Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe
-
Size
197KB
-
MD5
777754c13d3dc22f08d6082e8e27d82e
-
SHA1
3e1ba56b7c4918c60a6dcb87af77dba9c2bb9a02
-
SHA256
7e659811f2be64b1eb8a8effa6f5fec378c2f3f1930423be406fe1b331c15b57
-
SHA512
a78f9fee8fe4b492da5dd9b70ad2a46ba7646630f1011b7878c37c324c3f3c75c8bde5e713c745a997a69565a3951f41e2aa65dbc54ae83ecaf4c0ae116b9d82
-
SSDEEP
3072:jEGh0obl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGRlEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0008000000023459-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x001200000002345e-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002346e-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002347a-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002356e-17.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002337f-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023398-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c00000002337f-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000f000000023384-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000600000001db43-39.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023577-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002357d-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00208C7A-27BF-49b7-AD45-7022AE2B9929}\stubpath = "C:\\Windows\\{00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe" {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57636967-A717-4f40-8C19-DF9C323D7711} {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE} {57636967-A717-4f40-8C19-DF9C323D7711}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}\stubpath = "C:\\Windows\\{A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe" {57636967-A717-4f40-8C19-DF9C323D7711}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5C9013A8-3168-4e85-87CC-ACBB1ED46011} {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5C9013A8-3168-4e85-87CC-ACBB1ED46011}\stubpath = "C:\\Windows\\{5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe" {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{82AFA5D6-E7B6-4764-B72A-786878CCA04A}\stubpath = "C:\\Windows\\{82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe" {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{46E8505E-093B-4730-AD2C-61480BC04BFE} {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0B1622BD-4FDB-48e0-948C-710459BCD191} {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0B1622BD-4FDB-48e0-948C-710459BCD191}\stubpath = "C:\\Windows\\{0B1622BD-4FDB-48e0-948C-710459BCD191}.exe" {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{039A395C-96E7-4805-BE8D-50CEEC02E793}\stubpath = "C:\\Windows\\{039A395C-96E7-4805-BE8D-50CEEC02E793}.exe" {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1266E94-CC20-4908-87D4-C24A42DB016B} {5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0} 2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}\stubpath = "C:\\Windows\\{AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe" 2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{82AFA5D6-E7B6-4764-B72A-786878CCA04A} {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00208C7A-27BF-49b7-AD45-7022AE2B9929} {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{46E8505E-093B-4730-AD2C-61480BC04BFE}\stubpath = "C:\\Windows\\{46E8505E-093B-4730-AD2C-61480BC04BFE}.exe" {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{039A395C-96E7-4805-BE8D-50CEEC02E793} {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57636967-A717-4f40-8C19-DF9C323D7711}\stubpath = "C:\\Windows\\{57636967-A717-4f40-8C19-DF9C323D7711}.exe" {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C10F43B3-4C1A-49e5-9B4C-3A7404E32039} {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C10F43B3-4C1A-49e5-9B4C-3A7404E32039}\stubpath = "C:\\Windows\\{C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe" {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1266E94-CC20-4908-87D4-C24A42DB016B}\stubpath = "C:\\Windows\\{F1266E94-CC20-4908-87D4-C24A42DB016B}.exe" {5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EB4361DD-F2E8-4e2e-B067-103257887810} {F1266E94-CC20-4908-87D4-C24A42DB016B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EB4361DD-F2E8-4e2e-B067-103257887810}\stubpath = "C:\\Windows\\{EB4361DD-F2E8-4e2e-B067-103257887810}.exe" {F1266E94-CC20-4908-87D4-C24A42DB016B}.exe -
Executes dropped EXE 12 IoCs
pid Process 3008 {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe 3404 {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe 4488 {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe 4696 {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe 2112 {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe 1616 {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe 1608 {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe 1832 {57636967-A717-4f40-8C19-DF9C323D7711}.exe 2972 {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe 1084 {5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe 3988 {F1266E94-CC20-4908-87D4-C24A42DB016B}.exe 3620 {EB4361DD-F2E8-4e2e-B067-103257887810}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe 2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe File created C:\Windows\{82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe File created C:\Windows\{46E8505E-093B-4730-AD2C-61480BC04BFE}.exe {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe File created C:\Windows\{039A395C-96E7-4805-BE8D-50CEEC02E793}.exe {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe File created C:\Windows\{EB4361DD-F2E8-4e2e-B067-103257887810}.exe {F1266E94-CC20-4908-87D4-C24A42DB016B}.exe File created C:\Windows\{5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe File created C:\Windows\{F1266E94-CC20-4908-87D4-C24A42DB016B}.exe {5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe File created C:\Windows\{00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe File created C:\Windows\{0B1622BD-4FDB-48e0-948C-710459BCD191}.exe {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe File created C:\Windows\{C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe File created C:\Windows\{57636967-A717-4f40-8C19-DF9C323D7711}.exe {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe File created C:\Windows\{A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe {57636967-A717-4f40-8C19-DF9C323D7711}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4480 2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe Token: SeIncBasePriorityPrivilege 3008 {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe Token: SeIncBasePriorityPrivilege 3404 {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe Token: SeIncBasePriorityPrivilege 4488 {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe Token: SeIncBasePriorityPrivilege 4696 {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe Token: SeIncBasePriorityPrivilege 2112 {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe Token: SeIncBasePriorityPrivilege 1616 {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe Token: SeIncBasePriorityPrivilege 1608 {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe Token: SeIncBasePriorityPrivilege 1832 {57636967-A717-4f40-8C19-DF9C323D7711}.exe Token: SeIncBasePriorityPrivilege 2972 {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe Token: SeIncBasePriorityPrivilege 1084 {5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe Token: SeIncBasePriorityPrivilege 3988 {F1266E94-CC20-4908-87D4-C24A42DB016B}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 3008 4480 2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe 98 PID 4480 wrote to memory of 3008 4480 2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe 98 PID 4480 wrote to memory of 3008 4480 2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe 98 PID 4480 wrote to memory of 1288 4480 2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe 99 PID 4480 wrote to memory of 1288 4480 2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe 99 PID 4480 wrote to memory of 1288 4480 2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe 99 PID 3008 wrote to memory of 3404 3008 {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe 100 PID 3008 wrote to memory of 3404 3008 {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe 100 PID 3008 wrote to memory of 3404 3008 {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe 100 PID 3008 wrote to memory of 924 3008 {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe 101 PID 3008 wrote to memory of 924 3008 {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe 101 PID 3008 wrote to memory of 924 3008 {AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe 101 PID 3404 wrote to memory of 4488 3404 {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe 103 PID 3404 wrote to memory of 4488 3404 {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe 103 PID 3404 wrote to memory of 4488 3404 {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe 103 PID 3404 wrote to memory of 2292 3404 {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe 104 PID 3404 wrote to memory of 2292 3404 {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe 104 PID 3404 wrote to memory of 2292 3404 {82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe 104 PID 4488 wrote to memory of 4696 4488 {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe 106 PID 4488 wrote to memory of 4696 4488 {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe 106 PID 4488 wrote to memory of 4696 4488 {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe 106 PID 4488 wrote to memory of 5088 4488 {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe 107 PID 4488 wrote to memory of 5088 4488 {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe 107 PID 4488 wrote to memory of 5088 4488 {00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe 107 PID 4696 wrote to memory of 2112 4696 {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe 110 PID 4696 wrote to memory of 2112 4696 {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe 110 PID 4696 wrote to memory of 2112 4696 {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe 110 PID 4696 wrote to memory of 3616 4696 {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe 111 PID 4696 wrote to memory of 3616 4696 {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe 111 PID 4696 wrote to memory of 3616 4696 {46E8505E-093B-4730-AD2C-61480BC04BFE}.exe 111 PID 2112 wrote to memory of 1616 2112 {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe 112 PID 2112 wrote to memory of 1616 2112 {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe 112 PID 2112 wrote to memory of 1616 2112 {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe 112 PID 2112 wrote to memory of 2356 2112 {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe 113 PID 2112 wrote to memory of 2356 2112 {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe 113 PID 2112 wrote to memory of 2356 2112 {0B1622BD-4FDB-48e0-948C-710459BCD191}.exe 113 PID 1616 wrote to memory of 1608 1616 {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe 119 PID 1616 wrote to memory of 1608 1616 {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe 119 PID 1616 wrote to memory of 1608 1616 {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe 119 PID 1616 wrote to memory of 1472 1616 {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe 120 PID 1616 wrote to memory of 1472 1616 {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe 120 PID 1616 wrote to memory of 1472 1616 {039A395C-96E7-4805-BE8D-50CEEC02E793}.exe 120 PID 1608 wrote to memory of 1832 1608 {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe 124 PID 1608 wrote to memory of 1832 1608 {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe 124 PID 1608 wrote to memory of 1832 1608 {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe 124 PID 1608 wrote to memory of 332 1608 {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe 125 PID 1608 wrote to memory of 332 1608 {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe 125 PID 1608 wrote to memory of 332 1608 {C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe 125 PID 1832 wrote to memory of 2972 1832 {57636967-A717-4f40-8C19-DF9C323D7711}.exe 126 PID 1832 wrote to memory of 2972 1832 {57636967-A717-4f40-8C19-DF9C323D7711}.exe 126 PID 1832 wrote to memory of 2972 1832 {57636967-A717-4f40-8C19-DF9C323D7711}.exe 126 PID 1832 wrote to memory of 2288 1832 {57636967-A717-4f40-8C19-DF9C323D7711}.exe 127 PID 1832 wrote to memory of 2288 1832 {57636967-A717-4f40-8C19-DF9C323D7711}.exe 127 PID 1832 wrote to memory of 2288 1832 {57636967-A717-4f40-8C19-DF9C323D7711}.exe 127 PID 2972 wrote to memory of 1084 2972 {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe 129 PID 2972 wrote to memory of 1084 2972 {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe 129 PID 2972 wrote to memory of 1084 2972 {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe 129 PID 2972 wrote to memory of 3128 2972 {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe 130 PID 2972 wrote to memory of 3128 2972 {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe 130 PID 2972 wrote to memory of 3128 2972 {A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe 130 PID 1084 wrote to memory of 3988 1084 {5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe 133 PID 1084 wrote to memory of 3988 1084 {5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe 133 PID 1084 wrote to memory of 3988 1084 {5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe 133 PID 1084 wrote to memory of 3804 1084 {5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe 134
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_777754c13d3dc22f08d6082e8e27d82e_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\{AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exeC:\Windows\{AB105FD2-BAB5-42c4-BEAC-BDDA06BC78B0}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\{82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exeC:\Windows\{82AFA5D6-E7B6-4764-B72A-786878CCA04A}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\{00208C7A-27BF-49b7-AD45-7022AE2B9929}.exeC:\Windows\{00208C7A-27BF-49b7-AD45-7022AE2B9929}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\{46E8505E-093B-4730-AD2C-61480BC04BFE}.exeC:\Windows\{46E8505E-093B-4730-AD2C-61480BC04BFE}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\{0B1622BD-4FDB-48e0-948C-710459BCD191}.exeC:\Windows\{0B1622BD-4FDB-48e0-948C-710459BCD191}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\{039A395C-96E7-4805-BE8D-50CEEC02E793}.exeC:\Windows\{039A395C-96E7-4805-BE8D-50CEEC02E793}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\{C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exeC:\Windows\{C10F43B3-4C1A-49e5-9B4C-3A7404E32039}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\{57636967-A717-4f40-8C19-DF9C323D7711}.exeC:\Windows\{57636967-A717-4f40-8C19-DF9C323D7711}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\{A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exeC:\Windows\{A5454EA4-46F2-4288-83DE-A9EB4AEB7FAE}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exeC:\Windows\{5C9013A8-3168-4e85-87CC-ACBB1ED46011}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\{F1266E94-CC20-4908-87D4-C24A42DB016B}.exeC:\Windows\{F1266E94-CC20-4908-87D4-C24A42DB016B}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3988 -
C:\Windows\{EB4361DD-F2E8-4e2e-B067-103257887810}.exeC:\Windows\{EB4361DD-F2E8-4e2e-B067-103257887810}.exe13⤵
- Executes dropped EXE
PID:3620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1266~1.EXE > nul13⤵PID:3772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C901~1.EXE > nul12⤵PID:3804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A5454~1.EXE > nul11⤵PID:3128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{57636~1.EXE > nul10⤵PID:2288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C10F4~1.EXE > nul9⤵PID:332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{039A3~1.EXE > nul8⤵PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0B162~1.EXE > nul7⤵PID:2356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{46E85~1.EXE > nul6⤵PID:3616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{00208~1.EXE > nul5⤵PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{82AFA~1.EXE > nul4⤵PID:2292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AB105~1.EXE > nul3⤵PID:924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD58c4ce11543702b3a1d324ea2b223cfc8
SHA13fbca765352b86999fdf20cbe1c9de36b4af6a16
SHA256dc5a8eb713f30f39c87a59f2dde98eee016a7458f9fd6699d0a94fbde6c2da98
SHA512e9a3db6654d4f864f8a37fd2660fd96bda29bbfaa20fca082a93c834199a2f2b0469946ee3c11ade05b3a73acda06983178573527ae1b6e04b66a6e916125627
-
Filesize
197KB
MD5bdc26496419be31431d8564e93a27e2a
SHA14c453c38183efb22a793752e5bc5b01206727dcd
SHA256a166c0bd5cf50fa65caf4b66eedf340a1a6b9164a6c5a8fb91f5a18a596bef15
SHA5126f8966406cee1a93107fccded4bc241297e680b19ef7268f53a723957a3b96d80aca76be9fd5d72cc8e142bcd314fe468934a63bcf6da4d8fb9e9bb7a576e5be
-
Filesize
197KB
MD5e946aaabd74cab2c98863bf9df03e0ed
SHA19ab638a7d163e078095b4d092c3b1d7b14fc2dff
SHA2561a8fd302122c5b0b8b7bf6fe61565730abecf72d8f7af9a112889f8e927a2cc8
SHA512ced60a1144c2cc47863fbbfec1471ad70df75521a3259afb1c55c14a7b8141f047de5b38e81dbf5812c5f2697cc2763eceb191e91f26505b04222d41b058dd35
-
Filesize
197KB
MD50fe621cc119e50ed4e703b758885a3f0
SHA1bf1cc3a2a8af3a46022a06a3c877af62c65c3d15
SHA256e867338e126655186baedf61f2061ce925618a325767b2a0d51bd999556b4a5a
SHA512bb9b9759d60e6e6050b10c505aac788fc96cd4ea99c7a5704fe4eb7f7d2fe4092fae10c0ef1b115a1f6234fb70a8db31fa1344e6275ba625a74ec66084adbd58
-
Filesize
197KB
MD58f9069df2680fdb142a466c69e15e16b
SHA137812bc07d08008fe49b8abc0b56de5d56a81a38
SHA256170f40d736146e01059689c8da2079455201b48bb5ff0b44cba594c5bd6e55ac
SHA5123d7f6a542415c5dfcaf586a4dd3a09b6e234f5d8b925b995218a54de5da8e417c78ff4a34c9ca6946c0e4d120c591496ff96581edd9fe2c1a139b6a2218c80c4
-
Filesize
197KB
MD542c26b8ff8403bf669008403d999fa9a
SHA1c971d92f281764f7b647d78d3265b509d142c127
SHA256cba0a992f1109992b4463da713eea3635e3ffc01501bcce63adda0f6396d1cf3
SHA512a1a6c5fcf951b75be088c16c148c6debc52e9e95211a770a2c30258a19e88e49da5f581b29beeeac66c61f2b43af2e4ecb0a0d25280674188967ccc0453d3c61
-
Filesize
197KB
MD501d2f04b77d497e02f0b73b4912f8e89
SHA18cb1797ee599ac9d672dfcb13a9a6c29596c0501
SHA256572fd3f34caf8518ba790677acb33e4c3952f5e9b4f3044341ae63e700350fb4
SHA5126180c56bd2395f95a40bbe43f5de30e2a2d7560684a5ea01372b702cce9c0cea82130f50e895a1b9e0cea2f34f8ca0a363e854129446b481190ef03f3ee4926e
-
Filesize
197KB
MD529d1ebc51c9d04aba9e36e51bb967096
SHA14b4ca94aae91bacdb0b8f6b2be25815629962a11
SHA256cf05dd622e605c43cb7b4026771911aa329e76bacef10ff13ba75df3dbd41622
SHA5129b67fc0c2ac52c8adb3689cbfba2ade1d44e81657fbd491a0c25f52a4035305cbef722cb5167882ea2e6a6e115b5f95cb0b2c5b38231de328f74da0519b88181
-
Filesize
197KB
MD5a91624857b82891fc61211fdcf895420
SHA171ce7dcd3d3b403b61c4ccb0bf33c48d0f134aa9
SHA25653b38d5f088a5269107d93a24519ca278b862941aab1925123f69f6fa0497d7e
SHA512734c6e4f5210d6898385715cbe8c141550c3a8584df8d91da6863562d096a9075bc11234a64b6ecf80eed33d215eedb3cf0e9fe2856efbe1e77faa279e865734
-
Filesize
197KB
MD50d528d55220cd1989fcb7800b154d0bb
SHA107b0895aa7610e147b7df1b1ca49c10d3bd4ad8c
SHA2567cc9fdaa251c079c51ed687dfff6ece46906e5195e2f424cbe4645b5db07cec0
SHA512fadae299cc05f2312e64552bb6a31751284201a6ec184514ca13d90eb2181f8b156f0d82bf25e9fdbe7ace50822e615d2c1fa919b167c5f151ff5f084471558b
-
Filesize
197KB
MD5c35c362e5f396f93f87f193ab8c8eeae
SHA17dec20af92797e13168c3ab1ab5d2fef21d1c24a
SHA25662c788373d35b91732bc5972c352e5d624bdbdda1c1d086bd1eb874a18d72e99
SHA512d71b37cce2ebb728311ee7256b813b1a0cb44148ebfd032ddfee5a2cd648ff3f1814bcfe27b64cdc20c8168a85bbce522060ec358b0b32efdf82ad22aa5f360b
-
Filesize
197KB
MD5dcc97f44fb4608e696fce102cc0daa07
SHA160dadbcb9d5966d5003618361bb83a5d3d0744af
SHA2564b3e4bb644b6255a42208c2e64186f116a6940b666c1f2bd6ff1edb777dba4f6
SHA512d36b216ca5a98918cd09976b19f2bdd919015a3cb11a40d5fdcb9a4d74b93f12ceb80e239b3ebca9d1df2639ec483d4ecbd6bc5fb9330f80ca28a5db7a68df90