Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe
-
Size
197KB
-
MD5
62285842c230fc52e29c1977f83c1c51
-
SHA1
9345fe86911bfacae41f2c33dd1973dd3c1f7476
-
SHA256
0414ae293423816b7aa3f9d7679f6cee1fd1ff1a51c9aa06f872a80b9580d2ac
-
SHA512
87afca3fdba443ddc7e64270f3dbd6be3880f0fe157e14da4f8ab222c779545f1f6ba398ca77fbeaad013d70b460045ff31f378895783c7643d341f74d500c61
-
SSDEEP
3072:jEGh0o4l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGulEeKcAEca
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}\stubpath = "C:\\Windows\\{D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe" {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}\stubpath = "C:\\Windows\\{F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe" {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9412B50C-6DD8-4997-8168-7163D572F182} {E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{168C7D04-3E56-4c6f-AE24-0A69B3F65264} {9412B50C-6DD8-4997-8168-7163D572F182}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4F872ED3-8225-4cdc-8FEF-11D8DAC3D597} {168C7D04-3E56-4c6f-AE24-0A69B3F65264}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5F072B79-0856-4964-B36F-36B7EC2CC3EF}\stubpath = "C:\\Windows\\{5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe" {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D70BFBB-51C9-4aa5-961D-6D586327999B}\stubpath = "C:\\Windows\\{5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe" {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C7838433-0E76-4bb7-B8AA-CBEC67F43487} {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C7838433-0E76-4bb7-B8AA-CBEC67F43487}\stubpath = "C:\\Windows\\{C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe" {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9412B50C-6DD8-4997-8168-7163D572F182}\stubpath = "C:\\Windows\\{9412B50C-6DD8-4997-8168-7163D572F182}.exe" {E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58F49A27-B95A-439c-A2AA-A764B3799738} 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{58F49A27-B95A-439c-A2AA-A764B3799738}\stubpath = "C:\\Windows\\{58F49A27-B95A-439c-A2AA-A764B3799738}.exe" 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE} {58F49A27-B95A-439c-A2AA-A764B3799738}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D70BFBB-51C9-4aa5-961D-6D586327999B} {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C} {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}\stubpath = "C:\\Windows\\{E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}.exe" {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{168C7D04-3E56-4c6f-AE24-0A69B3F65264}\stubpath = "C:\\Windows\\{168C7D04-3E56-4c6f-AE24-0A69B3F65264}.exe" {9412B50C-6DD8-4997-8168-7163D572F182}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}\stubpath = "C:\\Windows\\{5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe" {58F49A27-B95A-439c-A2AA-A764B3799738}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5F072B79-0856-4964-B36F-36B7EC2CC3EF} {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3} {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E57F9DE5-97B1-4d62-BB0C-444DE21F35B4} {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4F872ED3-8225-4cdc-8FEF-11D8DAC3D597}\stubpath = "C:\\Windows\\{4F872ED3-8225-4cdc-8FEF-11D8DAC3D597}.exe" {168C7D04-3E56-4c6f-AE24-0A69B3F65264}.exe -
Deletes itself 1 IoCs
pid Process 2520 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2344 {58F49A27-B95A-439c-A2AA-A764B3799738}.exe 2332 {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe 2704 {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe 2604 {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe 2624 {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe 2680 {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe 2568 {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe 2356 {E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}.exe 2308 {9412B50C-6DD8-4997-8168-7163D572F182}.exe 780 {168C7D04-3E56-4c6f-AE24-0A69B3F65264}.exe 2304 {4F872ED3-8225-4cdc-8FEF-11D8DAC3D597}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe {58F49A27-B95A-439c-A2AA-A764B3799738}.exe File created C:\Windows\{D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe File created C:\Windows\{5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe File created C:\Windows\{9412B50C-6DD8-4997-8168-7163D572F182}.exe {E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}.exe File created C:\Windows\{E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}.exe {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe File created C:\Windows\{168C7D04-3E56-4c6f-AE24-0A69B3F65264}.exe {9412B50C-6DD8-4997-8168-7163D572F182}.exe File created C:\Windows\{4F872ED3-8225-4cdc-8FEF-11D8DAC3D597}.exe {168C7D04-3E56-4c6f-AE24-0A69B3F65264}.exe File created C:\Windows\{58F49A27-B95A-439c-A2AA-A764B3799738}.exe 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe File created C:\Windows\{5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe File created C:\Windows\{F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe File created C:\Windows\{C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {58F49A27-B95A-439c-A2AA-A764B3799738}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9412B50C-6DD8-4997-8168-7163D572F182}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {168C7D04-3E56-4c6f-AE24-0A69B3F65264}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4F872ED3-8225-4cdc-8FEF-11D8DAC3D597}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 292 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe Token: SeIncBasePriorityPrivilege 2344 {58F49A27-B95A-439c-A2AA-A764B3799738}.exe Token: SeIncBasePriorityPrivilege 2332 {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe Token: SeIncBasePriorityPrivilege 2704 {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe Token: SeIncBasePriorityPrivilege 2604 {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe Token: SeIncBasePriorityPrivilege 2624 {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe Token: SeIncBasePriorityPrivilege 2680 {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe Token: SeIncBasePriorityPrivilege 2568 {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe Token: SeIncBasePriorityPrivilege 2356 {E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}.exe Token: SeIncBasePriorityPrivilege 2308 {9412B50C-6DD8-4997-8168-7163D572F182}.exe Token: SeIncBasePriorityPrivilege 780 {168C7D04-3E56-4c6f-AE24-0A69B3F65264}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 292 wrote to memory of 2344 292 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe 30 PID 292 wrote to memory of 2344 292 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe 30 PID 292 wrote to memory of 2344 292 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe 30 PID 292 wrote to memory of 2344 292 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe 30 PID 292 wrote to memory of 2520 292 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe 31 PID 292 wrote to memory of 2520 292 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe 31 PID 292 wrote to memory of 2520 292 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe 31 PID 292 wrote to memory of 2520 292 2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe 31 PID 2344 wrote to memory of 2332 2344 {58F49A27-B95A-439c-A2AA-A764B3799738}.exe 33 PID 2344 wrote to memory of 2332 2344 {58F49A27-B95A-439c-A2AA-A764B3799738}.exe 33 PID 2344 wrote to memory of 2332 2344 {58F49A27-B95A-439c-A2AA-A764B3799738}.exe 33 PID 2344 wrote to memory of 2332 2344 {58F49A27-B95A-439c-A2AA-A764B3799738}.exe 33 PID 2344 wrote to memory of 2832 2344 {58F49A27-B95A-439c-A2AA-A764B3799738}.exe 34 PID 2344 wrote to memory of 2832 2344 {58F49A27-B95A-439c-A2AA-A764B3799738}.exe 34 PID 2344 wrote to memory of 2832 2344 {58F49A27-B95A-439c-A2AA-A764B3799738}.exe 34 PID 2344 wrote to memory of 2832 2344 {58F49A27-B95A-439c-A2AA-A764B3799738}.exe 34 PID 2332 wrote to memory of 2704 2332 {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe 35 PID 2332 wrote to memory of 2704 2332 {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe 35 PID 2332 wrote to memory of 2704 2332 {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe 35 PID 2332 wrote to memory of 2704 2332 {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe 35 PID 2332 wrote to memory of 2712 2332 {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe 36 PID 2332 wrote to memory of 2712 2332 {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe 36 PID 2332 wrote to memory of 2712 2332 {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe 36 PID 2332 wrote to memory of 2712 2332 {5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe 36 PID 2704 wrote to memory of 2604 2704 {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe 37 PID 2704 wrote to memory of 2604 2704 {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe 37 PID 2704 wrote to memory of 2604 2704 {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe 37 PID 2704 wrote to memory of 2604 2704 {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe 37 PID 2704 wrote to memory of 2752 2704 {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe 38 PID 2704 wrote to memory of 2752 2704 {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe 38 PID 2704 wrote to memory of 2752 2704 {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe 38 PID 2704 wrote to memory of 2752 2704 {5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe 38 PID 2604 wrote to memory of 2624 2604 {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe 39 PID 2604 wrote to memory of 2624 2604 {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe 39 PID 2604 wrote to memory of 2624 2604 {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe 39 PID 2604 wrote to memory of 2624 2604 {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe 39 PID 2604 wrote to memory of 1828 2604 {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe 40 PID 2604 wrote to memory of 1828 2604 {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe 40 PID 2604 wrote to memory of 1828 2604 {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe 40 PID 2604 wrote to memory of 1828 2604 {D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe 40 PID 2624 wrote to memory of 2680 2624 {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe 41 PID 2624 wrote to memory of 2680 2624 {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe 41 PID 2624 wrote to memory of 2680 2624 {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe 41 PID 2624 wrote to memory of 2680 2624 {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe 41 PID 2624 wrote to memory of 1944 2624 {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe 42 PID 2624 wrote to memory of 1944 2624 {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe 42 PID 2624 wrote to memory of 1944 2624 {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe 42 PID 2624 wrote to memory of 1944 2624 {5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe 42 PID 2680 wrote to memory of 2568 2680 {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe 43 PID 2680 wrote to memory of 2568 2680 {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe 43 PID 2680 wrote to memory of 2568 2680 {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe 43 PID 2680 wrote to memory of 2568 2680 {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe 43 PID 2680 wrote to memory of 2824 2680 {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe 44 PID 2680 wrote to memory of 2824 2680 {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe 44 PID 2680 wrote to memory of 2824 2680 {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe 44 PID 2680 wrote to memory of 2824 2680 {F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe 44 PID 2568 wrote to memory of 2356 2568 {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe 45 PID 2568 wrote to memory of 2356 2568 {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe 45 PID 2568 wrote to memory of 2356 2568 {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe 45 PID 2568 wrote to memory of 2356 2568 {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe 45 PID 2568 wrote to memory of 1240 2568 {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe 46 PID 2568 wrote to memory of 1240 2568 {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe 46 PID 2568 wrote to memory of 1240 2568 {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe 46 PID 2568 wrote to memory of 1240 2568 {C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-23_62285842c230fc52e29c1977f83c1c51_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\{58F49A27-B95A-439c-A2AA-A764B3799738}.exeC:\Windows\{58F49A27-B95A-439c-A2AA-A764B3799738}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\{5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exeC:\Windows\{5A1B63CC-4BDA-4616-8CE8-09D4AA687AEE}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\{5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exeC:\Windows\{5F072B79-0856-4964-B36F-36B7EC2CC3EF}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\{D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exeC:\Windows\{D9ED9911-9DC2-49f9-A1EC-5E1D163A8DE3}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\{5D70BFBB-51C9-4aa5-961D-6D586327999B}.exeC:\Windows\{5D70BFBB-51C9-4aa5-961D-6D586327999B}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\{F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exeC:\Windows\{F05E9877-8BA8-4d24-B0B8-9E6BA1177B6C}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\{C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exeC:\Windows\{C7838433-0E76-4bb7-B8AA-CBEC67F43487}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\{E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}.exeC:\Windows\{E57F9DE5-97B1-4d62-BB0C-444DE21F35B4}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Windows\{9412B50C-6DD8-4997-8168-7163D572F182}.exeC:\Windows\{9412B50C-6DD8-4997-8168-7163D572F182}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2308 -
C:\Windows\{168C7D04-3E56-4c6f-AE24-0A69B3F65264}.exeC:\Windows\{168C7D04-3E56-4c6f-AE24-0A69B3F65264}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:780 -
C:\Windows\{4F872ED3-8225-4cdc-8FEF-11D8DAC3D597}.exeC:\Windows\{4F872ED3-8225-4cdc-8FEF-11D8DAC3D597}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{168C7~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9412B~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E57F9~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C7838~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F05E9~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D70B~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9ED9~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5F072~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A1B6~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{58F49~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5c6829c51feddc13d4f57bdbca2f35e73
SHA1969ed133f2d55e90f813baaa7a55afc3c05d7e75
SHA25677cd6d2b7d966e6c307395b81fa85a79b3bec33bfdd0a7f6b7f21ad8608aff6c
SHA512f2145172c86572b5ae657757b6610fdfb16b9f23bb5832911dba6ed314e261864b9623a6b0055f96ec2ac0a81f89f704adc3ffae4c750fc20d991d8cedbf8d94
-
Filesize
197KB
MD5dd077740e597ac2bad7635f0b3ef5049
SHA177b88aa2eb267a025c636497c9fe86a6ecc112f4
SHA2565b93d8fe4a78ebb444c647deb297808f643162b1172c352eb3f019b00435fae7
SHA5121f5bdacee7a08821e231a25fdc4cacdf546dfa6b740b2c6412e3c7e112e7e1f91a80249e03ae4d6a0f09a89701f3ae58b924bfa6e8c9a95478eaaf7860885d98
-
Filesize
197KB
MD56310c9bcb20544330c8ce5a798c5d9c8
SHA1619b98c3ea38ec04c7e3b16e05bf8f7afc4a3ca6
SHA256391c2f4b2b25290a2fa2862877041f1809fc59886944786260c9b64a71b443ed
SHA512fc02ccea982572a1b5449c2cb022d7bd0cd440edfc422e5d0e330687c27d0eae62e026ff10fac733cd09a7678ecde68a289e1c4c805d8ce45f9e1216e1ea9009
-
Filesize
197KB
MD573de00da817f9e54e4d2ad534400d5a6
SHA1d5869fa8c8131cc79bcc5c4262ba543f5df9c93d
SHA2564ca51041cfe7b22cad400b5f772eac639cf0673d62ea75409a662a53687d8a60
SHA512f0e423cef73f11192a9e5c01d8c59044b9c2bac22f210cff931937e3d0550c8bc4112ee87b8bbc8a652837607cb5fa9aacc0918d424f2640058c6dc45ba363e4
-
Filesize
197KB
MD57dd6209cafc204b22af196169650c061
SHA109fbbc7823e0a4c4e84a508e43f46ee1edbc17d5
SHA256c4c9994de8f150ac481a38732ee792e1c1fa936867506311c8bdbcad4cdba884
SHA51205a0cc7b167b45eb2174898317eece3ed4c56150318a10dea5a78b29cd9de74ee406abf614bfec0de59f96ac6034caf9329f50b182dcb05ec5e5f70a0eef5d6a
-
Filesize
197KB
MD554395587b030a2bed400dff82159b263
SHA1e8863a08c8255883e3bd46c4ba06cc6a04a05255
SHA256814b4d337dded6f121a5c1231b1ba11249bc31794c889d1165aeba2641a10dca
SHA512f776e7b07bde9ae5aedc970872079152bf685e9b5bc6f8a3f188a6652ec3d234bc80bb23b6254345ee9f788353bd472fa1c30da278ce1fd92b7357aaf9951a5e
-
Filesize
197KB
MD5adbd0b89c91348ad27f8b9981f946587
SHA1e217a979e49a0ea86186795996225b88853d6a3a
SHA256f1513ff66f65514d1e7bb80c88c8c5ef9935174ec09eb554fba81d974c62fd26
SHA512bcffd3cf688ef94f1f21caae959e38b72c7e2ed87dc0a3aaa19eb38a0b605cdebbd9557c96554ad4aa70f13ec76058e5936f63d82ad9a18e47dc81148906cba1
-
Filesize
197KB
MD524d1daf87e8db559457024ed87e47d29
SHA1adb98ac2d64e6d8a55c69e5aba2573450f02db58
SHA256f300b692c62521edd5651e49874997a52ced136b7c501646307e2742abaacfb1
SHA512e57695c4a6bbfdcc9da14d0136d185ad1539fe879b3ddf8551106d5da26cb5b056522a883cda938c26e3ef59ba437cf676b810a5ed30719f3ab973639bd7d374
-
Filesize
197KB
MD51c9b2048ac0f7acdb58503acead3bb3a
SHA1ddf09ce8e948d5404ad0baeffd3afbe5b2a8b917
SHA256930c646e2a2c7dcb55d78fa30a3eba6aa1b0ea0a67cd12aa19dcfbcf6cbe6b0a
SHA5127bdaab1744ed138465a8c71ed3f0b81bc591b71f31699c7841654d2b4b22d17ad4d0c7d8b2849a607c69e650f4f9d6d2a11074317ce9691253f7a3bef7bcedbf
-
Filesize
197KB
MD5786f33b4e82046c2468c0213b2e23866
SHA1e59b97aa276586719832a449d07423734ad6c628
SHA2566b613a100ec18826a936ddc60dedd41b40989310b948b70dbd72b7c767e5d402
SHA512700f6fb1f587b2d81bb0bc5e7bab2d59f5010a4b07a2e2781e5476ec49a975d1b63059c3d61ae7fd0f6d426573c4969fc238e2bd50d7ad8b223bffbd677f6eff
-
Filesize
197KB
MD5f61d70c287bab9deb0a80187f0bd1b8d
SHA186dd79fcc082488484a917ea4ca94c890f8fdd81
SHA256d15e29be298bae38b60f8a83defa468ee860c99497c03733cd4ba5c4e2efbe93
SHA512e89a0f50d2de334190f13a6ceb113e020ee9ac30cc9d47204053c8dda8f17bb582d39815ad98e30b46f97c10fef77c7aade6f85f4ddf85737c05ee1b748c1da5