Analysis
-
max time kernel
144s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe
-
Size
204KB
-
MD5
5b19f1c6288b3d62aed7a826abab0d6e
-
SHA1
c43ea4211b5b85a455b195f0df33fafb1a4de0ca
-
SHA256
d0e6044ef4fae086b9d7f0c2273d6a28b2a0cdbde686729c8d63cc81b00bde3d
-
SHA512
7f68cb108bef3673582176fb3f7f6990c44556dc26b3df917e6f5a5efbf8cf0fc6ae5e5230ecd0c4c5562189e1d2f2a8aeb96ab794b17b6e43d97ff3185f71fb
-
SSDEEP
1536:1EGh0otl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0otl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9} {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11776137-87FD-4eff-9863-6CBCBC52C756} {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11776137-87FD-4eff-9863-6CBCBC52C756}\stubpath = "C:\\Windows\\{11776137-87FD-4eff-9863-6CBCBC52C756}.exe" {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2693A3A-11FE-40df-BBAB-1AF4972A3ACD} {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5DF4E9C7-AE0E-4798-869D-C5DA18F5699B} {4CB0329D-3D40-4285-A0FF-436B354464EA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{896B9E58-B88B-460a-B95E-B6BF48F38129} 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{896B9E58-B88B-460a-B95E-B6BF48F38129}\stubpath = "C:\\Windows\\{896B9E58-B88B-460a-B95E-B6BF48F38129}.exe" 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6} {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}\stubpath = "C:\\Windows\\{E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe" {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}\stubpath = "C:\\Windows\\{0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe" {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF} {11776137-87FD-4eff-9863-6CBCBC52C756}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}\stubpath = "C:\\Windows\\{D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe" {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}\stubpath = "C:\\Windows\\{5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}.exe" {4CB0329D-3D40-4285-A0FF-436B354464EA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80B16BAA-19AA-436e-B895-900CD5A486CD} {5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80B16BAA-19AA-436e-B895-900CD5A486CD}\stubpath = "C:\\Windows\\{80B16BAA-19AA-436e-B895-900CD5A486CD}.exe" {5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C} {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}\stubpath = "C:\\Windows\\{69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe" {11776137-87FD-4eff-9863-6CBCBC52C756}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4CB0329D-3D40-4285-A0FF-436B354464EA} {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4CB0329D-3D40-4285-A0FF-436B354464EA}\stubpath = "C:\\Windows\\{4CB0329D-3D40-4285-A0FF-436B354464EA}.exe" {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5B99BE7B-D61B-4150-8CCE-5C9E7B74C0C5}\stubpath = "C:\\Windows\\{5B99BE7B-D61B-4150-8CCE-5C9E7B74C0C5}.exe" {80B16BAA-19AA-436e-B895-900CD5A486CD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}\stubpath = "C:\\Windows\\{81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe" {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5B99BE7B-D61B-4150-8CCE-5C9E7B74C0C5} {80B16BAA-19AA-436e-B895-900CD5A486CD}.exe -
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 664 {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe 2860 {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe 2060 {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe 2804 {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe 3052 {11776137-87FD-4eff-9863-6CBCBC52C756}.exe 1488 {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe 1696 {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe 1108 {4CB0329D-3D40-4285-A0FF-436B354464EA}.exe 1492 {5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}.exe 956 {80B16BAA-19AA-436e-B895-900CD5A486CD}.exe 952 {5B99BE7B-D61B-4150-8CCE-5C9E7B74C0C5}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{5B99BE7B-D61B-4150-8CCE-5C9E7B74C0C5}.exe {80B16BAA-19AA-436e-B895-900CD5A486CD}.exe File created C:\Windows\{E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe File created C:\Windows\{81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe File created C:\Windows\{11776137-87FD-4eff-9863-6CBCBC52C756}.exe {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe File created C:\Windows\{69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe {11776137-87FD-4eff-9863-6CBCBC52C756}.exe File created C:\Windows\{4CB0329D-3D40-4285-A0FF-436B354464EA}.exe {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe File created C:\Windows\{896B9E58-B88B-460a-B95E-B6BF48F38129}.exe 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe File created C:\Windows\{0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe File created C:\Windows\{D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe File created C:\Windows\{5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}.exe {4CB0329D-3D40-4285-A0FF-436B354464EA}.exe File created C:\Windows\{80B16BAA-19AA-436e-B895-900CD5A486CD}.exe {5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4CB0329D-3D40-4285-A0FF-436B354464EA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {11776137-87FD-4eff-9863-6CBCBC52C756}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {80B16BAA-19AA-436e-B895-900CD5A486CD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5B99BE7B-D61B-4150-8CCE-5C9E7B74C0C5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2388 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe Token: SeIncBasePriorityPrivilege 664 {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe Token: SeIncBasePriorityPrivilege 2860 {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe Token: SeIncBasePriorityPrivilege 2060 {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe Token: SeIncBasePriorityPrivilege 2804 {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe Token: SeIncBasePriorityPrivilege 3052 {11776137-87FD-4eff-9863-6CBCBC52C756}.exe Token: SeIncBasePriorityPrivilege 1488 {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe Token: SeIncBasePriorityPrivilege 1696 {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe Token: SeIncBasePriorityPrivilege 1108 {4CB0329D-3D40-4285-A0FF-436B354464EA}.exe Token: SeIncBasePriorityPrivilege 1492 {5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}.exe Token: SeIncBasePriorityPrivilege 956 {80B16BAA-19AA-436e-B895-900CD5A486CD}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 664 2388 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe 29 PID 2388 wrote to memory of 664 2388 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe 29 PID 2388 wrote to memory of 664 2388 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe 29 PID 2388 wrote to memory of 664 2388 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe 29 PID 2388 wrote to memory of 2564 2388 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe 30 PID 2388 wrote to memory of 2564 2388 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe 30 PID 2388 wrote to memory of 2564 2388 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe 30 PID 2388 wrote to memory of 2564 2388 2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe 30 PID 664 wrote to memory of 2860 664 {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe 31 PID 664 wrote to memory of 2860 664 {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe 31 PID 664 wrote to memory of 2860 664 {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe 31 PID 664 wrote to memory of 2860 664 {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe 31 PID 664 wrote to memory of 2896 664 {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe 32 PID 664 wrote to memory of 2896 664 {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe 32 PID 664 wrote to memory of 2896 664 {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe 32 PID 664 wrote to memory of 2896 664 {896B9E58-B88B-460a-B95E-B6BF48F38129}.exe 32 PID 2860 wrote to memory of 2060 2860 {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe 33 PID 2860 wrote to memory of 2060 2860 {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe 33 PID 2860 wrote to memory of 2060 2860 {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe 33 PID 2860 wrote to memory of 2060 2860 {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe 33 PID 2860 wrote to memory of 2900 2860 {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe 34 PID 2860 wrote to memory of 2900 2860 {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe 34 PID 2860 wrote to memory of 2900 2860 {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe 34 PID 2860 wrote to memory of 2900 2860 {E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe 34 PID 2060 wrote to memory of 2804 2060 {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe 35 PID 2060 wrote to memory of 2804 2060 {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe 35 PID 2060 wrote to memory of 2804 2060 {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe 35 PID 2060 wrote to memory of 2804 2060 {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe 35 PID 2060 wrote to memory of 2744 2060 {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe 36 PID 2060 wrote to memory of 2744 2060 {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe 36 PID 2060 wrote to memory of 2744 2060 {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe 36 PID 2060 wrote to memory of 2744 2060 {81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe 36 PID 2804 wrote to memory of 3052 2804 {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe 37 PID 2804 wrote to memory of 3052 2804 {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe 37 PID 2804 wrote to memory of 3052 2804 {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe 37 PID 2804 wrote to memory of 3052 2804 {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe 37 PID 2804 wrote to memory of 2264 2804 {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe 38 PID 2804 wrote to memory of 2264 2804 {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe 38 PID 2804 wrote to memory of 2264 2804 {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe 38 PID 2804 wrote to memory of 2264 2804 {0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe 38 PID 3052 wrote to memory of 1488 3052 {11776137-87FD-4eff-9863-6CBCBC52C756}.exe 39 PID 3052 wrote to memory of 1488 3052 {11776137-87FD-4eff-9863-6CBCBC52C756}.exe 39 PID 3052 wrote to memory of 1488 3052 {11776137-87FD-4eff-9863-6CBCBC52C756}.exe 39 PID 3052 wrote to memory of 1488 3052 {11776137-87FD-4eff-9863-6CBCBC52C756}.exe 39 PID 3052 wrote to memory of 2340 3052 {11776137-87FD-4eff-9863-6CBCBC52C756}.exe 40 PID 3052 wrote to memory of 2340 3052 {11776137-87FD-4eff-9863-6CBCBC52C756}.exe 40 PID 3052 wrote to memory of 2340 3052 {11776137-87FD-4eff-9863-6CBCBC52C756}.exe 40 PID 3052 wrote to memory of 2340 3052 {11776137-87FD-4eff-9863-6CBCBC52C756}.exe 40 PID 1488 wrote to memory of 1696 1488 {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe 41 PID 1488 wrote to memory of 1696 1488 {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe 41 PID 1488 wrote to memory of 1696 1488 {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe 41 PID 1488 wrote to memory of 1696 1488 {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe 41 PID 1488 wrote to memory of 1964 1488 {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe 42 PID 1488 wrote to memory of 1964 1488 {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe 42 PID 1488 wrote to memory of 1964 1488 {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe 42 PID 1488 wrote to memory of 1964 1488 {69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe 42 PID 1696 wrote to memory of 1108 1696 {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe 43 PID 1696 wrote to memory of 1108 1696 {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe 43 PID 1696 wrote to memory of 1108 1696 {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe 43 PID 1696 wrote to memory of 1108 1696 {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe 43 PID 1696 wrote to memory of 2812 1696 {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe 44 PID 1696 wrote to memory of 2812 1696 {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe 44 PID 1696 wrote to memory of 2812 1696 {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe 44 PID 1696 wrote to memory of 2812 1696 {D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-10_5b19f1c6288b3d62aed7a826abab0d6e_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\{896B9E58-B88B-460a-B95E-B6BF48F38129}.exeC:\Windows\{896B9E58-B88B-460a-B95E-B6BF48F38129}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\{E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exeC:\Windows\{E1C60CC2-3EAF-4d0c-9C96-511DE6B2C0E6}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\{81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exeC:\Windows\{81A6BEC7-F47A-4d65-95D9-2D5AC1B7F21C}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\{0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exeC:\Windows\{0F5EB84F-E22A-40a2-BABB-95CC1A4E18B9}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\{11776137-87FD-4eff-9863-6CBCBC52C756}.exeC:\Windows\{11776137-87FD-4eff-9863-6CBCBC52C756}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\{69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exeC:\Windows\{69E3F4DF-0AA4-4304-817E-C0A3BA9B03AF}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\{D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exeC:\Windows\{D2693A3A-11FE-40df-BBAB-1AF4972A3ACD}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\{4CB0329D-3D40-4285-A0FF-436B354464EA}.exeC:\Windows\{4CB0329D-3D40-4285-A0FF-436B354464EA}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1108 -
C:\Windows\{5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}.exeC:\Windows\{5DF4E9C7-AE0E-4798-869D-C5DA18F5699B}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\{80B16BAA-19AA-436e-B895-900CD5A486CD}.exeC:\Windows\{80B16BAA-19AA-436e-B895-900CD5A486CD}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:956 -
C:\Windows\{5B99BE7B-D61B-4150-8CCE-5C9E7B74C0C5}.exeC:\Windows\{5B99BE7B-D61B-4150-8CCE-5C9E7B74C0C5}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80B16~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5DF4E~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4CB03~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2693~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69E3F~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11776~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0F5EB~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81A6B~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1C60~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{896B9~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5716edd2c2024291525d39cd2b0345ede
SHA17b444ac9808e0e84aca265dab888f69d6a749640
SHA2567fb7e2420207221e83b3467958ab7e63df6b5b15dca23d919dbe8e63d4994eec
SHA512adfa548858208f7c81092c00a1c86db5afdedcc71b30539f3b6d0d73daa8bb6e8b264c2b60dd535366dd362f184bbe0d21b1f802242ebc7223c43525f52cfe0c
-
Filesize
204KB
MD5f97432192160d70478a8f4a90d05dd81
SHA1d5996cf38f393ea548a7c3707933fd7d1b65cbcf
SHA2563841d2d26a6c9b74b360fc9f6e3cd36087153f32b9f35ccd4f60786a58fbcc6d
SHA51222bab044586f72a70c49f4eb6576bcca1c3f52453f91618b0677f3d69bccb66d10c4f1e5a9452523485b56ef11916997e3373d96e636ba975419b23755fe1633
-
Filesize
204KB
MD5e3602f25c4bacdc027fb2375b19dbafc
SHA19bb8d37bacd0430aa69a5b394312099207dc5461
SHA25691000b9d42c233ea8a1f3d69dd69934eac9c81d3a9bfe27d682526721b01a86b
SHA512d989480dffcbfbabc69b0a67dcb7ad762124dd7afeeaa01b10f170ab2296f4846277ec1cf01e8b2ccc69f9baba8c0d23df722a0c21d5197a91e993402163286d
-
Filesize
204KB
MD5cdd91c3eae347794b7db1c66133547bc
SHA13407cf5c8d72fc5214ab24d6d50d6dcff313a045
SHA256a4d3e833f80856c4a94ead5345a82ac6835ba0c71c86638ddb9701752b9cabbf
SHA512d8057d6a020761771fe07272ee6a5d72a62c88c6bed7068d4ac8c33d33716befe423baf8350f416137ed4a6aa1bc32258ee87b33b52cf6a24b5e2e1984057b07
-
Filesize
204KB
MD503a5e8b901f626a0f0ae08fc2650272d
SHA1ec586487956c11231a169c64fa9b268a5852ba59
SHA2561c590cabe51de4f16803f51c37421f956875792c306c40c70f7e520ed56c9a8e
SHA51264c57c1b71c0b0d4f6a22f5faeb8d932b4deb4e55e434e01c8c116d6a0a52ca18089c348724f77fd01699f5f4419e02df682a33d0913c3dd926ba96e31659741
-
Filesize
204KB
MD5a4e31492b48aea28ada0544cc0b88308
SHA1b972356e86d8e1ddea1817cc758da78bec4a4cae
SHA256295b9d69e930d8d7b21a86719ea069be6e8c429d27c04a30ae7f592cdfb897d1
SHA5123473a2884b1e119520bda2a0f9d07d23c3d654ce268bb632700816bc02854d0b0414fbcb06aaa6532e76fdfd46b6961f4f6f0881e8b6d9dda25796e090f49e16
-
Filesize
204KB
MD5f1eb5247d9d2890edd8517bd4e0607c1
SHA15e3006885a28e2e618c0dfb2d4ef6d845111e4fb
SHA256be5137d18171bfdae657af59b06b72aeb30ee87b60471d4b6b3961a553252edb
SHA512a67419264902fc2d430c20b5151ce391411840acf2d231f60147d0ef01f28158347140e27b057b0a3214ee667d208c6a1cd264a28b8faeb7986f2cd8a71e793f
-
Filesize
204KB
MD5587e29970dcf8b3f135b423a601a7249
SHA14f50dec948dc201f0b7d03b114729e759c39d193
SHA2561e8ed1a78144dbf8ec00f20f93e6086ae5cd8d2d1320d0b71af4d4fb16650b82
SHA512da479c7bafaa5064c2969f1c494738993ce6bacd138a9e7aaf1acaaf68b2e32eba4d3c7404bfac8f10cfdec0c759ef81521a7eec0e4618dc971c8aa0851b62f5
-
Filesize
204KB
MD5496840e3faa3dcefed155e6b2084fe95
SHA1559fb308846c88ed6b063715f61d69483657fe2e
SHA256c18c0b9aebd56c19bb41dc259947c7c7c1c79dfae2538e3af41769eefb727d55
SHA512c3031eaa4ad8aafddee85acc2934d3425dd3d883e85b09e150b41999d363b5bf06d374e66d41543a5872ba30d2aed104f2d2ac5e29a4851341c5f23eff9e2f62
-
Filesize
204KB
MD512dc4314b43933a69e65249c1b736411
SHA1874705971466922e216d41de1c5ec6d00509bc72
SHA256618911efe151c4f9d6e2a8a87f77607bcf489478802069ceb4cbb91e9716fe16
SHA512165222ea95a6d3b389af8fcf018df8b43335519b0ff6be72cab69db58ecb09609d8bd47a7cbd4553663a8dd3fd279030cf82b2dd30365d29702fbceff3c4abd2
-
Filesize
204KB
MD538ce8e25e8341be9628cead8e062a677
SHA149d6e7a73024605696fdc0b24c83d6d8653d3847
SHA256314d0ad0d6fe0b41a00dc1803373adb3794b782c2943046aa06d853d3d086666
SHA5126a727c44e113acc8929c3b628583425c29249d7c1530923e483dd8c741e401db3b2139465132c2e54fc45037aa8880ddd35bbf9b3119fa3ce49115ee2ac8220a