Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe
-
Size
180KB
-
MD5
75521cc0dbd7b1ad9c0ba2e082f8ee11
-
SHA1
0fe2d946524fe08ce8c4b7cbb80efb044add5eb3
-
SHA256
0417cc4710d893fbc99844bc4c7405939590e0f44c537eed169909c628c90dbf
-
SHA512
c4a624fad958eabb9649af410e62bf666fb42a9bbc84969f30cdbd119a6ae995c2b83ff05b48d77d14a82b974ace9e0a7d2093363b3a0e470da7f3d902d62dc0
-
SSDEEP
3072:jEGh0oXlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGpl5eKcAEc
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0008000000022990-1.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000022abf-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000d0000000233b1-10.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000022abf-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000e0000000233b1-18.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000022abf-22.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000f0000000233b1-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000022abf-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00100000000233b1-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000022abf-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00110000000233b1-43.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000c000000022abf-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}\stubpath = "C:\\Windows\\{AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe" {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A772AE78-FEDC-4b60-BDFA-F4216401E415}\stubpath = "C:\\Windows\\{A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe" {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB7AAC60-5234-4e63-AE5B-7808434B7FE8}\stubpath = "C:\\Windows\\{BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe" {C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7BAD9A89-504F-43c4-ADF4-355AE0A71DC5} {BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7BAD9A89-504F-43c4-ADF4-355AE0A71DC5}\stubpath = "C:\\Windows\\{7BAD9A89-504F-43c4-ADF4-355AE0A71DC5}.exe" {BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{24A87DBE-221E-4b4f-9E73-0E459B4814BA}\stubpath = "C:\\Windows\\{24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe" 2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{052F07AF-38DD-45f9-BDB2-166C606BCFE7} {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E424B3C1-5B3F-4186-9AAE-8670724E5C7B} {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}\stubpath = "C:\\Windows\\{AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe" {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}\stubpath = "C:\\Windows\\{2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe" {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A772AE78-FEDC-4b60-BDFA-F4216401E415} {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AE22B5AB-6954-4eb1-9181-ABA9F3B78A03} {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A97D745F-C5B5-4252-B215-EC6FEC89480E} {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6AD83408-72C8-478e-9981-6C0F6E691F6D}\stubpath = "C:\\Windows\\{6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe" {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}\stubpath = "C:\\Windows\\{C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe" {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB7AAC60-5234-4e63-AE5B-7808434B7FE8} {C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2CA7FE49-7B60-401a-AB83-44A3C9AC20D4} {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C34F11D3-5CF8-4ac2-80DD-107C2D4A9162} {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{24A87DBE-221E-4b4f-9E73-0E459B4814BA} 2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{052F07AF-38DD-45f9-BDB2-166C606BCFE7}\stubpath = "C:\\Windows\\{052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe" {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E424B3C1-5B3F-4186-9AAE-8670724E5C7B}\stubpath = "C:\\Windows\\{E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe" {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A97D745F-C5B5-4252-B215-EC6FEC89480E}\stubpath = "C:\\Windows\\{A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe" {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D} {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6AD83408-72C8-478e-9981-6C0F6E691F6D} {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe -
Executes dropped EXE 12 IoCs
pid Process 2880 {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe 2284 {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe 1948 {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe 3540 {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe 3520 {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe 4340 {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe 464 {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe 868 {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe 2384 {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe 1440 {C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe 3476 {BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe 4512 {7BAD9A89-504F-43c4-ADF4-355AE0A71DC5}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe File created C:\Windows\{AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe File created C:\Windows\{2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe File created C:\Windows\{24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe 2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe File created C:\Windows\{A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe File created C:\Windows\{AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe File created C:\Windows\{6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe File created C:\Windows\{A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe File created C:\Windows\{C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe File created C:\Windows\{BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe {C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe File created C:\Windows\{7BAD9A89-504F-43c4-ADF4-355AE0A71DC5}.exe {BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe File created C:\Windows\{052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4712 2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe Token: SeIncBasePriorityPrivilege 2880 {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe Token: SeIncBasePriorityPrivilege 2284 {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe Token: SeIncBasePriorityPrivilege 1948 {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe Token: SeIncBasePriorityPrivilege 3540 {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe Token: SeIncBasePriorityPrivilege 3520 {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe Token: SeIncBasePriorityPrivilege 4340 {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe Token: SeIncBasePriorityPrivilege 464 {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe Token: SeIncBasePriorityPrivilege 868 {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe Token: SeIncBasePriorityPrivilege 2384 {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe Token: SeIncBasePriorityPrivilege 1440 {C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe Token: SeIncBasePriorityPrivilege 3476 {BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 2880 4712 2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe 87 PID 4712 wrote to memory of 2880 4712 2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe 87 PID 4712 wrote to memory of 2880 4712 2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe 87 PID 4712 wrote to memory of 3120 4712 2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe 88 PID 4712 wrote to memory of 3120 4712 2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe 88 PID 4712 wrote to memory of 3120 4712 2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe 88 PID 2880 wrote to memory of 2284 2880 {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe 89 PID 2880 wrote to memory of 2284 2880 {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe 89 PID 2880 wrote to memory of 2284 2880 {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe 89 PID 2880 wrote to memory of 2408 2880 {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe 90 PID 2880 wrote to memory of 2408 2880 {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe 90 PID 2880 wrote to memory of 2408 2880 {24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe 90 PID 2284 wrote to memory of 1948 2284 {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe 94 PID 2284 wrote to memory of 1948 2284 {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe 94 PID 2284 wrote to memory of 1948 2284 {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe 94 PID 2284 wrote to memory of 4796 2284 {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe 95 PID 2284 wrote to memory of 4796 2284 {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe 95 PID 2284 wrote to memory of 4796 2284 {052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe 95 PID 1948 wrote to memory of 3540 1948 {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe 96 PID 1948 wrote to memory of 3540 1948 {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe 96 PID 1948 wrote to memory of 3540 1948 {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe 96 PID 1948 wrote to memory of 3000 1948 {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe 97 PID 1948 wrote to memory of 3000 1948 {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe 97 PID 1948 wrote to memory of 3000 1948 {E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe 97 PID 3540 wrote to memory of 3520 3540 {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe 98 PID 3540 wrote to memory of 3520 3540 {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe 98 PID 3540 wrote to memory of 3520 3540 {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe 98 PID 3540 wrote to memory of 4020 3540 {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe 99 PID 3540 wrote to memory of 4020 3540 {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe 99 PID 3540 wrote to memory of 4020 3540 {AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe 99 PID 3520 wrote to memory of 4340 3520 {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe 100 PID 3520 wrote to memory of 4340 3520 {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe 100 PID 3520 wrote to memory of 4340 3520 {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe 100 PID 3520 wrote to memory of 3472 3520 {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe 101 PID 3520 wrote to memory of 3472 3520 {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe 101 PID 3520 wrote to memory of 3472 3520 {A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe 101 PID 4340 wrote to memory of 464 4340 {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe 102 PID 4340 wrote to memory of 464 4340 {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe 102 PID 4340 wrote to memory of 464 4340 {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe 102 PID 4340 wrote to memory of 4684 4340 {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe 103 PID 4340 wrote to memory of 4684 4340 {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe 103 PID 4340 wrote to memory of 4684 4340 {AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe 103 PID 464 wrote to memory of 868 464 {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe 104 PID 464 wrote to memory of 868 464 {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe 104 PID 464 wrote to memory of 868 464 {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe 104 PID 464 wrote to memory of 2128 464 {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe 105 PID 464 wrote to memory of 2128 464 {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe 105 PID 464 wrote to memory of 2128 464 {6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe 105 PID 868 wrote to memory of 2384 868 {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe 106 PID 868 wrote to memory of 2384 868 {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe 106 PID 868 wrote to memory of 2384 868 {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe 106 PID 868 wrote to memory of 2404 868 {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe 107 PID 868 wrote to memory of 2404 868 {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe 107 PID 868 wrote to memory of 2404 868 {2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe 107 PID 2384 wrote to memory of 1440 2384 {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe 108 PID 2384 wrote to memory of 1440 2384 {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe 108 PID 2384 wrote to memory of 1440 2384 {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe 108 PID 2384 wrote to memory of 1224 2384 {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe 109 PID 2384 wrote to memory of 1224 2384 {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe 109 PID 2384 wrote to memory of 1224 2384 {A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe 109 PID 1440 wrote to memory of 3476 1440 {C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe 110 PID 1440 wrote to memory of 3476 1440 {C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe 110 PID 1440 wrote to memory of 3476 1440 {C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe 110 PID 1440 wrote to memory of 372 1440 {C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\{24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exeC:\Windows\{24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\{052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exeC:\Windows\{052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\{E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exeC:\Windows\{E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\{AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exeC:\Windows\{AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\{A97D745F-C5B5-4252-B215-EC6FEC89480E}.exeC:\Windows\{A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\{AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exeC:\Windows\{AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\{6AD83408-72C8-478e-9981-6C0F6E691F6D}.exeC:\Windows\{6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\{2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exeC:\Windows\{2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\{A772AE78-FEDC-4b60-BDFA-F4216401E415}.exeC:\Windows\{A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\{C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exeC:\Windows\{C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\{BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exeC:\Windows\{BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3476 -
C:\Windows\{7BAD9A89-504F-43c4-ADF4-355AE0A71DC5}.exeC:\Windows\{7BAD9A89-504F-43c4-ADF4-355AE0A71DC5}.exe13⤵
- Executes dropped EXE
PID:4512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BB7AA~1.EXE > nul13⤵PID:2232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C34F1~1.EXE > nul12⤵PID:372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A772A~1.EXE > nul11⤵PID:1224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2CA7F~1.EXE > nul10⤵PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6AD83~1.EXE > nul9⤵PID:2128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AC746~1.EXE > nul8⤵PID:4684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A97D7~1.EXE > nul7⤵PID:3472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AE22B~1.EXE > nul6⤵PID:4020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E424B~1.EXE > nul5⤵PID:3000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{052F0~1.EXE > nul4⤵PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{24A87~1.EXE > nul3⤵PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD55fde6986a12f28ae15fa9af42c8d728b
SHA181002a4c977615f11791417d07abad6893de09e3
SHA256c87bc151faeca16d437ebc1fa24034c771bacab0e630962596cd0a43fec793d4
SHA51215e88f6910dd52271bde6d094362174d8499410e2338e756ae5356726b939f3d00b7e432bafc1c984fbc4364e2c9ed959008c7b15c1a48a522d0e0aba8f1a33c
-
Filesize
180KB
MD5dda8a5647ce537994015dac36e628667
SHA133d2b9188fdb3cb68d822d540299a662302dc363
SHA2566a283b731ed6be39b4a3677a4b58833087ec61a2136b21ffcf5d7fea6c816127
SHA512f88c9c8539ee07765a78bb0d9f7c3b8333680a165812703635430c902dbb16f8059bbb99f6ad3ed03690e5c6a8dc6b32da71f8062b66e62d395e6b391992c4fd
-
Filesize
180KB
MD5f717e211bb076c7b16e104e6d33f1033
SHA10da76311b4365c4907278a5d74ecb37ced7d1617
SHA25629357a9cb82cac77be9c558b5b1253f8ea4115dcf19d764d3a7b0c3958e0b86c
SHA51223bbd6acd344e4a5df76598bc20c418efc7ffad6263e6e2d1ee733e1d568b002a55b8e5f23cd5eb1c49e5fc2c4e0480a18592aaf94cccd883d3ab9a2169d95d6
-
Filesize
180KB
MD54601fc860ba3796f125dba4c6bd9a009
SHA1bdc6a2af6f82ab7127050bdbfc5fb4f0dda0d009
SHA256a0d2eb95b010e1d13191d1c18844d8e23b40408640a044fe28417db84f2d90fc
SHA51229df356c75817e2e1a2b231fbfbe82a48111071c387c14a13fda71e4e12b73496b92a6cab79e30cef73d01b017e67cedc2129747b75caf3477b6af58b72b4427
-
Filesize
180KB
MD5cf2398c2b54d8cadfa1da622304fbdfc
SHA1bea941eee9e75f9b3213a219ff0d06ea78e53a40
SHA256c9c8e6575c0d850269a26c171c6e16ee4fb3982c9d0cfeebdca1cbe3932f7115
SHA5129eb90416b7bc2123156ef8e2039c32dd544a61a73cdf123e41b8fb37b860e57651259330528fd5304c032f19910a50f725e52c9a68e779b198244cf51f2b10ab
-
Filesize
180KB
MD5ce572481cbcaa5bc5b9141f59be392e4
SHA1bef3c77c01de59f0d03dbed59fb0ff7ebc771d15
SHA25614aeb7dea4aaf40aec192193d297c0b0aca3865715ba0018972a7e702a89bbd2
SHA5125deed164acebe59cb400b39c2b817bac83802d49a6ff3fd82236f8023744034868667da6288b9159f33c92ae88aad95a7b6a415429f45f0f8b925ca86068956d
-
Filesize
180KB
MD5a545371825c8949eb1dfcb1efa290549
SHA1470e27b51acc3beabafeb0639ebd46a3bd6705ba
SHA25648a8ad1d99d1f62a4d5c1553aaacb89d9571ae1a914f165b0725afb15c3a0bee
SHA5122d84f22fa38acd5e6cf92e4634b7e6e9a95f22fb73466f4ead01b7731111656e3ad515b7ba2d0179e912dcb6a7ba92021e2d84aef7fece2d753c0116b3e43a2a
-
Filesize
180KB
MD5d7056528431d9ae394685f3ede04fd26
SHA178c3c9f11f82f67749223d5cdcfe938b40348443
SHA2561d21340d3c9c72eacfea983c5845bf47c96a34fff5c25d144982ba591d736fc2
SHA512ac56fda09249142c2b1715dced1b81ec4a31d93f895c03cc2b19714b14a83461a8e5f87cc5c3066df7beeec35aa48dd434798e732aea54b03ac241d530a16f9a
-
Filesize
180KB
MD57508d4e9fa1db0274bb034d7f23ddc4c
SHA1a1b279085c852bcd7abb7b99331a8c1a160cb2e5
SHA256c77bfd8d4e46d0d8a55620535a5de23bdfc986fe3f574b25ac84f35b0c49ac6d
SHA5127f07938fe6ec4942908088c071fca787a591aa6ab3817b6e7236bef753dc024951ceb6db5df6279ed27e5c39bfbac4e33309461f042cb581dcb898f4b40d54c2
-
Filesize
180KB
MD54c1a57159406a2ef47364e85c451605f
SHA19bf66626fd1fc7775f718befe87556a1534e5f89
SHA2565610969a518aad48775054872ef08a21b071ab5b9b04886579388dda3227b4ef
SHA512f32ea5eefa1eb9fc753dc6d8538627e2620a69ea649073da40ae493fc4aa1948fcede96c2392f0df541d9decf5b8af921560e4e43a05c18223dbb08f790b6f3d
-
Filesize
180KB
MD5714ba6ef985eb6876a2cbbe4a2da741d
SHA195dbdbe5f037683b401952341a7edb4b744a649a
SHA256728f072560ea43102cf50a2b75f9db117d32a728e0ad04dcff54c5ee0d8b6ace
SHA51278f2422ecab3b7749205f27c167f4ac3ef13fc86544b1b64ebef58e9c6e2232000142ce0e5b842a7bb9085d896ace23424b2462c3f70c3fedb48e7cdbc916cb8
-
Filesize
180KB
MD5b4a4ee2229b32d28c6c8eaa8e90f1219
SHA1bf40d314619adf22e301ad4778c012f05873ff63
SHA256eabbadfb93762f5e0758866db0dde5da41af15ddddbd33a33de013ad0dfbdceb
SHA5121313bdce31903687b467a59aa3fdf7e723aa4c9c1a1071abb04539e77937dc92d91da784dd0547bdcdd645ba02cd4bcc8dc8b57a2ba8016074cdfb7705a97ca1