Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe
-
Size
168KB
-
MD5
9fbf26a7f2f3254976a75141afcff618
-
SHA1
b2d0decf1076977c0811e8fcd572528ccce46cae
-
SHA256
f30218af8fecf016b9b10ed7f3aa781eea074e224d25ecad92ddd54e34efd988
-
SHA512
f8bbe52f0157cb3e04f6803d02b0f4bb98f6e48715051b5d1c944da1afc87697a4a0f89544e8c6faf7f9e477c0bcc2739e5b9221483467440fd1165fc10ba7aa
-
SSDEEP
1536:1EGh0orlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0orlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05BCE5EF-3574-4d4b-8076-735E4E2731D0} {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05BCE5EF-3574-4d4b-8076-735E4E2731D0}\stubpath = "C:\\Windows\\{05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe" {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03A7EED7-E88E-4486-9E4B-93F09499C2C8} {6A1585D2-4532-422b-8957-4FF930799B18}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2962D484-C2B2-4cc0-BA18-F79F23FE2A00} {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{68A762CE-9904-4892-BCDA-988E1C3F3890}\stubpath = "C:\\Windows\\{68A762CE-9904-4892-BCDA-988E1C3F3890}.exe" {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C627812A-DF8C-4cfa-80AF-E1BFCA5DCDEE}\stubpath = "C:\\Windows\\{C627812A-DF8C-4cfa-80AF-E1BFCA5DCDEE}.exe" {9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{053218C0-FF21-4769-804C-12692D3125BF} 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{053218C0-FF21-4769-804C-12692D3125BF}\stubpath = "C:\\Windows\\{053218C0-FF21-4769-804C-12692D3125BF}.exe" 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC745AB0-6183-4a88-B2B0-242A62BD0DAA} {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DC406D69-96C0-4a64-973D-7A2DE1BA2D0E} {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6A1585D2-4532-422b-8957-4FF930799B18} {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{68A762CE-9904-4892-BCDA-988E1C3F3890} {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9ECB9AFC-3D0C-4622-A94C-7A3C219650D9} {68A762CE-9904-4892-BCDA-988E1C3F3890}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DC9D145-1708-40fb-9A06-E3F5C34E4A88}\stubpath = "C:\\Windows\\{4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe" {053218C0-FF21-4769-804C-12692D3125BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}\stubpath = "C:\\Windows\\{DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe" {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180} {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6A1585D2-4532-422b-8957-4FF930799B18}\stubpath = "C:\\Windows\\{6A1585D2-4532-422b-8957-4FF930799B18}.exe" {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2962D484-C2B2-4cc0-BA18-F79F23FE2A00}\stubpath = "C:\\Windows\\{2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe" {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}\stubpath = "C:\\Windows\\{9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}.exe" {68A762CE-9904-4892-BCDA-988E1C3F3890}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C627812A-DF8C-4cfa-80AF-E1BFCA5DCDEE} {9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DC9D145-1708-40fb-9A06-E3F5C34E4A88} {053218C0-FF21-4769-804C-12692D3125BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC745AB0-6183-4a88-B2B0-242A62BD0DAA}\stubpath = "C:\\Windows\\{BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe" {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}\stubpath = "C:\\Windows\\{AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe" {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03A7EED7-E88E-4486-9E4B-93F09499C2C8}\stubpath = "C:\\Windows\\{03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe" {6A1585D2-4532-422b-8957-4FF930799B18}.exe -
Executes dropped EXE 12 IoCs
pid Process 5064 {053218C0-FF21-4769-804C-12692D3125BF}.exe 2948 {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe 2008 {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe 4956 {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe 1936 {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe 4992 {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe 1172 {6A1585D2-4532-422b-8957-4FF930799B18}.exe 4660 {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe 5092 {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe 3496 {68A762CE-9904-4892-BCDA-988E1C3F3890}.exe 4912 {9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}.exe 1996 {C627812A-DF8C-4cfa-80AF-E1BFCA5DCDEE}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe {6A1585D2-4532-422b-8957-4FF930799B18}.exe File created C:\Windows\{9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}.exe {68A762CE-9904-4892-BCDA-988E1C3F3890}.exe File created C:\Windows\{053218C0-FF21-4769-804C-12692D3125BF}.exe 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe File created C:\Windows\{6A1585D2-4532-422b-8957-4FF930799B18}.exe {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe File created C:\Windows\{DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe File created C:\Windows\{05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe File created C:\Windows\{AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe File created C:\Windows\{2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe File created C:\Windows\{68A762CE-9904-4892-BCDA-988E1C3F3890}.exe {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe File created C:\Windows\{C627812A-DF8C-4cfa-80AF-E1BFCA5DCDEE}.exe {9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}.exe File created C:\Windows\{4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe {053218C0-FF21-4769-804C-12692D3125BF}.exe File created C:\Windows\{BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {053218C0-FF21-4769-804C-12692D3125BF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {68A762CE-9904-4892-BCDA-988E1C3F3890}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C627812A-DF8C-4cfa-80AF-E1BFCA5DCDEE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6A1585D2-4532-422b-8957-4FF930799B18}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3600 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe Token: SeIncBasePriorityPrivilege 5064 {053218C0-FF21-4769-804C-12692D3125BF}.exe Token: SeIncBasePriorityPrivilege 2948 {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe Token: SeIncBasePriorityPrivilege 2008 {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe Token: SeIncBasePriorityPrivilege 4956 {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe Token: SeIncBasePriorityPrivilege 1936 {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe Token: SeIncBasePriorityPrivilege 4992 {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe Token: SeIncBasePriorityPrivilege 1172 {6A1585D2-4532-422b-8957-4FF930799B18}.exe Token: SeIncBasePriorityPrivilege 4660 {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe Token: SeIncBasePriorityPrivilege 5092 {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe Token: SeIncBasePriorityPrivilege 3496 {68A762CE-9904-4892-BCDA-988E1C3F3890}.exe Token: SeIncBasePriorityPrivilege 4912 {9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3600 wrote to memory of 5064 3600 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 95 PID 3600 wrote to memory of 5064 3600 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 95 PID 3600 wrote to memory of 5064 3600 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 95 PID 3600 wrote to memory of 1320 3600 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 96 PID 3600 wrote to memory of 1320 3600 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 96 PID 3600 wrote to memory of 1320 3600 2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe 96 PID 5064 wrote to memory of 2948 5064 {053218C0-FF21-4769-804C-12692D3125BF}.exe 97 PID 5064 wrote to memory of 2948 5064 {053218C0-FF21-4769-804C-12692D3125BF}.exe 97 PID 5064 wrote to memory of 2948 5064 {053218C0-FF21-4769-804C-12692D3125BF}.exe 97 PID 5064 wrote to memory of 4924 5064 {053218C0-FF21-4769-804C-12692D3125BF}.exe 98 PID 5064 wrote to memory of 4924 5064 {053218C0-FF21-4769-804C-12692D3125BF}.exe 98 PID 5064 wrote to memory of 4924 5064 {053218C0-FF21-4769-804C-12692D3125BF}.exe 98 PID 2948 wrote to memory of 2008 2948 {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe 101 PID 2948 wrote to memory of 2008 2948 {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe 101 PID 2948 wrote to memory of 2008 2948 {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe 101 PID 2948 wrote to memory of 3140 2948 {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe 102 PID 2948 wrote to memory of 3140 2948 {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe 102 PID 2948 wrote to memory of 3140 2948 {4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe 102 PID 2008 wrote to memory of 4956 2008 {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe 104 PID 2008 wrote to memory of 4956 2008 {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe 104 PID 2008 wrote to memory of 4956 2008 {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe 104 PID 2008 wrote to memory of 1600 2008 {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe 105 PID 2008 wrote to memory of 1600 2008 {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe 105 PID 2008 wrote to memory of 1600 2008 {BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe 105 PID 4956 wrote to memory of 1936 4956 {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe 106 PID 4956 wrote to memory of 1936 4956 {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe 106 PID 4956 wrote to memory of 1936 4956 {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe 106 PID 4956 wrote to memory of 4444 4956 {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe 107 PID 4956 wrote to memory of 4444 4956 {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe 107 PID 4956 wrote to memory of 4444 4956 {DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe 107 PID 1936 wrote to memory of 4992 1936 {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe 109 PID 1936 wrote to memory of 4992 1936 {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe 109 PID 1936 wrote to memory of 4992 1936 {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe 109 PID 1936 wrote to memory of 4492 1936 {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe 110 PID 1936 wrote to memory of 4492 1936 {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe 110 PID 1936 wrote to memory of 4492 1936 {05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe 110 PID 4992 wrote to memory of 1172 4992 {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe 111 PID 4992 wrote to memory of 1172 4992 {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe 111 PID 4992 wrote to memory of 1172 4992 {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe 111 PID 4992 wrote to memory of 3044 4992 {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe 112 PID 4992 wrote to memory of 3044 4992 {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe 112 PID 4992 wrote to memory of 3044 4992 {AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe 112 PID 1172 wrote to memory of 4660 1172 {6A1585D2-4532-422b-8957-4FF930799B18}.exe 117 PID 1172 wrote to memory of 4660 1172 {6A1585D2-4532-422b-8957-4FF930799B18}.exe 117 PID 1172 wrote to memory of 4660 1172 {6A1585D2-4532-422b-8957-4FF930799B18}.exe 117 PID 1172 wrote to memory of 3652 1172 {6A1585D2-4532-422b-8957-4FF930799B18}.exe 118 PID 1172 wrote to memory of 3652 1172 {6A1585D2-4532-422b-8957-4FF930799B18}.exe 118 PID 1172 wrote to memory of 3652 1172 {6A1585D2-4532-422b-8957-4FF930799B18}.exe 118 PID 4660 wrote to memory of 5092 4660 {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe 122 PID 4660 wrote to memory of 5092 4660 {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe 122 PID 4660 wrote to memory of 5092 4660 {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe 122 PID 4660 wrote to memory of 2572 4660 {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe 123 PID 4660 wrote to memory of 2572 4660 {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe 123 PID 4660 wrote to memory of 2572 4660 {03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe 123 PID 5092 wrote to memory of 3496 5092 {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe 124 PID 5092 wrote to memory of 3496 5092 {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe 124 PID 5092 wrote to memory of 3496 5092 {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe 124 PID 5092 wrote to memory of 2760 5092 {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe 125 PID 5092 wrote to memory of 2760 5092 {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe 125 PID 5092 wrote to memory of 2760 5092 {2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe 125 PID 3496 wrote to memory of 4912 3496 {68A762CE-9904-4892-BCDA-988E1C3F3890}.exe 129 PID 3496 wrote to memory of 4912 3496 {68A762CE-9904-4892-BCDA-988E1C3F3890}.exe 129 PID 3496 wrote to memory of 4912 3496 {68A762CE-9904-4892-BCDA-988E1C3F3890}.exe 129 PID 3496 wrote to memory of 4280 3496 {68A762CE-9904-4892-BCDA-988E1C3F3890}.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-27_9fbf26a7f2f3254976a75141afcff618_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\{053218C0-FF21-4769-804C-12692D3125BF}.exeC:\Windows\{053218C0-FF21-4769-804C-12692D3125BF}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\{4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exeC:\Windows\{4DC9D145-1708-40fb-9A06-E3F5C34E4A88}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\{BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exeC:\Windows\{BC745AB0-6183-4a88-B2B0-242A62BD0DAA}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\{DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exeC:\Windows\{DC406D69-96C0-4a64-973D-7A2DE1BA2D0E}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\{05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exeC:\Windows\{05BCE5EF-3574-4d4b-8076-735E4E2731D0}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\{AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exeC:\Windows\{AFA3F4C2-9A79-43cc-B8E7-4BA25E2FD180}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\{6A1585D2-4532-422b-8957-4FF930799B18}.exeC:\Windows\{6A1585D2-4532-422b-8957-4FF930799B18}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\{03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exeC:\Windows\{03A7EED7-E88E-4486-9E4B-93F09499C2C8}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\{2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exeC:\Windows\{2962D484-C2B2-4cc0-BA18-F79F23FE2A00}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\{68A762CE-9904-4892-BCDA-988E1C3F3890}.exeC:\Windows\{68A762CE-9904-4892-BCDA-988E1C3F3890}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\{9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}.exeC:\Windows\{9ECB9AFC-3D0C-4622-A94C-7A3C219650D9}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4912 -
C:\Windows\{C627812A-DF8C-4cfa-80AF-E1BFCA5DCDEE}.exeC:\Windows\{C627812A-DF8C-4cfa-80AF-E1BFCA5DCDEE}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9ECB9~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{68A76~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2962D~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03A7E~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6A158~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AFA3F~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{05BCE~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DC406~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BC745~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4DC9D~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{05321~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5b59ccee2771b36b1adff59d38b63c530
SHA15e44ac17086a380788b3901be4416c15236db4fd
SHA256547d6a6cd7f6b9eb170ae68b9286a99a8b3e12dbe367de88719b23d119aea4ee
SHA51223b31f0cd49fc394d1e1934d21a673163656d99566466c6e7ee0fb05f75867eaaa0eca9fa175c07214bb0a1d18f952dce47d56e3ad0e96bd640d4b4f46e0ddd9
-
Filesize
168KB
MD5a277279af52acf818359b843c5b6d743
SHA1de23351c966c89b8c2de180b7d9fe0bf7c30f54e
SHA256f76453049eadc46d6e5d1dcc856f2ba177318b5d068838cd1634f99d377a5acf
SHA512424d6bccbc54166f8a6c78ac317ce460e9074dff19072aeed7a43c5d2e586c00b4b2dc052ab84ff5475d796fa56290975ef39fe85354bd4fcb82312d8cd8e54c
-
Filesize
168KB
MD599b09df1feec8a00cc9e1e6e4020bba3
SHA1939d03bc9372d61d4bb45af60cad2c47fc126761
SHA256cc8dde5c7e95d289aa5bf3d9a29361817f54ee534c5022c7dd18a3a0631883ea
SHA512468f79b7cb24d5d5c7c782a98a9400a39e3f58540fef2672dc2a9bc7bd3da9388e42b7001fae0c07ce11b0d5a11994c7016f26162c5837a4903d9251d5ab7640
-
Filesize
168KB
MD51819a5141ece6af47e5d3ab8e350e29d
SHA196749bb9b54bfb4b0a1799d3c1c21ec735bdde93
SHA2560bd91ff6827a1fc43435411bda1950311b47a9bc22675ca69fafa8130f19d8ca
SHA5125650a0553f267fb6d9b2a7d4debeaebe2947f4f47392470e36a507851a58419c7fd3e950ac746b58e64239f70a71000513da496694fc3e89cca709b231e0ef93
-
Filesize
168KB
MD51bc0ced99d3755c7cfaace3ab60e23e8
SHA1efb6b5958cdcdf0eba9644f7b01db19e5cde5dff
SHA25668195ba524c6bb6147fb627fd5e6a0ae37cb687c6f5dabc42b1aab9ac1da5b36
SHA5128d31b169364af6ad03c5233116541ecd996498bddd66f97bc19cacc8193aaa536dece439c42dae6482e23c334b9aa6f485c80d3bc140559b9ed52648305e073f
-
Filesize
168KB
MD55f5c9ffa5a8c9069be16dd7307fea0e5
SHA160d590b8ec6c6ca839a94b18982c7b5e6d66b1c2
SHA2568253a6cb5be44eaa3aaffe91cc94c7c413ad7de0e2db35d88abae1d36bca19cc
SHA51295435d6ca6e351fb47af492c4982a9fb3228128117fc9d4caaba3655e0430fcc8b497e8966a771203d14c82856dfabc25218c8d1786359341a865170491318ec
-
Filesize
168KB
MD5bb129d3866365b9dab7ff6174f6058db
SHA11d6f8fe2ba17d124add326bda304ac225369bc48
SHA256799f6cd7f3d99e157f9f29477934554b8effd9fc7b06e91ca50770382e4aceed
SHA5127b3865a7cf6dccd2d99b748cf468a0a9886582eff1edd61f2f5eba8d06ae92722d1f9ac65bdafd19161142a98eb7d6433d0cd240aae40263e85258adcc7e9115
-
Filesize
168KB
MD590362621a0a4370fc598c5fa20657763
SHA196334fd7d043e4e126728aad3e7bbd65b3dcffa5
SHA256b6ea03170bb086a09d1501bfe7064c93e71589a91ede3a7aa11e78f9aebc2169
SHA5129dd6fdcab823e9f0cb28d4296b3b91b12cd17a83330618033e46664124f819654dbda08e0c8d513bbbb9ff231955b86a0b2ac77baef8a2cbb0678c96a68fb624
-
Filesize
168KB
MD5e4a1400da93c975b4048f5e6e0641945
SHA1035eb7639677bcf8409b26e54094d2e017730b3e
SHA2564f32a5bcdc5094ab814a6ca93de4be4f1ca372b01ffb07579955d596d27b26a1
SHA5122f07e36e84bdaae6543140516d002ef29788d97e928df5c91882bcd6cdeedf9acc42de3be10f1c0ff067e4dcc4f8875b7501776fe4d6d14664b24f37ac976594
-
Filesize
168KB
MD5ba0200a6267d6735ec5ff73af5e71d05
SHA140004bdc9a0ba265c6fb297be0eb64ab52d47c79
SHA25640472790596ff34d85813e7a2176eee8b0d8e35e8206542fd91d45f8152c963d
SHA512b599e26cebdef4ed8bd416011eec1cbd50c8284653340dd9b6cb09bad167992c4739aabf0e37b7529b2447cf537388b86aaf01ddba440153b6db25cf34782322
-
Filesize
168KB
MD507a1678578abae1c44637b42ab91a2ae
SHA1e4408e87ec234112aa9bb3f3149e3153826b8abb
SHA256415a6d453f7c9d8668fb0489bd309b6ba7fc96b42503352905ac9d37adc60b91
SHA512e227cfb14b6d9d98888a200c60807fb7f277122baa8fa1d2ac530102a45e37276208e2aa9a10f9a3d32c872cdbf901a116f96e065a7c0a558ecdedc91dd207be
-
Filesize
168KB
MD5679bc04568bdb0c18094f12a258cfa7c
SHA125d4cf628e44a688f39e7bfe2a761e1d90413805
SHA2560efea7aab966c7be66f307d7e25a3530c6903b0252e06c9273c08c8725b593de
SHA512e04ba5c166501e1d257a313719b9e72c3dd8b245906f73f6fd6877318d97912c31295c45d196e33efe43d8fc2434994290b179e0b13b79a71dd9b02d14a9d9ae