Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe
-
Size
408KB
-
MD5
53c449c5307d19634656a1f4b52cbdd7
-
SHA1
b963f4e3218a62eb09a08824b9f1ee4f27308627
-
SHA256
ed6408bf498f7605be9705172a2d9fcca7c90200fdf838f3d0611e259fa63997
-
SHA512
19bc6dd188ce56524c10639a6725084692222fcea28d600f60fae9f7cafc2b4546d1e751f81bcadcacad276ac26f2b07a88f8149fdc15d90c42d63468951270f
-
SSDEEP
3072:CEGh0okl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGCldOe2MUVg3vTeKcAEciTBqr3jy9
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0006000000023225-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000e00000002322d-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023233-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000f00000002322d-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c0000000215c9-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b0000000215d0-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d0000000215c9-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000711-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000713-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000711-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000713-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00030000000006e7-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08A8420F-128E-4222-AB77-B9144701F389}\stubpath = "C:\\Windows\\{08A8420F-128E-4222-AB77-B9144701F389}.exe" {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F3AC7129-A174-4d56-ABF3-D9B5F7C479C9} {08A8420F-128E-4222-AB77-B9144701F389}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{058DAFBC-CA4F-4ee4-9364-52F2A9616DB5} 2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}\stubpath = "C:\\Windows\\{058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe" 2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}\stubpath = "C:\\Windows\\{1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe" {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0752C483-13E8-4f90-90E0-7D0A99AC0B2D} {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C86E8A57-92B9-4f82-83E4-7B1C4245AECD} {A293211C-C249-4244-A713-CE9EB707DAF6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F7D6852-C7B7-4550-8621-6BA286C8F375} {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9} {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}\stubpath = "C:\\Windows\\{C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe" {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8605C2E1-BED7-4b10-BE48-990C1834C4C0} {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8605C2E1-BED7-4b10-BE48-990C1834C4C0}\stubpath = "C:\\Windows\\{8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe" {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C86E8A57-92B9-4f82-83E4-7B1C4245AECD}\stubpath = "C:\\Windows\\{C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe" {A293211C-C249-4244-A713-CE9EB707DAF6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F7D6852-C7B7-4550-8621-6BA286C8F375}\stubpath = "C:\\Windows\\{3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe" {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6E2FAE55-9715-422a-A45A-55EC6A31F1BB} {3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6E2FAE55-9715-422a-A45A-55EC6A31F1BB}\stubpath = "C:\\Windows\\{6E2FAE55-9715-422a-A45A-55EC6A31F1BB}.exe" {3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A23F58B-9ACB-45fb-88C1-BD02A4CD3072} {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0752C483-13E8-4f90-90E0-7D0A99AC0B2D}\stubpath = "C:\\Windows\\{0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe" {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08A8420F-128E-4222-AB77-B9144701F389} {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A293211C-C249-4244-A713-CE9EB707DAF6}\stubpath = "C:\\Windows\\{A293211C-C249-4244-A713-CE9EB707DAF6}.exe" {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0183783B-A5DC-4ec1-8C8E-F5C090DE3D44}\stubpath = "C:\\Windows\\{0183783B-A5DC-4ec1-8C8E-F5C090DE3D44}.exe" {6E2FAE55-9715-422a-A45A-55EC6A31F1BB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}\stubpath = "C:\\Windows\\{F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe" {08A8420F-128E-4222-AB77-B9144701F389}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A293211C-C249-4244-A713-CE9EB707DAF6} {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0183783B-A5DC-4ec1-8C8E-F5C090DE3D44} {6E2FAE55-9715-422a-A45A-55EC6A31F1BB}.exe -
Executes dropped EXE 12 IoCs
pid Process 1092 {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe 2104 {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe 1984 {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe 1980 {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe 1988 {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe 4460 {08A8420F-128E-4222-AB77-B9144701F389}.exe 3616 {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe 4632 {A293211C-C249-4244-A713-CE9EB707DAF6}.exe 4708 {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe 5088 {3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe 1976 {6E2FAE55-9715-422a-A45A-55EC6A31F1BB}.exe 3100 {0183783B-A5DC-4ec1-8C8E-F5C090DE3D44}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe {08A8420F-128E-4222-AB77-B9144701F389}.exe File created C:\Windows\{A293211C-C249-4244-A713-CE9EB707DAF6}.exe {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe File created C:\Windows\{3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe File created C:\Windows\{C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe File created C:\Windows\{8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe File created C:\Windows\{1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe File created C:\Windows\{0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe File created C:\Windows\{08A8420F-128E-4222-AB77-B9144701F389}.exe {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe File created C:\Windows\{6E2FAE55-9715-422a-A45A-55EC6A31F1BB}.exe {3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe File created C:\Windows\{058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe 2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe File created C:\Windows\{C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe {A293211C-C249-4244-A713-CE9EB707DAF6}.exe File created C:\Windows\{0183783B-A5DC-4ec1-8C8E-F5C090DE3D44}.exe {6E2FAE55-9715-422a-A45A-55EC6A31F1BB}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2092 2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe Token: SeIncBasePriorityPrivilege 1092 {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe Token: SeIncBasePriorityPrivilege 2104 {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe Token: SeIncBasePriorityPrivilege 1984 {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe Token: SeIncBasePriorityPrivilege 1980 {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe Token: SeIncBasePriorityPrivilege 1988 {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe Token: SeIncBasePriorityPrivilege 4460 {08A8420F-128E-4222-AB77-B9144701F389}.exe Token: SeIncBasePriorityPrivilege 3616 {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe Token: SeIncBasePriorityPrivilege 4632 {A293211C-C249-4244-A713-CE9EB707DAF6}.exe Token: SeIncBasePriorityPrivilege 4708 {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe Token: SeIncBasePriorityPrivilege 5088 {3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe Token: SeIncBasePriorityPrivilege 1976 {6E2FAE55-9715-422a-A45A-55EC6A31F1BB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1092 2092 2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe 88 PID 2092 wrote to memory of 1092 2092 2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe 88 PID 2092 wrote to memory of 1092 2092 2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe 88 PID 2092 wrote to memory of 2980 2092 2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe 89 PID 2092 wrote to memory of 2980 2092 2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe 89 PID 2092 wrote to memory of 2980 2092 2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe 89 PID 1092 wrote to memory of 2104 1092 {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe 93 PID 1092 wrote to memory of 2104 1092 {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe 93 PID 1092 wrote to memory of 2104 1092 {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe 93 PID 1092 wrote to memory of 2844 1092 {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe 94 PID 1092 wrote to memory of 2844 1092 {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe 94 PID 1092 wrote to memory of 2844 1092 {058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe 94 PID 2104 wrote to memory of 1984 2104 {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe 96 PID 2104 wrote to memory of 1984 2104 {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe 96 PID 2104 wrote to memory of 1984 2104 {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe 96 PID 2104 wrote to memory of 220 2104 {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe 97 PID 2104 wrote to memory of 220 2104 {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe 97 PID 2104 wrote to memory of 220 2104 {C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe 97 PID 1984 wrote to memory of 1980 1984 {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe 98 PID 1984 wrote to memory of 1980 1984 {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe 98 PID 1984 wrote to memory of 1980 1984 {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe 98 PID 1984 wrote to memory of 648 1984 {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe 99 PID 1984 wrote to memory of 648 1984 {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe 99 PID 1984 wrote to memory of 648 1984 {8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe 99 PID 1980 wrote to memory of 1988 1980 {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe 100 PID 1980 wrote to memory of 1988 1980 {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe 100 PID 1980 wrote to memory of 1988 1980 {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe 100 PID 1980 wrote to memory of 3956 1980 {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe 101 PID 1980 wrote to memory of 3956 1980 {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe 101 PID 1980 wrote to memory of 3956 1980 {1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe 101 PID 1988 wrote to memory of 4460 1988 {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe 102 PID 1988 wrote to memory of 4460 1988 {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe 102 PID 1988 wrote to memory of 4460 1988 {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe 102 PID 1988 wrote to memory of 2144 1988 {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe 103 PID 1988 wrote to memory of 2144 1988 {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe 103 PID 1988 wrote to memory of 2144 1988 {0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe 103 PID 4460 wrote to memory of 3616 4460 {08A8420F-128E-4222-AB77-B9144701F389}.exe 105 PID 4460 wrote to memory of 3616 4460 {08A8420F-128E-4222-AB77-B9144701F389}.exe 105 PID 4460 wrote to memory of 3616 4460 {08A8420F-128E-4222-AB77-B9144701F389}.exe 105 PID 4460 wrote to memory of 2556 4460 {08A8420F-128E-4222-AB77-B9144701F389}.exe 104 PID 4460 wrote to memory of 2556 4460 {08A8420F-128E-4222-AB77-B9144701F389}.exe 104 PID 4460 wrote to memory of 2556 4460 {08A8420F-128E-4222-AB77-B9144701F389}.exe 104 PID 3616 wrote to memory of 4632 3616 {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe 106 PID 3616 wrote to memory of 4632 3616 {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe 106 PID 3616 wrote to memory of 4632 3616 {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe 106 PID 3616 wrote to memory of 4488 3616 {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe 107 PID 3616 wrote to memory of 4488 3616 {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe 107 PID 3616 wrote to memory of 4488 3616 {F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe 107 PID 4632 wrote to memory of 4708 4632 {A293211C-C249-4244-A713-CE9EB707DAF6}.exe 108 PID 4632 wrote to memory of 4708 4632 {A293211C-C249-4244-A713-CE9EB707DAF6}.exe 108 PID 4632 wrote to memory of 4708 4632 {A293211C-C249-4244-A713-CE9EB707DAF6}.exe 108 PID 4632 wrote to memory of 4920 4632 {A293211C-C249-4244-A713-CE9EB707DAF6}.exe 109 PID 4632 wrote to memory of 4920 4632 {A293211C-C249-4244-A713-CE9EB707DAF6}.exe 109 PID 4632 wrote to memory of 4920 4632 {A293211C-C249-4244-A713-CE9EB707DAF6}.exe 109 PID 4708 wrote to memory of 5088 4708 {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe 110 PID 4708 wrote to memory of 5088 4708 {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe 110 PID 4708 wrote to memory of 5088 4708 {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe 110 PID 4708 wrote to memory of 4004 4708 {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe 111 PID 4708 wrote to memory of 4004 4708 {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe 111 PID 4708 wrote to memory of 4004 4708 {C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe 111 PID 5088 wrote to memory of 1976 5088 {3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe 112 PID 5088 wrote to memory of 1976 5088 {3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe 112 PID 5088 wrote to memory of 1976 5088 {3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe 112 PID 5088 wrote to memory of 2536 5088 {3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-19_53c449c5307d19634656a1f4b52cbdd7_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\{058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exeC:\Windows\{058DAFBC-CA4F-4ee4-9364-52F2A9616DB5}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\{C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exeC:\Windows\{C7E998A2-FB75-4dfc-BAC4-FA0240AC1CC9}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\{8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exeC:\Windows\{8605C2E1-BED7-4b10-BE48-990C1834C4C0}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\{1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exeC:\Windows\{1A23F58B-9ACB-45fb-88C1-BD02A4CD3072}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\{0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exeC:\Windows\{0752C483-13E8-4f90-90E0-7D0A99AC0B2D}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\{08A8420F-128E-4222-AB77-B9144701F389}.exeC:\Windows\{08A8420F-128E-4222-AB77-B9144701F389}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{08A84~1.EXE > nul8⤵PID:2556
-
-
C:\Windows\{F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exeC:\Windows\{F3AC7129-A174-4d56-ABF3-D9B5F7C479C9}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\{A293211C-C249-4244-A713-CE9EB707DAF6}.exeC:\Windows\{A293211C-C249-4244-A713-CE9EB707DAF6}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\{C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exeC:\Windows\{C86E8A57-92B9-4f82-83E4-7B1C4245AECD}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\{3F7D6852-C7B7-4550-8621-6BA286C8F375}.exeC:\Windows\{3F7D6852-C7B7-4550-8621-6BA286C8F375}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\{6E2FAE55-9715-422a-A45A-55EC6A31F1BB}.exeC:\Windows\{6E2FAE55-9715-422a-A45A-55EC6A31F1BB}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Windows\{0183783B-A5DC-4ec1-8C8E-F5C090DE3D44}.exeC:\Windows\{0183783B-A5DC-4ec1-8C8E-F5C090DE3D44}.exe13⤵
- Executes dropped EXE
PID:3100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E2FA~1.EXE > nul13⤵PID:3436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3F7D6~1.EXE > nul12⤵PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C86E8~1.EXE > nul11⤵PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A2932~1.EXE > nul10⤵PID:4920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F3AC7~1.EXE > nul9⤵PID:4488
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0752C~1.EXE > nul7⤵PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1A23F~1.EXE > nul6⤵PID:3956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8605C~1.EXE > nul5⤵PID:648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C7E99~1.EXE > nul4⤵PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{058DA~1.EXE > nul3⤵PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5a4708030c4bdae38ca3118aed1a428e4
SHA1f6456428e126509fcb4a8f420cb5ad88c86a1c82
SHA256eec539a0a0d41fc28bd8cf821f15b31bd547812599863d354f784068797b19f3
SHA512b370b6b3bce61664aafb40ff9967543bb89b271355d0c16272362901b7fbfeefe64bd179c78df2113eac9bf82c25ff27c34654e28157ccb690919cf17bf106c0
-
Filesize
408KB
MD59b7a82f8c9c8782d7889f707a8d9e4b3
SHA1adaf8fe2f1abc83b684ec40a1c2d954fbe4d9ce4
SHA256e86d07f9bed45badefdef1bf6d4060b69541ee4921611edd5047696cf7cfe096
SHA51233584efa9aefbfc439d190d35c1275b4f331976b33221d033a347caa6b9d8ab254cdb3a6d0c8d6e745c950840109c27da51c1dcc74610225845ef280c204ce18
-
Filesize
408KB
MD5ae94c4188dbc5fb8bf54025f74010692
SHA16b9175871f8538893857e01d9772347cf3f1b2ba
SHA2568211466822722d5d9dffa09c13693b7ecc6104dee7b52ea9ff48b66bebaccd3d
SHA512da382f10f80feab83ecae47c07d0594d51c5d369c16a7f5dfb745bb0c07d2fbc6d6bdf5159334b4a40535479d99625e4bb1ac8f7d326864df884a8b25c70d13a
-
Filesize
408KB
MD5800fff30e06aa68b1bbaed457e5cdce3
SHA12d08fc9cdbf797a4aa1da781c3d3ea795fb6ae5d
SHA256925ed0dee9f599d3930735a14933086df24c7a2e75c7802c437d907ebf674edb
SHA512c28ef7d1fa0008bbbebc742459debe5ee80d02a35839b1ba65d24ccbfb74071910ce64c4a368a100a3998bff6020580bb92865ae5282a3d824b05c0ac81d37ed
-
Filesize
408KB
MD50031ed847a562bdaf34e0c413d1c9198
SHA143050ee8b596fa10e6ecdf53326dac5e2e8a336d
SHA2569ddc0eb72deb2ceaf9b44b248218730ddc9b9c679ad675f8759b89a13d37002a
SHA512aaea119a72dbc8460869f407188b968272e8682b47f32a2791a34f9116cfa7123c9bfce4408c501db620a4bd3ac6de8d0a4981511a9d54fbad54f957d7b8aadc
-
Filesize
408KB
MD544fe57cc5f2db09479a908c0f37a41b2
SHA16212fe26d22221cba38b6d57e4b8d3bd45b2706e
SHA2565fe4ffb4fd7cc3ad5bc79085432f3b15ea0da97a3098f6841f61a8c6664c66ba
SHA51229b298036c92f730e0b9a21c5bf42668629b3770b78f89823be85b3d77f92e0b320bc7f289df19e8a4ebb7da81b4dbdd47d739ae873135cd7cfcf8c7e003e350
-
Filesize
408KB
MD5bd6c8ccd9aad4d50d1e0452fc466b364
SHA1d171289a248e1016c654bfe27dbf8861254c6378
SHA256b51b99b97d7312dbec3466ca286fbb21e91922cf428106195d4ac4bb0bc5f945
SHA512af515338aa11ce55daf508170d7d9e070cc30f1a3509620b98426257e36c071648c01294875d8aa93deb4c89494782c1a3aef76a614d7e51548f11161346b70e
-
Filesize
408KB
MD5a0e91ee53b353b185b71382054f8bbf6
SHA17d08d6f2a264ba833e33074a69c2469ed48bfb99
SHA256a9f688cb17e2e0dcfb1f71ea80430a5986e93d33fa556092581739f5a83d172b
SHA512431ee43d7d6834d4b41e276bbaf03f05838061723b1c88c2c2241d5372c2e60d15ce132dd92194ca9c2a76161df21cc54b7ca2910a952f578f324c71efacead7
-
Filesize
408KB
MD53180bf08598fb60c636119e75680d3a8
SHA1e096d1f5ea921bbeedcf4733a134c848647e4a80
SHA2560dd1994f3cb90889429226ecd62721b8fd19c44fbed7d25d39f43c72884e28f4
SHA512c70f5538eddb375273a9613adb27c555d5847318ed51d166cf3d096b289473710a5fbc68dc137b130ab818bdbcdcad1f7c5460903bcb7dab62efc07ccf0757a8
-
Filesize
408KB
MD5262d138c0401d3b57068eda0b69808d3
SHA187e8595d0611a81d68c26f37ff0c89a53148a7fa
SHA256916457112416229045a75167da2404bb6d58dc6ffe282c9a327b75c7e81e31af
SHA512a31a347f31eda8a16794108f5259a0d9ec372a59e6fb8d1661942df5df3fa39bb1671a10118d8b47a6e192639483351d61beca2ee2131f849ba5d8fff28c3dd2
-
Filesize
408KB
MD5316c44f01098c19f82d5bceb11574e4d
SHA1b8f9fb4354efd5d40d40bca2095cf79ecbd28072
SHA2560f2674d8fe7ef72c52e94007eef80d805365862975c99428be43e903ac3c8c08
SHA512cf734567166356e5e5f06e24a95c69b4204f9ae719d10534022574fa9942471be8d4524f78359c731bdb3f5e61a56e12a8687d552c59822e6d89dd8130095d58
-
Filesize
408KB
MD54fcea612fad61b3b54f007df428d916d
SHA1e9946d790b87cc04d788f454277e2880a399fefc
SHA2561839d03a09a537c46dbda3e0ab642b6454537e1d362356be0912bf2d60ca8b26
SHA512f9924e8054717ca07ec5064256dd60c37492ce57576ab6c9b584eb81b2e4f8c6d03a6e0199cce81df889bce24ff205488208344884ae0e2e1de4b314375fcaed