Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe
-
Size
204KB
-
MD5
509382799a17de1c3a2046305887d5b8
-
SHA1
1de92885d4e07570266d9c00850e5019e7eab23e
-
SHA256
7ac275cc486d48113ffd1f88351ce68d8aec7538207d0c083b8aabded5b8952b
-
SHA512
7527570a5be123385e34e6c0e7fb11a5d729f97ca74d1b0b1fdcd13249e6d0ce8da441121b38a31840f00ef63705410a844d187dab2078a97e8fdc144ee18115
-
SSDEEP
1536:1EGh0oOl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oOl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0005000000022d26-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000022ea1-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023269-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002311e-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023269-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002311e-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c000000023269-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a00000002311e-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d000000023269-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b00000002311e-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023267-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c00000002311e-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC} {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}\stubpath = "C:\\Windows\\{92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe" {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A229D0D-C93F-4cac-B96F-CB61FEED0088} {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A229D0D-C93F-4cac-B96F-CB61FEED0088}\stubpath = "C:\\Windows\\{5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe" {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{985FEE3C-E653-4bea-BE4B-1CF9412CA30F} 2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}\stubpath = "C:\\Windows\\{56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe" {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{351EF923-574C-4164-8C4D-586053974B9D}\stubpath = "C:\\Windows\\{351EF923-574C-4164-8C4D-586053974B9D}.exe" {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5D884D34-B0C4-4af7-803B-D47AFE0EA565}\stubpath = "C:\\Windows\\{5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe" {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9CB4280-7ACD-47c2-A1CD-06DA89174E1D}\stubpath = "C:\\Windows\\{D9CB4280-7ACD-47c2-A1CD-06DA89174E1D}.exe" {B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{39657954-D025-4e84-A894-5BCB0B93E46A}\stubpath = "C:\\Windows\\{39657954-D025-4e84-A894-5BCB0B93E46A}.exe" {D9CB4280-7ACD-47c2-A1CD-06DA89174E1D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{985FEE3C-E653-4bea-BE4B-1CF9412CA30F}\stubpath = "C:\\Windows\\{985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe" 2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59C890DA-F0C2-4da4-9C57-D1C43EE65FC0} {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{351EF923-574C-4164-8C4D-586053974B9D} {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2893ADCC-1382-4d84-B605-CD3456C6CC6E} {351EF923-574C-4164-8C4D-586053974B9D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2893ADCC-1382-4d84-B605-CD3456C6CC6E}\stubpath = "C:\\Windows\\{2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe" {351EF923-574C-4164-8C4D-586053974B9D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B44A4BB3-34AF-4fec-A20A-02502CC4E09E} {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{39657954-D025-4e84-A894-5BCB0B93E46A} {D9CB4280-7ACD-47c2-A1CD-06DA89174E1D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C58A6D78-2369-4e46-B181-05A9DAC25532}\stubpath = "C:\\Windows\\{C58A6D78-2369-4e46-B181-05A9DAC25532}.exe" {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}\stubpath = "C:\\Windows\\{59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe" {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5D884D34-B0C4-4af7-803B-D47AFE0EA565} {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B44A4BB3-34AF-4fec-A20A-02502CC4E09E}\stubpath = "C:\\Windows\\{B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe" {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9CB4280-7ACD-47c2-A1CD-06DA89174E1D} {B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD} {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C58A6D78-2369-4e46-B181-05A9DAC25532} {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe -
Executes dropped EXE 12 IoCs
pid Process 5112 {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe 1616 {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe 1948 {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe 4996 {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe 4668 {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe 2068 {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe 4244 {351EF923-574C-4164-8C4D-586053974B9D}.exe 3024 {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe 440 {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe 4944 {B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe 2708 {D9CB4280-7ACD-47c2-A1CD-06DA89174E1D}.exe 3880 {39657954-D025-4e84-A894-5BCB0B93E46A}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe 2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe File created C:\Windows\{C58A6D78-2369-4e46-B181-05A9DAC25532}.exe {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe File created C:\Windows\{92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe File created C:\Windows\{B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe File created C:\Windows\{56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe File created C:\Windows\{5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe File created C:\Windows\{59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe File created C:\Windows\{351EF923-574C-4164-8C4D-586053974B9D}.exe {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe File created C:\Windows\{2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe {351EF923-574C-4164-8C4D-586053974B9D}.exe File created C:\Windows\{5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe File created C:\Windows\{D9CB4280-7ACD-47c2-A1CD-06DA89174E1D}.exe {B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe File created C:\Windows\{39657954-D025-4e84-A894-5BCB0B93E46A}.exe {D9CB4280-7ACD-47c2-A1CD-06DA89174E1D}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3868 2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe Token: SeIncBasePriorityPrivilege 5112 {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe Token: SeIncBasePriorityPrivilege 1616 {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe Token: SeIncBasePriorityPrivilege 1948 {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe Token: SeIncBasePriorityPrivilege 4996 {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe Token: SeIncBasePriorityPrivilege 4668 {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe Token: SeIncBasePriorityPrivilege 2068 {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe Token: SeIncBasePriorityPrivilege 4244 {351EF923-574C-4164-8C4D-586053974B9D}.exe Token: SeIncBasePriorityPrivilege 3024 {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe Token: SeIncBasePriorityPrivilege 440 {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe Token: SeIncBasePriorityPrivilege 4944 {B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe Token: SeIncBasePriorityPrivilege 2708 {D9CB4280-7ACD-47c2-A1CD-06DA89174E1D}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3868 wrote to memory of 5112 3868 2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe 98 PID 3868 wrote to memory of 5112 3868 2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe 98 PID 3868 wrote to memory of 5112 3868 2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe 98 PID 3868 wrote to memory of 1856 3868 2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe 99 PID 3868 wrote to memory of 1856 3868 2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe 99 PID 3868 wrote to memory of 1856 3868 2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe 99 PID 5112 wrote to memory of 1616 5112 {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe 100 PID 5112 wrote to memory of 1616 5112 {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe 100 PID 5112 wrote to memory of 1616 5112 {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe 100 PID 5112 wrote to memory of 216 5112 {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe 101 PID 5112 wrote to memory of 216 5112 {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe 101 PID 5112 wrote to memory of 216 5112 {985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe 101 PID 1616 wrote to memory of 1948 1616 {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe 105 PID 1616 wrote to memory of 1948 1616 {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe 105 PID 1616 wrote to memory of 1948 1616 {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe 105 PID 1616 wrote to memory of 4108 1616 {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe 104 PID 1616 wrote to memory of 4108 1616 {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe 104 PID 1616 wrote to memory of 4108 1616 {56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe 104 PID 1948 wrote to memory of 4996 1948 {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe 108 PID 1948 wrote to memory of 4996 1948 {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe 108 PID 1948 wrote to memory of 4996 1948 {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe 108 PID 1948 wrote to memory of 1620 1948 {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe 109 PID 1948 wrote to memory of 1620 1948 {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe 109 PID 1948 wrote to memory of 1620 1948 {C58A6D78-2369-4e46-B181-05A9DAC25532}.exe 109 PID 4996 wrote to memory of 4668 4996 {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe 110 PID 4996 wrote to memory of 4668 4996 {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe 110 PID 4996 wrote to memory of 4668 4996 {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe 110 PID 4996 wrote to memory of 3128 4996 {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe 111 PID 4996 wrote to memory of 3128 4996 {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe 111 PID 4996 wrote to memory of 3128 4996 {92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe 111 PID 4668 wrote to memory of 2068 4668 {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe 112 PID 4668 wrote to memory of 2068 4668 {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe 112 PID 4668 wrote to memory of 2068 4668 {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe 112 PID 4668 wrote to memory of 4620 4668 {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe 113 PID 4668 wrote to memory of 4620 4668 {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe 113 PID 4668 wrote to memory of 4620 4668 {5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe 113 PID 2068 wrote to memory of 4244 2068 {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe 114 PID 2068 wrote to memory of 4244 2068 {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe 114 PID 2068 wrote to memory of 4244 2068 {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe 114 PID 2068 wrote to memory of 2284 2068 {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe 115 PID 2068 wrote to memory of 2284 2068 {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe 115 PID 2068 wrote to memory of 2284 2068 {59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe 115 PID 4244 wrote to memory of 3024 4244 {351EF923-574C-4164-8C4D-586053974B9D}.exe 116 PID 4244 wrote to memory of 3024 4244 {351EF923-574C-4164-8C4D-586053974B9D}.exe 116 PID 4244 wrote to memory of 3024 4244 {351EF923-574C-4164-8C4D-586053974B9D}.exe 116 PID 4244 wrote to memory of 5104 4244 {351EF923-574C-4164-8C4D-586053974B9D}.exe 117 PID 4244 wrote to memory of 5104 4244 {351EF923-574C-4164-8C4D-586053974B9D}.exe 117 PID 4244 wrote to memory of 5104 4244 {351EF923-574C-4164-8C4D-586053974B9D}.exe 117 PID 3024 wrote to memory of 440 3024 {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe 118 PID 3024 wrote to memory of 440 3024 {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe 118 PID 3024 wrote to memory of 440 3024 {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe 118 PID 3024 wrote to memory of 2388 3024 {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe 119 PID 3024 wrote to memory of 2388 3024 {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe 119 PID 3024 wrote to memory of 2388 3024 {2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe 119 PID 440 wrote to memory of 4944 440 {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe 120 PID 440 wrote to memory of 4944 440 {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe 120 PID 440 wrote to memory of 4944 440 {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe 120 PID 440 wrote to memory of 4416 440 {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe 121 PID 440 wrote to memory of 4416 440 {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe 121 PID 440 wrote to memory of 4416 440 {5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe 121 PID 4944 wrote to memory of 2708 4944 {B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe 122 PID 4944 wrote to memory of 2708 4944 {B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe 122 PID 4944 wrote to memory of 2708 4944 {B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe 122 PID 4944 wrote to memory of 3488 4944 {B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-28_509382799a17de1c3a2046305887d5b8_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\{985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exeC:\Windows\{985FEE3C-E653-4bea-BE4B-1CF9412CA30F}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\{56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exeC:\Windows\{56094CDE-B7A2-429d-8A9F-CDAD28A1C0AD}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56094~1.EXE > nul4⤵PID:4108
-
-
C:\Windows\{C58A6D78-2369-4e46-B181-05A9DAC25532}.exeC:\Windows\{C58A6D78-2369-4e46-B181-05A9DAC25532}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\{92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exeC:\Windows\{92C08ADC-CB41-4bcc-A9C0-5AD258F6ABBC}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\{5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exeC:\Windows\{5A229D0D-C93F-4cac-B96F-CB61FEED0088}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\{59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exeC:\Windows\{59C890DA-F0C2-4da4-9C57-D1C43EE65FC0}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\{351EF923-574C-4164-8C4D-586053974B9D}.exeC:\Windows\{351EF923-574C-4164-8C4D-586053974B9D}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\{2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exeC:\Windows\{2893ADCC-1382-4d84-B605-CD3456C6CC6E}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exeC:\Windows\{5D884D34-B0C4-4af7-803B-D47AFE0EA565}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\{B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exeC:\Windows\{B44A4BB3-34AF-4fec-A20A-02502CC4E09E}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\{D9CB4280-7ACD-47c2-A1CD-06DA89174E1D}.exeC:\Windows\{D9CB4280-7ACD-47c2-A1CD-06DA89174E1D}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\{39657954-D025-4e84-A894-5BCB0B93E46A}.exeC:\Windows\{39657954-D025-4e84-A894-5BCB0B93E46A}.exe13⤵
- Executes dropped EXE
PID:3880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9CB4~1.EXE > nul13⤵PID:1268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B44A4~1.EXE > nul12⤵PID:3488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D884~1.EXE > nul11⤵PID:4416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2893A~1.EXE > nul10⤵PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{351EF~1.EXE > nul9⤵PID:5104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{59C89~1.EXE > nul8⤵PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A229~1.EXE > nul7⤵PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{92C08~1.EXE > nul6⤵PID:3128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C58A6~1.EXE > nul5⤵PID:1620
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{985FE~1.EXE > nul3⤵PID:216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5f2b939af4da90b517170d445e45d8102
SHA14cc587c50a7cd45d7c2db72236349aacb8c987b2
SHA2563d415ebf0394cfa35366c5e9a87b812679abd1c1cbe35b98426d8044580ae948
SHA512b20b710159a58a3bbeba5f22052d2bd806a23273e603f65d4ee2b06e6e0fbe5dc0dabf60784884e32ff5b2aab624d417f70ed7cd16039f277a725bfde8a64d87
-
Filesize
204KB
MD5af77989b458ca4263e827c1497bf1c96
SHA113da83abae628fe740846f91c42389e81fc04a98
SHA256f92a6d5c2f0ea1736f12f5c559ad795630bc982f6a147b56ab88c56d4110fec9
SHA5120a7f4cfe17fdc966f1b8d8414881d5a74462870fc97f80ed70fbfb2822ad2066e526caabcb0737c151cf337469812e7ffa8ae68b64a151fdcc288da4b9b54f04
-
Filesize
204KB
MD5ec2d337602b672858f706a38d91ed311
SHA123d77533dafd56aeab4a5e58982915bfdeacbc97
SHA256d8142af296918cc44459284d459690cd447710769680ffc6ab7edfe02aeb9ff1
SHA512fe9b4812fa93ef5213f46e7cfa7091999d650804375355072d0d28b1e595b7690a99e3839f43c1c58877fe03237e9537677933f3a4d362f1fe22b29b1f825700
-
Filesize
204KB
MD5fc436dd1a9b0353d40805865d7aea959
SHA113b9b8af6657a0a654c90b707dd789f0a250c8a1
SHA256c893d48b4c77f1e72f67db7826d5b97f72396620766b1864586899871e684ee8
SHA5128579b8763e8874cd608a38f14a93246e17f8c76ebbc5409711d0c9528a605b94fc44d63ae418a44f9ae1be5e21577866831ff475078d2b78d135d6aea326647a
-
Filesize
204KB
MD5d9087f2d7294b77f6d82d5c912919c64
SHA1007c02a9febc5e5d52ebe4bf5855bdcad451d696
SHA25619c0fbda96fc854b4760321ed55de90711a581043d7d3fd19521e50ab1fa061c
SHA51211bd7bb4a7c6946375c1fa5988c36f23ca2a5d3228bc601fca2dea249e7afb3358bbbca3e85ab8adeb0228389ad6e5670bf6b91b93e5b5ad54d971b6454de634
-
Filesize
204KB
MD509deda22cb9f0624216d1729230057bb
SHA14c97a6ce4d321da495db14701f447c9d69deda00
SHA2562e956532ddb2c96d78f0d769710fa40ef555809ececefc888319ffadc6b6ae84
SHA512b687547042289ab8f5cf90ea07b6c441f29c977ad052595dff9271b9d900d1b767b32b1a8559d6823997e7c0c8a7db60aca597874b02afc87e721ef8e8dd9f7f
-
Filesize
204KB
MD5c34b052b1c80411810e3428f3e929b12
SHA1d63b2c50b9fce144523933d17d2056e61b6f491b
SHA256204cc9ef1ea5ba24d5e238b7f13877804d56204c6ad95719dfe0ab952e98d398
SHA512383f9b1f528c7a20966282948556b7d7d395d11c516de8a8c7b2153e886e958454982e5c52e5341f0309a4a53546cc2dfa79be12b0691fde5272bc4da03267ce
-
Filesize
204KB
MD5c0321eff86778be2553bd62bd9f6fe02
SHA1af2bec222f177a4899198ad799743b3101bf5012
SHA256444d1f0f74f01c2dcc7ca61fc563165b506ff65c23e5e3dad901dbc57a9d661f
SHA5121ed8e677934915065b347ad4f2b3a41df0c84705667313db1c5c7f0e5b90aded965336b5ae85fe62e244967e1045818ceab59131d191f908e20d24b3775787a1
-
Filesize
204KB
MD5ddbfd420ad3f7eb2381a168d157502d2
SHA165a6128120a65f46bd53d62a76b14bd749e14026
SHA256cacdc390834002f1452cb78bfa927238b53be57e702090b2dc1e44c8b68c8ff0
SHA512617675434b57288e7473a1be83fc7d608e746d43f8383d1ecc2d8788cfd15c98823e4b34a0d4b277d91a9c40d75c8bddaae5da8f82ad16453af757b24db93ba3
-
Filesize
204KB
MD510f92a44d0d57f79642e1f3120088b66
SHA13ab2b80753612729621b42035477d38519bf3183
SHA256a5e4576163f099cc9204304062174ba0acb43b8f11458021e9cd9a9fc7349c9e
SHA512fe8a6fe4729778409405603aad056a9cc0327c6c147ed25303b8dfd85a9fc6f172cf81ead56319671b2da4f85addf70435ee8280c3e1ce6d0d3cca7b6add5036
-
Filesize
204KB
MD5e26b37e0a1e4ebc21fe22df6b8c89777
SHA1a7245b7f85b6b4e384f0f4bd242e0f055ea6d3d7
SHA25675179cb839a6bf3bd73a749d7e8809f31f43a00063392c35a840939eba8f5e0a
SHA512b4f7b9be812c684aacf0c826108e4f15a5b8d24e1425c4df18b3b74cab31d3064c4b64759bd0ade5f2d9ef72506eba4aafd9822a16bf506e8b57cb908281d8b5
-
Filesize
204KB
MD535514938ebaec6515285355aa530b619
SHA1d297b787b7f369ca61d41dd55fd92c325a1ffab7
SHA256dcce271040fbba0279735d445357ff1c4245f0576daf278645d7f798c1a079d1
SHA512c1587c95b4949b74508f5ec66cda6db7c53043c3045e14458972de9d2bd2eed0ee62ca39f65622a170427c00f7d4f539dd79e5d2a86b75d95a3f29618d94ce70