Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 03:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe
-
Size
168KB
-
MD5
f4139cdf8a72fed5c8cd9150986821eb
-
SHA1
864d7506189aebfa391c662cd94329dfddb4beb9
-
SHA256
dac4d3aca6d6100937052c0c38667b60bbec05f2d94edc9b54369851326bc8b0
-
SHA512
9caadde6ba860c859b471fd768026d80dd8aef0859634ccc5b62fd89f854048b5d6c96d4897978960e5b9135b8acdd1904d978c6dcaa478af0a774cd21c46150
-
SSDEEP
1536:1EGh0oJlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oJlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DF2FAC6-63DE-4732-82A2-F231ED21D71C} {B5D99E26-19BF-4841-8449-9532AC86541D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F9E2363-61CB-42cc-8FE5-C3FA8F477F6F} {2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E51EDB3-A0FB-4e26-8D36-C267AC72C967} {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}\stubpath = "C:\\Windows\\{7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe" {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4225B474-3417-4fb1-A36E-C38C9A08D8C9}\stubpath = "C:\\Windows\\{4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe" {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB948308-3059-4a2b-8AF5-6260DAF1329B} {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB948308-3059-4a2b-8AF5-6260DAF1329B}\stubpath = "C:\\Windows\\{BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe" {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B8FB41CF-A091-4814-B44E-82B73A635CA3}\stubpath = "C:\\Windows\\{B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe" {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{17C0DFAE-607D-43a8-9C19-940A7EB8485E} {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{17C0DFAE-607D-43a8-9C19-940A7EB8485E}\stubpath = "C:\\Windows\\{17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe" {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB} {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F9E2363-61CB-42cc-8FE5-C3FA8F477F6F}\stubpath = "C:\\Windows\\{4F9E2363-61CB-42cc-8FE5-C3FA8F477F6F}.exe" {2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{42304C44-626E-49a6-A11B-6CCE58B84D63}\stubpath = "C:\\Windows\\{42304C44-626E-49a6-A11B-6CCE58B84D63}.exe" 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4225B474-3417-4fb1-A36E-C38C9A08D8C9} {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E51EDB3-A0FB-4e26-8D36-C267AC72C967}\stubpath = "C:\\Windows\\{9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe" {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0AC4E1C-9B4B-4623-819D-0D6848EF7934}\stubpath = "C:\\Windows\\{D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe" {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5D99E26-19BF-4841-8449-9532AC86541D} {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5D99E26-19BF-4841-8449-9532AC86541D}\stubpath = "C:\\Windows\\{B5D99E26-19BF-4841-8449-9532AC86541D}.exe" {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{42304C44-626E-49a6-A11B-6CCE58B84D63} 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B8FB41CF-A091-4814-B44E-82B73A635CA3} {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DF2FAC6-63DE-4732-82A2-F231ED21D71C}\stubpath = "C:\\Windows\\{6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe" {B5D99E26-19BF-4841-8449-9532AC86541D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C} {6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}\stubpath = "C:\\Windows\\{2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}.exe" {6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0AC4E1C-9B4B-4623-819D-0D6848EF7934} {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe -
Executes dropped EXE 12 IoCs
pid Process 4692 {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe 4112 {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe 2412 {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe 532 {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe 4544 {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe 4516 {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe 1084 {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe 3448 {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe 3476 {B5D99E26-19BF-4841-8449-9532AC86541D}.exe 5116 {6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe 4544 {2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}.exe 4356 {4F9E2363-61CB-42cc-8FE5-C3FA8F477F6F}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe {B5D99E26-19BF-4841-8449-9532AC86541D}.exe File created C:\Windows\{7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe File created C:\Windows\{4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe File created C:\Windows\{D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe File created C:\Windows\{BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe File created C:\Windows\{17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe File created C:\Windows\{4F9E2363-61CB-42cc-8FE5-C3FA8F477F6F}.exe {2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}.exe File created C:\Windows\{42304C44-626E-49a6-A11B-6CCE58B84D63}.exe 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe File created C:\Windows\{9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe File created C:\Windows\{B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe File created C:\Windows\{B5D99E26-19BF-4841-8449-9532AC86541D}.exe {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe File created C:\Windows\{2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}.exe {6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4F9E2363-61CB-42cc-8FE5-C3FA8F477F6F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B5D99E26-19BF-4841-8449-9532AC86541D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2740 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe Token: SeIncBasePriorityPrivilege 4692 {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe Token: SeIncBasePriorityPrivilege 4112 {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe Token: SeIncBasePriorityPrivilege 2412 {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe Token: SeIncBasePriorityPrivilege 532 {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe Token: SeIncBasePriorityPrivilege 4544 {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe Token: SeIncBasePriorityPrivilege 4516 {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe Token: SeIncBasePriorityPrivilege 1084 {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe Token: SeIncBasePriorityPrivilege 3448 {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe Token: SeIncBasePriorityPrivilege 3476 {B5D99E26-19BF-4841-8449-9532AC86541D}.exe Token: SeIncBasePriorityPrivilege 5116 {6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe Token: SeIncBasePriorityPrivilege 4544 {2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 4692 2740 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe 95 PID 2740 wrote to memory of 4692 2740 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe 95 PID 2740 wrote to memory of 4692 2740 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe 95 PID 2740 wrote to memory of 1416 2740 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe 96 PID 2740 wrote to memory of 1416 2740 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe 96 PID 2740 wrote to memory of 1416 2740 2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe 96 PID 4692 wrote to memory of 4112 4692 {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe 97 PID 4692 wrote to memory of 4112 4692 {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe 97 PID 4692 wrote to memory of 4112 4692 {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe 97 PID 4692 wrote to memory of 2044 4692 {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe 98 PID 4692 wrote to memory of 2044 4692 {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe 98 PID 4692 wrote to memory of 2044 4692 {42304C44-626E-49a6-A11B-6CCE58B84D63}.exe 98 PID 4112 wrote to memory of 2412 4112 {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe 102 PID 4112 wrote to memory of 2412 4112 {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe 102 PID 4112 wrote to memory of 2412 4112 {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe 102 PID 4112 wrote to memory of 3792 4112 {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe 103 PID 4112 wrote to memory of 3792 4112 {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe 103 PID 4112 wrote to memory of 3792 4112 {7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe 103 PID 2412 wrote to memory of 532 2412 {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe 104 PID 2412 wrote to memory of 532 2412 {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe 104 PID 2412 wrote to memory of 532 2412 {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe 104 PID 2412 wrote to memory of 4468 2412 {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe 105 PID 2412 wrote to memory of 4468 2412 {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe 105 PID 2412 wrote to memory of 4468 2412 {4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe 105 PID 532 wrote to memory of 4544 532 {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe 106 PID 532 wrote to memory of 4544 532 {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe 106 PID 532 wrote to memory of 4544 532 {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe 106 PID 532 wrote to memory of 1824 532 {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe 107 PID 532 wrote to memory of 1824 532 {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe 107 PID 532 wrote to memory of 1824 532 {9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe 107 PID 4544 wrote to memory of 4516 4544 {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe 109 PID 4544 wrote to memory of 4516 4544 {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe 109 PID 4544 wrote to memory of 4516 4544 {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe 109 PID 4544 wrote to memory of 2320 4544 {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe 110 PID 4544 wrote to memory of 2320 4544 {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe 110 PID 4544 wrote to memory of 2320 4544 {D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe 110 PID 4516 wrote to memory of 1084 4516 {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe 111 PID 4516 wrote to memory of 1084 4516 {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe 111 PID 4516 wrote to memory of 1084 4516 {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe 111 PID 4516 wrote to memory of 2436 4516 {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe 112 PID 4516 wrote to memory of 2436 4516 {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe 112 PID 4516 wrote to memory of 2436 4516 {BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe 112 PID 1084 wrote to memory of 3448 1084 {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe 118 PID 1084 wrote to memory of 3448 1084 {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe 118 PID 1084 wrote to memory of 3448 1084 {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe 118 PID 1084 wrote to memory of 4112 1084 {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe 119 PID 1084 wrote to memory of 4112 1084 {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe 119 PID 1084 wrote to memory of 4112 1084 {B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe 119 PID 3448 wrote to memory of 3476 3448 {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe 123 PID 3448 wrote to memory of 3476 3448 {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe 123 PID 3448 wrote to memory of 3476 3448 {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe 123 PID 3448 wrote to memory of 1824 3448 {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe 124 PID 3448 wrote to memory of 1824 3448 {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe 124 PID 3448 wrote to memory of 1824 3448 {17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe 124 PID 3476 wrote to memory of 5116 3476 {B5D99E26-19BF-4841-8449-9532AC86541D}.exe 125 PID 3476 wrote to memory of 5116 3476 {B5D99E26-19BF-4841-8449-9532AC86541D}.exe 125 PID 3476 wrote to memory of 5116 3476 {B5D99E26-19BF-4841-8449-9532AC86541D}.exe 125 PID 3476 wrote to memory of 1036 3476 {B5D99E26-19BF-4841-8449-9532AC86541D}.exe 126 PID 3476 wrote to memory of 1036 3476 {B5D99E26-19BF-4841-8449-9532AC86541D}.exe 126 PID 3476 wrote to memory of 1036 3476 {B5D99E26-19BF-4841-8449-9532AC86541D}.exe 126 PID 5116 wrote to memory of 4544 5116 {6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe 129 PID 5116 wrote to memory of 4544 5116 {6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe 129 PID 5116 wrote to memory of 4544 5116 {6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe 129 PID 5116 wrote to memory of 5004 5116 {6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-26_f4139cdf8a72fed5c8cd9150986821eb_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\{42304C44-626E-49a6-A11B-6CCE58B84D63}.exeC:\Windows\{42304C44-626E-49a6-A11B-6CCE58B84D63}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\{7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exeC:\Windows\{7AE75A68-8789-48f7-B4AC-3F4A73FDAFCB}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\{4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exeC:\Windows\{4225B474-3417-4fb1-A36E-C38C9A08D8C9}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\{9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exeC:\Windows\{9E51EDB3-A0FB-4e26-8D36-C267AC72C967}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\{D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exeC:\Windows\{D0AC4E1C-9B4B-4623-819D-0D6848EF7934}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\{BB948308-3059-4a2b-8AF5-6260DAF1329B}.exeC:\Windows\{BB948308-3059-4a2b-8AF5-6260DAF1329B}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\{B8FB41CF-A091-4814-B44E-82B73A635CA3}.exeC:\Windows\{B8FB41CF-A091-4814-B44E-82B73A635CA3}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\{17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exeC:\Windows\{17C0DFAE-607D-43a8-9C19-940A7EB8485E}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\{B5D99E26-19BF-4841-8449-9532AC86541D}.exeC:\Windows\{B5D99E26-19BF-4841-8449-9532AC86541D}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\{6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exeC:\Windows\{6DF2FAC6-63DE-4732-82A2-F231ED21D71C}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\{2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}.exeC:\Windows\{2F1CB05B-5D20-4c26-8A03-DEF25BCAA61C}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Windows\{4F9E2363-61CB-42cc-8FE5-C3FA8F477F6F}.exeC:\Windows\{4F9E2363-61CB-42cc-8FE5-C3FA8F477F6F}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2F1CB~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6DF2F~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5D99~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{17C0D~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B8FB4~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:4112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BB948~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D0AC4~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E51E~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4225B~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7AE75~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{42304~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5aeb57d5da39bc75fd605c2ed6674094e
SHA118836bf624c8dd8c90b812839d434bf268bb705a
SHA256af2f2b5f95d781f84a467c7175365b3dbc1be64866531d7767d01afb1fc12044
SHA512ba89dd641b0b0942f255f6f4c763bd14b8a3762d91da470b6704f3f9aec42fb76e99f41b954e3b936ef6c142544fbd1b0516e2f62fb6a4b7d7a36f778bd08d7b
-
Filesize
168KB
MD5fdae3bb7146fe176a85b6a7a0e265c6e
SHA1e65b6c9c1ee624fdc826a996cfd5d68f0e44b310
SHA2562d7456066e0afb2280a202840e0ced9208dfced5b508f2f749bf845513153893
SHA512c2b35cab18616f52fe2eb6794d6b4b2b42de23ed6d59554954fe474644d10466fee014a2d14449155b2c9625e64a3113b0fe15ca989ebc301ac8e35e37f89433
-
Filesize
168KB
MD59ef5fa727d8b7bb928fe66b94562b0ec
SHA1b2b9e6af5658115169efa19aa939363e9eaa04e5
SHA256d5f6418de00152d0abfc67268bb5044d8a5491c45f4acf10d0e694494d8c6116
SHA5122051dd2b773ededca75c1bab14b67c4ae5c89559fb1f2aad6cd62b2ed7483aa1fb3eb5b82d0a6acb46e659845d85a3314ea8211b4f8368a47ef5e26a5ac9b36f
-
Filesize
168KB
MD51f818719500f93cacfc65706e10661cf
SHA17870342fb54f4839125cf55332b333b9a79eac7f
SHA2567cde6a6af8ad09221ae969f13dc7a391b6f0f42896f658ae5efa96a65317879a
SHA5120e3b889f39a9f58af55a9966e8d53331da94158246b788e6a7c402f396c76836940dd3eae404fb9ae4b23da0d831d44162a9c65256fb327f7f2ca18a0f9669f8
-
Filesize
168KB
MD53c6d2098ceba893d257879cd09061bc9
SHA1b0a585e812407722948d6f70305eeb061a24a30d
SHA256da8e7ab6fbacb44c9d1e9247f9b6189dc4fee8bf69369e9e990d01d775fbe4a1
SHA512a5e90b1a67e7f52e60f36e601dd68f9978dcc6badea6ecba9e2594f8899830db332de7d0a9d2a914a27c12ece3aef2a9a5b91f615c5dd4f9762a51c4ffdfbc7b
-
Filesize
168KB
MD5f223a6ac3c984194a849464ebdb7d589
SHA102aa8630a1c12107a1c37838bf6eb6580fac60d5
SHA256070c618475a339d332e30d48bc7d66f227f99235825ea283b271ae3ba9c7c6dd
SHA51262809352274e294fb4aafa3c679798381e1047210bb9a9b4af9abc7777cbbe542bbdd5e323e8ddf5f795c821efb5e751f92d4cf5a6f6ce7a211ef5853420d0ed
-
Filesize
168KB
MD5c54e7ff7ab112eacb4b316d40a77624c
SHA1181fa7b28bcb8a05b519a331a2fe83b649d651af
SHA25693dd94230d7b2f5b13fb5002d08bc7999ccd7cd7ea4e78624b058c8851640da4
SHA512ca8300e5211a8b5bc37907fe770236490bc323ec20279ef6d1cba5de3f7151d53c94b6f171a7c409007e2859104101c16003199636eb984f4b9678da7e120ad7
-
Filesize
168KB
MD552f35197947e93ca1b98dad2d21b2830
SHA134154a0408337be88fe2b8b8e3250286c081bf7b
SHA25653dd63cd51fd07e1d861fa0dee68b2ecd38ad112a72fc331b359a5f4e0cd7712
SHA5120a46a55d77f3e50c856c7d85f546bce557be28308c2a778be705f8e9cfaaf617baa2f9c74f958a481691b1515d14967b145326fa6fe69d1bd6846850cd6a3fd9
-
Filesize
168KB
MD50e69833cd8bab4fe22cb2a23ae6d1acb
SHA16f086161221a1a7d9b4c77c01b5564b16d0a9640
SHA25634cd5c9d913e4a1ed0c793ca4222ec9860e552e0e75ffd590052cef651d2d115
SHA512741357284383c4fc74d3c39c0f1dd0740851251c396d5f58c485394c99b3d9c95df8a999b7a4b7015a35680f0c0c994da477c14797eeeb5fdd62756c84ea98f1
-
Filesize
168KB
MD54b93b68640d8da567131d70779b53d35
SHA1d75218d2848252130d89fe0c29ee2283e987030d
SHA2568e7395fb738d776a5343f3c75bd8b6baa27e0dd0b9030c81eca38c3f356feffe
SHA51269a07e484c8eb97007d1a2d901ba5af307e199beee83c5449abb5899a8640ae98d79dc342e103bd2e279cf37a5277776ea6434dfe414db1b4ff377f6ef0f0c41
-
Filesize
168KB
MD556a60f97d1b83e970757b7564cb1bc42
SHA1de17e502c0255a289898154e77cc586efa2131d9
SHA25674c3db5ef4ff4974152cd0971228a3988b62b3b97bd378b3cf1c37ab7dfa9a62
SHA5125c2d4a52b9c348ef7f15195e6efaf53201a95a1c131deb0e2c9533ca1662594f6154ecacccb9ecdcc3acc85b207b5d73676434f2077bf4e3c14c0df618e57f40
-
Filesize
168KB
MD541aa4920ce633eb0831e78d41e979d6d
SHA1bb0f5a8eddbecee538d9b99accc6576f8dc16e5c
SHA2565c48aadc75ee0fa6b4b102f7a5d136fe86c98b90f84576050efc77f8c685c24e
SHA5120daf31a275aeb83dcff5597732370e600422f227ed79dd886bfbea3542a8ca9d9575a06365df6f95eb0554f17906ea1997283031157966b479e5adc1054dcf37