Analysis
-
max time kernel
152s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe
-
Size
168KB
-
MD5
a30d8203a447e8dccb64619da78f857a
-
SHA1
7f366fe236b041ef78db70420c1163db42c8135f
-
SHA256
0e18928295cb9fc9912d5806916a1611b8b4dc442d5c98f0a396e4a0b08131fa
-
SHA512
deaa73d6799cf217fc7793a5364669e4a940b5ac85fc9913d3c60c7beb0b72058137a1fe98294094486812cf7c90b4f941409de1f0352bc6e6b53bdbea2db79e
-
SSDEEP
1536:1EGh0oOlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oOlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 13 IoCs
resource yara_rule behavioral2/files/0x0004000000022ea1-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023234-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023239-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000230ff-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023239-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000230ff-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023239-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a0000000230ff-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000022f70-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0006000000022e9f-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c000000022f70-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000022e9f-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d000000022f70-50.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C} {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4} {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F4171EF-DA54-44aa-BF69-8940E82ACF39}\stubpath = "C:\\Windows\\{9F4171EF-DA54-44aa-BF69-8940E82ACF39}.exe" {6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8DF5045-C466-44c1-8BD8-2788608C948C}\stubpath = "C:\\Windows\\{A8DF5045-C466-44c1-8BD8-2788608C948C}.exe" 2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FA38EB1D-9C65-40f7-8AE0-35A744A278F8}\stubpath = "C:\\Windows\\{FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe" {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{91EF9781-A93B-44ec-B981-5BDD866BDF2E}\stubpath = "C:\\Windows\\{91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe" {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}\stubpath = "C:\\Windows\\{BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe" {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540} {BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DAE78DD3-E695-4ce9-93C0-B7003C30DBF5} {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}\stubpath = "C:\\Windows\\{FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe" {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1E3751BA-D477-4e22-B9EC-58D50472E350}\stubpath = "C:\\Windows\\{1E3751BA-D477-4e22-B9EC-58D50472E350}.exe" {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF162904-2FEE-4e94-8ABC-CDF20FC409E6} {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF162904-2FEE-4e94-8ABC-CDF20FC409E6}\stubpath = "C:\\Windows\\{CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe" {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540}\stubpath = "C:\\Windows\\{6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540}.exe" {BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FED47A5-0C04-40b8-B40B-A16F5C06BE35} {9F4171EF-DA54-44aa-BF69-8940E82ACF39}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6D162634-6DFF-4d1d-982A-CADA0EBF7897}\stubpath = "C:\\Windows\\{6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe" {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}\stubpath = "C:\\Windows\\{DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe" {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1E3751BA-D477-4e22-B9EC-58D50472E350} {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8DF5045-C466-44c1-8BD8-2788608C948C} 2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FA38EB1D-9C65-40f7-8AE0-35A744A278F8} {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6D162634-6DFF-4d1d-982A-CADA0EBF7897} {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{91EF9781-A93B-44ec-B981-5BDD866BDF2E} {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FED47A5-0C04-40b8-B40B-A16F5C06BE35}\stubpath = "C:\\Windows\\{4FED47A5-0C04-40b8-B40B-A16F5C06BE35}.exe" {9F4171EF-DA54-44aa-BF69-8940E82ACF39}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0B4E0C05-3367-41d4-A6FB-458F75C6E493} {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0B4E0C05-3367-41d4-A6FB-458F75C6E493}\stubpath = "C:\\Windows\\{0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe" {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F4171EF-DA54-44aa-BF69-8940E82ACF39} {6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540}.exe -
Executes dropped EXE 13 IoCs
pid Process 2100 {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe 3016 {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe 5068 {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe 4856 {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe 2212 {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe 4940 {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe 484 {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe 3956 {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe 4484 {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe 448 {BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe 2788 {6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540}.exe 3800 {9F4171EF-DA54-44aa-BF69-8940E82ACF39}.exe 3576 {4FED47A5-0C04-40b8-B40B-A16F5C06BE35}.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\{CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe File created C:\Windows\{91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe File created C:\Windows\{4FED47A5-0C04-40b8-B40B-A16F5C06BE35}.exe {9F4171EF-DA54-44aa-BF69-8940E82ACF39}.exe File created C:\Windows\{DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe File created C:\Windows\{9F4171EF-DA54-44aa-BF69-8940E82ACF39}.exe {6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540}.exe File created C:\Windows\{1E3751BA-D477-4e22-B9EC-58D50472E350}.exe {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe File created C:\Windows\{FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe File created C:\Windows\{BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe File created C:\Windows\{FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe File created C:\Windows\{6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe File created C:\Windows\{0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe File created C:\Windows\{6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540}.exe {BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe File created C:\Windows\{A8DF5045-C466-44c1-8BD8-2788608C948C}.exe 2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1424 2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe Token: SeIncBasePriorityPrivilege 2100 {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe Token: SeIncBasePriorityPrivilege 3016 {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe Token: SeIncBasePriorityPrivilege 5068 {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe Token: SeIncBasePriorityPrivilege 4856 {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe Token: SeIncBasePriorityPrivilege 2212 {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe Token: SeIncBasePriorityPrivilege 4940 {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe Token: SeIncBasePriorityPrivilege 484 {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe Token: SeIncBasePriorityPrivilege 3956 {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe Token: SeIncBasePriorityPrivilege 4484 {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe Token: SeIncBasePriorityPrivilege 448 {BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe Token: SeIncBasePriorityPrivilege 2788 {6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540}.exe Token: SeIncBasePriorityPrivilege 3800 {9F4171EF-DA54-44aa-BF69-8940E82ACF39}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2100 1424 2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe 96 PID 1424 wrote to memory of 2100 1424 2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe 96 PID 1424 wrote to memory of 2100 1424 2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe 96 PID 1424 wrote to memory of 1624 1424 2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe 97 PID 1424 wrote to memory of 1624 1424 2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe 97 PID 1424 wrote to memory of 1624 1424 2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe 97 PID 2100 wrote to memory of 3016 2100 {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe 100 PID 2100 wrote to memory of 3016 2100 {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe 100 PID 2100 wrote to memory of 3016 2100 {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe 100 PID 2100 wrote to memory of 2796 2100 {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe 101 PID 2100 wrote to memory of 2796 2100 {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe 101 PID 2100 wrote to memory of 2796 2100 {A8DF5045-C466-44c1-8BD8-2788608C948C}.exe 101 PID 3016 wrote to memory of 5068 3016 {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe 103 PID 3016 wrote to memory of 5068 3016 {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe 103 PID 3016 wrote to memory of 5068 3016 {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe 103 PID 3016 wrote to memory of 4324 3016 {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe 104 PID 3016 wrote to memory of 4324 3016 {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe 104 PID 3016 wrote to memory of 4324 3016 {FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe 104 PID 5068 wrote to memory of 4856 5068 {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe 107 PID 5068 wrote to memory of 4856 5068 {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe 107 PID 5068 wrote to memory of 4856 5068 {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe 107 PID 5068 wrote to memory of 32 5068 {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe 106 PID 5068 wrote to memory of 32 5068 {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe 106 PID 5068 wrote to memory of 32 5068 {6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe 106 PID 4856 wrote to memory of 2212 4856 {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe 108 PID 4856 wrote to memory of 2212 4856 {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe 108 PID 4856 wrote to memory of 2212 4856 {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe 108 PID 4856 wrote to memory of 1132 4856 {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe 109 PID 4856 wrote to memory of 1132 4856 {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe 109 PID 4856 wrote to memory of 1132 4856 {FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe 109 PID 2212 wrote to memory of 4940 2212 {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe 110 PID 2212 wrote to memory of 4940 2212 {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe 110 PID 2212 wrote to memory of 4940 2212 {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe 110 PID 2212 wrote to memory of 380 2212 {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe 111 PID 2212 wrote to memory of 380 2212 {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe 111 PID 2212 wrote to memory of 380 2212 {DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe 111 PID 4940 wrote to memory of 484 4940 {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe 112 PID 4940 wrote to memory of 484 4940 {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe 112 PID 4940 wrote to memory of 484 4940 {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe 112 PID 4940 wrote to memory of 3588 4940 {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe 113 PID 4940 wrote to memory of 3588 4940 {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe 113 PID 4940 wrote to memory of 3588 4940 {1E3751BA-D477-4e22-B9EC-58D50472E350}.exe 113 PID 484 wrote to memory of 3956 484 {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe 114 PID 484 wrote to memory of 3956 484 {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe 114 PID 484 wrote to memory of 3956 484 {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe 114 PID 484 wrote to memory of 316 484 {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe 115 PID 484 wrote to memory of 316 484 {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe 115 PID 484 wrote to memory of 316 484 {CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe 115 PID 3956 wrote to memory of 4484 3956 {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe 120 PID 3956 wrote to memory of 4484 3956 {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe 120 PID 3956 wrote to memory of 4484 3956 {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe 120 PID 3956 wrote to memory of 2972 3956 {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe 119 PID 3956 wrote to memory of 2972 3956 {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe 119 PID 3956 wrote to memory of 2972 3956 {91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe 119 PID 4484 wrote to memory of 448 4484 {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe 121 PID 4484 wrote to memory of 448 4484 {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe 121 PID 4484 wrote to memory of 448 4484 {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe 121 PID 4484 wrote to memory of 2464 4484 {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe 122 PID 4484 wrote to memory of 2464 4484 {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe 122 PID 4484 wrote to memory of 2464 4484 {0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe 122 PID 448 wrote to memory of 2788 448 {BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe 123 PID 448 wrote to memory of 2788 448 {BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe 123 PID 448 wrote to memory of 2788 448 {BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe 123 PID 448 wrote to memory of 2180 448 {BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-29_a30d8203a447e8dccb64619da78f857a_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\{A8DF5045-C466-44c1-8BD8-2788608C948C}.exeC:\Windows\{A8DF5045-C466-44c1-8BD8-2788608C948C}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\{FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exeC:\Windows\{FA38EB1D-9C65-40f7-8AE0-35A744A278F8}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\{6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exeC:\Windows\{6D162634-6DFF-4d1d-982A-CADA0EBF7897}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6D162~1.EXE > nul5⤵PID:32
-
-
C:\Windows\{FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exeC:\Windows\{FB8D4816-4DB6-45a4-ACD2-5EC298EEE21C}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\{DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exeC:\Windows\{DAE78DD3-E695-4ce9-93C0-B7003C30DBF5}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\{1E3751BA-D477-4e22-B9EC-58D50472E350}.exeC:\Windows\{1E3751BA-D477-4e22-B9EC-58D50472E350}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\{CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exeC:\Windows\{CF162904-2FEE-4e94-8ABC-CDF20FC409E6}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\{91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exeC:\Windows\{91EF9781-A93B-44ec-B981-5BDD866BDF2E}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{91EF9~1.EXE > nul10⤵PID:2972
-
-
C:\Windows\{0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exeC:\Windows\{0B4E0C05-3367-41d4-A6FB-458F75C6E493}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\{BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exeC:\Windows\{BD06F96E-D1D7-49d7-A1D8-5F3CF92E8CD4}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\{6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540}.exeC:\Windows\{6C0BBD9F-A85F-4cb6-B8CC-398FC4B8E540}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C0BB~1.EXE > nul13⤵PID:3120
-
-
C:\Windows\{9F4171EF-DA54-44aa-BF69-8940E82ACF39}.exeC:\Windows\{9F4171EF-DA54-44aa-BF69-8940E82ACF39}.exe13⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3800 -
C:\Windows\{4FED47A5-0C04-40b8-B40B-A16F5C06BE35}.exeC:\Windows\{4FED47A5-0C04-40b8-B40B-A16F5C06BE35}.exe14⤵
- Executes dropped EXE
PID:3576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9F417~1.EXE > nul14⤵PID:3792
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BD06F~1.EXE > nul12⤵PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0B4E0~1.EXE > nul11⤵PID:2464
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CF162~1.EXE > nul9⤵PID:316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1E375~1.EXE > nul8⤵PID:3588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DAE78~1.EXE > nul7⤵PID:380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FB8D4~1.EXE > nul6⤵PID:1132
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FA38E~1.EXE > nul4⤵PID:4324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8DF5~1.EXE > nul3⤵PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:4252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a76693e6fb80b8fc71cc740d8d79d38b
SHA13007b0663a83df04e782ab612439f8bce7746751
SHA256274219c78d09c6b1bc44d8ea6990b846ed13eb869e148898e22db099d3f22a0b
SHA5124b538281b823b6f38bbb3fad26a0fb297e1f4db506b27bda258a8b6c335d252a7449f2c4877cbf9d160ce6a981cb41aa528aa0ab45969449315ece0da6555330
-
Filesize
168KB
MD5d4a215562d2b1cd0f898424d50feac5d
SHA1477525a11874e33e44729902b5f3c2faaeaefbff
SHA25622d73e056e02f570278389600be5c88db58d1b301b5d443c833ebd18ea725705
SHA512d7f4afacb8adc0654b6185bd461bf9fe0c59060d393d1fecb4e26543741cd4b2c8cecdb67300e3e562a38f5d915ff27cb5db8b39301b03524bbb39cdf24ec2e7
-
Filesize
168KB
MD56966ddf4a8da09e272ea3e5cdf34ff37
SHA16adb5b44044ed4e03ffcc8b027e17c16a523b175
SHA2562d6214eef9ed28c7bbd24e8dedfb29794c3c9bcb61133ff16946ef437223c968
SHA512743d874421cb72c029a8f57d4477d31f7f6a978569a050e2ce542b2441f23f4758134dc004d379c4025b10d5bf177dc3b717d81e24f9ea8b130c7e433086a92e
-
Filesize
168KB
MD53e2debb2914299706dab3e2ec4d5f0f0
SHA1f82ed32250bdcd157d704fb711880ee645e4ee90
SHA25629c3bee05164703651494571db104c3f526fb06a9ac6c59fc7b38476accdff58
SHA512af83dedebbadf10b03eae4a7ce45431bba07e164601a312983656bc7fcea7f4fa185fb70f0260b44307fb1f61ef5857c47be89fb3bcde1504204d6840bed6c2b
-
Filesize
168KB
MD520d8f4f04576223a26d784c7d6dc88d6
SHA1779c03ee39dde8619f02cb26d8b49e885e12d3a9
SHA2569a5212aece058dd0ff69a8d71f064c61a017a7d520e25b40c970f2de09c674a2
SHA51214bbf01900237d0d0327a0a2e054d995ecf16791ae2e700d1bf13087228cc74531c3191813e29fb101c582e0c2543dea1308b8fcd9bc5f1adf711aec0a155487
-
Filesize
168KB
MD599dd5c6d51ece639d3300e3c4f75a80b
SHA1703c57bf3cfd08db60e09b24c801e12461936439
SHA256b1b15179dfd5165b825c09d584c8e5dc380b26d8533e8b2dbae4441dc57f4b99
SHA512361245a5ee46bdd66ce62452e312ae42c981f46c13392b3edb8f8b7d5d5c1b1c410eca7a9d600de1dab3f8591550e419ad3cb03a3b6325b1776ad87bd799321d
-
Filesize
168KB
MD57bb813c25e5eb5686b6a7d2767c9a398
SHA13a6fabd6e2bf9b40720790c375fc05aa6b9a9e85
SHA25647b922d297f4d78b238676cf3e46783b69b0ab022d2f4b9ca200b7a9a2ef1f03
SHA5124346ecb7d2fa4ef260aeb93cc256920952b63f26f0a888a3cb1b7cc07b3cb356b6bc0e5efd5a828260a1d4da8cda468f41661bdcb1d84879d54062b674a99312
-
Filesize
168KB
MD5b4d2cc680b6fb4f010b7785e58e32773
SHA11e254a68bb318bec3f2c9418c561f85167f66279
SHA256a536fe581ad9fc72dfb905056599a4b33d229260c99df48e68e250aa28828fd7
SHA512aad5b25b08d975feeaac99dd082928d8da769563f4fe13f5968aab635aa6229e0f35d78a56524601826dbe469550cf317caf3ca67c24d040c0b66dbc8217c1b4
-
Filesize
168KB
MD5443f6c12ed2dd73131672c91e4e3ea8f
SHA1a183b6abb4151fe39cb398ee851920b1b4bf8b57
SHA2569fb1fccfa769d954088f7ce97df278e03655dad10912f88caf1fef9292affab9
SHA512b6939c5a39673e8ab2adab537b32c0559c540380d4f8ddd55c87fc8b1e57ee98c4e0e6e9c41feed3004ef63e3ac5f81b2b71b6321795cb36f05245674210fabc
-
Filesize
168KB
MD5e6126e2189fd077597ddaf3e71108cdc
SHA12c59b69c1f465c8fdf63b2f2577534adcc1c3865
SHA2565b6fa05c8a2beda1d1c678e111fe1bd9d03d326c4db1b1ae0243b8642bc9e5b7
SHA5123a844ab0ce70967b9d96ec66080ec878c478616e60027f2e4a37600d02208a708d2e7890431bacec6fbeaca83cf16423bed90920a0a51e9ccc979505c740f576
-
Filesize
168KB
MD51c92587004dfcecfb48df5125b2a40e9
SHA16fed4726eeed9d163428580700797dc1aa841e87
SHA256cbe1f1feabd9e2e447394b288cfa7e3cce4ef9442a50a624d1b5c20e06918e85
SHA51281a2203175394012315c0e6958bb218e71f1d069096a2c39b80dff6d183ee365ebd0873d9f95743d99f5b8521336bf444a6973b5a2f20fe2b2b7e503bb68d4a0
-
Filesize
168KB
MD543ba41a36b6c5c6a9559125d720c0b5b
SHA123877bd4f04a7ddafaeee0aa329f7a50b2ce0fb3
SHA256c3cd9b7675b269e9efd017ed1458a42f8487cef2f03d5e2349f00a2c04707308
SHA512ac6281086868ced2448f7faf1e300f637938c1565fdde103e49220af358f112cc403ab449f2159948a3e4dc1bd5714b265578145867de7c04b11493090bae993
-
Filesize
168KB
MD5f85f8e2bca90c0a55dd95a1ae81a122e
SHA156535291b17ecbceb64ef3e08b91a57ca5a3fba3
SHA25655656bcfbcae8236799d6512e69627d51df0f7ee5b52e00b75fecc419417b5f8
SHA5120acc5d8f1084a5900f9075c66afad6d0c7c44073d2dba2bb6514929f0e7769c12bba95218da5cf93190f6629479f9424fa362736f5685bf3f70393db52be2987