Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe
-
Size
192KB
-
MD5
fea30277256688ebef83ab9eba939fa9
-
SHA1
24ff0abd21fea01e5299f1311b652a836def94f6
-
SHA256
2645168462e76958d6fcf639fa0def8a57b40f99f756efee902e734e5ffc402e
-
SHA512
0a0e473471423d0b0f023b71428fd27848aa8eb78502356a19247e3d58254ab87adc236e194c6b317536a84f59902be35d7a7c481e6e7ee4140dde65e34f00da
-
SSDEEP
1536:1EGh0oOl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oOl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB287971-639F-4767-9259-3B99EFECC1DC} {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6EDDABAC-CE1F-4527-B197-8FDE507E77DA}\stubpath = "C:\\Windows\\{6EDDABAC-CE1F-4527-B197-8FDE507E77DA}.exe" {2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D839639-6C76-48c1-9770-37FD710D8B35} {6EDDABAC-CE1F-4527-B197-8FDE507E77DA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{66EB742F-6C87-4463-8EA1-78D9C9D3E8F4} {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{82CAA174-04F0-4a74-9017-E6C6A0C6C2B9} {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}\stubpath = "C:\\Windows\\{82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe" {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B32635D8-43E4-4ae5-9D5D-F7F82DE547D6} {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}\stubpath = "C:\\Windows\\{B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe" {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0266D0FE-6468-4c90-8D6B-7DC55874CA17} {3D839639-6C76-48c1-9770-37FD710D8B35}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}\stubpath = "C:\\Windows\\{B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe" 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}\stubpath = "C:\\Windows\\{66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe" {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B4B7411F-F0DC-464c-87CC-74349929C226} {EB287971-639F-4767-9259-3B99EFECC1DC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0} {B4B7411F-F0DC-464c-87CC-74349929C226}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6EDDABAC-CE1F-4527-B197-8FDE507E77DA} {2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5DC687D-1ADC-4a55-85B9-A43FBF9675A8} 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB287971-639F-4767-9259-3B99EFECC1DC}\stubpath = "C:\\Windows\\{EB287971-639F-4767-9259-3B99EFECC1DC}.exe" {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B4B7411F-F0DC-464c-87CC-74349929C226}\stubpath = "C:\\Windows\\{B4B7411F-F0DC-464c-87CC-74349929C226}.exe" {EB287971-639F-4767-9259-3B99EFECC1DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}\stubpath = "C:\\Windows\\{2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}.exe" {B4B7411F-F0DC-464c-87CC-74349929C226}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0266D0FE-6468-4c90-8D6B-7DC55874CA17}\stubpath = "C:\\Windows\\{0266D0FE-6468-4c90-8D6B-7DC55874CA17}.exe" {3D839639-6C76-48c1-9770-37FD710D8B35}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F} {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}\stubpath = "C:\\Windows\\{6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe" {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D839639-6C76-48c1-9770-37FD710D8B35}\stubpath = "C:\\Windows\\{3D839639-6C76-48c1-9770-37FD710D8B35}.exe" {6EDDABAC-CE1F-4527-B197-8FDE507E77DA}.exe -
Deletes itself 1 IoCs
pid Process 2356 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2636 {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe 2648 {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe 2700 {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe 2588 {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe 2564 {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe 2272 {EB287971-639F-4767-9259-3B99EFECC1DC}.exe 1720 {B4B7411F-F0DC-464c-87CC-74349929C226}.exe 2820 {2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}.exe 1900 {6EDDABAC-CE1F-4527-B197-8FDE507E77DA}.exe 2204 {3D839639-6C76-48c1-9770-37FD710D8B35}.exe 2508 {0266D0FE-6468-4c90-8D6B-7DC55874CA17}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}.exe {B4B7411F-F0DC-464c-87CC-74349929C226}.exe File created C:\Windows\{3D839639-6C76-48c1-9770-37FD710D8B35}.exe {6EDDABAC-CE1F-4527-B197-8FDE507E77DA}.exe File created C:\Windows\{66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe File created C:\Windows\{82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe File created C:\Windows\{6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe File created C:\Windows\{B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe File created C:\Windows\{EB287971-639F-4767-9259-3B99EFECC1DC}.exe {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe File created C:\Windows\{B4B7411F-F0DC-464c-87CC-74349929C226}.exe {EB287971-639F-4767-9259-3B99EFECC1DC}.exe File created C:\Windows\{0266D0FE-6468-4c90-8D6B-7DC55874CA17}.exe {3D839639-6C76-48c1-9770-37FD710D8B35}.exe File created C:\Windows\{B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe File created C:\Windows\{6EDDABAC-CE1F-4527-B197-8FDE507E77DA}.exe {2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3D839639-6C76-48c1-9770-37FD710D8B35}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EB287971-639F-4767-9259-3B99EFECC1DC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B4B7411F-F0DC-464c-87CC-74349929C226}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0266D0FE-6468-4c90-8D6B-7DC55874CA17}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6EDDABAC-CE1F-4527-B197-8FDE507E77DA}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1956 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe Token: SeIncBasePriorityPrivilege 2636 {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe Token: SeIncBasePriorityPrivilege 2648 {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe Token: SeIncBasePriorityPrivilege 2700 {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe Token: SeIncBasePriorityPrivilege 2588 {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe Token: SeIncBasePriorityPrivilege 2564 {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe Token: SeIncBasePriorityPrivilege 2272 {EB287971-639F-4767-9259-3B99EFECC1DC}.exe Token: SeIncBasePriorityPrivilege 1720 {B4B7411F-F0DC-464c-87CC-74349929C226}.exe Token: SeIncBasePriorityPrivilege 2820 {2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}.exe Token: SeIncBasePriorityPrivilege 1900 {6EDDABAC-CE1F-4527-B197-8FDE507E77DA}.exe Token: SeIncBasePriorityPrivilege 2204 {3D839639-6C76-48c1-9770-37FD710D8B35}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2636 1956 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe 31 PID 1956 wrote to memory of 2636 1956 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe 31 PID 1956 wrote to memory of 2636 1956 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe 31 PID 1956 wrote to memory of 2636 1956 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe 31 PID 1956 wrote to memory of 2356 1956 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe 32 PID 1956 wrote to memory of 2356 1956 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe 32 PID 1956 wrote to memory of 2356 1956 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe 32 PID 1956 wrote to memory of 2356 1956 2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe 32 PID 2636 wrote to memory of 2648 2636 {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe 33 PID 2636 wrote to memory of 2648 2636 {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe 33 PID 2636 wrote to memory of 2648 2636 {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe 33 PID 2636 wrote to memory of 2648 2636 {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe 33 PID 2636 wrote to memory of 624 2636 {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe 34 PID 2636 wrote to memory of 624 2636 {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe 34 PID 2636 wrote to memory of 624 2636 {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe 34 PID 2636 wrote to memory of 624 2636 {B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe 34 PID 2648 wrote to memory of 2700 2648 {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe 35 PID 2648 wrote to memory of 2700 2648 {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe 35 PID 2648 wrote to memory of 2700 2648 {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe 35 PID 2648 wrote to memory of 2700 2648 {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe 35 PID 2648 wrote to memory of 2832 2648 {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe 36 PID 2648 wrote to memory of 2832 2648 {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe 36 PID 2648 wrote to memory of 2832 2648 {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe 36 PID 2648 wrote to memory of 2832 2648 {66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe 36 PID 2700 wrote to memory of 2588 2700 {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe 37 PID 2700 wrote to memory of 2588 2700 {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe 37 PID 2700 wrote to memory of 2588 2700 {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe 37 PID 2700 wrote to memory of 2588 2700 {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe 37 PID 2700 wrote to memory of 2864 2700 {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe 38 PID 2700 wrote to memory of 2864 2700 {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe 38 PID 2700 wrote to memory of 2864 2700 {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe 38 PID 2700 wrote to memory of 2864 2700 {82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe 38 PID 2588 wrote to memory of 2564 2588 {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe 39 PID 2588 wrote to memory of 2564 2588 {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe 39 PID 2588 wrote to memory of 2564 2588 {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe 39 PID 2588 wrote to memory of 2564 2588 {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe 39 PID 2588 wrote to memory of 2620 2588 {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe 40 PID 2588 wrote to memory of 2620 2588 {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe 40 PID 2588 wrote to memory of 2620 2588 {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe 40 PID 2588 wrote to memory of 2620 2588 {6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe 40 PID 2564 wrote to memory of 2272 2564 {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe 41 PID 2564 wrote to memory of 2272 2564 {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe 41 PID 2564 wrote to memory of 2272 2564 {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe 41 PID 2564 wrote to memory of 2272 2564 {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe 41 PID 2564 wrote to memory of 2816 2564 {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe 42 PID 2564 wrote to memory of 2816 2564 {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe 42 PID 2564 wrote to memory of 2816 2564 {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe 42 PID 2564 wrote to memory of 2816 2564 {B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe 42 PID 2272 wrote to memory of 1720 2272 {EB287971-639F-4767-9259-3B99EFECC1DC}.exe 43 PID 2272 wrote to memory of 1720 2272 {EB287971-639F-4767-9259-3B99EFECC1DC}.exe 43 PID 2272 wrote to memory of 1720 2272 {EB287971-639F-4767-9259-3B99EFECC1DC}.exe 43 PID 2272 wrote to memory of 1720 2272 {EB287971-639F-4767-9259-3B99EFECC1DC}.exe 43 PID 2272 wrote to memory of 2616 2272 {EB287971-639F-4767-9259-3B99EFECC1DC}.exe 44 PID 2272 wrote to memory of 2616 2272 {EB287971-639F-4767-9259-3B99EFECC1DC}.exe 44 PID 2272 wrote to memory of 2616 2272 {EB287971-639F-4767-9259-3B99EFECC1DC}.exe 44 PID 2272 wrote to memory of 2616 2272 {EB287971-639F-4767-9259-3B99EFECC1DC}.exe 44 PID 1720 wrote to memory of 2820 1720 {B4B7411F-F0DC-464c-87CC-74349929C226}.exe 45 PID 1720 wrote to memory of 2820 1720 {B4B7411F-F0DC-464c-87CC-74349929C226}.exe 45 PID 1720 wrote to memory of 2820 1720 {B4B7411F-F0DC-464c-87CC-74349929C226}.exe 45 PID 1720 wrote to memory of 2820 1720 {B4B7411F-F0DC-464c-87CC-74349929C226}.exe 45 PID 1720 wrote to memory of 2032 1720 {B4B7411F-F0DC-464c-87CC-74349929C226}.exe 46 PID 1720 wrote to memory of 2032 1720 {B4B7411F-F0DC-464c-87CC-74349929C226}.exe 46 PID 1720 wrote to memory of 2032 1720 {B4B7411F-F0DC-464c-87CC-74349929C226}.exe 46 PID 1720 wrote to memory of 2032 1720 {B4B7411F-F0DC-464c-87CC-74349929C226}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-24_fea30277256688ebef83ab9eba939fa9_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\{B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exeC:\Windows\{B5DC687D-1ADC-4a55-85B9-A43FBF9675A8}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\{66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exeC:\Windows\{66EB742F-6C87-4463-8EA1-78D9C9D3E8F4}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\{82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exeC:\Windows\{82CAA174-04F0-4a74-9017-E6C6A0C6C2B9}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\{6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exeC:\Windows\{6C7C3D3F-EAD3-475b-AABA-CB43B94FBB7F}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\{B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exeC:\Windows\{B32635D8-43E4-4ae5-9D5D-F7F82DE547D6}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\{EB287971-639F-4767-9259-3B99EFECC1DC}.exeC:\Windows\{EB287971-639F-4767-9259-3B99EFECC1DC}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\{B4B7411F-F0DC-464c-87CC-74349929C226}.exeC:\Windows\{B4B7411F-F0DC-464c-87CC-74349929C226}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\{2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}.exeC:\Windows\{2DD3C401-43B4-4dd2-B1E3-DCE61A6F8FD0}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2820 -
C:\Windows\{6EDDABAC-CE1F-4527-B197-8FDE507E77DA}.exeC:\Windows\{6EDDABAC-CE1F-4527-B197-8FDE507E77DA}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\{3D839639-6C76-48c1-9770-37FD710D8B35}.exeC:\Windows\{3D839639-6C76-48c1-9770-37FD710D8B35}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2204 -
C:\Windows\{0266D0FE-6468-4c90-8D6B-7DC55874CA17}.exeC:\Windows\{0266D0FE-6468-4c90-8D6B-7DC55874CA17}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3D839~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6EDDA~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2DD3C~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B4B74~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EB287~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B3263~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C7C3~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{82CAA~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{66EB7~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5DC6~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5225a026953837d01e106d2e047d5a2fc
SHA152cd9fd091b03aa567324203d450c171a1220449
SHA25691a35d7dbe54197069db5f8a3b4902e7a8570d148f568fbcb6f43a15fc423f74
SHA5124ef0cdaff53b7a1433e3faef3d99a1639828e4ccd93717cb26ed0439b5f99cf34788611e9eebb4edbdafd00f0f77c30df188b778a8270540e551418fb1e39e2d
-
Filesize
192KB
MD56ee9ed4153532636dee32b561a7b2384
SHA1b8ca32088f61c532b83d48578e290f50e25b7e65
SHA25668784b055a79cfdad8195f767de8aa81b250eef7a76789b2d10dea824c71dc13
SHA512e04218c3d1881d24c5dcfdc78ba2c8698901073c0d87737e6d451a76949e2042fc5292304964a84a843a239eb3c5e6ebcbfee8fe76ddcaf9ea2635fd7ba2e825
-
Filesize
192KB
MD5f4b97add3b9cdcfcec3996bf1c1a9d45
SHA150b229cf22559a6bd73d9a8b3e28c88c68a11e15
SHA2561bb7ed73f2924a3c176d350f8070825c77138d8843936ec2e9615ad66a0e47e7
SHA5129ebd030c98fd9e1075b16a6ff3484f86fc89ab4204a8cc47f5e3f6f0dc1ac491b79ff8ee50564360a281d564b8468ff708f5f11d4674a3e424cdbe90f77316ac
-
Filesize
192KB
MD5ba22e4caef302f240a0aa2cfdfbbc2dc
SHA10ef64195a66345af7e5ad5e7dfb0e0c8516c9963
SHA256c02dde13977d0fc8b16d5161472f5adca6b35aa2de1cab456fa12cee50ae9476
SHA512e2ba6efcbae2db2ee7d3209925b793d409cf3ca765cd627d9274861e62914cd4c2fe7f64274166076d5c1eb8263a672b374e2296fe12efb9b2655d2c1f714922
-
Filesize
192KB
MD502eb62b961386ddb8bf89620204ed044
SHA163c01f4c12375cda7fbf676b148c9895a90b62ce
SHA2562325e7a1a9ebaa2b072a0aebfd4397da7d847f7d623edf7838778d8467cfb2f9
SHA5126af9f2cbb7298fbc689f561742932059126d4816d835f07e1f1fd3ea3f03f23e954eeb29c5dab092bef09855b5a309aa1b308396a128f0215822814e02adf6ba
-
Filesize
192KB
MD51b62408ea978ae8d3926977207f849a3
SHA17bbf999b72c0882f99b3c43138399cccf0c3cca0
SHA25676a8266902c59ed8b5f61aa862fd292eedd1f96960af03aa8fb6ac90f48d5c63
SHA512978d49577d85766bc14915020290f93bb8ca2f6a26ba5f5a79c63166d0e6412216fa959661d9258eff8cc8909c616167c51b9e2d7e2e69d5e1701ff0d5c07112
-
Filesize
192KB
MD506a5093b84ca4faca0097d6b98b6c212
SHA19c301d3af19d17db9eb9e0be2fd66eaf1d49893c
SHA25699b7742944f4cb32cd883a0c1cd151b007653343df6eee9f447b7842234a2652
SHA51200bdd9007db7f04a86f58ddeb93fe376de81948d11e98dfd1642c989e657a11740817b0016edbef7b61501eb82047a7d21cc9c5a3166428e04440c114b41b1cb
-
Filesize
192KB
MD5f012969f8817d63e0b3af637c14e9f47
SHA1eae48cdb985801a08e36e5222dfa1ac521c7cff0
SHA256531903f90949358534d77dea59c91beb843e439cc6db10ffcb992ce228d45f3a
SHA512e6c8ee3860fdb5143757a17c4b372f079b028302bce25f02b947da99424f4d63ee56fff4042eace88342ca0a25f7cddc2fd64932b04666d0543f0ab5631d0627
-
Filesize
192KB
MD5ffda5e46bde337f27c32e66078f34645
SHA1c9d455f205c8c3f32baa896ac0d83ad42ebdc608
SHA25654acbdf6385541841fa91c684fe5dd91a63203a29e218d8a58abb9288179e3c2
SHA5123b9856193972c51a55995c95d227095858d612aa11467f3c904619ec95665b7773c8d807f3b645b21251bd4e98dabc9f9e3a4e13f8b91902ff78e3dc7bfb8280
-
Filesize
192KB
MD5f36e14dd4c5855b2f1fdd73e7a814457
SHA154d81a4a3385a8c9559b3813cb5f32321b8b9fe0
SHA25657b0d0f629724e8443511d1168a0c3b0f6d69b93bd34a33eeb54bdadaa8f0fa8
SHA512322a91abdad3fcbf120d9ac09db59eaea3221e31b51ea0faaddb7b091169438712ec936c400795c6d13cde976d33c754d4f4b629833c0251e947916936d8edf8
-
Filesize
192KB
MD5e796d9400446aa5160cf23397a78e8c6
SHA153c80de0ab7e912349622c8e383c852eb87a6421
SHA2560ea9ee71f8ca4e84725b99ca0eeabec9f5b5f536b287dab006e03b8b1ba3ea3c
SHA512393c496cd84b3f9b70a98b6dd3d3a1612a973e50ab64623c276c1aad328e6a5d7ad2952f9be64b183417cde169b9df382f386923d0371a6fdc3477385ffc8fa8