Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe
-
Size
344KB
-
MD5
35ce086511f910175549a32949c56ac3
-
SHA1
08571b7d3b1a4198a19edbe6c49804bad2bf519f
-
SHA256
d349ee6d0de9f06fe8699b90f7ad82a93ade497bd3fc52642009b7b7877afca3
-
SHA512
fa5c22cb0a57130bae13b001abe29d766eae90ee6b37bd7176db2106b5f1f4a8c05875cdd4c678e53a2b6fb359c9d700cc3a3e38706d467700c2ad94db87327d
-
SSDEEP
3072:mEGh0ohlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG3lqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x00070000000231d6-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000231e5-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000231ea-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000016923-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000231ea-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000016923-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00130000000231ed-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000231ff-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b0000000230fb-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000016976-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c0000000230fb-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d0000000230fd-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC4152DC-9043-4dd4-84AA-26B7CCE97300}\stubpath = "C:\\Windows\\{EC4152DC-9043-4dd4-84AA-26B7CCE97300}.exe" {567822CD-63DE-4790-87B0-60A4F530A544}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}\stubpath = "C:\\Windows\\{C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe" 2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7} {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}\stubpath = "C:\\Windows\\{D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe" {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C567AB3F-DAF5-4ed4-951E-1310CCC22026} {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F855E90-5904-47f3-A021-6DCE4CABEA38} {9306E198-2C21-459d-8253-602645E07C6B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F855E90-5904-47f3-A021-6DCE4CABEA38}\stubpath = "C:\\Windows\\{3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe" {9306E198-2C21-459d-8253-602645E07C6B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C818929C-80D7-438e-95D2-A45AF910C183} {EC4152DC-9043-4dd4-84AA-26B7CCE97300}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C818929C-80D7-438e-95D2-A45AF910C183}\stubpath = "C:\\Windows\\{C818929C-80D7-438e-95D2-A45AF910C183}.exe" {EC4152DC-9043-4dd4-84AA-26B7CCE97300}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C9FF418F-FA64-43a8-BAEB-C4D61A4039CE} 2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F} {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151} {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}\stubpath = "C:\\Windows\\{C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe" {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9306E198-2C21-459d-8253-602645E07C6B} {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9306E198-2C21-459d-8253-602645E07C6B}\stubpath = "C:\\Windows\\{9306E198-2C21-459d-8253-602645E07C6B}.exe" {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{567822CD-63DE-4790-87B0-60A4F530A544} {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC4152DC-9043-4dd4-84AA-26B7CCE97300} {567822CD-63DE-4790-87B0-60A4F530A544}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC6EAC88-1E1C-49cd-BD3C-26B284B59267} {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2FFE8126-F7F0-477c-9040-6525D2A48B22} {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}\stubpath = "C:\\Windows\\{E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe" {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C567AB3F-DAF5-4ed4-951E-1310CCC22026}\stubpath = "C:\\Windows\\{C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe" {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{567822CD-63DE-4790-87B0-60A4F530A544}\stubpath = "C:\\Windows\\{567822CD-63DE-4790-87B0-60A4F530A544}.exe" {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC6EAC88-1E1C-49cd-BD3C-26B284B59267}\stubpath = "C:\\Windows\\{EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe" {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2FFE8126-F7F0-477c-9040-6525D2A48B22}\stubpath = "C:\\Windows\\{2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe" {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe -
Executes dropped EXE 12 IoCs
pid Process 3120 {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe 3692 {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe 3448 {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe 3540 {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe 1568 {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe 1296 {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe 2472 {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe 2088 {9306E198-2C21-459d-8253-602645E07C6B}.exe 5112 {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe 3848 {567822CD-63DE-4790-87B0-60A4F530A544}.exe 2468 {EC4152DC-9043-4dd4-84AA-26B7CCE97300}.exe 3236 {C818929C-80D7-438e-95D2-A45AF910C183}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{9306E198-2C21-459d-8253-602645E07C6B}.exe {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe File created C:\Windows\{EC4152DC-9043-4dd4-84AA-26B7CCE97300}.exe {567822CD-63DE-4790-87B0-60A4F530A544}.exe File created C:\Windows\{C818929C-80D7-438e-95D2-A45AF910C183}.exe {EC4152DC-9043-4dd4-84AA-26B7CCE97300}.exe File created C:\Windows\{C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe 2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe File created C:\Windows\{D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe File created C:\Windows\{C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe File created C:\Windows\{E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe File created C:\Windows\{3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe {9306E198-2C21-459d-8253-602645E07C6B}.exe File created C:\Windows\{567822CD-63DE-4790-87B0-60A4F530A544}.exe {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe File created C:\Windows\{EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe File created C:\Windows\{2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe File created C:\Windows\{C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4416 2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe Token: SeIncBasePriorityPrivilege 3120 {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe Token: SeIncBasePriorityPrivilege 3692 {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe Token: SeIncBasePriorityPrivilege 3448 {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe Token: SeIncBasePriorityPrivilege 3540 {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe Token: SeIncBasePriorityPrivilege 1568 {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe Token: SeIncBasePriorityPrivilege 1296 {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe Token: SeIncBasePriorityPrivilege 2472 {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe Token: SeIncBasePriorityPrivilege 2088 {9306E198-2C21-459d-8253-602645E07C6B}.exe Token: SeIncBasePriorityPrivilege 5112 {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe Token: SeIncBasePriorityPrivilege 3848 {567822CD-63DE-4790-87B0-60A4F530A544}.exe Token: SeIncBasePriorityPrivilege 2468 {EC4152DC-9043-4dd4-84AA-26B7CCE97300}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3120 4416 2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe 94 PID 4416 wrote to memory of 3120 4416 2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe 94 PID 4416 wrote to memory of 3120 4416 2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe 94 PID 4416 wrote to memory of 840 4416 2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe 95 PID 4416 wrote to memory of 840 4416 2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe 95 PID 4416 wrote to memory of 840 4416 2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe 95 PID 3120 wrote to memory of 3692 3120 {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe 99 PID 3120 wrote to memory of 3692 3120 {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe 99 PID 3120 wrote to memory of 3692 3120 {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe 99 PID 3120 wrote to memory of 848 3120 {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe 100 PID 3120 wrote to memory of 848 3120 {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe 100 PID 3120 wrote to memory of 848 3120 {C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe 100 PID 3692 wrote to memory of 3448 3692 {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe 102 PID 3692 wrote to memory of 3448 3692 {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe 102 PID 3692 wrote to memory of 3448 3692 {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe 102 PID 3692 wrote to memory of 3340 3692 {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe 103 PID 3692 wrote to memory of 3340 3692 {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe 103 PID 3692 wrote to memory of 3340 3692 {EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe 103 PID 3448 wrote to memory of 3540 3448 {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe 106 PID 3448 wrote to memory of 3540 3448 {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe 106 PID 3448 wrote to memory of 3540 3448 {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe 106 PID 3448 wrote to memory of 2052 3448 {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe 107 PID 3448 wrote to memory of 2052 3448 {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe 107 PID 3448 wrote to memory of 2052 3448 {2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe 107 PID 3540 wrote to memory of 1568 3540 {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe 108 PID 3540 wrote to memory of 1568 3540 {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe 108 PID 3540 wrote to memory of 1568 3540 {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe 108 PID 3540 wrote to memory of 2648 3540 {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe 109 PID 3540 wrote to memory of 2648 3540 {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe 109 PID 3540 wrote to memory of 2648 3540 {C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe 109 PID 1568 wrote to memory of 1296 1568 {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe 111 PID 1568 wrote to memory of 1296 1568 {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe 111 PID 1568 wrote to memory of 1296 1568 {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe 111 PID 1568 wrote to memory of 2640 1568 {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe 112 PID 1568 wrote to memory of 2640 1568 {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe 112 PID 1568 wrote to memory of 2640 1568 {E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe 112 PID 1296 wrote to memory of 2472 1296 {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe 114 PID 1296 wrote to memory of 2472 1296 {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe 114 PID 1296 wrote to memory of 2472 1296 {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe 114 PID 1296 wrote to memory of 1184 1296 {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe 115 PID 1296 wrote to memory of 1184 1296 {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe 115 PID 1296 wrote to memory of 1184 1296 {D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe 115 PID 2472 wrote to memory of 2088 2472 {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe 117 PID 2472 wrote to memory of 2088 2472 {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe 117 PID 2472 wrote to memory of 2088 2472 {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe 117 PID 2472 wrote to memory of 3920 2472 {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe 118 PID 2472 wrote to memory of 3920 2472 {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe 118 PID 2472 wrote to memory of 3920 2472 {C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe 118 PID 2088 wrote to memory of 5112 2088 {9306E198-2C21-459d-8253-602645E07C6B}.exe 125 PID 2088 wrote to memory of 5112 2088 {9306E198-2C21-459d-8253-602645E07C6B}.exe 125 PID 2088 wrote to memory of 5112 2088 {9306E198-2C21-459d-8253-602645E07C6B}.exe 125 PID 2088 wrote to memory of 4068 2088 {9306E198-2C21-459d-8253-602645E07C6B}.exe 126 PID 2088 wrote to memory of 4068 2088 {9306E198-2C21-459d-8253-602645E07C6B}.exe 126 PID 2088 wrote to memory of 4068 2088 {9306E198-2C21-459d-8253-602645E07C6B}.exe 126 PID 5112 wrote to memory of 3848 5112 {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe 127 PID 5112 wrote to memory of 3848 5112 {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe 127 PID 5112 wrote to memory of 3848 5112 {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe 127 PID 5112 wrote to memory of 3752 5112 {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe 128 PID 5112 wrote to memory of 3752 5112 {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe 128 PID 5112 wrote to memory of 3752 5112 {3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe 128 PID 3848 wrote to memory of 2468 3848 {567822CD-63DE-4790-87B0-60A4F530A544}.exe 129 PID 3848 wrote to memory of 2468 3848 {567822CD-63DE-4790-87B0-60A4F530A544}.exe 129 PID 3848 wrote to memory of 2468 3848 {567822CD-63DE-4790-87B0-60A4F530A544}.exe 129 PID 3848 wrote to memory of 1840 3848 {567822CD-63DE-4790-87B0-60A4F530A544}.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_35ce086511f910175549a32949c56ac3_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\{C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exeC:\Windows\{C9FF418F-FA64-43a8-BAEB-C4D61A4039CE}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\{EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exeC:\Windows\{EC6EAC88-1E1C-49cd-BD3C-26B284B59267}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\{2FFE8126-F7F0-477c-9040-6525D2A48B22}.exeC:\Windows\{2FFE8126-F7F0-477c-9040-6525D2A48B22}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\{C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exeC:\Windows\{C1FCFEDE-DCBB-4d5f-9D2C-11A1CA4EE151}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\{E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exeC:\Windows\{E09B7D99-A1DB-44da-A0C7-CD8D4A50D7D7}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\{D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exeC:\Windows\{D48B0E67-4A17-4616-9C62-BAFAEFF5AB4F}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\{C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exeC:\Windows\{C567AB3F-DAF5-4ed4-951E-1310CCC22026}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\{9306E198-2C21-459d-8253-602645E07C6B}.exeC:\Windows\{9306E198-2C21-459d-8253-602645E07C6B}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\{3F855E90-5904-47f3-A021-6DCE4CABEA38}.exeC:\Windows\{3F855E90-5904-47f3-A021-6DCE4CABEA38}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\{567822CD-63DE-4790-87B0-60A4F530A544}.exeC:\Windows\{567822CD-63DE-4790-87B0-60A4F530A544}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\{EC4152DC-9043-4dd4-84AA-26B7CCE97300}.exeC:\Windows\{EC4152DC-9043-4dd4-84AA-26B7CCE97300}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2468 -
C:\Windows\{C818929C-80D7-438e-95D2-A45AF910C183}.exeC:\Windows\{C818929C-80D7-438e-95D2-A45AF910C183}.exe13⤵
- Executes dropped EXE
PID:3236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EC415~1.EXE > nul13⤵PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56782~1.EXE > nul12⤵PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3F855~1.EXE > nul11⤵PID:3752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9306E~1.EXE > nul10⤵PID:4068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C567A~1.EXE > nul9⤵PID:3920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D48B0~1.EXE > nul8⤵PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E09B7~1.EXE > nul7⤵PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C1FCF~1.EXE > nul6⤵PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2FFE8~1.EXE > nul5⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EC6EA~1.EXE > nul4⤵PID:3340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C9FF4~1.EXE > nul3⤵PID:848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5d14688898e8e2548bc31f32160d9d4af
SHA1fe28e6623e230c9b3a43b1c6cc69d33460113b86
SHA2564d6bdfd8331d1b6d327ea782dde833be797cc13f4f5d121fac2433f1f52a21a2
SHA5129c07e398b55eb5fea8ee7e8bd3bd5494a77369ae1eeb255862d067a0da86d7493f89b46d35a630890efc2ac7d1cc12aadd968e206faec45403a3e5326eaa60ad
-
Filesize
344KB
MD50ddefab320f9ce9acd4a40490493559d
SHA114428c558c119657cc5f27e16616fb3c1fb4d0b9
SHA2565fb29262bd9efa400730c1973c9fb8fe9f74026b4643e86db9b1035127de4c20
SHA51255ce0a08c79bc734da74c91d6078625a66ff56e1eddb94d72854fbf51ec50f2c2628a0ee90d241ca3b8c6604e96806313eb5356e21a199c1b3e31ac18a655552
-
Filesize
344KB
MD59c3f70e6323b1807cfa535980218891d
SHA1fbcccdec877c3010908972b53c947f817032e4b7
SHA256b749eb03cb8e5981f4080fbe2228fe6afdb604c0840d7f38eb46afda234c22fe
SHA5123ad04192008cd5fa3fcc894250c5311d5017b42619d43e76e191966e67f4c8221e1ac29180d5d0ab5ae8e1382fa86fb019f93fdd012237b9f38593efa7c1a38d
-
Filesize
344KB
MD542eac9c8c10c78b8f049d5aa7fa94c02
SHA17784821b4b154b97b8f16c05bc26d726aab83410
SHA2565670c87bd5ab8059ac86473c5b6aefe78427ef753af20d2da0594dcf96ff409d
SHA512d5ebf61ff3434187c8bbdc4057d0853b309c0db5d4e06bf08810d6cf1c94a7f6945612a940580c81c895dafdda84ca5d420bf08e36cbc4cc11594c02fd59e8f6
-
Filesize
344KB
MD56f7ae802a2dcbcd7c9319b1b993befa5
SHA11785801bc6b4bf53b555888b096046d117d47265
SHA2563b4eb3d53c790349d4c208cd11b5ef11e9e18d7bbd80c032af710ca3b2f1e035
SHA512cd289e455a5a81626d6d1f45e60e2800f45a9f58b71e76453977e101f9a9621ba2f2f4d98df25b1abd50fa363c651e4a49c9d8fa7400dacfedcf24eb809ee4ef
-
Filesize
344KB
MD5c29464b16fb593312bae7f887fa4d79e
SHA14abf236aa1f5f3477ae1930791dd384f87f677c9
SHA256fcc7f6e080f0e03ae3680ac8ede8164332c9590e7a983e79f9d8def747000115
SHA5123170b441292d6077153b3aef0d542ceb5343565ad45928ae17e341f9bd464230cb2bb264ab94794ea0a736b7909a28ee6ce832719b9ee8199da1981e85037e9f
-
Filesize
344KB
MD5e43f190872f81caccd2ca555443caa0f
SHA154dfaebe155ae3a4b2a1ea05664a913ff8190b79
SHA25614cab142b469898e0b4ae1c49025708ea98fc1380b48250ad2f26e8ce4b50aef
SHA5123133b32c125b9ca51462286240a76a4deac033344b1826281de3e811563027c9c5178f6a874ac57b0b6b714d1ba9673f4d9197e755b83897d35075f9da94eeab
-
Filesize
344KB
MD56209e74ec664b05b914eea92f81d8d16
SHA10c029d074cff9782ebf6104399f63c38d4fb3f94
SHA2564690b19b51d09e360cbd331087307e58bf7ebd439b77fb6ccb6e7b034b2ca46f
SHA5129eaf880c026db3d1e7e84b1380f510a0c07637f53d375600dd857dd8d6368c14251842b276aad8636527e3a54f5be30456ffc2fb9c82a0da855cca0dc55f1e3f
-
Filesize
344KB
MD5829bf9f74572478d8c085bc6fedd647b
SHA1011d6d7c4a4aeaf28db8a273b43107a3af307f26
SHA256712809c5bfc545ecb1246c233a645f7cc90905225231a1563618f71b430dc3e6
SHA512eb20ab99dae9bd5b9bcaaff841195246699705f75471f47e5301ef054d561389aae1f01f909cd3b2e6d1101afdb71f5733b8c77a12dc6abb28bfa6362c2df280
-
Filesize
344KB
MD515d52be6f20be77c905d11f238e82fab
SHA11e8b96e67f20d356af085adaf457e3390bc124a4
SHA2561dd9624f333ed789f88293e39ae54d87ba4322362d7b7457ec2636819a7ca64a
SHA512a77259ef3670567839af11fb710da8f7df144fe10b0b8c7adbb7256ec948c27f822e251ee9f378acd5d50dccf5a949a94f8553396bb9d601647be81a88fa1835
-
Filesize
344KB
MD52c7a2ea7a8cec1f92b5f60f867743f13
SHA19891d553cf8037f184d2ee97c7153144cb7b1d5f
SHA25608e3c4e12029587eaca5eea1c9928893877d9f79dc8da754c17902ab0f16bc3f
SHA512d1f8a5a5281ebd23401e48aac1bd1b7ef11a939f227594baea4b7f071a699c30a81a5e9afbff398d75323871e8bcd60a20602ffc872889d67466896027a441ca
-
Filesize
344KB
MD5220465f005cc716f8f1142b0dcf98551
SHA134711c64c14809ed8e8931bd855a3f21c066c2c4
SHA2563ad579e33bffc7c72ed8e1f3c675d854111728bc39d1577b7f47b682c8b5c2b9
SHA512cbe91b7e5cbd0afa36faf33aad8ce0120e3a098cc9a16944006e3b0ac3dea13fce624b98267759245d67018544fcb3436dc12056cd22e92409e83a88bcc7e623