Analysis
-
max time kernel
149s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe
-
Size
197KB
-
MD5
2db276831963609abab179ef7e026e56
-
SHA1
37b9a6d66a32477bc67bb0ea80607581ec43ecb7
-
SHA256
63266e8b189ab68064dd6b08c3a59a9a77f34aa0ddd0d05c487c589f5cda09d5
-
SHA512
75f635aff9846fc48241a3df8edaba182c88437fb48b32e409ff2c98abd2715fdef7ecd7683410cc0284451cf4f5771a56a3acd580f5a4b9a9c300672bf4c7aa
-
SSDEEP
3072:jEGh0ogl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGilEeKcAEca
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
Processes:
resource yara_rule C:\Windows\{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{018F4772-0CAD-4171-A503-6F3888156C24}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{9C09DB46-F313-484d-A5EB-832D63243453}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{FABA9794-6B16-41c8-8685-48E72CE52F76}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe GoldenEyeRansomware_Dropper_MalformedZoomit C:\Windows\{04A0076D-679F-4c8b-B93E-397929ED14E7}.exe GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
Processes:
{9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe{018F4772-0CAD-4171-A503-6F3888156C24}.exe{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe{FABA9794-6B16-41c8-8685-48E72CE52F76}.exe{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe{9C09DB46-F313-484d-A5EB-832D63243453}.exe{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{04A0076D-679F-4c8b-B93E-397929ED14E7} {9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{710B2759-11AC-4e9b-8898-9ABE658AD8DC} 2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{018F4772-0CAD-4171-A503-6F3888156C24} {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9DE9B746-6A39-4348-9B5F-06049557CD4D} {018F4772-0CAD-4171-A503-6F3888156C24}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{10C3D49B-BE02-4af5-BA2E-149C6B016647} {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{10C3D49B-BE02-4af5-BA2E-149C6B016647}\stubpath = "C:\\Windows\\{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe" {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{018F4772-0CAD-4171-A503-6F3888156C24}\stubpath = "C:\\Windows\\{018F4772-0CAD-4171-A503-6F3888156C24}.exe" {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}\stubpath = "C:\\Windows\\{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe" {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9260A271-C2BC-4578-B547-ACBA860BA9B1}\stubpath = "C:\\Windows\\{9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe" {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{04A0076D-679F-4c8b-B93E-397929ED14E7}\stubpath = "C:\\Windows\\{04A0076D-679F-4c8b-B93E-397929ED14E7}.exe" {9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9C09DB46-F313-484d-A5EB-832D63243453} {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FABA9794-6B16-41c8-8685-48E72CE52F76} {9C09DB46-F313-484d-A5EB-832D63243453}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9260A271-C2BC-4578-B547-ACBA860BA9B1} {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9DE9B746-6A39-4348-9B5F-06049557CD4D}\stubpath = "C:\\Windows\\{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe" {018F4772-0CAD-4171-A503-6F3888156C24}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03A0E293-EA95-4cba-8C90-F3106A4C47F8}\stubpath = "C:\\Windows\\{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe" {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8} {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF} {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}\stubpath = "C:\\Windows\\{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe" {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FABA9794-6B16-41c8-8685-48E72CE52F76}\stubpath = "C:\\Windows\\{FABA9794-6B16-41c8-8685-48E72CE52F76}.exe" {9C09DB46-F313-484d-A5EB-832D63243453}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{710B2759-11AC-4e9b-8898-9ABE658AD8DC}\stubpath = "C:\\Windows\\{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe" 2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03A0E293-EA95-4cba-8C90-F3106A4C47F8} {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE} {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}\stubpath = "C:\\Windows\\{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe" {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9C09DB46-F313-484d-A5EB-832D63243453}\stubpath = "C:\\Windows\\{9C09DB46-F313-484d-A5EB-832D63243453}.exe" {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe -
Executes dropped EXE 12 IoCs
Processes:
{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe{018F4772-0CAD-4171-A503-6F3888156C24}.exe{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe{9C09DB46-F313-484d-A5EB-832D63243453}.exe{FABA9794-6B16-41c8-8685-48E72CE52F76}.exe{9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe{04A0076D-679F-4c8b-B93E-397929ED14E7}.exepid process 4720 {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe 1960 {018F4772-0CAD-4171-A503-6F3888156C24}.exe 3288 {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe 4224 {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe 1048 {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe 2596 {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe 4080 {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe 4488 {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe 4244 {9C09DB46-F313-484d-A5EB-832D63243453}.exe 2540 {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe 4976 {9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe 4820 {04A0076D-679F-4c8b-B93E-397929ED14E7}.exe -
Drops file in Windows directory 12 IoCs
Processes:
{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe{FABA9794-6B16-41c8-8685-48E72CE52F76}.exe{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe{9C09DB46-F313-484d-A5EB-832D63243453}.exe{9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe{018F4772-0CAD-4171-A503-6F3888156C24}.exe{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exedescription ioc process File created C:\Windows\{9C09DB46-F313-484d-A5EB-832D63243453}.exe {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe File created C:\Windows\{9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe File created C:\Windows\{018F4772-0CAD-4171-A503-6F3888156C24}.exe {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe File created C:\Windows\{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe File created C:\Windows\{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe File created C:\Windows\{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe File created C:\Windows\{FABA9794-6B16-41c8-8685-48E72CE52F76}.exe {9C09DB46-F313-484d-A5EB-832D63243453}.exe File created C:\Windows\{04A0076D-679F-4c8b-B93E-397929ED14E7}.exe {9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe File created C:\Windows\{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe 2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe File created C:\Windows\{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe {018F4772-0CAD-4171-A503-6F3888156C24}.exe File created C:\Windows\{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe File created C:\Windows\{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe{018F4772-0CAD-4171-A503-6F3888156C24}.exe{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe{9C09DB46-F313-484d-A5EB-832D63243453}.exe{FABA9794-6B16-41c8-8685-48E72CE52F76}.exe{9260A271-C2BC-4578-B547-ACBA860BA9B1}.exedescription pid process Token: SeIncBasePriorityPrivilege 2228 2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe Token: SeIncBasePriorityPrivilege 4720 {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe Token: SeIncBasePriorityPrivilege 1960 {018F4772-0CAD-4171-A503-6F3888156C24}.exe Token: SeIncBasePriorityPrivilege 3288 {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe Token: SeIncBasePriorityPrivilege 4224 {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe Token: SeIncBasePriorityPrivilege 1048 {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe Token: SeIncBasePriorityPrivilege 2596 {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe Token: SeIncBasePriorityPrivilege 4080 {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe Token: SeIncBasePriorityPrivilege 4488 {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe Token: SeIncBasePriorityPrivilege 4244 {9C09DB46-F313-484d-A5EB-832D63243453}.exe Token: SeIncBasePriorityPrivilege 2540 {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe Token: SeIncBasePriorityPrivilege 4976 {9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe{018F4772-0CAD-4171-A503-6F3888156C24}.exe{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe{9C09DB46-F313-484d-A5EB-832D63243453}.exe{FABA9794-6B16-41c8-8685-48E72CE52F76}.exedescription pid process target process PID 2228 wrote to memory of 4720 2228 2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe PID 2228 wrote to memory of 4720 2228 2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe PID 2228 wrote to memory of 4720 2228 2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe PID 2228 wrote to memory of 4336 2228 2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe cmd.exe PID 2228 wrote to memory of 4336 2228 2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe cmd.exe PID 2228 wrote to memory of 4336 2228 2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe cmd.exe PID 4720 wrote to memory of 1960 4720 {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe {018F4772-0CAD-4171-A503-6F3888156C24}.exe PID 4720 wrote to memory of 1960 4720 {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe {018F4772-0CAD-4171-A503-6F3888156C24}.exe PID 4720 wrote to memory of 1960 4720 {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe {018F4772-0CAD-4171-A503-6F3888156C24}.exe PID 4720 wrote to memory of 1288 4720 {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe cmd.exe PID 4720 wrote to memory of 1288 4720 {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe cmd.exe PID 4720 wrote to memory of 1288 4720 {710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe cmd.exe PID 1960 wrote to memory of 3288 1960 {018F4772-0CAD-4171-A503-6F3888156C24}.exe {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe PID 1960 wrote to memory of 3288 1960 {018F4772-0CAD-4171-A503-6F3888156C24}.exe {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe PID 1960 wrote to memory of 3288 1960 {018F4772-0CAD-4171-A503-6F3888156C24}.exe {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe PID 1960 wrote to memory of 3728 1960 {018F4772-0CAD-4171-A503-6F3888156C24}.exe cmd.exe PID 1960 wrote to memory of 3728 1960 {018F4772-0CAD-4171-A503-6F3888156C24}.exe cmd.exe PID 1960 wrote to memory of 3728 1960 {018F4772-0CAD-4171-A503-6F3888156C24}.exe cmd.exe PID 3288 wrote to memory of 4224 3288 {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe PID 3288 wrote to memory of 4224 3288 {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe PID 3288 wrote to memory of 4224 3288 {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe PID 3288 wrote to memory of 1672 3288 {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe cmd.exe PID 3288 wrote to memory of 1672 3288 {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe cmd.exe PID 3288 wrote to memory of 1672 3288 {9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe cmd.exe PID 4224 wrote to memory of 1048 4224 {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe PID 4224 wrote to memory of 1048 4224 {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe PID 4224 wrote to memory of 1048 4224 {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe PID 4224 wrote to memory of 1732 4224 {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe cmd.exe PID 4224 wrote to memory of 1732 4224 {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe cmd.exe PID 4224 wrote to memory of 1732 4224 {03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe cmd.exe PID 1048 wrote to memory of 2596 1048 {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe PID 1048 wrote to memory of 2596 1048 {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe PID 1048 wrote to memory of 2596 1048 {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe PID 1048 wrote to memory of 2368 1048 {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe cmd.exe PID 1048 wrote to memory of 2368 1048 {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe cmd.exe PID 1048 wrote to memory of 2368 1048 {10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe cmd.exe PID 2596 wrote to memory of 4080 2596 {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe PID 2596 wrote to memory of 4080 2596 {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe PID 2596 wrote to memory of 4080 2596 {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe PID 2596 wrote to memory of 5016 2596 {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe cmd.exe PID 2596 wrote to memory of 5016 2596 {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe cmd.exe PID 2596 wrote to memory of 5016 2596 {38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe cmd.exe PID 4080 wrote to memory of 4488 4080 {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe PID 4080 wrote to memory of 4488 4080 {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe PID 4080 wrote to memory of 4488 4080 {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe PID 4080 wrote to memory of 4160 4080 {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe cmd.exe PID 4080 wrote to memory of 4160 4080 {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe cmd.exe PID 4080 wrote to memory of 4160 4080 {16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe cmd.exe PID 4488 wrote to memory of 4244 4488 {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe {9C09DB46-F313-484d-A5EB-832D63243453}.exe PID 4488 wrote to memory of 4244 4488 {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe {9C09DB46-F313-484d-A5EB-832D63243453}.exe PID 4488 wrote to memory of 4244 4488 {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe {9C09DB46-F313-484d-A5EB-832D63243453}.exe PID 4488 wrote to memory of 708 4488 {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe cmd.exe PID 4488 wrote to memory of 708 4488 {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe cmd.exe PID 4488 wrote to memory of 708 4488 {9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe cmd.exe PID 4244 wrote to memory of 2540 4244 {9C09DB46-F313-484d-A5EB-832D63243453}.exe {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe PID 4244 wrote to memory of 2540 4244 {9C09DB46-F313-484d-A5EB-832D63243453}.exe {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe PID 4244 wrote to memory of 2540 4244 {9C09DB46-F313-484d-A5EB-832D63243453}.exe {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe PID 4244 wrote to memory of 996 4244 {9C09DB46-F313-484d-A5EB-832D63243453}.exe cmd.exe PID 4244 wrote to memory of 996 4244 {9C09DB46-F313-484d-A5EB-832D63243453}.exe cmd.exe PID 4244 wrote to memory of 996 4244 {9C09DB46-F313-484d-A5EB-832D63243453}.exe cmd.exe PID 2540 wrote to memory of 4976 2540 {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe {9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe PID 2540 wrote to memory of 4976 2540 {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe {9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe PID 2540 wrote to memory of 4976 2540 {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe {9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe PID 2540 wrote to memory of 1840 2540 {FABA9794-6B16-41c8-8685-48E72CE52F76}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-27_2db276831963609abab179ef7e026e56_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exeC:\Windows\{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{018F4772-0CAD-4171-A503-6F3888156C24}.exeC:\Windows\{018F4772-0CAD-4171-A503-6F3888156C24}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exeC:\Windows\{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exeC:\Windows\{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exeC:\Windows\{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exeC:\Windows\{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exeC:\Windows\{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exeC:\Windows\{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{9C09DB46-F313-484d-A5EB-832D63243453}.exeC:\Windows\{9C09DB46-F313-484d-A5EB-832D63243453}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{FABA9794-6B16-41c8-8685-48E72CE52F76}.exeC:\Windows\{FABA9794-6B16-41c8-8685-48E72CE52F76}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{9260A271-C2BC-4578-B547-ACBA860BA9B1}.exeC:\Windows\{9260A271-C2BC-4578-B547-ACBA860BA9B1}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{04A0076D-679F-4c8b-B93E-397929ED14E7}.exeC:\Windows\{04A0076D-679F-4c8b-B93E-397929ED14E7}.exe13⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9260A~1.EXE > nul13⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FABA9~1.EXE > nul12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9C09D~1.EXE > nul11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9EA59~1.EXE > nul10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16AB0~1.EXE > nul9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{38EC8~1.EXE > nul8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{10C3D~1.EXE > nul7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03A0E~1.EXE > nul6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9DE9B~1.EXE > nul5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{018F4~1.EXE > nul4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{710B2~1.EXE > nul3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\{018F4772-0CAD-4171-A503-6F3888156C24}.exeFilesize
197KB
MD5fb80e0e361e24e873d7d67c98ef6fafd
SHA11201da3ee0ff00a404cab81a757a54687d91898d
SHA256b6c50dcaad1093876309d5f4d2a0f21af6ea77310b1637aeb224c8281a2fa704
SHA512e86c57a516f904225ed760166f629360ad58e0c0cda8331bd0b1def17999d1595b895eac0a52b8d249cb2ebe8489c858315f97565dae83049dea9e700e55e5ce
-
C:\Windows\{03A0E293-EA95-4cba-8C90-F3106A4C47F8}.exeFilesize
197KB
MD566702f078112a94a4467cf2778388554
SHA1f8b6bf3e7166c860ed082442d7f308c806a1c188
SHA256af066c4e768f11b07feac63224da13f36fed07e90d0bb5205d30cc5da78ec8da
SHA512ed72664b606b9462b8faefe738809f5756312c21786ec4036f7f282bbbba75e25d8c788267c7391a9ac67a253a808759bdd5f299d7724cfc2fbaef018b803262
-
C:\Windows\{04A0076D-679F-4c8b-B93E-397929ED14E7}.exeFilesize
197KB
MD5739c0b74943be30180896d107243fd10
SHA1cde32e03d09124dd789b2d8e413dcc4daed1a4fb
SHA25691bbf6fc95e215d3805fc5cda5df435e93ef548354c397cad13b87d32dc4fbf0
SHA5124e5bb753d91e0ff52d86115904aebef078f4dd08338eb12be56929c5d9a55072eff9d243b8ec633ab8461b7b484d3f8c6e6b93f0daaec78d404dff0c6f505cb3
-
C:\Windows\{10C3D49B-BE02-4af5-BA2E-149C6B016647}.exeFilesize
197KB
MD53e4334cc9d92a3ef209ac1ca68527d25
SHA1e36b034a20293926849e9f88df350ce66bbccb4d
SHA2560c94380dc58d58a48ec6b9bfe8bc06a586338cf0a443e989473a678c89f837b2
SHA512eea7d2b764610d9b8be16511385783d233bbcf702088ee2c5eb55f279155aa56252f77fe173bdf15bc6de6f96df0c08014882fca776d75740beb2e1735ecaab4
-
C:\Windows\{16AB003E-36CD-4d86-ADCE-C9AE3F5CAEF8}.exeFilesize
197KB
MD5e37343d8a81e4597f82d3bd16eaf8f7c
SHA1810ccd443e992647ea3c406820205f8a799a8bb9
SHA256fca2f64132daeb47d1d3eb0b7df42c2c2b1e558a817b8eb0b1535241a0c89b13
SHA512874fb46b531d9dae21b8fac91e782e71cbc6c9a0d11d653f00c1df159b5e837ec84db2128cbb492caea09f9475d61b3f2271b81a4b02af4f3f1f57735e43242d
-
C:\Windows\{38EC83D5-5B7E-4ec1-B43C-B1E86A30A6DE}.exeFilesize
197KB
MD51a777bd68a3241e95459b04770bdf35b
SHA1504b88bd81b0dc76597d64348d1712c1fde39c7e
SHA256b5d420a1681dcc99ab5552d63eff8faf3b16523d640ec5f824718064d284cc12
SHA5128df3e44227e9b1ba74ac51f1d3720d55cc46d195e5260179e4e16c6ead231181a272eef56be53847d033adc7f4edca917033a46286e946107fddd52041056656
-
C:\Windows\{710B2759-11AC-4e9b-8898-9ABE658AD8DC}.exeFilesize
197KB
MD59e4a34c255e962cf50228af1b8ae9f25
SHA13d3408ea0b972090922ccebff8278bb8ba0d9f93
SHA256ba17b9d690096d5478def7f97294460a6f94158063ce7b07cc1c858e7d5a31b3
SHA512e48f73a31c7fb0893f71897fe20f91b1312d286978c44df5b06965adadf475699144caa8195f5266faa9d374b38c2d3a4fb62b7f149f03df7edf8438c36fa6b0
-
C:\Windows\{9260A271-C2BC-4578-B547-ACBA860BA9B1}.exeFilesize
197KB
MD5adb109bcc7272110971cfa1ccf7ee0fb
SHA156dd80aba4d8e9eca2952efbdfd0a514d5865ba3
SHA2565fdd392c6d98d972ecc7774b650979cd1ed7d18ff00ac1402a9c1c325cc46b5e
SHA5123568764b39271b0d085b829df966c05299ec051c120d393ef6990b2d9c1177eb4c239a15e582b54c5009d1f2553048957f47766fec90ac74476942a74acea960
-
C:\Windows\{9C09DB46-F313-484d-A5EB-832D63243453}.exeFilesize
197KB
MD5a4510bc266e1bdd18573d1128a3c7e06
SHA11b7c2d8a2d214e3720d677d90dc8491543d051f7
SHA256848d6e6d3e76512dffff44ed018f17ea22b3652b2c82d33fb2b1fad629ea297f
SHA5120db9ac2cb2baab7c4a10b0b5553ee7437824134ab6c4961f0133b4383d0123f1cd96ab3212c74d40525b0feb385d22034fad3219fe3389a180c1512d21f0ae41
-
C:\Windows\{9DE9B746-6A39-4348-9B5F-06049557CD4D}.exeFilesize
197KB
MD5d42a23cba0ac5a2a2458520b7679c99f
SHA1a5da544e1cf20611d2425806d60eae8b94a11f18
SHA25686b2817df1738759051e3bb4bf2ccb50bd413a9629c94e448f9c01269445e5ac
SHA512e82fbb00ff77d9880e4ced99d07602319a8d4b3cd5f9929367085231edc55c0f613d80aa5148f555341f5bf8f6e744fd2610ddd17192242d0a18ddcde0e8bcbf
-
C:\Windows\{9EA596E4-5872-4e97-B4C7-BE4651CEBEEF}.exeFilesize
197KB
MD5ca4cf92020fa024fedc5a829bffbf635
SHA177f41bd7819a591a56c1182991527b04b148a998
SHA2561d51158bea81656049c39677f19cc71e1a663563b5896be14718330ad56e6c45
SHA5122e94632c5eb1c7468ddece9dccb6509c5c6ea44f5b914ec7951296c16fb96103c5fae8c0c326bfc170824ed676121dfb60a7ea013bb49b71f0f17e7d1bff98f9
-
C:\Windows\{FABA9794-6B16-41c8-8685-48E72CE52F76}.exeFilesize
197KB
MD594142d88ada171e76270904260bfabee
SHA1b8474126592a77471fa46f7660aacc5973f651e6
SHA256bf99368988a44da07aa0298383264c9f32d933da46a6da3ad4e674fb271939b6
SHA5121e4b38b6a86cb1d6b4421c3b890916bd89000d4f1dd09680f3841079e16e13765b26d839f1a9f28f3e548dee848c53ee5c957143820e3e41ec1d405f1431ee0a