Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe
-
Size
197KB
-
MD5
9089db63f522f1030cb2abda708e1d80
-
SHA1
2db9beaf48a405227a26961c97ebf9b6c04e49e9
-
SHA256
c2061adeb1294cc98488cb84429eef3f61ca1b486e42b416f55dbecbb5777587
-
SHA512
b0855e6d0e5cac7858b341404ab92299531ee84625894087fabac045ba5ddb5c05020da2ee7eda8fa49cb9838b1d1b8671ba0eed184b91450e212e7673d5b7f1
-
SSDEEP
3072:jEGh0oWl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGolEeKcAEca
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}\stubpath = "C:\\Windows\\{11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe" 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6942CA1-8166-40bf-A27A-C8813B9C8172}\stubpath = "C:\\Windows\\{A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe" {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}\stubpath = "C:\\Windows\\{9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe" {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{71625413-E022-439f-A046-9F418A6E8D5E}\stubpath = "C:\\Windows\\{71625413-E022-439f-A046-9F418A6E8D5E}.exe" {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}\stubpath = "C:\\Windows\\{4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe" {D8511ADE-0760-40f3-89AA-E90800706F70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34828AD8-AAB3-4b24-BB27-B94D2D64E747}\stubpath = "C:\\Windows\\{34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe" {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B873D4F4-2584-4c8e-86B6-007B1A4D75C0} {E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6942CA1-8166-40bf-A27A-C8813B9C8172} {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AB5B9B82-A430-4cda-9A10-A968DF92F3FD}\stubpath = "C:\\Windows\\{AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe" {71625413-E022-439f-A046-9F418A6E8D5E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34828AD8-AAB3-4b24-BB27-B94D2D64E747} {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}\stubpath = "C:\\Windows\\{E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}.exe" {34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BCA4F04A-778D-4dfb-90CF-54663C6173A6}\stubpath = "C:\\Windows\\{BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe" {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4CF183EE-E61D-45ec-AAAC-E0508BA4063B}\stubpath = "C:\\Windows\\{4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe" {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9559A5DB-59AC-4895-ABD2-6F882EF2B7C7} {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{71625413-E022-439f-A046-9F418A6E8D5E} {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AB5B9B82-A430-4cda-9A10-A968DF92F3FD} {71625413-E022-439f-A046-9F418A6E8D5E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D8511ADE-0760-40f3-89AA-E90800706F70}\stubpath = "C:\\Windows\\{D8511ADE-0760-40f3-89AA-E90800706F70}.exe" {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6} {34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{11165DC3-5FBB-4eed-AFFF-09EEA1EED69A} 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BCA4F04A-778D-4dfb-90CF-54663C6173A6} {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4CF183EE-E61D-45ec-AAAC-E0508BA4063B} {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D8511ADE-0760-40f3-89AA-E90800706F70} {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C58B3DD-6A17-4e75-B773-9AC76DCE2C49} {D8511ADE-0760-40f3-89AA-E90800706F70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B873D4F4-2584-4c8e-86B6-007B1A4D75C0}\stubpath = "C:\\Windows\\{B873D4F4-2584-4c8e-86B6-007B1A4D75C0}.exe" {E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}.exe -
Executes dropped EXE 12 IoCs
pid Process 5028 {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe 2612 {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe 1012 {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe 4188 {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe 4688 {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe 4980 {71625413-E022-439f-A046-9F418A6E8D5E}.exe 4488 {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe 1728 {D8511ADE-0760-40f3-89AA-E90800706F70}.exe 2696 {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe 1596 {34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe 2752 {E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}.exe 4376 {B873D4F4-2584-4c8e-86B6-007B1A4D75C0}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe File created C:\Windows\{9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe File created C:\Windows\{71625413-E022-439f-A046-9F418A6E8D5E}.exe {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe File created C:\Windows\{AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe {71625413-E022-439f-A046-9F418A6E8D5E}.exe File created C:\Windows\{D8511ADE-0760-40f3-89AA-E90800706F70}.exe {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe File created C:\Windows\{34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe File created C:\Windows\{E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}.exe {34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe File created C:\Windows\{11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe File created C:\Windows\{4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe File created C:\Windows\{4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe {D8511ADE-0760-40f3-89AA-E90800706F70}.exe File created C:\Windows\{B873D4F4-2584-4c8e-86B6-007B1A4D75C0}.exe {E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}.exe File created C:\Windows\{A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {71625413-E022-439f-A046-9F418A6E8D5E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B873D4F4-2584-4c8e-86B6-007B1A4D75C0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D8511ADE-0760-40f3-89AA-E90800706F70}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 220 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe Token: SeIncBasePriorityPrivilege 5028 {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe Token: SeIncBasePriorityPrivilege 2612 {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe Token: SeIncBasePriorityPrivilege 1012 {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe Token: SeIncBasePriorityPrivilege 4188 {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe Token: SeIncBasePriorityPrivilege 4688 {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe Token: SeIncBasePriorityPrivilege 4980 {71625413-E022-439f-A046-9F418A6E8D5E}.exe Token: SeIncBasePriorityPrivilege 4488 {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe Token: SeIncBasePriorityPrivilege 1728 {D8511ADE-0760-40f3-89AA-E90800706F70}.exe Token: SeIncBasePriorityPrivilege 2696 {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe Token: SeIncBasePriorityPrivilege 1596 {34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe Token: SeIncBasePriorityPrivilege 2752 {E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 5028 220 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe 95 PID 220 wrote to memory of 5028 220 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe 95 PID 220 wrote to memory of 5028 220 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe 95 PID 220 wrote to memory of 4080 220 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe 96 PID 220 wrote to memory of 4080 220 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe 96 PID 220 wrote to memory of 4080 220 2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe 96 PID 5028 wrote to memory of 2612 5028 {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe 97 PID 5028 wrote to memory of 2612 5028 {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe 97 PID 5028 wrote to memory of 2612 5028 {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe 97 PID 5028 wrote to memory of 968 5028 {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe 98 PID 5028 wrote to memory of 968 5028 {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe 98 PID 5028 wrote to memory of 968 5028 {11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe 98 PID 2612 wrote to memory of 1012 2612 {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe 102 PID 2612 wrote to memory of 1012 2612 {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe 102 PID 2612 wrote to memory of 1012 2612 {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe 102 PID 2612 wrote to memory of 4900 2612 {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe 103 PID 2612 wrote to memory of 4900 2612 {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe 103 PID 2612 wrote to memory of 4900 2612 {BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe 103 PID 1012 wrote to memory of 4188 1012 {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe 104 PID 1012 wrote to memory of 4188 1012 {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe 104 PID 1012 wrote to memory of 4188 1012 {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe 104 PID 1012 wrote to memory of 860 1012 {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe 105 PID 1012 wrote to memory of 860 1012 {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe 105 PID 1012 wrote to memory of 860 1012 {A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe 105 PID 4188 wrote to memory of 4688 4188 {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe 106 PID 4188 wrote to memory of 4688 4188 {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe 106 PID 4188 wrote to memory of 4688 4188 {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe 106 PID 4188 wrote to memory of 2984 4188 {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe 107 PID 4188 wrote to memory of 2984 4188 {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe 107 PID 4188 wrote to memory of 2984 4188 {4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe 107 PID 4688 wrote to memory of 4980 4688 {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe 109 PID 4688 wrote to memory of 4980 4688 {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe 109 PID 4688 wrote to memory of 4980 4688 {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe 109 PID 4688 wrote to memory of 1624 4688 {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe 110 PID 4688 wrote to memory of 1624 4688 {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe 110 PID 4688 wrote to memory of 1624 4688 {9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe 110 PID 4980 wrote to memory of 4488 4980 {71625413-E022-439f-A046-9F418A6E8D5E}.exe 111 PID 4980 wrote to memory of 4488 4980 {71625413-E022-439f-A046-9F418A6E8D5E}.exe 111 PID 4980 wrote to memory of 4488 4980 {71625413-E022-439f-A046-9F418A6E8D5E}.exe 111 PID 4980 wrote to memory of 3448 4980 {71625413-E022-439f-A046-9F418A6E8D5E}.exe 112 PID 4980 wrote to memory of 3448 4980 {71625413-E022-439f-A046-9F418A6E8D5E}.exe 112 PID 4980 wrote to memory of 3448 4980 {71625413-E022-439f-A046-9F418A6E8D5E}.exe 112 PID 4488 wrote to memory of 1728 4488 {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe 114 PID 4488 wrote to memory of 1728 4488 {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe 114 PID 4488 wrote to memory of 1728 4488 {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe 114 PID 4488 wrote to memory of 3996 4488 {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe 115 PID 4488 wrote to memory of 3996 4488 {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe 115 PID 4488 wrote to memory of 3996 4488 {AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe 115 PID 1728 wrote to memory of 2696 1728 {D8511ADE-0760-40f3-89AA-E90800706F70}.exe 123 PID 1728 wrote to memory of 2696 1728 {D8511ADE-0760-40f3-89AA-E90800706F70}.exe 123 PID 1728 wrote to memory of 2696 1728 {D8511ADE-0760-40f3-89AA-E90800706F70}.exe 123 PID 1728 wrote to memory of 4352 1728 {D8511ADE-0760-40f3-89AA-E90800706F70}.exe 124 PID 1728 wrote to memory of 4352 1728 {D8511ADE-0760-40f3-89AA-E90800706F70}.exe 124 PID 1728 wrote to memory of 4352 1728 {D8511ADE-0760-40f3-89AA-E90800706F70}.exe 124 PID 2696 wrote to memory of 1596 2696 {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe 125 PID 2696 wrote to memory of 1596 2696 {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe 125 PID 2696 wrote to memory of 1596 2696 {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe 125 PID 2696 wrote to memory of 3648 2696 {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe 126 PID 2696 wrote to memory of 3648 2696 {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe 126 PID 2696 wrote to memory of 3648 2696 {4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe 126 PID 1596 wrote to memory of 2752 1596 {34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe 130 PID 1596 wrote to memory of 2752 1596 {34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe 130 PID 1596 wrote to memory of 2752 1596 {34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe 130 PID 1596 wrote to memory of 4520 1596 {34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-27_9089db63f522f1030cb2abda708e1d80_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\{11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exeC:\Windows\{11165DC3-5FBB-4eed-AFFF-09EEA1EED69A}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\{BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exeC:\Windows\{BCA4F04A-778D-4dfb-90CF-54663C6173A6}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\{A6942CA1-8166-40bf-A27A-C8813B9C8172}.exeC:\Windows\{A6942CA1-8166-40bf-A27A-C8813B9C8172}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\{4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exeC:\Windows\{4CF183EE-E61D-45ec-AAAC-E0508BA4063B}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\{9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exeC:\Windows\{9559A5DB-59AC-4895-ABD2-6F882EF2B7C7}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\{71625413-E022-439f-A046-9F418A6E8D5E}.exeC:\Windows\{71625413-E022-439f-A046-9F418A6E8D5E}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\{AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exeC:\Windows\{AB5B9B82-A430-4cda-9A10-A968DF92F3FD}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\{D8511ADE-0760-40f3-89AA-E90800706F70}.exeC:\Windows\{D8511ADE-0760-40f3-89AA-E90800706F70}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\{4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exeC:\Windows\{4C58B3DD-6A17-4e75-B773-9AC76DCE2C49}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\{34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exeC:\Windows\{34828AD8-AAB3-4b24-BB27-B94D2D64E747}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\{E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}.exeC:\Windows\{E7E4753A-2FE3-4b02-9D4A-F34254BA7CE6}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Windows\{B873D4F4-2584-4c8e-86B6-007B1A4D75C0}.exeC:\Windows\{B873D4F4-2584-4c8e-86B6-007B1A4D75C0}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E7E47~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34828~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4C58B~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D8511~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AB5B9~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71625~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9559A~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4CF18~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6942~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BCA4F~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11165~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD58c0c9d7d9c6adf3d6e09a2a6ad4fef0b
SHA1a88f690f5d04011ee9bef366343bbe159ccf10b4
SHA2563e3adfc95e02b957903e7def94ad63486acff20bc4a6cfb8087775fc57e9ad65
SHA512dbf35672712fcf43eb078f4e8b8c781142250728e8056eb93bf063d50c5ebc5dd7adb84e34937049c871632da8b8de2ad7466355895b675207c889f1bb4e49a7
-
Filesize
197KB
MD51401cfd86f6051f1a60f40b39834626f
SHA1c5b51d9842d7e60ac92cb087fd990c1cc2a9eea7
SHA256c8f52b81cf4eadb7c00321fefd4b802b180e9503431ef9c3c75399d7ca5334ed
SHA5129f7acd72d236eb1a97897a4260d5b63bec3b072cba5ac86d29586a509ab6b70ab345486e7109155177875c3c8628e56beb39bf4f43043aae63a0409192b7c148
-
Filesize
197KB
MD5427005f3b30f1dd7005004dbc970f70b
SHA1ed477b6c49e15d7197481cf98c83848c6a43ec78
SHA256e0a133750675e210519efbd132983c7bf25bc1ed31b9db717ef3760252fa58a8
SHA512b651c623fe04c00f825743d9015e4a24710b2c64cac868fea57a510b6f32d40c8168ab77684b1e796d9bee6ce0df0ce45eb178924435194db5a574b453427793
-
Filesize
197KB
MD571c66c80bdef2f83af95dd9fc55b86b0
SHA1e5170ca9aed2ca9a87aaa6dedcc136f397955cd9
SHA256cd853b77b46e146da2236aa0d85bf71daae19202835ea6ed50a0b31212a5893e
SHA512a63bd235a4ad905cd3b992a30c41449c01e78108d74910f02ee086f2a575442b6aa0ebe3e65163924d62cb9fbc7e206178bc89dc1541a74218e43718a723b829
-
Filesize
197KB
MD5009426de705b9aa03ddae22b4468022b
SHA16e4f7bacb681a3882692a7a8532fd145012655ae
SHA256c17cacf4b82298ab33ae94e71e992d8c6b0287f43be7f4aae2103e3e8f10658a
SHA512ca4efd103e540e26b380f22fdced4926f0d4b0edbe0b739fb8097875a9206a4e63a78a3651350b9af7723ffe9fa501bee3aacc082dd7aac9b72c2573872bdc8e
-
Filesize
197KB
MD5052cf98e44afaeec1ac23dcd24216783
SHA112827ec98e2cc66a31573483fd8b89c8dbe44d2a
SHA256854bd68d6e516147264439c3f506ef2b6287e3f092d6ef35da717ff99025aebf
SHA51264ed79f0e213c63c9e42bf265719c1265327276dc0ad851ed9a2760396b91fdf3070f066738b895b10057edb9eb6f990f781a9ed5af0b65887fb944982864a94
-
Filesize
197KB
MD5907eb22180dfea85dae2096df38ddca9
SHA1071cc2096ccffc876b5145c57c0902fbc6b1d902
SHA256300ac0fba5a016c9656739c8dd5dac8d4ee1624f899ae65be149b05e6b2180ed
SHA512eb6e990c638d92f80c0aa727754406af2eef69a8a035c81dadf90fe1f4948cf58a090ca71cabd5189dffaca37f839f226dd0dbae97cbdf9e8d16880bd6691942
-
Filesize
197KB
MD57d985234484043a6c96493c00f695477
SHA1e4181573e7f5b6f63af4a7a756c5a520667b494d
SHA2565b08a31d77973b8a89ec40eeec2f258ec0ba219c9e2e146e260ebd155e4bc772
SHA5129538a1679ce4a08e7c38f6b9ab72a63334a7be0014db0e9e20e29181bc7810d783cdc14f62a334155e0cfda8c977a5e52e6e2a35eb0585ca4fa271e64d56806d
-
Filesize
197KB
MD58fd151b3b3a32b3a44d78be6b3430055
SHA13678d7d99ad175fc9522a8d548e4250a135ce2a3
SHA256adc0db1a2f2cc30cd5137419ac712861549690f911f11f92e19e319ebbab114b
SHA512934031affd9658fdaeb7485207fa9328cc1dba4ab26f6b5b8043316efc78b8cd46e392bd6f37764916d4967c65b96185c904317ef6d1f73bdc829c544f08abee
-
Filesize
197KB
MD5e3111261cfdff1de900789f87d3c6e4b
SHA1739708dff96a88ec730c468419c58fc8c639a66c
SHA2566b1f3c1fb2fb5080f9239adc6e71d1f901582a8862f23ae821c1f99e10af9dd4
SHA5122770713b04acc6e6e3f2c693453bcb8db53fc1f0e7769ea5b1d20444c0ff0732fc22db557dc017328fdcc1d4aee8478cc0ef8cfa5a9f56744b095494bb67c9e6
-
Filesize
197KB
MD5a58e5bdfc446809f368c855642ba26b4
SHA199d73fc5b56c4d5ca634672ac135cb1daefa711c
SHA2565b7e0ebe331c4a6f0e3e1a25b3a4b052e9d107cef300fcdcbff48ff332fba4fb
SHA512ac013ba1307c2b4710216b9c7a60bb36f4e0d4a3a9c16a3b7021962e25a16a30fc0de023b12d2424e59a9befbd3ad4aac50b91f3ac97fce50a8356e11b10d75a
-
Filesize
197KB
MD5c45a7b89fc06d9be030a491fc0bbd37d
SHA1096d628c09b36e1635c0424d366e803ad16d191b
SHA256e17fd5037f093edd8e65ddb971e820e1c5e00373e3601f992bb252e0e61e4d22
SHA5125a3cc4456f4f000d0da3a5366c1efbfead0df53d00a4039247639b6e7069767d5821259add7c9c08baa592625f1ed59a5533c7c1e6918fcc49ce4a77979ae282