Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe
-
Size
380KB
-
MD5
6695bd046ca147122eb8d3f93d7adc91
-
SHA1
37a27964a0bb273d554ceeb2b249c3754b565d3d
-
SHA256
78e801372f856070a4e7921f0e1028a2880f917c2a174c0208c8d58b0982a41d
-
SHA512
bbfbd242a8a12adc940f14d83a98c376b64d50fe4fee638eaba8dab776e3186a2d12a916e6710d65b8c7f9e9ded4af18ae03c8dd3b2ac60d37dd362cc403b66c
-
SSDEEP
3072:mEGh0oI8lPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEct:mEGbl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FFA7EE4C-9440-4484-B57E-8716EB183E97} {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9547C278-3F34-43af-8488-F2DC085559C6}\stubpath = "C:\\Windows\\{9547C278-3F34-43af-8488-F2DC085559C6}.exe" 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}\stubpath = "C:\\Windows\\{1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe" {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5FF38B86-84A3-405e-A869-64A69B0CE89B}\stubpath = "C:\\Windows\\{5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe" {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDB546F8-9854-4e2b-A121-96D3817FBFC5} {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDB546F8-9854-4e2b-A121-96D3817FBFC5}\stubpath = "C:\\Windows\\{EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe" {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5FF38B86-84A3-405e-A869-64A69B0CE89B} {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A7596C87-1A39-424f-B628-E06A99B6B363} {70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DD1F78E-0642-4edc-9AA8-15F5C4766F92} {A7596C87-1A39-424f-B628-E06A99B6B363}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{17CCA477-AFD4-4131-9F6A-DB54F719343B} {9547C278-3F34-43af-8488-F2DC085559C6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{17CCA477-AFD4-4131-9F6A-DB54F719343B}\stubpath = "C:\\Windows\\{17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe" {9547C278-3F34-43af-8488-F2DC085559C6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5FD698FC-A2B1-4d72-97A0-CC37919446E5}\stubpath = "C:\\Windows\\{5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe" {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F3334F6B-031D-4106-B8C1-EA47544CE6A4}\stubpath = "C:\\Windows\\{F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe" {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FFA7EE4C-9440-4484-B57E-8716EB183E97}\stubpath = "C:\\Windows\\{FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe" {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{18218AFE-1367-4725-93F7-CDED55EEF5A9}\stubpath = "C:\\Windows\\{18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe" {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{70A6EF6D-3CD8-48df-991A-4F1DE3C722D6} {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}\stubpath = "C:\\Windows\\{70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe" {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9547C278-3F34-43af-8488-F2DC085559C6} 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5FD698FC-A2B1-4d72-97A0-CC37919446E5} {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60} {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F3334F6B-031D-4106-B8C1-EA47544CE6A4} {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{18218AFE-1367-4725-93F7-CDED55EEF5A9} {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A7596C87-1A39-424f-B628-E06A99B6B363}\stubpath = "C:\\Windows\\{A7596C87-1A39-424f-B628-E06A99B6B363}.exe" {70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DD1F78E-0642-4edc-9AA8-15F5C4766F92}\stubpath = "C:\\Windows\\{4DD1F78E-0642-4edc-9AA8-15F5C4766F92}.exe" {A7596C87-1A39-424f-B628-E06A99B6B363}.exe -
Executes dropped EXE 12 IoCs
pid Process 3972 {9547C278-3F34-43af-8488-F2DC085559C6}.exe 1588 {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe 4852 {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe 828 {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe 2484 {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe 2960 {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe 2780 {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe 3964 {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe 2732 {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe 4248 {70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe 4932 {A7596C87-1A39-424f-B628-E06A99B6B363}.exe 3724 {4DD1F78E-0642-4edc-9AA8-15F5C4766F92}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe File created C:\Windows\{5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe File created C:\Windows\{18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe File created C:\Windows\{A7596C87-1A39-424f-B628-E06A99B6B363}.exe {70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe File created C:\Windows\{EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe File created C:\Windows\{FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe File created C:\Windows\{70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe File created C:\Windows\{4DD1F78E-0642-4edc-9AA8-15F5C4766F92}.exe {A7596C87-1A39-424f-B628-E06A99B6B363}.exe File created C:\Windows\{9547C278-3F34-43af-8488-F2DC085559C6}.exe 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe File created C:\Windows\{17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe {9547C278-3F34-43af-8488-F2DC085559C6}.exe File created C:\Windows\{1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe File created C:\Windows\{F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4DD1F78E-0642-4edc-9AA8-15F5C4766F92}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A7596C87-1A39-424f-B628-E06A99B6B363}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9547C278-3F34-43af-8488-F2DC085559C6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4316 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe Token: SeIncBasePriorityPrivilege 3972 {9547C278-3F34-43af-8488-F2DC085559C6}.exe Token: SeIncBasePriorityPrivilege 1588 {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe Token: SeIncBasePriorityPrivilege 4852 {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe Token: SeIncBasePriorityPrivilege 828 {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe Token: SeIncBasePriorityPrivilege 2484 {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe Token: SeIncBasePriorityPrivilege 2960 {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe Token: SeIncBasePriorityPrivilege 2780 {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe Token: SeIncBasePriorityPrivilege 3964 {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe Token: SeIncBasePriorityPrivilege 2732 {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe Token: SeIncBasePriorityPrivilege 4248 {70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe Token: SeIncBasePriorityPrivilege 4932 {A7596C87-1A39-424f-B628-E06A99B6B363}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4316 wrote to memory of 3972 4316 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe 88 PID 4316 wrote to memory of 3972 4316 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe 88 PID 4316 wrote to memory of 3972 4316 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe 88 PID 4316 wrote to memory of 1944 4316 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe 89 PID 4316 wrote to memory of 1944 4316 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe 89 PID 4316 wrote to memory of 1944 4316 2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe 89 PID 3972 wrote to memory of 1588 3972 {9547C278-3F34-43af-8488-F2DC085559C6}.exe 97 PID 3972 wrote to memory of 1588 3972 {9547C278-3F34-43af-8488-F2DC085559C6}.exe 97 PID 3972 wrote to memory of 1588 3972 {9547C278-3F34-43af-8488-F2DC085559C6}.exe 97 PID 3972 wrote to memory of 3952 3972 {9547C278-3F34-43af-8488-F2DC085559C6}.exe 98 PID 3972 wrote to memory of 3952 3972 {9547C278-3F34-43af-8488-F2DC085559C6}.exe 98 PID 3972 wrote to memory of 3952 3972 {9547C278-3F34-43af-8488-F2DC085559C6}.exe 98 PID 1588 wrote to memory of 4852 1588 {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe 102 PID 1588 wrote to memory of 4852 1588 {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe 102 PID 1588 wrote to memory of 4852 1588 {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe 102 PID 1588 wrote to memory of 4856 1588 {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe 103 PID 1588 wrote to memory of 4856 1588 {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe 103 PID 1588 wrote to memory of 4856 1588 {17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe 103 PID 4852 wrote to memory of 828 4852 {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe 104 PID 4852 wrote to memory of 828 4852 {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe 104 PID 4852 wrote to memory of 828 4852 {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe 104 PID 4852 wrote to memory of 4072 4852 {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe 105 PID 4852 wrote to memory of 4072 4852 {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe 105 PID 4852 wrote to memory of 4072 4852 {5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe 105 PID 828 wrote to memory of 2484 828 {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe 106 PID 828 wrote to memory of 2484 828 {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe 106 PID 828 wrote to memory of 2484 828 {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe 106 PID 828 wrote to memory of 4420 828 {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe 107 PID 828 wrote to memory of 4420 828 {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe 107 PID 828 wrote to memory of 4420 828 {1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe 107 PID 2484 wrote to memory of 2960 2484 {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe 109 PID 2484 wrote to memory of 2960 2484 {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe 109 PID 2484 wrote to memory of 2960 2484 {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe 109 PID 2484 wrote to memory of 224 2484 {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe 110 PID 2484 wrote to memory of 224 2484 {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe 110 PID 2484 wrote to memory of 224 2484 {5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe 110 PID 2960 wrote to memory of 2780 2960 {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe 111 PID 2960 wrote to memory of 2780 2960 {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe 111 PID 2960 wrote to memory of 2780 2960 {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe 111 PID 2960 wrote to memory of 2232 2960 {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe 112 PID 2960 wrote to memory of 2232 2960 {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe 112 PID 2960 wrote to memory of 2232 2960 {F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe 112 PID 2780 wrote to memory of 3964 2780 {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe 120 PID 2780 wrote to memory of 3964 2780 {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe 120 PID 2780 wrote to memory of 3964 2780 {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe 120 PID 2780 wrote to memory of 4256 2780 {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe 121 PID 2780 wrote to memory of 4256 2780 {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe 121 PID 2780 wrote to memory of 4256 2780 {18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe 121 PID 3964 wrote to memory of 2732 3964 {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe 123 PID 3964 wrote to memory of 2732 3964 {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe 123 PID 3964 wrote to memory of 2732 3964 {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe 123 PID 3964 wrote to memory of 4120 3964 {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe 124 PID 3964 wrote to memory of 4120 3964 {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe 124 PID 3964 wrote to memory of 4120 3964 {EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe 124 PID 2732 wrote to memory of 4248 2732 {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe 125 PID 2732 wrote to memory of 4248 2732 {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe 125 PID 2732 wrote to memory of 4248 2732 {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe 125 PID 2732 wrote to memory of 2236 2732 {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe 126 PID 2732 wrote to memory of 2236 2732 {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe 126 PID 2732 wrote to memory of 2236 2732 {FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe 126 PID 4248 wrote to memory of 4932 4248 {70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe 130 PID 4248 wrote to memory of 4932 4248 {70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe 130 PID 4248 wrote to memory of 4932 4248 {70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe 130 PID 4248 wrote to memory of 1300 4248 {70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-24_6695bd046ca147122eb8d3f93d7adc91_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\{9547C278-3F34-43af-8488-F2DC085559C6}.exeC:\Windows\{9547C278-3F34-43af-8488-F2DC085559C6}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\{17CCA477-AFD4-4131-9F6A-DB54F719343B}.exeC:\Windows\{17CCA477-AFD4-4131-9F6A-DB54F719343B}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\{5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exeC:\Windows\{5FD698FC-A2B1-4d72-97A0-CC37919446E5}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\{1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exeC:\Windows\{1F1852A2-71A5-49f0-B7A6-ADE59E7E9F60}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\{5FF38B86-84A3-405e-A869-64A69B0CE89B}.exeC:\Windows\{5FF38B86-84A3-405e-A869-64A69B0CE89B}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\{F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exeC:\Windows\{F3334F6B-031D-4106-B8C1-EA47544CE6A4}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\{18218AFE-1367-4725-93F7-CDED55EEF5A9}.exeC:\Windows\{18218AFE-1367-4725-93F7-CDED55EEF5A9}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exeC:\Windows\{EDB546F8-9854-4e2b-A121-96D3817FBFC5}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\{FFA7EE4C-9440-4484-B57E-8716EB183E97}.exeC:\Windows\{FFA7EE4C-9440-4484-B57E-8716EB183E97}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\{70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exeC:\Windows\{70A6EF6D-3CD8-48df-991A-4F1DE3C722D6}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\{A7596C87-1A39-424f-B628-E06A99B6B363}.exeC:\Windows\{A7596C87-1A39-424f-B628-E06A99B6B363}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4932 -
C:\Windows\{4DD1F78E-0642-4edc-9AA8-15F5C4766F92}.exeC:\Windows\{4DD1F78E-0642-4edc-9AA8-15F5C4766F92}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A7596~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70A6E~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FFA7E~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EDB54~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{18218~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:4256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F3334~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5FF38~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1F185~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5FD69~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{17CCA~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9547C~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5a0a52669dcd0eb3fa6695cd9b308b4b5
SHA18a96085a29f93c2da9c3a49f7d40ba2d88850e54
SHA256e39c148941c3f95a947b8aca0f5df28507dc556ee6594d1ea5e749e90b2eee4c
SHA5126cc3eb0ad5b7f3de133bc90e7bb9c7801b0114dd995eb6eebef6ab7971d5d514d482c437746a49c3ff108819127034ed85eac02475852e877c151e97a7233dca
-
Filesize
380KB
MD5cf31dc6ff2c3c3fd206ab8527ad75e21
SHA170af620a5f479ef6e78900a618aa376dc515f719
SHA256d8634033c48220fcee2173abce0c80bce4e6590de3ec9336aef38a5419cb3d8f
SHA51232f23c0149049bd6420e35739bed7d63b969ffc3d044739d3fbbe70d35cb6eaa00fe870434ee5917770972c3760391f50a5d96c501a8aaa2357844bcd65800d4
-
Filesize
380KB
MD50317c93329ec4f46410d9135c09a1f88
SHA12bc76498ff862182bc60c2bd362783725f335274
SHA256988fcb4e48e7d88f1e56e8c88622c21faac9cccf94d3b7152950bb1b01d43ee7
SHA512943d7b54deef525434c77a1e826305042dc5241817cb38bb2c99b1f33ac4986f7f62413cded0450af7f5248af4d924cf4cac91de0b20d7fee88c558a6cb839fe
-
Filesize
380KB
MD5fd9c744c4b3eb3197275d849c40e6b60
SHA1cb272b760cb498eeca5f1ec2c1e9b66287663013
SHA256ac8bfe4e453bd43d2c29b338181f8553d2b566ac8a570de5889db56f859e9329
SHA5125ebc07201131e6afb6282da84c8c6d15fcae78f8d06332be643a08111388e27c7015cdd30a315871de89440459639120fc05f1d25ad290bdc088dfb7922cc95b
-
Filesize
380KB
MD5f1cb354942205f0fbe9282972e08c4f6
SHA17a29ae63bd18f4b660a7be1c790e67bf87e80f28
SHA256345a88ab3be4b0cc3ae0a5f3460ecd3a01fe85ccf624ead20c9d13a973db31f0
SHA5127371b84dc670dbd868603854c0c144f994fce5ca3e8d6d9a9ad70c4ed591bddfc5705007edf42b8da3783cac707646db8906125fc76265ed49d3c2e50a5f6732
-
Filesize
380KB
MD5192e174abb83e0107fc9a5de68b62277
SHA109229ce0c5bf55c57c9754492444a634cdd2d887
SHA256c55634174f375462141a53d38b32e53bfbef1bb75e6854881661727f01d8e681
SHA512ed4f14468994bceacaaf380a547423e51247ac74d1442e938ab1f58eae877e21cba276464ccb8a3685db73559469ca7e62516617f2a7ce87e6564af63f9b6ea8
-
Filesize
380KB
MD546e930dfe0ffed1aad19dd8b68a28fad
SHA1098d2e68e8721f8a3918600ef574b31313bb93ff
SHA256360b28f3ced747bba6a230976335671fe608e0ca2444578f78f7b84fe86be927
SHA512da4ee809fd0fed5b1562f12e3446bfd0c460172691d51a82dabfdd8fb785590d037517cce0d040efb119adae069d53ef4f2aa1fd89f50249c6825f893157fe49
-
Filesize
380KB
MD53c8c47b29fa42bb4b4912a5e15e36ff2
SHA1c88c2a86ffe0f552c74d807e115eb0bec47d0f5e
SHA2567ac2e5d6fb19ba7cfca67423de6974eb608a4f40689a1300a7ccac3895ffa7bd
SHA5121df1b3ceee894005e272f584b49dbd5e5b05a8021442ca3aa1a03b69b78baa43b0c3f8b4c52b81a6706afc5db0b7bae288ad96b2a7c85fcf86cb06ede84b7114
-
Filesize
380KB
MD5179e0141ea9bffe4007554c237e3cb87
SHA16b7a363119690da14c1b6f44c121f281020b212a
SHA2564124c910456cf0afcec9b25893dca195cc2dee3ba1748897813a79f119e3045c
SHA512f48c1665d7634a4dbf0a7cd7e71afdfbcabc320f0a62417ba56296762a319b3aa7369f2dae368f15e5453c18de8045591906eaa95816e531ad3b95288c76502c
-
Filesize
380KB
MD525b2f530f66ae199c77a067f9f54b0d7
SHA10b18c5635ad20170def9cd4a1022c686514d6e1a
SHA2565fac48c05fa8c9b640c1b896da454c880a4fc3632bfad56e1fb190e6ea820784
SHA5122f5871ffac6037092a6a8ea7154320895b427146eb7b89b422d9b7af8be3e4d7680c0afbcc70df4332c59b710f37e98b06575c3b50e5fa31a373cd43fc3a6907
-
Filesize
380KB
MD5ca9a00a538669715b4130606f52bf8e7
SHA1e0ff0a7197307a8a037eff55f87bb10a496d8674
SHA2562aef32b2c7906828d9478ea8f74005f27eb08e558d6d2fe1cc256123e1ddb1bd
SHA5126d60cf9f5c4e18691438c90b31f8154e180df996f929781d65058b5759f9a3204176c9e5ccc0ec773f15d15224a82de7941866b0d6690e059a86867e0072c8c1
-
Filesize
380KB
MD587db74346ceeee5fc7579249f3f6a01b
SHA13aa2dc4a9cc26a60780543022f6501a2a8a309c5
SHA256352e45d8ce174f667e3b0dd9293d428a24d0469e92cc052c9027355cab8ee3b8
SHA512f0cf586f7d9fa731a2ca50b6b1737f22e0aa0fa3a22848b2a4a5ea7bd5a4dce617d98671d2848987f558621bb8561f4666fa1fd97b91f6e13d913db14cea6911