Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe
-
Size
216KB
-
MD5
ef20021104bce40f4af90b7ad71c7acc
-
SHA1
ce57187802b1014b27d0bf7897813df9878ccc40
-
SHA256
d7b17ac30b6a7df504bf23fbb82d3d536cd48fb079605bfd9ae5ae85fc637fd9
-
SHA512
6bb6da31b42c3e6e72c9267fbdcd2eff9f55aa0c581d3cc6e996b90830ff979edc900e2c5568dca00604730d60aca9b19397be59d10eca1801287b90314b00e0
-
SSDEEP
3072:jEGh0o4l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGylEeKcAEcGy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x00070000000231d4-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00110000000231d9-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000231e0-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00120000000231d9-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021fa2-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021fa3-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000021fa2-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000703-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000705-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000703-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000705-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000072b-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E81224E-239F-403e-B7CD-0662F1CFE85A} {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F543225-7F6F-4e12-A2CE-07233808DD3E}\stubpath = "C:\\Windows\\{2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe" {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0EFA2C6-BA64-4fbb-B518-82451D8FB58B} {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B8CBE83-B169-470f-9E9B-69A00F902B8E} {4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1F64648-FDFF-46b5-8827-14E1F663AB5D} 2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}\stubpath = "C:\\Windows\\{A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe" {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A7C43C1-DCAB-486e-9132-9BCA79A376D8} {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A7C43C1-DCAB-486e-9132-9BCA79A376D8}\stubpath = "C:\\Windows\\{5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe" {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D5277127-EEFE-4e04-862F-DD4A17984162}\stubpath = "C:\\Windows\\{D5277127-EEFE-4e04-862F-DD4A17984162}.exe" {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{55523BD2-31B8-45b2-990C-3F510DCEC6F2}\stubpath = "C:\\Windows\\{55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe" {D5277127-EEFE-4e04-862F-DD4A17984162}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FFCF568-5E33-4069-91DC-5ABA91F0F341} {55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B8CBE83-B169-470f-9E9B-69A00F902B8E}\stubpath = "C:\\Windows\\{9B8CBE83-B169-470f-9E9B-69A00F902B8E}.exe" {4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F543225-7F6F-4e12-A2CE-07233808DD3E} {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66963EC5-9064-44f1-9D18-E332B4FF9AAA} {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5E436C88-BE69-4df6-8C3E-4C144F2C1742}\stubpath = "C:\\Windows\\{5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe" {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66963EC5-9064-44f1-9D18-E332B4FF9AAA}\stubpath = "C:\\Windows\\{66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe" {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C8784BEF-141E-4b03-85C2-0191C46E0EE7} {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C8784BEF-141E-4b03-85C2-0191C46E0EE7}\stubpath = "C:\\Windows\\{C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe" {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E81224E-239F-403e-B7CD-0662F1CFE85A}\stubpath = "C:\\Windows\\{8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe" {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D5277127-EEFE-4e04-862F-DD4A17984162} {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1F64648-FDFF-46b5-8827-14E1F663AB5D}\stubpath = "C:\\Windows\\{E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe" 2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5E436C88-BE69-4df6-8C3E-4C144F2C1742} {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{55523BD2-31B8-45b2-990C-3F510DCEC6F2} {D5277127-EEFE-4e04-862F-DD4A17984162}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FFCF568-5E33-4069-91DC-5ABA91F0F341}\stubpath = "C:\\Windows\\{4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe" {55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe -
Executes dropped EXE 12 IoCs
pid Process 4828 {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe 528 {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe 1356 {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe 2060 {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe 4940 {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe 4320 {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe 3216 {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe 4380 {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe 3012 {D5277127-EEFE-4e04-862F-DD4A17984162}.exe 3140 {55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe 4452 {4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe 4664 {9B8CBE83-B169-470f-9E9B-69A00F902B8E}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe File created C:\Windows\{C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe File created C:\Windows\{A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe File created C:\Windows\{8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe File created C:\Windows\{4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe {55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe File created C:\Windows\{9B8CBE83-B169-470f-9E9B-69A00F902B8E}.exe {4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe File created C:\Windows\{E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe 2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe File created C:\Windows\{5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe File created C:\Windows\{D5277127-EEFE-4e04-862F-DD4A17984162}.exe {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe File created C:\Windows\{55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe {D5277127-EEFE-4e04-862F-DD4A17984162}.exe File created C:\Windows\{66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe File created C:\Windows\{5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4668 2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe Token: SeIncBasePriorityPrivilege 4828 {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe Token: SeIncBasePriorityPrivilege 528 {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe Token: SeIncBasePriorityPrivilege 1356 {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe Token: SeIncBasePriorityPrivilege 2060 {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe Token: SeIncBasePriorityPrivilege 4940 {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe Token: SeIncBasePriorityPrivilege 4320 {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe Token: SeIncBasePriorityPrivilege 3216 {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe Token: SeIncBasePriorityPrivilege 4380 {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe Token: SeIncBasePriorityPrivilege 3012 {D5277127-EEFE-4e04-862F-DD4A17984162}.exe Token: SeIncBasePriorityPrivilege 3140 {55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe Token: SeIncBasePriorityPrivilege 4452 {4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4828 4668 2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe 96 PID 4668 wrote to memory of 4828 4668 2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe 96 PID 4668 wrote to memory of 4828 4668 2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe 96 PID 4668 wrote to memory of 4164 4668 2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe 97 PID 4668 wrote to memory of 4164 4668 2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe 97 PID 4668 wrote to memory of 4164 4668 2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe 97 PID 4828 wrote to memory of 528 4828 {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe 98 PID 4828 wrote to memory of 528 4828 {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe 98 PID 4828 wrote to memory of 528 4828 {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe 98 PID 4828 wrote to memory of 4008 4828 {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe 99 PID 4828 wrote to memory of 4008 4828 {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe 99 PID 4828 wrote to memory of 4008 4828 {E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe 99 PID 528 wrote to memory of 1356 528 {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe 101 PID 528 wrote to memory of 1356 528 {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe 101 PID 528 wrote to memory of 1356 528 {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe 101 PID 528 wrote to memory of 1380 528 {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe 102 PID 528 wrote to memory of 1380 528 {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe 102 PID 528 wrote to memory of 1380 528 {5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe 102 PID 1356 wrote to memory of 2060 1356 {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe 103 PID 1356 wrote to memory of 2060 1356 {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe 103 PID 1356 wrote to memory of 2060 1356 {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe 103 PID 1356 wrote to memory of 2204 1356 {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe 104 PID 1356 wrote to memory of 2204 1356 {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe 104 PID 1356 wrote to memory of 2204 1356 {2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe 104 PID 2060 wrote to memory of 4940 2060 {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe 105 PID 2060 wrote to memory of 4940 2060 {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe 105 PID 2060 wrote to memory of 4940 2060 {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe 105 PID 2060 wrote to memory of 2272 2060 {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe 106 PID 2060 wrote to memory of 2272 2060 {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe 106 PID 2060 wrote to memory of 2272 2060 {66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe 106 PID 4940 wrote to memory of 4320 4940 {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe 107 PID 4940 wrote to memory of 4320 4940 {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe 107 PID 4940 wrote to memory of 4320 4940 {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe 107 PID 4940 wrote to memory of 4732 4940 {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe 108 PID 4940 wrote to memory of 4732 4940 {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe 108 PID 4940 wrote to memory of 4732 4940 {C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe 108 PID 4320 wrote to memory of 3216 4320 {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe 109 PID 4320 wrote to memory of 3216 4320 {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe 109 PID 4320 wrote to memory of 3216 4320 {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe 109 PID 4320 wrote to memory of 3524 4320 {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe 110 PID 4320 wrote to memory of 3524 4320 {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe 110 PID 4320 wrote to memory of 3524 4320 {A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe 110 PID 3216 wrote to memory of 4380 3216 {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe 111 PID 3216 wrote to memory of 4380 3216 {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe 111 PID 3216 wrote to memory of 4380 3216 {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe 111 PID 3216 wrote to memory of 4384 3216 {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe 112 PID 3216 wrote to memory of 4384 3216 {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe 112 PID 3216 wrote to memory of 4384 3216 {8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe 112 PID 4380 wrote to memory of 3012 4380 {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe 113 PID 4380 wrote to memory of 3012 4380 {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe 113 PID 4380 wrote to memory of 3012 4380 {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe 113 PID 4380 wrote to memory of 1068 4380 {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe 114 PID 4380 wrote to memory of 1068 4380 {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe 114 PID 4380 wrote to memory of 1068 4380 {5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe 114 PID 3012 wrote to memory of 3140 3012 {D5277127-EEFE-4e04-862F-DD4A17984162}.exe 115 PID 3012 wrote to memory of 3140 3012 {D5277127-EEFE-4e04-862F-DD4A17984162}.exe 115 PID 3012 wrote to memory of 3140 3012 {D5277127-EEFE-4e04-862F-DD4A17984162}.exe 115 PID 3012 wrote to memory of 992 3012 {D5277127-EEFE-4e04-862F-DD4A17984162}.exe 116 PID 3012 wrote to memory of 992 3012 {D5277127-EEFE-4e04-862F-DD4A17984162}.exe 116 PID 3012 wrote to memory of 992 3012 {D5277127-EEFE-4e04-862F-DD4A17984162}.exe 116 PID 3140 wrote to memory of 4452 3140 {55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe 117 PID 3140 wrote to memory of 4452 3140 {55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe 117 PID 3140 wrote to memory of 4452 3140 {55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe 117 PID 3140 wrote to memory of 3764 3140 {55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\{E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exeC:\Windows\{E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\{5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exeC:\Windows\{5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\{2F543225-7F6F-4e12-A2CE-07233808DD3E}.exeC:\Windows\{2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\{66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exeC:\Windows\{66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\{C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exeC:\Windows\{C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\{A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exeC:\Windows\{A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\{8E81224E-239F-403e-B7CD-0662F1CFE85A}.exeC:\Windows\{8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\{5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exeC:\Windows\{5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\{D5277127-EEFE-4e04-862F-DD4A17984162}.exeC:\Windows\{D5277127-EEFE-4e04-862F-DD4A17984162}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\{55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exeC:\Windows\{55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\{4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exeC:\Windows\{4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4452 -
C:\Windows\{9B8CBE83-B169-470f-9E9B-69A00F902B8E}.exeC:\Windows\{9B8CBE83-B169-470f-9E9B-69A00F902B8E}.exe13⤵
- Executes dropped EXE
PID:4664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4FFCF~1.EXE > nul13⤵PID:456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{55523~1.EXE > nul12⤵PID:3764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D5277~1.EXE > nul11⤵PID:992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A7C4~1.EXE > nul10⤵PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E812~1.EXE > nul9⤵PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A0EFA~1.EXE > nul8⤵PID:3524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C8784~1.EXE > nul7⤵PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{66963~1.EXE > nul6⤵PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2F543~1.EXE > nul5⤵PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5E436~1.EXE > nul4⤵PID:1380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1F64~1.EXE > nul3⤵PID:4008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5f019fa12e39d23d8167087020d2f1e2a
SHA1453d3ea7dfd0e8605e22a26035b983b83f2c528c
SHA256cde24de2d3d74cc7f11da5296e706fc861158545eaac8de0644ad9463d4b7e54
SHA5127e7d57a5c9f171728245688c00cfd5cf9b74c41ddfcd13a8a1b397c57f940782370fe0dedc8f15e6f64a3a872881a620b10f6703267d616032150503c85e419c
-
Filesize
216KB
MD5d87278ac25d26b954d460a849e8b2c32
SHA1f9143f523f32ef8b7ffe61084265134b086d0ad0
SHA25649a43d29cb277e12ab82e51af507e604f80c0c063ca828f635be23b183123261
SHA512d314b99a0032c29e46f8d9618d86e51309cbc6c457e62cc07f6dd589d4709a982ae1bb360c638482ddca8409935c38dd2dbd882f1131201a5dfd4c400cb8817c
-
Filesize
216KB
MD5534e979881e3c7e28412484c54e1f6b1
SHA1f5ab27eb3ded1b139a20482c7ae41ae74e134936
SHA25639b07f4b1375221dc7913fdeae9e74eb3fdb34d69ba79f850c63edf155c8f2ce
SHA5126931729cc1c95aabb7b343459a78c8ae75099aeb13e39cd97d5fcc56d70c08c7caaa3173608ce27e18be3252364c787489d12c375f4aef20d0fef3369db7a22f
-
Filesize
216KB
MD5f116d950ba32ce4e2d80b85850a6efcb
SHA1eebb01ace99b297bd2f48f2f6412207e9d7dbf0c
SHA2561382fc2f480f506c4a3b359b795e0a725d337b1698615dfea02aa08e9d308847
SHA5126fb0e1e2b3c33c4d4ff43f9f94b5c2b09f7499527a2a07882d1afa567360e632f2886913458cbe6802bf4faa7692b5594280437336edcfc1c0141145de24bd36
-
Filesize
216KB
MD5624180881ae85e845e4f713510c536cb
SHA11c857eb1cc63d218bd437118db264374f5b96bdf
SHA256a65068bac1daf907e7f48db367748158a13506bc7a7171ee048628ab41c6f78a
SHA512fbde48c831ab16a551835b4ecf2807c868a641d588e5cd34a39e2e2332590994c8029c22bf329a290ce5c856151cd7a2a8c96bbf7ef5da982ef56732b0f04896
-
Filesize
216KB
MD550f20144ab2fe40fe5b80c5ddca1e509
SHA1e3ebf100c5a38b5803ce6a856cacfc9670acb536
SHA2563308673b741ddc7d040a353caa6f6a7c96954ebb15efdf634dc00156b21801ab
SHA512049270a98822d392bb295c123dc42f0f65f53b1a40c1e3e901d4900e1d4a47ca5410f98c694a4bd8c7be2eeed12dec848e9dec1758d53119ae1809d6615ece4f
-
Filesize
216KB
MD5ba0c35e2ba668f21569b48fb066f2595
SHA10b3337e6533abab10dab1b7652e3db6afe07b31b
SHA256b8b08449665804b4f5e5ca34b508e2d1fbb4ed1ab17fcb355ca5869d5b0b4b1c
SHA512c1cca0e796b224587520bdde2753708df0e5b2e089eed8e5ae31fbce070ac1ad18ebe239a592bbf645658a6b867a575fb8829552db9ab7ceb659b38a95b5339d
-
Filesize
216KB
MD57b2f7f72f0b12b21bf6e9894c9110dcb
SHA1f505a8298f1aa24ed2f3bf0654cb949a1ae835a4
SHA2564a53c7e1eb8e7cdf06e8b1c35cc58fcb47eab4db0758de5b47a3937f9fadf11b
SHA512ec28fcee959d76f39ed65b9032849a1ddd9bb0cde599e64e24a54bcd0cf7075ef08a9531a884ca4e3ee84440894c499e0f11ba0d36bd84e80606b3e980dae074
-
Filesize
216KB
MD59e7c5335695d2a124673680f5f8247a0
SHA188689b76d857910a98660ccc77b2fcde8ac206bb
SHA256f4307344ad907a4a1c4df2c578f16ce611f65dba2c7640b822811b50dffde73a
SHA51248db1d6f2127f7769cb8af519bbb75f0349c63df1b94cc6b7b60688743c73f4ffd1bc4cdd4b8c69cb71098fbc68997abf61a202278af99293f1d06117b6a363a
-
Filesize
216KB
MD55b6f2cacd3a9269a32337bf8885b2445
SHA1f96d3d7f9c76179d81ed9f92d1c3142ece8ca9ba
SHA25619a16333e321a3d2b1865b939fc0f330179e630da9fd0310a5adac488efb1a9b
SHA512ff5c7c01db9ac5784b32456278245f38c2c2e302b05cf54b88c27e029c6183dee43aab18acde9a4e3a1453968e22aea326e6c59e987e1ae079968432b6c1497a
-
Filesize
216KB
MD5e78955368e5abd7ea1b865e39cb1abbe
SHA1a594f41f983d21ef223ea427e51a1f9eadaaf320
SHA256ab2da7f252f0ef32624a55a7189ef43b420b24951929d851f621ef8a2a2e91de
SHA512167a39d4e7c170557d7fa1a2d96c4ca5f50e3b1b7533f002b1b91c72861d6af026bf44f82659e4f9021510aa380799320e27622d9ef4312c1b6021a3915eebdb
-
Filesize
216KB
MD5f1c9d57e81d47b751514aa73f9b940a4
SHA1ae6cc1743f77ea56113de85053a754c608fce28a
SHA2568120fde94aa374e1bf12c35304252bdd5ce966fd04a1cee0c6b7838ef3e4eba1
SHA512a9706962d6ba778ef7fb283a499af481d8150301352ed20a8046cf5d159147b2dd2017d7680064fe29a9e3d0bbdb90d33dd14bbfe9ea531138c7b55e17026553