Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe
-
Size
408KB
-
MD5
922e4eaf5893540bd0a40051f35c508c
-
SHA1
d80bbfa595b9a6adbb4772cf7d499dfb1fe39a5e
-
SHA256
d015650f4ef5954f73e3577f7dfa7f15042c3f3c7d139c31e0f20d48a2d7253c
-
SHA512
babefa243aeaab19fff9cefe5742a42ecf5e23eda6e7f55528232f251118640640b06a404cf3ab98c2ebf7a8bb8e11eda73f7f39ccf2aa2b192ce627a47d09e2
-
SSDEEP
3072:CEGh0ocl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGOldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Auto-generated rule 13 IoCs
resource yara_rule behavioral2/files/0x000700000002323b-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023054-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023245-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023248-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023248-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000022008-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000022009-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000022008-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000036-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070b-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000000036-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070b-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000715-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{70FC60F1-588E-4053-9E19-F6E5119528B6}\stubpath = "C:\\Windows\\{70FC60F1-588E-4053-9E19-F6E5119528B6}.exe" {72087DF5-254D-413e-B53C-AB478EB45B56}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2150019A-380C-4f76-B4EA-B48B8ECE018E} {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}\stubpath = "C:\\Windows\\{12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe" {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{28C313C9-D27C-4a70-8279-8E565CB6DCED} {12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{28C313C9-D27C-4a70-8279-8E565CB6DCED}\stubpath = "C:\\Windows\\{28C313C9-D27C-4a70-8279-8E565CB6DCED}.exe" {12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB} 2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}\stubpath = "C:\\Windows\\{D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe" 2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0BD4D972-9614-432c-9318-3A4D5709B50E} {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A393E40-9AAC-4b59-BA72-9493A65297EA} {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A393E40-9AAC-4b59-BA72-9493A65297EA}\stubpath = "C:\\Windows\\{9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe" {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E874403-0093-4625-8CA4-F62B52D4A3BE}\stubpath = "C:\\Windows\\{3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe" {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F03F9D2E-2E7E-49ba-9D22-868E22A6AF59} {28C313C9-D27C-4a70-8279-8E565CB6DCED}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F03F9D2E-2E7E-49ba-9D22-868E22A6AF59}\stubpath = "C:\\Windows\\{F03F9D2E-2E7E-49ba-9D22-868E22A6AF59}.exe" {28C313C9-D27C-4a70-8279-8E565CB6DCED}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72087DF5-254D-413e-B53C-AB478EB45B56}\stubpath = "C:\\Windows\\{72087DF5-254D-413e-B53C-AB478EB45B56}.exe" {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2150019A-380C-4f76-B4EA-B48B8ECE018E}\stubpath = "C:\\Windows\\{2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe" {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}\stubpath = "C:\\Windows\\{62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe" {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0BD4D972-9614-432c-9318-3A4D5709B50E}\stubpath = "C:\\Windows\\{0BD4D972-9614-432c-9318-3A4D5709B50E}.exe" {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7CF846F1-AFA2-49c8-A092-2E761AC97DEC} {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7CF846F1-AFA2-49c8-A092-2E761AC97DEC}\stubpath = "C:\\Windows\\{7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe" {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E874403-0093-4625-8CA4-F62B52D4A3BE} {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA} {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72087DF5-254D-413e-B53C-AB478EB45B56} {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{70FC60F1-588E-4053-9E19-F6E5119528B6} {72087DF5-254D-413e-B53C-AB478EB45B56}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD} {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe -
Executes dropped EXE 12 IoCs
pid Process 908 {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe 4016 {72087DF5-254D-413e-B53C-AB478EB45B56}.exe 4732 {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe 1112 {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe 2736 {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe 4404 {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe 2432 {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe 4232 {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe 1804 {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe 2628 {12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe 1844 {28C313C9-D27C-4a70-8279-8E565CB6DCED}.exe 1880 {F03F9D2E-2E7E-49ba-9D22-868E22A6AF59}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{0BD4D972-9614-432c-9318-3A4D5709B50E}.exe {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe File created C:\Windows\{7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe File created C:\Windows\{28C313C9-D27C-4a70-8279-8E565CB6DCED}.exe {12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe File created C:\Windows\{F03F9D2E-2E7E-49ba-9D22-868E22A6AF59}.exe {28C313C9-D27C-4a70-8279-8E565CB6DCED}.exe File created C:\Windows\{2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe File created C:\Windows\{9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe File created C:\Windows\{3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe File created C:\Windows\{12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe File created C:\Windows\{D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe 2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe File created C:\Windows\{72087DF5-254D-413e-B53C-AB478EB45B56}.exe {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe File created C:\Windows\{70FC60F1-588E-4053-9E19-F6E5119528B6}.exe {72087DF5-254D-413e-B53C-AB478EB45B56}.exe File created C:\Windows\{62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4996 2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe Token: SeIncBasePriorityPrivilege 908 {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe Token: SeIncBasePriorityPrivilege 4016 {72087DF5-254D-413e-B53C-AB478EB45B56}.exe Token: SeIncBasePriorityPrivilege 4732 {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe Token: SeIncBasePriorityPrivilege 1112 {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe Token: SeIncBasePriorityPrivilege 2736 {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe Token: SeIncBasePriorityPrivilege 4404 {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe Token: SeIncBasePriorityPrivilege 2432 {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe Token: SeIncBasePriorityPrivilege 4232 {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe Token: SeIncBasePriorityPrivilege 1804 {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe Token: SeIncBasePriorityPrivilege 2628 {12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe Token: SeIncBasePriorityPrivilege 1844 {28C313C9-D27C-4a70-8279-8E565CB6DCED}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4996 wrote to memory of 908 4996 2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe 92 PID 4996 wrote to memory of 908 4996 2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe 92 PID 4996 wrote to memory of 908 4996 2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe 92 PID 4996 wrote to memory of 4560 4996 2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe 93 PID 4996 wrote to memory of 4560 4996 2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe 93 PID 4996 wrote to memory of 4560 4996 2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe 93 PID 908 wrote to memory of 4016 908 {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe 94 PID 908 wrote to memory of 4016 908 {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe 94 PID 908 wrote to memory of 4016 908 {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe 94 PID 908 wrote to memory of 3592 908 {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe 95 PID 908 wrote to memory of 3592 908 {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe 95 PID 908 wrote to memory of 3592 908 {D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe 95 PID 4016 wrote to memory of 4732 4016 {72087DF5-254D-413e-B53C-AB478EB45B56}.exe 98 PID 4016 wrote to memory of 4732 4016 {72087DF5-254D-413e-B53C-AB478EB45B56}.exe 98 PID 4016 wrote to memory of 4732 4016 {72087DF5-254D-413e-B53C-AB478EB45B56}.exe 98 PID 4016 wrote to memory of 4368 4016 {72087DF5-254D-413e-B53C-AB478EB45B56}.exe 97 PID 4016 wrote to memory of 4368 4016 {72087DF5-254D-413e-B53C-AB478EB45B56}.exe 97 PID 4016 wrote to memory of 4368 4016 {72087DF5-254D-413e-B53C-AB478EB45B56}.exe 97 PID 4732 wrote to memory of 1112 4732 {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe 99 PID 4732 wrote to memory of 1112 4732 {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe 99 PID 4732 wrote to memory of 1112 4732 {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe 99 PID 4732 wrote to memory of 3128 4732 {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe 100 PID 4732 wrote to memory of 3128 4732 {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe 100 PID 4732 wrote to memory of 3128 4732 {70FC60F1-588E-4053-9E19-F6E5119528B6}.exe 100 PID 1112 wrote to memory of 2736 1112 {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe 101 PID 1112 wrote to memory of 2736 1112 {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe 101 PID 1112 wrote to memory of 2736 1112 {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe 101 PID 1112 wrote to memory of 2448 1112 {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe 102 PID 1112 wrote to memory of 2448 1112 {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe 102 PID 1112 wrote to memory of 2448 1112 {62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe 102 PID 2736 wrote to memory of 4404 2736 {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe 103 PID 2736 wrote to memory of 4404 2736 {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe 103 PID 2736 wrote to memory of 4404 2736 {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe 103 PID 2736 wrote to memory of 5012 2736 {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe 104 PID 2736 wrote to memory of 5012 2736 {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe 104 PID 2736 wrote to memory of 5012 2736 {2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe 104 PID 4404 wrote to memory of 2432 4404 {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe 105 PID 4404 wrote to memory of 2432 4404 {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe 105 PID 4404 wrote to memory of 2432 4404 {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe 105 PID 4404 wrote to memory of 2152 4404 {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe 106 PID 4404 wrote to memory of 2152 4404 {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe 106 PID 4404 wrote to memory of 2152 4404 {0BD4D972-9614-432c-9318-3A4D5709B50E}.exe 106 PID 2432 wrote to memory of 4232 2432 {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe 107 PID 2432 wrote to memory of 4232 2432 {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe 107 PID 2432 wrote to memory of 4232 2432 {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe 107 PID 2432 wrote to memory of 4348 2432 {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe 108 PID 2432 wrote to memory of 4348 2432 {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe 108 PID 2432 wrote to memory of 4348 2432 {7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe 108 PID 4232 wrote to memory of 1804 4232 {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe 109 PID 4232 wrote to memory of 1804 4232 {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe 109 PID 4232 wrote to memory of 1804 4232 {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe 109 PID 4232 wrote to memory of 3632 4232 {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe 110 PID 4232 wrote to memory of 3632 4232 {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe 110 PID 4232 wrote to memory of 3632 4232 {9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe 110 PID 1804 wrote to memory of 2628 1804 {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe 111 PID 1804 wrote to memory of 2628 1804 {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe 111 PID 1804 wrote to memory of 2628 1804 {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe 111 PID 1804 wrote to memory of 1756 1804 {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe 112 PID 1804 wrote to memory of 1756 1804 {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe 112 PID 1804 wrote to memory of 1756 1804 {3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe 112 PID 2628 wrote to memory of 1844 2628 {12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe 113 PID 2628 wrote to memory of 1844 2628 {12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe 113 PID 2628 wrote to memory of 1844 2628 {12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe 113 PID 2628 wrote to memory of 3156 2628 {12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_922e4eaf5893540bd0a40051f35c508c_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\{D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exeC:\Windows\{D17FFBF0-7E28-4b5b-B965-7ACEA6D746FB}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\{72087DF5-254D-413e-B53C-AB478EB45B56}.exeC:\Windows\{72087DF5-254D-413e-B53C-AB478EB45B56}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72087~1.EXE > nul4⤵PID:4368
-
-
C:\Windows\{70FC60F1-588E-4053-9E19-F6E5119528B6}.exeC:\Windows\{70FC60F1-588E-4053-9E19-F6E5119528B6}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\{62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exeC:\Windows\{62CC97E5-7F1A-4cbe-96D9-F2945DFCD0BD}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\{2150019A-380C-4f76-B4EA-B48B8ECE018E}.exeC:\Windows\{2150019A-380C-4f76-B4EA-B48B8ECE018E}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{0BD4D972-9614-432c-9318-3A4D5709B50E}.exeC:\Windows\{0BD4D972-9614-432c-9318-3A4D5709B50E}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\{7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exeC:\Windows\{7CF846F1-AFA2-49c8-A092-2E761AC97DEC}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\{9A393E40-9AAC-4b59-BA72-9493A65297EA}.exeC:\Windows\{9A393E40-9AAC-4b59-BA72-9493A65297EA}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\{3E874403-0093-4625-8CA4-F62B52D4A3BE}.exeC:\Windows\{3E874403-0093-4625-8CA4-F62B52D4A3BE}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\{12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exeC:\Windows\{12752BE6-AECE-44bd-8AA2-1D2E3AE7D9AA}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\{28C313C9-D27C-4a70-8279-8E565CB6DCED}.exeC:\Windows\{28C313C9-D27C-4a70-8279-8E565CB6DCED}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Windows\{F03F9D2E-2E7E-49ba-9D22-868E22A6AF59}.exeC:\Windows\{F03F9D2E-2E7E-49ba-9D22-868E22A6AF59}.exe13⤵
- Executes dropped EXE
PID:1880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{28C31~1.EXE > nul13⤵PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{12752~1.EXE > nul12⤵PID:3156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3E874~1.EXE > nul11⤵PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9A393~1.EXE > nul10⤵PID:3632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7CF84~1.EXE > nul9⤵PID:4348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0BD4D~1.EXE > nul8⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{21500~1.EXE > nul7⤵PID:5012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{62CC9~1.EXE > nul6⤵PID:2448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70FC6~1.EXE > nul5⤵PID:3128
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D17FF~1.EXE > nul3⤵PID:3592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5308251533525506890e9e24401dff1b4
SHA1829c5e978e130c96c404eeafeb274c8994008aa5
SHA256fabd169387472cb9b9609256a95e91e634747f8718fda2fc170ba1d2e8ec6de0
SHA5124fe7931284208f79efee985d5211dc423d1112567d1c1ad3e371fa1363e3014560af660eea6137112ab626b4531d3a62d6c346f9f86525b5c7ad55138c356f26
-
Filesize
408KB
MD5f411bebb937a0d126da30c204481d110
SHA1dee2d4655a3a1efd43311ba4467ff1b4dc4837aa
SHA2560cc855880105692389db3d774559b5c4ba253f2cb0206d4e2449a1c52529e1d3
SHA5126973a415c00b18d780ddb9458bb9b86b94da126d9d4d9e5cbaf1f85c0d31cee6a54a27013a5d58380bd62862609d57b547296aca21465c173a370f8195a45449
-
Filesize
408KB
MD580cfc1fa40ffa0b623f7b7508e80e2b5
SHA19dcbce8e2c2baf2d82adeb79686c0f68c6c1ed7d
SHA256bc7f759cab86f5b769bb29bc00978f8ceb7fc8517c8687ef0a170cb304ec7478
SHA512c4c0e6d0f0c6899fb62816a5760a90057991fbaf48387b0215cef2b716f40f63162b439a6934d7c12c93bd9d1bd0d2149de35525dc29f1dd19709c03821af5a1
-
Filesize
408KB
MD549a9811d57e1019627e2a3d9cbeda5df
SHA154595c3da9c6f78a058c78309ef0c54a7d2fa58f
SHA25694cf8bca8dbb3528688a7cb34db2438f2c622049a8a307c08ce8604ba690be24
SHA512ac1d0b9d0f118b5216372e6949dbc4c7ef350afdded534f89e2d735b06c7bdc73dfd0cdd06b557f486abe584b15289df8aeef0c86086a441c83d822e98d4e790
-
Filesize
408KB
MD5e7a28bba1ac7375042d737f0f1d96577
SHA14b7e7827a4393294b62b400de18db4a7fea921ef
SHA2568a6e46f3dad78b81aa8ef50f3f645f222764cb93e4e0f0c2e36bbb7ed7fe708e
SHA512ea76156adf4b8eaa263d1081103d6612aeeef4b7d10b4b8f56a21d3b86e7b8e9152020fb949987f5b25c1d0d8299da367eb217ec776fc5a02b986a02ce82ef32
-
Filesize
132KB
MD53b0b4a5430418a553b1e8827f4aae281
SHA1da0bf8ab079e50c3a80b437c6b2d9ea5a2d74962
SHA256486d1aec3dc23b997bdce110eeb11ed6f18448ad6ab01683a706fb4582b16ae9
SHA512ea2a15fab56b4cd47bd3a4e8ba1ad6a77c7dc85441efafd886a31c93c0a00572826b9a6ded36f8df0eca6cb3524adf7663127eaf84eec36c2f320a18835b8b79
-
Filesize
286KB
MD5bdef6bff2a4b8c6abf7815ece07aa683
SHA1e748d1a28d3aa79f7f0b7fd9fe347c77252734e2
SHA256e4a058460020b704d0b2769fce60c45ec38e04607cf2fab0aebe39464e574b57
SHA512c34e5d5053164555f3a445c3cfa340607dad6f387ee4d13bb0772503692e2708b6f3e9a203e6eb42f5dee6677c0c62b7e77d46a146f16bcf69905821fe7244b6
-
Filesize
408KB
MD5eb815db7d2e17995ab641fef9009db67
SHA1a3c5e1ef9215d73fe6ef70bad766b78f1faf2773
SHA2562b983d2f6691c1fc605ca1eb60da99fc0b73204f33c5a35492d7260f9f6fe7fc
SHA5124bb93c46ca8118457ff069387b8b33d7dc1792ba55369e024feb93221a4ccf3566ccc5dda04105e31f6eb995337dee0ed14b6884e9cb9c3da2ea53bc4d2d6a6d
-
Filesize
408KB
MD5ae2722c4576502676d21baf48b8a09e9
SHA199faafaa2f6c4d7ccbcc07bbd6df8b88ffa5606f
SHA256b67fa156e19b7f08314547e615a5308bef7d18d84102054f7ac9501a405a8fb1
SHA5126d4003a265c313e077d1366af24deb871099b46bc27772a0b4f55614c64b905ab569ff9dcba737fc1978a9e229876bfe7c1a0fd9a18f1a6130a852dae2e633cb
-
Filesize
408KB
MD50189661362f98a9f072f68bdbfa993c3
SHA154ea53859d2a1316d4bdb219e5f41991e8fba5e5
SHA256a8f670fa7fce03246f4ec74201f9288a1c3ce71758038a651d77954fff75f678
SHA5124f6a3b5f69d79938ed98de89d9a54ec622be3f09fc45714f1b8d6f7d71ffdad0e27bfb4d981ca0e8b687514458a10b60e28f621e806d95025c72b4e6480481c1
-
Filesize
408KB
MD5b56b84825b105ae904cb3badb72d4348
SHA171f5e2530be5c4256d315c6f83dbef2f054b5eb3
SHA2568d74426b7ea5dba6990930de7a1ec46f56c2d3ca5f1eb42f91c2b876cdee37e5
SHA512be9859e31e5fade44bd12b57959b0039e8b177dcbfdc08c86fdc86852346aa3d2a80691f49956820db8c00c2a644d20a81aa91bd49d7d8bfaa2df169bcccfe79
-
Filesize
408KB
MD5ab2d2cc3eada3b12908f6b0ce9f01ea0
SHA1638140768f96548368b3d15d7b2791bbda14a187
SHA25638fef9d9a268a67b881b3db283ce3eae0a2463cb38b87bf7af43ec2010cac6f7
SHA51247f4dc5846c38306aed2ec77d054312b9d9423a89d739ae4bd16d3bd83238226216fd968436c3d58ab705cfe2f1f7af3fdca5182b06809299f356b40e20f2477
-
Filesize
408KB
MD5e643aa7a6a51c14b5e151b713f3b12d1
SHA1b47a280a242bcff702bec8e713d5ca336e25f065
SHA2567569bbbb4c8930f59668ffde5144b19fbd78579f4cc7710bd0b7c5a36d995078
SHA5123a70b9cd13b21f2a9c56389c12ca202da0703f162ba9cddbcecb68be568d07c8fe6af46ea1545b373d1de2910b1e1a83278d27d8ca9dd0a5258d4711b0223e96