Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-04-2024 06:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe
-
Size
408KB
-
MD5
27ea3b252482e9d439c34ff3f987631e
-
SHA1
e3ba08fc6774908c0ef5619b79eb4380b2818d9e
-
SHA256
8ce01d7b24d0a14f904f29150094de8b96cb5a8306d166b0fbb866f899d3e617
-
SHA512
fae06a6facbe57875bb08033c726fba4e1455f15545bb90ebb8eea0f89201f8d2c44a0171be6d83402db63b47a4257c5898dabaa9ad163e1c5d7dc1a6f5dfd83
-
SSDEEP
3072:CEGh0oEl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGildOe2MUVg3vTeKcAEciTBqr3jy9
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
Processes:
resource yara_rule C:\Windows\{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{8EF24833-7BD5-439a-8200-561294520AF5}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{90F35489-35A2-4c56-A7F5-35E905A55797}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{EBD2472A-0DC3-4cb6-8C4C-3C9A52CB1685}.exe GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 22 IoCs
Processes:
{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe{C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe{8EF24833-7BD5-439a-8200-561294520AF5}.exe{90F35489-35A2-4c56-A7F5-35E905A55797}.exe2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBD7CDB0-57F3-4b90-B806-5623092D1998} {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBD7CDB0-57F3-4b90-B806-5623092D1998}\stubpath = "C:\\Windows\\{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe" {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8EF24833-7BD5-439a-8200-561294520AF5}\stubpath = "C:\\Windows\\{8EF24833-7BD5-439a-8200-561294520AF5}.exe" {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0} {C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}\stubpath = "C:\\Windows\\{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe" {C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBD2472A-0DC3-4cb6-8C4C-3C9A52CB1685} {D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}\stubpath = "C:\\Windows\\{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe" {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{075860B2-4DE0-4cc6-8AB2-BCF9037F577C} {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9F3EE9C5-AD7A-4340-940F-E5D8714B5308} {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{90F35489-35A2-4c56-A7F5-35E905A55797}\stubpath = "C:\\Windows\\{90F35489-35A2-4c56-A7F5-35E905A55797}.exe" {8EF24833-7BD5-439a-8200-561294520AF5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C5B083C9-42F0-41c3-B894-A8E95239EF6D}\stubpath = "C:\\Windows\\{C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe" {90F35489-35A2-4c56-A7F5-35E905A55797}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242} {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{90F35489-35A2-4c56-A7F5-35E905A55797} {8EF24833-7BD5-439a-8200-561294520AF5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}\stubpath = "C:\\Windows\\{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe" {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8EF24833-7BD5-439a-8200-561294520AF5} {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C5B083C9-42F0-41c3-B894-A8E95239EF6D} {90F35489-35A2-4c56-A7F5-35E905A55797}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91DE390E-FADF-43a2-A851-35AA237FE6AB} 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91DE390E-FADF-43a2-A851-35AA237FE6AB}\stubpath = "C:\\Windows\\{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe" 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71} {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}\stubpath = "C:\\Windows\\{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe" {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}\stubpath = "C:\\Windows\\{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe" {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBD2472A-0DC3-4cb6-8C4C-3C9A52CB1685}\stubpath = "C:\\Windows\\{EBD2472A-0DC3-4cb6-8C4C-3C9A52CB1685}.exe" {D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe -
Executes dropped EXE 11 IoCs
Processes:
{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe{8EF24833-7BD5-439a-8200-561294520AF5}.exe{90F35489-35A2-4c56-A7F5-35E905A55797}.exe{C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe{EBD2472A-0DC3-4cb6-8C4C-3C9A52CB1685}.exepid process 2528 {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe 2544 {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe 2464 {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe 2416 {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe 2536 {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe 1624 {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe 2188 {8EF24833-7BD5-439a-8200-561294520AF5}.exe 2488 {90F35489-35A2-4c56-A7F5-35E905A55797}.exe 620 {C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe 2132 {D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe 2128 {EBD2472A-0DC3-4cb6-8C4C-3C9A52CB1685}.exe -
Drops file in Windows directory 11 IoCs
Processes:
{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe{8EF24833-7BD5-439a-8200-561294520AF5}.exe{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe{90F35489-35A2-4c56-A7F5-35E905A55797}.exe{C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exedescription ioc process File created C:\Windows\{EBD2472A-0DC3-4cb6-8C4C-3C9A52CB1685}.exe {D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe File created C:\Windows\{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe File created C:\Windows\{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe File created C:\Windows\{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe File created C:\Windows\{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe File created C:\Windows\{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe File created C:\Windows\{8EF24833-7BD5-439a-8200-561294520AF5}.exe {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe File created C:\Windows\{90F35489-35A2-4c56-A7F5-35E905A55797}.exe {8EF24833-7BD5-439a-8200-561294520AF5}.exe File created C:\Windows\{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe File created C:\Windows\{C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe {90F35489-35A2-4c56-A7F5-35E905A55797}.exe File created C:\Windows\{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe {C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe{8EF24833-7BD5-439a-8200-561294520AF5}.exe{90F35489-35A2-4c56-A7F5-35E905A55797}.exe{C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exedescription pid process Token: SeIncBasePriorityPrivilege 1900 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe Token: SeIncBasePriorityPrivilege 2528 {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe Token: SeIncBasePriorityPrivilege 2544 {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe Token: SeIncBasePriorityPrivilege 2464 {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe Token: SeIncBasePriorityPrivilege 2416 {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe Token: SeIncBasePriorityPrivilege 2536 {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe Token: SeIncBasePriorityPrivilege 1624 {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe Token: SeIncBasePriorityPrivilege 2188 {8EF24833-7BD5-439a-8200-561294520AF5}.exe Token: SeIncBasePriorityPrivilege 2488 {90F35489-35A2-4c56-A7F5-35E905A55797}.exe Token: SeIncBasePriorityPrivilege 620 {C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe Token: SeIncBasePriorityPrivilege 2132 {D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe{8EF24833-7BD5-439a-8200-561294520AF5}.exedescription pid process target process PID 1900 wrote to memory of 2528 1900 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe PID 1900 wrote to memory of 2528 1900 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe PID 1900 wrote to memory of 2528 1900 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe PID 1900 wrote to memory of 2528 1900 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe PID 1900 wrote to memory of 2312 1900 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe cmd.exe PID 1900 wrote to memory of 2312 1900 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe cmd.exe PID 1900 wrote to memory of 2312 1900 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe cmd.exe PID 1900 wrote to memory of 2312 1900 2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe cmd.exe PID 2528 wrote to memory of 2544 2528 {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe PID 2528 wrote to memory of 2544 2528 {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe PID 2528 wrote to memory of 2544 2528 {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe PID 2528 wrote to memory of 2544 2528 {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe PID 2528 wrote to memory of 2680 2528 {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe cmd.exe PID 2528 wrote to memory of 2680 2528 {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe cmd.exe PID 2528 wrote to memory of 2680 2528 {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe cmd.exe PID 2528 wrote to memory of 2680 2528 {91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe cmd.exe PID 2544 wrote to memory of 2464 2544 {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe PID 2544 wrote to memory of 2464 2544 {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe PID 2544 wrote to memory of 2464 2544 {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe PID 2544 wrote to memory of 2464 2544 {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe PID 2544 wrote to memory of 2572 2544 {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe cmd.exe PID 2544 wrote to memory of 2572 2544 {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe cmd.exe PID 2544 wrote to memory of 2572 2544 {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe cmd.exe PID 2544 wrote to memory of 2572 2544 {74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe cmd.exe PID 2464 wrote to memory of 2416 2464 {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe PID 2464 wrote to memory of 2416 2464 {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe PID 2464 wrote to memory of 2416 2464 {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe PID 2464 wrote to memory of 2416 2464 {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe PID 2464 wrote to memory of 2212 2464 {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe cmd.exe PID 2464 wrote to memory of 2212 2464 {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe cmd.exe PID 2464 wrote to memory of 2212 2464 {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe cmd.exe PID 2464 wrote to memory of 2212 2464 {2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe cmd.exe PID 2416 wrote to memory of 2536 2416 {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe PID 2416 wrote to memory of 2536 2416 {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe PID 2416 wrote to memory of 2536 2416 {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe PID 2416 wrote to memory of 2536 2416 {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe PID 2416 wrote to memory of 2876 2416 {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe cmd.exe PID 2416 wrote to memory of 2876 2416 {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe cmd.exe PID 2416 wrote to memory of 2876 2416 {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe cmd.exe PID 2416 wrote to memory of 2876 2416 {075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe cmd.exe PID 2536 wrote to memory of 1624 2536 {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe PID 2536 wrote to memory of 1624 2536 {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe PID 2536 wrote to memory of 1624 2536 {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe PID 2536 wrote to memory of 1624 2536 {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe PID 2536 wrote to memory of 1920 2536 {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe cmd.exe PID 2536 wrote to memory of 1920 2536 {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe cmd.exe PID 2536 wrote to memory of 1920 2536 {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe cmd.exe PID 2536 wrote to memory of 1920 2536 {EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe cmd.exe PID 1624 wrote to memory of 2188 1624 {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe {8EF24833-7BD5-439a-8200-561294520AF5}.exe PID 1624 wrote to memory of 2188 1624 {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe {8EF24833-7BD5-439a-8200-561294520AF5}.exe PID 1624 wrote to memory of 2188 1624 {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe {8EF24833-7BD5-439a-8200-561294520AF5}.exe PID 1624 wrote to memory of 2188 1624 {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe {8EF24833-7BD5-439a-8200-561294520AF5}.exe PID 1624 wrote to memory of 664 1624 {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe cmd.exe PID 1624 wrote to memory of 664 1624 {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe cmd.exe PID 1624 wrote to memory of 664 1624 {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe cmd.exe PID 1624 wrote to memory of 664 1624 {9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe cmd.exe PID 2188 wrote to memory of 2488 2188 {8EF24833-7BD5-439a-8200-561294520AF5}.exe {90F35489-35A2-4c56-A7F5-35E905A55797}.exe PID 2188 wrote to memory of 2488 2188 {8EF24833-7BD5-439a-8200-561294520AF5}.exe {90F35489-35A2-4c56-A7F5-35E905A55797}.exe PID 2188 wrote to memory of 2488 2188 {8EF24833-7BD5-439a-8200-561294520AF5}.exe {90F35489-35A2-4c56-A7F5-35E905A55797}.exe PID 2188 wrote to memory of 2488 2188 {8EF24833-7BD5-439a-8200-561294520AF5}.exe {90F35489-35A2-4c56-A7F5-35E905A55797}.exe PID 2188 wrote to memory of 1060 2188 {8EF24833-7BD5-439a-8200-561294520AF5}.exe cmd.exe PID 2188 wrote to memory of 1060 2188 {8EF24833-7BD5-439a-8200-561294520AF5}.exe cmd.exe PID 2188 wrote to memory of 1060 2188 {8EF24833-7BD5-439a-8200-561294520AF5}.exe cmd.exe PID 2188 wrote to memory of 1060 2188 {8EF24833-7BD5-439a-8200-561294520AF5}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-03_27ea3b252482e9d439c34ff3f987631e_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exeC:\Windows\{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exeC:\Windows\{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exeC:\Windows\{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exeC:\Windows\{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exeC:\Windows\{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exeC:\Windows\{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{8EF24833-7BD5-439a-8200-561294520AF5}.exeC:\Windows\{8EF24833-7BD5-439a-8200-561294520AF5}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{90F35489-35A2-4c56-A7F5-35E905A55797}.exeC:\Windows\{90F35489-35A2-4c56-A7F5-35E905A55797}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exeC:\Windows\{C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exeC:\Windows\{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{EBD2472A-0DC3-4cb6-8C4C-3C9A52CB1685}.exeC:\Windows\{EBD2472A-0DC3-4cb6-8C4C-3C9A52CB1685}.exe12⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2AE8~1.EXE > nul12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C5B08~1.EXE > nul11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{90F35~1.EXE > nul10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8EF24~1.EXE > nul9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9F3EE~1.EXE > nul8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EBD7C~1.EXE > nul7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{07586~1.EXE > nul6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2A1F4~1.EXE > nul5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{74EF5~1.EXE > nul4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{91DE3~1.EXE > nul3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\{075860B2-4DE0-4cc6-8AB2-BCF9037F577C}.exeFilesize
408KB
MD5f9327b58c95f132c9d06e7bad135c378
SHA18c50df61c259892f76248198848660f3a65d518c
SHA25622c80204c7e9c39eaa3c064efeb65bd8129a29ad9d34a61f4b40cc015d5643bd
SHA5123128079d04ad765676959d18f72e41763c1ed2b95ffc6bfb8fe2a86778eb0c73f7621d497c7c17c98f596c3b88f9c68c28cdac8eb796cd69be89dece3f1b724c
-
C:\Windows\{2A1F4907-B61D-4ce0-B63A-EA67C1FE8242}.exeFilesize
408KB
MD581268cf135fdfe31376256264f222753
SHA1caa9679187253fc0daeac98558f5103abcc5e4ef
SHA2565caa8b1d75cf2c13bbf3baa24daebc8736ce487799c4d0102d875c71787f1b31
SHA512afca6a090129b470ffdb6ab3a8ceeb77d227ec6d75c95e3f06fd8c0b5fce16a1d727ef73a4521bf1918304f08ff5691967d8027049596560be9a92dd9e6e3208
-
C:\Windows\{74EF5FCE-89CA-40c6-BD6D-4B86BD293A71}.exeFilesize
408KB
MD51999f0a3aed6b03abeaadcb789a127a5
SHA155ebf779d43cb4ae6f64b544fb775466b532c181
SHA256bc917f5959e2bfe291c8e4028cb4be843d004d9032d10b4300d7ed3e80e1b5ca
SHA512f563d681af9899170022ef306caf0cadb39af80ea447e76693062680e7bf281ea7f72be54a2d0e97d7ff51bef7c379a66a6ab03d8dfeecd5ba3d6170d2f6efc4
-
C:\Windows\{8EF24833-7BD5-439a-8200-561294520AF5}.exeFilesize
408KB
MD5fa01d1f970f764dbe7da4a6e0cedc50e
SHA11b1553f9071fb923a83d2b0a3d5b5ef81285abde
SHA2566ae1de514949fcc370774f183b2af7f2a0924a8ef876135e54cfdee9a6830fd4
SHA51218e3aec0acf0d737b815721ad6ac6cd1bc50a5c5c1a68bc2a3e4ba5ccfe6c72038debf7b392eff3926d68187159a9504a9f6db81e582ce545ff985e342a2eb7f
-
C:\Windows\{90F35489-35A2-4c56-A7F5-35E905A55797}.exeFilesize
408KB
MD523d6bf48722e5aa8811652347267ec99
SHA15b5b6968d38aa35c63edc516bf4c370446112e43
SHA25627a5a72c5c364cefc29e725b42bb755652208c16a87ece17077a799406464441
SHA512668357bbbc11db79deeb4522d634419f5dab08a005a9b87d8959e5a56aaac607941807b2813f12e9ab707b69f0165a52a18680c9159c74de0e2103055f036cfb
-
C:\Windows\{91DE390E-FADF-43a2-A851-35AA237FE6AB}.exeFilesize
408KB
MD59faea6aa4a4cdc6eade4cb027451f377
SHA1eac3a3641a31f4cd6e6af1ded137a6d318014d04
SHA256ae98d18950d895d29f826cf36554afaf0fe484d05cd4acfaf864574c458ae84d
SHA512791ab9e32e7d0ec140a873b9e37bf9670d0462c8e979d6d00d8e46a06f682f923934ad7da99bef29c5bf97573d35a3cfe27755635e65b3bf4a03190d05c0c113
-
C:\Windows\{9F3EE9C5-AD7A-4340-940F-E5D8714B5308}.exeFilesize
408KB
MD5919e882f10e948421aeeb90f0d9c6d8a
SHA1f8616e08bce9e255e71a2589d80aec4a973fbb60
SHA2562b73fbaab498c4619124972406a0795b9529093cbd704024e78337ac18dcd6d2
SHA512a7fee68956307f663c1dda2f6560ef7c787a34ebdfc033798414720cac29f63fbdd9be66cd311ac4b18e05f6c453d659bae05db4977348a587e6022810199a51
-
C:\Windows\{C5B083C9-42F0-41c3-B894-A8E95239EF6D}.exeFilesize
408KB
MD51374166e3ac0d7b8c1f2e67dd349bae3
SHA17efeeaf2eaace2d4ac803a5653ca86b64455a0b7
SHA256b218f05e26c44c9244ee6cd9450f1693e81b57466d02695447c638ee743bd322
SHA5126523bc739ec3a7ecb96b7965a771412ab29e2262aa007a757d2b4f1ab01e425aad6ba4fd8fa021058a011cd0a62dc6aa29d7dd10f7a00c57916a3c4855ced369
-
C:\Windows\{D2AE8CB7-AA24-4dee-8EBB-BFE57F5C0AC0}.exeFilesize
408KB
MD523fdb31b6b936af86a8a527321e444b0
SHA1403ecc24cfdb793577aaaa9f02458550fa1423a0
SHA256b0daa4c9034d4e4ef54d5188ffad3e468fbeaaa2b1f4426874c331619fb3c219
SHA5121e4844f5a182d7c1ce2601ad7b7a02f941b1939785ad4e5f51266f73abedf1094b12d6ceb80da900c6e8e1cccfd552f03483fc1505e94e83003ca66d1ed3baa8
-
C:\Windows\{EBD2472A-0DC3-4cb6-8C4C-3C9A52CB1685}.exeFilesize
408KB
MD51ac749bd3bfe60e608ba3a8378037a32
SHA1e0f4e8a054f5849b379adfa63e1de73c8cf7478a
SHA256f5ed18a5becf1586744d8bf6a64635b300670ce08361b64a19452182ecb66cba
SHA5129005f65507a0246400fdf6a8637ea70104693c276f63428525e39ce727891c04b4e56212983af93be22d193e904817e0726ddb8785d9320c06d3a202dc7db029
-
C:\Windows\{EBD7CDB0-57F3-4b90-B806-5623092D1998}.exeFilesize
408KB
MD596a2f9422023e790e4cd2bf5655d946f
SHA1606a9dcc82841519e00e11e2045ed02c644ab929
SHA256f3b9ded4b0a63e0fda45aee214571bfc752e431562e56ff7559ce9964987abc9
SHA51278996dc81c5939585d0231e7c5977c39c3754b0f683a65a8ad7012a13138e51f83c0b9be96d242045522064c93ab2c2d1b4a0baad8b43db37b8000a83407a3bd