Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe
-
Size
380KB
-
MD5
bf04d94f9185e2a7f7f35d651d6f9bce
-
SHA1
2f121e0d4a6c5e6e047acbaea26fd2be1202ec8a
-
SHA256
3162bc7836ff74163f393a0850aa2d901967b36c3d1b162eea03a6c89c2c75e4
-
SHA512
6c57f3f1781373472355533fef70777ff9a5c722cdbc56d88ca486d26c3211ccf1ba3ffb7c959742aec65e3b0d00856127368835b868d716e753c5bfbe307221
-
SSDEEP
3072:mEGh0o7lPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGll7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x000c000000023364-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a00000002336b-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000233f7-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000e000000023403-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a0000000233f7-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000f000000023403-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b0000000233f7-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0010000000023403-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c0000000233f7-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0011000000023403-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d0000000233f7-41.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0012000000023403-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01421C38-140F-4dcb-8362-66FC66E9D9BF} {5155D801-74E9-4d25-9158-81339EA8E662}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F10970D-C0A6-4295-9782-3C791B17C6B1}\stubpath = "C:\\Windows\\{1F10970D-C0A6-4295-9782-3C791B17C6B1}.exe" {3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01} {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}\stubpath = "C:\\Windows\\{3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe" {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F82EA265-1CF5-444b-995C-573AAC461625} {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8A473261-E6DA-48ec-AD98-5FBEAAA0B740}\stubpath = "C:\\Windows\\{8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe" {F82EA265-1CF5-444b-995C-573AAC461625}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5155D801-74E9-4d25-9158-81339EA8E662} {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5155D801-74E9-4d25-9158-81339EA8E662}\stubpath = "C:\\Windows\\{5155D801-74E9-4d25-9158-81339EA8E662}.exe" {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01421C38-140F-4dcb-8362-66FC66E9D9BF}\stubpath = "C:\\Windows\\{01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe" {5155D801-74E9-4d25-9158-81339EA8E662}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7DFEBA3-40EF-41d3-9267-5E4397111C39} 2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7DFEBA3-40EF-41d3-9267-5E4397111C39}\stubpath = "C:\\Windows\\{D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe" 2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{960A5732-E1CB-4a14-B082-E4CF2D572C0A} {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{960A5732-E1CB-4a14-B082-E4CF2D572C0A}\stubpath = "C:\\Windows\\{960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe" {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F82EA265-1CF5-444b-995C-573AAC461625}\stubpath = "C:\\Windows\\{F82EA265-1CF5-444b-995C-573AAC461625}.exe" {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2097BC2B-8F3B-4513-A627-20DD2C6C7E14}\stubpath = "C:\\Windows\\{2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe" {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4} {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}\stubpath = "C:\\Windows\\{BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe" {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8A473261-E6DA-48ec-AD98-5FBEAAA0B740} {F82EA265-1CF5-444b-995C-573AAC461625}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDF1092F-78CB-4404-A1E6-50B26BF61B72} {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDF1092F-78CB-4404-A1E6-50B26BF61B72}\stubpath = "C:\\Windows\\{EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe" {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2097BC2B-8F3B-4513-A627-20DD2C6C7E14} {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3BD2A6F8-E097-43cd-B17A-9014B2A3BF55} {01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}\stubpath = "C:\\Windows\\{3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe" {01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F10970D-C0A6-4295-9782-3C791B17C6B1} {3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe -
Executes dropped EXE 12 IoCs
pid Process 4664 {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe 1648 {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe 2720 {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe 488 {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe 4432 {F82EA265-1CF5-444b-995C-573AAC461625}.exe 992 {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe 1356 {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe 1508 {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe 2972 {5155D801-74E9-4d25-9158-81339EA8E662}.exe 3328 {01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe 1380 {3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe 3076 {1F10970D-C0A6-4295-9782-3C791B17C6B1}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{1F10970D-C0A6-4295-9782-3C791B17C6B1}.exe {3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe File created C:\Windows\{F82EA265-1CF5-444b-995C-573AAC461625}.exe {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe File created C:\Windows\{3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe {01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe File created C:\Windows\{960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe File created C:\Windows\{3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe File created C:\Windows\{8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe {F82EA265-1CF5-444b-995C-573AAC461625}.exe File created C:\Windows\{2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe File created C:\Windows\{EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe File created C:\Windows\{5155D801-74E9-4d25-9158-81339EA8E662}.exe {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe File created C:\Windows\{D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe 2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe File created C:\Windows\{BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe File created C:\Windows\{01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe {5155D801-74E9-4d25-9158-81339EA8E662}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3188 2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe Token: SeIncBasePriorityPrivilege 4664 {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe Token: SeIncBasePriorityPrivilege 1648 {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe Token: SeIncBasePriorityPrivilege 2720 {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe Token: SeIncBasePriorityPrivilege 488 {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe Token: SeIncBasePriorityPrivilege 4432 {F82EA265-1CF5-444b-995C-573AAC461625}.exe Token: SeIncBasePriorityPrivilege 992 {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe Token: SeIncBasePriorityPrivilege 1356 {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe Token: SeIncBasePriorityPrivilege 1508 {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe Token: SeIncBasePriorityPrivilege 2972 {5155D801-74E9-4d25-9158-81339EA8E662}.exe Token: SeIncBasePriorityPrivilege 3328 {01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe Token: SeIncBasePriorityPrivilege 1380 {3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 4664 3188 2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe 95 PID 3188 wrote to memory of 4664 3188 2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe 95 PID 3188 wrote to memory of 4664 3188 2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe 95 PID 3188 wrote to memory of 224 3188 2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe 96 PID 3188 wrote to memory of 224 3188 2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe 96 PID 3188 wrote to memory of 224 3188 2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe 96 PID 4664 wrote to memory of 1648 4664 {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe 97 PID 4664 wrote to memory of 1648 4664 {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe 97 PID 4664 wrote to memory of 1648 4664 {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe 97 PID 4664 wrote to memory of 568 4664 {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe 98 PID 4664 wrote to memory of 568 4664 {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe 98 PID 4664 wrote to memory of 568 4664 {D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe 98 PID 1648 wrote to memory of 2720 1648 {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe 101 PID 1648 wrote to memory of 2720 1648 {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe 101 PID 1648 wrote to memory of 2720 1648 {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe 101 PID 1648 wrote to memory of 1692 1648 {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe 102 PID 1648 wrote to memory of 1692 1648 {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe 102 PID 1648 wrote to memory of 1692 1648 {BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe 102 PID 2720 wrote to memory of 488 2720 {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe 104 PID 2720 wrote to memory of 488 2720 {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe 104 PID 2720 wrote to memory of 488 2720 {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe 104 PID 2720 wrote to memory of 3332 2720 {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe 105 PID 2720 wrote to memory of 3332 2720 {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe 105 PID 2720 wrote to memory of 3332 2720 {960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe 105 PID 488 wrote to memory of 4432 488 {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe 106 PID 488 wrote to memory of 4432 488 {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe 106 PID 488 wrote to memory of 4432 488 {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe 106 PID 488 wrote to memory of 640 488 {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe 107 PID 488 wrote to memory of 640 488 {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe 107 PID 488 wrote to memory of 640 488 {3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe 107 PID 4432 wrote to memory of 992 4432 {F82EA265-1CF5-444b-995C-573AAC461625}.exe 108 PID 4432 wrote to memory of 992 4432 {F82EA265-1CF5-444b-995C-573AAC461625}.exe 108 PID 4432 wrote to memory of 992 4432 {F82EA265-1CF5-444b-995C-573AAC461625}.exe 108 PID 4432 wrote to memory of 3212 4432 {F82EA265-1CF5-444b-995C-573AAC461625}.exe 109 PID 4432 wrote to memory of 3212 4432 {F82EA265-1CF5-444b-995C-573AAC461625}.exe 109 PID 4432 wrote to memory of 3212 4432 {F82EA265-1CF5-444b-995C-573AAC461625}.exe 109 PID 992 wrote to memory of 1356 992 {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe 110 PID 992 wrote to memory of 1356 992 {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe 110 PID 992 wrote to memory of 1356 992 {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe 110 PID 992 wrote to memory of 1348 992 {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe 111 PID 992 wrote to memory of 1348 992 {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe 111 PID 992 wrote to memory of 1348 992 {8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe 111 PID 1356 wrote to memory of 1508 1356 {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe 112 PID 1356 wrote to memory of 1508 1356 {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe 112 PID 1356 wrote to memory of 1508 1356 {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe 112 PID 1356 wrote to memory of 1500 1356 {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe 113 PID 1356 wrote to memory of 1500 1356 {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe 113 PID 1356 wrote to memory of 1500 1356 {2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe 113 PID 1508 wrote to memory of 2972 1508 {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe 114 PID 1508 wrote to memory of 2972 1508 {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe 114 PID 1508 wrote to memory of 2972 1508 {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe 114 PID 1508 wrote to memory of 3596 1508 {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe 115 PID 1508 wrote to memory of 3596 1508 {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe 115 PID 1508 wrote to memory of 3596 1508 {EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe 115 PID 2972 wrote to memory of 3328 2972 {5155D801-74E9-4d25-9158-81339EA8E662}.exe 116 PID 2972 wrote to memory of 3328 2972 {5155D801-74E9-4d25-9158-81339EA8E662}.exe 116 PID 2972 wrote to memory of 3328 2972 {5155D801-74E9-4d25-9158-81339EA8E662}.exe 116 PID 2972 wrote to memory of 228 2972 {5155D801-74E9-4d25-9158-81339EA8E662}.exe 117 PID 2972 wrote to memory of 228 2972 {5155D801-74E9-4d25-9158-81339EA8E662}.exe 117 PID 2972 wrote to memory of 228 2972 {5155D801-74E9-4d25-9158-81339EA8E662}.exe 117 PID 3328 wrote to memory of 1380 3328 {01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe 118 PID 3328 wrote to memory of 1380 3328 {01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe 118 PID 3328 wrote to memory of 1380 3328 {01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe 118 PID 3328 wrote to memory of 2672 3328 {01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\{D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exeC:\Windows\{D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\{BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exeC:\Windows\{BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\{960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exeC:\Windows\{960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\{3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exeC:\Windows\{3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\{F82EA265-1CF5-444b-995C-573AAC461625}.exeC:\Windows\{F82EA265-1CF5-444b-995C-573AAC461625}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\{8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exeC:\Windows\{8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\{2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exeC:\Windows\{2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\{EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exeC:\Windows\{EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\{5155D801-74E9-4d25-9158-81339EA8E662}.exeC:\Windows\{5155D801-74E9-4d25-9158-81339EA8E662}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{01421C38-140F-4dcb-8362-66FC66E9D9BF}.exeC:\Windows\{01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\{3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exeC:\Windows\{3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\{1F10970D-C0A6-4295-9782-3C791B17C6B1}.exeC:\Windows\{1F10970D-C0A6-4295-9782-3C791B17C6B1}.exe13⤵
- Executes dropped EXE
PID:3076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3BD2A~1.EXE > nul13⤵PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{01421~1.EXE > nul12⤵PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5155D~1.EXE > nul11⤵PID:228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EDF10~1.EXE > nul10⤵PID:3596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2097B~1.EXE > nul9⤵PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8A473~1.EXE > nul8⤵PID:1348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F82EA~1.EXE > nul7⤵PID:3212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3E2C6~1.EXE > nul6⤵PID:640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{960A5~1.EXE > nul5⤵PID:3332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BC81F~1.EXE > nul4⤵PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D7DFE~1.EXE > nul3⤵PID:568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5c532692e2864cd9f68c1b66f27dfd6e0
SHA1cf14aa437a828f9fba0c0478d2ca369abaed6f75
SHA25621cf00d13f3be57eab993b667765a11cc0516b903b692c48f9c12ba19023495c
SHA512fc5d1a3677165314348707ee49d72abd66a731d2a9f74dde85aed3ef0e23af2b9b474fcd64b5109a0107a5194de8ef48b2b053e23500548596a5cb5537f97ca7
-
Filesize
380KB
MD585ea883817534cb975dc07b25e81999a
SHA12e46757999606258aaa055e336bbaae491abae23
SHA25600eeb02bc4a7971568fbbbe2313b41ec9b7dad491403032062c85e57f95dc06e
SHA512438344b2ec86b09cf638b53e46f0ebd411a9a978b49a362c1393213d32a3edc39d790ed5a7e9c44331a7d8f926032cd10f051e49087aed5051fec11787958b4d
-
Filesize
380KB
MD55d27efd5860b8d60d816a796d6c493e2
SHA1454decf6d2eee54ed8752c32a9f27f428aec05a4
SHA2566f6489fcdff4864aed14103d7be3103172e1d2d341f36cf434152eca6799f348
SHA5129fea9d5276ff60522764a1633873d65ebf547df76659b84e19a3e86ae2b1834f1c51e3e6311b3cd5087df0e938c73060a1f4d5f7d2fa4209fa70921ad77dc1cf
-
Filesize
380KB
MD5a680691ac37b2808375d6ce06216f626
SHA1b09f4048a73ab40dab7cc6892a9de6730d27fc65
SHA2569aaa5ea8c668cea267860765048c43f5dfc8ba9134b69a12f0b4548924d7c051
SHA5122005cd7779f5cc69bfcfb3b9bbd0888657ac2911338e3c2995a90f82009d3dad32b49aa589468d6f420e2c0f6dc54501e8195f43429773cf8f5bc8e57ea2e3d1
-
Filesize
380KB
MD58f44518c905bd894456ad0bd9d5c92f0
SHA1129c4c31c04f69554dd5fb2f709a486308e6088d
SHA256eb77a25ba69833e4837c9f27f490704e4bd8726f29b57c851bcc6474575f8368
SHA51243027faa26f4d6f68633ae2bf49243abe036bd1c8199e9a104eab2fba4cd54248eef362542761f6f666234b4539693db2a1bd4c1fb875ead0b71fff17c1fc2e9
-
Filesize
380KB
MD5b44dc7e77ee745519a907376155eddca
SHA1fb629c8f8459af239bde6d1a52e2d8f5061a8f6d
SHA2569e44e4c11eb596ee7881b68be37f94a4a980b0991d0a817e2a205db8567dbe0c
SHA512ef6d14f89d792586b19124925a512dd44dfd5633e2379c7f42f50dfd77e4c0ed68061f44e28da96f92074a9681141c537cb3b7ff455491ba6a51e1c9d2a7545c
-
Filesize
380KB
MD524858a54ff08abf736d72c14322cf1b5
SHA1f4294524d002f8cdcda345a9772e2816312ea107
SHA256566a4b11861fa5e703463e3236382478c9156eeea61851f18bdb11f77e409b83
SHA512e68bd4c5752e153e5fc87069c42ee250aa337bdac228ceaba057b0e99102989dfe2228f1364fd7236a9acb93eaf4cf9b732194685437464d51209ee8092f0e60
-
Filesize
380KB
MD52433e4244cec8a0a11ee80f7401f5e21
SHA19efbcc5cf95c215c9cfbc7bd01d15a02d35d416e
SHA25690951f28f1589c2be054dd3468bce37b460bca4811bb527dc292b94ce5d66718
SHA512833d8f0e6bf3350652d0e35ee9c5fcaab7cc4a646df54c1e1dab8fab435768ba50479ac14e94525abe493d449eb92d0286375a88c27d9a82a977f6ece6be6001
-
Filesize
380KB
MD52e14e804faee9ac09404782eb2ddaa7b
SHA1597884e66acb5d6b054d808f2c71cac0acfece2c
SHA256296ab5eb12fd72b1fdcc1cbbf362595ee93d11a9a39d663536c5ae7a3807317b
SHA512ceecdfd73157ca76110b76b2d977e0116cd2828795d4280f2d7944357425d3b23be10219871364e5fdb9bb032f0deb94ce5954973ac8ade7e22a95c42afcbc76
-
Filesize
380KB
MD55b5cf30f734b49cf77604875269db4ae
SHA1416e909585bfb08d85f2bb0fd9fdb54d73151057
SHA256796234f8e828721ff9e80f4e859786b6cb588b7060e08859eb2a294748085fe6
SHA5120205064d136619070197854e3e098e2b6667d3fb3732dfe990104e5d4292825222a229f9a10f5a617346b232b1eb9df27128d8a631f1c621f79198afc1616def
-
Filesize
380KB
MD5210e7a5a327de8a24a86b6972c29f1cf
SHA17291ef3577b72cd05686ed798b5c89c997096854
SHA25633a4adbf4648675e36ec187ce83ad4f07ad2d09af337f516a51b091a0ba57afa
SHA5129304f0e2cce47bf512df0b908efb6b17595a4b6654f010f6f537e37abcbfc52d88312a230ae4affd5b239aee64c53d0df8ac0c79a9a5d53ae2898957c0411f00
-
Filesize
380KB
MD59a2514778553238c7e8a8819af1e97bc
SHA1f8c8063ac41fdf32d0b15e44c7cf1adbecc5df4f
SHA256fa88e3b27adce295568a5e5feedb44b5641d1e3a5a9154c5f0f97ce2d541c418
SHA512044dd2f5b4a99cdfd76d0399f6543365f6079875ff54b210eb9a3cd96482fc2cb3e513e5a3af6d6e4dddcbbde83fb9128568461d8a15acc6ed7fd65ffba92fde