Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 07:33 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe
-
Size
197KB
-
MD5
4f6c09e04013bf5246d5d2b728161717
-
SHA1
58f618fd92edbc8825b3043f8b617df33f277396
-
SHA256
192c384d910f442f1a8969223d0abc2f6f18360d453d0de6476cd3501c7f5798
-
SHA512
b44678e9d57765be335502fb68ff2f5ca1addbc684abfbfcbc31a307dce10094a9c001b50608608dbabde48cec765259e8bc10de35bd088348eeca336e7914f5
-
SSDEEP
3072:jEGh0okl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGmlEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x000700000002322b-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023224-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000001693a-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000e00000002311b-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000001693a-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000f00000002311b-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000001693a-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x001000000002311b-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a00000001693a-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x001100000002311b-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b00000001693a-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x001200000002311b-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBBF6288-5AC0-4603-9383-BE691ADDCD9C} {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}\stubpath = "C:\\Windows\\{B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe" {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}\stubpath = "C:\\Windows\\{2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe" {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6E32145B-EA26-49cc-A51E-15FBA490E481} {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F0F6755E-AC68-4816-A152-2F4735A764CC} {C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC425C83-6800-4aa6-BC24-29DB8ABBF7D9} 2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2D56E609-F4A8-42e1-8D29-10A555346B7C}\stubpath = "C:\\Windows\\{2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe" {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7} {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6E32145B-EA26-49cc-A51E-15FBA490E481}\stubpath = "C:\\Windows\\{6E32145B-EA26-49cc-A51E-15FBA490E481}.exe" {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AD80CEDC-734F-46c0-BB49-6365F120B816} {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1} {AD80CEDC-734F-46c0-BB49-6365F120B816}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F0F6755E-AC68-4816-A152-2F4735A764CC}\stubpath = "C:\\Windows\\{F0F6755E-AC68-4816-A152-2F4735A764CC}.exe" {C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2} {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA} {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1B1E49EE-67E7-4486-AEBB-FCD18000E79E} {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9E68AE0-2B70-49ec-9564-0E6EFE956EA5} {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1}\stubpath = "C:\\Windows\\{C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1}.exe" {AD80CEDC-734F-46c0-BB49-6365F120B816}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}\stubpath = "C:\\Windows\\{EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe" 2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}\stubpath = "C:\\Windows\\{03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe" {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBBF6288-5AC0-4603-9383-BE691ADDCD9C}\stubpath = "C:\\Windows\\{BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe" {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2D56E609-F4A8-42e1-8D29-10A555346B7C} {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1B1E49EE-67E7-4486-AEBB-FCD18000E79E}\stubpath = "C:\\Windows\\{1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe" {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}\stubpath = "C:\\Windows\\{D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe" {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AD80CEDC-734F-46c0-BB49-6365F120B816}\stubpath = "C:\\Windows\\{AD80CEDC-734F-46c0-BB49-6365F120B816}.exe" {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe -
Executes dropped EXE 12 IoCs
pid Process 5064 {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe 688 {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe 1348 {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe 2752 {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe 3140 {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe 4968 {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe 3472 {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe 1916 {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe 4072 {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe 4876 {AD80CEDC-734F-46c0-BB49-6365F120B816}.exe 4616 {C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1}.exe 1976 {F0F6755E-AC68-4816-A152-2F4735A764CC}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe File created C:\Windows\{F0F6755E-AC68-4816-A152-2F4735A764CC}.exe {C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1}.exe File created C:\Windows\{03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe File created C:\Windows\{BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe File created C:\Windows\{B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe File created C:\Windows\{2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe File created C:\Windows\{1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe File created C:\Windows\{6E32145B-EA26-49cc-A51E-15FBA490E481}.exe {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe File created C:\Windows\{EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe 2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe File created C:\Windows\{2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe File created C:\Windows\{AD80CEDC-734F-46c0-BB49-6365F120B816}.exe {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe File created C:\Windows\{C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1}.exe {AD80CEDC-734F-46c0-BB49-6365F120B816}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4108 2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe Token: SeIncBasePriorityPrivilege 5064 {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe Token: SeIncBasePriorityPrivilege 688 {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe Token: SeIncBasePriorityPrivilege 1348 {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe Token: SeIncBasePriorityPrivilege 2752 {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe Token: SeIncBasePriorityPrivilege 3140 {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe Token: SeIncBasePriorityPrivilege 4968 {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe Token: SeIncBasePriorityPrivilege 3472 {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe Token: SeIncBasePriorityPrivilege 1916 {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe Token: SeIncBasePriorityPrivilege 4072 {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe Token: SeIncBasePriorityPrivilege 4876 {AD80CEDC-734F-46c0-BB49-6365F120B816}.exe Token: SeIncBasePriorityPrivilege 4616 {C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 5064 4108 2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe 91 PID 4108 wrote to memory of 5064 4108 2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe 91 PID 4108 wrote to memory of 5064 4108 2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe 91 PID 4108 wrote to memory of 3676 4108 2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe 92 PID 4108 wrote to memory of 3676 4108 2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe 92 PID 4108 wrote to memory of 3676 4108 2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe 92 PID 5064 wrote to memory of 688 5064 {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe 93 PID 5064 wrote to memory of 688 5064 {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe 93 PID 5064 wrote to memory of 688 5064 {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe 93 PID 5064 wrote to memory of 532 5064 {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe 94 PID 5064 wrote to memory of 532 5064 {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe 94 PID 5064 wrote to memory of 532 5064 {EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe 94 PID 688 wrote to memory of 1348 688 {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe 99 PID 688 wrote to memory of 1348 688 {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe 99 PID 688 wrote to memory of 1348 688 {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe 99 PID 688 wrote to memory of 1508 688 {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe 98 PID 688 wrote to memory of 1508 688 {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe 98 PID 688 wrote to memory of 1508 688 {03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe 98 PID 1348 wrote to memory of 2752 1348 {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe 100 PID 1348 wrote to memory of 2752 1348 {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe 100 PID 1348 wrote to memory of 2752 1348 {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe 100 PID 1348 wrote to memory of 4560 1348 {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe 101 PID 1348 wrote to memory of 4560 1348 {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe 101 PID 1348 wrote to memory of 4560 1348 {BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe 101 PID 2752 wrote to memory of 3140 2752 {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe 102 PID 2752 wrote to memory of 3140 2752 {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe 102 PID 2752 wrote to memory of 3140 2752 {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe 102 PID 2752 wrote to memory of 628 2752 {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe 103 PID 2752 wrote to memory of 628 2752 {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe 103 PID 2752 wrote to memory of 628 2752 {B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe 103 PID 3140 wrote to memory of 4968 3140 {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe 104 PID 3140 wrote to memory of 4968 3140 {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe 104 PID 3140 wrote to memory of 4968 3140 {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe 104 PID 3140 wrote to memory of 2060 3140 {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe 105 PID 3140 wrote to memory of 2060 3140 {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe 105 PID 3140 wrote to memory of 2060 3140 {2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe 105 PID 4968 wrote to memory of 3472 4968 {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe 106 PID 4968 wrote to memory of 3472 4968 {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe 106 PID 4968 wrote to memory of 3472 4968 {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe 106 PID 4968 wrote to memory of 3476 4968 {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe 107 PID 4968 wrote to memory of 3476 4968 {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe 107 PID 4968 wrote to memory of 3476 4968 {2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe 107 PID 3472 wrote to memory of 1916 3472 {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe 108 PID 3472 wrote to memory of 1916 3472 {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe 108 PID 3472 wrote to memory of 1916 3472 {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe 108 PID 3472 wrote to memory of 4260 3472 {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe 109 PID 3472 wrote to memory of 4260 3472 {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe 109 PID 3472 wrote to memory of 4260 3472 {1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe 109 PID 1916 wrote to memory of 4072 1916 {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe 110 PID 1916 wrote to memory of 4072 1916 {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe 110 PID 1916 wrote to memory of 4072 1916 {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe 110 PID 1916 wrote to memory of 2960 1916 {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe 111 PID 1916 wrote to memory of 2960 1916 {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe 111 PID 1916 wrote to memory of 2960 1916 {6E32145B-EA26-49cc-A51E-15FBA490E481}.exe 111 PID 4072 wrote to memory of 4876 4072 {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe 112 PID 4072 wrote to memory of 4876 4072 {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe 112 PID 4072 wrote to memory of 4876 4072 {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe 112 PID 4072 wrote to memory of 3552 4072 {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe 113 PID 4072 wrote to memory of 3552 4072 {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe 113 PID 4072 wrote to memory of 3552 4072 {D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe 113 PID 4876 wrote to memory of 4616 4876 {AD80CEDC-734F-46c0-BB49-6365F120B816}.exe 114 PID 4876 wrote to memory of 4616 4876 {AD80CEDC-734F-46c0-BB49-6365F120B816}.exe 114 PID 4876 wrote to memory of 4616 4876 {AD80CEDC-734F-46c0-BB49-6365F120B816}.exe 114 PID 4876 wrote to memory of 3492 4876 {AD80CEDC-734F-46c0-BB49-6365F120B816}.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-23_4f6c09e04013bf5246d5d2b728161717_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\{EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exeC:\Windows\{EC425C83-6800-4aa6-BC24-29DB8ABBF7D9}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\{03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exeC:\Windows\{03F9F5FB-BD37-4fc3-8D5E-342D5054ABF2}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03F9F~1.EXE > nul4⤵PID:1508
-
-
C:\Windows\{BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exeC:\Windows\{BBBF6288-5AC0-4603-9383-BE691ADDCD9C}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\{B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exeC:\Windows\{B930F001-2C6D-47a9-B3D8-67EB5EFA5AEA}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\{2D56E609-F4A8-42e1-8D29-10A555346B7C}.exeC:\Windows\{2D56E609-F4A8-42e1-8D29-10A555346B7C}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\{2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exeC:\Windows\{2A875EBA-0366-4b4a-8EA2-D59A3E14E6A7}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\{1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exeC:\Windows\{1B1E49EE-67E7-4486-AEBB-FCD18000E79E}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\{6E32145B-EA26-49cc-A51E-15FBA490E481}.exeC:\Windows\{6E32145B-EA26-49cc-A51E-15FBA490E481}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\{D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exeC:\Windows\{D9E68AE0-2B70-49ec-9564-0E6EFE956EA5}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\{AD80CEDC-734F-46c0-BB49-6365F120B816}.exeC:\Windows\{AD80CEDC-734F-46c0-BB49-6365F120B816}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\{C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1}.exeC:\Windows\{C074CFCF-CBEE-4d6d-BEFF-64B49E704BA1}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4616 -
C:\Windows\{F0F6755E-AC68-4816-A152-2F4735A764CC}.exeC:\Windows\{F0F6755E-AC68-4816-A152-2F4735A764CC}.exe13⤵
- Executes dropped EXE
PID:1976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C074C~1.EXE > nul13⤵PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AD80C~1.EXE > nul12⤵PID:3492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9E68~1.EXE > nul11⤵PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E321~1.EXE > nul10⤵PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1B1E4~1.EXE > nul9⤵PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2A875~1.EXE > nul8⤵PID:3476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2D56E~1.EXE > nul7⤵PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B930F~1.EXE > nul6⤵PID:628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BBBF6~1.EXE > nul5⤵PID:4560
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EC425~1.EXE > nul3⤵PID:532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3676
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ffcf2f4c044449ad911bbcff04fb3f60&localId=w:DE85FF22-0C12-E266-9673-0EBC171C1C82&deviceId=6825825694848287&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ffcf2f4c044449ad911bbcff04fb3f60&localId=w:DE85FF22-0C12-E266-9673-0EBC171C1C82&deviceId=6825825694848287&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=11A2A252B8E969B51FD4B67CB90968BB; domain=.bing.com; expires=Wed, 19-Mar-2025 07:33:37 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 6D09A05E6E0C4B2F8A184ADA55700F97 Ref B: LON04EDGE1014 Ref C: 2024-02-23T07:33:37Z
date: Fri, 23 Feb 2024 07:33:37 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=ffcf2f4c044449ad911bbcff04fb3f60&localId=w:DE85FF22-0C12-E266-9673-0EBC171C1C82&deviceId=6825825694848287&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=ffcf2f4c044449ad911bbcff04fb3f60&localId=w:DE85FF22-0C12-E266-9673-0EBC171C1C82&deviceId=6825825694848287&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=11A2A252B8E969B51FD4B67CB90968BB
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=9zq1BKTobLZmRv9Zt27pecck8z-kojW10JVV8WMOTBs; domain=.bing.com; expires=Wed, 19-Mar-2025 07:33:37 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 4B1FCE01D95A426E824568147E17C322 Ref B: LON04EDGE1014 Ref C: 2024-02-23T07:33:37Z
date: Fri, 23 Feb 2024 07:33:37 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ffcf2f4c044449ad911bbcff04fb3f60&localId=w:DE85FF22-0C12-E266-9673-0EBC171C1C82&deviceId=6825825694848287&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ffcf2f4c044449ad911bbcff04fb3f60&localId=w:DE85FF22-0C12-E266-9673-0EBC171C1C82&deviceId=6825825694848287&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=11A2A252B8E969B51FD4B67CB90968BB; MSPTC=9zq1BKTobLZmRv9Zt27pecck8z-kojW10JVV8WMOTBs
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 3CE9015D4F724102B4498A5FB484FF12 Ref B: LON04EDGE1014 Ref C: 2024-02-23T07:33:37Z
date: Fri, 23 Feb 2024 07:33:37 GMT
-
Remote address:8.8.8.8:53Request76.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request187.178.17.96.in-addr.arpaIN PTRResponse187.178.17.96.in-addr.arpaIN PTRa96-17-178-187deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request209.178.17.96.in-addr.arpaIN PTRResponse209.178.17.96.in-addr.arpaIN PTRa96-17-178-209deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ffcf2f4c044449ad911bbcff04fb3f60&localId=w:DE85FF22-0C12-E266-9673-0EBC171C1C82&deviceId=6825825694848287&anid=tls, http22.0kB 9.2kB 21 18
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ffcf2f4c044449ad911bbcff04fb3f60&localId=w:DE85FF22-0C12-E266-9673-0EBC171C1C82&deviceId=6825825694848287&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=ffcf2f4c044449ad911bbcff04fb3f60&localId=w:DE85FF22-0C12-E266-9673-0EBC171C1C82&deviceId=6825825694848287&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=ffcf2f4c044449ad911bbcff04fb3f60&localId=w:DE85FF22-0C12-E266-9673-0EBC171C1C82&deviceId=6825825694848287&anid=HTTP Response
204
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
71 B 157 B 1 1
DNS Request
76.32.126.40.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
187.178.17.96.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
209.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
173.178.17.96.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5d13cf0ab77cdcf31297cc601f4bed0c6
SHA19d10bf62e7a32e74b1f91e00a48e8c3998c3af61
SHA2562b326ef565c76c3897d721ca200f6e1376d94abe0238b0ce18cf3328a5b49d48
SHA5121c3511e0402af9952faaaf948c02a4a19dfa7f0bd36e390ef6c1e88964b1a055feeeba0cfd885da8697bc388f24d78cd858f39bc26b139ec871bb055dffa2eda
-
Filesize
197KB
MD565d2b87802041982ce6e1d6e90f0272c
SHA1fce64838231ea2042745b612062cf96bc603ea0e
SHA256e2362725a7fd685c14aab0bba4cc86f6857f91ef30c0fe20d63c35c1fcf08261
SHA512d1972b9d39b919f18c2efd321250b97b2462a798380abba1e81a6c08db623999e33898572a51a3dca622cf0f129bc11ca206d7e1eb59ce551418f3d53b07a949
-
Filesize
197KB
MD579c951c52b84157bda13cbec281b797d
SHA1c7497b571a75d3c84c73f17acf5f70739ec6c6ab
SHA25682c092aaf8dcdb87efb5f574fa9da7a682bbd16dcd4708cbdb52db426173f991
SHA5127d7860fc44014deb165062c5285ac47d995b9a30acbcb3675a7a0535e4559f8c156d512d84ac1580fed4ebd064622e48481928974c2fc9789f2544c046e02bc1
-
Filesize
197KB
MD532b197f2e337f6cce8b75025605945e7
SHA194351477508f1a3b1c54fdc09cb5374b0edee957
SHA25670b9d8a406a69645c17867416f03e3864a1b854b64e7a236da776fb16be5cddc
SHA512cb5ece37b57a89dd7e0a3e5a8ce8c7dbfc7d82d7d0e1e1e11766d9e60f8a2fcbef440834123aa13aa1a67b70e7b8d4d3637f7ef93784309346ffeae1980fe872
-
Filesize
197KB
MD5818fe6536064ea839fccc2e2a4186300
SHA165a7de5a6322cdc742e18b29aa139354a50f53b2
SHA2561841975b93127d0058160246e608ff19c44b94006f0850a3c46ac1f60305a20e
SHA51255a7f7c38d3388bdbe700c34d23661a602695ee75ff390e09e36cffc3cf80763a22e040024b20d6e165b5b935bd79ffd25896f8d36aa67324a5d9f7c5b1a671d
-
Filesize
197KB
MD559dbddcdd21aaf914e194c9a6a67b584
SHA1495402e10f9aa91a2c076a0ea9ffa9a2677ab733
SHA256b111eb7b622b4ff610bca15996f9f0f0c45e2fb25e63fcf89481b4b8015051ac
SHA5122f201b2f49ec1bb95e2fb2f91a681ca4a846ce1529b90fba956563fd43d47d615fe5c27fb765ceeeb58057a1ebee5a0269715170bc940904a26e01f0e1596fd1
-
Filesize
197KB
MD5d1807bbaf3cf9d6cdd491c0cbdf24b3b
SHA1675bfc4932c8f27214eddc3b4509323e1e51b26e
SHA256d2912a4827eeeda659910db963956d1fab186deeb80d794e27708b10441b4c5d
SHA512eb0335ddead9b96ffda51e4357b59898e570fd057d099e089d46dd6879b2cb6e0820c9b8134b0f3cc5ea039d4cbd230f32bbf6586434c38954edf2d3514b530d
-
Filesize
197KB
MD57a324040c1043e00b214a93d9135acc5
SHA115152f5a9f4b4c85e2c4193bf61b4223fb5a3e4c
SHA256fab7581d83052121abbdbab6f4a40dbd6045ddacdd876087e484cc2bdfa30c88
SHA512a1aeb3a68abf117b61263051eed2aa309ec6eb7985c6d094ad19820f88462b9abf7930f9d706fb4b9963248f830a0db8353dc1523154c5a639d84588fd344f94
-
Filesize
197KB
MD581e6a0f52529d4e79d353ff97caed246
SHA14bc46e2ecbdb9c5ffa2d50585119fc2300e1452b
SHA256ae957969fa1a87f3c6ac2cdf96466736a72f4e216a5dc6320d5d3d6349d670a2
SHA512eee6378550567d6caa8920d8bd0223747c35b03273a16ac04489eef22faa9594d4f376e173869d88c7b3ea809280476084741b679627e2b979503be2cc3dbd89
-
Filesize
197KB
MD5eb0ebb46647d41453ca9211a82ceba16
SHA147f65c5dd2a8e2317f928e40b11ff9ab6afa5662
SHA256743acbcf946911444293980ac9ee6bf8a774a63e04d1c1ab936c800e827889a3
SHA5124e8bb745c6164fd5bbd31d913ee79931980ec7c61b965dc247cc83816bfbd2bb37992023edba57f9f9048e41256ecfbd99c2cec4c00d892ae1f64b2aef68c1a0
-
Filesize
197KB
MD5d6625da8c888d3cbc285a3590466315b
SHA1e37c553eaf9cc617f607592559f3ecabae7c89a7
SHA2565b35dfc7dc4bc3112a6b2cf4ff8c552c5608666b793415665e241bc45a413ac3
SHA512b327c6f7e89c09759592692ba4ff735145affa0630184fe39b04fba5d627bded1830da69f70d2b3333f444536d1569542d1015b1b2843c5e0ea6b9fe3fa4502c
-
Filesize
197KB
MD5ed2027754abf7017ccf831e18a6658b1
SHA13939fdffd5fea491b646de7409c6643ac173a61a
SHA256402546bc2184af050cedfdb58eb9b27b2acb16b32d9d56059109a56064f3a0ed
SHA512c02ca49833f3492b985042f945ca82420cb1c906ab04e708d5d6d2cf4077ff00fffdd108e1ba394425776476526a5bb45f5291355f1ae10550e606e70d226df4