Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 07:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe
-
Size
168KB
-
MD5
d0920931293b2f3b62abba80afbba686
-
SHA1
bb2bd8294ab35e61be27545de1480070c1d74faa
-
SHA256
bfd24ac56e9c57dd1da071d247a19e7e999aba31d912ad985b85bd1deff6b293
-
SHA512
e00f3ffca5b4e5a08425aad31b056cae1b76a83d7df5caf03b87d663be6e3395a3500c8be5fe02fe73d8cbdd4a239c18a4bf946728ed00f30ceb52a3ea1964d5
-
SSDEEP
1536:1EGh0o+lq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o+lqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 13 IoCs
resource yara_rule behavioral2/files/0x0008000000023219-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023227-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002323e-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002333f-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023340-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023125-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002334f-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000233a7-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023243-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000234c8-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00070000000234c9-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000234c8-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000234c8-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F7E9503F-124B-491e-92EF-EBFE41C50FF0} 2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F7E9503F-124B-491e-92EF-EBFE41C50FF0}\stubpath = "C:\\Windows\\{F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe" 2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FBC01588-F34A-4202-9D3E-0BC1968E26BD} {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FBC01588-F34A-4202-9D3E-0BC1968E26BD}\stubpath = "C:\\Windows\\{FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe" {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69555CDF-87E0-4a13-9161-002DF85F09A5} {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{69555CDF-87E0-4a13-9161-002DF85F09A5}\stubpath = "C:\\Windows\\{69555CDF-87E0-4a13-9161-002DF85F09A5}.exe" {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1909B6D-FD0E-4fc6-B710-54B5328EBC36} {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1909B6D-FD0E-4fc6-B710-54B5328EBC36}\stubpath = "C:\\Windows\\{B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe" {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}\stubpath = "C:\\Windows\\{7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe" {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}\stubpath = "C:\\Windows\\{D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe" {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}\stubpath = "C:\\Windows\\{A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe" {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{229E5936-ECB8-4efb-BEFB-5E5A1963155A}\stubpath = "C:\\Windows\\{229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe" {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4115155-B8EA-4e28-AE41-64B60EED43FA} {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4115155-B8EA-4e28-AE41-64B60EED43FA}\stubpath = "C:\\Windows\\{B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe" {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E77AE47-01DB-4e6e-B86E-45A60B809CCF} {B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36} {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E640FC0D-50E0-4f40-BD94-6944E5F36590} {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E640FC0D-50E0-4f40-BD94-6944E5F36590}\stubpath = "C:\\Windows\\{E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe" {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0} {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A57CAC74-E85C-4ded-8122-F1C2A30F1B1A} {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{229E5936-ECB8-4efb-BEFB-5E5A1963155A} {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E77AE47-01DB-4e6e-B86E-45A60B809CCF}\stubpath = "C:\\Windows\\{8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe" {B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A27A2161-1F98-41ab-ABEE-661024CBDC80} {8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A27A2161-1F98-41ab-ABEE-661024CBDC80}\stubpath = "C:\\Windows\\{A27A2161-1F98-41ab-ABEE-661024CBDC80}.exe" {8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe -
Executes dropped EXE 12 IoCs
pid Process 2204 {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe 4640 {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe 1724 {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe 4208 {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe 3656 {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe 2456 {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe 1848 {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe 2072 {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe 3076 {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe 3600 {B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe 2120 {8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe 1968 {A27A2161-1F98-41ab-ABEE-661024CBDC80}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{A27A2161-1F98-41ab-ABEE-661024CBDC80}.exe {8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe File created C:\Windows\{A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe File created C:\Windows\{B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe File created C:\Windows\{8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe {B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe File created C:\Windows\{69555CDF-87E0-4a13-9161-002DF85F09A5}.exe {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe File created C:\Windows\{E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe File created C:\Windows\{D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe File created C:\Windows\{229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe File created C:\Windows\{B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe File created C:\Windows\{F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe 2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe File created C:\Windows\{FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe File created C:\Windows\{7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1420 2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe Token: SeIncBasePriorityPrivilege 2204 {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe Token: SeIncBasePriorityPrivilege 4640 {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe Token: SeIncBasePriorityPrivilege 1724 {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe Token: SeIncBasePriorityPrivilege 4208 {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe Token: SeIncBasePriorityPrivilege 3656 {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe Token: SeIncBasePriorityPrivilege 2456 {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe Token: SeIncBasePriorityPrivilege 1848 {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe Token: SeIncBasePriorityPrivilege 2072 {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe Token: SeIncBasePriorityPrivilege 3076 {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe Token: SeIncBasePriorityPrivilege 3600 {B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe Token: SeIncBasePriorityPrivilege 2120 {8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2204 1420 2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe 98 PID 1420 wrote to memory of 2204 1420 2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe 98 PID 1420 wrote to memory of 2204 1420 2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe 98 PID 1420 wrote to memory of 4988 1420 2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe 99 PID 1420 wrote to memory of 4988 1420 2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe 99 PID 1420 wrote to memory of 4988 1420 2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe 99 PID 2204 wrote to memory of 4640 2204 {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe 102 PID 2204 wrote to memory of 4640 2204 {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe 102 PID 2204 wrote to memory of 4640 2204 {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe 102 PID 2204 wrote to memory of 4060 2204 {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe 103 PID 2204 wrote to memory of 4060 2204 {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe 103 PID 2204 wrote to memory of 4060 2204 {F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe 103 PID 4640 wrote to memory of 1724 4640 {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe 105 PID 4640 wrote to memory of 1724 4640 {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe 105 PID 4640 wrote to memory of 1724 4640 {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe 105 PID 4640 wrote to memory of 2912 4640 {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe 106 PID 4640 wrote to memory of 2912 4640 {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe 106 PID 4640 wrote to memory of 2912 4640 {FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe 106 PID 1724 wrote to memory of 4208 1724 {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe 110 PID 1724 wrote to memory of 4208 1724 {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe 110 PID 1724 wrote to memory of 4208 1724 {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe 110 PID 1724 wrote to memory of 4256 1724 {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe 111 PID 1724 wrote to memory of 4256 1724 {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe 111 PID 1724 wrote to memory of 4256 1724 {7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe 111 PID 4208 wrote to memory of 3656 4208 {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe 112 PID 4208 wrote to memory of 3656 4208 {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe 112 PID 4208 wrote to memory of 3656 4208 {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe 112 PID 4208 wrote to memory of 2072 4208 {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe 113 PID 4208 wrote to memory of 2072 4208 {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe 113 PID 4208 wrote to memory of 2072 4208 {69555CDF-87E0-4a13-9161-002DF85F09A5}.exe 113 PID 3656 wrote to memory of 2456 3656 {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe 115 PID 3656 wrote to memory of 2456 3656 {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe 115 PID 3656 wrote to memory of 2456 3656 {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe 115 PID 3656 wrote to memory of 3332 3656 {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe 116 PID 3656 wrote to memory of 3332 3656 {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe 116 PID 3656 wrote to memory of 3332 3656 {E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe 116 PID 2456 wrote to memory of 1848 2456 {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe 118 PID 2456 wrote to memory of 1848 2456 {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe 118 PID 2456 wrote to memory of 1848 2456 {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe 118 PID 2456 wrote to memory of 5116 2456 {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe 119 PID 2456 wrote to memory of 5116 2456 {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe 119 PID 2456 wrote to memory of 5116 2456 {D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe 119 PID 1848 wrote to memory of 2072 1848 {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe 120 PID 1848 wrote to memory of 2072 1848 {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe 120 PID 1848 wrote to memory of 2072 1848 {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe 120 PID 1848 wrote to memory of 5096 1848 {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe 121 PID 1848 wrote to memory of 5096 1848 {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe 121 PID 1848 wrote to memory of 5096 1848 {A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe 121 PID 2072 wrote to memory of 3076 2072 {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe 122 PID 2072 wrote to memory of 3076 2072 {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe 122 PID 2072 wrote to memory of 3076 2072 {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe 122 PID 2072 wrote to memory of 232 2072 {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe 123 PID 2072 wrote to memory of 232 2072 {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe 123 PID 2072 wrote to memory of 232 2072 {B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe 123 PID 3076 wrote to memory of 3600 3076 {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe 132 PID 3076 wrote to memory of 3600 3076 {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe 132 PID 3076 wrote to memory of 3600 3076 {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe 132 PID 3076 wrote to memory of 3164 3076 {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe 133 PID 3076 wrote to memory of 3164 3076 {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe 133 PID 3076 wrote to memory of 3164 3076 {229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe 133 PID 3600 wrote to memory of 2120 3600 {B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe 134 PID 3600 wrote to memory of 2120 3600 {B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe 134 PID 3600 wrote to memory of 2120 3600 {B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe 134 PID 3600 wrote to memory of 4392 3600 {B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe 135
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\{F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exeC:\Windows\{F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\{FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exeC:\Windows\{FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\{7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exeC:\Windows\{7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\{69555CDF-87E0-4a13-9161-002DF85F09A5}.exeC:\Windows\{69555CDF-87E0-4a13-9161-002DF85F09A5}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\{E640FC0D-50E0-4f40-BD94-6944E5F36590}.exeC:\Windows\{E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\{D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exeC:\Windows\{D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\{A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exeC:\Windows\{A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\{B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exeC:\Windows\{B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\{229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exeC:\Windows\{229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\{B4115155-B8EA-4e28-AE41-64B60EED43FA}.exeC:\Windows\{B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\{8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exeC:\Windows\{8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Windows\{A27A2161-1F98-41ab-ABEE-661024CBDC80}.exeC:\Windows\{A27A2161-1F98-41ab-ABEE-661024CBDC80}.exe13⤵
- Executes dropped EXE
PID:1968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E77A~1.EXE > nul13⤵PID:4740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B4115~1.EXE > nul12⤵PID:4392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{229E5~1.EXE > nul11⤵PID:3164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1909~1.EXE > nul10⤵PID:232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A57CA~1.EXE > nul9⤵PID:5096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D7A31~1.EXE > nul8⤵PID:5116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E640F~1.EXE > nul7⤵PID:3332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69555~1.EXE > nul6⤵PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C922~1.EXE > nul5⤵PID:4256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FBC01~1.EXE > nul4⤵PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F7E95~1.EXE > nul3⤵PID:4060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD502ceee7830acfd0fbfe4fc99f7dd2776
SHA1b2f09e751e17329d61e5835bad095ce010f3ffd0
SHA256e79667dc6cdf6e3b98fb6ec7e09aa96ad95443f7d8c35dfa5a328b0b419e0dd6
SHA5123c9a1b61690e86eddd1bdae693be99c44f1cbc6ce47834146baec48f4a40db77f62c7ec40786150d4677221148e80fb46d4913e498eeb5d940d9a5cb81d0882d
-
Filesize
168KB
MD51c671dc2a43e8748b531646e8f734d3a
SHA1f9e3572a29e04f440453e1c22e6c11860d4cda94
SHA256e0cb5b1e29b530af5664e8ec61ad02a39f545d033930760c2b31e858bc7aeafe
SHA5123db72f6c6de7609f7158859f268b6ae0526dc7b24da466bfb1c1bcde4e5d29cfea652e8a6f47e1763bbefc68c9597d2ec7d1d487f0b16d2366fc6f0f8e6483d1
-
Filesize
168KB
MD52069532567ca499a3773f7640a00bebe
SHA13c8b1afb8084ab33189cbc49f844a57a7c197ebc
SHA25660fba0dd134b407772c2a26d5df796c66c68c25e831a8851bad6bc7413e5ea33
SHA5120f80487f3b5bf7e08521a4f19d166480ead787994a9d536db09fda9c19ca38bb12a0642ee68339c98c3036692066a27939b539e5e3bf5a0952292d5960b527af
-
Filesize
168KB
MD505f4e1761e89a2bc52205d84984ccbb3
SHA1daff1465e9bf57be786c01414cb3dc4f7a5d762c
SHA25650126ee48f1987030e250e8ed37fda621cbe35f840c39d1690dd797faf02b0d4
SHA5122486fc9ee8e99d6620c0aeceadc5c2d004378f7032b161b88cba524b6ba1efffeec8e2d0a11934a6163f2311ee0cee7c9853c842e3078bce1de8a54ace2908ad
-
Filesize
168KB
MD542bd1b03bbe34147a128fe4befa6604d
SHA10d265a7eee9847f93aea7a343d165f621d13c603
SHA256e039430f0516d210b0a50ac35868829715254c44c4f6f10dc235476a47a30c78
SHA51242a490ac3ca0b17e640226d8b7cc08789bdb67f85f2a4c0d0a0f0e7b2b51c300bbf6f9245bfc3d070b7b7f5bc692371cf5be3192161a917b5d0a0b60a2fe2302
-
Filesize
168KB
MD52aeabde898c9aa7aa6bbc8cf4ca190b8
SHA11edbe838e91915cb4d2cd0920e7ff472b09a2b61
SHA256de1781aab557faf1eb863ca6fd2c7b42925ffd3fc8211ecce0ce39e11a3a22db
SHA512acaf9a3ffc258ea4a03392f32f818bc4c9d972fe3a64c37ce52105902e8931ec439fd84f9be0a88a243e9e349a6fafdd4387bc40c21de4059274bb4dabe8657e
-
Filesize
168KB
MD5b5053241b57ee8b9b248c813caafbe7e
SHA150cbbba37de7e9c62c8dd10b5e81d8fd2dca50b6
SHA256e46c9af3fd162bc2448594b45220b47374764c9cf22d3930750c2505fd8ce06b
SHA5125da5d01224438b224dd678b7349518bd5b7774dad823efc79d9e4b189bec77b92ae921e6f39132f930d9daf52f702961d95a49640bdc093961c3783f463fb24f
-
Filesize
168KB
MD5ff09d8ff7dbd622641322fe4dfcb1993
SHA1024234cc9e8c67a3257d62a82a3dfcc180a996c4
SHA2560f4f8ac9b5ee75b225ba8a87315db0a8170e28042667dd34988804835d50628b
SHA5124820760833bd36bb5341d8d4ffa2d81b678d35e8eb3a057213ae354adad203cc8da761e03d33fcca1567f099f266ba356bc9328d198f576bbe7353d200196d36
-
Filesize
168KB
MD5df3a2a903cfcaf162c33249beaffb639
SHA1eec1e5e5bbb921ae3a131328d2f77480f4633c30
SHA2564ab1e32e896b0a5ac150cf62a100de916d21d2411a9d042a96a8ae51707111d4
SHA5121055ea25d191aece082e171c7592398944a0601ccd8805b3956aa50171d31f6acf7b67de364f95ee6856ee6883c4ae7258c18a9a6f42f1244196ce2a7d60018b
-
Filesize
168KB
MD5c363ef5b6946456e4746dcaf23b3a729
SHA1793eb82ab8db5f08d729e5a5bd8a3c150f4898e1
SHA2561a7cd15bc944c15b188ae8d78e2f7319b0967f24ca77ce9f8536dfc41b3b17d4
SHA512e9ab76d07dc95656654d53c9373e03b0d2cdba844cd7b888a39df3bb5478181f9767063d9eed2135a5edbe4e85f2e8bcbb125ec0714c7ba69bab69db962d9c49
-
Filesize
168KB
MD5b99a330e5c7fabf61c347c52a44c5ba8
SHA1ac3d270415775b68292729f06063b05ff2cee469
SHA256b5f18f355a91d3d3c47e13c3ec7d92914de6ff135b080ef6d09d67c0e3b52a4f
SHA5128c4bc99f3d18094084dd8d436b96bd0deeba83203841b7c2380139251d21acb198caf9e682268e046a239b320f9c850d93383b802314ff3b722482d4e07c1a10
-
Filesize
168KB
MD565dd01fef049d65f1680d2020538e7cf
SHA1cf67a80dd6dcb0132f9d40465dd73ccba07b13ab
SHA2563de039c1621870c301fa72430fa4939fe8e8eaeb4d852bfd4ef3b39065aeecce
SHA512cf48a76fbd467e90a1903df37c363c220e94253c211adf467252bb550eef49b519ccae6f6422fdce88a0d6bea35836a061b516c67b48a02c9df5e9df79771cf2