Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe
-
Size
216KB
-
MD5
3c39eed2d3ff3f55ed1c0ad0e434b5d4
-
SHA1
661e25b519026342b34027b92d57bbccf2f87fb5
-
SHA256
ec6f662fe878a756c1acbfb24ccffb64813100da25ac08d052441135a26c6da5
-
SHA512
e454155e1bca8f8171a484075850e976e1083436a51db65acd83d3668edbb6350f9b53f6caef8cf34acc1db3441c2f71a19cafbad53329a6524b8c6db4b7d8f1
-
SSDEEP
3072:jEGh0oVl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGjlEeKcAEcGy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{648EECA2-00C5-40e6-8E9E-2674B1236256}\stubpath = "C:\\Windows\\{648EECA2-00C5-40e6-8E9E-2674B1236256}.exe" 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5E99049-0DD9-4276-BEAC-B98D19C192FB} {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5E99049-0DD9-4276-BEAC-B98D19C192FB}\stubpath = "C:\\Windows\\{B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe" {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{86BA9FD6-9CCD-4138-AB86-60C493F0BA29} {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A219592-C9D9-489d-A52C-028B6E30F205}\stubpath = "C:\\Windows\\{5A219592-C9D9-489d-A52C-028B6E30F205}.exe" {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CAF340C9-FD21-4841-BC72-68EFCF5090EA} {085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{979A19F8-6B84-4e46-AB96-3033DCF264DE} {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}\stubpath = "C:\\Windows\\{E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe" {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1DEA30C7-7745-4f73-8260-45F2EA739B07} {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}\stubpath = "C:\\Windows\\{085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe" {D4D733B7-D01A-475a-9017-651F86676412}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{04E39E90-9BF7-44b7-97C4-0BC40C876716} {CAF340C9-FD21-4841-BC72-68EFCF5090EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CAF340C9-FD21-4841-BC72-68EFCF5090EA}\stubpath = "C:\\Windows\\{CAF340C9-FD21-4841-BC72-68EFCF5090EA}.exe" {085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{979A19F8-6B84-4e46-AB96-3033DCF264DE}\stubpath = "C:\\Windows\\{979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe" {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{86BA9FD6-9CCD-4138-AB86-60C493F0BA29}\stubpath = "C:\\Windows\\{86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe" {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1DEA30C7-7745-4f73-8260-45F2EA739B07}\stubpath = "C:\\Windows\\{1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe" {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A219592-C9D9-489d-A52C-028B6E30F205} {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53128476-37FC-41a7-AE94-FAC89418F1B1}\stubpath = "C:\\Windows\\{53128476-37FC-41a7-AE94-FAC89418F1B1}.exe" {5A219592-C9D9-489d-A52C-028B6E30F205}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D4D733B7-D01A-475a-9017-651F86676412} {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986} {D4D733B7-D01A-475a-9017-651F86676412}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{04E39E90-9BF7-44b7-97C4-0BC40C876716}\stubpath = "C:\\Windows\\{04E39E90-9BF7-44b7-97C4-0BC40C876716}.exe" {CAF340C9-FD21-4841-BC72-68EFCF5090EA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{648EECA2-00C5-40e6-8E9E-2674B1236256} 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F} {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53128476-37FC-41a7-AE94-FAC89418F1B1} {5A219592-C9D9-489d-A52C-028B6E30F205}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D4D733B7-D01A-475a-9017-651F86676412}\stubpath = "C:\\Windows\\{D4D733B7-D01A-475a-9017-651F86676412}.exe" {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe -
Executes dropped EXE 12 IoCs
pid Process 780 {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe 1864 {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe 3948 {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe 3064 {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe 4428 {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe 1900 {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe 264 {5A219592-C9D9-489d-A52C-028B6E30F205}.exe 4640 {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe 4856 {D4D733B7-D01A-475a-9017-651F86676412}.exe 2508 {085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe 2804 {CAF340C9-FD21-4841-BC72-68EFCF5090EA}.exe 2656 {04E39E90-9BF7-44b7-97C4-0BC40C876716}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{D4D733B7-D01A-475a-9017-651F86676412}.exe {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe File created C:\Windows\{085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe {D4D733B7-D01A-475a-9017-651F86676412}.exe File created C:\Windows\{CAF340C9-FD21-4841-BC72-68EFCF5090EA}.exe {085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe File created C:\Windows\{E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe File created C:\Windows\{86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe File created C:\Windows\{5A219592-C9D9-489d-A52C-028B6E30F205}.exe {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe File created C:\Windows\{1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe File created C:\Windows\{53128476-37FC-41a7-AE94-FAC89418F1B1}.exe {5A219592-C9D9-489d-A52C-028B6E30F205}.exe File created C:\Windows\{04E39E90-9BF7-44b7-97C4-0BC40C876716}.exe {CAF340C9-FD21-4841-BC72-68EFCF5090EA}.exe File created C:\Windows\{648EECA2-00C5-40e6-8E9E-2674B1236256}.exe 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe File created C:\Windows\{979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe File created C:\Windows\{B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D4D733B7-D01A-475a-9017-651F86676412}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5A219592-C9D9-489d-A52C-028B6E30F205}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CAF340C9-FD21-4841-BC72-68EFCF5090EA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {04E39E90-9BF7-44b7-97C4-0BC40C876716}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4688 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe Token: SeIncBasePriorityPrivilege 780 {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe Token: SeIncBasePriorityPrivilege 1864 {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe Token: SeIncBasePriorityPrivilege 3948 {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe Token: SeIncBasePriorityPrivilege 3064 {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe Token: SeIncBasePriorityPrivilege 4428 {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe Token: SeIncBasePriorityPrivilege 1900 {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe Token: SeIncBasePriorityPrivilege 264 {5A219592-C9D9-489d-A52C-028B6E30F205}.exe Token: SeIncBasePriorityPrivilege 4640 {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe Token: SeIncBasePriorityPrivilege 4856 {D4D733B7-D01A-475a-9017-651F86676412}.exe Token: SeIncBasePriorityPrivilege 2508 {085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe Token: SeIncBasePriorityPrivilege 2804 {CAF340C9-FD21-4841-BC72-68EFCF5090EA}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 780 4688 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe 94 PID 4688 wrote to memory of 780 4688 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe 94 PID 4688 wrote to memory of 780 4688 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe 94 PID 4688 wrote to memory of 1264 4688 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe 95 PID 4688 wrote to memory of 1264 4688 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe 95 PID 4688 wrote to memory of 1264 4688 2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe 95 PID 780 wrote to memory of 1864 780 {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe 96 PID 780 wrote to memory of 1864 780 {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe 96 PID 780 wrote to memory of 1864 780 {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe 96 PID 780 wrote to memory of 1576 780 {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe 97 PID 780 wrote to memory of 1576 780 {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe 97 PID 780 wrote to memory of 1576 780 {648EECA2-00C5-40e6-8E9E-2674B1236256}.exe 97 PID 1864 wrote to memory of 3948 1864 {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe 100 PID 1864 wrote to memory of 3948 1864 {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe 100 PID 1864 wrote to memory of 3948 1864 {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe 100 PID 1864 wrote to memory of 3924 1864 {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe 101 PID 1864 wrote to memory of 3924 1864 {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe 101 PID 1864 wrote to memory of 3924 1864 {979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe 101 PID 3948 wrote to memory of 3064 3948 {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe 103 PID 3948 wrote to memory of 3064 3948 {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe 103 PID 3948 wrote to memory of 3064 3948 {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe 103 PID 3948 wrote to memory of 1940 3948 {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe 104 PID 3948 wrote to memory of 1940 3948 {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe 104 PID 3948 wrote to memory of 1940 3948 {E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe 104 PID 3064 wrote to memory of 4428 3064 {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe 105 PID 3064 wrote to memory of 4428 3064 {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe 105 PID 3064 wrote to memory of 4428 3064 {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe 105 PID 3064 wrote to memory of 208 3064 {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe 106 PID 3064 wrote to memory of 208 3064 {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe 106 PID 3064 wrote to memory of 208 3064 {B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe 106 PID 4428 wrote to memory of 1900 4428 {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe 107 PID 4428 wrote to memory of 1900 4428 {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe 107 PID 4428 wrote to memory of 1900 4428 {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe 107 PID 4428 wrote to memory of 2144 4428 {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe 108 PID 4428 wrote to memory of 2144 4428 {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe 108 PID 4428 wrote to memory of 2144 4428 {86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe 108 PID 1900 wrote to memory of 264 1900 {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe 109 PID 1900 wrote to memory of 264 1900 {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe 109 PID 1900 wrote to memory of 264 1900 {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe 109 PID 1900 wrote to memory of 1660 1900 {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe 110 PID 1900 wrote to memory of 1660 1900 {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe 110 PID 1900 wrote to memory of 1660 1900 {1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe 110 PID 264 wrote to memory of 4640 264 {5A219592-C9D9-489d-A52C-028B6E30F205}.exe 111 PID 264 wrote to memory of 4640 264 {5A219592-C9D9-489d-A52C-028B6E30F205}.exe 111 PID 264 wrote to memory of 4640 264 {5A219592-C9D9-489d-A52C-028B6E30F205}.exe 111 PID 264 wrote to memory of 2468 264 {5A219592-C9D9-489d-A52C-028B6E30F205}.exe 112 PID 264 wrote to memory of 2468 264 {5A219592-C9D9-489d-A52C-028B6E30F205}.exe 112 PID 264 wrote to memory of 2468 264 {5A219592-C9D9-489d-A52C-028B6E30F205}.exe 112 PID 4640 wrote to memory of 4856 4640 {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe 113 PID 4640 wrote to memory of 4856 4640 {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe 113 PID 4640 wrote to memory of 4856 4640 {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe 113 PID 4640 wrote to memory of 4560 4640 {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe 114 PID 4640 wrote to memory of 4560 4640 {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe 114 PID 4640 wrote to memory of 4560 4640 {53128476-37FC-41a7-AE94-FAC89418F1B1}.exe 114 PID 4856 wrote to memory of 2508 4856 {D4D733B7-D01A-475a-9017-651F86676412}.exe 115 PID 4856 wrote to memory of 2508 4856 {D4D733B7-D01A-475a-9017-651F86676412}.exe 115 PID 4856 wrote to memory of 2508 4856 {D4D733B7-D01A-475a-9017-651F86676412}.exe 115 PID 4856 wrote to memory of 3212 4856 {D4D733B7-D01A-475a-9017-651F86676412}.exe 116 PID 4856 wrote to memory of 3212 4856 {D4D733B7-D01A-475a-9017-651F86676412}.exe 116 PID 4856 wrote to memory of 3212 4856 {D4D733B7-D01A-475a-9017-651F86676412}.exe 116 PID 2508 wrote to memory of 2804 2508 {085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe 117 PID 2508 wrote to memory of 2804 2508 {085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe 117 PID 2508 wrote to memory of 2804 2508 {085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe 117 PID 2508 wrote to memory of 4492 2508 {085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-07_3c39eed2d3ff3f55ed1c0ad0e434b5d4_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\{648EECA2-00C5-40e6-8E9E-2674B1236256}.exeC:\Windows\{648EECA2-00C5-40e6-8E9E-2674B1236256}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\{979A19F8-6B84-4e46-AB96-3033DCF264DE}.exeC:\Windows\{979A19F8-6B84-4e46-AB96-3033DCF264DE}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\{E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exeC:\Windows\{E806E7E2-A2FA-45b7-B1F4-7A8EA86D886F}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\{B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exeC:\Windows\{B5E99049-0DD9-4276-BEAC-B98D19C192FB}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\{86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exeC:\Windows\{86BA9FD6-9CCD-4138-AB86-60C493F0BA29}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\{1DEA30C7-7745-4f73-8260-45F2EA739B07}.exeC:\Windows\{1DEA30C7-7745-4f73-8260-45F2EA739B07}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\{5A219592-C9D9-489d-A52C-028B6E30F205}.exeC:\Windows\{5A219592-C9D9-489d-A52C-028B6E30F205}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\{53128476-37FC-41a7-AE94-FAC89418F1B1}.exeC:\Windows\{53128476-37FC-41a7-AE94-FAC89418F1B1}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\{D4D733B7-D01A-475a-9017-651F86676412}.exeC:\Windows\{D4D733B7-D01A-475a-9017-651F86676412}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\{085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exeC:\Windows\{085E981F-E0B1-4cdb-8D7D-2E7FF3BDC986}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\{CAF340C9-FD21-4841-BC72-68EFCF5090EA}.exeC:\Windows\{CAF340C9-FD21-4841-BC72-68EFCF5090EA}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\{04E39E90-9BF7-44b7-97C4-0BC40C876716}.exeC:\Windows\{04E39E90-9BF7-44b7-97C4-0BC40C876716}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CAF34~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{085E9~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4D73~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{53128~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A219~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1DEA3~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{86BA9~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5E99~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E806E~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{979A1~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{648EE~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1904,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4336 /prefetch:81⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD59e6f61ff1bcb45dc98840e8a2ded1b11
SHA1958130e48d665f400063ca132994dc6b64700e51
SHA256185b7d2b8631aca8052972c4114b4afca87644f7c2907931f908bb73a088cda0
SHA512cb9d77711319acf5adbcfba90231475ed23574da301107d17463b8bb5fd2a954c55d6a5fe19bb84032f40a01928137c822715f91a6e8cd00515a7e5eedc27c13
-
Filesize
216KB
MD513b2d6508de840d6a441fe4aeea23967
SHA1994fea0a2ddc579e2bda998187c626335aacc7d4
SHA2568fc1b46348591baf56e428b042cea468bc8aacac00fa3c01276491fc2c073347
SHA5120660554f361f5823c132b831c306983aeb8e84e65e45dea86d2f88fc6e6b362b2e8cd13acc02d1ad05c6e0998c084ea49798b65de8f15befb9db87bd81b66e1a
-
Filesize
216KB
MD5ce0b95d30263657c55d2864d353d1e6e
SHA1f1c833b7f0fd030618cb5cf45e3d23c4afa23fff
SHA2563b793357efe38e6638b30b6875616598949a8be0f6d18a35fb71a91b0a2a04d5
SHA5126105574919e5d3fef46947624303c04d84e10d637950ee8406337a91a246bf90d098a84a522b621d518ef2123ce3d2c59317d875ad4fdecd94ca18431adf6525
-
Filesize
216KB
MD5c1e19061722f438e84751d7ef54e87e8
SHA18aa9b695a299026856a598051943b9f167c5d3d6
SHA2566bdfe228ea1a6fc01c3a3be55fee5530a685145c509a354e6ae70e1adf437ee7
SHA512d983af84e4e1b03df53b48fb924ffc1105421eb36f54cca088d915821acf2d1d6a01313924dd64d57f91560959337a2a21aa9bddb37e76dc8d7d77b7e79306cb
-
Filesize
216KB
MD566606452060274d0e2ea1481be799995
SHA15b916a30dc47e3e6e39696f7fc28d440f07fdd3b
SHA2564d4c99b02b3dfecdb106390ab87d4b95a84918d5eefb82c38a6cc3a19f932a1d
SHA512d362f468d49c1c58f8f4853cb363bb774953524c69ba1446879371b3c72bb3268432910bf01f74a9d05b86f7621eba0c3ba49feb044676d986bf0f117bdedfd8
-
Filesize
216KB
MD5c88f42680fb6d4e68d20e28e6f782ced
SHA141aca2a3347db3a179b72dd580f7893594369c1e
SHA256106432b842b41abf8b73f09559d0c2172165d025f01b1f3be5765ed3e33c43ba
SHA51297cb1b13ddeecfaec30be40a29607c44e403f04c65640083960fb0afc4893a6dc6cb515a91a6c2a6e58fd910d81bd93c824f04732ffc914ead540b9d19d20a5a
-
Filesize
216KB
MD5ebc76378c46368bf04511837c79e3241
SHA1e8dd9d8419770ef9613331f55ad7a66f8560da3a
SHA256e6bf8e12844690370a39d52da3fa75aff7c959f5e99e643fc5229e6beccea078
SHA5122cf7726e3bc4867b6c7d5f65799158733125d8407c3a44787232b4a670f0eb40d083328b168d7264add2ab054554da5d9ae32ba098210f7e510a889a5caf77f8
-
Filesize
216KB
MD59064d3d3e687bae303066043241a210b
SHA114b48b0c56a211f8e319b9fc17b0e70e723236c3
SHA256e1a35685dc8edcca20d131fb049c2a7a4296c2b1993ec3f427ae007a436fed98
SHA5125093e22ef1bdd7fa6dec8d9e10e18201bfc8def0da8ac0e00061bc81afb02abfc2568b108cd5dfba9ff9beaf496316926b287169d4a3060b39851ba44aaf3b4f
-
Filesize
216KB
MD58231347fbb9b2c1c3ff95792f7bc4291
SHA1531cb718a093403ed456e9579901b7679d40ea90
SHA2563998aa9bcba40973779ce26a4535fe02a2831dff22ab1cc3a864ae27b96a149c
SHA51252e0c05be3a778371b72b7cd08480f60f541b8e0f2225c70bdeb5c47a192b0966bcaf391e182275a4e209b56a32dbcb3e38e2f69b21ef6ba1a3b945cb3067002
-
Filesize
216KB
MD525e410678d582533ca3c7f0647161fb5
SHA17b4af0177fe29316568d3c1af1d8699eb5a8f76b
SHA256df227fa8666f211c079d10453b3391bc7c34a7c221bb662a7bcc5a91fcd17cf6
SHA512c76016466e022cd09615368c1ae5a7f82456251f402afc50ace95b749f8f192408468eb333236cf55af56e9cb67e5fcc2d2003d3f353c8acb7d7759df2de6408
-
Filesize
216KB
MD598c63ada96167da05609662da8d4bf95
SHA15346271f49cd1ea1d0e37f89851aac706401543c
SHA25603d892f399b506d9072e84a2b6c55a9f3875e396f593cff2bccc13f71f6792df
SHA512ca65011f46f7fe6d34b19a8d404ac0b04b2a4adae02842f052a0e6ea162e8085194be610097c8076bbb8b9156b67a2c18f1d10aae33a4992a24abc2570c27e57
-
Filesize
216KB
MD5a6054fe02a6313485b77ee863fda1b96
SHA1cb93ef29e8f95e88a95ad9f0ae66f1c2c1af0dc2
SHA256e6f815b4bcb8401ead922b0046df91e688636262ea1a2157d0b2f10a3a1ce292
SHA512d14ecc525db192f5c12cd871020a9723a16342822011f2e167ba6758697346fbda50a75445f3f28777ef1124222b05e6e49d4514a5ac911449783a2d8ada4502