Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe
-
Size
180KB
-
MD5
52f8f92d3fed783453ad5bff2294461c
-
SHA1
1690c5714ab879b1b00468b7fa5840ce0a97c5ef
-
SHA256
d3b5c12c01eb215d66392c7e3f121fbf4b4d00a0f7770c3dcef9f6d7a6b1e3a3
-
SHA512
7781c6e8a64183b32103292cb34877c40485a63ef024ccbdec20a1eae8a64340b950ea83f0f98fd60539a6faae8450c79f0de5f779e67f889bedde96424cb687
-
SSDEEP
3072:jEGh0ozlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGFl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0007000000022f1f-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000233c0-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000233c8-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000500000001e72a-13.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00090000000233c8-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000600000001e72a-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a0000000233c8-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000001e72a-29.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b0000000233c8-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000001e72a-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c0000000233c8-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00080000000233ca-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}\stubpath = "C:\\Windows\\{5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe" {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1AEF4C9-2A34-496e-A964-1EC198DEF940} {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E756108C-A391-46d1-A2C4-6936F9B4004A}\stubpath = "C:\\Windows\\{E756108C-A391-46d1-A2C4-6936F9B4004A}.exe" {311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DA081F5-D9B3-49d7-9BCE-57229C119E45}\stubpath = "C:\\Windows\\{6DA081F5-D9B3-49d7-9BCE-57229C119E45}.exe" {E756108C-A391-46d1-A2C4-6936F9B4004A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F0A42928-A44A-47d0-ACC9-4718FE38D5EA} {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F0A42928-A44A-47d0-ACC9-4718FE38D5EA}\stubpath = "C:\\Windows\\{F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe" {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D343C26-96B1-4e16-A3CD-AAEB9852885A} {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D343C26-96B1-4e16-A3CD-AAEB9852885A}\stubpath = "C:\\Windows\\{8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe" {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F} {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{311D77B4-F315-4da5-8EE5-A73F5A9BF251} {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E756108C-A391-46d1-A2C4-6936F9B4004A} {311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52B426A5-9104-4c66-969D-5C49A4113AEA} {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{56EE4EA7-6405-4042-BC34-777A665A4DD4} {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{56EE4EA7-6405-4042-BC34-777A665A4DD4}\stubpath = "C:\\Windows\\{56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe" {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5A4300C-B4B8-440e-90FA-6B5EDA394147}\stubpath = "C:\\Windows\\{B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe" {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9484D451-47A2-4a4b-AFC5-49B710CC0D49}\stubpath = "C:\\Windows\\{9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe" 2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5D7896BF-6D3F-41ba-827D-848181B35F30} {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5D7896BF-6D3F-41ba-827D-848181B35F30}\stubpath = "C:\\Windows\\{5D7896BF-6D3F-41ba-827D-848181B35F30}.exe" {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52B426A5-9104-4c66-969D-5C49A4113AEA}\stubpath = "C:\\Windows\\{52B426A5-9104-4c66-969D-5C49A4113AEA}.exe" {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DA081F5-D9B3-49d7-9BCE-57229C119E45} {E756108C-A391-46d1-A2C4-6936F9B4004A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9484D451-47A2-4a4b-AFC5-49B710CC0D49} 2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5A4300C-B4B8-440e-90FA-6B5EDA394147} {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1AEF4C9-2A34-496e-A964-1EC198DEF940}\stubpath = "C:\\Windows\\{C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe" {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{311D77B4-F315-4da5-8EE5-A73F5A9BF251}\stubpath = "C:\\Windows\\{311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe" {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe -
Executes dropped EXE 12 IoCs
pid Process 716 {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe 2544 {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe 4852 {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe 4780 {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe 4260 {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe 3612 {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe 2248 {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe 4948 {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe 2240 {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe 2584 {311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe 5088 {E756108C-A391-46d1-A2C4-6936F9B4004A}.exe 1688 {6DA081F5-D9B3-49d7-9BCE-57229C119E45}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{5D7896BF-6D3F-41ba-827D-848181B35F30}.exe {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe File created C:\Windows\{8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe File created C:\Windows\{B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe File created C:\Windows\{5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe File created C:\Windows\{C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe File created C:\Windows\{E756108C-A391-46d1-A2C4-6936F9B4004A}.exe {311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe File created C:\Windows\{9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe 2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe File created C:\Windows\{52B426A5-9104-4c66-969D-5C49A4113AEA}.exe {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe File created C:\Windows\{F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe File created C:\Windows\{56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe File created C:\Windows\{311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe File created C:\Windows\{6DA081F5-D9B3-49d7-9BCE-57229C119E45}.exe {E756108C-A391-46d1-A2C4-6936F9B4004A}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2408 2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe Token: SeIncBasePriorityPrivilege 716 {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe Token: SeIncBasePriorityPrivilege 2544 {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe Token: SeIncBasePriorityPrivilege 4852 {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe Token: SeIncBasePriorityPrivilege 4780 {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe Token: SeIncBasePriorityPrivilege 4260 {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe Token: SeIncBasePriorityPrivilege 3612 {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe Token: SeIncBasePriorityPrivilege 2248 {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe Token: SeIncBasePriorityPrivilege 4948 {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe Token: SeIncBasePriorityPrivilege 2240 {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe Token: SeIncBasePriorityPrivilege 2584 {311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe Token: SeIncBasePriorityPrivilege 5088 {E756108C-A391-46d1-A2C4-6936F9B4004A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 716 2408 2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe 87 PID 2408 wrote to memory of 716 2408 2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe 87 PID 2408 wrote to memory of 716 2408 2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe 87 PID 2408 wrote to memory of 1552 2408 2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe 88 PID 2408 wrote to memory of 1552 2408 2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe 88 PID 2408 wrote to memory of 1552 2408 2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe 88 PID 716 wrote to memory of 2544 716 {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe 89 PID 716 wrote to memory of 2544 716 {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe 89 PID 716 wrote to memory of 2544 716 {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe 89 PID 716 wrote to memory of 636 716 {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe 90 PID 716 wrote to memory of 636 716 {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe 90 PID 716 wrote to memory of 636 716 {9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe 90 PID 2544 wrote to memory of 4852 2544 {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe 93 PID 2544 wrote to memory of 4852 2544 {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe 93 PID 2544 wrote to memory of 4852 2544 {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe 93 PID 2544 wrote to memory of 2472 2544 {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe 94 PID 2544 wrote to memory of 2472 2544 {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe 94 PID 2544 wrote to memory of 2472 2544 {5D7896BF-6D3F-41ba-827D-848181B35F30}.exe 94 PID 4852 wrote to memory of 4780 4852 {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe 96 PID 4852 wrote to memory of 4780 4852 {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe 96 PID 4852 wrote to memory of 4780 4852 {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe 96 PID 4852 wrote to memory of 4408 4852 {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe 97 PID 4852 wrote to memory of 4408 4852 {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe 97 PID 4852 wrote to memory of 4408 4852 {52B426A5-9104-4c66-969D-5C49A4113AEA}.exe 97 PID 4780 wrote to memory of 4260 4780 {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe 98 PID 4780 wrote to memory of 4260 4780 {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe 98 PID 4780 wrote to memory of 4260 4780 {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe 98 PID 4780 wrote to memory of 4664 4780 {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe 99 PID 4780 wrote to memory of 4664 4780 {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe 99 PID 4780 wrote to memory of 4664 4780 {F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe 99 PID 4260 wrote to memory of 3612 4260 {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe 100 PID 4260 wrote to memory of 3612 4260 {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe 100 PID 4260 wrote to memory of 3612 4260 {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe 100 PID 4260 wrote to memory of 3168 4260 {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe 101 PID 4260 wrote to memory of 3168 4260 {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe 101 PID 4260 wrote to memory of 3168 4260 {8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe 101 PID 3612 wrote to memory of 2248 3612 {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe 102 PID 3612 wrote to memory of 2248 3612 {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe 102 PID 3612 wrote to memory of 2248 3612 {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe 102 PID 3612 wrote to memory of 3344 3612 {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe 103 PID 3612 wrote to memory of 3344 3612 {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe 103 PID 3612 wrote to memory of 3344 3612 {56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe 103 PID 2248 wrote to memory of 4948 2248 {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe 104 PID 2248 wrote to memory of 4948 2248 {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe 104 PID 2248 wrote to memory of 4948 2248 {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe 104 PID 2248 wrote to memory of 1564 2248 {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe 105 PID 2248 wrote to memory of 1564 2248 {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe 105 PID 2248 wrote to memory of 1564 2248 {B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe 105 PID 4948 wrote to memory of 2240 4948 {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe 106 PID 4948 wrote to memory of 2240 4948 {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe 106 PID 4948 wrote to memory of 2240 4948 {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe 106 PID 4948 wrote to memory of 4492 4948 {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe 107 PID 4948 wrote to memory of 4492 4948 {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe 107 PID 4948 wrote to memory of 4492 4948 {5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe 107 PID 2240 wrote to memory of 2584 2240 {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe 108 PID 2240 wrote to memory of 2584 2240 {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe 108 PID 2240 wrote to memory of 2584 2240 {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe 108 PID 2240 wrote to memory of 4188 2240 {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe 109 PID 2240 wrote to memory of 4188 2240 {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe 109 PID 2240 wrote to memory of 4188 2240 {C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe 109 PID 2584 wrote to memory of 5088 2584 {311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe 110 PID 2584 wrote to memory of 5088 2584 {311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe 110 PID 2584 wrote to memory of 5088 2584 {311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe 110 PID 2584 wrote to memory of 3220 2584 {311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_52f8f92d3fed783453ad5bff2294461c_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\{9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exeC:\Windows\{9484D451-47A2-4a4b-AFC5-49B710CC0D49}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\{5D7896BF-6D3F-41ba-827D-848181B35F30}.exeC:\Windows\{5D7896BF-6D3F-41ba-827D-848181B35F30}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\{52B426A5-9104-4c66-969D-5C49A4113AEA}.exeC:\Windows\{52B426A5-9104-4c66-969D-5C49A4113AEA}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\{F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exeC:\Windows\{F0A42928-A44A-47d0-ACC9-4718FE38D5EA}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\{8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exeC:\Windows\{8D343C26-96B1-4e16-A3CD-AAEB9852885A}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\{56EE4EA7-6405-4042-BC34-777A665A4DD4}.exeC:\Windows\{56EE4EA7-6405-4042-BC34-777A665A4DD4}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\{B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exeC:\Windows\{B5A4300C-B4B8-440e-90FA-6B5EDA394147}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\{5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exeC:\Windows\{5DAE02AE-6DF7-49bb-AAD8-9CA808C9C14F}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\{C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exeC:\Windows\{C1AEF4C9-2A34-496e-A964-1EC198DEF940}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\{311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exeC:\Windows\{311D77B4-F315-4da5-8EE5-A73F5A9BF251}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\{E756108C-A391-46d1-A2C4-6936F9B4004A}.exeC:\Windows\{E756108C-A391-46d1-A2C4-6936F9B4004A}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5088 -
C:\Windows\{6DA081F5-D9B3-49d7-9BCE-57229C119E45}.exeC:\Windows\{6DA081F5-D9B3-49d7-9BCE-57229C119E45}.exe13⤵
- Executes dropped EXE
PID:1688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E7561~1.EXE > nul13⤵PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{311D7~1.EXE > nul12⤵PID:3220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C1AEF~1.EXE > nul11⤵PID:4188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5DAE0~1.EXE > nul10⤵PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5A43~1.EXE > nul9⤵PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56EE4~1.EXE > nul8⤵PID:3344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D343~1.EXE > nul7⤵PID:3168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F0A42~1.EXE > nul6⤵PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{52B42~1.EXE > nul5⤵PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D789~1.EXE > nul4⤵PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9484D~1.EXE > nul3⤵PID:636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD58a57648ec31b2785152a0b4db450baa6
SHA1727c69cbb2b90d96ca36d0a76e92618d99efea24
SHA2565821b3ddc22ac57f15ffa1a9f73c4dbdd5d87ee2162a5bc7477e4045e973e50e
SHA512415e34b437863ef8110f6f9b8b8116dda9fe0880f6aa43927a40b087d9ef27f696fd1b486d98aec33da88e53a5d64e5b75af4c9d1e1d3dcb8f8d0c16110097cb
-
Filesize
180KB
MD5aeb42725ee40e4645e95934251f71ca7
SHA1a6b64a1ff49e3956af8e602920a75833b8461d34
SHA256be2bf3882c6fb132dcb6c68b2821f14e7c6781461181df0958e538f422fce46c
SHA512874c25aee1fb553576d143d84d30bf8929249ef3d22732c15c79a50891aa98fe76c5d521f517187bf3c3a1ccab04453888f2ab599885029683edab9d2b6e97f3
-
Filesize
180KB
MD59b9fd2da0392b84942508511ef10c091
SHA14a5c16fade331553f81cc1cd4c355d70885e0189
SHA256d7a86dccbbeef78240cf6cefdb42aa0ff0436e3f130115ec54a6f9b63589b995
SHA512e44247b60bb792c201ba68968e66764a65df4c12d731e6332155eadf6135d275e51279b2d1e88d1bfe1cd3b9e155684b9964f119e8b3d4cf63becefe2b6a2fb8
-
Filesize
180KB
MD5e4bd5bbe1ccf975be5daed5fddffd6b8
SHA1a10a150a4fcc83a15f439f91acdfc9b8d5220e8b
SHA256e769d8eb78a816668983ad502c2e394ebd763a50667c279fe1c6b838780a91c4
SHA512b14fecb9db226339fb880456cdb41cd11bfd9dc967cf686b01c0c0cfe8f9b30c62e9f97eb75503c814fa12442d074abf19d6fb2fac07cc2b315cfa29f1b9fff5
-
Filesize
180KB
MD57e4e0561e196e206ce438e2c2aa9b5da
SHA1c910e46a60c26933cf98ea7ff10a679411303339
SHA2563c4ed5e6d3649715fd2543a15e03589b47f1d8aea3735490df3b48a740734fe7
SHA512240a830ec8d3ddb0c23db0955f68ca97bbaadd9894fbbc0b619e9a078cefb2a91f483d9eacc5f543a6fafbcfdc22c9fdd47c1cd46d676adcb5278f398a2492bc
-
Filesize
180KB
MD54763d321e3c67e321865839187626577
SHA1c464d4c8dcf0ee9aa97babe43132be44315f55c7
SHA25655b8fd8a08e71c6b39690d3009629b5d25e719950cde35b9175c0ed26aebdbf2
SHA512586f9b3385ee5f6a6230d43424a903d91bbde6209993a57deb5fd46fafac500c521d2f00d7d7c43d222b54d98504116a18d845fdf689ec9933d098e42959eeb7
-
Filesize
180KB
MD53177ae2c003aad0fd968d018e1f80717
SHA1bd49030e52b581ef1117c67e931dcc287cdcbe62
SHA256e2c2136f8d0e6a06730434d292ecb2b9f4e6ad4c704d1910880fcbf465945c3a
SHA512656c381752c418612396146d92faec19dc264c25210f8715d925906ce621a06cb41a376230cfa1d541cb0fb38d3a5dadfda6058c3df90e887a2342f3c243ad29
-
Filesize
180KB
MD52d3328b662af196333a7f3bf9dc97b91
SHA1d38d3dbd1b846ec689aff0ae21c3400fdb425c91
SHA256e068728e64e026a5cdf0cf901b75904478b3646a1f3b99efbfa204953905d7f7
SHA512847484f71f70c372e86e9e8808ff88765ed7cbcc3ff0cc5d10d6a1a0127a7405be9827da90c5b04c124f6474c2405e90510af3124a10344663de7aba83f0187e
-
Filesize
180KB
MD5ae033471934a7c90c2042f59c38517ef
SHA1e1435b35b34dff33b27a6211538723d6e456c03f
SHA2560886a998e84cc13aa79955b3ddf2fdc74975c05902d0fec2a094379dd91c5805
SHA5128abaa745aac5d4d82eb0f696bff13ead8f4ec7c1f073308dc0e3d0edc3c5f0002ce7fedcd0819c6154e298f3a10558b918490bb8fcb9e0e4235c40706e58a0d3
-
Filesize
180KB
MD5399186bdc735334fa99ea298e6a8e434
SHA1e773b4de203b1dd9abd943fc75561011c9b16d06
SHA256d41683655f48bd7049c76d749d5cf8d4f26d65ddd4c153496cbc004e34fa71b2
SHA51255b7e5475e9e0427c60db143d0a441cd3dd1f9b3c468a501cd68502c7a06aef885f7d6a68023662374bd666bbf0e0542af5f86d185c6adbfa2cae1dcfa6590f0
-
Filesize
180KB
MD52015aa6dcceba53c894643ec613513a7
SHA1b5d13dbc8492d6c59c0ac432cd14f3e7aa82cd03
SHA256c22b49def0a27634fa3cd6c78eec5ff38ab158e99c808a1a258eede0efcbbfe1
SHA512e3ff054a14207d4025622ec5396b133cff6d3869a9d6c7e3f3089b2081802d3eb70d234e9cbc4d77da780607fd36585209d511433b249c04ecc588337e057d02
-
Filesize
180KB
MD561c8d24a25a2024b82b25694ab67e90a
SHA15f7e5268890d969f8bf3b4586af92d97b2814b9c
SHA256eb258f9af199fca26bc7f83b36e6e27abfdcfae6684d5d89d0895567d728c565
SHA512ef32a3cc0ee2d030176d96d7b90ac4de503f13bd7670ba7e0af35fbccb6f398449a53324781ee7908d67a52fc04dc61d221988264fd3a8a4ffb4501618a7425d