Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 16:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe
-
Size
408KB
-
MD5
c640cad00d33bdb80c5825847634a27b
-
SHA1
adce47bf433e76ec23d9471e87ed369a80eb51f2
-
SHA256
626379c00f64a824f5b680eb0a1359efc2659dabce4c63edd0c2928b2854c63d
-
SHA512
a2975b539fd3237a476b86cc8e08a441a7fef349a0c1dc5445d4b5ee78ce33e5eecdde1ff6f510e5ac6843dbadb8a6358a00d4c603dbffd8f7f01ed70750a487
-
SSDEEP
3072:CEGh0oLl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGJldOe2MUVg3vTeKcAEciTBqr3jy9
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0011000000023226-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023219-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002322d-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023219-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021df7-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021df8-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000021df7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000707-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000709-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000707-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000709-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000000707-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FBD5573A-ABCB-4f44-A8A0-425C123FC6F6} {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}\stubpath = "C:\\Windows\\{FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe" {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01108F4E-08E6-4233-8135-C28F548811BF} 2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EE18770B-E5DC-4591-870F-50D3FFCBE9C0} {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809} {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}\stubpath = "C:\\Windows\\{1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe" {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{79F1170E-7513-487a-9D65-30BF6552081B} {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}\stubpath = "C:\\Windows\\{DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe" {79F1170E-7513-487a-9D65-30BF6552081B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A76805A6-B69E-4b18-957D-45A758B2750F} {7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4E549B19-FCCF-49fb-8C29-669434030227} {A76805A6-B69E-4b18-957D-45A758B2750F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01108F4E-08E6-4233-8135-C28F548811BF}\stubpath = "C:\\Windows\\{01108F4E-08E6-4233-8135-C28F548811BF}.exe" 2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}\stubpath = "C:\\Windows\\{ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe" {01108F4E-08E6-4233-8135-C28F548811BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4} {79F1170E-7513-487a-9D65-30BF6552081B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6458604F-6DCB-495d-9A71-ABF1D1D3CE7C} {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}\stubpath = "C:\\Windows\\{6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe" {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D} {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A76805A6-B69E-4b18-957D-45A758B2750F}\stubpath = "C:\\Windows\\{A76805A6-B69E-4b18-957D-45A758B2750F}.exe" {7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B} {01108F4E-08E6-4233-8135-C28F548811BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EE18770B-E5DC-4591-870F-50D3FFCBE9C0}\stubpath = "C:\\Windows\\{EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe" {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{79F1170E-7513-487a-9D65-30BF6552081B}\stubpath = "C:\\Windows\\{79F1170E-7513-487a-9D65-30BF6552081B}.exe" {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00F30146-A913-4ab4-B2AF-7838FB8E23D4} {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00F30146-A913-4ab4-B2AF-7838FB8E23D4}\stubpath = "C:\\Windows\\{00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe" {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}\stubpath = "C:\\Windows\\{7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe" {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4E549B19-FCCF-49fb-8C29-669434030227}\stubpath = "C:\\Windows\\{4E549B19-FCCF-49fb-8C29-669434030227}.exe" {A76805A6-B69E-4b18-957D-45A758B2750F}.exe -
Executes dropped EXE 12 IoCs
pid Process 3784 {01108F4E-08E6-4233-8135-C28F548811BF}.exe 3536 {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe 2384 {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe 2456 {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe 2516 {79F1170E-7513-487a-9D65-30BF6552081B}.exe 3392 {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe 3052 {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe 528 {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe 4180 {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe 4748 {7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe 2664 {A76805A6-B69E-4b18-957D-45A758B2750F}.exe 2980 {4E549B19-FCCF-49fb-8C29-669434030227}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe File created C:\Windows\{6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe File created C:\Windows\{ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe {01108F4E-08E6-4233-8135-C28F548811BF}.exe File created C:\Windows\{EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe File created C:\Windows\{1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe File created C:\Windows\{79F1170E-7513-487a-9D65-30BF6552081B}.exe {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe File created C:\Windows\{A76805A6-B69E-4b18-957D-45A758B2750F}.exe {7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe File created C:\Windows\{4E549B19-FCCF-49fb-8C29-669434030227}.exe {A76805A6-B69E-4b18-957D-45A758B2750F}.exe File created C:\Windows\{01108F4E-08E6-4233-8135-C28F548811BF}.exe 2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe File created C:\Windows\{DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe {79F1170E-7513-487a-9D65-30BF6552081B}.exe File created C:\Windows\{00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe File created C:\Windows\{7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4344 2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe Token: SeIncBasePriorityPrivilege 3784 {01108F4E-08E6-4233-8135-C28F548811BF}.exe Token: SeIncBasePriorityPrivilege 3536 {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe Token: SeIncBasePriorityPrivilege 2384 {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe Token: SeIncBasePriorityPrivilege 2456 {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe Token: SeIncBasePriorityPrivilege 2516 {79F1170E-7513-487a-9D65-30BF6552081B}.exe Token: SeIncBasePriorityPrivilege 3392 {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe Token: SeIncBasePriorityPrivilege 3052 {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe Token: SeIncBasePriorityPrivilege 528 {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe Token: SeIncBasePriorityPrivilege 4180 {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe Token: SeIncBasePriorityPrivilege 4748 {7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe Token: SeIncBasePriorityPrivilege 2664 {A76805A6-B69E-4b18-957D-45A758B2750F}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 3784 4344 2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe 96 PID 4344 wrote to memory of 3784 4344 2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe 96 PID 4344 wrote to memory of 3784 4344 2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe 96 PID 4344 wrote to memory of 2788 4344 2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe 97 PID 4344 wrote to memory of 2788 4344 2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe 97 PID 4344 wrote to memory of 2788 4344 2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe 97 PID 3784 wrote to memory of 3536 3784 {01108F4E-08E6-4233-8135-C28F548811BF}.exe 98 PID 3784 wrote to memory of 3536 3784 {01108F4E-08E6-4233-8135-C28F548811BF}.exe 98 PID 3784 wrote to memory of 3536 3784 {01108F4E-08E6-4233-8135-C28F548811BF}.exe 98 PID 3784 wrote to memory of 4032 3784 {01108F4E-08E6-4233-8135-C28F548811BF}.exe 99 PID 3784 wrote to memory of 4032 3784 {01108F4E-08E6-4233-8135-C28F548811BF}.exe 99 PID 3784 wrote to memory of 4032 3784 {01108F4E-08E6-4233-8135-C28F548811BF}.exe 99 PID 3536 wrote to memory of 2384 3536 {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe 101 PID 3536 wrote to memory of 2384 3536 {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe 101 PID 3536 wrote to memory of 2384 3536 {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe 101 PID 3536 wrote to memory of 3704 3536 {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe 102 PID 3536 wrote to memory of 3704 3536 {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe 102 PID 3536 wrote to memory of 3704 3536 {ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe 102 PID 2384 wrote to memory of 2456 2384 {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe 103 PID 2384 wrote to memory of 2456 2384 {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe 103 PID 2384 wrote to memory of 2456 2384 {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe 103 PID 2384 wrote to memory of 4140 2384 {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe 104 PID 2384 wrote to memory of 4140 2384 {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe 104 PID 2384 wrote to memory of 4140 2384 {EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe 104 PID 2456 wrote to memory of 2516 2456 {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe 105 PID 2456 wrote to memory of 2516 2456 {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe 105 PID 2456 wrote to memory of 2516 2456 {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe 105 PID 2456 wrote to memory of 4284 2456 {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe 106 PID 2456 wrote to memory of 4284 2456 {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe 106 PID 2456 wrote to memory of 4284 2456 {1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe 106 PID 2516 wrote to memory of 3392 2516 {79F1170E-7513-487a-9D65-30BF6552081B}.exe 107 PID 2516 wrote to memory of 3392 2516 {79F1170E-7513-487a-9D65-30BF6552081B}.exe 107 PID 2516 wrote to memory of 3392 2516 {79F1170E-7513-487a-9D65-30BF6552081B}.exe 107 PID 2516 wrote to memory of 3920 2516 {79F1170E-7513-487a-9D65-30BF6552081B}.exe 108 PID 2516 wrote to memory of 3920 2516 {79F1170E-7513-487a-9D65-30BF6552081B}.exe 108 PID 2516 wrote to memory of 3920 2516 {79F1170E-7513-487a-9D65-30BF6552081B}.exe 108 PID 3392 wrote to memory of 3052 3392 {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe 109 PID 3392 wrote to memory of 3052 3392 {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe 109 PID 3392 wrote to memory of 3052 3392 {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe 109 PID 3392 wrote to memory of 2280 3392 {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe 110 PID 3392 wrote to memory of 2280 3392 {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe 110 PID 3392 wrote to memory of 2280 3392 {DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe 110 PID 3052 wrote to memory of 528 3052 {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe 111 PID 3052 wrote to memory of 528 3052 {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe 111 PID 3052 wrote to memory of 528 3052 {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe 111 PID 3052 wrote to memory of 4808 3052 {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe 112 PID 3052 wrote to memory of 4808 3052 {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe 112 PID 3052 wrote to memory of 4808 3052 {FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe 112 PID 528 wrote to memory of 4180 528 {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe 113 PID 528 wrote to memory of 4180 528 {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe 113 PID 528 wrote to memory of 4180 528 {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe 113 PID 528 wrote to memory of 4624 528 {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe 114 PID 528 wrote to memory of 4624 528 {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe 114 PID 528 wrote to memory of 4624 528 {00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe 114 PID 4180 wrote to memory of 4748 4180 {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe 115 PID 4180 wrote to memory of 4748 4180 {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe 115 PID 4180 wrote to memory of 4748 4180 {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe 115 PID 4180 wrote to memory of 4968 4180 {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe 116 PID 4180 wrote to memory of 4968 4180 {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe 116 PID 4180 wrote to memory of 4968 4180 {6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe 116 PID 4748 wrote to memory of 2664 4748 {7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe 117 PID 4748 wrote to memory of 2664 4748 {7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe 117 PID 4748 wrote to memory of 2664 4748 {7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe 117 PID 4748 wrote to memory of 4344 4748 {7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-05_c640cad00d33bdb80c5825847634a27b_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\{01108F4E-08E6-4233-8135-C28F548811BF}.exeC:\Windows\{01108F4E-08E6-4233-8135-C28F548811BF}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\{ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exeC:\Windows\{ADE1286A-633D-4d70-8FF8-D97A1EDAFC9B}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\{EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exeC:\Windows\{EE18770B-E5DC-4591-870F-50D3FFCBE9C0}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\{1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exeC:\Windows\{1ACAAB9B-CCCA-412e-AF9A-1EE00E2D1809}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\{79F1170E-7513-487a-9D65-30BF6552081B}.exeC:\Windows\{79F1170E-7513-487a-9D65-30BF6552081B}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\{DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exeC:\Windows\{DC94567B-FFC7-46df-BCD3-DBC9F2A49FD4}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\{FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exeC:\Windows\{FBD5573A-ABCB-4f44-A8A0-425C123FC6F6}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\{00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exeC:\Windows\{00F30146-A913-4ab4-B2AF-7838FB8E23D4}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\{6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exeC:\Windows\{6458604F-6DCB-495d-9A71-ABF1D1D3CE7C}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\{7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exeC:\Windows\{7E4B71E5-4FA3-4882-BEB8-DFCC4C0F986D}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\{A76805A6-B69E-4b18-957D-45A758B2750F}.exeC:\Windows\{A76805A6-B69E-4b18-957D-45A758B2750F}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2664 -
C:\Windows\{4E549B19-FCCF-49fb-8C29-669434030227}.exeC:\Windows\{4E549B19-FCCF-49fb-8C29-669434030227}.exe13⤵
- Executes dropped EXE
PID:2980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A7680~1.EXE > nul13⤵PID:8
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E4B7~1.EXE > nul12⤵PID:4344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{64586~1.EXE > nul11⤵PID:4968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{00F30~1.EXE > nul10⤵PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FBD55~1.EXE > nul9⤵PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DC945~1.EXE > nul8⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79F11~1.EXE > nul7⤵PID:3920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1ACAA~1.EXE > nul6⤵PID:4284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EE187~1.EXE > nul5⤵PID:4140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ADE12~1.EXE > nul4⤵PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{01108~1.EXE > nul3⤵PID:4032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5ff7e8d07c2316ce73535cc6ec67a8309
SHA19616defbb8a4e5acf2164e96dcaa7b9f794686ca
SHA256f225598880ccfa4689dd18a7b6214026b131617ed9f90edcd549500355ae0bde
SHA5129309e237930d4eaf6d633c8b28db298ab0adf9747b6c1b2b823bfde0d47685f046ce75e33a0dee7ed272edcb18096cb86e1e9b105656f9192bf748472943db23
-
Filesize
408KB
MD594200d7dbfbaae82e49afdd3872e75aa
SHA1576fd239072f3a7a61f290c3f1339f7e7a1e5bad
SHA25689c41a1547f0efc46c8ab3340fa535a9dcd2e6666127515b34031bf4fea2d888
SHA512dd629d0c486e3b80aec747938ef62b2c40ab81d95d3708d25558f78558061f439117af0f880d660a1bc77cb13908ea82baf9e3221eb73812efac847a8a3b75cf
-
Filesize
408KB
MD55e40bbad783f688f0f6c43a6d1e15ffb
SHA1eabb40e0672f50faa169cd3158aaac4cdb6fadfd
SHA2568b24981f9cfe5444d23e0d40c4f2d62af794cc007bd63f5b356373b96eae050d
SHA5128d04734c3e5d5841186aaf39677136d86b0b1ad219b771a413aa81e5387aa07226035a15f8eba2451e706eeb6bf3affb3b7ce0562b7203fdaeaf93584b0c80c8
-
Filesize
408KB
MD5920e58c6d9d9e1b226824163e08faa00
SHA102a28b824fa33b8c92d72657e00ac8f06300da9c
SHA2563a3e43886304896749aa693116e28793ed14fa0f5b7bcef0231a03d6b1add2c9
SHA5125102d71861c70a833865ed4dea30bf9037ba8aadcfd7cf2d4dc3b7ba6b2eff636b68e0e988a2114673f0772a36dc7e3ca91dede0c6f386b1a35a86ec31a7fa5c
-
Filesize
408KB
MD585d6afea112b3f26bdada9fb9b6d9a3a
SHA1245e78e444f61eb5f87b4bea24310027c982f838
SHA256b6f9a32c7bb4137f746e96bf248de97ba564fb6d038a62f2af550f7d1cf14cfc
SHA512aca96f4efd4eec6760d06bfd219510ae3d9ef4930b507774274393c11f450adf3a833de05847ee0cffab6eec244602b8b774d2cab58ae0156ced032c80738005
-
Filesize
408KB
MD52b8435eb3a4598e8787832fb6ca2eb1a
SHA171cd44064130bc73d6dd08f5eddf7fa0af357596
SHA256deada0febf34b7a4549c40895d509a9b132da4108bd94eb357f44c6be36f849a
SHA512b10a8010836dbb8d4655f4ea620673853e44c6341b01f0bb3a39e3eb0addd2608dfdfa66033073d98cb3b1a39f72e69f3678d99511f7f31563e165ef88933e36
-
Filesize
408KB
MD5bd22d63ab630df04b204b70ed8112420
SHA12cbaaa36ad9db4177d6c213b0d2db769d7a71714
SHA256e457083283dd16f078fef49cc644a5e980d567ef3f960367272326597c82a2c5
SHA512a7ab9556f2a52d3bc471029ce4d8ef8871c03e0ff5928d1db439ff8cba653b06aa3d5d6043df98a82da1253d58c939c50cc913a8ac59f7d37250afe6f8f0fcc7
-
Filesize
408KB
MD52da0cec187fadab9e451d391594b4ba4
SHA155398bcfed5d020d05fb407978f82854d39d5b54
SHA256454027b0ae47bcc180dce2c38f1bf26921e93054d0f56916e1037a2615f3c40b
SHA512410ae69f09678ac6f890750b4a0f84b2a20ac51624345df7fe0f3c81e5a40ead49a2fc9d0092e7e470f4f103e897797a71e904d8c3a3dd5fc49ca6e826c0a42f
-
Filesize
408KB
MD5a1f18b79f21e6db1ffd1a932511120e1
SHA1487332ed9b0ebab48cf115c8324d5005ca997953
SHA2566d293908b74d4e02c3b367c7da867d4f1053a6a8e9ef3c10178047dfc3104a85
SHA512cbca171a46c7009d4a77259333efaad19924174750010b8b0abe68738e23954281ed352fb18fb716a9e8f4e6797b88f031822ad49b0e14474a3573bb55a1faae
-
Filesize
408KB
MD5b09164a16d2201b2325dbdeb423956eb
SHA1ab8e732fe0452a2ae822c953e48fe3f26445ca73
SHA256342a482162f7a75dc1fe776070ff8d71080008c073ea567123f535444c6305f3
SHA5128b89e27c7d9e0562f1823bcc14d8f492a893d51cc675e9408160052aababd09f3f667ce0914cc027fc9dfcfaee9ea8c58803baece500571917e6e3abc840ed8a
-
Filesize
408KB
MD502ea8fac3c3a7743ababd1064298c080
SHA1d2ae3e767c2765fa3b4443ada393eae64b96f167
SHA2562eab14b41b2608a15e18fe035553ed43ab275fce9fc4bc9c3bdec7a99ac604e4
SHA5128f3b15ff8b164408393060b6d169059298856622f380a3bd0c7cf0f79c25fa7535382cf9e3784dae8437fb1b88285338b4368aa805e6e79b83f1965a237e6b57
-
Filesize
408KB
MD53849a061e14dbeedac522f78cd13bdd1
SHA16ccd3a329902170774a2cee6a6e55cad52c5ad9d
SHA256f223e0604abf8c257ce47e1b0fb63e52bc77689696f928d508e1148c0395c986
SHA512b1e1a733627d6dcd45356ac6785aee136889a84c7ace286edc57f2b4484e871e862b6e19f34aad07bdfdf9c98edac711a3ce84de72e0334219617c6493fefadd