Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe
-
Size
180KB
-
MD5
47a12bf9c16848b900a001fd00083c04
-
SHA1
4360dd715ad3506b3e26eff7463e9bab3855eb95
-
SHA256
f5b71caf894fb5f50f88d162e5a4ce119c0823cec207b0f00b414e330b225fee
-
SHA512
554e8d7b7d9550ec528295cf5256c297aebbe1f5f9147cca3dbfc111e43a1d5865fde57ec31770b41a42ea47a5b319de7e582888ff70fb0954b977d23e94d7f4
-
SSDEEP
3072:jEGh0oclfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGGl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0007000000023224-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0011000000023229-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023230-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0012000000023229-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021c86-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021c87-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000021c86-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070d-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070f-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070d-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070f-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000000070d-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D6B0066F-4534-42c1-9417-68B22A18B008}\stubpath = "C:\\Windows\\{D6B0066F-4534-42c1-9417-68B22A18B008}.exe" {EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57FC167E-89C4-4d2b-B060-6D4081C76D71}\stubpath = "C:\\Windows\\{57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe" {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BA167AFC-238D-486e-9CDB-A4D5E4A91664} {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{35A61D0B-6940-4aee-9E92-1FD9A4926947} {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EA8DCD9A-1555-4fff-B66A-64EA4019503D} {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EA8DCD9A-1555-4fff-B66A-64EA4019503D}\stubpath = "C:\\Windows\\{EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe" {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9BDCD7F-83C1-4492-B472-E557188A57C5} {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{09589A1D-84DB-42d7-9A67-0E8428FCE3C5}\stubpath = "C:\\Windows\\{09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe" 2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A13EDF19-4A09-4805-B580-96D8EED92DB2} {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BA167AFC-238D-486e-9CDB-A4D5E4A91664}\stubpath = "C:\\Windows\\{BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe" {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{979D3B7D-3A29-4ba3-9CE1-A5634DA08444}\stubpath = "C:\\Windows\\{979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe" {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{35A61D0B-6940-4aee-9E92-1FD9A4926947}\stubpath = "C:\\Windows\\{35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe" {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}\stubpath = "C:\\Windows\\{D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe" {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5BBFF565-F726-4c9d-86B0-AB7917669C75}\stubpath = "C:\\Windows\\{5BBFF565-F726-4c9d-86B0-AB7917669C75}.exe" {D6B0066F-4534-42c1-9417-68B22A18B008}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{09589A1D-84DB-42d7-9A67-0E8428FCE3C5} 2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A13EDF19-4A09-4805-B580-96D8EED92DB2}\stubpath = "C:\\Windows\\{A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe" {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57FC167E-89C4-4d2b-B060-6D4081C76D71} {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}\stubpath = "C:\\Windows\\{37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe" {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C} {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{979D3B7D-3A29-4ba3-9CE1-A5634DA08444} {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9BDCD7F-83C1-4492-B472-E557188A57C5}\stubpath = "C:\\Windows\\{D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe" {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1} {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D6B0066F-4534-42c1-9417-68B22A18B008} {EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5BBFF565-F726-4c9d-86B0-AB7917669C75} {D6B0066F-4534-42c1-9417-68B22A18B008}.exe -
Executes dropped EXE 12 IoCs
pid Process 704 {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe 3344 {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe 5000 {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe 3012 {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe 3156 {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe 3436 {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe 2224 {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe 3864 {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe 2620 {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe 2772 {EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe 4516 {D6B0066F-4534-42c1-9417-68B22A18B008}.exe 704 {5BBFF565-F726-4c9d-86B0-AB7917669C75}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe File created C:\Windows\{BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe File created C:\Windows\{979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe File created C:\Windows\{35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe File created C:\Windows\{D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe File created C:\Windows\{D6B0066F-4534-42c1-9417-68B22A18B008}.exe {EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe File created C:\Windows\{5BBFF565-F726-4c9d-86B0-AB7917669C75}.exe {D6B0066F-4534-42c1-9417-68B22A18B008}.exe File created C:\Windows\{09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe 2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe File created C:\Windows\{37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe File created C:\Windows\{D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe File created C:\Windows\{EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe File created C:\Windows\{57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2712 2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe Token: SeIncBasePriorityPrivilege 704 {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe Token: SeIncBasePriorityPrivilege 3344 {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe Token: SeIncBasePriorityPrivilege 5000 {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe Token: SeIncBasePriorityPrivilege 3012 {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe Token: SeIncBasePriorityPrivilege 3156 {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe Token: SeIncBasePriorityPrivilege 3436 {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe Token: SeIncBasePriorityPrivilege 2224 {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe Token: SeIncBasePriorityPrivilege 3864 {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe Token: SeIncBasePriorityPrivilege 2620 {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe Token: SeIncBasePriorityPrivilege 2772 {EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe Token: SeIncBasePriorityPrivilege 4516 {D6B0066F-4534-42c1-9417-68B22A18B008}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2712 wrote to memory of 704 2712 2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe 95 PID 2712 wrote to memory of 704 2712 2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe 95 PID 2712 wrote to memory of 704 2712 2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe 95 PID 2712 wrote to memory of 4516 2712 2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe 96 PID 2712 wrote to memory of 4516 2712 2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe 96 PID 2712 wrote to memory of 4516 2712 2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe 96 PID 704 wrote to memory of 3344 704 {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe 97 PID 704 wrote to memory of 3344 704 {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe 97 PID 704 wrote to memory of 3344 704 {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe 97 PID 704 wrote to memory of 3512 704 {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe 98 PID 704 wrote to memory of 3512 704 {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe 98 PID 704 wrote to memory of 3512 704 {09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe 98 PID 3344 wrote to memory of 5000 3344 {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe 100 PID 3344 wrote to memory of 5000 3344 {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe 100 PID 3344 wrote to memory of 5000 3344 {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe 100 PID 3344 wrote to memory of 1096 3344 {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe 101 PID 3344 wrote to memory of 1096 3344 {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe 101 PID 3344 wrote to memory of 1096 3344 {A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe 101 PID 5000 wrote to memory of 3012 5000 {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe 102 PID 5000 wrote to memory of 3012 5000 {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe 102 PID 5000 wrote to memory of 3012 5000 {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe 102 PID 5000 wrote to memory of 2012 5000 {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe 103 PID 5000 wrote to memory of 2012 5000 {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe 103 PID 5000 wrote to memory of 2012 5000 {57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe 103 PID 3012 wrote to memory of 3156 3012 {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe 104 PID 3012 wrote to memory of 3156 3012 {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe 104 PID 3012 wrote to memory of 3156 3012 {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe 104 PID 3012 wrote to memory of 4000 3012 {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe 105 PID 3012 wrote to memory of 4000 3012 {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe 105 PID 3012 wrote to memory of 4000 3012 {BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe 105 PID 3156 wrote to memory of 3436 3156 {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe 106 PID 3156 wrote to memory of 3436 3156 {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe 106 PID 3156 wrote to memory of 3436 3156 {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe 106 PID 3156 wrote to memory of 4908 3156 {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe 107 PID 3156 wrote to memory of 4908 3156 {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe 107 PID 3156 wrote to memory of 4908 3156 {979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe 107 PID 3436 wrote to memory of 2224 3436 {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe 108 PID 3436 wrote to memory of 2224 3436 {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe 108 PID 3436 wrote to memory of 2224 3436 {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe 108 PID 3436 wrote to memory of 4568 3436 {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe 109 PID 3436 wrote to memory of 4568 3436 {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe 109 PID 3436 wrote to memory of 4568 3436 {35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe 109 PID 2224 wrote to memory of 3864 2224 {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe 110 PID 2224 wrote to memory of 3864 2224 {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe 110 PID 2224 wrote to memory of 3864 2224 {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe 110 PID 2224 wrote to memory of 4840 2224 {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe 111 PID 2224 wrote to memory of 4840 2224 {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe 111 PID 2224 wrote to memory of 4840 2224 {D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe 111 PID 3864 wrote to memory of 2620 3864 {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe 112 PID 3864 wrote to memory of 2620 3864 {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe 112 PID 3864 wrote to memory of 2620 3864 {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe 112 PID 3864 wrote to memory of 1844 3864 {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe 113 PID 3864 wrote to memory of 1844 3864 {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe 113 PID 3864 wrote to memory of 1844 3864 {37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe 113 PID 2620 wrote to memory of 2772 2620 {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe 114 PID 2620 wrote to memory of 2772 2620 {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe 114 PID 2620 wrote to memory of 2772 2620 {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe 114 PID 2620 wrote to memory of 3828 2620 {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe 115 PID 2620 wrote to memory of 3828 2620 {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe 115 PID 2620 wrote to memory of 3828 2620 {D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe 115 PID 2772 wrote to memory of 4516 2772 {EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe 116 PID 2772 wrote to memory of 4516 2772 {EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe 116 PID 2772 wrote to memory of 4516 2772 {EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe 116 PID 2772 wrote to memory of 1044 2772 {EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\{09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exeC:\Windows\{09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\{A13EDF19-4A09-4805-B580-96D8EED92DB2}.exeC:\Windows\{A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\{57FC167E-89C4-4d2b-B060-6D4081C76D71}.exeC:\Windows\{57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\{BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exeC:\Windows\{BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\{979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exeC:\Windows\{979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\{35A61D0B-6940-4aee-9E92-1FD9A4926947}.exeC:\Windows\{35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\{D9BDCD7F-83C1-4492-B472-E557188A57C5}.exeC:\Windows\{D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\{37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exeC:\Windows\{37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\{D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exeC:\Windows\{D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\{EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exeC:\Windows\{EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\{D6B0066F-4534-42c1-9417-68B22A18B008}.exeC:\Windows\{D6B0066F-4534-42c1-9417-68B22A18B008}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4516 -
C:\Windows\{5BBFF565-F726-4c9d-86B0-AB7917669C75}.exeC:\Windows\{5BBFF565-F726-4c9d-86B0-AB7917669C75}.exe13⤵
- Executes dropped EXE
PID:704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D6B00~1.EXE > nul13⤵PID:492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA8DC~1.EXE > nul12⤵PID:1044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9E99~1.EXE > nul11⤵PID:3828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37B0A~1.EXE > nul10⤵PID:1844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9BDC~1.EXE > nul9⤵PID:4840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{35A61~1.EXE > nul8⤵PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{979D3~1.EXE > nul7⤵PID:4908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BA167~1.EXE > nul6⤵PID:4000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{57FC1~1.EXE > nul5⤵PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A13ED~1.EXE > nul4⤵PID:1096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{09589~1.EXE > nul3⤵PID:3512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5b478687c855704c0b34ace8c21330748
SHA19d5524f2fb0c74e428abff4d7a2861ef8dfb77ad
SHA256d7a52d31dba7ecad7f14c8e32ab327d4eed7f87ee6a13628495d7c0b3808aad2
SHA512001d70d29c09ebe5f4ab7e0c9123747a65188e1b9aaa304857223844aab5f7d68a37fd67347a9de1bd58d81f8bf7dc00e211e91820d29247adff8dccaadc8ac8
-
Filesize
180KB
MD5f293143cadda4a80d41b783f736c9e85
SHA1191e183755e05446c7d2be8a9f7b10907c396cf5
SHA25630eb2dc755f5bb07b8e30bbf7dade6e76b22409e74ccbb474129d05f6bf91a93
SHA5127867c42be48e5ddcd8bb7ea9fc9434284899e303a210fb84328e306fb44dff6f731fe36fa6bb2facd870c775631680a812d7682efb29194f2700fc8169eae7a7
-
Filesize
180KB
MD50da2da805e474e70918bac92c761299c
SHA172942f9a35cbfcc72d008564f108216feb19c7b5
SHA2566ea8112e8cf4b3aa3d620632c03fceb41cdf5a97589a4310d40ddc2a6acd7f62
SHA512a71b536d3ed524930c7ba07c7c95da40426cce414cc0940ca82ce83ec1b031ed0456cecb227b05f05e6638a8caf995e1db869fe00aab189687900a47058e76f5
-
Filesize
180KB
MD51bd7336e0a8ace05b2f8b5915bb1e1a3
SHA1983da0979910a34f02c948c964e145f86be68fda
SHA256f9ea2b2023803d679860e2f3b03bc60f449adeb5fd6f1fa905115c2910669904
SHA512e266b6da20b3bdbf22b62d6c4a90d6720ee8af7994880f30abc950950ccb76db8a03884dcd45812860ffd0876d82b23b254794fdefbc06b58e6ed1917f53c90d
-
Filesize
180KB
MD538383553f68968ac48db8ad446600ec6
SHA1c2366bd6298757801e6b8f0931fbb44f134aa494
SHA25626fe320f06b21bc45e0aa63f70313c78595bfe093d4cca7c786bff4c5515b8bf
SHA512c899bfad64687c41e8992ce360e50996214bbd05c1ac8b309c210902e91638467be88a7550644054c581d2d8c6a0a6cad9e011febccf7bd03dbb1aa2b30df700
-
Filesize
180KB
MD53114a1c060cff273c658bc32dae7e9f9
SHA11e9079dc467986cd381e59829a6cb8a0b35648a3
SHA2561f22b3435ae3d7c737d8f75ffe5ad30901594735006edae8a66e165c36e42f4a
SHA5122bc64755543f6a42afb9b8509ed3c4883244d87685566f365b627c8619d8ba5399969baec3bc496c5f90ac76ee579ebe5b0fcdabacee991ff749151df1459882
-
Filesize
180KB
MD562bb3f3b5b3ff6b86d4d0d990ed0197e
SHA1a51c3fdca3525557592113678b4f97ea68f5bdcc
SHA256fa89aeb967e30fb15abab6b2074f3dfd8ed42d913db1682c5b30bd9be32fc0f3
SHA5129c8a0909ad4ca1b49cbdeb55ca01716c67b8d94889bd742f8bc6f7f0b6ddce16fb4944e437383b185ac503ffe23d3c77ff355dfee0f21049acee728f4bb901c3
-
Filesize
180KB
MD5301835b067aa84fde1eb1c1348e4a7d2
SHA14cfe63cc9ca389015d552b6ebcd699cb7430a424
SHA2561f2a8636ca339c67afb9b53479df76697437a6a2bf0b94f257362151050d2922
SHA51226f08c6f38c48fe86375b452c09ae0bf89a49e66ed05aec4edc41103b242bb6117cf8dcc62bfbeb5ede18a8547bd5c353351d80de9b20d1f189b3bdb5b1dbccc
-
Filesize
180KB
MD568344a6729ddc8d690ad7cebe8a2895b
SHA142bea27340aacfe82764ce453e182d4d10290932
SHA2560838649b9851a0b4388e0e0e03b38fb6e332d160a037126f6d326d763b856c6a
SHA512fd36aba1188992c441877b024c58c753da3b32911221d4d62dedc90aa7a7606284a69b348d2f0a79cb78c0c9137fa113d640ab8940cfdc7b299bcb71dad4cead
-
Filesize
180KB
MD54edc5736cd8b1af2fbd8fca468038ce3
SHA198183002b718cc50faf95582b6fa0eeab05fd6ce
SHA256927b2423fa153533575c65773adc63b91997069a04bc9009076da982107753c8
SHA512874d2dd20adb20f2f6769cdf82562f2d036d43cbf6a480f0a3ce7d0263dd05895414e43b41bde2104166aa44451ef7e61ba2640f2e5a9d04d8d2d85a982ab8de
-
Filesize
180KB
MD591c83711996d4105cc715930cc75bf9c
SHA102c315481f9c306455455b165bf3c258e9bb8096
SHA25673834a905678d2e9e7b68ee80380dec6aed82f0a1238e20ae005cf088c99ca01
SHA5122c3551b66456161229290989ec3648022b58cb6e3847e4905683644d9f7fc7816e63d7dde196fb2cbcf964503505fecc477d84f38288502e043b0d2ff37de905
-
Filesize
180KB
MD5df032f9de2af74bf0d4c5ae42791da8a
SHA1ea84b9d69c114745f81aaaecedbb0aeacb49726d
SHA25607b9503384444eb6c15da88cd6b435db0c138ddeb1dace0617e5bfa227c7e557
SHA51279d4d412bf337e76c6e05065056b2fbb00450daf64287aead11a79da851d7ad6f13b29f65439baf02c0e131ab92132d516563a7ba3c1009275da559c2dbbff9c