Analysis
-
max time kernel
156s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe
-
Size
408KB
-
MD5
b9c344d3fcb706381d7a9671dcc9e478
-
SHA1
92dbabe172d5f33568599b717c5062ea6e45139c
-
SHA256
435c98d19d8010771c7ae72b4382e3935c26c766627647c6224199a6bb455cd9
-
SHA512
aebd48f0d6c6761c07c381f2d594ec1dec2296378bd315459e937b0252bc87c7734a4dc58924b423b89fee9aa78492645fe18e392d0ea24048f2a2d60ff49760
-
SSDEEP
3072:CEGh0ozl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGBldOe2MUVg3vTeKcAEciTBqr3jy9
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0008000000023210-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023216-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023219-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000001e747-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023219-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000001e747-21.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023219-25.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000001e747-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023219-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000600000001e747-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023215-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000001e747-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C6B17F2-63F2-4dd0-9DBB-8320D994C118}\stubpath = "C:\\Windows\\{7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe" 2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0E21C972-3375-448f-9597-5092D87A7B5E} {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{39F9AF00-B19B-498b-97E5-812871CFE410}\stubpath = "C:\\Windows\\{39F9AF00-B19B-498b-97E5-812871CFE410}.exe" {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{159755B9-30A5-4b60-AB48-7D0CDED07A0F}\stubpath = "C:\\Windows\\{159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe" {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C5E7766-533B-4081-B2BF-08EB8149FA29} {3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C5E7766-533B-4081-B2BF-08EB8149FA29}\stubpath = "C:\\Windows\\{4C5E7766-533B-4081-B2BF-08EB8149FA29}.exe" {3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C6B17F2-63F2-4dd0-9DBB-8320D994C118} 2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0E21C972-3375-448f-9597-5092D87A7B5E}\stubpath = "C:\\Windows\\{0E21C972-3375-448f-9597-5092D87A7B5E}.exe" {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52777205-A495-4eca-97ED-F3EADA4D7ECE} {0E21C972-3375-448f-9597-5092D87A7B5E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EEA5ACE3-5D4E-4296-BB69-1411929581F2}\stubpath = "C:\\Windows\\{EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe" {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}\stubpath = "C:\\Windows\\{BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe" {39F9AF00-B19B-498b-97E5-812871CFE410}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988} {159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988}\stubpath = "C:\\Windows\\{3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988}.exe" {159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EEA5ACE3-5D4E-4296-BB69-1411929581F2} {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16D3533A-58A2-4763-8523-1E12419AD53A}\stubpath = "C:\\Windows\\{16D3533A-58A2-4763-8523-1E12419AD53A}.exe" {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C236F996-2B9F-4d31-82DA-AF33EFCCF691} {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C236F996-2B9F-4d31-82DA-AF33EFCCF691}\stubpath = "C:\\Windows\\{C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe" {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52777205-A495-4eca-97ED-F3EADA4D7ECE}\stubpath = "C:\\Windows\\{52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe" {0E21C972-3375-448f-9597-5092D87A7B5E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16D3533A-58A2-4763-8523-1E12419AD53A} {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1} {16D3533A-58A2-4763-8523-1E12419AD53A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}\stubpath = "C:\\Windows\\{0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe" {16D3533A-58A2-4763-8523-1E12419AD53A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{39F9AF00-B19B-498b-97E5-812871CFE410} {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5} {39F9AF00-B19B-498b-97E5-812871CFE410}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{159755B9-30A5-4b60-AB48-7D0CDED07A0F} {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe -
Executes dropped EXE 12 IoCs
pid Process 1552 {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe 4472 {0E21C972-3375-448f-9597-5092D87A7B5E}.exe 1404 {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe 1488 {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe 3996 {16D3533A-58A2-4763-8523-1E12419AD53A}.exe 4392 {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe 3384 {39F9AF00-B19B-498b-97E5-812871CFE410}.exe 636 {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe 1260 {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe 4884 {159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe 1736 {3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988}.exe 2996 {4C5E7766-533B-4081-B2BF-08EB8149FA29}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe File created C:\Windows\{0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe {16D3533A-58A2-4763-8523-1E12419AD53A}.exe File created C:\Windows\{39F9AF00-B19B-498b-97E5-812871CFE410}.exe {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe File created C:\Windows\{C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe File created C:\Windows\{159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe File created C:\Windows\{3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988}.exe {159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe File created C:\Windows\{7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe 2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe File created C:\Windows\{0E21C972-3375-448f-9597-5092D87A7B5E}.exe {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe File created C:\Windows\{4C5E7766-533B-4081-B2BF-08EB8149FA29}.exe {3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988}.exe File created C:\Windows\{BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe {39F9AF00-B19B-498b-97E5-812871CFE410}.exe File created C:\Windows\{52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe {0E21C972-3375-448f-9597-5092D87A7B5E}.exe File created C:\Windows\{16D3533A-58A2-4763-8523-1E12419AD53A}.exe {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2604 2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe Token: SeIncBasePriorityPrivilege 1552 {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe Token: SeIncBasePriorityPrivilege 4472 {0E21C972-3375-448f-9597-5092D87A7B5E}.exe Token: SeIncBasePriorityPrivilege 1404 {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe Token: SeIncBasePriorityPrivilege 1488 {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe Token: SeIncBasePriorityPrivilege 3996 {16D3533A-58A2-4763-8523-1E12419AD53A}.exe Token: SeIncBasePriorityPrivilege 4392 {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe Token: SeIncBasePriorityPrivilege 3384 {39F9AF00-B19B-498b-97E5-812871CFE410}.exe Token: SeIncBasePriorityPrivilege 636 {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe Token: SeIncBasePriorityPrivilege 1260 {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe Token: SeIncBasePriorityPrivilege 4884 {159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe Token: SeIncBasePriorityPrivilege 1736 {3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 1552 2604 2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe 92 PID 2604 wrote to memory of 1552 2604 2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe 92 PID 2604 wrote to memory of 1552 2604 2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe 92 PID 2604 wrote to memory of 2660 2604 2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe 93 PID 2604 wrote to memory of 2660 2604 2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe 93 PID 2604 wrote to memory of 2660 2604 2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe 93 PID 1552 wrote to memory of 4472 1552 {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe 96 PID 1552 wrote to memory of 4472 1552 {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe 96 PID 1552 wrote to memory of 4472 1552 {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe 96 PID 1552 wrote to memory of 2356 1552 {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe 97 PID 1552 wrote to memory of 2356 1552 {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe 97 PID 1552 wrote to memory of 2356 1552 {7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe 97 PID 4472 wrote to memory of 1404 4472 {0E21C972-3375-448f-9597-5092D87A7B5E}.exe 98 PID 4472 wrote to memory of 1404 4472 {0E21C972-3375-448f-9597-5092D87A7B5E}.exe 98 PID 4472 wrote to memory of 1404 4472 {0E21C972-3375-448f-9597-5092D87A7B5E}.exe 98 PID 4472 wrote to memory of 2308 4472 {0E21C972-3375-448f-9597-5092D87A7B5E}.exe 99 PID 4472 wrote to memory of 2308 4472 {0E21C972-3375-448f-9597-5092D87A7B5E}.exe 99 PID 4472 wrote to memory of 2308 4472 {0E21C972-3375-448f-9597-5092D87A7B5E}.exe 99 PID 1404 wrote to memory of 1488 1404 {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe 101 PID 1404 wrote to memory of 1488 1404 {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe 101 PID 1404 wrote to memory of 1488 1404 {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe 101 PID 1404 wrote to memory of 2924 1404 {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe 102 PID 1404 wrote to memory of 2924 1404 {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe 102 PID 1404 wrote to memory of 2924 1404 {52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe 102 PID 1488 wrote to memory of 3996 1488 {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe 103 PID 1488 wrote to memory of 3996 1488 {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe 103 PID 1488 wrote to memory of 3996 1488 {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe 103 PID 1488 wrote to memory of 2408 1488 {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe 104 PID 1488 wrote to memory of 2408 1488 {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe 104 PID 1488 wrote to memory of 2408 1488 {EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe 104 PID 3996 wrote to memory of 4392 3996 {16D3533A-58A2-4763-8523-1E12419AD53A}.exe 105 PID 3996 wrote to memory of 4392 3996 {16D3533A-58A2-4763-8523-1E12419AD53A}.exe 105 PID 3996 wrote to memory of 4392 3996 {16D3533A-58A2-4763-8523-1E12419AD53A}.exe 105 PID 3996 wrote to memory of 1584 3996 {16D3533A-58A2-4763-8523-1E12419AD53A}.exe 106 PID 3996 wrote to memory of 1584 3996 {16D3533A-58A2-4763-8523-1E12419AD53A}.exe 106 PID 3996 wrote to memory of 1584 3996 {16D3533A-58A2-4763-8523-1E12419AD53A}.exe 106 PID 4392 wrote to memory of 3384 4392 {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe 107 PID 4392 wrote to memory of 3384 4392 {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe 107 PID 4392 wrote to memory of 3384 4392 {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe 107 PID 4392 wrote to memory of 3032 4392 {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe 108 PID 4392 wrote to memory of 3032 4392 {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe 108 PID 4392 wrote to memory of 3032 4392 {0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe 108 PID 3384 wrote to memory of 636 3384 {39F9AF00-B19B-498b-97E5-812871CFE410}.exe 109 PID 3384 wrote to memory of 636 3384 {39F9AF00-B19B-498b-97E5-812871CFE410}.exe 109 PID 3384 wrote to memory of 636 3384 {39F9AF00-B19B-498b-97E5-812871CFE410}.exe 109 PID 3384 wrote to memory of 3840 3384 {39F9AF00-B19B-498b-97E5-812871CFE410}.exe 110 PID 3384 wrote to memory of 3840 3384 {39F9AF00-B19B-498b-97E5-812871CFE410}.exe 110 PID 3384 wrote to memory of 3840 3384 {39F9AF00-B19B-498b-97E5-812871CFE410}.exe 110 PID 636 wrote to memory of 1260 636 {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe 111 PID 636 wrote to memory of 1260 636 {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe 111 PID 636 wrote to memory of 1260 636 {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe 111 PID 636 wrote to memory of 4012 636 {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe 112 PID 636 wrote to memory of 4012 636 {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe 112 PID 636 wrote to memory of 4012 636 {BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe 112 PID 1260 wrote to memory of 4884 1260 {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe 113 PID 1260 wrote to memory of 4884 1260 {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe 113 PID 1260 wrote to memory of 4884 1260 {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe 113 PID 1260 wrote to memory of 4524 1260 {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe 114 PID 1260 wrote to memory of 4524 1260 {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe 114 PID 1260 wrote to memory of 4524 1260 {C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe 114 PID 4884 wrote to memory of 1736 4884 {159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe 115 PID 4884 wrote to memory of 1736 4884 {159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe 115 PID 4884 wrote to memory of 1736 4884 {159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe 115 PID 4884 wrote to memory of 4232 4884 {159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_b9c344d3fcb706381d7a9671dcc9e478_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\{7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exeC:\Windows\{7C6B17F2-63F2-4dd0-9DBB-8320D994C118}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\{0E21C972-3375-448f-9597-5092D87A7B5E}.exeC:\Windows\{0E21C972-3375-448f-9597-5092D87A7B5E}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\{52777205-A495-4eca-97ED-F3EADA4D7ECE}.exeC:\Windows\{52777205-A495-4eca-97ED-F3EADA4D7ECE}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\{EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exeC:\Windows\{EEA5ACE3-5D4E-4296-BB69-1411929581F2}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\{16D3533A-58A2-4763-8523-1E12419AD53A}.exeC:\Windows\{16D3533A-58A2-4763-8523-1E12419AD53A}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\{0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exeC:\Windows\{0FAB12B4-AFF6-48c0-BE65-ECC00933B3E1}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\{39F9AF00-B19B-498b-97E5-812871CFE410}.exeC:\Windows\{39F9AF00-B19B-498b-97E5-812871CFE410}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\{BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exeC:\Windows\{BBDDEEF9-80F9-4ede-9821-C2DECA1AE7A5}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\{C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exeC:\Windows\{C236F996-2B9F-4d31-82DA-AF33EFCCF691}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\{159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exeC:\Windows\{159755B9-30A5-4b60-AB48-7D0CDED07A0F}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\{3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988}.exeC:\Windows\{3FA5CE45-A5C3-457e-AAA3-3FC02C3E8988}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Windows\{4C5E7766-533B-4081-B2BF-08EB8149FA29}.exeC:\Windows\{4C5E7766-533B-4081-B2BF-08EB8149FA29}.exe13⤵
- Executes dropped EXE
PID:2996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3FA5C~1.EXE > nul13⤵PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{15975~1.EXE > nul12⤵PID:4232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C236F~1.EXE > nul11⤵PID:4524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BBDDE~1.EXE > nul10⤵PID:4012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39F9A~1.EXE > nul9⤵PID:3840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0FAB1~1.EXE > nul8⤵PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16D35~1.EXE > nul7⤵PID:1584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EEA5A~1.EXE > nul6⤵PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{52777~1.EXE > nul5⤵PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0E21C~1.EXE > nul4⤵PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C6B1~1.EXE > nul3⤵PID:2356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5ff6af9a6273e1ac0ab3d497139c37143
SHA19ae2d96271271746f3184727b837e95c341bd2f4
SHA2566cfa5b428611e93012190f93a4626ebb1a708bc2b952568f6d7a3054095bdbd6
SHA512bb85043384638c6186c2a0e6c3339143938b84c349e8dc10cdcc601f06189096d354f9ab3f33537a6c255004c0491269fcc0fc0b7f781d4cc673524c37a6e347
-
Filesize
408KB
MD5c649f5b34f8a7665ac7f9cf8567d4788
SHA15d1c2cec86893f5f621dbba81585a22669a82037
SHA2567adba9a826edac3916dbf53cea218aa43c5f3ae70f7d172069c431fe38d56dbf
SHA512378070ec13b26cb93b78cc22f545fdc78b81a370c3d8be1c3166de27b3ffdef6613f7baa98e63260df19b4eae7f9a9063d480c9b9bd4c71eafc233c264206043
-
Filesize
408KB
MD5beb865cb4cbfecae7a6ee35aa3cc89e4
SHA1bad041ccf82af5306aee089831cfe0482fc60bc3
SHA256790ae81f2b83d2c298eace62942b7696da88d4a8ab3331f82db7a0e5ffac0d9f
SHA51290eeb7f3a23aef233d2d922c56fb33dd5b57d02a702fd07ab0538cb3b3dd8c92dd8345769471bb648d0c0856cee000b0a8777e9a5e4761cdc0ae6a00d30ca41a
-
Filesize
408KB
MD53e05dbe764f4d1ac089d59bf9469028a
SHA15e9f4a3f38f79c7d7fe59431ba28aa22c147167c
SHA25653c34b3cec71b7dff848f7923a4e9b3370e3209d1466056795b278047e7233f5
SHA5123bd1f7c552b1048b181c5da4a7778b4fda4df44c026a45eabc196ec66bbd894203a457912150b9f236861d86681ba86940ff715ffabea1157fd8343f655f3a02
-
Filesize
408KB
MD5a427f47e8116116918ba3e43c79da06f
SHA171ce744ca0556f55a66f132b1a9359757d327726
SHA2564266f80adebf32e5722f2d3ff1be5eeccfbf89545d458c00103f42e5f93e6ab9
SHA51245318fcc88fa1a8bee0e17226de42cb4bb3874135ad0ca756f8dbc56471b233f848629534a2da1b44af7c050feb235c2dc6c86d6f0e221d846cbd36d2787f01c
-
Filesize
408KB
MD54602431728ffaf96e541a02d95783278
SHA1ec58ab1755925bb72549409aa38bcfa5dd72141a
SHA2562056a7c6d9f4a9b9c554c40b22afaa15a8e75ef059c0f91a80f5cf4867a45dac
SHA512a4c84058be1de8e08f82b921664d894802056ad7ca10f331d9c93f7ee7ca5f6783e56ca56062076f821ef0363bf27fd873e7954fc012e212a5f40c6ec48f1596
-
Filesize
408KB
MD5db3ee12adc6ca475eb0417a2e349d154
SHA1e6d6943f417b198f936d48f45d574a0ecfe61a32
SHA25627d4f2b7e6be3996c292f82f422804ee61affe883ab830d78ce977069b503de2
SHA512cd40c7776de37d1d82c8436b4041542fa4b165617dadd6d48e31d2e01d714f29274cf28092c899959ee5b87818b28667beccd0da16510fb527f493ec9ae20a7a
-
Filesize
408KB
MD565817c37315cc07df79cc6f72a638efe
SHA15a4aefff8cf560106489543af64b56335496b5eb
SHA25653ec9ee196f6db379634fa0a585fa2ddfb28fe1682723863e34e32cd7b49da7f
SHA51250a4e57a9b3c44d3433305106296a8bb694767e288c61810901c6d5d159064178002c3c5bb5943f35793924cd97ae6e425161bb5575a70266a4941dba060bcf3
-
Filesize
408KB
MD55f4cea64153e2200da933ddfb83f01bb
SHA14dd48f40786c32724e9c3cd1fee6c58f7110691f
SHA2567087191e0cc6686e60735ba7dd8512d5cfbd4045ea56eeb471844f48ec737f86
SHA5125ed59f52251625b17bb5539840fdbd8e5af1c83703a169fd927edf20c877384d3bfd327ac4073fa9dd815fdfb6ce5e61c034eda749a9126281169ec78cc4fdb7
-
Filesize
408KB
MD595214e8d04e42eec0f4cbb3e86129d37
SHA1dd9fb0e911b60942e73cc75b1eb5fa5bf925933c
SHA256a49de8d3b321bef9676516a7d29a3d600c423f19ef384a9cf0576556489afdec
SHA512464c0f74fc4a1b5f74b726c24eefc69db7d6aa26d9054e5c4cb92f0670c297ed900e188c855bb0f517b69b92dacf10520bbd76e90f7e13a45a75658525155582
-
Filesize
408KB
MD575af6dd2e71682f2716d474a23fff9dc
SHA1f8afc57171c1bad291ced8898becd6c1a6d759d5
SHA25659dc6a046b06d121ca78770b680931c3a6e7ece45d6b23ceb3c296e9883f358e
SHA512a7f1afddb0a83048404e74382c3ddab9d1f89213038ae1564fb3a2191e4c8fe7b5cf144cfd3ed608ee4461aa683c824daaa60acac3b3459f764559fbd30d861c
-
Filesize
408KB
MD54603b44e475c3bd2d427b467d56ddead
SHA17a157a483ee80a17f1ad3b6e40f3ddffebe34760
SHA256da8df52f2f669dd55235ddcd9328a625ade1d98a58296b7b11541004e284870d
SHA51267b82b577e70f7bb3ace601433ab18920f52d7fc97d386a7c71ef6c8a3b78ce83e4eb7ea4d450a081dd1932a7a643b341898ca47d7ca04b404deb5878c94675c