Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe
-
Size
197KB
-
MD5
9e788f5faceeae869eb04202a9c171ef
-
SHA1
f68a516e15926e251babaef1b0a83a836f7f52ba
-
SHA256
df6a11b78706c9203a545b8045c0df488572297a248ed7307b50be5afe741892
-
SHA512
5baae3fa002caf27d23b6e0c302f1010c48cdd0eadf98d7602064ff16e028aa198cda59f0a9f7575dc27084d6e1fdad8f40cf09e138cb57983637637a8a24ca9
-
SSDEEP
3072:jEGh0oql+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGslEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0007000000023213-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023208-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002321a-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023208-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021fa2-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0002000000021fa3-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000021fa2-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000703-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0003000000000705-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000703-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000705-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000000703-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2926CEE4-1608-4614-BA53-C876961CCBFF} {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{41DB5253-2CAC-489a-BE7A-2CFA70931F1B}\stubpath = "C:\\Windows\\{41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe" {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AE39D044-2E12-4587-A2EA-FABAA4E68351}\stubpath = "C:\\Windows\\{AE39D044-2E12-4587-A2EA-FABAA4E68351}.exe" {41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}\stubpath = "C:\\Windows\\{87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe" 2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}\stubpath = "C:\\Windows\\{93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe" {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DD8A3811-6612-46e3-9F14-F245E7B38A00}\stubpath = "C:\\Windows\\{DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe" {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{04B8EED6-C5AA-45d7-B47B-A41755FCABD7} {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38} {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF03B11A-E3F6-4d16-B701-1408B01987FC}\stubpath = "C:\\Windows\\{CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe" {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7DB499F3-5D55-4c94-8D0E-68DBF108677D} {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AD45F304-E9AC-4ef5-87CD-055F2EC668F6} {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DD8A3811-6612-46e3-9F14-F245E7B38A00} {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2988B45F-D9AB-418f-86F3-A3A20642AAF8} {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2988B45F-D9AB-418f-86F3-A3A20642AAF8}\stubpath = "C:\\Windows\\{2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe" {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF03B11A-E3F6-4d16-B701-1408B01987FC} {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7DB499F3-5D55-4c94-8D0E-68DBF108677D}\stubpath = "C:\\Windows\\{7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe" {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A41FF56-EECF-42b7-9569-A2D6E541DF21} {AE39D044-2E12-4587-A2EA-FABAA4E68351}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A41FF56-EECF-42b7-9569-A2D6E541DF21}\stubpath = "C:\\Windows\\{4A41FF56-EECF-42b7-9569-A2D6E541DF21}.exe" {AE39D044-2E12-4587-A2EA-FABAA4E68351}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4} 2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AD45F304-E9AC-4ef5-87CD-055F2EC668F6}\stubpath = "C:\\Windows\\{AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe" {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{41DB5253-2CAC-489a-BE7A-2CFA70931F1B} {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AE39D044-2E12-4587-A2EA-FABAA4E68351} {41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{04B8EED6-C5AA-45d7-B47B-A41755FCABD7}\stubpath = "C:\\Windows\\{04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe" {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2926CEE4-1608-4614-BA53-C876961CCBFF}\stubpath = "C:\\Windows\\{2926CEE4-1608-4614-BA53-C876961CCBFF}.exe" {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe -
Executes dropped EXE 12 IoCs
pid Process 1560 {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe 4452 {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe 740 {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe 4720 {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe 4816 {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe 2168 {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe 4988 {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe 1264 {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe 2780 {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe 3572 {41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe 5028 {AE39D044-2E12-4587-A2EA-FABAA4E68351}.exe 3728 {4A41FF56-EECF-42b7-9569-A2D6E541DF21}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe File created C:\Windows\{2926CEE4-1608-4614-BA53-C876961CCBFF}.exe {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe File created C:\Windows\{7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe File created C:\Windows\{4A41FF56-EECF-42b7-9569-A2D6E541DF21}.exe {AE39D044-2E12-4587-A2EA-FABAA4E68351}.exe File created C:\Windows\{87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe 2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe File created C:\Windows\{AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe File created C:\Windows\{DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe File created C:\Windows\{2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe File created C:\Windows\{04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe File created C:\Windows\{93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe File created C:\Windows\{41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe File created C:\Windows\{AE39D044-2E12-4587-A2EA-FABAA4E68351}.exe {41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4900 2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe Token: SeIncBasePriorityPrivilege 1560 {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe Token: SeIncBasePriorityPrivilege 4452 {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe Token: SeIncBasePriorityPrivilege 740 {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe Token: SeIncBasePriorityPrivilege 4720 {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe Token: SeIncBasePriorityPrivilege 4816 {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe Token: SeIncBasePriorityPrivilege 2168 {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe Token: SeIncBasePriorityPrivilege 4988 {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe Token: SeIncBasePriorityPrivilege 1264 {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe Token: SeIncBasePriorityPrivilege 2780 {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe Token: SeIncBasePriorityPrivilege 3572 {41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe Token: SeIncBasePriorityPrivilege 5028 {AE39D044-2E12-4587-A2EA-FABAA4E68351}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1560 4900 2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe 92 PID 4900 wrote to memory of 1560 4900 2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe 92 PID 4900 wrote to memory of 1560 4900 2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe 92 PID 4900 wrote to memory of 3972 4900 2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe 93 PID 4900 wrote to memory of 3972 4900 2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe 93 PID 4900 wrote to memory of 3972 4900 2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe 93 PID 1560 wrote to memory of 4452 1560 {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe 94 PID 1560 wrote to memory of 4452 1560 {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe 94 PID 1560 wrote to memory of 4452 1560 {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe 94 PID 1560 wrote to memory of 2876 1560 {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe 95 PID 1560 wrote to memory of 2876 1560 {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe 95 PID 1560 wrote to memory of 2876 1560 {87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe 95 PID 4452 wrote to memory of 740 4452 {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe 97 PID 4452 wrote to memory of 740 4452 {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe 97 PID 4452 wrote to memory of 740 4452 {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe 97 PID 4452 wrote to memory of 1552 4452 {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe 98 PID 4452 wrote to memory of 1552 4452 {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe 98 PID 4452 wrote to memory of 1552 4452 {AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe 98 PID 740 wrote to memory of 4720 740 {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe 99 PID 740 wrote to memory of 4720 740 {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe 99 PID 740 wrote to memory of 4720 740 {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe 99 PID 740 wrote to memory of 3556 740 {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe 100 PID 740 wrote to memory of 3556 740 {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe 100 PID 740 wrote to memory of 3556 740 {DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe 100 PID 4720 wrote to memory of 4816 4720 {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe 101 PID 4720 wrote to memory of 4816 4720 {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe 101 PID 4720 wrote to memory of 4816 4720 {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe 101 PID 4720 wrote to memory of 1860 4720 {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe 102 PID 4720 wrote to memory of 1860 4720 {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe 102 PID 4720 wrote to memory of 1860 4720 {2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe 102 PID 4816 wrote to memory of 2168 4816 {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe 103 PID 4816 wrote to memory of 2168 4816 {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe 103 PID 4816 wrote to memory of 2168 4816 {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe 103 PID 4816 wrote to memory of 1808 4816 {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe 104 PID 4816 wrote to memory of 1808 4816 {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe 104 PID 4816 wrote to memory of 1808 4816 {04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe 104 PID 2168 wrote to memory of 4988 2168 {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe 105 PID 2168 wrote to memory of 4988 2168 {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe 105 PID 2168 wrote to memory of 4988 2168 {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe 105 PID 2168 wrote to memory of 4260 2168 {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe 106 PID 2168 wrote to memory of 4260 2168 {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe 106 PID 2168 wrote to memory of 4260 2168 {93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe 106 PID 4988 wrote to memory of 1264 4988 {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe 107 PID 4988 wrote to memory of 1264 4988 {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe 107 PID 4988 wrote to memory of 1264 4988 {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe 107 PID 4988 wrote to memory of 3476 4988 {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe 108 PID 4988 wrote to memory of 3476 4988 {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe 108 PID 4988 wrote to memory of 3476 4988 {CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe 108 PID 1264 wrote to memory of 2780 1264 {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe 109 PID 1264 wrote to memory of 2780 1264 {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe 109 PID 1264 wrote to memory of 2780 1264 {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe 109 PID 1264 wrote to memory of 1068 1264 {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe 110 PID 1264 wrote to memory of 1068 1264 {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe 110 PID 1264 wrote to memory of 1068 1264 {2926CEE4-1608-4614-BA53-C876961CCBFF}.exe 110 PID 2780 wrote to memory of 3572 2780 {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe 111 PID 2780 wrote to memory of 3572 2780 {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe 111 PID 2780 wrote to memory of 3572 2780 {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe 111 PID 2780 wrote to memory of 4408 2780 {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe 112 PID 2780 wrote to memory of 4408 2780 {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe 112 PID 2780 wrote to memory of 4408 2780 {7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe 112 PID 3572 wrote to memory of 5028 3572 {41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe 113 PID 3572 wrote to memory of 5028 3572 {41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe 113 PID 3572 wrote to memory of 5028 3572 {41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe 113 PID 3572 wrote to memory of 1844 3572 {41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-11_9e788f5faceeae869eb04202a9c171ef_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\{87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exeC:\Windows\{87932FE3-5DA7-4c2c-9B5F-5A4ADC55DEB4}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\{AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exeC:\Windows\{AD45F304-E9AC-4ef5-87CD-055F2EC668F6}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\{DD8A3811-6612-46e3-9F14-F245E7B38A00}.exeC:\Windows\{DD8A3811-6612-46e3-9F14-F245E7B38A00}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\{2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exeC:\Windows\{2988B45F-D9AB-418f-86F3-A3A20642AAF8}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\{04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exeC:\Windows\{04B8EED6-C5AA-45d7-B47B-A41755FCABD7}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\{93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exeC:\Windows\{93EF4C0B-EE0D-4725-9ED9-91AAB0A04B38}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\{CF03B11A-E3F6-4d16-B701-1408B01987FC}.exeC:\Windows\{CF03B11A-E3F6-4d16-B701-1408B01987FC}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\{2926CEE4-1608-4614-BA53-C876961CCBFF}.exeC:\Windows\{2926CEE4-1608-4614-BA53-C876961CCBFF}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\{7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exeC:\Windows\{7DB499F3-5D55-4c94-8D0E-68DBF108677D}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exeC:\Windows\{41DB5253-2CAC-489a-BE7A-2CFA70931F1B}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\{AE39D044-2E12-4587-A2EA-FABAA4E68351}.exeC:\Windows\{AE39D044-2E12-4587-A2EA-FABAA4E68351}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\Windows\{4A41FF56-EECF-42b7-9569-A2D6E541DF21}.exeC:\Windows\{4A41FF56-EECF-42b7-9569-A2D6E541DF21}.exe13⤵
- Executes dropped EXE
PID:3728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AE39D~1.EXE > nul13⤵PID:2400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41DB5~1.EXE > nul12⤵PID:1844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7DB49~1.EXE > nul11⤵PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2926C~1.EXE > nul10⤵PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CF03B~1.EXE > nul9⤵PID:3476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{93EF4~1.EXE > nul8⤵PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{04B8E~1.EXE > nul7⤵PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2988B~1.EXE > nul6⤵PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DD8A3~1.EXE > nul5⤵PID:3556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AD45F~1.EXE > nul4⤵PID:1552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{87932~1.EXE > nul3⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD54c636c1c01d141dea9a49fb9e03ebf02
SHA108e3dade22a621d386cff46120b3bc2ce88fcb2d
SHA256ee8f96e654ecca6c1ba9fe4c2f70b5da144a04e27e55151dd1c445b7602ecbd0
SHA51248a5ac908c84fceff56d9a6ecb30eb47d24381ffa641de34c2a45f9c58e4db6e05d120db5729c0418ad6e6ec4ab2f9bb422d22ded1ebbeda921897b89216cad6
-
Filesize
197KB
MD535a72415acc99318d39d59b702b88d67
SHA1ceca6431b5a67cc85c865c7a580b115441851ef4
SHA256cee491137604baeedee4b0621403840aaf9b4934a1ec8da3e9c69dabb08a22b2
SHA512c783f5cda9bad0cbac446a4c8e8250c94bb26acdbd68640bdd28ca50591bd9d4af0b9ad89cd640cfc910aa427bf02cd299b7fc1c92bcb8a0b67fae4d2bdaf6c7
-
Filesize
197KB
MD5399c55ecaf8b34c677c7feaf8ae045d9
SHA12f91960dadc5019640639d3233e98e38c0a0c974
SHA256d3850c96646959895d8adcadafcb18f33f31caa4eb22813748cf2b3e696b06db
SHA512bd4dcb184dae959b435f4900cd6e4f7589cd9b9590c04a8d04675c969ba567562f84dfe9f5a670d1c082287946c8611bc51678cbc2b90e2a6286d630e4bfcc89
-
Filesize
197KB
MD5ef4db4a8c81aa5d7fdcd0d2661c41f75
SHA1d6e3ca89b61248a2ee47a010d1e5fc02d877c9c4
SHA256a5210896fa0ff2281a0a7ddbd448aab1923e138f1c5d490d1fe819235418200b
SHA512a4b006171a5b050b50290b82ccbf1c3e64628a52c58b914d75fdfcb0ac6730c2be8db2c067e995f634b539f2cb8ad82c7063940d89318619524aa165551f7942
-
Filesize
197KB
MD5c5249dfe61fd98a46103789b8a9063ab
SHA13a967fe3145b781d3c94322458769bca00c40ca9
SHA2569a4dfe9e8492e6cf3bf7cd9a9a4e383499dc89b583e0640808f090de8d8cf01f
SHA512d6cb43f2771eb4f8844a285af4226faa8a718f5b5d8140bed6aa371fd411de8e4668d6171b04a28cba4bc92a0d54e74c19d19540d9eba5d0e5c8a320a44f4565
-
Filesize
197KB
MD57e56c5fa4ed9bdbd23c4b684d05c495b
SHA124ebb0159e452c1860a04c4408cd49a11081e2c8
SHA256d5039ac9e5a48277364d395fc6bbfe893484bc4dad29b3a6528012cf1ffe15e8
SHA5125a66769b86d2f7be23f158a3e0c52a3df7307860dec6e81fe965b03db90893543f48cbaf3a9c7624c5c84df021494f7e95abbdaa3d4670bcc0e1e6871fb06483
-
Filesize
197KB
MD5a920691b76256b4e10b8fa1c90616c51
SHA16c6b3fb4ef53012e039ba110e1c871086151db9c
SHA2566d7e3904f7bd3582f74485406e85023476dfd5ba9eef9083675384b31a2c2564
SHA51271f42a1b094eb4303e8d22e11fd6cc295a591927f81cd73ac36249d8157160e32ba5f46d825ec66165e8ed26847f66379189a3d112321ea094f6e432ec590bc6
-
Filesize
197KB
MD5821652f498eb3acf8e39b2a066850f16
SHA14fb875ea4ddf0fcb212cfa17b42904d3a0cd261f
SHA25652a7735b1fd4ac39954575d5ed4ab5d013d25ebae4bc20c4c1e8c8d82a972eb8
SHA51286fa8942fa63db7da50b10b5654dbc561b148b569c1f56eba20b4247872952a36860564a69f2b4af25884aade7e554a7083065c3976d546291ee917327f4fd16
-
Filesize
197KB
MD5a650fbbf19db50876913791b21415c67
SHA189d3b8b948b90a2a70a1338fb0b05d886a1abde1
SHA256411e8964136d4f5e9f0e7dcd8297e16ed77dd11a4b0e376e3b897edfa452dd4b
SHA5120624dbb23e62b955c981ce8bd63d311f77a44ebabaf014a53b93114b311c21361cf213a88bb1c5281abfe8cbabe809f1ff9ed5de909eae24c09cb96a23077e86
-
Filesize
197KB
MD5c4fbf317842e7a74721976dbbb78c74c
SHA11fd81228dc5ef4b268638f72e49c119b4efcf842
SHA25623ff820b53fe87480bb06f508a43ca963fa71890e17614246f1c60eb726b7ec6
SHA512262470c49e262f2e0c594e3ebdb2a7c524f3a9c10f0dfa6a7f72addfb689ac8223473cb582ac003b7d32b1c892a693736ea0d20681a9839eaf7baf077e8ec480
-
Filesize
197KB
MD5e815556dd298d6f0a98a2c93d70551a5
SHA124e46bb6e806ec978c11ae799cd984358ccc48f5
SHA2565a7d828c78bd512a3dd50726ed4bd274b9b17ea41d35d2786fba7b74b0deb5dc
SHA512702dc158b5fff099cfc5e2290587f0d39965f8f2c7e66196e9b4807d84899103a59bbad3c96940a5512288473129e1c9e368ddeb019b8132cba116adc3b4f851
-
Filesize
197KB
MD52c2d6ff2d8107d0b02d410f6b978b4c8
SHA14b917968e0a21407b7689f12b756788a7d5b6102
SHA256ee9f357c6e508a41425be6112ad83dbf7bab88ada669a7d67ebe672df20336ef
SHA5125acfc8fafcd7c7eddc6448c711a61fbd7b7e7b7a2caffb86a17026ce3aab6faabe9475382792862867a3efe45f4de6424d46fdf4dfe695f8c64a187da0c8c1e5