Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe
-
Size
408KB
-
MD5
de850b0903e46951faf5cf7a9af27a5d
-
SHA1
fe58275c65003fee158e0280ac9f30bac2c375c1
-
SHA256
2a5392ca69b1c533ca878d509c63ff9e8c5b55d918d5f3edbf792c04d860eacb
-
SHA512
f772de0897caeb7ee3f00d1e32af9218d5634f99ea82417245bf191f4aad2ccc33ad635ffaa566f97208bc3e4092f9d4d08b8a1e56baf39811a9ec5bb4271467
-
SSDEEP
3072:CEGh0oll3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGTldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56726CD0-4907-4c25-B5B8-5A757CA50796} 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B02AF11F-9978-4296-BCC6-111C542C395B} {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8} {B02AF11F-9978-4296-BCC6-111C542C395B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}\stubpath = "C:\\Windows\\{D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe" {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E34865BB-74F9-4b52-B6A4-ACC6414597EC}\stubpath = "C:\\Windows\\{E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe" {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}\stubpath = "C:\\Windows\\{23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}.exe" {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2ED702D3-3978-4e4c-B958-3EA86BEF3712} {195DF049-FF0A-43ee-876E-D33139CE355A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01338E4F-91B3-4376-AC47-4D0BD7F1AFF2} {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}\stubpath = "C:\\Windows\\{01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe" {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}\stubpath = "C:\\Windows\\{BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe" {B02AF11F-9978-4296-BCC6-111C542C395B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4596F25B-BE5A-48a4-BE74-9B07EC213E86}\stubpath = "C:\\Windows\\{4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe" {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E34865BB-74F9-4b52-B6A4-ACC6414597EC} {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD} {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2ED702D3-3978-4e4c-B958-3EA86BEF3712}\stubpath = "C:\\Windows\\{2ED702D3-3978-4e4c-B958-3EA86BEF3712}.exe" {195DF049-FF0A-43ee-876E-D33139CE355A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56726CD0-4907-4c25-B5B8-5A757CA50796}\stubpath = "C:\\Windows\\{56726CD0-4907-4c25-B5B8-5A757CA50796}.exe" 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{195DF049-FF0A-43ee-876E-D33139CE355A} {23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B02AF11F-9978-4296-BCC6-111C542C395B}\stubpath = "C:\\Windows\\{B02AF11F-9978-4296-BCC6-111C542C395B}.exe" {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D43B3D9C-4A3B-4a7c-937E-24D7DA51C701} {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4596F25B-BE5A-48a4-BE74-9B07EC213E86} {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{195DF049-FF0A-43ee-876E-D33139CE355A}\stubpath = "C:\\Windows\\{195DF049-FF0A-43ee-876E-D33139CE355A}.exe" {23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C3C1731-73A1-42a5-8604-B6DF8892265F} {2ED702D3-3978-4e4c-B958-3EA86BEF3712}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C3C1731-73A1-42a5-8604-B6DF8892265F}\stubpath = "C:\\Windows\\{3C3C1731-73A1-42a5-8604-B6DF8892265F}.exe" {2ED702D3-3978-4e4c-B958-3EA86BEF3712}.exe -
Deletes itself 1 IoCs
pid Process 2672 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2780 {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe 2312 {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe 2552 {B02AF11F-9978-4296-BCC6-111C542C395B}.exe 1080 {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe 2344 {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe 1944 {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe 2724 {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe 1576 {23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}.exe 1056 {195DF049-FF0A-43ee-876E-D33139CE355A}.exe 2004 {2ED702D3-3978-4e4c-B958-3EA86BEF3712}.exe 2340 {3C3C1731-73A1-42a5-8604-B6DF8892265F}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe File created C:\Windows\{23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}.exe {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe File created C:\Windows\{195DF049-FF0A-43ee-876E-D33139CE355A}.exe {23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}.exe File created C:\Windows\{2ED702D3-3978-4e4c-B958-3EA86BEF3712}.exe {195DF049-FF0A-43ee-876E-D33139CE355A}.exe File created C:\Windows\{3C3C1731-73A1-42a5-8604-B6DF8892265F}.exe {2ED702D3-3978-4e4c-B958-3EA86BEF3712}.exe File created C:\Windows\{B02AF11F-9978-4296-BCC6-111C542C395B}.exe {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe File created C:\Windows\{BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe {B02AF11F-9978-4296-BCC6-111C542C395B}.exe File created C:\Windows\{D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe File created C:\Windows\{4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe File created C:\Windows\{56726CD0-4907-4c25-B5B8-5A757CA50796}.exe 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe File created C:\Windows\{01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3C3C1731-73A1-42a5-8604-B6DF8892265F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B02AF11F-9978-4296-BCC6-111C542C395B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {195DF049-FF0A-43ee-876E-D33139CE355A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2ED702D3-3978-4e4c-B958-3EA86BEF3712}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2708 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe Token: SeIncBasePriorityPrivilege 2780 {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe Token: SeIncBasePriorityPrivilege 2312 {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe Token: SeIncBasePriorityPrivilege 2552 {B02AF11F-9978-4296-BCC6-111C542C395B}.exe Token: SeIncBasePriorityPrivilege 1080 {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe Token: SeIncBasePriorityPrivilege 2344 {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe Token: SeIncBasePriorityPrivilege 1944 {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe Token: SeIncBasePriorityPrivilege 2724 {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe Token: SeIncBasePriorityPrivilege 1576 {23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}.exe Token: SeIncBasePriorityPrivilege 1056 {195DF049-FF0A-43ee-876E-D33139CE355A}.exe Token: SeIncBasePriorityPrivilege 2004 {2ED702D3-3978-4e4c-B958-3EA86BEF3712}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2780 2708 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe 30 PID 2708 wrote to memory of 2780 2708 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe 30 PID 2708 wrote to memory of 2780 2708 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe 30 PID 2708 wrote to memory of 2780 2708 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe 30 PID 2708 wrote to memory of 2672 2708 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe 31 PID 2708 wrote to memory of 2672 2708 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe 31 PID 2708 wrote to memory of 2672 2708 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe 31 PID 2708 wrote to memory of 2672 2708 2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe 31 PID 2780 wrote to memory of 2312 2780 {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe 32 PID 2780 wrote to memory of 2312 2780 {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe 32 PID 2780 wrote to memory of 2312 2780 {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe 32 PID 2780 wrote to memory of 2312 2780 {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe 32 PID 2780 wrote to memory of 2548 2780 {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe 33 PID 2780 wrote to memory of 2548 2780 {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe 33 PID 2780 wrote to memory of 2548 2780 {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe 33 PID 2780 wrote to memory of 2548 2780 {56726CD0-4907-4c25-B5B8-5A757CA50796}.exe 33 PID 2312 wrote to memory of 2552 2312 {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe 34 PID 2312 wrote to memory of 2552 2312 {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe 34 PID 2312 wrote to memory of 2552 2312 {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe 34 PID 2312 wrote to memory of 2552 2312 {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe 34 PID 2312 wrote to memory of 2956 2312 {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe 35 PID 2312 wrote to memory of 2956 2312 {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe 35 PID 2312 wrote to memory of 2956 2312 {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe 35 PID 2312 wrote to memory of 2956 2312 {01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe 35 PID 2552 wrote to memory of 1080 2552 {B02AF11F-9978-4296-BCC6-111C542C395B}.exe 36 PID 2552 wrote to memory of 1080 2552 {B02AF11F-9978-4296-BCC6-111C542C395B}.exe 36 PID 2552 wrote to memory of 1080 2552 {B02AF11F-9978-4296-BCC6-111C542C395B}.exe 36 PID 2552 wrote to memory of 1080 2552 {B02AF11F-9978-4296-BCC6-111C542C395B}.exe 36 PID 2552 wrote to memory of 1208 2552 {B02AF11F-9978-4296-BCC6-111C542C395B}.exe 37 PID 2552 wrote to memory of 1208 2552 {B02AF11F-9978-4296-BCC6-111C542C395B}.exe 37 PID 2552 wrote to memory of 1208 2552 {B02AF11F-9978-4296-BCC6-111C542C395B}.exe 37 PID 2552 wrote to memory of 1208 2552 {B02AF11F-9978-4296-BCC6-111C542C395B}.exe 37 PID 1080 wrote to memory of 2344 1080 {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe 38 PID 1080 wrote to memory of 2344 1080 {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe 38 PID 1080 wrote to memory of 2344 1080 {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe 38 PID 1080 wrote to memory of 2344 1080 {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe 38 PID 1080 wrote to memory of 2376 1080 {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe 39 PID 1080 wrote to memory of 2376 1080 {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe 39 PID 1080 wrote to memory of 2376 1080 {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe 39 PID 1080 wrote to memory of 2376 1080 {BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe 39 PID 2344 wrote to memory of 1944 2344 {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe 40 PID 2344 wrote to memory of 1944 2344 {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe 40 PID 2344 wrote to memory of 1944 2344 {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe 40 PID 2344 wrote to memory of 1944 2344 {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe 40 PID 2344 wrote to memory of 2324 2344 {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe 41 PID 2344 wrote to memory of 2324 2344 {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe 41 PID 2344 wrote to memory of 2324 2344 {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe 41 PID 2344 wrote to memory of 2324 2344 {D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe 41 PID 1944 wrote to memory of 2724 1944 {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe 42 PID 1944 wrote to memory of 2724 1944 {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe 42 PID 1944 wrote to memory of 2724 1944 {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe 42 PID 1944 wrote to memory of 2724 1944 {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe 42 PID 1944 wrote to memory of 2352 1944 {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe 43 PID 1944 wrote to memory of 2352 1944 {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe 43 PID 1944 wrote to memory of 2352 1944 {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe 43 PID 1944 wrote to memory of 2352 1944 {4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe 43 PID 2724 wrote to memory of 1576 2724 {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe 44 PID 2724 wrote to memory of 1576 2724 {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe 44 PID 2724 wrote to memory of 1576 2724 {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe 44 PID 2724 wrote to memory of 1576 2724 {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe 44 PID 2724 wrote to memory of 2052 2724 {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe 45 PID 2724 wrote to memory of 2052 2724 {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe 45 PID 2724 wrote to memory of 2052 2724 {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe 45 PID 2724 wrote to memory of 2052 2724 {E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-11_de850b0903e46951faf5cf7a9af27a5d_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\{56726CD0-4907-4c25-B5B8-5A757CA50796}.exeC:\Windows\{56726CD0-4907-4c25-B5B8-5A757CA50796}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exeC:\Windows\{01338E4F-91B3-4376-AC47-4D0BD7F1AFF2}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\{B02AF11F-9978-4296-BCC6-111C542C395B}.exeC:\Windows\{B02AF11F-9978-4296-BCC6-111C542C395B}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\{BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exeC:\Windows\{BBB26DEA-08F3-42f0-9AC1-AFD920D27FB8}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\{D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exeC:\Windows\{D43B3D9C-4A3B-4a7c-937E-24D7DA51C701}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\{4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exeC:\Windows\{4596F25B-BE5A-48a4-BE74-9B07EC213E86}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\{E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exeC:\Windows\{E34865BB-74F9-4b52-B6A4-ACC6414597EC}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\{23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}.exeC:\Windows\{23C7B0A6-1ACA-4189-8317-B5FD0C7CBCBD}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\{195DF049-FF0A-43ee-876E-D33139CE355A}.exeC:\Windows\{195DF049-FF0A-43ee-876E-D33139CE355A}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\{2ED702D3-3978-4e4c-B958-3EA86BEF3712}.exeC:\Windows\{2ED702D3-3978-4e4c-B958-3EA86BEF3712}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\{3C3C1731-73A1-42a5-8604-B6DF8892265F}.exeC:\Windows\{3C3C1731-73A1-42a5-8604-B6DF8892265F}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2ED70~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{195DF~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{23C7B~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E3486~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4596F~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D43B3~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BBB26~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B02AF~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{01338~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56726~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5e52c5dc766f7d7bfd45e5d804720adea
SHA19af86578530800f7ba8d232ce42b904de1a953cb
SHA256ef2f0be99363434ce1fe25cfe0bba8737f178244f02db92f5264bf4a001e0139
SHA5127052caceba06e158ceb02369c047d1c911322f522b163b4bef0a255ddca1d6278eee461e3fb773909db20c488d85cfd96c431760afbc1ddd56589a5225f57fde
-
Filesize
408KB
MD5b63382ee3d6e1388dcf8ec8310ca8b41
SHA14d21faff291247f5180fa5117d3165d40e4bc825
SHA256fa9b1a88cde2db6244839eb14777f7bb0c0a9b398e9b83a40940699fae55c5a1
SHA512daeb371a0d2525e79eafbe8ea53bf58311fd9a12494c3e702550c5d90183ffd354b543c512b25ef5e54b61a354b94b03674681778b2e0d949da33d240491cad9
-
Filesize
408KB
MD59198b5cf9b07a345540361e283630cd0
SHA177d4f406afb677f1bc29a003422f5077c0609438
SHA256c7908aa808cfae64f312ed6e9427b934fa2d2cf9bbb1f402f6b813080ba925f4
SHA512cd2c86da2d49bc546b5947cb8053f42a1894eb3a7a8849155c8598646ca8bf44ab848fa43bf37d7d6193cc11c87c5bc43968dd410c2f85295721b5ebe32c5bc5
-
Filesize
408KB
MD546ca27538ed38b64f2be07d662c2a742
SHA1bb0c30480e32ef73f30fecd6400fd8efe0733607
SHA2560fff7839eb5d0aac1fbebf57c6d4b6e4a10637b6fd5e08450dff61a02be605c9
SHA5120b0621bdb79b0c69add5cd4418c53fc2b31f4b5c0df2f753d4c14a4d7b71aa9a29c956bcc857ecefce284a437161b4e1b7b72a7b65112dd62c703d03e57eef18
-
Filesize
408KB
MD56b5974754ffe02f95afa40dc41cce0e2
SHA113504ff0b0e7ab294d65e75924322e7dd07fdfee
SHA256abc93093d3204da69df3fe5bb2bfd067798f233b969f5cdf114ec8cfcbde9277
SHA5125b6f09d6b3fbb3ddedd63958df11db46db3d8e596e4dddfba3deb47fb65905dac64e26efba25c7dd036d0540534928113a51326c3aa366bf476f1ffc92ac94fe
-
Filesize
408KB
MD5a6982452bea6449a2ee8e5a0db739711
SHA1dca004aac13181ce69fbb2294310af1f058567d2
SHA25611173fa8589c44aa5ba9425395b496d141289ec8ee55d89f17c87349a1862f42
SHA512851483b6ddcad95f9dad171319b67a1643fb43cb4fdc3631185b0170a91b876a1bf392231ce91f8b57badd9734f5ce4b727342ee295ca8144bf79d679b86d87e
-
Filesize
408KB
MD5a866fe139aeca7243dc38f302f853995
SHA194b72a2b14b388e961f5f9ad4987aedee8fa6a9f
SHA256c295b1abf57e144464ad9415859cbc423a5f18fc75e7e4bb30d3fc71eac65842
SHA5120d1384c31ca653de1c0f7d843c5bd1de9bf60ce7f44830f977b62fbded719ce8b18f26b133dc2beff09c1bb70da3fd6f0c4482bfc32335380cdd9d9bf5917e60
-
Filesize
408KB
MD5e701c0993bb68a2edea46a6f7e04310e
SHA11e389168d600057d5d3199a43dbd134dd3461211
SHA256d72d5f9543cfb0aebb0b74b7358e917e1fc72aa0c54d6674683d803681489bd8
SHA512b4f6fa20ba15345945c0056c7b493925a6473aaff86586a36dc8ca13273c46b6345ec9ed0076c9bd3adc8459870db8cbef13ca24a45e5aadf8b3465246078d4f
-
Filesize
408KB
MD59460460e4d01ade2333636c84f0c2da7
SHA1be4d0b4f471ef014238bcd474a96b03c156c5874
SHA256ca9ecaddd13841212db95c73fc3be02d7a926b88a99eefd6d60e93ba617b5c1d
SHA5128ac0726564fb6be7bc3d3bb3c110c8c35330a1177ef8e4e044317c9c8f5eb6829ab355cad48d0e8cbdf0a3f7c69b3c5ab37af832ffd4bc8f64d2092aaa5eef4c
-
Filesize
408KB
MD5e2339c97cf4610d2fe0adb4ee8e44a25
SHA1e80c97525e8e19507d40a6a0d1a639d0ff944e9f
SHA2566ac06d31dfd02697458aeeb43daa1affcf1ff8aa81cfd4e1cc932751abdd8fef
SHA512105b6f896c978619b32b967d9a17a365d23f6b9cbea1e155f62066450ee353643f805a9bf91bb74809a8f5364e17d53a6e4327bbd338c513cf99f14947c7af0d
-
Filesize
408KB
MD55097a8fab910022d23814824364993e9
SHA18d1b2f4ceead2bea845b70fa4bd0e99418325760
SHA25691a51697efcc11f33c601eedb725f59e78e3f209e1f7a2a8bc27e2a601f96d46
SHA5127b5f8f2242d234f0279a0649fed2739802e1465bf5bfb6c75afeae1077c979051328f1237f1e3acea149eb52e051a5c84f7ffa59b932590f08ad5153c7b414f7