Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe
-
Size
204KB
-
MD5
5327744f8cf9fcb5e8fc5b92e06fd90e
-
SHA1
d6b45ec7f11311cf7496b3dc808570bbb6e48d41
-
SHA256
0a42597fe072cfec5cf1f68fe37dab8e1a1f224e18f2dd7f90d03dae05c62ba3
-
SHA512
b3a79d85101beb70f353d3c3842eb77a5675c9f0354aa982ab0f222e07e42bf13a1f9d92958fef806347f291878e1695c9ede179a3e35bdb63a34176356786db
-
SSDEEP
1536:1EGh0oNl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oNl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x00070000000231fe-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002320e-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023319-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023217-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000001e4ff-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023497-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002349a-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023497-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002349a-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000234a7-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c00000002304c-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000f000000023113-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1412299B-6601-4917-9025-F992BCE36325} {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9556F436-BF21-4649-A1DB-BE825842497D} {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9556F436-BF21-4649-A1DB-BE825842497D}\stubpath = "C:\\Windows\\{9556F436-BF21-4649-A1DB-BE825842497D}.exe" {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AACB6D4D-FB75-4c11-9977-B048797041EE}\stubpath = "C:\\Windows\\{AACB6D4D-FB75-4c11-9977-B048797041EE}.exe" {9556F436-BF21-4649-A1DB-BE825842497D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC7D93AE-933B-490a-98F3-8B3948B6E794} {AACB6D4D-FB75-4c11-9977-B048797041EE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}\stubpath = "C:\\Windows\\{444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe" 2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08245D81-79E0-464e-B6BB-AE76421CF7D7}\stubpath = "C:\\Windows\\{08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe" {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE080021-C68B-495c-8AB1-A1CDD8BFF647} {1412299B-6601-4917-9025-F992BCE36325}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE080021-C68B-495c-8AB1-A1CDD8BFF647}\stubpath = "C:\\Windows\\{FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe" {1412299B-6601-4917-9025-F992BCE36325}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D944F184-B1DE-4f93-9B23-E269034CC2CA}\stubpath = "C:\\Windows\\{D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe" {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{840B63DA-6DC9-4995-9092-1488F51A7D28} {BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96} {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}\stubpath = "C:\\Windows\\{E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe" {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D944F184-B1DE-4f93-9B23-E269034CC2CA} {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}\stubpath = "C:\\Windows\\{BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe" {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AACB6D4D-FB75-4c11-9977-B048797041EE} {9556F436-BF21-4649-A1DB-BE825842497D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{840B63DA-6DC9-4995-9092-1488F51A7D28}\stubpath = "C:\\Windows\\{840B63DA-6DC9-4995-9092-1488F51A7D28}.exe" {BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{444C4ED9-4F75-4d31-BA69-F4C4BCB41F13} 2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69D61F01-FD05-4404-9014-59C5EA664A8B} {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1412299B-6601-4917-9025-F992BCE36325}\stubpath = "C:\\Windows\\{1412299B-6601-4917-9025-F992BCE36325}.exe" {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389} {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC7D93AE-933B-490a-98F3-8B3948B6E794}\stubpath = "C:\\Windows\\{BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe" {AACB6D4D-FB75-4c11-9977-B048797041EE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08245D81-79E0-464e-B6BB-AE76421CF7D7} {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69D61F01-FD05-4404-9014-59C5EA664A8B}\stubpath = "C:\\Windows\\{69D61F01-FD05-4404-9014-59C5EA664A8B}.exe" {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe -
Executes dropped EXE 12 IoCs
pid Process 2740 {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe 3448 {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe 1908 {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe 2432 {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe 2512 {1412299B-6601-4917-9025-F992BCE36325}.exe 4148 {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe 2688 {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe 4976 {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe 4996 {9556F436-BF21-4649-A1DB-BE825842497D}.exe 4132 {AACB6D4D-FB75-4c11-9977-B048797041EE}.exe 4408 {BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe 2560 {840B63DA-6DC9-4995-9092-1488F51A7D28}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{69D61F01-FD05-4404-9014-59C5EA664A8B}.exe {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe File created C:\Windows\{9556F436-BF21-4649-A1DB-BE825842497D}.exe {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe File created C:\Windows\{BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe {AACB6D4D-FB75-4c11-9977-B048797041EE}.exe File created C:\Windows\{FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe {1412299B-6601-4917-9025-F992BCE36325}.exe File created C:\Windows\{D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe File created C:\Windows\{BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe File created C:\Windows\{AACB6D4D-FB75-4c11-9977-B048797041EE}.exe {9556F436-BF21-4649-A1DB-BE825842497D}.exe File created C:\Windows\{444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe 2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe File created C:\Windows\{E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe File created C:\Windows\{08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe File created C:\Windows\{1412299B-6601-4917-9025-F992BCE36325}.exe {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe File created C:\Windows\{840B63DA-6DC9-4995-9092-1488F51A7D28}.exe {BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3176 2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe Token: SeIncBasePriorityPrivilege 2740 {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe Token: SeIncBasePriorityPrivilege 3448 {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe Token: SeIncBasePriorityPrivilege 1908 {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe Token: SeIncBasePriorityPrivilege 2432 {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe Token: SeIncBasePriorityPrivilege 2512 {1412299B-6601-4917-9025-F992BCE36325}.exe Token: SeIncBasePriorityPrivilege 4148 {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe Token: SeIncBasePriorityPrivilege 2688 {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe Token: SeIncBasePriorityPrivilege 4976 {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe Token: SeIncBasePriorityPrivilege 4996 {9556F436-BF21-4649-A1DB-BE825842497D}.exe Token: SeIncBasePriorityPrivilege 4132 {AACB6D4D-FB75-4c11-9977-B048797041EE}.exe Token: SeIncBasePriorityPrivilege 4408 {BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3176 wrote to memory of 2740 3176 2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe 100 PID 3176 wrote to memory of 2740 3176 2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe 100 PID 3176 wrote to memory of 2740 3176 2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe 100 PID 3176 wrote to memory of 3008 3176 2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe 101 PID 3176 wrote to memory of 3008 3176 2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe 101 PID 3176 wrote to memory of 3008 3176 2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe 101 PID 2740 wrote to memory of 3448 2740 {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe 102 PID 2740 wrote to memory of 3448 2740 {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe 102 PID 2740 wrote to memory of 3448 2740 {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe 102 PID 2740 wrote to memory of 2352 2740 {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe 103 PID 2740 wrote to memory of 2352 2740 {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe 103 PID 2740 wrote to memory of 2352 2740 {444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe 103 PID 3448 wrote to memory of 1908 3448 {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe 106 PID 3448 wrote to memory of 1908 3448 {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe 106 PID 3448 wrote to memory of 1908 3448 {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe 106 PID 3448 wrote to memory of 2028 3448 {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe 107 PID 3448 wrote to memory of 2028 3448 {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe 107 PID 3448 wrote to memory of 2028 3448 {E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe 107 PID 1908 wrote to memory of 2432 1908 {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe 108 PID 1908 wrote to memory of 2432 1908 {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe 108 PID 1908 wrote to memory of 2432 1908 {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe 108 PID 1908 wrote to memory of 5000 1908 {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe 109 PID 1908 wrote to memory of 5000 1908 {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe 109 PID 1908 wrote to memory of 5000 1908 {08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe 109 PID 2432 wrote to memory of 2512 2432 {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe 113 PID 2432 wrote to memory of 2512 2432 {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe 113 PID 2432 wrote to memory of 2512 2432 {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe 113 PID 2432 wrote to memory of 3440 2432 {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe 114 PID 2432 wrote to memory of 3440 2432 {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe 114 PID 2432 wrote to memory of 3440 2432 {69D61F01-FD05-4404-9014-59C5EA664A8B}.exe 114 PID 2512 wrote to memory of 4148 2512 {1412299B-6601-4917-9025-F992BCE36325}.exe 115 PID 2512 wrote to memory of 4148 2512 {1412299B-6601-4917-9025-F992BCE36325}.exe 115 PID 2512 wrote to memory of 4148 2512 {1412299B-6601-4917-9025-F992BCE36325}.exe 115 PID 2512 wrote to memory of 640 2512 {1412299B-6601-4917-9025-F992BCE36325}.exe 116 PID 2512 wrote to memory of 640 2512 {1412299B-6601-4917-9025-F992BCE36325}.exe 116 PID 2512 wrote to memory of 640 2512 {1412299B-6601-4917-9025-F992BCE36325}.exe 116 PID 4148 wrote to memory of 2688 4148 {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe 120 PID 4148 wrote to memory of 2688 4148 {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe 120 PID 4148 wrote to memory of 2688 4148 {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe 120 PID 4148 wrote to memory of 2216 4148 {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe 121 PID 4148 wrote to memory of 2216 4148 {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe 121 PID 4148 wrote to memory of 2216 4148 {FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe 121 PID 2688 wrote to memory of 4976 2688 {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe 122 PID 2688 wrote to memory of 4976 2688 {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe 122 PID 2688 wrote to memory of 4976 2688 {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe 122 PID 2688 wrote to memory of 3096 2688 {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe 123 PID 2688 wrote to memory of 3096 2688 {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe 123 PID 2688 wrote to memory of 3096 2688 {D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe 123 PID 4976 wrote to memory of 4996 4976 {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe 124 PID 4976 wrote to memory of 4996 4976 {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe 124 PID 4976 wrote to memory of 4996 4976 {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe 124 PID 4976 wrote to memory of 4088 4976 {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe 125 PID 4976 wrote to memory of 4088 4976 {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe 125 PID 4976 wrote to memory of 4088 4976 {BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe 125 PID 4996 wrote to memory of 4132 4996 {9556F436-BF21-4649-A1DB-BE825842497D}.exe 129 PID 4996 wrote to memory of 4132 4996 {9556F436-BF21-4649-A1DB-BE825842497D}.exe 129 PID 4996 wrote to memory of 4132 4996 {9556F436-BF21-4649-A1DB-BE825842497D}.exe 129 PID 4996 wrote to memory of 4452 4996 {9556F436-BF21-4649-A1DB-BE825842497D}.exe 130 PID 4996 wrote to memory of 4452 4996 {9556F436-BF21-4649-A1DB-BE825842497D}.exe 130 PID 4996 wrote to memory of 4452 4996 {9556F436-BF21-4649-A1DB-BE825842497D}.exe 130 PID 4132 wrote to memory of 4408 4132 {AACB6D4D-FB75-4c11-9977-B048797041EE}.exe 136 PID 4132 wrote to memory of 4408 4132 {AACB6D4D-FB75-4c11-9977-B048797041EE}.exe 136 PID 4132 wrote to memory of 4408 4132 {AACB6D4D-FB75-4c11-9977-B048797041EE}.exe 136 PID 4132 wrote to memory of 4176 4132 {AACB6D4D-FB75-4c11-9977-B048797041EE}.exe 137
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\{444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exeC:\Windows\{444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\{E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exeC:\Windows\{E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\{08245D81-79E0-464e-B6BB-AE76421CF7D7}.exeC:\Windows\{08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\{69D61F01-FD05-4404-9014-59C5EA664A8B}.exeC:\Windows\{69D61F01-FD05-4404-9014-59C5EA664A8B}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\{1412299B-6601-4917-9025-F992BCE36325}.exeC:\Windows\{1412299B-6601-4917-9025-F992BCE36325}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\{FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exeC:\Windows\{FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\{D944F184-B1DE-4f93-9B23-E269034CC2CA}.exeC:\Windows\{D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\{BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exeC:\Windows\{BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\{9556F436-BF21-4649-A1DB-BE825842497D}.exeC:\Windows\{9556F436-BF21-4649-A1DB-BE825842497D}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\{AACB6D4D-FB75-4c11-9977-B048797041EE}.exeC:\Windows\{AACB6D4D-FB75-4c11-9977-B048797041EE}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\{BC7D93AE-933B-490a-98F3-8B3948B6E794}.exeC:\Windows\{BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4408 -
C:\Windows\{840B63DA-6DC9-4995-9092-1488F51A7D28}.exeC:\Windows\{840B63DA-6DC9-4995-9092-1488F51A7D28}.exe13⤵
- Executes dropped EXE
PID:2560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BC7D9~1.EXE > nul13⤵PID:4392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AACB6~1.EXE > nul12⤵PID:4176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9556F~1.EXE > nul11⤵PID:4452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BC6F9~1.EXE > nul10⤵PID:4088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D944F~1.EXE > nul9⤵PID:3096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FE080~1.EXE > nul8⤵PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{14122~1.EXE > nul7⤵PID:640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69D61~1.EXE > nul6⤵PID:3440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{08245~1.EXE > nul5⤵PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E6D5D~1.EXE > nul4⤵PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{444C4~1.EXE > nul3⤵PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD51a9a09b8052519ac468bc0476f02d462
SHA18c27bb586fb4fef20c9070774d2ebc9df09aa7db
SHA256b7b67f29456ea80861ac59a88bf7f4a73bc67387351a635dedc89da880fc3c66
SHA512714c458543d570165f94cab106b1877340c014fa0358e8910a316e769c3b8506b9b29dcc8689b569467154b60bc2399bb52ad645ea4484cfb639e406010d4d98
-
Filesize
204KB
MD5a89b7883649c2c619aab29a2264ea8c4
SHA1625605732bafc43cab16f2cce4c9bb11778fe4b7
SHA25695a2c273fd84e2822135a207e3b80829b683be4a01c7998654468a60ef43d2e2
SHA5127e7ddc681c934da87bf1abdb8b5b0e0ce63602fd3937e1404ad70baf51b8b7f84a791343c88f7be5354618f9fc9b4e80a1e9e54ad4cd17f4626393d86e1c6095
-
Filesize
204KB
MD5c19977da54074bf6453ce584bb9ab1eb
SHA1004ec0d19b123ad5face97a0767f279c22c09288
SHA256df554181dc70cd7891655f1dc9c1af509465eb093b2080f92bfcc3c3577e1068
SHA512b887c0a03e4a59f58bafb91d1a0af4814f6f54b8f7b5630c2a972156cd5866a1f2d59db3177e218cf76825d6590860d59cf742c062a50e9d27841569523745b2
-
Filesize
204KB
MD5c33de4725ad32c4fd4aff1732368cd7e
SHA12649745471c8de08e62cd3af2e745f158d290aad
SHA2563c4bbc235e7991c1f05e4f2c876c825a4ae24d5182a16ae60ac4bf0302fe638a
SHA512cea0f41ccfbba5c2f5b5bf0b377d0da4f1773530f6a9feac3a2fc371b3f46df60f91bd3e181d1354641e39df159518deeb50bc6daaf2d5d5616ac7c7eebbb148
-
Filesize
204KB
MD5271fa1fc4e810497262e04a679bb73d7
SHA1735851614dda8320e0eebcc6365a51511f569e24
SHA256b603a905b2e7b20b388b0011df57a8bc3822c08310a12c276e17549ba541f9c2
SHA5125246c80e9d03af6f95e71c567b671ac3dd9b8a891c0c28412108d68487e35eaddb7b2b5db5589f4eeee5e3d8f824fa22430f6dc58aa8efbde910fbdc88b3d948
-
Filesize
204KB
MD5f4961e8dcb4db0b504745b7bbaf27735
SHA1da9bf98cdaa844e3d065bf132854bdbc0f560342
SHA2565bc868cc505c87a0b821343ccb9538cd9c4deaecea9b455e550479e0f241f328
SHA512d8831cab8b9c5c596d348932d5ab3f1f54ae3c474cba37b907c30068df4402e410e54eb34cd55a3fc0b83421bf8da204949dc44e5caf01719513079566fc3ead
-
Filesize
204KB
MD5c093a7c5d999de70be2cd220e3b744cd
SHA180808f1ef00bd0c9b4edb19c375aa914cc6b4341
SHA2567f8b90175beb9b1044a6f286ba7413c33ca2ceb9453ba970409ae2d0dcbf9050
SHA512cb66043d6670aeee6d7e63e0554f882cbb58071608896b4eba36872f80427bbc5dc5f95c17b0d4eb59382e1f04f71e09ad0eff0d50d43b239e8a90a15fd8b4e5
-
Filesize
204KB
MD561af1e2e1180245525d5e2d52f8962e3
SHA1cbb1da6901ba57c9ace958fbc5dc7ce139c4d7bb
SHA2568cab40c91cc655e07f546be53a9f3092349b860b671e1e0bc997e92b4a70852c
SHA5123971c3e903837bde8e9ecd5ff5ebbf38ecdc8091c88caad077ba5fb6cb96ba552538446ae1c7687e0c88aaef616b0910caf30d09ab2b7cd81cb09bac5f656b81
-
Filesize
204KB
MD5d351baf38a7e53646bf0957a33b4287a
SHA198b7cf4f208a0505ff8cfe7c391d55f6ab842fe4
SHA256d803d8aeb59a9d68ee7c90573b95c27de33b18e5ecf0ed6d06f8c1b2ef279baa
SHA5123d6bbf867f81cac713cc592d8173ef645d0262bf05da5073074a4bba2ce2a03b8553f14cab1ef41bb5c03b30c2d0ca438af1da9f4109d55cfba87548d623954c
-
Filesize
204KB
MD535fcaa0e3bc3248af9df8e35e8cf79be
SHA1f5d335b34b399ae164cf1773742f1a726889da9d
SHA256b722c2e66cfe790770f361dec804e4091fff6f50db5b65c9bc055dcc4dda757a
SHA51208319f957cee4075c13d1e5b3d9a384d09f0bc133a5deb86264ddb1a6b7e991b4fccd41a1e26bceeb095ecc921ed7007a3cb0806fd721fd8ceaffb56b6f20702
-
Filesize
204KB
MD5ca88ca69821c410aa42e577336fd1a84
SHA1745f410f2f4f0c17448b1a610425d8e525e45131
SHA256785160c7be2845c371509276d5e0eacd4faa6701cec7f3a0f004469b15aff490
SHA5129add09d8b6c63614ec6d01728c48b65f14bf8e51a8a11cb0e1069ebacc752964b34db1e4247a266396097e75a0658a1a6168b0cf94165d3be6278a94afc3d8fb
-
Filesize
204KB
MD5f6a52deac398db1be0b88746889c38aa
SHA123734d4a2ebe354afb375f27f43a37addfbcc20c
SHA256e1f6020265e2af3cb2bc9e3b41c5a4589964a335de506f2136c9207bf7d17af0
SHA512ef8e432263c7cf546c554ffe36b6cc720d1fd8748362fbd0a05ef6b6db65dcf5730c214587a86bd157c2648a4b8a4244909f2a9e716b33fef7fd74ae3568ac3a