Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 07:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe
-
Size
216KB
-
MD5
3c93b97c5852127e8b42b547b359854e
-
SHA1
b18abe54984b6479963b38339ffce2620d2c775a
-
SHA256
6337ffad33b369c6be593ff5447a76c06cf381c1625da01ba7946e399b923303
-
SHA512
c8f732d45d65df424516b1b7a1136248eea7c37e9a85cdddc84426cc32dbf095f722dd5d757bd6deae4e2559114de9ff62bbb16298e098e03fed58fd95b745ff
-
SSDEEP
3072:jEGh0oSl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGklEeKcAEcGy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}\stubpath = "C:\\Windows\\{1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}.exe" {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B488A0DB-DC51-402f-8E4F-495DBB76769E}\stubpath = "C:\\Windows\\{B488A0DB-DC51-402f-8E4F-495DBB76769E}.exe" {1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A1462254-A3C1-4f90-BF5F-27025FFA295F} {B488A0DB-DC51-402f-8E4F-495DBB76769E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9739BCBB-CE8D-4c54-BD5E-777B194E7D57} {A1462254-A3C1-4f90-BF5F-27025FFA295F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C63DD08E-E88F-4ae5-9C31-901E67F3760A}\stubpath = "C:\\Windows\\{C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe" 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4FA55F8-25DA-42bd-9205-DF4C39FAAC13} {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{40FE115F-0079-4663-8E00-9E88AE6348F8} {15186D96-33E3-419e-B980-940AF8B5F09A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0AF48A78-AE3A-4872-B031-EEE7D58EB047} {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0AF48A78-AE3A-4872-B031-EEE7D58EB047}\stubpath = "C:\\Windows\\{0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe" {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B488A0DB-DC51-402f-8E4F-495DBB76769E} {1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15186D96-33E3-419e-B980-940AF8B5F09A}\stubpath = "C:\\Windows\\{15186D96-33E3-419e-B980-940AF8B5F09A}.exe" {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{40FE115F-0079-4663-8E00-9E88AE6348F8}\stubpath = "C:\\Windows\\{40FE115F-0079-4663-8E00-9E88AE6348F8}.exe" {15186D96-33E3-419e-B980-940AF8B5F09A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE} {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}\stubpath = "C:\\Windows\\{4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe" {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9B411337-A725-4e8d-9C69-FEBC1AF127C7}\stubpath = "C:\\Windows\\{9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe" {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A1462254-A3C1-4f90-BF5F-27025FFA295F}\stubpath = "C:\\Windows\\{A1462254-A3C1-4f90-BF5F-27025FFA295F}.exe" {B488A0DB-DC51-402f-8E4F-495DBB76769E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9739BCBB-CE8D-4c54-BD5E-777B194E7D57}\stubpath = "C:\\Windows\\{9739BCBB-CE8D-4c54-BD5E-777B194E7D57}.exe" {A1462254-A3C1-4f90-BF5F-27025FFA295F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C63DD08E-E88F-4ae5-9C31-901E67F3760A} 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}\stubpath = "C:\\Windows\\{C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe" {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15186D96-33E3-419e-B980-940AF8B5F09A} {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9B411337-A725-4e8d-9C69-FEBC1AF127C7} {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1F51AE3B-5B20-4689-B5AB-3FDC0BB05566} {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe -
Deletes itself 1 IoCs
pid Process 2788 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2796 {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe 2872 {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe 2572 {15186D96-33E3-419e-B980-940AF8B5F09A}.exe 1756 {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe 3008 {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe 1440 {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe 2528 {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe 1008 {1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}.exe 1472 {B488A0DB-DC51-402f-8E4F-495DBB76769E}.exe 2136 {A1462254-A3C1-4f90-BF5F-27025FFA295F}.exe 1988 {9739BCBB-CE8D-4c54-BD5E-777B194E7D57}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe File created C:\Windows\{C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe File created C:\Windows\{40FE115F-0079-4663-8E00-9E88AE6348F8}.exe {15186D96-33E3-419e-B980-940AF8B5F09A}.exe File created C:\Windows\{9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe File created C:\Windows\{A1462254-A3C1-4f90-BF5F-27025FFA295F}.exe {B488A0DB-DC51-402f-8E4F-495DBB76769E}.exe File created C:\Windows\{9739BCBB-CE8D-4c54-BD5E-777B194E7D57}.exe {A1462254-A3C1-4f90-BF5F-27025FFA295F}.exe File created C:\Windows\{15186D96-33E3-419e-B980-940AF8B5F09A}.exe {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe File created C:\Windows\{4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe File created C:\Windows\{0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe File created C:\Windows\{1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}.exe {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe File created C:\Windows\{B488A0DB-DC51-402f-8E4F-495DBB76769E}.exe {1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {15186D96-33E3-419e-B980-940AF8B5F09A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B488A0DB-DC51-402f-8E4F-495DBB76769E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A1462254-A3C1-4f90-BF5F-27025FFA295F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9739BCBB-CE8D-4c54-BD5E-777B194E7D57}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1904 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe Token: SeIncBasePriorityPrivilege 2796 {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe Token: SeIncBasePriorityPrivilege 2872 {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe Token: SeIncBasePriorityPrivilege 2572 {15186D96-33E3-419e-B980-940AF8B5F09A}.exe Token: SeIncBasePriorityPrivilege 1756 {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe Token: SeIncBasePriorityPrivilege 3008 {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe Token: SeIncBasePriorityPrivilege 1440 {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe Token: SeIncBasePriorityPrivilege 2528 {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe Token: SeIncBasePriorityPrivilege 1008 {1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}.exe Token: SeIncBasePriorityPrivilege 1472 {B488A0DB-DC51-402f-8E4F-495DBB76769E}.exe Token: SeIncBasePriorityPrivilege 2136 {A1462254-A3C1-4f90-BF5F-27025FFA295F}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2796 1904 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe 31 PID 1904 wrote to memory of 2796 1904 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe 31 PID 1904 wrote to memory of 2796 1904 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe 31 PID 1904 wrote to memory of 2796 1904 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe 31 PID 1904 wrote to memory of 2788 1904 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe 32 PID 1904 wrote to memory of 2788 1904 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe 32 PID 1904 wrote to memory of 2788 1904 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe 32 PID 1904 wrote to memory of 2788 1904 2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe 32 PID 2796 wrote to memory of 2872 2796 {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe 33 PID 2796 wrote to memory of 2872 2796 {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe 33 PID 2796 wrote to memory of 2872 2796 {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe 33 PID 2796 wrote to memory of 2872 2796 {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe 33 PID 2796 wrote to memory of 2748 2796 {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe 34 PID 2796 wrote to memory of 2748 2796 {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe 34 PID 2796 wrote to memory of 2748 2796 {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe 34 PID 2796 wrote to memory of 2748 2796 {C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe 34 PID 2872 wrote to memory of 2572 2872 {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe 35 PID 2872 wrote to memory of 2572 2872 {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe 35 PID 2872 wrote to memory of 2572 2872 {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe 35 PID 2872 wrote to memory of 2572 2872 {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe 35 PID 2872 wrote to memory of 2632 2872 {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe 36 PID 2872 wrote to memory of 2632 2872 {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe 36 PID 2872 wrote to memory of 2632 2872 {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe 36 PID 2872 wrote to memory of 2632 2872 {C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe 36 PID 2572 wrote to memory of 1756 2572 {15186D96-33E3-419e-B980-940AF8B5F09A}.exe 37 PID 2572 wrote to memory of 1756 2572 {15186D96-33E3-419e-B980-940AF8B5F09A}.exe 37 PID 2572 wrote to memory of 1756 2572 {15186D96-33E3-419e-B980-940AF8B5F09A}.exe 37 PID 2572 wrote to memory of 1756 2572 {15186D96-33E3-419e-B980-940AF8B5F09A}.exe 37 PID 2572 wrote to memory of 1760 2572 {15186D96-33E3-419e-B980-940AF8B5F09A}.exe 38 PID 2572 wrote to memory of 1760 2572 {15186D96-33E3-419e-B980-940AF8B5F09A}.exe 38 PID 2572 wrote to memory of 1760 2572 {15186D96-33E3-419e-B980-940AF8B5F09A}.exe 38 PID 2572 wrote to memory of 1760 2572 {15186D96-33E3-419e-B980-940AF8B5F09A}.exe 38 PID 1756 wrote to memory of 3008 1756 {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe 39 PID 1756 wrote to memory of 3008 1756 {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe 39 PID 1756 wrote to memory of 3008 1756 {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe 39 PID 1756 wrote to memory of 3008 1756 {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe 39 PID 1756 wrote to memory of 1276 1756 {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe 40 PID 1756 wrote to memory of 1276 1756 {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe 40 PID 1756 wrote to memory of 1276 1756 {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe 40 PID 1756 wrote to memory of 1276 1756 {40FE115F-0079-4663-8E00-9E88AE6348F8}.exe 40 PID 3008 wrote to memory of 1440 3008 {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe 41 PID 3008 wrote to memory of 1440 3008 {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe 41 PID 3008 wrote to memory of 1440 3008 {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe 41 PID 3008 wrote to memory of 1440 3008 {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe 41 PID 3008 wrote to memory of 1196 3008 {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe 42 PID 3008 wrote to memory of 1196 3008 {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe 42 PID 3008 wrote to memory of 1196 3008 {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe 42 PID 3008 wrote to memory of 1196 3008 {4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe 42 PID 1440 wrote to memory of 2528 1440 {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe 43 PID 1440 wrote to memory of 2528 1440 {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe 43 PID 1440 wrote to memory of 2528 1440 {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe 43 PID 1440 wrote to memory of 2528 1440 {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe 43 PID 1440 wrote to memory of 528 1440 {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe 44 PID 1440 wrote to memory of 528 1440 {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe 44 PID 1440 wrote to memory of 528 1440 {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe 44 PID 1440 wrote to memory of 528 1440 {0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe 44 PID 2528 wrote to memory of 1008 2528 {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe 45 PID 2528 wrote to memory of 1008 2528 {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe 45 PID 2528 wrote to memory of 1008 2528 {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe 45 PID 2528 wrote to memory of 1008 2528 {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe 45 PID 2528 wrote to memory of 772 2528 {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe 46 PID 2528 wrote to memory of 772 2528 {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe 46 PID 2528 wrote to memory of 772 2528 {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe 46 PID 2528 wrote to memory of 772 2528 {9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-17_3c93b97c5852127e8b42b547b359854e_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\{C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exeC:\Windows\{C63DD08E-E88F-4ae5-9C31-901E67F3760A}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\{C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exeC:\Windows\{C4FA55F8-25DA-42bd-9205-DF4C39FAAC13}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{15186D96-33E3-419e-B980-940AF8B5F09A}.exeC:\Windows\{15186D96-33E3-419e-B980-940AF8B5F09A}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\{40FE115F-0079-4663-8E00-9E88AE6348F8}.exeC:\Windows\{40FE115F-0079-4663-8E00-9E88AE6348F8}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\{4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exeC:\Windows\{4DB0A740-7E22-4af6-A3FE-2DBB56F6FBCE}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\{0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exeC:\Windows\{0AF48A78-AE3A-4872-B031-EEE7D58EB047}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\{9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exeC:\Windows\{9B411337-A725-4e8d-9C69-FEBC1AF127C7}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\{1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}.exeC:\Windows\{1F51AE3B-5B20-4689-B5AB-3FDC0BB05566}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\{B488A0DB-DC51-402f-8E4F-495DBB76769E}.exeC:\Windows\{B488A0DB-DC51-402f-8E4F-495DBB76769E}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1472 -
C:\Windows\{A1462254-A3C1-4f90-BF5F-27025FFA295F}.exeC:\Windows\{A1462254-A3C1-4f90-BF5F-27025FFA295F}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\{9739BCBB-CE8D-4c54-BD5E-777B194E7D57}.exeC:\Windows\{9739BCBB-CE8D-4c54-BD5E-777B194E7D57}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1462~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B488A~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1F51A~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9B411~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0AF48~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4DB0A~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{40FE1~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{15186~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C4FA5~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C63DD~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5ceff2098e9e83ad4a0b0fa0222eade48
SHA13e1af40fc253f068103f3ef4e3a37feef5c522bf
SHA256bccb7a6a734fc0634a734c16ea76f3be50717460933017718328d73fbdacddfc
SHA5123a5edb7cd9fb0ee7405eed51afe02e9bffb5a658d54a5f1c126e084e6a22bea798612ae569d34c829dd4f1f248f332d94eafc9c706d50350acee9306c36c5b71
-
Filesize
216KB
MD531a430ca101d754adeda6e8e619a1659
SHA1933367805dfbcbccb476fca0117b09a5099972a7
SHA2561429e6d3f87b3ac165c3df701e67b6a0cc0ef02dc5820c8d58c4668e16ced529
SHA5127734625b5dc5d18dcd9be831a5127b34d4302c7e4535ecec8958849ae59488cd0f480ad841bd58b8c7a10331c331032178a4e0fb046f49496bd693f90c9b9210
-
Filesize
216KB
MD59ab4f0fcabe613f63196a4be76dc0864
SHA10e3d3e826917b044ec5e96713ba165bf9710d61d
SHA2569bf403cce89879ec37d71c668d2d2127026ae49c3507362bafb80fd2e54a0623
SHA5121356e00e2662088c7891ac3ed91ece671920f5fe5a5e56e2a3d87785a14b3dcf3e268fba39be5f19255e06da68fc6fb39f184426d0ade6050aae8badd1444142
-
Filesize
216KB
MD5a1d6aa473360d2e513e09eff04ec334b
SHA11e72be6205838700de1cdc01f77759779f020208
SHA256b87f3423982d322a199a23723449f947d5199af6b3e12e3e2c84ac6501d8a0b8
SHA5120eaee8da46b8710febbcc597a52d6e47e6e6ddd28439507f835a906b1c9884ea35e040c20dc2c5d37bb86871baa0661aac06f4501a032dd0ac8eef07be63770b
-
Filesize
216KB
MD5d38bc20cd1b0516bc222292ae3db5c8d
SHA1ff7404aa08fc239934a5cdbd26cf0b2d1aa5c4ba
SHA256b496205777da07812ece3ff9a0098afa0d1dcf01e32375262b3b5598c8d95533
SHA512c323325dc80097bd4f889326918a74a5d97620daeffdecdd24ee09effe4fc4a1367a5716788526bb7b074d793322196be2d927ce2e791e09b20ab5c01679c2f9
-
Filesize
216KB
MD5a611f610909dea08d269381024d09f20
SHA17138cd8a79b40703e32c59f2cd00a1895dd28ec8
SHA256eca1e5a0fa51449f938598289dcbacfae2b234aba786e1cf58f5499749d0b4c1
SHA51238509980ce670d38666c20e0c3e2956b14c0a971b95552c8b11551dfb709b0b82572e0c2a00795bf7d9efe43560d469f28ec768cd8ef799f1d665d87eea58ccb
-
Filesize
216KB
MD562a06e267b933b02691e387d3c23b037
SHA1c8fcaa66e3bad12b4e8fac1435272fc4cf947c23
SHA25652e93c92401e0814829807ea953a502029ba912230daae51e9f8af394b2910bc
SHA512ed5d3de8a27f6860967293882b0a9d22fa56f7e438121deef286fa94e2365fc73d0225bc01a2309fca2bc42fc80bc703d4b2231ddf624c6c07682fbb8c9e361b
-
Filesize
216KB
MD5ae7a474dc87734f65b9aef7cdca2dfcb
SHA1e097106d774f32c96833e18ef9237b11d974b687
SHA256c7066f24954c53927197c125f5862c05a9a79570af598554aa71eefa2027981c
SHA512f0baed8fa227770fdf142d415a82cff8752602f9add09b233cae536a7f2c11bcc04d3376e7ae57ed684cdeafeb28cf787892b5b71baa36172fda242df501c3d4
-
Filesize
216KB
MD5ad5a3166280ffcdd7bd1c0e0830e2ffe
SHA1c97d7d1e291c6b54d8ee5d1058acb5af2b3d01d3
SHA256608be1c62bc65df996478469d0ea7034184f16893172d50929e39f185fb04a65
SHA5126fd914ce5e54cbc0196d398d67b28cba9dc26338573e666865b79cb6cc33a615d8ae0d7af45312b6838f80fce87109f6a618e626333d46317928b2a446d0142b
-
Filesize
216KB
MD5deca103b80ddc2e7b2c3141b4cae6a02
SHA1b1123c0e9e92377f09488b44178cf49a9ebde044
SHA256e265085e0ca0e0ff7b272a2e55b6958ccd56208c27d5876fe0b13a12758e6f27
SHA5124ac5ee37a9149328d907831b976fd9d9c45fe33e997481c5c0ba85a7300d122986d885d70fdfb4b858896112f09f5ef6cfeb25724ce0ea8077e8110f07b84fd7
-
Filesize
216KB
MD53d2fe93ef7731c1e4457fbc1ae9c7e41
SHA1e725ab206388e7d84efa37e37f3c50ddf50f7e0c
SHA256df89d8699bf193aaa582cab3bef2c49f43791b4a522c36bfbf132e25751a743c
SHA51201d4a90b19a4f4e69d043099c2b3ae7ce97595fb9d5817349d2adbda01df6b04ac2df8c03d69b5f94753f6dd40cc8b303eea7ab971575b5633cd103bf9160464