Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe
-
Size
408KB
-
MD5
2a49504f1ade2affde770d430ade1fc3
-
SHA1
70bf309fb945154890272adfcec78dfe012ce93a
-
SHA256
28975c11fb5d2bc68abd8791aa8d80f8a077a05e98b50f45513c4dcf761dbab2
-
SHA512
aebd8e9a13bb4eba94ee40eebc18e2aa3fda07ab04efd4cb492f503cccc2e14c728aa310259b68e2622fc73b0669ae86152894eb76d853fc454f389e8d421069
-
SSDEEP
3072:CEGh0oXl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGhldOe2MUVg3vTeKcAEciTBqr3jy9
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0007000000023128-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000600000002312e-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023014-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002312e-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023014-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00050000000217fa-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c00000002181f-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000707-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000709-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00030000000006df-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070b-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00040000000006df-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DBB666B5-0357-4e87-A946-EBCDA7ED63A1}\stubpath = "C:\\Windows\\{DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe" {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E554CA38-11E6-4176-94FE-5FA88CB885C0} {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E554CA38-11E6-4176-94FE-5FA88CB885C0}\stubpath = "C:\\Windows\\{E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe" {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{678A7AE2-970A-4968-A198-778BEF8996BF} 2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2BFDF5A9-F9C4-45de-8632-26C4389F7E30} {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9FDCF700-5F01-476d-BE0D-44EBB7F82642}\stubpath = "C:\\Windows\\{9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe" {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4D2C4FF4-D253-4650-AA42-113D4D831AE2}\stubpath = "C:\\Windows\\{4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe" {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0CA8456C-C469-45f6-AC6D-8BDC417152AF} {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0CA8456C-C469-45f6-AC6D-8BDC417152AF}\stubpath = "C:\\Windows\\{0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe" {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB} {0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}\stubpath = "C:\\Windows\\{DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe" {0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}\stubpath = "C:\\Windows\\{C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe" {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9FDCF700-5F01-476d-BE0D-44EBB7F82642} {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5C94CCE6-B941-4d6e-BF49-6DD98AD89548}\stubpath = "C:\\Windows\\{5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe" {678A7AE2-970A-4968-A198-778BEF8996BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF} {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2BFDF5A9-F9C4-45de-8632-26C4389F7E30}\stubpath = "C:\\Windows\\{2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe" {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE815E38-2E58-4e83-9BE9-673ABCE4754A}\stubpath = "C:\\Windows\\{CE815E38-2E58-4e83-9BE9-673ABCE4754A}.exe" {DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{678A7AE2-970A-4968-A198-778BEF8996BF}\stubpath = "C:\\Windows\\{678A7AE2-970A-4968-A198-778BEF8996BF}.exe" 2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5C94CCE6-B941-4d6e-BF49-6DD98AD89548} {678A7AE2-970A-4968-A198-778BEF8996BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DBB666B5-0357-4e87-A946-EBCDA7ED63A1} {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4D2C4FF4-D253-4650-AA42-113D4D831AE2} {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE815E38-2E58-4e83-9BE9-673ABCE4754A} {DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C9FA9DD5-5673-4f90-8B44-A482C55F6EFE} {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}\stubpath = "C:\\Windows\\{DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe" {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe -
Executes dropped EXE 12 IoCs
pid Process 4028 {678A7AE2-970A-4968-A198-778BEF8996BF}.exe 2248 {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe 1592 {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe 1268 {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe 3816 {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe 1392 {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe 2936 {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe 4980 {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe 4444 {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe 1388 {0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe 3872 {DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe 3104 {CE815E38-2E58-4e83-9BE9-673ABCE4754A}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe File created C:\Windows\{DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe File created C:\Windows\{4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe File created C:\Windows\{DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe {0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe File created C:\Windows\{CE815E38-2E58-4e83-9BE9-673ABCE4754A}.exe {DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe File created C:\Windows\{678A7AE2-970A-4968-A198-778BEF8996BF}.exe 2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe File created C:\Windows\{5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe {678A7AE2-970A-4968-A198-778BEF8996BF}.exe File created C:\Windows\{C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe File created C:\Windows\{DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe File created C:\Windows\{9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe File created C:\Windows\{E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe File created C:\Windows\{0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5060 2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe Token: SeIncBasePriorityPrivilege 4028 {678A7AE2-970A-4968-A198-778BEF8996BF}.exe Token: SeIncBasePriorityPrivilege 2248 {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe Token: SeIncBasePriorityPrivilege 1592 {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe Token: SeIncBasePriorityPrivilege 1268 {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe Token: SeIncBasePriorityPrivilege 3816 {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe Token: SeIncBasePriorityPrivilege 1392 {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe Token: SeIncBasePriorityPrivilege 2936 {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe Token: SeIncBasePriorityPrivilege 4980 {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe Token: SeIncBasePriorityPrivilege 4444 {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe Token: SeIncBasePriorityPrivilege 1388 {0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe Token: SeIncBasePriorityPrivilege 3872 {DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4028 5060 2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe 84 PID 5060 wrote to memory of 4028 5060 2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe 84 PID 5060 wrote to memory of 4028 5060 2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe 84 PID 5060 wrote to memory of 4872 5060 2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe 85 PID 5060 wrote to memory of 4872 5060 2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe 85 PID 5060 wrote to memory of 4872 5060 2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe 85 PID 4028 wrote to memory of 2248 4028 {678A7AE2-970A-4968-A198-778BEF8996BF}.exe 92 PID 4028 wrote to memory of 2248 4028 {678A7AE2-970A-4968-A198-778BEF8996BF}.exe 92 PID 4028 wrote to memory of 2248 4028 {678A7AE2-970A-4968-A198-778BEF8996BF}.exe 92 PID 4028 wrote to memory of 5100 4028 {678A7AE2-970A-4968-A198-778BEF8996BF}.exe 93 PID 4028 wrote to memory of 5100 4028 {678A7AE2-970A-4968-A198-778BEF8996BF}.exe 93 PID 4028 wrote to memory of 5100 4028 {678A7AE2-970A-4968-A198-778BEF8996BF}.exe 93 PID 2248 wrote to memory of 1592 2248 {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe 97 PID 2248 wrote to memory of 1592 2248 {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe 97 PID 2248 wrote to memory of 1592 2248 {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe 97 PID 2248 wrote to memory of 2828 2248 {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe 96 PID 2248 wrote to memory of 2828 2248 {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe 96 PID 2248 wrote to memory of 2828 2248 {5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe 96 PID 1592 wrote to memory of 1268 1592 {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe 98 PID 1592 wrote to memory of 1268 1592 {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe 98 PID 1592 wrote to memory of 1268 1592 {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe 98 PID 1592 wrote to memory of 4576 1592 {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe 99 PID 1592 wrote to memory of 4576 1592 {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe 99 PID 1592 wrote to memory of 4576 1592 {C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe 99 PID 1268 wrote to memory of 3816 1268 {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe 100 PID 1268 wrote to memory of 3816 1268 {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe 100 PID 1268 wrote to memory of 3816 1268 {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe 100 PID 1268 wrote to memory of 5040 1268 {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe 101 PID 1268 wrote to memory of 5040 1268 {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe 101 PID 1268 wrote to memory of 5040 1268 {DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe 101 PID 3816 wrote to memory of 1392 3816 {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe 102 PID 3816 wrote to memory of 1392 3816 {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe 102 PID 3816 wrote to memory of 1392 3816 {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe 102 PID 3816 wrote to memory of 4776 3816 {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe 103 PID 3816 wrote to memory of 4776 3816 {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe 103 PID 3816 wrote to memory of 4776 3816 {9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe 103 PID 1392 wrote to memory of 2936 1392 {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe 104 PID 1392 wrote to memory of 2936 1392 {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe 104 PID 1392 wrote to memory of 2936 1392 {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe 104 PID 1392 wrote to memory of 2872 1392 {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe 105 PID 1392 wrote to memory of 2872 1392 {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe 105 PID 1392 wrote to memory of 2872 1392 {2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe 105 PID 2936 wrote to memory of 4980 2936 {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe 106 PID 2936 wrote to memory of 4980 2936 {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe 106 PID 2936 wrote to memory of 4980 2936 {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe 106 PID 2936 wrote to memory of 952 2936 {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe 107 PID 2936 wrote to memory of 952 2936 {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe 107 PID 2936 wrote to memory of 952 2936 {DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe 107 PID 4980 wrote to memory of 4444 4980 {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe 108 PID 4980 wrote to memory of 4444 4980 {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe 108 PID 4980 wrote to memory of 4444 4980 {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe 108 PID 4980 wrote to memory of 4568 4980 {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe 109 PID 4980 wrote to memory of 4568 4980 {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe 109 PID 4980 wrote to memory of 4568 4980 {4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe 109 PID 4444 wrote to memory of 1388 4444 {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe 111 PID 4444 wrote to memory of 1388 4444 {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe 111 PID 4444 wrote to memory of 1388 4444 {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe 111 PID 4444 wrote to memory of 2960 4444 {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe 110 PID 4444 wrote to memory of 2960 4444 {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe 110 PID 4444 wrote to memory of 2960 4444 {E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe 110 PID 1388 wrote to memory of 3872 1388 {0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe 112 PID 1388 wrote to memory of 3872 1388 {0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe 112 PID 1388 wrote to memory of 3872 1388 {0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe 112 PID 1388 wrote to memory of 2344 1388 {0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\{678A7AE2-970A-4968-A198-778BEF8996BF}.exeC:\Windows\{678A7AE2-970A-4968-A198-778BEF8996BF}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\{5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exeC:\Windows\{5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C94C~1.EXE > nul4⤵PID:2828
-
-
C:\Windows\{C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exeC:\Windows\{C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\{DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exeC:\Windows\{DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\{9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exeC:\Windows\{9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\{2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exeC:\Windows\{2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\{DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exeC:\Windows\{DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\{4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exeC:\Windows\{4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\{E554CA38-11E6-4176-94FE-5FA88CB885C0}.exeC:\Windows\{E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E554C~1.EXE > nul11⤵PID:2960
-
-
C:\Windows\{0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exeC:\Windows\{0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\{DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exeC:\Windows\{DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3872 -
C:\Windows\{CE815E38-2E58-4e83-9BE9-673ABCE4754A}.exeC:\Windows\{CE815E38-2E58-4e83-9BE9-673ABCE4754A}.exe13⤵
- Executes dropped EXE
PID:3104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DD9D7~1.EXE > nul13⤵PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0CA84~1.EXE > nul12⤵PID:2344
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4D2C4~1.EXE > nul10⤵PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DBB66~1.EXE > nul9⤵PID:952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2BFDF~1.EXE > nul8⤵PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9FDCF~1.EXE > nul7⤵PID:4776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DF9AD~1.EXE > nul6⤵PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C9FA9~1.EXE > nul5⤵PID:4576
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{678A7~1.EXE > nul3⤵PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD56473ee8f83a29ab53294a499f712672b
SHA127130ba5f49d19399c1f8c42122b0e1c279b0402
SHA256ea4f0aae4e38386cb0b2a15eaef10c54f4390997752405bbb27f7acdba3cb2af
SHA5121d3cb2779d9855bc51191cddf2bc8f6e9e2380d9b9cb44169c9cfc138ccfe52815fe9a88b17fe7d60e18f210451c03dfc625775b588d20f5cb49dd31d450592b
-
Filesize
408KB
MD58d00cca056cff65d1edf5ea2b1d47bc3
SHA1b84dbdfc16e6b2dba229f9b963c8217de2c75de0
SHA256b52f61df6ac88e9208d0357b183a3cd32c15e715569be4d0272476c1b3aeb398
SHA512abb2b80c4a2a0180ae2092287e26b09b1aff68992738c16f8812457f6fb60e5ebf436f785717a4a33b58d2da7c5664f03de6c7cfe9bba5b27088c6e717e5d7a2
-
Filesize
408KB
MD5a435c592d21fc35b33cf022ad10509c0
SHA1c21e78ace0d83756f0d27fbbbb47092088d9fdd6
SHA25620d6cee04766cc3414b60d909604abc9974bf83d28e232c09841fb5ffd6e39f5
SHA512a5a400668c35029232440ac2fad4b6cb43434140b3473e28ef9aeab184601fd3878f8cd4c141779c437527b3e784f9ef902e919ce0678f751ecdfd009f83efcc
-
Filesize
408KB
MD559ef7a7778c438ac71400928d8629cc5
SHA11680c5532913750666edc962b4f62607500402fc
SHA256f04bcc3aaf5756a6b4fa9556a4a7d6c784843e92ab366e6b75f81b4da1674593
SHA512bfcb5ce4eb0c1c9ef41e47adf94654230b33103c99b196970d86cfd25205329508863f5169e5174bcd98023a0d69aa0efd47f27eaec7bae09e1e4afcff5c2d49
-
Filesize
408KB
MD59044925773a05d1a8fda98254f597eab
SHA1baa66ffc87a631a8a55212b7fb48ce2aa9fb97d4
SHA2567f488071779ae2aecbcab77943c49b641a15b36c4333929394e80bb2fdaa37de
SHA512cf9d555f2055b140123145c556764fec9dd6c933d6cd77de49beb471f24889edaa4b969fb70db38ffd2c63f4eefbf8dafcfe3675ce52b4bfb135dd112a8ffc32
-
Filesize
408KB
MD5014ab4b657783a58b4c1f6cff1932a5a
SHA1c992040cb4309908b7d30d9659ed04af290dd2c7
SHA256ad9fb52d40d0448c2191bd570441a8f7be344cce1445b6eea44a3fc276bbf8fa
SHA51232c1840a3875316db88f8f7e40487969392ee3288d0f6cf2c410f0601a5b155646237a061b5c66f7a316bd6c807e3ac044028b85dbf391f31e92f397394a8ac1
-
Filesize
408KB
MD50bdbe89ba7cc3843611e0877ee5ace46
SHA1f14581a34442feb172d658a6b4610b437d51ba96
SHA256678928643961b03b0ce541211b217b0c22eee559738b69aaabe0460ced35847f
SHA512eb8c0618c34b094416afcda4fb064e26e07835150c514575611e3f32ed955208068424888292bf260db815d8ace97c5ecf79bc3d031e8415cd247216a63a55dc
-
Filesize
408KB
MD5f362096e20909247c178e4521a532f88
SHA1ef179172d5cb548360f4168d33855db40aea694e
SHA256d1ad07ed6bf3f0e90c41c15938850ce860dd340113be5e7b303380b1d29350e6
SHA5121fe73dadcb01db9f0666d08fd37dea827190f6f311c32e9a6793670dc1fa7ed296136184d5b0d0ed45a2a1fbe1812402db03173864d62ee91a56779df0424b53
-
Filesize
408KB
MD58418564c3eae59f66b526c89794f79bc
SHA1d327b01271042e66392843f99df3e8356eb8292e
SHA2563c3b7f53d7ad4e107d04b97b0fd65cf5b9955ae3415851673bd24e31f65690f0
SHA5121c21123e23fff8203f96206d4b84371eb86f7b0adae5d11331b10cd0d11949ae02f51acbc6dd37334a94e681f6e0df6240568e1d7e1d898baa9a96322f0c7816
-
Filesize
408KB
MD5260891be7fc933b33e81197e6d4d9218
SHA1335844da94d22e55acb06922ba7ae8173ba0e9e2
SHA256e691b8cd01c4bb44c49aa3ed17f9ae309ed9f7065ef6b3422a0da5d2cc0438a0
SHA51243eb85302d3f39bcca0fa02e2ae0b894f3fff6ddbd0d8688d574e54704a942df3a90a58e89f5d36745bac306cef44ab60780b531e136b1323dba7758cccbbd5f
-
Filesize
408KB
MD55abe56bdcb1790b52e9d7da1885a354a
SHA1f175e5218115dbfc22ddc65c08feeda561d5f65b
SHA256191a8ba1dcd662c5dc076f8ef6ad559ad82586c424543002ee2d847c9ad3103d
SHA5121fdde2a6841ab6cb54c916f27689be594659e922cb125919e44fbc431418f168850da9ae830bddf98765ffd4d3780a940c0dfeac3c8d271cde1814fe57aa634d
-
Filesize
408KB
MD50300392299cf8fd50f5aad4ead17ae3e
SHA1fd4f5a2fecc9052c48016d0dcf5ab1a595d1351d
SHA256184291bef7d144811ea34027bb42505937db81838133125e6d625a27d09b4143
SHA512cc62235253446ad989402460a5567c5d237b33644c271de66a6b1b99fc8a9d4960d56dddde7dc75bbc0e9097f215a5d7de86f691a7f565404655de03da2e66e1