d154e1e17c599765f4b4685919e83a7372bc260d6abc33501e1d45b0de0457957af2d6c310ca
-
Filesize
180KB
MD5fb0937308764f18aa35d516d0d0723a7
SHA1d817a43fe41c300349d6607190033e63278507ce
SHA256c86db533aeba63645a50b53d68c3c5018b994a5897e13bf9dce655785c875d22
SHA5125fe7ccbf4b19021179c7d8ed3e78d4e0ea345dd4022ca99c80bd3c15414c73446f0ddf5a4f2e6cc788efac13e975c053282389f606cc9fdaf23026d7234acd75
-
Filesize
180KB
MD530ebe5863f6ab127eb5ad017fd0586bb
SHA19cc5de75c635ee5843122167941cbd983694d135
SHA2568f3b3dc285525ffc20be5ffd5bd52d822853f0013ca8ace844c0f5a522d92271
SHA5128c05be015c3f07a420da1f95dfeba546d245b27ec58acd81f13a0ed2b7cb023d771dce5819e3b30e4f454f5043787c4c718a24ccbef6b67eb3b0ea8464f495cd
-
Filesize
180KB
MD5cc6ad5e5339c89cdbfa9ce423d633f7e
SHA13ed1f0c4b67f905008cf03db69e5f977faa48add
SHA25647a3e0fcdade1bf71babfe1d8cf9b8aaafd826c1e9086c28b0f1a071bbc6128c
SHA512298d3b0532b81ba4ca422488d2a539aeefb058987f5b7771820a19809fc8e7eba6b903761454b67acdb04b39e936c452a248b38834e51580d8e2ef92c54a2f87
-
Filesize
180KB
MD5aefd3576b21b7208c939f01f146b3a76
SHA1a55f1c711b59db789326e7536ece53e6148ba5d8
SHA256f5b4c99bead71f151d3faa48666df80e33eb3662b3b490e17f8ba9f77f64e2aa
SHA51282935ecd6f06c036ac690f2d5b560461bb3180aa37a1c70d8746d6836597251d0a9fde81821b4b9bf15e6a5696beff8b85ec31619715ef28d8af758684a4696a
-
Filesize
180KB
MD521d71cb001ccfe17f21329ae5f8d4b31
SHA15178f36ee4ff65858d11b67d45525f02943ee142
SHA256a0657d949d338760bf9222bac6a90fb223cc65d1a8de2b2d491d2d5a7595b17e
SHA512330a44510868e491716984614fe32ef97dccd89ec41c473eb136578a9f45b00922b1e2bf1fc35484d9343bbb3675c85fc2b3d6dc348598a60e31cf8af1d4b311
-
Filesize
180KB
MD5fdf325b9f9f01379b952917504e63a31
SHA129590437456cf7d3b78e79a81dff2dedc642903a
SHA2569f5cba783f72b65ba73a591150965da33dc742278fd4744bd3c9447c6b05cd36
SHA51207ca10845c9df2784665d42c27500b6af34ef62d977957f5f8e962bda2ad1a4ef9ed77b145508849c68f156808a136cbc967a529e0d0f4cf5a4ac24888274f1e
-
Filesize
180KB
MD5e31a906b48d92177dc1e3acb7450208e
SHA16a66eb9539d7cfd4b14cbd3d81f80f25670969ab
SHA2560618baf99eb24be817d6a914ee9e9889605583ac4e13320ec358c18ba651c953
SHA5120f87f9666ee44cf78e86d274460bb83ba1d77d90372e6a63175c395ff768b5b7122d76f906f23d39bfb94978feab84aaa6e4061a4b592a3c9ce4a257db7c44f7
-
Filesize
180KB
MD5f277af7d9ee4fdcd7563db61095fdc00
SHA185620bf4b7ab77b040ecc96200c2d5d505a084dd
SHA25686980e62d1fc429410bb32a7f153a540ed55c3f7f2d8b43ee1650c79af184edb
SHA51255c712fb25a022b3106c88c4f0897f0754fda9b654480f6f89c3a7d23849091f4041547ff30da747ae110167a3dc7c24bf7268e408c136a04ee0b4a44af28d3d