Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe
-
Size
372KB
-
MD5
01c6263239382be917f3ad14b6ee9862
-
SHA1
4d9ef07e1bf550bba9172ae7b1b919e0cedbdc82
-
SHA256
1670026222caf77194ee148e5b25e0fe83d8565ced95f6fbf6f2a052187589af
-
SHA512
d714189a26f193638b6552e5894ecdf3c6be28fcc0d4cb254a845b30882a351dfe056887265b6cdbc69f02e2495d6ec5f769e666d8cfed1a20da25c1b0748f03
-
SSDEEP
3072:CEGh0oHmlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGEl/Oe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39} {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}\stubpath = "C:\\Windows\\{5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe" {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B76D631-7232-4588-8267-58C35D20BB17} {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B76D631-7232-4588-8267-58C35D20BB17}\stubpath = "C:\\Windows\\{5B76D631-7232-4588-8267-58C35D20BB17}.exe" {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{94576252-C0BF-4470-8167-14FE8D13634C}\stubpath = "C:\\Windows\\{94576252-C0BF-4470-8167-14FE8D13634C}.exe" {DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7853C141-381F-4eee-AD80-B1CABEDC75E3}\stubpath = "C:\\Windows\\{7853C141-381F-4eee-AD80-B1CABEDC75E3}.exe" {94576252-C0BF-4470-8167-14FE8D13634C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4398A167-53CF-482c-8D39-44BABB0F89D3} {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E6E0B094-6006-48a1-B863-F12A81EA8B0E}\stubpath = "C:\\Windows\\{E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe" 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{19A1132C-78B9-47ae-A340-A930D5FE6891} {B7F773A0-222C-441a-B1B0-41394C529091}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E0BFD6E4-A574-49e7-B419-649700DB83C9}\stubpath = "C:\\Windows\\{E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe" {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E6E0B094-6006-48a1-B863-F12A81EA8B0E} 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E0BFD6E4-A574-49e7-B419-649700DB83C9} {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B158A138-4AE4-4824-8A6E-A0744F83F442} {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DCECB2E4-245F-4c44-B42F-41E4E581F279} {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7853C141-381F-4eee-AD80-B1CABEDC75E3} {94576252-C0BF-4470-8167-14FE8D13634C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B7F773A0-222C-441a-B1B0-41394C529091} {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{19A1132C-78B9-47ae-A340-A930D5FE6891}\stubpath = "C:\\Windows\\{19A1132C-78B9-47ae-A340-A930D5FE6891}.exe" {B7F773A0-222C-441a-B1B0-41394C529091}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4398A167-53CF-482c-8D39-44BABB0F89D3}\stubpath = "C:\\Windows\\{4398A167-53CF-482c-8D39-44BABB0F89D3}.exe" {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B158A138-4AE4-4824-8A6E-A0744F83F442}\stubpath = "C:\\Windows\\{B158A138-4AE4-4824-8A6E-A0744F83F442}.exe" {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{71E5C7B5-4202-4a47-B035-277ECC23C249} {5B76D631-7232-4588-8267-58C35D20BB17}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{71E5C7B5-4202-4a47-B035-277ECC23C249}\stubpath = "C:\\Windows\\{71E5C7B5-4202-4a47-B035-277ECC23C249}.exe" {5B76D631-7232-4588-8267-58C35D20BB17}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DCECB2E4-245F-4c44-B42F-41E4E581F279}\stubpath = "C:\\Windows\\{DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe" {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{94576252-C0BF-4470-8167-14FE8D13634C} {DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B7F773A0-222C-441a-B1B0-41394C529091}\stubpath = "C:\\Windows\\{B7F773A0-222C-441a-B1B0-41394C529091}.exe" {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe -
Executes dropped EXE 12 IoCs
pid Process 3880 {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe 1604 {B7F773A0-222C-441a-B1B0-41394C529091}.exe 2348 {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe 4452 {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe 1252 {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe 2248 {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe 616 {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe 3100 {5B76D631-7232-4588-8267-58C35D20BB17}.exe 1620 {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe 3544 {DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe 1244 {94576252-C0BF-4470-8167-14FE8D13634C}.exe 4832 {7853C141-381F-4eee-AD80-B1CABEDC75E3}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{5B76D631-7232-4588-8267-58C35D20BB17}.exe {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe File created C:\Windows\{DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe File created C:\Windows\{19A1132C-78B9-47ae-A340-A930D5FE6891}.exe {B7F773A0-222C-441a-B1B0-41394C529091}.exe File created C:\Windows\{E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe File created C:\Windows\{B158A138-4AE4-4824-8A6E-A0744F83F442}.exe {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe File created C:\Windows\{5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe File created C:\Windows\{71E5C7B5-4202-4a47-B035-277ECC23C249}.exe {5B76D631-7232-4588-8267-58C35D20BB17}.exe File created C:\Windows\{94576252-C0BF-4470-8167-14FE8D13634C}.exe {DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe File created C:\Windows\{7853C141-381F-4eee-AD80-B1CABEDC75E3}.exe {94576252-C0BF-4470-8167-14FE8D13634C}.exe File created C:\Windows\{E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe File created C:\Windows\{B7F773A0-222C-441a-B1B0-41394C529091}.exe {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe File created C:\Windows\{4398A167-53CF-482c-8D39-44BABB0F89D3}.exe {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5B76D631-7232-4588-8267-58C35D20BB17}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7853C141-381F-4eee-AD80-B1CABEDC75E3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {94576252-C0BF-4470-8167-14FE8D13634C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B7F773A0-222C-441a-B1B0-41394C529091}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4832 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe Token: SeIncBasePriorityPrivilege 3880 {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe Token: SeIncBasePriorityPrivilege 1604 {B7F773A0-222C-441a-B1B0-41394C529091}.exe Token: SeIncBasePriorityPrivilege 2348 {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe Token: SeIncBasePriorityPrivilege 4452 {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe Token: SeIncBasePriorityPrivilege 1252 {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe Token: SeIncBasePriorityPrivilege 2248 {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe Token: SeIncBasePriorityPrivilege 616 {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe Token: SeIncBasePriorityPrivilege 3100 {5B76D631-7232-4588-8267-58C35D20BB17}.exe Token: SeIncBasePriorityPrivilege 1620 {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe Token: SeIncBasePriorityPrivilege 3544 {DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe Token: SeIncBasePriorityPrivilege 1244 {94576252-C0BF-4470-8167-14FE8D13634C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 3880 4832 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe 86 PID 4832 wrote to memory of 3880 4832 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe 86 PID 4832 wrote to memory of 3880 4832 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe 86 PID 4832 wrote to memory of 3972 4832 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe 87 PID 4832 wrote to memory of 3972 4832 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe 87 PID 4832 wrote to memory of 3972 4832 2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe 87 PID 3880 wrote to memory of 1604 3880 {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe 88 PID 3880 wrote to memory of 1604 3880 {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe 88 PID 3880 wrote to memory of 1604 3880 {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe 88 PID 3880 wrote to memory of 2172 3880 {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe 89 PID 3880 wrote to memory of 2172 3880 {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe 89 PID 3880 wrote to memory of 2172 3880 {E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe 89 PID 1604 wrote to memory of 2348 1604 {B7F773A0-222C-441a-B1B0-41394C529091}.exe 92 PID 1604 wrote to memory of 2348 1604 {B7F773A0-222C-441a-B1B0-41394C529091}.exe 92 PID 1604 wrote to memory of 2348 1604 {B7F773A0-222C-441a-B1B0-41394C529091}.exe 92 PID 1604 wrote to memory of 2040 1604 {B7F773A0-222C-441a-B1B0-41394C529091}.exe 93 PID 1604 wrote to memory of 2040 1604 {B7F773A0-222C-441a-B1B0-41394C529091}.exe 93 PID 1604 wrote to memory of 2040 1604 {B7F773A0-222C-441a-B1B0-41394C529091}.exe 93 PID 2348 wrote to memory of 4452 2348 {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe 96 PID 2348 wrote to memory of 4452 2348 {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe 96 PID 2348 wrote to memory of 4452 2348 {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe 96 PID 2348 wrote to memory of 3392 2348 {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe 97 PID 2348 wrote to memory of 3392 2348 {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe 97 PID 2348 wrote to memory of 3392 2348 {19A1132C-78B9-47ae-A340-A930D5FE6891}.exe 97 PID 4452 wrote to memory of 1252 4452 {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe 98 PID 4452 wrote to memory of 1252 4452 {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe 98 PID 4452 wrote to memory of 1252 4452 {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe 98 PID 4452 wrote to memory of 2220 4452 {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe 99 PID 4452 wrote to memory of 2220 4452 {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe 99 PID 4452 wrote to memory of 2220 4452 {4398A167-53CF-482c-8D39-44BABB0F89D3}.exe 99 PID 1252 wrote to memory of 2248 1252 {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe 100 PID 1252 wrote to memory of 2248 1252 {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe 100 PID 1252 wrote to memory of 2248 1252 {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe 100 PID 1252 wrote to memory of 116 1252 {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe 101 PID 1252 wrote to memory of 116 1252 {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe 101 PID 1252 wrote to memory of 116 1252 {E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe 101 PID 2248 wrote to memory of 616 2248 {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe 102 PID 2248 wrote to memory of 616 2248 {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe 102 PID 2248 wrote to memory of 616 2248 {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe 102 PID 2248 wrote to memory of 2340 2248 {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe 103 PID 2248 wrote to memory of 2340 2248 {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe 103 PID 2248 wrote to memory of 2340 2248 {B158A138-4AE4-4824-8A6E-A0744F83F442}.exe 103 PID 616 wrote to memory of 3100 616 {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe 104 PID 616 wrote to memory of 3100 616 {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe 104 PID 616 wrote to memory of 3100 616 {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe 104 PID 616 wrote to memory of 2576 616 {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe 105 PID 616 wrote to memory of 2576 616 {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe 105 PID 616 wrote to memory of 2576 616 {5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe 105 PID 3100 wrote to memory of 1620 3100 {5B76D631-7232-4588-8267-58C35D20BB17}.exe 106 PID 3100 wrote to memory of 1620 3100 {5B76D631-7232-4588-8267-58C35D20BB17}.exe 106 PID 3100 wrote to memory of 1620 3100 {5B76D631-7232-4588-8267-58C35D20BB17}.exe 106 PID 3100 wrote to memory of 3088 3100 {5B76D631-7232-4588-8267-58C35D20BB17}.exe 107 PID 3100 wrote to memory of 3088 3100 {5B76D631-7232-4588-8267-58C35D20BB17}.exe 107 PID 3100 wrote to memory of 3088 3100 {5B76D631-7232-4588-8267-58C35D20BB17}.exe 107 PID 1620 wrote to memory of 3544 1620 {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe 108 PID 1620 wrote to memory of 3544 1620 {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe 108 PID 1620 wrote to memory of 3544 1620 {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe 108 PID 1620 wrote to memory of 4772 1620 {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe 109 PID 1620 wrote to memory of 4772 1620 {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe 109 PID 1620 wrote to memory of 4772 1620 {71E5C7B5-4202-4a47-B035-277ECC23C249}.exe 109 PID 3544 wrote to memory of 1244 3544 {DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe 110 PID 3544 wrote to memory of 1244 3544 {DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe 110 PID 3544 wrote to memory of 1244 3544 {DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe 110 PID 3544 wrote to memory of 872 3544 {DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-07_01c6263239382be917f3ad14b6ee9862_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\{E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exeC:\Windows\{E6E0B094-6006-48a1-B863-F12A81EA8B0E}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\{B7F773A0-222C-441a-B1B0-41394C529091}.exeC:\Windows\{B7F773A0-222C-441a-B1B0-41394C529091}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\{19A1132C-78B9-47ae-A340-A930D5FE6891}.exeC:\Windows\{19A1132C-78B9-47ae-A340-A930D5FE6891}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\{4398A167-53CF-482c-8D39-44BABB0F89D3}.exeC:\Windows\{4398A167-53CF-482c-8D39-44BABB0F89D3}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\{E0BFD6E4-A574-49e7-B419-649700DB83C9}.exeC:\Windows\{E0BFD6E4-A574-49e7-B419-649700DB83C9}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\{B158A138-4AE4-4824-8A6E-A0744F83F442}.exeC:\Windows\{B158A138-4AE4-4824-8A6E-A0744F83F442}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\{5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exeC:\Windows\{5BFD7F6A-E3AD-4864-92CD-77C09A6BCB39}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\{5B76D631-7232-4588-8267-58C35D20BB17}.exeC:\Windows\{5B76D631-7232-4588-8267-58C35D20BB17}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\{71E5C7B5-4202-4a47-B035-277ECC23C249}.exeC:\Windows\{71E5C7B5-4202-4a47-B035-277ECC23C249}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\{DCECB2E4-245F-4c44-B42F-41E4E581F279}.exeC:\Windows\{DCECB2E4-245F-4c44-B42F-41E4E581F279}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\{94576252-C0BF-4470-8167-14FE8D13634C}.exeC:\Windows\{94576252-C0BF-4470-8167-14FE8D13634C}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Windows\{7853C141-381F-4eee-AD80-B1CABEDC75E3}.exeC:\Windows\{7853C141-381F-4eee-AD80-B1CABEDC75E3}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{94576~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:3292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DCECB~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71E5C~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:4772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5B76D~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5BFD7~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B158A~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E0BFD~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4398A~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{19A11~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B7F77~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E6E0B~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD54eccbc4a2504a8f2e5a39c7c371ca526
SHA1e9aadc29c3f31aaea3c2ad89675315b66e5093f1
SHA25683b937289778ae4ab86e8a7b2ef6d3f80d14d06e732dc344896f66df0f7b2bcc
SHA512b142cc52ab30caea89a2afa9fee32d81eaaddf0bc88a23a1bd09ca59a8431aafed851bb28e6aa5c9745bf0088228bc7a3673b73ecbe469777da1873ec8b8c4c9
-
Filesize
372KB
MD501e29f51484e64032c74bf545d9b8bbd
SHA1add2283a819a4befba7b05463253eb8f474e07a8
SHA256902c2fd3d3ebe9f19f4f735694f0daecaab26a56c1be8bc3e795c067f4870292
SHA512a9989a11551698debf470091ff89f401e7899e81d9f5b2245bcf862038585db0ed1bc458d653d230aef4a93cf71ec928369d813c86f80e3115806c733d131b05
-
Filesize
372KB
MD53c6deba7333aa64aafd4c928c0b59c75
SHA1f2a42c2bf36afc91c212b83a577c77a682e4e139
SHA2564adafa62f4fd4c45b7aea3efaf9d17dd2a9890165a33052ca43a16322cd01ffa
SHA5120dfb65c7e47a0487d5063fedff3f2e067cca2d8a2a98ce6e948b9cd0b2fd33937db440114eaf1c8d5d598811c52f4d3c8a5f489eed48b3c7a551c1ab2d718e42
-
Filesize
372KB
MD5201a674298f93373e4acb8483b90b78d
SHA1fe80e7acdbae2992f2fb38b328aec50fb6ba8759
SHA256f5927db8c2e42700e14688e7e06a2fff662c39bbb67d80783ffb3ee898154cf6
SHA51270a2d54461b4c64c4d33397a01480665ce423894f41899c61d7cdb92364c669a90b01432fcb28e1c4a7a09ff7db3e415b1094f6c095fd01a5a38f0f95fe70c0b
-
Filesize
372KB
MD52248722cb701f37a279bde5eb9f3e0f6
SHA163c4a1c2f1f0eae2bc80adab4a49d854a0785c48
SHA256609c9f165a7f79c52b533df1cc4db86730a9dd912ba8bc6f903372c9d2fa74de
SHA5124323b8c64efe27c5ca0a69237f253ae1b2f5775eb8bfe58fb5de4313e6c7f7d4d94432b6dfacc95fdf1d20eccafff6a4123a31cc86dc227e6234cce977645628
-
Filesize
372KB
MD55800a665cafcdde1fc9efb5171a741de
SHA1d526decaca5add14dd53d8ac9c713d19e235d6b1
SHA256142d23cab7ef93ec9cbdad976500d64fe67d6e7e0dce5959a7487b0a24b0a7ae
SHA512cfe52c6893794fe86f4295a86838d2d484b63cd7072cf821f41980a4796a79cd88c62491b3045fedb3ffb268c790764677523a30605499b2a63471b935950d00
-
Filesize
372KB
MD563d25d4853ae2d1c48a39eb342a40f7f
SHA1661c6cc66d2942cd65c60274ef8f20d6ba2f95df
SHA2561712ef40c9c2633d66bb57faddc2370d34bbe229e0ca215e62d7bfcedceebb40
SHA51242d7b72d671e545dedc3a380ebb26e63872d7b714809d32b2b3f4a341031cd09bbe1746f0774c41cfa3bd4b8b0e79d005e80eb63d9d2de6e4497a96e0a8d363e
-
Filesize
372KB
MD5b2cf613d0b8f0391f0ab01b8915192ff
SHA105d69528eef64dae37ab21071fb5786e8a6ad965
SHA2568b47310c38ccd2b19bbb51b618387f273bfe3797b960bdb95bc52948c5e08eeb
SHA5120a592f67a35d3ddee67ce32d914e66ab5b3d7f1ba0c954d7cfb06fa93187709c8a2025768f9de1e866988e17b45a9be7983f1a84819054c0d0c10316ffac4e0f
-
Filesize
372KB
MD516fa66b8c12e44231a92d09a93af2cb5
SHA12029a4aaefc398d977cec0079a0a9f1ce32e474d
SHA256259abf35176e8c0dd86c239c6cb9dc07c8e2c1c6baf4c0107666e975e2473fd6
SHA51247b3b1a75d7b11070e5d8700160386ca1c5aa89246c99a1d897739837e05f0d5f4542529db25a095d2cb321b5608e9169e61d1ef8a0870dafd84b95d204ba743
-
Filesize
372KB
MD55aace3a28eaeaa5d7eb32f9b7838e817
SHA141a176d536fcf59e14e9ca9c1298dfbc65781d0e
SHA256c17b2f22023688b8230e8b22e7dd98911d1d5d97b8e3e4f72d8238b6239059cd
SHA51297928a93ea68945a1cb38ef6a270f94f83f88cc2da1950c952921aeaa25f77d6c3390f3b8bdb7e5afd40f86532027e7546961c312302bc357df148b8b265b514
-
Filesize
372KB
MD54d89d6fc9a84229d2ad218b59de3892e
SHA173c3a0417a0ed899b742648b390280d8143bea27
SHA256cf91989b08c5fd376158270499ec22efc54693dc714c0aef189275455731e15d
SHA512968bea9ba7198949febf47ece1f2c9aa9dd139f5b92fcd6d0d50d0d68f5bb2838e6f2db660e29f52ace4b4cdef5d203a15d824a6e7b3106f36424a34260300aa
-
Filesize
372KB
MD5fe30b5b16b7d011a5e8b9e18ba046449
SHA112c5c25c3c3f027abe45bd608d97e20e13ac1c1a
SHA256f6840ddb3d338947ae1167ab07fe7102f6885491dc83043cc2577eb896fe961c
SHA512a7a752cc7802ad1a419a05ba6f7f57ae4b409d7b0133634a72a89e2225eaf77b7b9de7dd8fc493b187980d6f730c111eeb99f78c97a757225cb606137ebe8a76