Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe
-
Size
204KB
-
MD5
1bc2052b82fd5e7f2fc0107ffd3f4ff6
-
SHA1
7d127f1237073ab71eda1eae563c7f9712b08311
-
SHA256
bc2cc765f6874385e37e9addd967240261af5958098bc009cc9b3f9cdbeaa01f
-
SHA512
a7eb096e28c222af7ed246be36459369cc6c30936aa1611946f6e7405b311c1520673730fb179ca6e4e527b1ecd009939840ce5c3128c31afb249d86d994d683
-
SSDEEP
1536:1EGh0oEl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oEl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Auto-generated rule 13 IoCs
resource yara_rule behavioral2/files/0x0008000000023257-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0011000000023261-7.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023267-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000800000002311e-15.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023267-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00020000000219e9-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x00020000000219ea-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070d-31.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000300000000070f-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0004000000000733-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0006000000000026-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070f-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000400000000070f-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C6435784-4EF7-48cc-97A5-A3861EE1794F}\stubpath = "C:\\Windows\\{C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe" {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3CE80426-3EF2-4030-B86B-248E7FCDFF0E}\stubpath = "C:\\Windows\\{3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe" {C9623E53-58D9-4640-AAD5-6C063F566243}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3A4BE538-E0BA-4076-B7CF-D746134240BC} {4E6D4883-75B1-43aa-BC4A-6ECDA3971260}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3A4BE538-E0BA-4076-B7CF-D746134240BC}\stubpath = "C:\\Windows\\{3A4BE538-E0BA-4076-B7CF-D746134240BC}.exe" {4E6D4883-75B1-43aa-BC4A-6ECDA3971260}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E19A8F01-C0FE-4270-A8C9-8807A935906C} 2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D} {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}\stubpath = "C:\\Windows\\{2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe" {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AF8248C9-B99A-4273-BA65-BFE12749CBFC}\stubpath = "C:\\Windows\\{AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe" {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D06C141B-1901-493e-81F4-8C45660F3523}\stubpath = "C:\\Windows\\{D06C141B-1901-493e-81F4-8C45660F3523}.exe" {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4E6D4883-75B1-43aa-BC4A-6ECDA3971260}\stubpath = "C:\\Windows\\{4E6D4883-75B1-43aa-BC4A-6ECDA3971260}.exe" {F176887B-2E21-4690-AA24-DC4D863074C3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C9A6D9A1-48C2-4e09-A643-56DDC511217A}\stubpath = "C:\\Windows\\{C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe" {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6FF9A765-E86C-4498-892B-9D68E74E1101} {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6FF9A765-E86C-4498-892B-9D68E74E1101}\stubpath = "C:\\Windows\\{6FF9A765-E86C-4498-892B-9D68E74E1101}.exe" {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3CE80426-3EF2-4030-B86B-248E7FCDFF0E} {C9623E53-58D9-4640-AAD5-6C063F566243}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F176887B-2E21-4690-AA24-DC4D863074C3} {D06C141B-1901-493e-81F4-8C45660F3523}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4E6D4883-75B1-43aa-BC4A-6ECDA3971260} {F176887B-2E21-4690-AA24-DC4D863074C3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C9A6D9A1-48C2-4e09-A643-56DDC511217A} {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C6435784-4EF7-48cc-97A5-A3861EE1794F} {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C9623E53-58D9-4640-AAD5-6C063F566243} {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D06C141B-1901-493e-81F4-8C45660F3523} {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F176887B-2E21-4690-AA24-DC4D863074C3}\stubpath = "C:\\Windows\\{F176887B-2E21-4690-AA24-DC4D863074C3}.exe" {D06C141B-1901-493e-81F4-8C45660F3523}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E19A8F01-C0FE-4270-A8C9-8807A935906C}\stubpath = "C:\\Windows\\{E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe" 2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C9623E53-58D9-4640-AAD5-6C063F566243}\stubpath = "C:\\Windows\\{C9623E53-58D9-4640-AAD5-6C063F566243}.exe" {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AF8248C9-B99A-4273-BA65-BFE12749CBFC} {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe -
Executes dropped EXE 11 IoCs
pid Process 4232 {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe 3168 {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe 1240 {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe 1612 {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe 4140 {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe 4956 {C9623E53-58D9-4640-AAD5-6C063F566243}.exe 2592 {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe 4820 {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe 3256 {D06C141B-1901-493e-81F4-8C45660F3523}.exe 2072 {F176887B-2E21-4690-AA24-DC4D863074C3}.exe 1188 {4E6D4883-75B1-43aa-BC4A-6ECDA3971260}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe {C9623E53-58D9-4640-AAD5-6C063F566243}.exe File created C:\Windows\{AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe File created C:\Windows\{D06C141B-1901-493e-81F4-8C45660F3523}.exe {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe File created C:\Windows\{2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe File created C:\Windows\{C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe File created C:\Windows\{6FF9A765-E86C-4498-892B-9D68E74E1101}.exe {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe File created C:\Windows\{C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe File created C:\Windows\{3A4BE538-E0BA-4076-B7CF-D746134240BC}.exe {4E6D4883-75B1-43aa-BC4A-6ECDA3971260}.exe File created C:\Windows\{E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe 2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe File created C:\Windows\{C9623E53-58D9-4640-AAD5-6C063F566243}.exe {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe File created C:\Windows\{F176887B-2E21-4690-AA24-DC4D863074C3}.exe {D06C141B-1901-493e-81F4-8C45660F3523}.exe File created C:\Windows\{4E6D4883-75B1-43aa-BC4A-6ECDA3971260}.exe {F176887B-2E21-4690-AA24-DC4D863074C3}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4900 2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe Token: SeIncBasePriorityPrivilege 4232 {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe Token: SeIncBasePriorityPrivilege 3168 {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe Token: SeIncBasePriorityPrivilege 1240 {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe Token: SeIncBasePriorityPrivilege 1612 {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe Token: SeIncBasePriorityPrivilege 4140 {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe Token: SeIncBasePriorityPrivilege 4956 {C9623E53-58D9-4640-AAD5-6C063F566243}.exe Token: SeIncBasePriorityPrivilege 2592 {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe Token: SeIncBasePriorityPrivilege 4820 {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe Token: SeIncBasePriorityPrivilege 3256 {D06C141B-1901-493e-81F4-8C45660F3523}.exe Token: SeIncBasePriorityPrivilege 2072 {F176887B-2E21-4690-AA24-DC4D863074C3}.exe Token: SeIncBasePriorityPrivilege 1188 {4E6D4883-75B1-43aa-BC4A-6ECDA3971260}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4232 4900 2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe 95 PID 4900 wrote to memory of 4232 4900 2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe 95 PID 4900 wrote to memory of 4232 4900 2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe 95 PID 4900 wrote to memory of 1748 4900 2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe 96 PID 4900 wrote to memory of 1748 4900 2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe 96 PID 4900 wrote to memory of 1748 4900 2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe 96 PID 4232 wrote to memory of 3168 4232 {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe 99 PID 4232 wrote to memory of 3168 4232 {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe 99 PID 4232 wrote to memory of 3168 4232 {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe 99 PID 4232 wrote to memory of 2256 4232 {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe 100 PID 4232 wrote to memory of 2256 4232 {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe 100 PID 4232 wrote to memory of 2256 4232 {E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe 100 PID 3168 wrote to memory of 1240 3168 {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe 102 PID 3168 wrote to memory of 1240 3168 {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe 102 PID 3168 wrote to memory of 1240 3168 {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe 102 PID 3168 wrote to memory of 2776 3168 {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe 103 PID 3168 wrote to memory of 2776 3168 {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe 103 PID 3168 wrote to memory of 2776 3168 {2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe 103 PID 1240 wrote to memory of 1612 1240 {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe 105 PID 1240 wrote to memory of 1612 1240 {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe 105 PID 1240 wrote to memory of 1612 1240 {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe 105 PID 1240 wrote to memory of 2172 1240 {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe 106 PID 1240 wrote to memory of 2172 1240 {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe 106 PID 1240 wrote to memory of 2172 1240 {C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe 106 PID 1612 wrote to memory of 4140 1612 {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe 107 PID 1612 wrote to memory of 4140 1612 {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe 107 PID 1612 wrote to memory of 4140 1612 {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe 107 PID 1612 wrote to memory of 2932 1612 {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe 108 PID 1612 wrote to memory of 2932 1612 {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe 108 PID 1612 wrote to memory of 2932 1612 {6FF9A765-E86C-4498-892B-9D68E74E1101}.exe 108 PID 4140 wrote to memory of 4956 4140 {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe 109 PID 4140 wrote to memory of 4956 4140 {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe 109 PID 4140 wrote to memory of 4956 4140 {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe 109 PID 4140 wrote to memory of 676 4140 {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe 110 PID 4140 wrote to memory of 676 4140 {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe 110 PID 4140 wrote to memory of 676 4140 {C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe 110 PID 4956 wrote to memory of 2592 4956 {C9623E53-58D9-4640-AAD5-6C063F566243}.exe 111 PID 4956 wrote to memory of 2592 4956 {C9623E53-58D9-4640-AAD5-6C063F566243}.exe 111 PID 4956 wrote to memory of 2592 4956 {C9623E53-58D9-4640-AAD5-6C063F566243}.exe 111 PID 4956 wrote to memory of 220 4956 {C9623E53-58D9-4640-AAD5-6C063F566243}.exe 112 PID 4956 wrote to memory of 220 4956 {C9623E53-58D9-4640-AAD5-6C063F566243}.exe 112 PID 4956 wrote to memory of 220 4956 {C9623E53-58D9-4640-AAD5-6C063F566243}.exe 112 PID 2592 wrote to memory of 4820 2592 {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe 113 PID 2592 wrote to memory of 4820 2592 {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe 113 PID 2592 wrote to memory of 4820 2592 {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe 113 PID 2592 wrote to memory of 1548 2592 {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe 114 PID 2592 wrote to memory of 1548 2592 {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe 114 PID 2592 wrote to memory of 1548 2592 {3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe 114 PID 4820 wrote to memory of 3256 4820 {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe 115 PID 4820 wrote to memory of 3256 4820 {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe 115 PID 4820 wrote to memory of 3256 4820 {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe 115 PID 4820 wrote to memory of 2796 4820 {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe 116 PID 4820 wrote to memory of 2796 4820 {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe 116 PID 4820 wrote to memory of 2796 4820 {AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe 116 PID 3256 wrote to memory of 2072 3256 {D06C141B-1901-493e-81F4-8C45660F3523}.exe 117 PID 3256 wrote to memory of 2072 3256 {D06C141B-1901-493e-81F4-8C45660F3523}.exe 117 PID 3256 wrote to memory of 2072 3256 {D06C141B-1901-493e-81F4-8C45660F3523}.exe 117 PID 3256 wrote to memory of 1168 3256 {D06C141B-1901-493e-81F4-8C45660F3523}.exe 118 PID 3256 wrote to memory of 1168 3256 {D06C141B-1901-493e-81F4-8C45660F3523}.exe 118 PID 3256 wrote to memory of 1168 3256 {D06C141B-1901-493e-81F4-8C45660F3523}.exe 118 PID 2072 wrote to memory of 1188 2072 {F176887B-2E21-4690-AA24-DC4D863074C3}.exe 119 PID 2072 wrote to memory of 1188 2072 {F176887B-2E21-4690-AA24-DC4D863074C3}.exe 119 PID 2072 wrote to memory of 1188 2072 {F176887B-2E21-4690-AA24-DC4D863074C3}.exe 119 PID 2072 wrote to memory of 872 2072 {F176887B-2E21-4690-AA24-DC4D863074C3}.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_1bc2052b82fd5e7f2fc0107ffd3f4ff6_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\{E19A8F01-C0FE-4270-A8C9-8807A935906C}.exeC:\Windows\{E19A8F01-C0FE-4270-A8C9-8807A935906C}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\{2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exeC:\Windows\{2193BFC5-31B8-4c2c-9B6F-D6A6F6F3275D}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\{C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exeC:\Windows\{C9A6D9A1-48C2-4e09-A643-56DDC511217A}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\{6FF9A765-E86C-4498-892B-9D68E74E1101}.exeC:\Windows\{6FF9A765-E86C-4498-892B-9D68E74E1101}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\{C6435784-4EF7-48cc-97A5-A3861EE1794F}.exeC:\Windows\{C6435784-4EF7-48cc-97A5-A3861EE1794F}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\{C9623E53-58D9-4640-AAD5-6C063F566243}.exeC:\Windows\{C9623E53-58D9-4640-AAD5-6C063F566243}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\{3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exeC:\Windows\{3CE80426-3EF2-4030-B86B-248E7FCDFF0E}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\{AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exeC:\Windows\{AF8248C9-B99A-4273-BA65-BFE12749CBFC}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\{D06C141B-1901-493e-81F4-8C45660F3523}.exeC:\Windows\{D06C141B-1901-493e-81F4-8C45660F3523}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\{F176887B-2E21-4690-AA24-DC4D863074C3}.exeC:\Windows\{F176887B-2E21-4690-AA24-DC4D863074C3}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\{4E6D4883-75B1-43aa-BC4A-6ECDA3971260}.exeC:\Windows\{4E6D4883-75B1-43aa-BC4A-6ECDA3971260}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\Windows\{3A4BE538-E0BA-4076-B7CF-D746134240BC}.exeC:\Windows\{3A4BE538-E0BA-4076-B7CF-D746134240BC}.exe13⤵PID:1968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4E6D4~1.EXE > nul13⤵PID:208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1768~1.EXE > nul12⤵PID:872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D06C1~1.EXE > nul11⤵PID:1168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AF824~1.EXE > nul10⤵PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3CE80~1.EXE > nul9⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C9623~1.EXE > nul8⤵PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C6435~1.EXE > nul7⤵PID:676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6FF9A~1.EXE > nul6⤵PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C9A6D~1.EXE > nul5⤵PID:2172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2193B~1.EXE > nul4⤵PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E19A8~1.EXE > nul3⤵PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3732 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5ffbbaa84f335e1906073d68c2e39fdf4
SHA189e477ee178fa2bef79dc064b6f68e46b83574a0
SHA256554f0e35995b189cfe421d7e7d0a79a90eae499aac718fe5330634d8ea620ca8
SHA5120e3db381a3cbc76b97aa703d434bdac04bede66696e1436f2a49b7e2e515c48fb5286d02919a37726fe360ff425e5813be39e67591d0ef823effc5f9cdaf4a66
-
Filesize
128KB
MD59006e41557773dd13066a5276ae22d55
SHA1b07577fc1cbc02e76ba2f6b8767acc37d2b65b55
SHA2561fc438e0fbbced69ce5dc812df5134905ee0c6e2c54bb5e08d685e013a72d47d
SHA512d9dc883071f7273ace1ddf1008b2af057ad212bb35faf6e84d6198a509343529455cd893fd373599532e24737f2c4c24d4892b5cc43aea19cda05a943b97ec03
-
Filesize
81KB
MD5349e7f8fc3ef11f6984cdab6904b40a6
SHA10763ccfab6e72aa7601b1a6798bd0350f1d68685
SHA25636954acbcf2787b47afa085984eebb41276d76a1fbe8d4a3822b46afc10d188b
SHA512c41c7acb2b08a5cb60a404d2040b24642b8bf3f309a7cc951b7d954d3b639a56b46e8a3f86e431cee1319f0a79ea049241c8e7078fdbb27f6964062d0964452a
-
Filesize
204KB
MD5539f873620f80dc1b2b27046e4769ef8
SHA1e79019dc654b576f77c73e639be21854295bc13a
SHA256c9596207c8bec8a2f5c3e379faa1236a7b4586001b91fd67a4f4c451540d1585
SHA512bc24e93c658fcbc29ae64d532a00a736492901cd6a2d61117f1078dc6a9e07fd4cbae5f37029155cb81d6fe1e638d45e4b67b003e4e484f422312383aa26387c
-
Filesize
204KB
MD58b37f82f26fc5d8d6b9c7ba6d77fb1a9
SHA1496695862de9bd753e44a518ec0a942d4bb28f7f
SHA2567227fd4d55a74bdd7d9823cc263a1fa07762cddbdfb9a515bf5e3d84324c25cd
SHA5125e38cd281b207880ddc257c1d4360038db37f4f340386c36358225d822f5bc67a488c33d70e1b00031ba2ab2147d3f81a85102e3d21ade5af5fb4008c1280bce
-
Filesize
204KB
MD5189d8b45c798355c9b15bff6943b6b49
SHA111b9c67f215c209bf01b9755ee1fe2104d810ff5
SHA256089a25741ed19d37c3facc660a6588679f9df0bc9727fae77be00497b38c890a
SHA512171f5835451178b43026cce4836b4bb368799359501cdea8d614cda8acd142b7880c8a2f3fb974599c644211543bb9151d5a6752cc27b8093f2d0f4da7574a78
-
Filesize
204KB
MD5061b045c58369c32c9a1d28d6a73094c
SHA15370fece1a243deaf38f261450406fd6e6e2be87
SHA2565db12a4a4abe9a63fa658e54135313616ae51826b6452a9391e702bae79d5306
SHA5124faee348931b7d2b4e8f783549d79f9c89d2e010c9f4221f8391b6b87ae65118784d731295016ef7605aad327d84af969ce9964b7393f7eba075c5bd2fae88df
-
Filesize
204KB
MD59219388a9b7e48b39dee0284dbce25df
SHA1b4724595bd82edadf14865fc19369b305d2d6350
SHA256cdee83b36a8286d32940a2ec1e655b3e5eda2e1b9fc827f8f3e3d1c4bcf53178
SHA512712b4d8440b6dd21ee3be3d5f86a60c380acdd9c6e1cb4ca6769b4e6b596785b8b45b3b233b51d32189986c8b48b98d7823d478d3ef283426601970d646dfc68
-
Filesize
204KB
MD5f327929ab42db74d8b3fd167fa047265
SHA1ee16491a27d3d179bc9e080d0df016f78efad888
SHA25651e0e2de64163fd2c5825c975520fb29a8a0fe3f16fdcd402ee0ec047db2187b
SHA512d854f65749408aed1f3fa887b15a8631879b382ff2791baeb5c6882c7b93d2a725a05e39a7f72eceb228d10eb497546cbe52975db8901508f0df02520da1f012
-
Filesize
204KB
MD5ac84e500b0fa0be2f266efd6d5b70e4f
SHA12d46fa92481edfcb20d0398deff4035466baaa5b
SHA256d9f9289ab2a7f4afc3e3e4b7200f98f039d2ae87376e826031c630db928c1c80
SHA5129e695a1ba136c00f1f218f388467fce48416f5c6512f68985802fc0566f118db7d1c9f8705f32a962f654dde46a87bdaea830d7ecaf651770571f72f5a1c18a3
-
Filesize
204KB
MD50b36a79f269e37a0358ff357694a6244
SHA103725fd9014ff025ae4a30639dfaf10da871cd88
SHA256c84bf18eec40afd1b2522d984f945db93a3b284fab5aabe3e002f62a6cd2cdb3
SHA512fb217ef547567a4adf320c0d7b7f09fcba915fe72245c3a46813f308f23a3cdb9d616cd72f08e68be96740e2cf273698410fbf814d84e15b8c4d3e0a8d9dea9f
-
Filesize
204KB
MD5054d5e284be5d93fe304b5ed34c7ea93
SHA14d661df5fe10ba113abb2da711d862b683352ffb
SHA2560dbab37b19782bc294f94888bb4962455fce1844cdc4800ac8df6b575fc90b39
SHA512ff228485d79040dd1ed503ae6e2b83943d69e5fb7239e61f67056447a30ff0cd5574fbe5849b6035acd1bfa49a17a127b0dd84c66c5f4c21591a7162b40207d7
-
Filesize
204KB
MD5b2b399076c89774e84872781cbdfaef7
SHA1ae3bf836c6394fe30c8073266d624b722d7b75dc
SHA256066864a1be241b5904a473c49dccd4b4fcb855e8f6af44f91d081e687147ddf5
SHA5126b386175810c03fe0f6048c0381e9467ecabd312d2a348c4b3218fce6670384e520ae23c4ac430e77d48dce64a138a3d056ce0b11e7f9379f776f0d2d64444ee