Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 10:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe
-
Size
408KB
-
MD5
9421dddd2256278f0e862c746326243f
-
SHA1
2238135bb88162c83486a0c7a34b864e7ab5fdbd
-
SHA256
8e19cfd59bc2b47e7e584b6c4953f22db1c9e6e2114e50ad4ab358181ede7311
-
SHA512
72aec33149a3df420c1176883be8417cb5d252e2981d6a73b4f77b01258194a33126b61881a0df306b2d012637ac831d3b2c5baa49f4a4f5da3af0a594b3f811
-
SSDEEP
3072:CEGh0ocl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGqldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral2/files/0x0008000000023408-2.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023409-6.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000700000002340d-8.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023410-14.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0007000000023416-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023410-23.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0008000000023416-27.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023410-30.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x0009000000023416-34.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023410-38.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000a000000023416-42.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral2/files/0x000b000000023410-46.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E} {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E28CEE72-6111-4530-9D2C-2CB6FAAEA906} {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81} {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A80FF990-BD5B-4297-A785-E198886DC6AD} {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2A1D6C57-D403-4fc7-ABD4-C6322045A8EF} {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED8FFD03-1C4B-48c8-94F0-05C65952A26A} {8DB9AD94-AF59-4ed4-8897-F409789B444D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}\stubpath = "C:\\Windows\\{F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe" {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}\stubpath = "C:\\Windows\\{E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe" {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0CC86CCE-C28E-439a-95D4-2D089E3D7F0F} {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}\stubpath = "C:\\Windows\\{0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe" {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}\stubpath = "C:\\Windows\\{95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe" {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED8FFD03-1C4B-48c8-94F0-05C65952A26A}\stubpath = "C:\\Windows\\{ED8FFD03-1C4B-48c8-94F0-05C65952A26A}.exe" {8DB9AD94-AF59-4ed4-8897-F409789B444D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E8D5B7A0-31CD-46ea-A343-B23E96B1B573} 2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E28CEE72-6111-4530-9D2C-2CB6FAAEA906}\stubpath = "C:\\Windows\\{E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe" {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1} {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}\stubpath = "C:\\Windows\\{2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe" {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F07E38B6-3A75-41f2-BD81-00CF91D7906A} {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E8D5B7A0-31CD-46ea-A343-B23E96B1B573}\stubpath = "C:\\Windows\\{E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe" 2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A80FF990-BD5B-4297-A785-E198886DC6AD}\stubpath = "C:\\Windows\\{A80FF990-BD5B-4297-A785-E198886DC6AD}.exe" {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{323ABC6E-70CF-407a-85BD-B645731C2D55} {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{323ABC6E-70CF-407a-85BD-B645731C2D55}\stubpath = "C:\\Windows\\{323ABC6E-70CF-407a-85BD-B645731C2D55}.exe" {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F07E38B6-3A75-41f2-BD81-00CF91D7906A}\stubpath = "C:\\Windows\\{F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe" {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8DB9AD94-AF59-4ed4-8897-F409789B444D} {F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8DB9AD94-AF59-4ed4-8897-F409789B444D}\stubpath = "C:\\Windows\\{8DB9AD94-AF59-4ed4-8897-F409789B444D}.exe" {F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe -
Executes dropped EXE 12 IoCs
pid Process 5004 {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe 4660 {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe 844 {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe 3504 {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe 1104 {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe 2584 {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe 796 {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe 2548 {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe 3732 {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe 4296 {F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe 3016 {8DB9AD94-AF59-4ed4-8897-F409789B444D}.exe 4388 {ED8FFD03-1C4B-48c8-94F0-05C65952A26A}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe File created C:\Windows\{E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe 2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe File created C:\Windows\{F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe File created C:\Windows\{E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe File created C:\Windows\{95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe File created C:\Windows\{F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe File created C:\Windows\{8DB9AD94-AF59-4ed4-8897-F409789B444D}.exe {F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe File created C:\Windows\{ED8FFD03-1C4B-48c8-94F0-05C65952A26A}.exe {8DB9AD94-AF59-4ed4-8897-F409789B444D}.exe File created C:\Windows\{E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe File created C:\Windows\{0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe File created C:\Windows\{A80FF990-BD5B-4297-A785-E198886DC6AD}.exe {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe File created C:\Windows\{323ABC6E-70CF-407a-85BD-B645731C2D55}.exe {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1380 2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe Token: SeIncBasePriorityPrivilege 5004 {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe Token: SeIncBasePriorityPrivilege 4660 {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe Token: SeIncBasePriorityPrivilege 844 {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe Token: SeIncBasePriorityPrivilege 3504 {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe Token: SeIncBasePriorityPrivilege 1104 {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe Token: SeIncBasePriorityPrivilege 2584 {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe Token: SeIncBasePriorityPrivilege 796 {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe Token: SeIncBasePriorityPrivilege 2548 {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe Token: SeIncBasePriorityPrivilege 3732 {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe Token: SeIncBasePriorityPrivilege 4296 {F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe Token: SeIncBasePriorityPrivilege 3016 {8DB9AD94-AF59-4ed4-8897-F409789B444D}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 5004 1380 2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe 80 PID 1380 wrote to memory of 5004 1380 2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe 80 PID 1380 wrote to memory of 5004 1380 2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe 80 PID 1380 wrote to memory of 696 1380 2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe 81 PID 1380 wrote to memory of 696 1380 2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe 81 PID 1380 wrote to memory of 696 1380 2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe 81 PID 5004 wrote to memory of 4660 5004 {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe 82 PID 5004 wrote to memory of 4660 5004 {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe 82 PID 5004 wrote to memory of 4660 5004 {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe 82 PID 5004 wrote to memory of 3164 5004 {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe 83 PID 5004 wrote to memory of 3164 5004 {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe 83 PID 5004 wrote to memory of 3164 5004 {E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe 83 PID 4660 wrote to memory of 844 4660 {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe 86 PID 4660 wrote to memory of 844 4660 {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe 86 PID 4660 wrote to memory of 844 4660 {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe 86 PID 4660 wrote to memory of 1400 4660 {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe 87 PID 4660 wrote to memory of 1400 4660 {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe 87 PID 4660 wrote to memory of 1400 4660 {F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe 87 PID 844 wrote to memory of 3504 844 {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe 92 PID 844 wrote to memory of 3504 844 {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe 92 PID 844 wrote to memory of 3504 844 {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe 92 PID 844 wrote to memory of 3496 844 {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe 93 PID 844 wrote to memory of 3496 844 {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe 93 PID 844 wrote to memory of 3496 844 {E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe 93 PID 3504 wrote to memory of 1104 3504 {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe 95 PID 3504 wrote to memory of 1104 3504 {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe 95 PID 3504 wrote to memory of 1104 3504 {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe 95 PID 3504 wrote to memory of 4972 3504 {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe 96 PID 3504 wrote to memory of 4972 3504 {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe 96 PID 3504 wrote to memory of 4972 3504 {E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe 96 PID 1104 wrote to memory of 2584 1104 {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe 97 PID 1104 wrote to memory of 2584 1104 {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe 97 PID 1104 wrote to memory of 2584 1104 {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe 97 PID 1104 wrote to memory of 1936 1104 {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe 98 PID 1104 wrote to memory of 1936 1104 {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe 98 PID 1104 wrote to memory of 1936 1104 {0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe 98 PID 2584 wrote to memory of 796 2584 {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe 99 PID 2584 wrote to memory of 796 2584 {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe 99 PID 2584 wrote to memory of 796 2584 {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe 99 PID 2584 wrote to memory of 368 2584 {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe 100 PID 2584 wrote to memory of 368 2584 {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe 100 PID 2584 wrote to memory of 368 2584 {A80FF990-BD5B-4297-A785-E198886DC6AD}.exe 100 PID 796 wrote to memory of 2548 796 {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe 101 PID 796 wrote to memory of 2548 796 {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe 101 PID 796 wrote to memory of 2548 796 {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe 101 PID 796 wrote to memory of 4360 796 {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe 102 PID 796 wrote to memory of 4360 796 {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe 102 PID 796 wrote to memory of 4360 796 {95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe 102 PID 2548 wrote to memory of 3732 2548 {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe 103 PID 2548 wrote to memory of 3732 2548 {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe 103 PID 2548 wrote to memory of 3732 2548 {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe 103 PID 2548 wrote to memory of 4040 2548 {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe 104 PID 2548 wrote to memory of 4040 2548 {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe 104 PID 2548 wrote to memory of 4040 2548 {2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe 104 PID 3732 wrote to memory of 4296 3732 {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe 105 PID 3732 wrote to memory of 4296 3732 {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe 105 PID 3732 wrote to memory of 4296 3732 {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe 105 PID 3732 wrote to memory of 4636 3732 {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe 106 PID 3732 wrote to memory of 4636 3732 {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe 106 PID 3732 wrote to memory of 4636 3732 {323ABC6E-70CF-407a-85BD-B645731C2D55}.exe 106 PID 4296 wrote to memory of 3016 4296 {F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe 107 PID 4296 wrote to memory of 3016 4296 {F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe 107 PID 4296 wrote to memory of 3016 4296 {F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe 107 PID 4296 wrote to memory of 1656 4296 {F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-28_9421dddd2256278f0e862c746326243f_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\{E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exeC:\Windows\{E8D5B7A0-31CD-46ea-A343-B23E96B1B573}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\{F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exeC:\Windows\{F6815DE3-EB9C-46a6-B2AE-E62D0E9C135E}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\{E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exeC:\Windows\{E28CEE72-6111-4530-9D2C-2CB6FAAEA906}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\{E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exeC:\Windows\{E4AD9058-C7A2-4cf6-9A0C-F048F2AD1C81}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\{0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exeC:\Windows\{0CC86CCE-C28E-439a-95D4-2D089E3D7F0F}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\{A80FF990-BD5B-4297-A785-E198886DC6AD}.exeC:\Windows\{A80FF990-BD5B-4297-A785-E198886DC6AD}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\{95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exeC:\Windows\{95D7C828-4FB6-4b4a-B5FF-43900FE6C3B1}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\{2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exeC:\Windows\{2A1D6C57-D403-4fc7-ABD4-C6322045A8EF}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\{323ABC6E-70CF-407a-85BD-B645731C2D55}.exeC:\Windows\{323ABC6E-70CF-407a-85BD-B645731C2D55}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\{F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exeC:\Windows\{F07E38B6-3A75-41f2-BD81-00CF91D7906A}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\{8DB9AD94-AF59-4ed4-8897-F409789B444D}.exeC:\Windows\{8DB9AD94-AF59-4ed4-8897-F409789B444D}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3016 -
C:\Windows\{ED8FFD03-1C4B-48c8-94F0-05C65952A26A}.exeC:\Windows\{ED8FFD03-1C4B-48c8-94F0-05C65952A26A}.exe13⤵
- Executes dropped EXE
PID:4388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8DB9A~1.EXE > nul13⤵PID:1356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F07E3~1.EXE > nul12⤵PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{323AB~1.EXE > nul11⤵PID:4636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2A1D6~1.EXE > nul10⤵PID:4040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{95D7C~1.EXE > nul9⤵PID:4360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A80FF~1.EXE > nul8⤵PID:368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0CC86~1.EXE > nul7⤵PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E4AD9~1.EXE > nul6⤵PID:4972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E28CE~1.EXE > nul5⤵PID:3496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F6815~1.EXE > nul4⤵PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E8D5B~1.EXE > nul3⤵PID:3164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5cad781c085dca6426fe600cf24db7483
SHA17ca9187454f561fd769e490637273ac7e00ac936
SHA256329b1710b1abb8274f6c54f71e1cab952ac766f0824bdbd84117e3b42dcc6d5c
SHA512ea8d85b55eee4761e1668d585e6f4d7336bc9641648205f08fc45cdaeadb027703ccba277f95c4009cac026008dad400adf863d99f3d17989e8d55e1e9c5aea2
-
Filesize
408KB
MD581a7303eaeb0017699977c273c0e6dff
SHA1d6e80aac249e23de8269bd225e8069e065879668
SHA256064b743c36539b551a87b504fd75d27c27882af251492851d15a4a2086020204
SHA5125a27ffc950f20b829cb630830d3cc0174f8f03beb92a49e4e8f929095f17be6cc723c73cfb4b08272bdf82546d60ac42d8c19bbcbc919b004fe2d219826f4239
-
Filesize
408KB
MD5799d66c473a0b15fbf9c717f57730a7f
SHA1891d6c7b05e5bb2614c830ca138c902d8200df91
SHA256271559770be97b46656d4284c72d1c5fe7ce5bad08aba0322a3a77ca81f5c6d2
SHA512f8e6a9788ece1305329a0b9a0ae1114939a54e753e0a7bde9b99842501739e323b99d9db6533933adffd5a6bc10f6381c7dfda1a024a844f0b7505970565a6f3
-
Filesize
408KB
MD591dd558d668e6d8a9089a7c86140aa6c
SHA13794379666716b3cd9f93ebd5a1dd90a01390517
SHA256dca0eb3e10c51f78ac1ca799898a9cfe44741aeca026c33cf93f5d0525f895f3
SHA512875e407f62f1ab026cc275a82f58709eefdd7400f12c122ca619f778486a507263d5fbd7994cf0352002c7530eb229e8703c78edef5dc11936d7c40698631dc4
-
Filesize
408KB
MD5eb5edb48088236cf314340653217ffe3
SHA19ec4e9edc0edea72e3bd55515f8c9358d39688a0
SHA256fc7c47230d0df02e45bfde668ca16d8b0a335b58d77f34c64d86e492a0adf36b
SHA512ca736d4b22896c142952f35cd6856ffbf9f3674453e3fcf4decbf949c2733ec42c513ff6df545ae494541c74a3c4d8528abe3ab88a310ecb2540e60221a1ed02
-
Filesize
408KB
MD56a019050ee0863188564b710b65872c6
SHA1bf1cd8fc52565a894fbc4faaee387e7d477ae6c2
SHA2565df35bc94d2d9eb50f235712c3d51464bac69fdba821b67b245a7830a0c20e77
SHA512ac122ac2d1394ec547ac2cbad24a6877cd389fbce82f85783a434be7898b97a5f4341755e60683c05d5f35fc6e1bcaefa95a6c6dfc8e50c0b8026118f2ab885c
-
Filesize
408KB
MD56d423c9cdf59ead17dfbd44dfff7191b
SHA1122f27cc0c66887356f729af376dba89628d6f5d
SHA2562c2b2493735e535a76adff74a5773f911d6780cfcd3093201691037fdc6f1c35
SHA512c0b63191148617af4af1b7976b7e8102b4dccd7daa30220844caeb78c28756126c850e32fbf92bfecbe0e33767a2bb1acf8acb0d65018152046686faaa8acbd4
-
Filesize
408KB
MD5ac73dc3a90070fe7b3c1396b762417f5
SHA196b62011e430ba9626b83dea215482bf95ccd156
SHA2562060d0d50c45582774b37ff8c2bfae7021596e069dab8ee79ffb79619dd112aa
SHA512c2d776e5adbe0a0ee86c442c4349f056f42a013c7642b6e5526be97a308787abcfa6ed16ab0f267e5f2c02e86437507d6dce584078dd25393b9a5e5a6a52fb15
-
Filesize
408KB
MD5cc9efbe64bc525cb9bf7ee83dfe01c06
SHA155f610a600a0d58cedde0769a35ee1f8d772f7fe
SHA256da3c3d3647cd1653551a4a080ed6213576a4312ee402659ce002d3c0f78fbf62
SHA512fc5ff705eaea81b8c7952ded1532c7a9f298a0ac9a18ebc704f6f8ed90698ba96ce80102ba0be004339a9769efd89459a8389ce63e417b8bf1ae9f5e82d7fb9d
-
Filesize
408KB
MD50844e063d2bc42284b9f74c3952ac89c
SHA14e13f8b3cda1e1f28c610a083b64f715485e1b69
SHA256ad4ff6d738a82e1b3bfafd0aa7d51d21d3e85e28e80f732d9dfc63db79f2d7f1
SHA512c5712c527628b4eaa6489b21ebd55ec7eaf5a7ca0bc85f5ce67e9f0f280ee382a1e6f11f3043d967fca5bcd4b4d2bf68c446f2b719387d7d060eb13f8131e45e
-
Filesize
408KB
MD5247d0f254e5729af19ce36fbcf52668b
SHA1862e9904f82b08a699dfb9d035bc0f50ad484c23
SHA256b3e7ae0fe96f28e9204afb3e23a3debfe2d8768b6ddd715d45301605f4f8c747
SHA512a686d1f6723abba1eca60d1ae26889ba8a7e9ec8745f7b4a22bef700e3f4c4c465842b84f70844559105829be2ea6b0e4e0eb276faef9c50902acc9aa31927c3
-
Filesize
408KB
MD5f50feba0078f5a9afa1652c6aae3204b
SHA109fe4c26869bd35e9ff5202b6816e6e439dc3372
SHA256272218e449f6ba57af25280b65675589059a90390fd39ec9c7709116d7d59f36
SHA512463e09c75e0b7665b53188f8c9e3dcd54491cbc96309db1794261c5796d1546a0b2d84103e85905f23988fc8ef79d43dab69d901f7ea3b8b270a54b4ace7ffe4