Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe
-
Size
344KB
-
MD5
ecc271e769b6e917219bc673229c0bbc
-
SHA1
2520d525d3f75e0f76e56bc8a7f106858b9b2a39
-
SHA256
9e0852aaa583991114b244b5a255ccc0a2f55dae086fa48baff887f32f99ea35
-
SHA512
55b289620de5b5f2b7152c1b44569c166bdb65a5acc5156c5d739b1acb960794edb7804b833a8fd1f668149790740f59d9ef36ac8f776170f6d6f0b0541579a8
-
SSDEEP
3072:mEGh0oxlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG/lqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x00070000000231e4-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000231e0-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000231e4-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000231e0-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000231e4-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000231e0-21.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a0000000231e4-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a0000000231e0-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b0000000231e4-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b0000000231e0-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c0000000231e4-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c0000000231e0-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E3707D52-5EE5-4526-901B-8AD99E9B71B2} {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2030D44-745D-4eab-BA46-E2ADAB5A3F7D} {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{13D1D3D7-EC68-4839-9E90-8BD80CB32AA1} {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8DDDA185-7440-44c3-94D4-C87C50979E9E}\stubpath = "C:\\Windows\\{8DDDA185-7440-44c3-94D4-C87C50979E9E}.exe" {3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B60C6FB-6978-4a15-B05E-A769BAE96592}\stubpath = "C:\\Windows\\{8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe" {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{239BBD0A-AFB3-475e-A10B-879DC3A77D7C} {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C1D6E0E-420B-412b-AA79-724ECEC57622} {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C1D6E0E-420B-412b-AA79-724ECEC57622}\stubpath = "C:\\Windows\\{8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe" {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E3707D52-5EE5-4526-901B-8AD99E9B71B2}\stubpath = "C:\\Windows\\{E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe" {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}\stubpath = "C:\\Windows\\{A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe" {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3AD78905-1CB0-4d11-ADC7-54B699AE22E2} {13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DCB5891F-97A2-4061-8CAC-B19A91E1EB30}\stubpath = "C:\\Windows\\{DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe" 2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{239BBD0A-AFB3-475e-A10B-879DC3A77D7C}\stubpath = "C:\\Windows\\{239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe" {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B60C6FB-6978-4a15-B05E-A769BAE96592} {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{123363B5-B893-4712-890A-E92835619F73} {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4C7657B-9145-4103-AD69-2F04AAF2FD37} {123363B5-B893-4712-890A-E92835619F73}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D327938-D1E6-4418-BF92-E7AD05BE77ED} {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}\stubpath = "C:\\Windows\\{13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe" {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DCB5891F-97A2-4061-8CAC-B19A91E1EB30} 2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4C7657B-9145-4103-AD69-2F04AAF2FD37}\stubpath = "C:\\Windows\\{B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe" {123363B5-B893-4712-890A-E92835619F73}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D327938-D1E6-4418-BF92-E7AD05BE77ED}\stubpath = "C:\\Windows\\{0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe" {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3AD78905-1CB0-4d11-ADC7-54B699AE22E2}\stubpath = "C:\\Windows\\{3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe" {13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8DDDA185-7440-44c3-94D4-C87C50979E9E} {3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{123363B5-B893-4712-890A-E92835619F73}\stubpath = "C:\\Windows\\{123363B5-B893-4712-890A-E92835619F73}.exe" {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe -
Executes dropped EXE 12 IoCs
pid Process 1068 {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe 2880 {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe 3292 {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe 1772 {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe 5104 {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe 1880 {123363B5-B893-4712-890A-E92835619F73}.exe 1284 {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe 3920 {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe 4940 {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe 3184 {13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe 1204 {3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe 3696 {8DDDA185-7440-44c3-94D4-C87C50979E9E}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{8DDDA185-7440-44c3-94D4-C87C50979E9E}.exe {3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe File created C:\Windows\{DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe 2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe File created C:\Windows\{239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe File created C:\Windows\{E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe File created C:\Windows\{0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe File created C:\Windows\{A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe File created C:\Windows\{13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe File created C:\Windows\{3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe {13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe File created C:\Windows\{8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe File created C:\Windows\{8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe File created C:\Windows\{123363B5-B893-4712-890A-E92835619F73}.exe {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe File created C:\Windows\{B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe {123363B5-B893-4712-890A-E92835619F73}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3844 2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe Token: SeIncBasePriorityPrivilege 1068 {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe Token: SeIncBasePriorityPrivilege 2880 {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe Token: SeIncBasePriorityPrivilege 3292 {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe Token: SeIncBasePriorityPrivilege 1772 {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe Token: SeIncBasePriorityPrivilege 5104 {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe Token: SeIncBasePriorityPrivilege 1880 {123363B5-B893-4712-890A-E92835619F73}.exe Token: SeIncBasePriorityPrivilege 1284 {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe Token: SeIncBasePriorityPrivilege 3920 {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe Token: SeIncBasePriorityPrivilege 4940 {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe Token: SeIncBasePriorityPrivilege 3184 {13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe Token: SeIncBasePriorityPrivilege 1204 {3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3844 wrote to memory of 1068 3844 2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe 89 PID 3844 wrote to memory of 1068 3844 2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe 89 PID 3844 wrote to memory of 1068 3844 2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe 89 PID 3844 wrote to memory of 916 3844 2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe 90 PID 3844 wrote to memory of 916 3844 2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe 90 PID 3844 wrote to memory of 916 3844 2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe 90 PID 1068 wrote to memory of 2880 1068 {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe 91 PID 1068 wrote to memory of 2880 1068 {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe 91 PID 1068 wrote to memory of 2880 1068 {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe 91 PID 1068 wrote to memory of 3280 1068 {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe 92 PID 1068 wrote to memory of 3280 1068 {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe 92 PID 1068 wrote to memory of 3280 1068 {DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe 92 PID 2880 wrote to memory of 3292 2880 {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe 94 PID 2880 wrote to memory of 3292 2880 {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe 94 PID 2880 wrote to memory of 3292 2880 {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe 94 PID 2880 wrote to memory of 2240 2880 {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe 95 PID 2880 wrote to memory of 2240 2880 {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe 95 PID 2880 wrote to memory of 2240 2880 {239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe 95 PID 3292 wrote to memory of 1772 3292 {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe 96 PID 3292 wrote to memory of 1772 3292 {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe 96 PID 3292 wrote to memory of 1772 3292 {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe 96 PID 3292 wrote to memory of 4212 3292 {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe 97 PID 3292 wrote to memory of 4212 3292 {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe 97 PID 3292 wrote to memory of 4212 3292 {8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe 97 PID 1772 wrote to memory of 5104 1772 {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe 99 PID 1772 wrote to memory of 5104 1772 {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe 99 PID 1772 wrote to memory of 5104 1772 {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe 99 PID 1772 wrote to memory of 452 1772 {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe 98 PID 1772 wrote to memory of 452 1772 {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe 98 PID 1772 wrote to memory of 452 1772 {8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe 98 PID 5104 wrote to memory of 1880 5104 {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe 100 PID 5104 wrote to memory of 1880 5104 {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe 100 PID 5104 wrote to memory of 1880 5104 {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe 100 PID 5104 wrote to memory of 408 5104 {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe 101 PID 5104 wrote to memory of 408 5104 {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe 101 PID 5104 wrote to memory of 408 5104 {E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe 101 PID 1880 wrote to memory of 1284 1880 {123363B5-B893-4712-890A-E92835619F73}.exe 103 PID 1880 wrote to memory of 1284 1880 {123363B5-B893-4712-890A-E92835619F73}.exe 103 PID 1880 wrote to memory of 1284 1880 {123363B5-B893-4712-890A-E92835619F73}.exe 103 PID 1880 wrote to memory of 3832 1880 {123363B5-B893-4712-890A-E92835619F73}.exe 102 PID 1880 wrote to memory of 3832 1880 {123363B5-B893-4712-890A-E92835619F73}.exe 102 PID 1880 wrote to memory of 3832 1880 {123363B5-B893-4712-890A-E92835619F73}.exe 102 PID 1284 wrote to memory of 3920 1284 {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe 104 PID 1284 wrote to memory of 3920 1284 {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe 104 PID 1284 wrote to memory of 3920 1284 {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe 104 PID 1284 wrote to memory of 2380 1284 {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe 105 PID 1284 wrote to memory of 2380 1284 {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe 105 PID 1284 wrote to memory of 2380 1284 {B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe 105 PID 3920 wrote to memory of 4940 3920 {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe 106 PID 3920 wrote to memory of 4940 3920 {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe 106 PID 3920 wrote to memory of 4940 3920 {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe 106 PID 3920 wrote to memory of 880 3920 {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe 107 PID 3920 wrote to memory of 880 3920 {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe 107 PID 3920 wrote to memory of 880 3920 {0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe 107 PID 4940 wrote to memory of 3184 4940 {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe 108 PID 4940 wrote to memory of 3184 4940 {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe 108 PID 4940 wrote to memory of 3184 4940 {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe 108 PID 4940 wrote to memory of 936 4940 {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe 109 PID 4940 wrote to memory of 936 4940 {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe 109 PID 4940 wrote to memory of 936 4940 {A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe 109 PID 3184 wrote to memory of 1204 3184 {13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe 110 PID 3184 wrote to memory of 1204 3184 {13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe 110 PID 3184 wrote to memory of 1204 3184 {13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe 110 PID 3184 wrote to memory of 3652 3184 {13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\{DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exeC:\Windows\{DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\{239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exeC:\Windows\{239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\{8B60C6FB-6978-4a15-B05E-A769BAE96592}.exeC:\Windows\{8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\{8C1D6E0E-420B-412b-AA79-724ECEC57622}.exeC:\Windows\{8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C1D6~1.EXE > nul6⤵PID:452
-
-
C:\Windows\{E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exeC:\Windows\{E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\{123363B5-B893-4712-890A-E92835619F73}.exeC:\Windows\{123363B5-B893-4712-890A-E92835619F73}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{12336~1.EXE > nul8⤵PID:3832
-
-
C:\Windows\{B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exeC:\Windows\{B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\{0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exeC:\Windows\{0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\{A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exeC:\Windows\{A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\{13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exeC:\Windows\{13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\{3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exeC:\Windows\{3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3AD78~1.EXE > nul13⤵PID:2728
-
-
C:\Windows\{8DDDA185-7440-44c3-94D4-C87C50979E9E}.exeC:\Windows\{8DDDA185-7440-44c3-94D4-C87C50979E9E}.exe13⤵
- Executes dropped EXE
PID:3696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{13D1D~1.EXE > nul12⤵PID:3652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A2030~1.EXE > nul11⤵PID:936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D327~1.EXE > nul10⤵PID:880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B4C76~1.EXE > nul9⤵PID:2380
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E3707~1.EXE > nul7⤵PID:408
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B60C~1.EXE > nul5⤵PID:4212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{239BB~1.EXE > nul4⤵PID:2240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DCB58~1.EXE > nul3⤵PID:3280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD58454fdbb6777b778962d9ea6a85a3846
SHA15a0f6830c20f0c28f18271d2719f9ecb9dbfa794
SHA2565aff40910b1b6847249f4d7dfbf34c764e2903e81eb649d770f28510022e5cfd
SHA5125ded0537e8e75ec3d047371d3648255958738e7878280715407de4e96180efdbe08b5c2b39eed39786f352c3a5a8610ea077c3e58ed21f430ebfb0dff8ae2a13
-
Filesize
344KB
MD5426ec87f943bf2739684edec1043b7ff
SHA1268585beaa97f8d57b61a4ed1eeb38d9b870ec66
SHA256c10b21233a3ac36e7e93eab414f1af3717de7a95ec58785120daf09f655ad538
SHA5126414116e556de7b5e9c97a7669e0ba22b31ca1e78663632b89518e74a6cf7457cde83041345daa6587fedab705d36b1dcdc64b8ac823da7c47279b0431828cc9
-
Filesize
344KB
MD537031a9fad3a021ccc4c8227b494a4d6
SHA115cdc77bb0d0ae3c22ac262e4a6222be28e8eb88
SHA2563f204e422103ab0ab4978afb3d7abe9a39df55f54ff4e601d71ec8a2a542514c
SHA5129afa5f5ab65938c344dee99cf22dd00e847741b0e7aee434a47e473de9edcd09a2291fe9e81bfe87c911580a18b190bfd32bc3a419f131b63ac0415d33b3c9b3
-
Filesize
344KB
MD52c96e0ec8349953f1b59c9d20c7737fb
SHA128c29d33b7b9250421fcec1bca135ba7c20fb7fc
SHA256b7e44109e1eb6a4cf8ba57f2b5afb3fd9e5a801dfc28ea010852d18e24382c7d
SHA512e12f9905230530d66dcf4a16180e764c4d15bf8056f45f07678538f6c05935f58170f57bf870e8ab5cdf3431964664761bd8f10258dd9138974543e692f0244f
-
Filesize
344KB
MD563abe9f9dafcc0fd3abdee6d405997d9
SHA1ce8448c1a7b8db1c5c708e4cf6d8bceb20a4f73f
SHA256ed10f4ba75b3c317e0d6357b228e90b365d8bb982cc5907e416076c7c96ba4aa
SHA51277b23079a70796532298e2fbcb59b5f7aff60ffc5731d7e0b7bbea0c1cc58c98b390b1aadc1b2d54093ea718ea720e872587f7fff56546a5558f88ebdd6380a7
-
Filesize
344KB
MD5149aae8a448592fc29f25682e522cf93
SHA1fe085f71a96eb85857f2d52a7ba7cffc6fb223e5
SHA25635503a6343cdcf281e9278f6918c03583056dabe3b5a986c7c39f3e7451ab548
SHA512489fdeb3988b918bc6f0d8f623c0e8d2af08817b297340fef30193e2bcc4c79e63e07f755fce38ddac51c99403c3edf117fd8432879ed580ddb61175ecfb4f74
-
Filesize
344KB
MD5fbc30d003fcadbd96f4c2b8a9dc385e1
SHA185e98aa0ae89e5ae80f1158d252bf549b5cdcaba
SHA256cc528c53958568ecdba838ade9ad2461e5bccacf2fc04731d5e48cc28e705c7d
SHA51294b710767ad2f0fa192a6a1bd7c57c860c898704c5c703e3799d54a28526ac965b991cf7fcb72dc53913852fa197f9dda7fbfec3b64ba35003b5a720a62580ce
-
Filesize
344KB
MD5ce79ede17051e08d00c165c143380f24
SHA19e3722966b74553988439376ad531f2f26b988ed
SHA2566aaecc9cf0f1a1db5c3c9aa1b7a087a95a29cb53ff2d9c11686f167da7e36244
SHA51204da4b61c69658955bfd062c632323c2193223673c8219270dd0642e6aa5f4f407b01c56f222d062c72e8cf0b0d79fa24fa07dfa93566670ef4679eaa0ff22b9
-
Filesize
344KB
MD5231a89425867b3a097bcdeeecc09b021
SHA17a8d6f8e29c944b6f3fed88c8b75ef22d7ca9e21
SHA256471c38751ff509023646d7dc93402b5fc7a5a5c3853d4218c1bc4a86818c1cc7
SHA5128efafca1a8e16248fdbc36c355416ddcfa52a74e4070562f5895f5558bbe5435ddfa1e7165a4255127c11bafd4566550ded48363aeb7327adf65dd79bbb94b7c
-
Filesize
344KB
MD5bf6d0b0d66598dd968f9e1f17e49a079
SHA1732cf68cba188515590ceac6217783c94427b792
SHA2568134a7961658b5eba70b773b17350ed18169931c5caeabc9e4b5896c417e4ee3
SHA512ae16d25654fc926b45738994c6c85845f192415a408e11d1e6e3880734fece7886449b8efcb07e67225694902818a0c70af521e7327a958f5eccdcd372149cf8
-
Filesize
344KB
MD53ed624191d4b01206781ad161a449562
SHA1eaab336e1bbdd3c09697899b61c6a8c339c94362
SHA256952a8d0ababd9c72495a01e964d6bb62c504a6ce267be0d0faf7ba4beaceaa7e
SHA5128bcc45b368eabe24ff0a551dad589703d7363fb993270950b42aeac5efcaa133a117fce8af8637027b75cb4307edd63b5d56a89499ecf6c870a382cc6c94dc24
-
Filesize
344KB
MD5d42c4acd1b4dc85cb6b83dac431e6014
SHA1334ba2bf170a41aff9d83a43fa3b37a2b56ecb27
SHA2561e6c2a93af1838a8eff10b1b1b978199ce0e0140efee32bf7b313bbeb6dce68a
SHA512c089ae5e795f3a21165ed3bac69d3c18ff40f043ff03f3f2fd296217a9c3c314af0198b078f1f5a3c937cde9b30593826ddf7cb9e874d41885a5689c50033aa6