Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 12:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe
-
Size
168KB
-
MD5
415348c803d65dc7122c9d0d8a5e7939
-
SHA1
0c0a8346560e6e83767229c07551af77e626deba
-
SHA256
5fd9d10f207a56c1b22d90ab8f51ff5d47f72675eabdd79ff66d751ecf9fa524
-
SHA512
dea35bf970ff8e0fcc817da68a45c17388b993895cb3e486e6e3f321c9c0cd721daac9bce565c68aad21b4e99767a0540260c50814e294b326ed234388659843
-
SSDEEP
1536:1EGh0omlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0omlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 13 IoCs
resource yara_rule behavioral2/files/0x0003000000022ea1-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023267-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002326e-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002311c-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002326e-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002311c-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b00000002326e-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a00000002311c-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a00000002311c-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000022db1-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000022d09-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000022d0c-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000022d09-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{446026A6-7F87-41c7-90CA-48F01CC98917} {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{446026A6-7F87-41c7-90CA-48F01CC98917}\stubpath = "C:\\Windows\\{446026A6-7F87-41c7-90CA-48F01CC98917}.exe" {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}\stubpath = "C:\\Windows\\{F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe" {446026A6-7F87-41c7-90CA-48F01CC98917}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D14F0934-6B8E-4b85-9960-B15B7ED88DC7}\stubpath = "C:\\Windows\\{D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe" {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{303BAF41-C726-44a9-ABBC-B0FE88F0F64C} {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C101C9C7-E770-4941-BB24-A0DFDE97F3EF}\stubpath = "C:\\Windows\\{C101C9C7-E770-4941-BB24-A0DFDE97F3EF}.exe" {80582241-C158-46e8-839E-2AE4FF0469F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}\stubpath = "C:\\Windows\\{FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe" {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF} {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}\stubpath = "C:\\Windows\\{40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe" {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{303BAF41-C726-44a9-ABBC-B0FE88F0F64C}\stubpath = "C:\\Windows\\{303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe" {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{80582241-C158-46e8-839E-2AE4FF0469F8} {47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C101C9C7-E770-4941-BB24-A0DFDE97F3EF} {80582241-C158-46e8-839E-2AE4FF0469F8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0E9596AA-B8EB-4a75-89F2-DEB033E6169B} 2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0E9596AA-B8EB-4a75-89F2-DEB033E6169B}\stubpath = "C:\\Windows\\{0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe" 2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FBDE2692-FE1A-4bad-80C7-8F95BA06BD14} {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{27DF855F-7805-46f4-B84F-498719DA2C8E}\stubpath = "C:\\Windows\\{27DF855F-7805-46f4-B84F-498719DA2C8E}.exe" {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D14F0934-6B8E-4b85-9960-B15B7ED88DC7} {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}\stubpath = "C:\\Windows\\{47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe" {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD36F6F9-1D7D-43f3-9C90-01227878B2FE} {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD36F6F9-1D7D-43f3-9C90-01227878B2FE}\stubpath = "C:\\Windows\\{CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe" {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{27DF855F-7805-46f4-B84F-498719DA2C8E} {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D} {446026A6-7F87-41c7-90CA-48F01CC98917}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47FC9C9F-C00E-4782-A9D5-E8C45F12DE89} {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{80582241-C158-46e8-839E-2AE4FF0469F8}\stubpath = "C:\\Windows\\{80582241-C158-46e8-839E-2AE4FF0469F8}.exe" {47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe -
Executes dropped EXE 12 IoCs
pid Process 988 {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe 1176 {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe 212 {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe 3636 {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe 4688 {446026A6-7F87-41c7-90CA-48F01CC98917}.exe 4068 {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe 1128 {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe 4944 {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe 4084 {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe 4832 {47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe 1176 {80582241-C158-46e8-839E-2AE4FF0469F8}.exe 436 {C101C9C7-E770-4941-BB24-A0DFDE97F3EF}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{446026A6-7F87-41c7-90CA-48F01CC98917}.exe {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe File created C:\Windows\{D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe File created C:\Windows\{47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe File created C:\Windows\{80582241-C158-46e8-839E-2AE4FF0469F8}.exe {47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe File created C:\Windows\{C101C9C7-E770-4941-BB24-A0DFDE97F3EF}.exe {80582241-C158-46e8-839E-2AE4FF0469F8}.exe File created C:\Windows\{CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe File created C:\Windows\{27DF855F-7805-46f4-B84F-498719DA2C8E}.exe {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe File created C:\Windows\{F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe {446026A6-7F87-41c7-90CA-48F01CC98917}.exe File created C:\Windows\{40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe File created C:\Windows\{303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe File created C:\Windows\{0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe 2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe File created C:\Windows\{FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2152 2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe Token: SeIncBasePriorityPrivilege 988 {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe Token: SeIncBasePriorityPrivilege 1176 {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe Token: SeIncBasePriorityPrivilege 212 {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe Token: SeIncBasePriorityPrivilege 3636 {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe Token: SeIncBasePriorityPrivilege 4688 {446026A6-7F87-41c7-90CA-48F01CC98917}.exe Token: SeIncBasePriorityPrivilege 4068 {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe Token: SeIncBasePriorityPrivilege 1128 {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe Token: SeIncBasePriorityPrivilege 4944 {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe Token: SeIncBasePriorityPrivilege 4084 {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe Token: SeIncBasePriorityPrivilege 4832 {47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe Token: SeIncBasePriorityPrivilege 1176 {80582241-C158-46e8-839E-2AE4FF0469F8}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 988 2152 2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe 102 PID 2152 wrote to memory of 988 2152 2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe 102 PID 2152 wrote to memory of 988 2152 2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe 102 PID 2152 wrote to memory of 3624 2152 2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe 103 PID 2152 wrote to memory of 3624 2152 2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe 103 PID 2152 wrote to memory of 3624 2152 2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe 103 PID 988 wrote to memory of 1176 988 {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe 109 PID 988 wrote to memory of 1176 988 {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe 109 PID 988 wrote to memory of 1176 988 {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe 109 PID 988 wrote to memory of 1160 988 {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe 110 PID 988 wrote to memory of 1160 988 {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe 110 PID 988 wrote to memory of 1160 988 {0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe 110 PID 1176 wrote to memory of 212 1176 {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe 112 PID 1176 wrote to memory of 212 1176 {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe 112 PID 1176 wrote to memory of 212 1176 {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe 112 PID 1176 wrote to memory of 2152 1176 {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe 113 PID 1176 wrote to memory of 2152 1176 {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe 113 PID 1176 wrote to memory of 2152 1176 {CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe 113 PID 212 wrote to memory of 3636 212 {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe 116 PID 212 wrote to memory of 3636 212 {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe 116 PID 212 wrote to memory of 3636 212 {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe 116 PID 212 wrote to memory of 2592 212 {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe 117 PID 212 wrote to memory of 2592 212 {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe 117 PID 212 wrote to memory of 2592 212 {FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe 117 PID 3636 wrote to memory of 4688 3636 {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe 118 PID 3636 wrote to memory of 4688 3636 {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe 118 PID 3636 wrote to memory of 4688 3636 {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe 118 PID 3636 wrote to memory of 1888 3636 {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe 119 PID 3636 wrote to memory of 1888 3636 {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe 119 PID 3636 wrote to memory of 1888 3636 {27DF855F-7805-46f4-B84F-498719DA2C8E}.exe 119 PID 4688 wrote to memory of 4068 4688 {446026A6-7F87-41c7-90CA-48F01CC98917}.exe 120 PID 4688 wrote to memory of 4068 4688 {446026A6-7F87-41c7-90CA-48F01CC98917}.exe 120 PID 4688 wrote to memory of 4068 4688 {446026A6-7F87-41c7-90CA-48F01CC98917}.exe 120 PID 4688 wrote to memory of 2152 4688 {446026A6-7F87-41c7-90CA-48F01CC98917}.exe 121 PID 4688 wrote to memory of 2152 4688 {446026A6-7F87-41c7-90CA-48F01CC98917}.exe 121 PID 4688 wrote to memory of 2152 4688 {446026A6-7F87-41c7-90CA-48F01CC98917}.exe 121 PID 4068 wrote to memory of 1128 4068 {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe 123 PID 4068 wrote to memory of 1128 4068 {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe 123 PID 4068 wrote to memory of 1128 4068 {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe 123 PID 4068 wrote to memory of 4004 4068 {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe 124 PID 4068 wrote to memory of 4004 4068 {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe 124 PID 4068 wrote to memory of 4004 4068 {F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe 124 PID 1128 wrote to memory of 4944 1128 {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe 125 PID 1128 wrote to memory of 4944 1128 {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe 125 PID 1128 wrote to memory of 4944 1128 {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe 125 PID 1128 wrote to memory of 4664 1128 {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe 126 PID 1128 wrote to memory of 4664 1128 {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe 126 PID 1128 wrote to memory of 4664 1128 {40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe 126 PID 4944 wrote to memory of 4084 4944 {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe 130 PID 4944 wrote to memory of 4084 4944 {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe 130 PID 4944 wrote to memory of 4084 4944 {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe 130 PID 4944 wrote to memory of 832 4944 {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe 131 PID 4944 wrote to memory of 832 4944 {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe 131 PID 4944 wrote to memory of 832 4944 {D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe 131 PID 4084 wrote to memory of 4832 4084 {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe 137 PID 4084 wrote to memory of 4832 4084 {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe 137 PID 4084 wrote to memory of 4832 4084 {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe 137 PID 4084 wrote to memory of 1968 4084 {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe 138 PID 4084 wrote to memory of 1968 4084 {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe 138 PID 4084 wrote to memory of 1968 4084 {303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe 138 PID 4832 wrote to memory of 1176 4832 {47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe 139 PID 4832 wrote to memory of 1176 4832 {47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe 139 PID 4832 wrote to memory of 1176 4832 {47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe 139 PID 4832 wrote to memory of 2272 4832 {47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe 140
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-11_415348c803d65dc7122c9d0d8a5e7939_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\{0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exeC:\Windows\{0E9596AA-B8EB-4a75-89F2-DEB033E6169B}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\{CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exeC:\Windows\{CD36F6F9-1D7D-43f3-9C90-01227878B2FE}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\{FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exeC:\Windows\{FBDE2692-FE1A-4bad-80C7-8F95BA06BD14}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\{27DF855F-7805-46f4-B84F-498719DA2C8E}.exeC:\Windows\{27DF855F-7805-46f4-B84F-498719DA2C8E}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\{446026A6-7F87-41c7-90CA-48F01CC98917}.exeC:\Windows\{446026A6-7F87-41c7-90CA-48F01CC98917}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\{F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exeC:\Windows\{F7D6CCD1-7A67-491e-98ED-A6ECFB7D8E2D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\{40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exeC:\Windows\{40A3FE16-D3E3-4ad5-9B72-ACD5ABDF7CDF}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\{D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exeC:\Windows\{D14F0934-6B8E-4b85-9960-B15B7ED88DC7}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\{303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exeC:\Windows\{303BAF41-C726-44a9-ABBC-B0FE88F0F64C}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\{47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exeC:\Windows\{47FC9C9F-C00E-4782-A9D5-E8C45F12DE89}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\{80582241-C158-46e8-839E-2AE4FF0469F8}.exeC:\Windows\{80582241-C158-46e8-839E-2AE4FF0469F8}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1176 -
C:\Windows\{C101C9C7-E770-4941-BB24-A0DFDE97F3EF}.exeC:\Windows\{C101C9C7-E770-4941-BB24-A0DFDE97F3EF}.exe13⤵
- Executes dropped EXE
PID:436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80582~1.EXE > nul13⤵PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{47FC9~1.EXE > nul12⤵PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{303BA~1.EXE > nul11⤵PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D14F0~1.EXE > nul10⤵PID:832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{40A3F~1.EXE > nul9⤵PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F7D6C~1.EXE > nul8⤵PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{44602~1.EXE > nul7⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{27DF8~1.EXE > nul6⤵PID:1888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FBDE2~1.EXE > nul5⤵PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CD36F~1.EXE > nul4⤵PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0E959~1.EXE > nul3⤵PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD59a376f2e4b9b8dd0e1371bed612d00ea
SHA1214ebff891bc9785ff938785de7416ed36a25fd4
SHA2560f328ddcbc4460e5c41c9e36943f9c4b0af03013375e7343fd6382ac932f3bf2
SHA51281f8251e3028cd1d383da55d9a0176b4067294a6c39107c4840f5e81e730662639a0e2b4401d0dc06c7dce852db068375f63cf182a08df5ef6dea7475358bdc8
-
Filesize
168KB
MD59449eb8e58740f5307f80725be6fb055
SHA1aeef6698e3a0ded3c6f8e6340fe316a1228fb497
SHA256ac55b43ad5a956fb0af75de82f899a4297a53fa84ee3fe0ab77a63b159dbe6f8
SHA5128bc8d4847d43ef83f294d572f7c2e3a4f4391bf656fa423ea3a42a0d4f497639b67fd65c297c4e0ca9be6c0b4c9fe2a1b4d461f85d46515a0a078291b924b4e6
-
Filesize
168KB
MD57a1f4f24108bd30c1e8a8cd18042a05f
SHA11a943ffdd3b4c12d7a328ab85126ec47ead8ed0b
SHA256935f3d420ee6ed2ce8b2f9f2798027fd43116505d6d09dc0863fdb781debb0dd
SHA512df365ba46d298a93d94fe20765fe90913a8267ac11581e138202b6465df535fbbbd16373d987b41b2c639d9a74b393917503f4b0ee847134b216a759d0f7e6e6
-
Filesize
168KB
MD54a947ad28a1c6f72850f1b8753b5701f
SHA1b23daf34a8376fb9b6675b8e07fee4073a1befdc
SHA2561da0902d5c79565758ed7f855996cd68a00d9f3a8a3c916d441d41e0d518a08a
SHA5125bce80da6231e891d5f4164e443d2db044b2e11df2092d8128d021067bb91c46cae46d4f4ebd03feba82a4477be848a2aa6b144b7c9a7a896fd0db60223f6d40
-
Filesize
168KB
MD5143b89d591ed3df3223355e60cbe13d0
SHA19e14963383e84f3d5354afbe5be33d93f26c7b9b
SHA256bb439752065cdc3bfae9e3428446f6ff33f56cbc1f8838ba5bfc2beb7fac0249
SHA5120c6d6b5fb53ad6e79f127c9a2d7211a67721ad97fc88ef5cfa3dc380e914cfd3b672778faa315eb795f35ab319ea9afb9a256db570c25c676d8b8998c76c3b39
-
Filesize
168KB
MD5ce4cc0d2e6041ec5a88d7db38a379e9e
SHA1670d708fb30d38e5e1e6e27d8de0d3b35ebcd9e8
SHA2568c9230f0507328affcd72ed63e62dce21f2ead00b47070743c0c889a2753168e
SHA5128ceb6947e9db443838c502db2c79907ae862abbef36f4f13985a6aed65d619e4f628b11e651d5271bc51d73e5cfff0ad11bbca6b83a5d247637888a8bb3da197
-
Filesize
168KB
MD5cc75781ead7a72cb9609bf772ba293af
SHA193078a97464aec70ce75c3762a7f4db25d64367b
SHA256e3e4f2ca42d9900bda0350da2512b27a57747538f8574974139157e1a9a2c079
SHA5120359f27a6b092b37cdfad9f9d96819ee30512664ac7897f7be8ef9822ab6f34358e0f42726715ee75d0f6f52be6c0ddfd73fde8c80ae4df835a9d04ba66eccdb
-
Filesize
168KB
MD53bed9bb854521697ef1bf1f5fc0d34d8
SHA1689093220c59b6c411c399ed772e44d8d28f98a0
SHA2567dba81565172c2dac7ad33b1b544d23b15965df61692be65f9fa5e1245cb7bc0
SHA51277232e0cb1669487acd7aaf1cdb741c29448997625199f6b99b08610e7a668bbd1388750bc962f74e9a649c25ced23b73c1083c53633a67daca733b770295f9e
-
Filesize
168KB
MD5d0a2129686b01f34282956c34c0d1f27
SHA1fb0497ea4019168cae96e65e836cbf90a711f82c
SHA256145af6ec3a65c5362f5b76d5a372d5c178947891cabddb1a8bed106d65614ada
SHA512c55e441dd5bdee7ef3a9f731321b28209d6b7067b6218e119d12ccff471886de2b543a78f4e23f774437aaa7037521834e59bc03ebee9c5a61be28991db9b229
-
Filesize
57KB
MD5443ef5e2414e5c5e065c45aae23eb78b
SHA1bacb1f7fe8328b425bf3a149265076e3620b2001
SHA256003979a4009d3f7e52ad874d99977c77d2a6eb51400305e06116f6604a32c928
SHA512b886076c2387c59afdb90c1072c45091201db3a09aa65014af272058910ab17b1732f40210d730dc820b380e8cb63d2a091210cf2d6c99e98a6aa233c97a9e31
-
Filesize
31KB
MD53ea518bbe85434c6af5e4d5f8234e7f3
SHA1ce24e0494ece3c78cccaee6ca5443802259f36f7
SHA2563d5606a0e29536eb1e74471b2ea1763731eb310ccb056f904421670ba95af648
SHA512c223b0bf743f526bd0d318c80ba3455d937ec3c29643b0a35627eb0aeacd484372a283c24ce787bc41c2191c0d7f13850b5b11f45f0efb0d1a9bac7cfe8ce6e2
-
Filesize
168KB
MD50c92ac4d3d68383e3da8c3800771dd47
SHA19c5ccd2b9a6a847904a30c81b28329e876f03ea4
SHA256b40ffc611c24f8734ed20869c96cec37a06f09297ec379729e2188c518507858
SHA512035bb69aafc0cdeca4497876f8b4c2dd7229694c9bdfe1e2e103858bb4917a08c7059c038d679653428b045c57b8dac686235092953162d4d17941a5bc3eb165
-
Filesize
168KB
MD569720bd876e2cf747068af7686098141
SHA145d2c6b3fb1a4b3d68a0e6ea9ce45a2042833bb5
SHA256f9968764ef3f95430829ba034f0118aa19916ffeb50a57fa8d83a2aaae411fd1
SHA5128bb1bb4e12302b6c2bf896204129bb66c6b18a369b36d7689a6f4148c34febb24729b7db06291ad6fe7f7e744d7f56dc18d4da6bf9c68b06be0642aecd63d2ad