Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe
-
Size
408KB
-
MD5
1be85fc73534ed8bf5202dcfe75ca233
-
SHA1
79b7f5098f40f72c7d32b6f8ff74b13fb4975bab
-
SHA256
85a083fbef249b1262b39e78a6466f1fc2f0584455d71eab1dd19fedbdace727
-
SHA512
6e1b8a34300ccc265c0bcc560b84b248bac1e2a8bad4748b1098958c16722d24cc7f420b53a7717cfb654a48d45a1ff8a2506a21c97b77a1715db69b5c774864
-
SSDEEP
3072:CEGh0ofl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGRldOe2MUVg3vTeKcAEciTBqr3jy9
Malware Config
Signatures
-
Auto-generated rule 11 IoCs
resource yara_rule behavioral2/files/0x0008000000023249-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002324c-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023264-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0012000000023119-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000900000002324c-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00020000000219e9-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00020000000219ea-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070d-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070f-35.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0006000000000026-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0005000000000507-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0A177BF9-9D96-4a17-A957-A3A5068D2C63} {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4582B23F-C8B4-4b12-8B7F-2A2D82705263}\stubpath = "C:\\Windows\\{4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe" {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{572393E5-D545-4da9-B67F-16A43899F7E6}\stubpath = "C:\\Windows\\{572393E5-D545-4da9-B67F-16A43899F7E6}.exe" {9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57A5A87E-76A9-4083-A74E-D4BEF22435C7}\stubpath = "C:\\Windows\\{57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe" {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}\stubpath = "C:\\Windows\\{9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe" {BB84690D-8814-4fec-A338-77CBB5797E39}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0EECDC8-9472-43f2-8F0A-B3C54298D360} {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D62CCBDF-767F-4183-A6E5-6908E8D347A8}\stubpath = "C:\\Windows\\{D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe" {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57A5A87E-76A9-4083-A74E-D4BEF22435C7} {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{940690B0-67F4-444c-B9E2-16E872E45BA2}\stubpath = "C:\\Windows\\{940690B0-67F4-444c-B9E2-16E872E45BA2}.exe" {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB8FBA7A-90B6-46ec-BC62-ACBA029EC171} {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B5DB931-14A8-4ca1-934F-8D236CC7B7DC} {CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB84690D-8814-4fec-A338-77CBB5797E39} 2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4582B23F-C8B4-4b12-8B7F-2A2D82705263} {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}\stubpath = "C:\\Windows\\{CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe" {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{572393E5-D545-4da9-B67F-16A43899F7E6} {9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0A177BF9-9D96-4a17-A957-A3A5068D2C63}\stubpath = "C:\\Windows\\{0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe" {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9CAA2A7C-4667-4e41-BC03-BBBD25F400B2} {BB84690D-8814-4fec-A338-77CBB5797E39}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0EECDC8-9472-43f2-8F0A-B3C54298D360}\stubpath = "C:\\Windows\\{A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe" {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D62CCBDF-767F-4183-A6E5-6908E8D347A8} {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{940690B0-67F4-444c-B9E2-16E872E45BA2} {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{415F6A98-6E22-47ef-8B7C-779CAA45E45C} {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{415F6A98-6E22-47ef-8B7C-779CAA45E45C}\stubpath = "C:\\Windows\\{415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe" {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}\stubpath = "C:\\Windows\\{9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe" {CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB84690D-8814-4fec-A338-77CBB5797E39}\stubpath = "C:\\Windows\\{BB84690D-8814-4fec-A338-77CBB5797E39}.exe" 2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe -
Executes dropped EXE 11 IoCs
pid Process 3480 {BB84690D-8814-4fec-A338-77CBB5797E39}.exe 2304 {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe 4572 {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe 4052 {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe 752 {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe 4320 {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe 2740 {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe 1684 {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe 3152 {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe 2660 {CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe 3964 {9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe File created C:\Windows\{57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe File created C:\Windows\{0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe File created C:\Windows\{940690B0-67F4-444c-B9E2-16E872E45BA2}.exe {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe File created C:\Windows\{415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe File created C:\Windows\{BB84690D-8814-4fec-A338-77CBB5797E39}.exe 2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe File created C:\Windows\{9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe {BB84690D-8814-4fec-A338-77CBB5797E39}.exe File created C:\Windows\{A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe File created C:\Windows\{4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe File created C:\Windows\{CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe File created C:\Windows\{9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe {CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe File created C:\Windows\{572393E5-D545-4da9-B67F-16A43899F7E6}.exe {9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5100 2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe Token: SeIncBasePriorityPrivilege 3480 {BB84690D-8814-4fec-A338-77CBB5797E39}.exe Token: SeIncBasePriorityPrivilege 2304 {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe Token: SeIncBasePriorityPrivilege 4572 {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe Token: SeIncBasePriorityPrivilege 4052 {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe Token: SeIncBasePriorityPrivilege 752 {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe Token: SeIncBasePriorityPrivilege 4320 {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe Token: SeIncBasePriorityPrivilege 2740 {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe Token: SeIncBasePriorityPrivilege 1684 {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe Token: SeIncBasePriorityPrivilege 3152 {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe Token: SeIncBasePriorityPrivilege 2660 {CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe Token: SeIncBasePriorityPrivilege 3964 {9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3480 5100 2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe 90 PID 5100 wrote to memory of 3480 5100 2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe 90 PID 5100 wrote to memory of 3480 5100 2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe 90 PID 5100 wrote to memory of 4212 5100 2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe 91 PID 5100 wrote to memory of 4212 5100 2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe 91 PID 5100 wrote to memory of 4212 5100 2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe 91 PID 3480 wrote to memory of 2304 3480 {BB84690D-8814-4fec-A338-77CBB5797E39}.exe 95 PID 3480 wrote to memory of 2304 3480 {BB84690D-8814-4fec-A338-77CBB5797E39}.exe 95 PID 3480 wrote to memory of 2304 3480 {BB84690D-8814-4fec-A338-77CBB5797E39}.exe 95 PID 3480 wrote to memory of 1032 3480 {BB84690D-8814-4fec-A338-77CBB5797E39}.exe 96 PID 3480 wrote to memory of 1032 3480 {BB84690D-8814-4fec-A338-77CBB5797E39}.exe 96 PID 3480 wrote to memory of 1032 3480 {BB84690D-8814-4fec-A338-77CBB5797E39}.exe 96 PID 2304 wrote to memory of 4572 2304 {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe 102 PID 2304 wrote to memory of 4572 2304 {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe 102 PID 2304 wrote to memory of 4572 2304 {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe 102 PID 2304 wrote to memory of 4876 2304 {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe 103 PID 2304 wrote to memory of 4876 2304 {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe 103 PID 2304 wrote to memory of 4876 2304 {9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe 103 PID 4572 wrote to memory of 4052 4572 {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe 105 PID 4572 wrote to memory of 4052 4572 {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe 105 PID 4572 wrote to memory of 4052 4572 {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe 105 PID 4572 wrote to memory of 4800 4572 {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe 106 PID 4572 wrote to memory of 4800 4572 {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe 106 PID 4572 wrote to memory of 4800 4572 {A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe 106 PID 4052 wrote to memory of 752 4052 {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe 107 PID 4052 wrote to memory of 752 4052 {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe 107 PID 4052 wrote to memory of 752 4052 {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe 107 PID 4052 wrote to memory of 5012 4052 {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe 108 PID 4052 wrote to memory of 5012 4052 {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe 108 PID 4052 wrote to memory of 5012 4052 {D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe 108 PID 752 wrote to memory of 4320 752 {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe 109 PID 752 wrote to memory of 4320 752 {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe 109 PID 752 wrote to memory of 4320 752 {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe 109 PID 752 wrote to memory of 4384 752 {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe 110 PID 752 wrote to memory of 4384 752 {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe 110 PID 752 wrote to memory of 4384 752 {57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe 110 PID 4320 wrote to memory of 2740 4320 {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe 111 PID 4320 wrote to memory of 2740 4320 {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe 111 PID 4320 wrote to memory of 2740 4320 {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe 111 PID 4320 wrote to memory of 2752 4320 {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe 112 PID 4320 wrote to memory of 2752 4320 {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe 112 PID 4320 wrote to memory of 2752 4320 {0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe 112 PID 2740 wrote to memory of 1684 2740 {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe 113 PID 2740 wrote to memory of 1684 2740 {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe 113 PID 2740 wrote to memory of 1684 2740 {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe 113 PID 2740 wrote to memory of 496 2740 {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe 114 PID 2740 wrote to memory of 496 2740 {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe 114 PID 2740 wrote to memory of 496 2740 {940690B0-67F4-444c-B9E2-16E872E45BA2}.exe 114 PID 1684 wrote to memory of 3152 1684 {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe 115 PID 1684 wrote to memory of 3152 1684 {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe 115 PID 1684 wrote to memory of 3152 1684 {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe 115 PID 1684 wrote to memory of 1836 1684 {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe 116 PID 1684 wrote to memory of 1836 1684 {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe 116 PID 1684 wrote to memory of 1836 1684 {4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe 116 PID 3152 wrote to memory of 2660 3152 {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe 117 PID 3152 wrote to memory of 2660 3152 {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe 117 PID 3152 wrote to memory of 2660 3152 {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe 117 PID 3152 wrote to memory of 3408 3152 {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe 118 PID 3152 wrote to memory of 3408 3152 {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe 118 PID 3152 wrote to memory of 3408 3152 {415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe 118 PID 2660 wrote to memory of 3964 2660 {CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe 119 PID 2660 wrote to memory of 3964 2660 {CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe 119 PID 2660 wrote to memory of 3964 2660 {CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe 119 PID 2660 wrote to memory of 4176 2660 {CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\{BB84690D-8814-4fec-A338-77CBB5797E39}.exeC:\Windows\{BB84690D-8814-4fec-A338-77CBB5797E39}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\{9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exeC:\Windows\{9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\{A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exeC:\Windows\{A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\{D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exeC:\Windows\{D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\{57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exeC:\Windows\{57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\{0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exeC:\Windows\{0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\{940690B0-67F4-444c-B9E2-16E872E45BA2}.exeC:\Windows\{940690B0-67F4-444c-B9E2-16E872E45BA2}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\{4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exeC:\Windows\{4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\{415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exeC:\Windows\{415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\{CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exeC:\Windows\{CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\{9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exeC:\Windows\{9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Windows\{572393E5-D545-4da9-B67F-16A43899F7E6}.exeC:\Windows\{572393E5-D545-4da9-B67F-16A43899F7E6}.exe13⤵PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB8FB~1.EXE > nul12⤵PID:4176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{415F6~1.EXE > nul11⤵PID:3408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4582B~1.EXE > nul10⤵PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{94069~1.EXE > nul9⤵PID:496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0A177~1.EXE > nul8⤵PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{57A5A~1.EXE > nul7⤵PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D62CC~1.EXE > nul6⤵PID:5012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A0EEC~1.EXE > nul5⤵PID:4800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9CAA2~1.EXE > nul4⤵PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BB846~1.EXE > nul3⤵PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3692 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD53731f8dc29aa2e25aacb82f5341fabfa
SHA11ff6a78891f9524caf27a3157b7350d2a77cdf37
SHA2560e336f16fc777d8065adc769f353022a822cb2c9a8ec92d0abb623083d7fb98c
SHA512ebdbac88507dc3db9b7da729f8c980b9fa71db4a5923012a17ca17088de607be8f763947a5f5a9c60bb2a13195ec8fa45e3ecd2bd9c956b655dfa1ff61b9bd64
-
Filesize
408KB
MD59928a5b1755c6fc6124b391963129511
SHA1ed99b8b797a0f11bbdf08c5f78b80fefe73f3842
SHA256580d797d809377bbe12afd7e732b6664a36bfc6776aa107854245ed860289007
SHA512422ed82712fe366f176da8638d0827e82565e8d1b4f4da2f4f5979e13ac6419611dd67ff023d5440ceb77aa902ac4f21853ba9b2bdbdee9cd8a55ca14f7153a8
-
Filesize
408KB
MD553260a3f6ba2aac6449b2f8ed150d260
SHA1fe00e89800d3c2ece28329ac7bb933069686b5de
SHA256f2a651482df692fbd634ebd687b5d6b0ce537005d9461c64b11a85cd986ebbd4
SHA512dc12cad85b5165776aefcf45a949fb3b2a5b8518d7d2b0ce49241490b320b37ca3ea74f97fddf57c6691c24ab20b313268647dc0380279910bf76bf17b0f6813
-
Filesize
408KB
MD5e99206b6c2a283c7332aef02548ab06e
SHA1f998a8033893506696ce4a68a72c01061e32f1b9
SHA256a72b933e48365ebec9d42b17dc8f6653cee6a402b6de405b6c969e4715be7f19
SHA51298dab963b4e4e477bbe58e241e22c2e039aa6dfc6d8825734add11de0bcaa27a70f6397cf6b2f8131395fbc7b812a9f6c9fc64e9cb27d342b1469cd65a45a6a1
-
Filesize
408KB
MD5a9a4cc84a6b89bb09b549ddf17fb27f5
SHA14edb24a9ebb5c14ba6d2e88c04acbb89698b76e3
SHA2563264cc7cf72ae6047ad3cd4e9912d1353f3103a0c9463c8e3afc9e418ffa525c
SHA512135df943020f0420ebd49b3ea2b7ec9abe0b1fe74ddaac9bc1e21652656f098defa5d77ef52cc47c2ff809969eba0b352f95d1517a8c68b71f462a1ab7049a14
-
Filesize
408KB
MD54c940efe91a9e4ea4b185c718e924e39
SHA14a30ff01e2c7038b4216935b3e8b637aad29cec4
SHA2566f10f78ebff375e6cb852e49012fefa0f7bbf30f88c2b45316123199ce6b14ec
SHA512c66974f97e214e505a069321ae42f325ad4280be999165b32980388895c15919ab0ed52adb723e11ed9b21381f8b210aec6a3f58d14946c2fefe85eca47e8c37
-
Filesize
408KB
MD54f082df8b001ee1ec1686cef19c0abed
SHA128efddab7ea5541da27db87a83b353e3f7f1fac1
SHA256bcb867f42b31ae412923645c6deb9ea22a2c9c75dd886a3c2e41b4a149e5e53c
SHA512afe44990994ea2089f374dba55f44cf03d9f760676df3907ffdeaa82c9984920eb412cc8fcc30372ed58230f69381657cd143424b23c774afbf93740dc64f540
-
Filesize
408KB
MD55314a3db57dba7da15d781ae725ae3c0
SHA153c4a7c5cb1a7bb838cd36820fc6588b605cceea
SHA2564247daba9bf9285ec498cbc885793e7e9f204847f6c1ae0851021d42bbd2de64
SHA5127aa0c9bd8ec0034833c6b9c642ffb4d7c3c96bbf922ab9a3b1f93b36eccf83ae65bc6e1fc7ac6cdefd24570eeb3189a6a10d6a617618f2b5723a4965d86fc4a0
-
Filesize
408KB
MD580022cb39548d57c2de95ce30999e9e5
SHA1f7779515a5fde59caba85cc72dfc01ec5dc08fd2
SHA256c222b68b7660a92a4ca91248639507d6d841a1e02aa26853ecc6612e6b886d81
SHA512eddbecd2583dc5ffcbccfde22b1aea430d8950a9b75e4db10b55a80da1fd5f54433b53f48f0b555cd3776fced609be78050c1043c8eb3fcf3e8c8bcb8150530d
-
Filesize
408KB
MD52411df9ab177ec60847a6d825ad26851
SHA1dd13477a2a85947113128500c8b623eaa2ce2ff6
SHA25643a4ae492fabb65d2bb961a327254f2c249a18b333205a773fd530d7c2237718
SHA51273d6f641d405f6f81ba6e8d9f6e34a15617d8f59911c52009bc2e7fb0f07fb8a9979d414e2e88d736887e1221054afcf81f1408ac5c5d99fc175b4c83a663853
-
Filesize
408KB
MD5788db080de71bd98680c541bf24f8e82
SHA1a88111c45773cd0f8da4402845e68c5e805bbf43
SHA256f776c2102044e95e1f28ed5550d46b27ec61ad28d7c2a736c52ff62510eeddca
SHA512c97899fcb6fcc72278abb5b14593e8bcd368684c4624426323821a777542d5c67cc10d72b68724a736d30a2cfe5bbce5877644501527071b091876f4790495dc