Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe
-
Size
180KB
-
MD5
e491e358cec74146761ac15eeb1de6c9
-
SHA1
8d113a66ddf100d539fa96996597f9f2a31a7cc7
-
SHA256
257246db32037b3139a984f55ddbd43b8fe8aaea461eea77a892e9f6abf8cfee
-
SHA512
62b322c6c25174e22ad21acf00e6ecbd6b64069bdea0a0b6674fce3b45d84c5854f4b85e8125080b8e7da13bbc1ed2512c16dd3226c61180a4e5ec354d378cec
-
SSDEEP
3072:jEGh0o9lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGHl5eKcAEc
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12DA0512-F276-4b5f-8A62-4F6F708727C4} {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12DA0512-F276-4b5f-8A62-4F6F708727C4}\stubpath = "C:\\Windows\\{12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe" {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B51F1E9D-D545-47f5-A432-1E55A2CCFB84} {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3907052E-F916-4398-9C4D-AA20AF4AD264} {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{94DDE6C4-BDEB-4d88-A694-F107FEF41148}\stubpath = "C:\\Windows\\{94DDE6C4-BDEB-4d88-A694-F107FEF41148}.exe" {7DB960E1-8E17-4f34-9290-798ECFB03D9A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B} {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}\stubpath = "C:\\Windows\\{DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe" {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B0367AC1-6281-4190-827E-2C5A29E5838A} {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B0367AC1-6281-4190-827E-2C5A29E5838A}\stubpath = "C:\\Windows\\{B0367AC1-6281-4190-827E-2C5A29E5838A}.exe" {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3907052E-F916-4398-9C4D-AA20AF4AD264}\stubpath = "C:\\Windows\\{3907052E-F916-4398-9C4D-AA20AF4AD264}.exe" {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{61C916AE-2BDA-4140-8627-5FC3376A2C83} {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{94DDE6C4-BDEB-4d88-A694-F107FEF41148} {7DB960E1-8E17-4f34-9290-798ECFB03D9A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F22E4C92-BED2-4fb5-B1E1-431529B78F8E} 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{33ABF17A-621D-4e95-BC72-ED18073822BA}\stubpath = "C:\\Windows\\{33ABF17A-621D-4e95-BC72-ED18073822BA}.exe" {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B} {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}\stubpath = "C:\\Windows\\{06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe" {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{61C916AE-2BDA-4140-8627-5FC3376A2C83}\stubpath = "C:\\Windows\\{61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe" {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{412E7C77-FA0E-4485-A224-FF19010139D1} {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F22E4C92-BED2-4fb5-B1E1-431529B78F8E}\stubpath = "C:\\Windows\\{F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe" 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B51F1E9D-D545-47f5-A432-1E55A2CCFB84}\stubpath = "C:\\Windows\\{B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe" {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{412E7C77-FA0E-4485-A224-FF19010139D1}\stubpath = "C:\\Windows\\{412E7C77-FA0E-4485-A224-FF19010139D1}.exe" {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7DB960E1-8E17-4f34-9290-798ECFB03D9A} {412E7C77-FA0E-4485-A224-FF19010139D1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7DB960E1-8E17-4f34-9290-798ECFB03D9A}\stubpath = "C:\\Windows\\{7DB960E1-8E17-4f34-9290-798ECFB03D9A}.exe" {412E7C77-FA0E-4485-A224-FF19010139D1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{33ABF17A-621D-4e95-BC72-ED18073822BA} {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe -
Executes dropped EXE 12 IoCs
pid Process 4524 {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe 4976 {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe 1052 {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe 2236 {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe 3436 {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe 1624 {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe 220 {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe 4104 {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe 4392 {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe 2236 {412E7C77-FA0E-4485-A224-FF19010139D1}.exe 3184 {7DB960E1-8E17-4f34-9290-798ECFB03D9A}.exe 1624 {94DDE6C4-BDEB-4d88-A694-F107FEF41148}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{3907052E-F916-4398-9C4D-AA20AF4AD264}.exe {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe File created C:\Windows\{61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe File created C:\Windows\{412E7C77-FA0E-4485-A224-FF19010139D1}.exe {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe File created C:\Windows\{94DDE6C4-BDEB-4d88-A694-F107FEF41148}.exe {7DB960E1-8E17-4f34-9290-798ECFB03D9A}.exe File created C:\Windows\{F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe File created C:\Windows\{06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe File created C:\Windows\{12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe File created C:\Windows\{B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe File created C:\Windows\{B0367AC1-6281-4190-827E-2C5A29E5838A}.exe {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe File created C:\Windows\{7DB960E1-8E17-4f34-9290-798ECFB03D9A}.exe {412E7C77-FA0E-4485-A224-FF19010139D1}.exe File created C:\Windows\{33ABF17A-621D-4e95-BC72-ED18073822BA}.exe {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe File created C:\Windows\{DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {94DDE6C4-BDEB-4d88-A694-F107FEF41148}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {412E7C77-FA0E-4485-A224-FF19010139D1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7DB960E1-8E17-4f34-9290-798ECFB03D9A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1488 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe Token: SeIncBasePriorityPrivilege 4524 {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe Token: SeIncBasePriorityPrivilege 4976 {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe Token: SeIncBasePriorityPrivilege 1052 {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe Token: SeIncBasePriorityPrivilege 2236 {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe Token: SeIncBasePriorityPrivilege 3436 {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe Token: SeIncBasePriorityPrivilege 1624 {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe Token: SeIncBasePriorityPrivilege 220 {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe Token: SeIncBasePriorityPrivilege 4104 {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe Token: SeIncBasePriorityPrivilege 4392 {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe Token: SeIncBasePriorityPrivilege 2236 {412E7C77-FA0E-4485-A224-FF19010139D1}.exe Token: SeIncBasePriorityPrivilege 3184 {7DB960E1-8E17-4f34-9290-798ECFB03D9A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 4524 1488 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe 94 PID 1488 wrote to memory of 4524 1488 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe 94 PID 1488 wrote to memory of 4524 1488 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe 94 PID 1488 wrote to memory of 1276 1488 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe 95 PID 1488 wrote to memory of 1276 1488 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe 95 PID 1488 wrote to memory of 1276 1488 2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe 95 PID 4524 wrote to memory of 4976 4524 {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe 96 PID 4524 wrote to memory of 4976 4524 {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe 96 PID 4524 wrote to memory of 4976 4524 {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe 96 PID 4524 wrote to memory of 2560 4524 {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe 97 PID 4524 wrote to memory of 2560 4524 {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe 97 PID 4524 wrote to memory of 2560 4524 {F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe 97 PID 4976 wrote to memory of 1052 4976 {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe 101 PID 4976 wrote to memory of 1052 4976 {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe 101 PID 4976 wrote to memory of 1052 4976 {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe 101 PID 4976 wrote to memory of 3380 4976 {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe 102 PID 4976 wrote to memory of 3380 4976 {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe 102 PID 4976 wrote to memory of 3380 4976 {33ABF17A-621D-4e95-BC72-ED18073822BA}.exe 102 PID 1052 wrote to memory of 2236 1052 {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe 103 PID 1052 wrote to memory of 2236 1052 {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe 103 PID 1052 wrote to memory of 2236 1052 {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe 103 PID 1052 wrote to memory of 4072 1052 {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe 104 PID 1052 wrote to memory of 4072 1052 {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe 104 PID 1052 wrote to memory of 4072 1052 {DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe 104 PID 2236 wrote to memory of 3436 2236 {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe 105 PID 2236 wrote to memory of 3436 2236 {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe 105 PID 2236 wrote to memory of 3436 2236 {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe 105 PID 2236 wrote to memory of 2544 2236 {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe 106 PID 2236 wrote to memory of 2544 2236 {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe 106 PID 2236 wrote to memory of 2544 2236 {12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe 106 PID 3436 wrote to memory of 1624 3436 {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe 108 PID 3436 wrote to memory of 1624 3436 {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe 108 PID 3436 wrote to memory of 1624 3436 {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe 108 PID 3436 wrote to memory of 3624 3436 {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe 109 PID 3436 wrote to memory of 3624 3436 {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe 109 PID 3436 wrote to memory of 3624 3436 {B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe 109 PID 1624 wrote to memory of 220 1624 {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe 110 PID 1624 wrote to memory of 220 1624 {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe 110 PID 1624 wrote to memory of 220 1624 {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe 110 PID 1624 wrote to memory of 1076 1624 {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe 111 PID 1624 wrote to memory of 1076 1624 {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe 111 PID 1624 wrote to memory of 1076 1624 {06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe 111 PID 220 wrote to memory of 4104 220 {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe 116 PID 220 wrote to memory of 4104 220 {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe 116 PID 220 wrote to memory of 4104 220 {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe 116 PID 220 wrote to memory of 3492 220 {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe 117 PID 220 wrote to memory of 3492 220 {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe 117 PID 220 wrote to memory of 3492 220 {B0367AC1-6281-4190-827E-2C5A29E5838A}.exe 117 PID 4104 wrote to memory of 4392 4104 {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe 122 PID 4104 wrote to memory of 4392 4104 {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe 122 PID 4104 wrote to memory of 4392 4104 {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe 122 PID 4104 wrote to memory of 2020 4104 {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe 123 PID 4104 wrote to memory of 2020 4104 {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe 123 PID 4104 wrote to memory of 2020 4104 {3907052E-F916-4398-9C4D-AA20AF4AD264}.exe 123 PID 4392 wrote to memory of 2236 4392 {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe 124 PID 4392 wrote to memory of 2236 4392 {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe 124 PID 4392 wrote to memory of 2236 4392 {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe 124 PID 4392 wrote to memory of 2344 4392 {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe 125 PID 4392 wrote to memory of 2344 4392 {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe 125 PID 4392 wrote to memory of 2344 4392 {61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe 125 PID 2236 wrote to memory of 3184 2236 {412E7C77-FA0E-4485-A224-FF19010139D1}.exe 126 PID 2236 wrote to memory of 3184 2236 {412E7C77-FA0E-4485-A224-FF19010139D1}.exe 126 PID 2236 wrote to memory of 3184 2236 {412E7C77-FA0E-4485-A224-FF19010139D1}.exe 126 PID 2236 wrote to memory of 4136 2236 {412E7C77-FA0E-4485-A224-FF19010139D1}.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-12_e491e358cec74146761ac15eeb1de6c9_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\{F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exeC:\Windows\{F22E4C92-BED2-4fb5-B1E1-431529B78F8E}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\{33ABF17A-621D-4e95-BC72-ED18073822BA}.exeC:\Windows\{33ABF17A-621D-4e95-BC72-ED18073822BA}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\{DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exeC:\Windows\{DBF3ACCD-C7D4-4ab4-9DC1-175ADDE30C0B}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\{12DA0512-F276-4b5f-8A62-4F6F708727C4}.exeC:\Windows\{12DA0512-F276-4b5f-8A62-4F6F708727C4}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\{B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exeC:\Windows\{B51F1E9D-D545-47f5-A432-1E55A2CCFB84}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\{06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exeC:\Windows\{06AF1EB4-0C3E-42b0-B5FB-F3AD8729F54B}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\{B0367AC1-6281-4190-827E-2C5A29E5838A}.exeC:\Windows\{B0367AC1-6281-4190-827E-2C5A29E5838A}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\{3907052E-F916-4398-9C4D-AA20AF4AD264}.exeC:\Windows\{3907052E-F916-4398-9C4D-AA20AF4AD264}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\{61C916AE-2BDA-4140-8627-5FC3376A2C83}.exeC:\Windows\{61C916AE-2BDA-4140-8627-5FC3376A2C83}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\{412E7C77-FA0E-4485-A224-FF19010139D1}.exeC:\Windows\{412E7C77-FA0E-4485-A224-FF19010139D1}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\{7DB960E1-8E17-4f34-9290-798ECFB03D9A}.exeC:\Windows\{7DB960E1-8E17-4f34-9290-798ECFB03D9A}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3184 -
C:\Windows\{94DDE6C4-BDEB-4d88-A694-F107FEF41148}.exeC:\Windows\{94DDE6C4-BDEB-4d88-A694-F107FEF41148}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7DB96~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{412E7~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{61C91~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39070~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B0367~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06AF1~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B51F1~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:3624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{12DA0~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DBF3A~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{33ABF~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F22E4~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5594fbe242256a34ad1c94b8b59580d4f
SHA13dcd5f0ea8bcb73f6d5409867d8b2ede51d50a07
SHA256478e252f7e010b2bdf794731baf436aec22fdd9747005aa6fcaf1bdf5a87749f
SHA512e21430492c695a6c367b34b4085ced9d002e075592816c3ab812fe2e55e246c995770d6ec662e1b70afd5537948301c072ee4d04a0892951d90efc43584d8327
-
Filesize
180KB
MD562d70fa03ca48f82991f36e628376569
SHA1e938897ac4512dd73886ca6a979794e09e2c7649
SHA256a3ab0f6bb878d73f16e77c1f75af8d4ce3b2f0ec123c2259f92ecb27b5abcbe1
SHA5120f9c997232bf2eef0513cc8b97b688a2dc7625e47d00b59b0d69d37b7b1ddfa1c89bde9ea7c1fdf4b56bfbe82f92a40cda601a82b397db701ba9068adc4cb7ba
-
Filesize
180KB
MD518f7cf495083d04766575e99b62a303f
SHA195ce397a64c2f70312ba97021929cc7d12333e8b
SHA256aeabfd70c06217f903ed14e733a7c226a7b2fe156c6eded5ab6cabd723c09cb0
SHA51228481f4e81b1523bbeca3ab32b3accc5ceac1c389fb89aa127889165f18201ef298a8be10d2db34a2ea0aea01ca7849ef6598b0fbec2ee9c5404e4fa0c993f51
-
Filesize
180KB
MD597bbc3189674db3843925bc67073f44e
SHA1521cd2350f1c5d801c6b0c37fc4b0c48b3a98498
SHA256d373f7d629c4ddc836ed96a3e554acdc72a1fd0fd1c6bba91df11eec353d0601
SHA512c4eaea84285e48c861112198d375aa5b157a80abaa236731b818b8adae325996f1b80c4cc0237dbedbbb67d6cf02560471d58dc94db1f72587a8043cdef6f732
-
Filesize
180KB
MD5b40fb9bb2386b6038132a489c2669c72
SHA110f0eef2c511f44bf7ac16a6751ab2f5995b52fd
SHA2567e7f24a007fc7343208801555e0995a2141d3aa6e256c5440e3e55427d35868a
SHA5123ae3f4d8432de4cd6bd1ea27f4d030a8f8442d5063fc1486d0d189490a7f217437f105b4c87e97530d25e3679ab5a82090302017501b56dd77f8b7407864259b
-
Filesize
180KB
MD5d1fda0fe95083b078ffb3eef01bc916a
SHA1b3782608cfbe88a382ae394a1c5b4d5b52da49c9
SHA256b03f84663cfb529c28f80e356dab354f9c256dbb5608c294ad1c1d34c70a1514
SHA5123c5d3362ae3c70498b32f768b7adb4e46e339f82c24c3e47bc46c64f34eadfd04a6a7a1f67bfd60fd0cf95deb7c87373e94fb1a0da6ade74d18a75a3b09e6872
-
Filesize
180KB
MD5eb95b30dbd14264b9fe7f5ea508db56b
SHA1040db167b9f4b16b57085b3cd8ea1e4e90d759b6
SHA2563ac236b4fbf467d789c89952684b18f04a5fdf0fb36a6597e9bce5a65d44f36f
SHA512d6888f5c9aef441aaa3493b01e5d2edc9e3cd0cd6d947f4084763c435ea42d08a289a4043bfde40d8885f88cef5ca795264d33a605ecf08c3cc531e2a10b11bd
-
Filesize
180KB
MD53b78f30bc2789a41381612f26ad675bc
SHA1bfb1c4e3140d053033bc74514263c79f91d8826d
SHA25690fcf15ca233a4f59808f4bca4654daff74cca2d220d238aed5820a9cb222fb3
SHA51261f7ea3b1c79dbade70ee3d53e11ef76faa94fddc73aed46981b85e0e5380924086261374a1732b839bcfef11bfd04c02e484ed079143500134d7ae6021783f7
-
Filesize
180KB
MD55d7cc16c67611562fb0639eb701a21b7
SHA1df904590cedad2cf10ddc468d76e2a6c4be74be5
SHA256163aea1f4c89b3ab58b44fc9b6ac027fc98971641b07f530e47301acd1ef2f67
SHA512cd03435e078a53059130f971f756ed7d56d83f36aeb422a95ecaf50d037a11aad5ab7e12f8de0c5ecdd69854f4393bd03d8ab83eb8831bdf8b6c51300a43317f
-
Filesize
180KB
MD574c905b9389db410c0fe52f60b4080f8
SHA1855469d51e79646cd8815efbc9e65700176cb05b
SHA256c517554bf2723434da0bedc0c595479e0bb9a6c32a6752b8238609d727aef147
SHA5128a9e6f0ecb6002a128ae8056c25d58ca879ce1bf1ba28bc276cb29c40bfe332bede38be0983daa47a94fd7fc6663f486b208d407a4cd44568af1b21097f226c4
-
Filesize
180KB
MD5f95a52684511ae7d560c5273003333aa
SHA1eeaada4b4d45dcf4859d4565c4161f0d74b712ae
SHA2561f2c1c3c6fb03f83b74720a214e0adf359512f78171185444f4399843e6e11f4
SHA512f5f43966c6693b4fed8b647f2c9f571d5e52de20d9df8eb6b9356c42597e635abddf820fb84897fffadc9433ff460377ab540c4609cbd66df00f1f507ff4bca4
-
Filesize
180KB
MD598d409d604ffd41667b0ae41635f0f7a
SHA17f9e6fefcbb69cac8280086451adcd7d338a82a5
SHA256a4bc0c9f96fa3d77c249f9be9a24bfb7c92a6f62dfb80b41bab9ba8fa58fddcf
SHA51244f9621e372ae164da8b5c0e4614c4634bba741013fae913378663a3dc679077c2787545418918fb6aa046b7da11d2a20879b647c4b69b09c64eafc4cfaee2b0