Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe
-
Size
168KB
-
MD5
9fbf26a7f2f3254976a75141afcff618
-
SHA1
b2d0decf1076977c0811e8fcd572528ccce46cae
-
SHA256
f30218af8fecf016b9b10ed7f3aa781eea074e224d25ecad92ddd54e34efd988
-
SHA512
f8bbe52f0157cb3e04f6803d02b0f4bb98f6e48715051b5d1c944da1afc87697a4a0f89544e8c6faf7f9e477c0bcc2739e5b9221483467440fd1165fc10ba7aa
-
SSDEEP
1536:1EGh0orlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0orlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A860454D-19CC-4ea4-8DFC-459892915B73}\stubpath = "C:\\Windows\\{A860454D-19CC-4ea4-8DFC-459892915B73}.exe" {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D75260E-A104-4629-A92E-EBE88651E880} {6098AEDE-5AF2-4097-9A2B-5A040264C25F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E3636155-B65D-4e2c-8329-2F7758DC0BCB} {0D75260E-A104-4629-A92E-EBE88651E880}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB59B907-D883-4fec-BB29-5663870B3768} {E3636155-B65D-4e2c-8329-2F7758DC0BCB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{827A1160-E17E-411a-BEAC-6E575DA573EC} 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{827A1160-E17E-411a-BEAC-6E575DA573EC}\stubpath = "C:\\Windows\\{827A1160-E17E-411a-BEAC-6E575DA573EC}.exe" 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B} {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5158BD2C-D9B2-4e5f-A793-94146D8B1395}\stubpath = "C:\\Windows\\{5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe" {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D75260E-A104-4629-A92E-EBE88651E880}\stubpath = "C:\\Windows\\{0D75260E-A104-4629-A92E-EBE88651E880}.exe" {6098AEDE-5AF2-4097-9A2B-5A040264C25F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7219AC24-0A80-49ef-86AF-72156139CBA7} {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7219AC24-0A80-49ef-86AF-72156139CBA7}\stubpath = "C:\\Windows\\{7219AC24-0A80-49ef-86AF-72156139CBA7}.exe" {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5158BD2C-D9B2-4e5f-A793-94146D8B1395} {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF9F049A-2278-4348-AC74-6E2357CDE460} {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB59B907-D883-4fec-BB29-5663870B3768}\stubpath = "C:\\Windows\\{EB59B907-D883-4fec-BB29-5663870B3768}.exe" {E3636155-B65D-4e2c-8329-2F7758DC0BCB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}\stubpath = "C:\\Windows\\{D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe" {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A860454D-19CC-4ea4-8DFC-459892915B73} {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6098AEDE-5AF2-4097-9A2B-5A040264C25F} {A860454D-19CC-4ea4-8DFC-459892915B73}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6098AEDE-5AF2-4097-9A2B-5A040264C25F}\stubpath = "C:\\Windows\\{6098AEDE-5AF2-4097-9A2B-5A040264C25F}.exe" {A860454D-19CC-4ea4-8DFC-459892915B73}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E3636155-B65D-4e2c-8329-2F7758DC0BCB}\stubpath = "C:\\Windows\\{E3636155-B65D-4e2c-8329-2F7758DC0BCB}.exe" {0D75260E-A104-4629-A92E-EBE88651E880}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B3F74113-018E-4ad0-BBE4-53ED9BD5A124} {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B3F74113-018E-4ad0-BBE4-53ED9BD5A124}\stubpath = "C:\\Windows\\{B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe" {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF9F049A-2278-4348-AC74-6E2357CDE460}\stubpath = "C:\\Windows\\{CF9F049A-2278-4348-AC74-6E2357CDE460}.exe" {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe -
Deletes itself 1 IoCs
pid Process 2216 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2084 {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe 2716 {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe 2924 {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe 2632 {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe 2672 {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe 864 {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe 1624 {A860454D-19CC-4ea4-8DFC-459892915B73}.exe 2832 {6098AEDE-5AF2-4097-9A2B-5A040264C25F}.exe 340 {0D75260E-A104-4629-A92E-EBE88651E880}.exe 2152 {E3636155-B65D-4e2c-8329-2F7758DC0BCB}.exe 2648 {EB59B907-D883-4fec-BB29-5663870B3768}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe File created C:\Windows\{CF9F049A-2278-4348-AC74-6E2357CDE460}.exe {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe File created C:\Windows\{D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe File created C:\Windows\{A860454D-19CC-4ea4-8DFC-459892915B73}.exe {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe File created C:\Windows\{6098AEDE-5AF2-4097-9A2B-5A040264C25F}.exe {A860454D-19CC-4ea4-8DFC-459892915B73}.exe File created C:\Windows\{0D75260E-A104-4629-A92E-EBE88651E880}.exe {6098AEDE-5AF2-4097-9A2B-5A040264C25F}.exe File created C:\Windows\{E3636155-B65D-4e2c-8329-2F7758DC0BCB}.exe {0D75260E-A104-4629-A92E-EBE88651E880}.exe File created C:\Windows\{EB59B907-D883-4fec-BB29-5663870B3768}.exe {E3636155-B65D-4e2c-8329-2F7758DC0BCB}.exe File created C:\Windows\{827A1160-E17E-411a-BEAC-6E575DA573EC}.exe 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe File created C:\Windows\{7219AC24-0A80-49ef-86AF-72156139CBA7}.exe {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe File created C:\Windows\{5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A860454D-19CC-4ea4-8DFC-459892915B73}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0D75260E-A104-4629-A92E-EBE88651E880}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E3636155-B65D-4e2c-8329-2F7758DC0BCB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6098AEDE-5AF2-4097-9A2B-5A040264C25F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EB59B907-D883-4fec-BB29-5663870B3768}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2408 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe Token: SeIncBasePriorityPrivilege 2084 {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe Token: SeIncBasePriorityPrivilege 2716 {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe Token: SeIncBasePriorityPrivilege 2924 {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe Token: SeIncBasePriorityPrivilege 2632 {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe Token: SeIncBasePriorityPrivilege 2672 {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe Token: SeIncBasePriorityPrivilege 864 {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe Token: SeIncBasePriorityPrivilege 1624 {A860454D-19CC-4ea4-8DFC-459892915B73}.exe Token: SeIncBasePriorityPrivilege 2832 {6098AEDE-5AF2-4097-9A2B-5A040264C25F}.exe Token: SeIncBasePriorityPrivilege 340 {0D75260E-A104-4629-A92E-EBE88651E880}.exe Token: SeIncBasePriorityPrivilege 2152 {E3636155-B65D-4e2c-8329-2F7758DC0BCB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2084 2408 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 31 PID 2408 wrote to memory of 2084 2408 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 31 PID 2408 wrote to memory of 2084 2408 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 31 PID 2408 wrote to memory of 2084 2408 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 31 PID 2408 wrote to memory of 2216 2408 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 32 PID 2408 wrote to memory of 2216 2408 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 32 PID 2408 wrote to memory of 2216 2408 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 32 PID 2408 wrote to memory of 2216 2408 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 32 PID 2084 wrote to memory of 2716 2084 {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe 33 PID 2084 wrote to memory of 2716 2084 {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe 33 PID 2084 wrote to memory of 2716 2084 {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe 33 PID 2084 wrote to memory of 2716 2084 {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe 33 PID 2084 wrote to memory of 2860 2084 {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe 34 PID 2084 wrote to memory of 2860 2084 {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe 34 PID 2084 wrote to memory of 2860 2084 {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe 34 PID 2084 wrote to memory of 2860 2084 {827A1160-E17E-411a-BEAC-6E575DA573EC}.exe 34 PID 2716 wrote to memory of 2924 2716 {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe 35 PID 2716 wrote to memory of 2924 2716 {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe 35 PID 2716 wrote to memory of 2924 2716 {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe 35 PID 2716 wrote to memory of 2924 2716 {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe 35 PID 2716 wrote to memory of 2908 2716 {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe 36 PID 2716 wrote to memory of 2908 2716 {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe 36 PID 2716 wrote to memory of 2908 2716 {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe 36 PID 2716 wrote to memory of 2908 2716 {B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe 36 PID 2924 wrote to memory of 2632 2924 {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe 37 PID 2924 wrote to memory of 2632 2924 {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe 37 PID 2924 wrote to memory of 2632 2924 {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe 37 PID 2924 wrote to memory of 2632 2924 {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe 37 PID 2924 wrote to memory of 2780 2924 {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe 38 PID 2924 wrote to memory of 2780 2924 {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe 38 PID 2924 wrote to memory of 2780 2924 {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe 38 PID 2924 wrote to memory of 2780 2924 {CF9F049A-2278-4348-AC74-6E2357CDE460}.exe 38 PID 2632 wrote to memory of 2672 2632 {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe 39 PID 2632 wrote to memory of 2672 2632 {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe 39 PID 2632 wrote to memory of 2672 2632 {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe 39 PID 2632 wrote to memory of 2672 2632 {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe 39 PID 2632 wrote to memory of 2336 2632 {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe 40 PID 2632 wrote to memory of 2336 2632 {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe 40 PID 2632 wrote to memory of 2336 2632 {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe 40 PID 2632 wrote to memory of 2336 2632 {7219AC24-0A80-49ef-86AF-72156139CBA7}.exe 40 PID 2672 wrote to memory of 864 2672 {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe 41 PID 2672 wrote to memory of 864 2672 {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe 41 PID 2672 wrote to memory of 864 2672 {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe 41 PID 2672 wrote to memory of 864 2672 {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe 41 PID 2672 wrote to memory of 1464 2672 {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe 42 PID 2672 wrote to memory of 1464 2672 {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe 42 PID 2672 wrote to memory of 1464 2672 {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe 42 PID 2672 wrote to memory of 1464 2672 {D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe 42 PID 864 wrote to memory of 1624 864 {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe 43 PID 864 wrote to memory of 1624 864 {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe 43 PID 864 wrote to memory of 1624 864 {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe 43 PID 864 wrote to memory of 1624 864 {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe 43 PID 864 wrote to memory of 2512 864 {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe 44 PID 864 wrote to memory of 2512 864 {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe 44 PID 864 wrote to memory of 2512 864 {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe 44 PID 864 wrote to memory of 2512 864 {5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe 44 PID 1624 wrote to memory of 2832 1624 {A860454D-19CC-4ea4-8DFC-459892915B73}.exe 45 PID 1624 wrote to memory of 2832 1624 {A860454D-19CC-4ea4-8DFC-459892915B73}.exe 45 PID 1624 wrote to memory of 2832 1624 {A860454D-19CC-4ea4-8DFC-459892915B73}.exe 45 PID 1624 wrote to memory of 2832 1624 {A860454D-19CC-4ea4-8DFC-459892915B73}.exe 45 PID 1624 wrote to memory of 2816 1624 {A860454D-19CC-4ea4-8DFC-459892915B73}.exe 46 PID 1624 wrote to memory of 2816 1624 {A860454D-19CC-4ea4-8DFC-459892915B73}.exe 46 PID 1624 wrote to memory of 2816 1624 {A860454D-19CC-4ea4-8DFC-459892915B73}.exe 46 PID 1624 wrote to memory of 2816 1624 {A860454D-19CC-4ea4-8DFC-459892915B73}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\{827A1160-E17E-411a-BEAC-6E575DA573EC}.exeC:\Windows\{827A1160-E17E-411a-BEAC-6E575DA573EC}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\{B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exeC:\Windows\{B3F74113-018E-4ad0-BBE4-53ED9BD5A124}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\{CF9F049A-2278-4348-AC74-6E2357CDE460}.exeC:\Windows\{CF9F049A-2278-4348-AC74-6E2357CDE460}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\{7219AC24-0A80-49ef-86AF-72156139CBA7}.exeC:\Windows\{7219AC24-0A80-49ef-86AF-72156139CBA7}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\{D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exeC:\Windows\{D5F0E2BD-67EA-44f3-A950-19BA0E27FB2B}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\{5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exeC:\Windows\{5158BD2C-D9B2-4e5f-A793-94146D8B1395}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\{A860454D-19CC-4ea4-8DFC-459892915B73}.exeC:\Windows\{A860454D-19CC-4ea4-8DFC-459892915B73}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\{6098AEDE-5AF2-4097-9A2B-5A040264C25F}.exeC:\Windows\{6098AEDE-5AF2-4097-9A2B-5A040264C25F}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Windows\{0D75260E-A104-4629-A92E-EBE88651E880}.exeC:\Windows\{0D75260E-A104-4629-A92E-EBE88651E880}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:340 -
C:\Windows\{E3636155-B65D-4e2c-8329-2F7758DC0BCB}.exeC:\Windows\{E3636155-B65D-4e2c-8329-2F7758DC0BCB}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2152 -
C:\Windows\{EB59B907-D883-4fec-BB29-5663870B3768}.exeC:\Windows\{EB59B907-D883-4fec-BB29-5663870B3768}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E3636~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D752~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6098A~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A8604~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5158B~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D5F0E~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7219A~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CF9F0~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B3F74~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{827A1~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e7d29d1b5a7c96dbb1db8276c6888507
SHA1a50db76f66909715811cf022051dfe5f704dc5ed
SHA256ac66c0bbcaf5351f7a89e42e377199c617bccc4f29e3f8354053cc9396bcdb40
SHA5127d51e844209fbaf3cbbfef53bb83a39d52370ca4d154b5f553f6add507931492ab602b6dc03dc82ed686dfd1ec302b649414e044fc1ccfee57b5fc30c17df682
-
Filesize
168KB
MD539d7e7b090dee411494d1db52e634fee
SHA13e6cc119be20ff027f01fde379a10f43e0d9ff3d
SHA256ea9c5b86499d0afbe9fbe4859f5695785a6e267a5cee91a15ce018953eba0425
SHA5129499bd9a96ca32d904f2f0bea2930941ceef0aac4e47e2edceefb9c97f0f7c19cbc3f037925c56c753edad294a9dd8151c8edcabfe0cc6c88ce242b7004bb901
-
Filesize
168KB
MD55b58be421be55e9f35adb281e3f2bd14
SHA14f5f58e3e0763d62c4aba4e573f0319f90a1d963
SHA256562a0f9a0608db5f495d880e0a822062f9b25d0ea16239a62c6ac5d672f2087a
SHA512beaee5b2ee3ba40684443265cd07825b19d9a4b51faad9fd44147a7d7e2bdc74c087dc11c30f89a71f5fe5464fd31b0499f3be6f4e80a3d86a3f4b6761b75939
-
Filesize
168KB
MD54414ed718e95168aff633e74ede8d245
SHA1879e437424bc2d325fd5fa12368828e93ac7d377
SHA25638a7b900c8cdf89ad649c996d33c664bc69435a007d31e8eab4377b5017a2068
SHA512a5e73106f592fe126127892d9a9dfb7c13df0613150dd075acfd12ebffc8c9eb5bc32ed165ea53192d02400d760d281fac2e65975e58809f656f67f4ee4c71ec
-
Filesize
168KB
MD5246de951d396ae2be9476261d9da7e49
SHA1fe4924afb84ef3e94b2d171d93ea5f4efdb2f178
SHA2562e28c54df3aac89fa8730888fe6c13cd4940ffdfa4069f421eedf948377219b0
SHA5127a0410f4cda5ece8d4ad4ac58fe1fbf6a991487fe4f016785a9a8a40d75a1bb6ac2501ac5a258a8dec6e0187abe766d717c1d84003d5a292fa87a43e340c06fa
-
Filesize
168KB
MD5baf85237eb547a205bce6fad1eb4091a
SHA10d0f228c9d423944ac575fecda6644352861a49c
SHA256bb40bde1a9c9a6ce65b0bd117247d705b2ec7d92d04c09c5712010b7bf689d97
SHA5122b92e894101df4c550e78f9223ebdc63e3a843ff41aaadabfed8c61f5474e81893d55202fedaa625da74a5136ec5c4b2f365479f030a74e73061f59c4e60bd5f
-
Filesize
168KB
MD5498077f6020da8c92f79129c2017a4cf
SHA10319cd5741b7caa01eddf6ef05eb2177e3a338f9
SHA25673c95e02d549872e9b5d720c4f16d924224f2f805c81a02c4b3342f327098a4f
SHA5127a1531764d764a752f78ea10735c546399dd41a855df542e2b47a0e52c72366898490e4df09c24377cf1424f7c51ed9623d6115cffdd6dd6e54c14250158490e
-
Filesize
168KB
MD52f91a51ca7dc15f35b00342670cc2e82
SHA1001d375bf7add2d19982104a592599fc3c3666c0
SHA2565e7b52c197b18d2ce3fdb43ebb29f675ea9ddb18d550c858ccd92ddae22cd04e
SHA512892ee828ad7c0cddca7da5ba515b10fc86d731a745aa6e4eea6c7f76b42e88068e620fc78108136f5746da49257c9ea016fd4da3ad2407dcaae18d265d43f767
-
Filesize
168KB
MD5d891d0b54ac99dd7ccaf00c0152d8251
SHA11e9b7ff1bcab991cdba036cd94fb29a698735f3a
SHA25672fea967ea548fd5b7ae10e3a157645813514f5c2df6861d62ff8a78731ff4ee
SHA512d08620363fcd57a830ecb31ded973c1531c1701744d424971c7834081ef5135cab51887d7cbd5fb4db35ec7f36d6118e2f020a0ba7dc29a3f1b08564d21cd233
-
Filesize
168KB
MD58daf04ec970ba4eb5b2a54d20d5c6c32
SHA1e86440d0dc727f558db764448d88bb49d0abc733
SHA256963cf23778009a24ace3b09ceed382e1695f321d8241ae17b70d4a5f642dace2
SHA512266e8aabcb08f01e0301b8109f7fd01c01e94c20a9e1dd5e02310f95db19a1a8263d763f679622fa7296f09ac74c8e652386321b33e0462f4732503826c95c23
-
Filesize
168KB
MD57e8894535d1f1bb56f0267191c8fe3bc
SHA19013f42c5ff46b72ce0def61ad7cf59b0e0acdc7
SHA2566447778c6c68bb64c812c656c740d711995a92f2077f8e20549d273ed8770332
SHA512e2fb69b0adff08cd8042d8273f9687dce0ba869cd42857a7654de7e934f6947d844b91cdf2aa79c3a216cda3e89ca470515620c5dfcc60e4e36edb0c6f54e1b9