Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe
-
Size
168KB
-
MD5
7478eb763f5c87a16fba32f6ed9ad9be
-
SHA1
27d64b0b5c1e535351e3e7b5fd8142745beba822
-
SHA256
37b934bb8e6e02b62ea439dbbe7e4ac90c947fe3ca22cb55a3382e35d75cf1fa
-
SHA512
bbd3c6fc1a94f79e21b02ddd0e06c0df4cfa3c5ba4a8a74bf60fb2e2851b3f6fd1d71f8b928855368ca26c2be999857533864965805fe1752352b8d1a1dfdf5f
-
SSDEEP
1536:1EGh0onli5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0onliOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x000e000000023129-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0011000000023209-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023210-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0012000000023209-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c000000021838-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000021841-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d000000021838-25.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000000037-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000709-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000000037-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000709-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00030000000006df-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9E14607-D898-4078-AC83-223C470E15F5}\stubpath = "C:\\Windows\\{D9E14607-D898-4078-AC83-223C470E15F5}.exe" 2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DC23C051-C1A5-4497-8EBA-F25055BF9055} {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DC23C051-C1A5-4497-8EBA-F25055BF9055}\stubpath = "C:\\Windows\\{DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe" {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{74BFE9B2-EA31-423f-8642-A57069584BCE}\stubpath = "C:\\Windows\\{74BFE9B2-EA31-423f-8642-A57069584BCE}.exe" {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}\stubpath = "C:\\Windows\\{82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe" {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DAA05EB5-741C-4715-884B-7029B6EB7A8E} {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{001DFFBF-FD79-4530-BF55-9B754BA44B10} {DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9E14607-D898-4078-AC83-223C470E15F5} 2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{001DFFBF-FD79-4530-BF55-9B754BA44B10}\stubpath = "C:\\Windows\\{001DFFBF-FD79-4530-BF55-9B754BA44B10}.exe" {DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}\stubpath = "C:\\Windows\\{1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe" {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4AE9E4A7-821F-439b-AA4A-86876ABA967B}\stubpath = "C:\\Windows\\{4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe" {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC} {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0} {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B581772-2F32-49fc-BE02-9706DC60CE6C}\stubpath = "C:\\Windows\\{9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe" {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DAA05EB5-741C-4715-884B-7029B6EB7A8E}\stubpath = "C:\\Windows\\{DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe" {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0ADEAC05-BB0D-4f9b-9172-83D06503CAD9} {D9E14607-D898-4078-AC83-223C470E15F5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{74BFE9B2-EA31-423f-8642-A57069584BCE} {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B581772-2F32-49fc-BE02-9706DC60CE6C} {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E} {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}\stubpath = "C:\\Windows\\{2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe" {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4AE9E4A7-821F-439b-AA4A-86876ABA967B} {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FC05BB14-6AC7-4d63-95EC-B905255D6FD8} {001DFFBF-FD79-4530-BF55-9B754BA44B10}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FC05BB14-6AC7-4d63-95EC-B905255D6FD8}\stubpath = "C:\\Windows\\{FC05BB14-6AC7-4d63-95EC-B905255D6FD8}.exe" {001DFFBF-FD79-4530-BF55-9B754BA44B10}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}\stubpath = "C:\\Windows\\{0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe" {D9E14607-D898-4078-AC83-223C470E15F5}.exe -
Executes dropped EXE 12 IoCs
pid Process 4516 {D9E14607-D898-4078-AC83-223C470E15F5}.exe 3924 {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe 2092 {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe 3544 {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe 4856 {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe 1052 {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe 4288 {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe 4456 {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe 2076 {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe 1744 {DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe 3204 {001DFFBF-FD79-4530-BF55-9B754BA44B10}.exe 336 {FC05BB14-6AC7-4d63-95EC-B905255D6FD8}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{D9E14607-D898-4078-AC83-223C470E15F5}.exe 2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe File created C:\Windows\{82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe File created C:\Windows\{1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe File created C:\Windows\{2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe File created C:\Windows\{4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe File created C:\Windows\{0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe {D9E14607-D898-4078-AC83-223C470E15F5}.exe File created C:\Windows\{DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe File created C:\Windows\{74BFE9B2-EA31-423f-8642-A57069584BCE}.exe {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe File created C:\Windows\{9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe File created C:\Windows\{DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe File created C:\Windows\{001DFFBF-FD79-4530-BF55-9B754BA44B10}.exe {DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe File created C:\Windows\{FC05BB14-6AC7-4d63-95EC-B905255D6FD8}.exe {001DFFBF-FD79-4530-BF55-9B754BA44B10}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4888 2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe Token: SeIncBasePriorityPrivilege 4516 {D9E14607-D898-4078-AC83-223C470E15F5}.exe Token: SeIncBasePriorityPrivilege 3924 {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe Token: SeIncBasePriorityPrivilege 2092 {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe Token: SeIncBasePriorityPrivilege 3544 {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe Token: SeIncBasePriorityPrivilege 4856 {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe Token: SeIncBasePriorityPrivilege 1052 {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe Token: SeIncBasePriorityPrivilege 4288 {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe Token: SeIncBasePriorityPrivilege 4456 {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe Token: SeIncBasePriorityPrivilege 2076 {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe Token: SeIncBasePriorityPrivilege 1744 {DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe Token: SeIncBasePriorityPrivilege 3204 {001DFFBF-FD79-4530-BF55-9B754BA44B10}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4516 4888 2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe 93 PID 4888 wrote to memory of 4516 4888 2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe 93 PID 4888 wrote to memory of 4516 4888 2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe 93 PID 4888 wrote to memory of 1904 4888 2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe 94 PID 4888 wrote to memory of 1904 4888 2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe 94 PID 4888 wrote to memory of 1904 4888 2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe 94 PID 4516 wrote to memory of 3924 4516 {D9E14607-D898-4078-AC83-223C470E15F5}.exe 97 PID 4516 wrote to memory of 3924 4516 {D9E14607-D898-4078-AC83-223C470E15F5}.exe 97 PID 4516 wrote to memory of 3924 4516 {D9E14607-D898-4078-AC83-223C470E15F5}.exe 97 PID 4516 wrote to memory of 1576 4516 {D9E14607-D898-4078-AC83-223C470E15F5}.exe 98 PID 4516 wrote to memory of 1576 4516 {D9E14607-D898-4078-AC83-223C470E15F5}.exe 98 PID 4516 wrote to memory of 1576 4516 {D9E14607-D898-4078-AC83-223C470E15F5}.exe 98 PID 3924 wrote to memory of 2092 3924 {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe 100 PID 3924 wrote to memory of 2092 3924 {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe 100 PID 3924 wrote to memory of 2092 3924 {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe 100 PID 3924 wrote to memory of 4608 3924 {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe 101 PID 3924 wrote to memory of 4608 3924 {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe 101 PID 3924 wrote to memory of 4608 3924 {0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe 101 PID 2092 wrote to memory of 3544 2092 {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe 102 PID 2092 wrote to memory of 3544 2092 {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe 102 PID 2092 wrote to memory of 3544 2092 {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe 102 PID 2092 wrote to memory of 1656 2092 {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe 103 PID 2092 wrote to memory of 1656 2092 {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe 103 PID 2092 wrote to memory of 1656 2092 {DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe 103 PID 3544 wrote to memory of 4856 3544 {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe 104 PID 3544 wrote to memory of 4856 3544 {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe 104 PID 3544 wrote to memory of 4856 3544 {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe 104 PID 3544 wrote to memory of 4036 3544 {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe 105 PID 3544 wrote to memory of 4036 3544 {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe 105 PID 3544 wrote to memory of 4036 3544 {74BFE9B2-EA31-423f-8642-A57069584BCE}.exe 105 PID 4856 wrote to memory of 1052 4856 {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe 106 PID 4856 wrote to memory of 1052 4856 {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe 106 PID 4856 wrote to memory of 1052 4856 {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe 106 PID 4856 wrote to memory of 780 4856 {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe 107 PID 4856 wrote to memory of 780 4856 {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe 107 PID 4856 wrote to memory of 780 4856 {82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe 107 PID 1052 wrote to memory of 4288 1052 {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe 108 PID 1052 wrote to memory of 4288 1052 {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe 108 PID 1052 wrote to memory of 4288 1052 {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe 108 PID 1052 wrote to memory of 4408 1052 {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe 109 PID 1052 wrote to memory of 4408 1052 {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe 109 PID 1052 wrote to memory of 4408 1052 {1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe 109 PID 4288 wrote to memory of 4456 4288 {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe 110 PID 4288 wrote to memory of 4456 4288 {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe 110 PID 4288 wrote to memory of 4456 4288 {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe 110 PID 4288 wrote to memory of 2784 4288 {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe 111 PID 4288 wrote to memory of 2784 4288 {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe 111 PID 4288 wrote to memory of 2784 4288 {9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe 111 PID 4456 wrote to memory of 2076 4456 {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe 112 PID 4456 wrote to memory of 2076 4456 {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe 112 PID 4456 wrote to memory of 2076 4456 {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe 112 PID 4456 wrote to memory of 4572 4456 {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe 113 PID 4456 wrote to memory of 4572 4456 {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe 113 PID 4456 wrote to memory of 4572 4456 {2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe 113 PID 2076 wrote to memory of 1744 2076 {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe 114 PID 2076 wrote to memory of 1744 2076 {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe 114 PID 2076 wrote to memory of 1744 2076 {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe 114 PID 2076 wrote to memory of 3900 2076 {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe 115 PID 2076 wrote to memory of 3900 2076 {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe 115 PID 2076 wrote to memory of 3900 2076 {4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe 115 PID 1744 wrote to memory of 3204 1744 {DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe 116 PID 1744 wrote to memory of 3204 1744 {DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe 116 PID 1744 wrote to memory of 3204 1744 {DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe 116 PID 1744 wrote to memory of 2488 1744 {DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-09_7478eb763f5c87a16fba32f6ed9ad9be_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\{D9E14607-D898-4078-AC83-223C470E15F5}.exeC:\Windows\{D9E14607-D898-4078-AC83-223C470E15F5}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\{0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exeC:\Windows\{0ADEAC05-BB0D-4f9b-9172-83D06503CAD9}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\{DC23C051-C1A5-4497-8EBA-F25055BF9055}.exeC:\Windows\{DC23C051-C1A5-4497-8EBA-F25055BF9055}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\{74BFE9B2-EA31-423f-8642-A57069584BCE}.exeC:\Windows\{74BFE9B2-EA31-423f-8642-A57069584BCE}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\{82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exeC:\Windows\{82AA1B1E-2FE0-4bf5-9AF7-8D63EFB170BC}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\{1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exeC:\Windows\{1D1ECBE4-4853-42bb-9AAA-07C84D0FABD0}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\{9B581772-2F32-49fc-BE02-9706DC60CE6C}.exeC:\Windows\{9B581772-2F32-49fc-BE02-9706DC60CE6C}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\{2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exeC:\Windows\{2B9E3966-A7CC-41fe-81B2-BA441EBF4D6E}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\{4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exeC:\Windows\{4AE9E4A7-821F-439b-AA4A-86876ABA967B}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\{DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exeC:\Windows\{DAA05EB5-741C-4715-884B-7029B6EB7A8E}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\{001DFFBF-FD79-4530-BF55-9B754BA44B10}.exeC:\Windows\{001DFFBF-FD79-4530-BF55-9B754BA44B10}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3204 -
C:\Windows\{FC05BB14-6AC7-4d63-95EC-B905255D6FD8}.exeC:\Windows\{FC05BB14-6AC7-4d63-95EC-B905255D6FD8}.exe13⤵
- Executes dropped EXE
PID:336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{001DF~1.EXE > nul13⤵PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DAA05~1.EXE > nul12⤵PID:2488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4AE9E~1.EXE > nul11⤵PID:3900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2B9E3~1.EXE > nul10⤵PID:4572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9B581~1.EXE > nul9⤵PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1D1EC~1.EXE > nul8⤵PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{82AA1~1.EXE > nul7⤵PID:780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{74BFE~1.EXE > nul6⤵PID:4036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DC23C~1.EXE > nul5⤵PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0ADEA~1.EXE > nul4⤵PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9E14~1.EXE > nul3⤵PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD52840cb4a80c2ea5e1736a3fa45f2d07d
SHA16464c513c8e29d7fc05eba9a13034b1798ab97f4
SHA2561b3dc5221880a9ac5e403ab670a8f59a71b1e58a4b5305b6f768f0df5678867d
SHA5127edd11ef2f445620bc9c6edeb1e0b233fbbc7870d3445bf6fcbc5c0e968c9ea9fefdae31216a9f3d369ee0c037bac5ece5ad3005e6ee3f55845e3f5d862a9a45
-
Filesize
168KB
MD5cd99d286a49ceebfbc545bb36c11534e
SHA148219470cf028d73e57933165f5d39edd259fc13
SHA256a6874b84a2d44f93e293e5cc3638e91c2ffc62cdbc1b288d9bf33171b27ba925
SHA51267edd3fd7c5c88e9b791a58aea94a7e07a2ca4d9edb79f4bb97a36e82f6589a3eaecb0df69da0b1eb5915be4b6b3ec847dfce28dc22bad2ec2db2740773f5c23
-
Filesize
168KB
MD5948a56ce8548db2942367ff2843e11a8
SHA17a0d2046d1fb8b85aaf9e9a5a0ebea896f79db1a
SHA256aa4455a1c4823dadca8031241c8060e0b6648b5e6a107161f6b56ea6dae3434a
SHA51283ac598266e92714cdfa6d577667ee21b6d37c951e199c25a82d371a316df472ea54a721572fdd17538dfd0f423c5bf830cfd20699d67c1c9096d8e7824d6612
-
Filesize
168KB
MD58862c6d074c871c29878a57749936f52
SHA1a456cbdbc09acd3398d7b6b9a8c087e0d0b00e9a
SHA25656ce2766b88e26c9f2809b21fd9c9fddc19b0f4026d0aa14c37f7ff5fcc6bda3
SHA512bfb8a668117f107ddf71ac2ccca6705795a4ddb9c5ec32e8ad03d6310dff8ba80de5291a52b386dde352c6aa87b2242847eeaede133f778aa309f20d0653e6c3
-
Filesize
168KB
MD5e866060773d7849f6b5e5922626407b7
SHA125127a6f0c0680f5a30da03ab8ce801312a41578
SHA256e71b11199a5e5d8b3bd17865ece450ade0ba87e1c3478d1e515925be818e3134
SHA512c870a4ca4000042e452a3f8dd22e7b071768626f7191b8c22865735c11a8cc7efd636de572682b2578550cde0fd79e58811c1ba8178a773b3374b74c07aa9df2
-
Filesize
168KB
MD58bcc7f793d27329be8737a7cfb2d974f
SHA1628fbf17d7610d03670e4f48500a5ca1e15cd46d
SHA256d63b47a37f55d8bfc8846ac51f2d251baee5fa3b7a4e9ea94a9a8db0e662435a
SHA5123f749023cdbbc7e9ca10fcf886394edcc1c70009df78c5049c7d7ca9622746acee625f560d3bd587c48882d966a717e35d438067488f078354d12ca2ecec913a
-
Filesize
168KB
MD5fd018827e26895e81c91cb33c971bfba
SHA1cd854a560f604468b3d1bef3b03e222448bde775
SHA256388cc851937f032ef321754786018c6fe3907807d6b75918b314131d5092373a
SHA5121638e420e1bb6b1c7373bebec916ebccca7e890a9c348a9f667e8bb62b8b4857f21dc9c6688b45ec1f71a29647b732b18a43bc4eadd576da2d9e26df015be675
-
Filesize
168KB
MD5fdd9f7495f49a1e01ec0952af3caf18f
SHA18e5b4eaa4c0daaeb04ef6b3e605992f14a3f9ad2
SHA25619f199ae351f08a0420d6ce509fce376ba64764ef981e98fe9292cfbdcfc4e1c
SHA51201c8effed760ac0c38eb0fa60446087e3fb7e6e7e3687db6dee16ec8056dc234c66ce03139ed375174618378ecc6984ecf200604274911879a02374e7f56b54d
-
Filesize
168KB
MD55529b8eca32b18a663683a37818e479d
SHA1df053f93a782f0b2909f4650aaf11dec42ef94bf
SHA256f5ed8c358c2deed9bcc4133de88b82e4856fccf0fe945aa9655f3510a7f8ad9e
SHA512cdae3bc342a9d8c42a7edcb1ecfa4a2641392205d7d7b82dd3b2375831891bf4047509b30417e90a61c2ed0f0fbc9a0826f854a05c78f3a066811cf923eb918e
-
Filesize
168KB
MD51e0c0841bfa411b9e0dbcb5d84a31d60
SHA10cf5a63990ebc77c381b9b01555c1f9db5e1d73c
SHA2561af60c1c6773c90fc7ecf76bce458373429227c2af8597894c320ac7a09d7371
SHA5125575ab479157b076c84ac9b533b60701e25ab771530f33b8e2a3090ad3f5fbcdbb44c43e858fc13386fe7313329672654e26f6261f03ebe65514cfe2af45e321
-
Filesize
168KB
MD558d16deff81f2759e4044f61c0382c16
SHA1552737de6e6fdcd4a2b406846356357e7ec873f8
SHA2566869773837ac1518466b9431ca15914e3c04115e9da7640912509cb443094201
SHA512ed31a6a73af390921e598c6e8e4b439747a9f36f8dc055f21e09d189e482ee7b2ff628a00a24397bffbf20f2bb17440e30330d816567afbae851ccff59fa9864
-
Filesize
168KB
MD5fd831b7be0881bac624405058e84036c
SHA13d945db65dd6fecb02e20ce3caf09bf92ec61bf1
SHA2560f17e6773a01ed7d672dfd4b978c364674f41d1c0e7c1462bda2140b2c21818a
SHA51292a81cf5da57a0340cc9a64d6294c4c1656a8bddab129551d78ee98b30896e97793be78d02745c9041f1ee1e3cb127e607e434475448b9fc909e1c37633cd3ec