Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe
-
Size
216KB
-
MD5
686de7ba06b7f285337b335791f34b3b
-
SHA1
4f5c1073312fa4c1dac1bdf8b4f731a8b0ce11fe
-
SHA256
f11b75338d097edad2750a09fce07de2edd83f4528898742094ae90a6aecd7f8
-
SHA512
a344b6a9a124ccf960a0961f6d44f6f9254759331ec51a3d768f891ade1452a5850470709c76c6d256046078bfd4cf893138e751785745d2d502bbad05e61d48
-
SSDEEP
3072:jEGh0ofl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGJlEeKcAEcGy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}\stubpath = "C:\\Windows\\{03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe" {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{581A9720-D877-4507-BFF8-5FD8D367290B}\stubpath = "C:\\Windows\\{581A9720-D877-4507-BFF8-5FD8D367290B}.exe" {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A1DD5FC8-5563-41c8-9EC2-979B780615FA} {581A9720-D877-4507-BFF8-5FD8D367290B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{512A2888-5824-4d84-90D3-35636C5C006D} {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59CE549A-7AAD-4544-8CC6-F34CABDC19DB} {512A2888-5824-4d84-90D3-35636C5C006D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59CE549A-7AAD-4544-8CC6-F34CABDC19DB}\stubpath = "C:\\Windows\\{59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe" {512A2888-5824-4d84-90D3-35636C5C006D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CCAB43AF-B697-477b-B0CD-DB14EABFE231} {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB} {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}\stubpath = "C:\\Windows\\{6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe" {99A20264-AE82-4ea7-99A9-E76421945D64}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{512A2888-5824-4d84-90D3-35636C5C006D}\stubpath = "C:\\Windows\\{512A2888-5824-4d84-90D3-35636C5C006D}.exe" {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{581A9720-D877-4507-BFF8-5FD8D367290B} {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{407A42C0-B9CF-4720-83EB-D86E5033120C} {D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{407A42C0-B9CF-4720-83EB-D86E5033120C}\stubpath = "C:\\Windows\\{407A42C0-B9CF-4720-83EB-D86E5033120C}.exe" {D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C45F0F64-9B76-4334-B416-04DD456DA63E}\stubpath = "C:\\Windows\\{C45F0F64-9B76-4334-B416-04DD456DA63E}.exe" 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CCAB43AF-B697-477b-B0CD-DB14EABFE231}\stubpath = "C:\\Windows\\{CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe" {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{99A20264-AE82-4ea7-99A9-E76421945D64} {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{99A20264-AE82-4ea7-99A9-E76421945D64}\stubpath = "C:\\Windows\\{99A20264-AE82-4ea7-99A9-E76421945D64}.exe" {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{81852E2A-8732-4c24-97DD-90FFE3006748} {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}\stubpath = "C:\\Windows\\{D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}.exe" {81852E2A-8732-4c24-97DD-90FFE3006748}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C45F0F64-9B76-4334-B416-04DD456DA63E} 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A1DD5FC8-5563-41c8-9EC2-979B780615FA}\stubpath = "C:\\Windows\\{A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe" {581A9720-D877-4507-BFF8-5FD8D367290B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6BD9F02B-4647-44ce-B84F-8AAED58D4DBF} {99A20264-AE82-4ea7-99A9-E76421945D64}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{81852E2A-8732-4c24-97DD-90FFE3006748}\stubpath = "C:\\Windows\\{81852E2A-8732-4c24-97DD-90FFE3006748}.exe" {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7656D2A-87D5-4a4a-9B27-25AA0493E2EA} {81852E2A-8732-4c24-97DD-90FFE3006748}.exe -
Executes dropped EXE 12 IoCs
pid Process 1784 {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe 4372 {512A2888-5824-4d84-90D3-35636C5C006D}.exe 2476 {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe 2268 {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe 680 {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe 3452 {581A9720-D877-4507-BFF8-5FD8D367290B}.exe 3684 {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe 4492 {99A20264-AE82-4ea7-99A9-E76421945D64}.exe 3060 {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe 4364 {81852E2A-8732-4c24-97DD-90FFE3006748}.exe 1172 {D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}.exe 4664 {407A42C0-B9CF-4720-83EB-D86E5033120C}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{99A20264-AE82-4ea7-99A9-E76421945D64}.exe {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe File created C:\Windows\{6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe {99A20264-AE82-4ea7-99A9-E76421945D64}.exe File created C:\Windows\{81852E2A-8732-4c24-97DD-90FFE3006748}.exe {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe File created C:\Windows\{C45F0F64-9B76-4334-B416-04DD456DA63E}.exe 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe File created C:\Windows\{59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe {512A2888-5824-4d84-90D3-35636C5C006D}.exe File created C:\Windows\{581A9720-D877-4507-BFF8-5FD8D367290B}.exe {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe File created C:\Windows\{A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe {581A9720-D877-4507-BFF8-5FD8D367290B}.exe File created C:\Windows\{D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}.exe {81852E2A-8732-4c24-97DD-90FFE3006748}.exe File created C:\Windows\{407A42C0-B9CF-4720-83EB-D86E5033120C}.exe {D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}.exe File created C:\Windows\{512A2888-5824-4d84-90D3-35636C5C006D}.exe {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe File created C:\Windows\{CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe File created C:\Windows\{03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {81852E2A-8732-4c24-97DD-90FFE3006748}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {512A2888-5824-4d84-90D3-35636C5C006D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {407A42C0-B9CF-4720-83EB-D86E5033120C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {99A20264-AE82-4ea7-99A9-E76421945D64}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {581A9720-D877-4507-BFF8-5FD8D367290B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3996 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe Token: SeIncBasePriorityPrivilege 1784 {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe Token: SeIncBasePriorityPrivilege 4372 {512A2888-5824-4d84-90D3-35636C5C006D}.exe Token: SeIncBasePriorityPrivilege 2476 {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe Token: SeIncBasePriorityPrivilege 2268 {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe Token: SeIncBasePriorityPrivilege 680 {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe Token: SeIncBasePriorityPrivilege 3452 {581A9720-D877-4507-BFF8-5FD8D367290B}.exe Token: SeIncBasePriorityPrivilege 3684 {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe Token: SeIncBasePriorityPrivilege 4492 {99A20264-AE82-4ea7-99A9-E76421945D64}.exe Token: SeIncBasePriorityPrivilege 3060 {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe Token: SeIncBasePriorityPrivilege 4364 {81852E2A-8732-4c24-97DD-90FFE3006748}.exe Token: SeIncBasePriorityPrivilege 1172 {D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3996 wrote to memory of 1784 3996 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe 95 PID 3996 wrote to memory of 1784 3996 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe 95 PID 3996 wrote to memory of 1784 3996 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe 95 PID 3996 wrote to memory of 2316 3996 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe 96 PID 3996 wrote to memory of 2316 3996 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe 96 PID 3996 wrote to memory of 2316 3996 2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe 96 PID 1784 wrote to memory of 4372 1784 {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe 97 PID 1784 wrote to memory of 4372 1784 {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe 97 PID 1784 wrote to memory of 4372 1784 {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe 97 PID 1784 wrote to memory of 1400 1784 {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe 98 PID 1784 wrote to memory of 1400 1784 {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe 98 PID 1784 wrote to memory of 1400 1784 {C45F0F64-9B76-4334-B416-04DD456DA63E}.exe 98 PID 4372 wrote to memory of 2476 4372 {512A2888-5824-4d84-90D3-35636C5C006D}.exe 102 PID 4372 wrote to memory of 2476 4372 {512A2888-5824-4d84-90D3-35636C5C006D}.exe 102 PID 4372 wrote to memory of 2476 4372 {512A2888-5824-4d84-90D3-35636C5C006D}.exe 102 PID 4372 wrote to memory of 3344 4372 {512A2888-5824-4d84-90D3-35636C5C006D}.exe 103 PID 4372 wrote to memory of 3344 4372 {512A2888-5824-4d84-90D3-35636C5C006D}.exe 103 PID 4372 wrote to memory of 3344 4372 {512A2888-5824-4d84-90D3-35636C5C006D}.exe 103 PID 2476 wrote to memory of 2268 2476 {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe 104 PID 2476 wrote to memory of 2268 2476 {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe 104 PID 2476 wrote to memory of 2268 2476 {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe 104 PID 2476 wrote to memory of 4516 2476 {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe 105 PID 2476 wrote to memory of 4516 2476 {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe 105 PID 2476 wrote to memory of 4516 2476 {59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe 105 PID 2268 wrote to memory of 680 2268 {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe 106 PID 2268 wrote to memory of 680 2268 {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe 106 PID 2268 wrote to memory of 680 2268 {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe 106 PID 2268 wrote to memory of 4348 2268 {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe 107 PID 2268 wrote to memory of 4348 2268 {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe 107 PID 2268 wrote to memory of 4348 2268 {CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe 107 PID 680 wrote to memory of 3452 680 {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe 110 PID 680 wrote to memory of 3452 680 {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe 110 PID 680 wrote to memory of 3452 680 {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe 110 PID 680 wrote to memory of 1340 680 {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe 111 PID 680 wrote to memory of 1340 680 {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe 111 PID 680 wrote to memory of 1340 680 {03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe 111 PID 3452 wrote to memory of 3684 3452 {581A9720-D877-4507-BFF8-5FD8D367290B}.exe 112 PID 3452 wrote to memory of 3684 3452 {581A9720-D877-4507-BFF8-5FD8D367290B}.exe 112 PID 3452 wrote to memory of 3684 3452 {581A9720-D877-4507-BFF8-5FD8D367290B}.exe 112 PID 3452 wrote to memory of 4664 3452 {581A9720-D877-4507-BFF8-5FD8D367290B}.exe 113 PID 3452 wrote to memory of 4664 3452 {581A9720-D877-4507-BFF8-5FD8D367290B}.exe 113 PID 3452 wrote to memory of 4664 3452 {581A9720-D877-4507-BFF8-5FD8D367290B}.exe 113 PID 3684 wrote to memory of 4492 3684 {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe 118 PID 3684 wrote to memory of 4492 3684 {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe 118 PID 3684 wrote to memory of 4492 3684 {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe 118 PID 3684 wrote to memory of 3248 3684 {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe 119 PID 3684 wrote to memory of 3248 3684 {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe 119 PID 3684 wrote to memory of 3248 3684 {A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe 119 PID 4492 wrote to memory of 3060 4492 {99A20264-AE82-4ea7-99A9-E76421945D64}.exe 124 PID 4492 wrote to memory of 3060 4492 {99A20264-AE82-4ea7-99A9-E76421945D64}.exe 124 PID 4492 wrote to memory of 3060 4492 {99A20264-AE82-4ea7-99A9-E76421945D64}.exe 124 PID 4492 wrote to memory of 2856 4492 {99A20264-AE82-4ea7-99A9-E76421945D64}.exe 125 PID 4492 wrote to memory of 2856 4492 {99A20264-AE82-4ea7-99A9-E76421945D64}.exe 125 PID 4492 wrote to memory of 2856 4492 {99A20264-AE82-4ea7-99A9-E76421945D64}.exe 125 PID 3060 wrote to memory of 4364 3060 {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe 126 PID 3060 wrote to memory of 4364 3060 {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe 126 PID 3060 wrote to memory of 4364 3060 {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe 126 PID 3060 wrote to memory of 752 3060 {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe 127 PID 3060 wrote to memory of 752 3060 {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe 127 PID 3060 wrote to memory of 752 3060 {6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe 127 PID 4364 wrote to memory of 1172 4364 {81852E2A-8732-4c24-97DD-90FFE3006748}.exe 131 PID 4364 wrote to memory of 1172 4364 {81852E2A-8732-4c24-97DD-90FFE3006748}.exe 131 PID 4364 wrote to memory of 1172 4364 {81852E2A-8732-4c24-97DD-90FFE3006748}.exe 131 PID 4364 wrote to memory of 2200 4364 {81852E2A-8732-4c24-97DD-90FFE3006748}.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-19_686de7ba06b7f285337b335791f34b3b_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\{C45F0F64-9B76-4334-B416-04DD456DA63E}.exeC:\Windows\{C45F0F64-9B76-4334-B416-04DD456DA63E}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\{512A2888-5824-4d84-90D3-35636C5C006D}.exeC:\Windows\{512A2888-5824-4d84-90D3-35636C5C006D}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\{59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exeC:\Windows\{59CE549A-7AAD-4544-8CC6-F34CABDC19DB}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\{CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exeC:\Windows\{CCAB43AF-B697-477b-B0CD-DB14EABFE231}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\{03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exeC:\Windows\{03E3DAE6-38C8-4d39-B9FC-1EA4B5ED53CB}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\{581A9720-D877-4507-BFF8-5FD8D367290B}.exeC:\Windows\{581A9720-D877-4507-BFF8-5FD8D367290B}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\{A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exeC:\Windows\{A1DD5FC8-5563-41c8-9EC2-979B780615FA}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\{99A20264-AE82-4ea7-99A9-E76421945D64}.exeC:\Windows\{99A20264-AE82-4ea7-99A9-E76421945D64}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\{6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exeC:\Windows\{6BD9F02B-4647-44ce-B84F-8AAED58D4DBF}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\{81852E2A-8732-4c24-97DD-90FFE3006748}.exeC:\Windows\{81852E2A-8732-4c24-97DD-90FFE3006748}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\{D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}.exeC:\Windows\{D7656D2A-87D5-4a4a-9B27-25AA0493E2EA}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1172 -
C:\Windows\{407A42C0-B9CF-4720-83EB-D86E5033120C}.exeC:\Windows\{407A42C0-B9CF-4720-83EB-D86E5033120C}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D7656~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81852~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6BD9F~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{99A20~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1DD5~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{581A9~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03E3D~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CCAB4~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{59CE5~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{512A2~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C45F0~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD581717b6e2a3a6b5bdfc727ded2c6be81
SHA10eac9546e3a913cf117b8a1688e105916d30ac7d
SHA2560feea20b06e14e57e90d24507881561b254abdfbb86c4bd0b22ea08b84dbdf59
SHA5120a5299996f592b065ff2302e0b802786203493a9fb2f505fef9fc688fce4c320f4e43298ec6b1661993f76016e140118a3dc418f13872407e08ae43db74eb90d
-
Filesize
216KB
MD5f654182c1103ade72972f79aa0dcda7c
SHA140e694613a2cc6e5d8af4215e5e79754b0813615
SHA256f2cd2830914856dd5accd1d2d2efbc104d0781be4c705493759f414264285f2a
SHA51243f2a2fa95241b16f783b344f32905b74c1d23b7d1bf262021be81ff0d45ae6c0af609b9178312ccf2f7b57a5f8c5edb24450c4eed5c6a4c53ea3328aad35d75
-
Filesize
216KB
MD5fe9742ee0480afbc1b57311ffd4e3c97
SHA1ac288bc7c7e2bf6bd9aab54f2092ee667a5d924e
SHA25684edc88e6c828ba7ee7322d1f9586f498905c80b9267d80d96b71159341a90cd
SHA512f9c26566aca7b4f25edb9465f118006bc48833e0fc65ea647b8e8b2752c88c9ea3e6a48129a7e1cc8ebac301523bd43e78e7432b74ea0d2a7349724bd4063b2f
-
Filesize
216KB
MD5634be2427d135c8bb83f3bdd589fb87f
SHA192f1467cfb389948593879b4f957e32e455cb631
SHA2562cbf16ed4c1bd58a16e4b93ca63f6ca3b68ead09834899d7976cf4f4892dbb7d
SHA512dbd582f41a396d0391503f2ece3fcba787133d8886cedc9af5b44fa6fd51950d06c5a4ad552b9e3989616d37fd6e03a99fb4d38be05834c2c4779721c994dc1e
-
Filesize
216KB
MD56a10ce6156b8aaec328d3b122797c79f
SHA1ee59b5ba91536dd28d826beba3a738547e9fe156
SHA256e606c2ab665c2afb739240cecb15a3b1ef06f74c0645faf1a4c2ee175f8b73a5
SHA51280c465208452f3c1bff90699197ffcc61b0203b5c042b729a66e7a7edf0f39cb66131910893a89e4130fd38e9c29960cbf47edcd831f9eca1d97ed7a73872487
-
Filesize
216KB
MD5e1af6996a697e34bdfc0be2f5754e507
SHA1f3df4bc78e575f9ccb963adf2dfb5b030aabaeb2
SHA256c7606bc7e2f6a3c436c93d65f56244951c335012c7eaaa1dc7258f3403038e18
SHA512bfc0391f7c4d4423b8af696e1e56b11fab103f3fac5fabf553dc6f52a66ce0e1cf294478b77883e5f3ffd28342d7bebc8926ef78a1d1b3bebf9f29e8f2b1c698
-
Filesize
216KB
MD55401f1fcc662c119f56cbc85228d50e2
SHA10931596f86df92ce6952927e307f85b91f4489b9
SHA256bddeddbdd81e0e763fd319aba46bc9aa84b29ff8e072acf34579aa847d8b33cf
SHA512f910923d211fbe54b439ca033e4b35eaeeb1b513489d0fe6978913d14f1acce31db4fae4bcf816eba79858dcf6440c5f6984623415198ac8deccc3f6a6e88859
-
Filesize
216KB
MD539b312b65415a60d4b01fa005fcd1eac
SHA1e16b6444cc7ca73a04c8fb674ae5df339ef1ef98
SHA256fc0eefc427cefbd1e7b07645b3d95457d36559d901e8ee7126f32bcdd4ada5ca
SHA5120244fada10d9ca0d4ad5e8feae636303118fb31ad8aaa1f5785931890ff1b34eecf19b69bd1dbecddbe805188fa754df37fea0592f8d508cb29747d3354f7c24
-
Filesize
216KB
MD5560a93a309ce2142785320ff6ad5d5e6
SHA10537ed349d09c0c5ca9f43685a913f1bd6371475
SHA256a61ffdc4294615023857274d3ed87c28e39db16abe1a21c42dbbeb3fb16323dc
SHA512227d9b68594c42b3caabb68b3fad21fc152c51f0bcc85924efe211eb510f246ace1e0281027735ab98fa7c400dd43596eba1b7521a5db3918c4e1a7bfcde170f
-
Filesize
216KB
MD5155cb04e8308642578a2eb92cee81cb0
SHA13f40a621f10b02598f121721ad0609ba35e2a52c
SHA256e080f30bcec0ab0370dff5b4ec78b4cc8037c262feb967c22e9881999bb7a3d5
SHA512634f5ee14a1ae4ed7cf5ed7b529675780bdb35649652b5c564e0ed42c8e45168f993df1b31d464ba3a46500861dbc0e64ebafabc5d6a0cec250d1b4b3d9ad5e4
-
Filesize
216KB
MD5bd496fac5d4b510f5e4c9a85b63cb1f2
SHA144d40c2f2ee7b7a57505bb1d95ac46a4ce34b5ba
SHA25623828e3ca2516128111694f500295d4e20498e67c5450b186752fe7640831b31
SHA5128adf3adef6ee17c015447f5683f82fd6705e560292f3a00d18a54abfa08588d679ecb27c7bb7845e94c006efe2152925bf05ece16924702877797716786bb480
-
Filesize
216KB
MD54b6709b0277d0d62a7892b48fc94d6f8
SHA17eb97578c578ac58b6c48b78dd8d1a34fe666a52
SHA256546feec4e6dde37e892d9bd69688252c42c5610c3b6f92beb7a0c52a3d3642e8
SHA512152b50444b89fbe06edc2f0be382f96df99bae12e322efe27ee85bccdc42dbeeb20f5dbc94a0f0afe8a87293d1b97c446dfdc4af87d952c423c9d86d0d12ad6a