Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe
-
Size
344KB
-
MD5
055a4b707a867d90bfc0c6b14b4c1510
-
SHA1
6b40f8a990e99609bb2cd4ec73e9cc3c04d89bde
-
SHA256
00178c1b72221f42a822514a54915f2536ed3fc7955e8207dbc52e9fbd4d644d
-
SHA512
3ee418b031c9279323ec4df0cf75e6ea5885a957d253c049d9bf5e7fa8ed00b17e12ec1ec2d8fee2b5598f9098a78a3863887d2cd57e3da532c5f01c6bfeb395
-
SSDEEP
3072:mEGh0o4lEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGulqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x00080000000231fa-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000231fb-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000e000000023120-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a0000000231fb-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000f000000023120-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b0000000231fb-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0010000000023120-25.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c0000000231fb-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0011000000023120-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d0000000231fb-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0012000000023120-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000e0000000231fb-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AC64D56D-B399-4e4c-8B8E-FBAE45626CE6}\stubpath = "C:\\Windows\\{AC64D56D-B399-4e4c-8B8E-FBAE45626CE6}.exe" {3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3895E6C9-4DF4-43ee-B044-CDF51130C9EB}\stubpath = "C:\\Windows\\{3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe" {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1026BF4C-9AA5-49f4-808C-5748CA3FC708}\stubpath = "C:\\Windows\\{1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe" {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4} {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{232D7503-B1ED-4c04-83FB-B51344DCA0A2} {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AC64D56D-B399-4e4c-8B8E-FBAE45626CE6} {3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}\stubpath = "C:\\Windows\\{3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe" {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1E6A9649-9B9B-4678-B73E-65452D3743C9}\stubpath = "C:\\Windows\\{1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe" {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3EB61BDC-8342-4f81-85D3-3B3FEF97BE15} {1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F266DB23-2B74-4366-9E45-BAAC25CA166A}\stubpath = "C:\\Windows\\{F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe" 2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1026BF4C-9AA5-49f4-808C-5748CA3FC708} {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}\stubpath = "C:\\Windows\\{E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe" {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}\stubpath = "C:\\Windows\\{3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe" {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DA3D49F7-E391-4bed-BBAB-3D16837BD539}\stubpath = "C:\\Windows\\{DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe" {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F266DB23-2B74-4366-9E45-BAAC25CA166A} 2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3895E6C9-4DF4-43ee-B044-CDF51130C9EB} {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA} {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1E6A9649-9B9B-4678-B73E-65452D3743C9} {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}\stubpath = "C:\\Windows\\{3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe" {1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{77BBB130-E0E0-41a6-B1CA-18AE497CE8C2} {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}\stubpath = "C:\\Windows\\{77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe" {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E49795CF-FBB6-423e-BC0D-20C1EB14DB0E} {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DA3D49F7-E391-4bed-BBAB-3D16837BD539} {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{232D7503-B1ED-4c04-83FB-B51344DCA0A2}\stubpath = "C:\\Windows\\{232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe" {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe -
Executes dropped EXE 12 IoCs
pid Process 4536 {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe 3792 {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe 4032 {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe 5112 {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe 1804 {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe 2832 {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe 5028 {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe 4296 {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe 4704 {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe 228 {1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe 3104 {3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe 744 {AC64D56D-B399-4e4c-8B8E-FBAE45626CE6}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe File created C:\Windows\{1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe File created C:\Windows\{E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe File created C:\Windows\{3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe File created C:\Windows\{1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe File created C:\Windows\{F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe 2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe File created C:\Windows\{77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe File created C:\Windows\{3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe File created C:\Windows\{DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe File created C:\Windows\{232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe File created C:\Windows\{3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe {1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe File created C:\Windows\{AC64D56D-B399-4e4c-8B8E-FBAE45626CE6}.exe {3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2444 2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe Token: SeIncBasePriorityPrivilege 4536 {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe Token: SeIncBasePriorityPrivilege 3792 {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe Token: SeIncBasePriorityPrivilege 4032 {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe Token: SeIncBasePriorityPrivilege 5112 {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe Token: SeIncBasePriorityPrivilege 1804 {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe Token: SeIncBasePriorityPrivilege 2832 {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe Token: SeIncBasePriorityPrivilege 5028 {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe Token: SeIncBasePriorityPrivilege 4296 {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe Token: SeIncBasePriorityPrivilege 4704 {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe Token: SeIncBasePriorityPrivilege 228 {1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe Token: SeIncBasePriorityPrivilege 3104 {3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2444 wrote to memory of 4536 2444 2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe 92 PID 2444 wrote to memory of 4536 2444 2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe 92 PID 2444 wrote to memory of 4536 2444 2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe 92 PID 2444 wrote to memory of 4668 2444 2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe 93 PID 2444 wrote to memory of 4668 2444 2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe 93 PID 2444 wrote to memory of 4668 2444 2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe 93 PID 4536 wrote to memory of 3792 4536 {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe 94 PID 4536 wrote to memory of 3792 4536 {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe 94 PID 4536 wrote to memory of 3792 4536 {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe 94 PID 4536 wrote to memory of 1192 4536 {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe 95 PID 4536 wrote to memory of 1192 4536 {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe 95 PID 4536 wrote to memory of 1192 4536 {F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe 95 PID 3792 wrote to memory of 4032 3792 {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe 99 PID 3792 wrote to memory of 4032 3792 {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe 99 PID 3792 wrote to memory of 4032 3792 {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe 99 PID 3792 wrote to memory of 2300 3792 {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe 100 PID 3792 wrote to memory of 2300 3792 {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe 100 PID 3792 wrote to memory of 2300 3792 {77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe 100 PID 4032 wrote to memory of 5112 4032 {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe 101 PID 4032 wrote to memory of 5112 4032 {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe 101 PID 4032 wrote to memory of 5112 4032 {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe 101 PID 4032 wrote to memory of 3556 4032 {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe 102 PID 4032 wrote to memory of 3556 4032 {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe 102 PID 4032 wrote to memory of 3556 4032 {3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe 102 PID 5112 wrote to memory of 1804 5112 {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe 103 PID 5112 wrote to memory of 1804 5112 {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe 103 PID 5112 wrote to memory of 1804 5112 {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe 103 PID 5112 wrote to memory of 3352 5112 {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe 104 PID 5112 wrote to memory of 3352 5112 {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe 104 PID 5112 wrote to memory of 3352 5112 {1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe 104 PID 1804 wrote to memory of 2832 1804 {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe 105 PID 1804 wrote to memory of 2832 1804 {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe 105 PID 1804 wrote to memory of 2832 1804 {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe 105 PID 1804 wrote to memory of 688 1804 {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe 106 PID 1804 wrote to memory of 688 1804 {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe 106 PID 1804 wrote to memory of 688 1804 {E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe 106 PID 2832 wrote to memory of 5028 2832 {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe 107 PID 2832 wrote to memory of 5028 2832 {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe 107 PID 2832 wrote to memory of 5028 2832 {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe 107 PID 2832 wrote to memory of 3008 2832 {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe 108 PID 2832 wrote to memory of 3008 2832 {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe 108 PID 2832 wrote to memory of 3008 2832 {3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe 108 PID 5028 wrote to memory of 4296 5028 {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe 109 PID 5028 wrote to memory of 4296 5028 {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe 109 PID 5028 wrote to memory of 4296 5028 {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe 109 PID 5028 wrote to memory of 928 5028 {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe 110 PID 5028 wrote to memory of 928 5028 {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe 110 PID 5028 wrote to memory of 928 5028 {DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe 110 PID 4296 wrote to memory of 4704 4296 {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe 111 PID 4296 wrote to memory of 4704 4296 {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe 111 PID 4296 wrote to memory of 4704 4296 {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe 111 PID 4296 wrote to memory of 2576 4296 {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe 112 PID 4296 wrote to memory of 2576 4296 {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe 112 PID 4296 wrote to memory of 2576 4296 {3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe 112 PID 4704 wrote to memory of 228 4704 {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe 113 PID 4704 wrote to memory of 228 4704 {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe 113 PID 4704 wrote to memory of 228 4704 {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe 113 PID 4704 wrote to memory of 3060 4704 {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe 114 PID 4704 wrote to memory of 3060 4704 {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe 114 PID 4704 wrote to memory of 3060 4704 {232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe 114 PID 228 wrote to memory of 3104 228 {1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe 116 PID 228 wrote to memory of 3104 228 {1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe 116 PID 228 wrote to memory of 3104 228 {1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe 116 PID 228 wrote to memory of 4656 228 {1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\{F266DB23-2B74-4366-9E45-BAAC25CA166A}.exeC:\Windows\{F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\{77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exeC:\Windows\{77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\{3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exeC:\Windows\{3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\{1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exeC:\Windows\{1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\{E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exeC:\Windows\{E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\{3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exeC:\Windows\{3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\{DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exeC:\Windows\{DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\{3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exeC:\Windows\{3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\{232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exeC:\Windows\{232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\{1E6A9649-9B9B-4678-B73E-65452D3743C9}.exeC:\Windows\{1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1E6A9~1.EXE > nul12⤵PID:4656
-
-
C:\Windows\{3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exeC:\Windows\{3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3104 -
C:\Windows\{AC64D56D-B399-4e4c-8B8E-FBAE45626CE6}.exeC:\Windows\{AC64D56D-B399-4e4c-8B8E-FBAE45626CE6}.exe13⤵
- Executes dropped EXE
PID:744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3EB61~1.EXE > nul13⤵PID:1936
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{232D7~1.EXE > nul11⤵PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3D31C~1.EXE > nul10⤵PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DA3D4~1.EXE > nul9⤵PID:928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3A4E6~1.EXE > nul8⤵PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E4979~1.EXE > nul7⤵PID:688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1026B~1.EXE > nul6⤵PID:3352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3895E~1.EXE > nul5⤵PID:3556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{77BBB~1.EXE > nul4⤵PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F266D~1.EXE > nul3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD53e36ecd92451e307baeae7b6b8fb07ef
SHA1123bfa443f77bfde3c15916ffc6fb8b695691f6e
SHA25652492fd82c5b81bc8be2f1547ace31cf28258b8c2aba83a0b0078b8fef884339
SHA512360ae5d80938dd9dc7c71a8f6db33f13e81ac1041fe986fa6accd1a8b9993b313404afe9cf1021059924b8369149c57e407895713e772f3f3fcacbfab000b304
-
Filesize
344KB
MD5e1cd6b6e7d40fde9f0a1d4b659213e9b
SHA12c13b50c685e2bbc1c120a9f99207003ab9634e3
SHA256481cb89e020e16d5f2882a779d805045bc6242802e8c5b4c5f6d7e21d799fc5a
SHA512c70a1dea1831d4a59f1089156e5b3979900c169ae82a02f02f2a087782bc3a4781c8aee18ad5b5dfb7a99ccc8b90d334cc6e1da621e359b2718100c75c941048
-
Filesize
344KB
MD5d6f674d8b523fe00544101181c35d5b9
SHA16b6ca1f3eb50e60d7726623e27862788eaff8f34
SHA256027899949411867ed89758ea042ead3c9080fdeb558cedd14f2461c5b3940381
SHA512c7ed6a2bbac055eab204d06faf8df9c1e6ed6f2101c03f178ad5b1f7536f5498bf511a1ff3dfc6d39497a119753bb44d8bc53b27e0677a5175b9286b4c83b97e
-
Filesize
344KB
MD5952f9f90566f5210d1ee8a65189bdfe1
SHA1e8a1c1dc022ea6ad248179cf7df3a215d63b8f62
SHA25638d84a713fe210cf74dbcd6774d80244ca1997b2994b011013151851463bcfd9
SHA51262bb2d94a5930112990858c26357d381a9c8c8d86887fee9c9c07983ed78475a808e384044a1621eaff52d068bde00a6e641cbc67af41b8058051f0d4fbc4490
-
Filesize
344KB
MD56a588c18806ef95b02396a50da82aef1
SHA159f6090eabe36a7c587398697666b838273eea41
SHA256ef6b4280a944d88e31d00cec8fd33d841f5804a042d4a5e7497aeecd152d73d9
SHA51224a0fa6aa8e69ec6970f92344c3ca35cc1fae425aa69b1edd46fddc5ca722e2ae6b1420a24a6abb6065e2b4ce423c085147e8ae9fde34027869c485ebf493abf
-
Filesize
344KB
MD55846767be6a5f495a4c04aa3c9128396
SHA1b0c449ad07d00b6a97bf3469966cfd037990f0e6
SHA2568d5a0dd41cdcde80c048dd899f647630956bcc2c126b83a16cc231dce7ad5773
SHA512ae42e27f07e33ba93073ad65931f60305287bebfb12aa56de04468b6052ed4da7dd001dee27de41b24e748056a5b5af11480d9a60610bfbe344a9bb651a7afbe
-
Filesize
344KB
MD5fb6b264b525654765b2c1f457e0d8022
SHA19010302e223b6e40355e46aec50a6bcefb137dc6
SHA2562a3822e92a250d4255934523de64c7976ddf2d742dff8aa8f967b29e579fcd12
SHA512af141c3a7c6b4ade5cf007d7ac100a8c9c4886a6a650d8025fca21543011ec5e12b3b0173e689af0be3123248b1b06060549e20f89387359a7279edb911d58ea
-
Filesize
344KB
MD5361f7c5f29f06de7c37ed5c15d54b217
SHA1d7f67bfb0cda66d542953efdaf48645ab8c29b45
SHA25663638b334c9bf5d21cbca2894a5821ff06cba02ef863871e32af9faf7916e739
SHA5129e22991a053c299883761efdf814e8b1ddbbb6d9033eb615d07b5a7a18dc4fba229bbf89acd1e5c96003bf6bc2e3e1b840cbdadfef55afbcafa709e0a2c9b5bf
-
Filesize
344KB
MD515b7c1d914c732aeed202ed52537dddc
SHA101a27d030a63469a1f6f6f821604c225981b927d
SHA2560a60c76ca9959b08917e6aa304223f6f5bc6c0274f6fde9648d14e8b8dd48455
SHA512dff6a195bfd8f94892e43bf9edc39b28298ea47059196e04b4460da7013713a6691074ee00de7c850cf95eb9c5199d2bed41e2ed08d26ca85948834a365b8e6a
-
Filesize
344KB
MD511fe30d639e4e7d16b8f03aabddcf3ee
SHA17bfa864f94ba6e30fb72fe1d6e543cd19fc10cf1
SHA2567be155114e1604727b9a3fe239ed8361040578d178b404f7a04d0cab2eccde14
SHA512c45b6676de7656f8dc358d79471269e741bdb3007166e1b5cf95866598fabf807f91fb07e6a32acc8e751aca3dda4e444f5a19d9bd2046d5c8a7f6f9ee30518e
-
Filesize
344KB
MD5993af31ebb4f83b933b8070d3e3720b1
SHA14541eccb0b041d1158c9e45b621740443137c99f
SHA256e9fba739acf5f6ded67d072623e0b5201cf4149b55dd9cd72d35d038fdc626bb
SHA512826f29a87cce002b3d615724776ffb251342fd9f2a05982f2752ece7d8179b2d1026de2bf801d9d87191af38c81a5df152a67960ca1b73a483f8c5c71b276c03
-
Filesize
344KB
MD5ed34b8c59301cb61ab541173682f6cd6
SHA11ac377ebc438f99eafa5eb45c24f1510f4c7c6ad
SHA256f70912244a0d5f26e38e188a02b75e69c20604614c89e0126b9b709954747d95
SHA5122b8ff540312b217f58ed40148c5371e3cea633db92926f38acfb16a23d2c858e24659ffc52e6ee4c2c63dc9355e0e07d63c8302a9dabcddbb731a51e139a2368