Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe
-
Size
192KB
-
MD5
94732171b0c3d44d3214a78e7ce6cfe5
-
SHA1
7e3e0a24ceb2dd9e25cd64e1f88d9ff666b3b224
-
SHA256
de0f85e2fcfc1fdd6eba7d140223452b8decda18dc5b56b702f249952057632c
-
SHA512
7e4accc994446e7f6475b2002496a4a20ddf0af99e1ff0db9badbf58edf07f47122ed268f3fd7bece1d264df3ed5311f9381ea0a23d573291e98a90b5f2a09de
-
SSDEEP
1536:1EGh0ojl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0ojl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D8240507-8F2A-44db-B7BB-92613133854E} 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9493E7C3-C19B-44f0-AE49-B39FD41C2F99} {D8240507-8F2A-44db-B7BB-92613133854E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01DA5A6C-2615-4d84-BF5C-2E03C3D31419} {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1E820763-5AC1-4b52-BD04-4947C1AB44E1}\stubpath = "C:\\Windows\\{1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe" {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93AD511D-F011-45c9-AD15-7AFC4FACDC4C} {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01DA5A6C-2615-4d84-BF5C-2E03C3D31419}\stubpath = "C:\\Windows\\{01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe" {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E250201-B38D-477a-9965-16D7D275DABA}\stubpath = "C:\\Windows\\{3E250201-B38D-477a-9965-16D7D275DABA}.exe" {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E6C44BCC-FAAE-4c30-8D87-5EC1680431EF} {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}\stubpath = "C:\\Windows\\{E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe" {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{62DF0364-F668-417c-A5FE-B4461C4440F7}\stubpath = "C:\\Windows\\{62DF0364-F668-417c-A5FE-B4461C4440F7}.exe" {E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{044A73EE-44BE-4c1e-8DD6-B17C2B994FDF} {62DF0364-F668-417c-A5FE-B4461C4440F7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D8240507-8F2A-44db-B7BB-92613133854E}\stubpath = "C:\\Windows\\{D8240507-8F2A-44db-B7BB-92613133854E}.exe" 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E250201-B38D-477a-9965-16D7D275DABA} {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}\stubpath = "C:\\Windows\\{591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe" {3E250201-B38D-477a-9965-16D7D275DABA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1E820763-5AC1-4b52-BD04-4947C1AB44E1} {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{044A73EE-44BE-4c1e-8DD6-B17C2B994FDF}\stubpath = "C:\\Windows\\{044A73EE-44BE-4c1e-8DD6-B17C2B994FDF}.exe" {62DF0364-F668-417c-A5FE-B4461C4440F7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9493E7C3-C19B-44f0-AE49-B39FD41C2F99}\stubpath = "C:\\Windows\\{9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe" {D8240507-8F2A-44db-B7BB-92613133854E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93AD511D-F011-45c9-AD15-7AFC4FACDC4C}\stubpath = "C:\\Windows\\{93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe" {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB7E1290-1C38-4b9d-925C-6893CBBB6327} {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB7E1290-1C38-4b9d-925C-6893CBBB6327}\stubpath = "C:\\Windows\\{BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe" {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{591E9FC8-0C30-4a1d-B5B7-2B2D31C88018} {3E250201-B38D-477a-9965-16D7D275DABA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4A7110D-A993-4301-9132-DDEC9A7F1DF5} {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4A7110D-A993-4301-9132-DDEC9A7F1DF5}\stubpath = "C:\\Windows\\{B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe" {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{62DF0364-F668-417c-A5FE-B4461C4440F7} {E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe -
Executes dropped EXE 12 IoCs
pid Process 1760 {D8240507-8F2A-44db-B7BB-92613133854E}.exe 2516 {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe 408 {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe 2596 {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe 1460 {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe 1084 {3E250201-B38D-477a-9965-16D7D275DABA}.exe 1088 {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe 4648 {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe 1100 {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe 4476 {E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe 2108 {62DF0364-F668-417c-A5FE-B4461C4440F7}.exe 1860 {044A73EE-44BE-4c1e-8DD6-B17C2B994FDF}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe File created C:\Windows\{E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe File created C:\Windows\{62DF0364-F668-417c-A5FE-B4461C4440F7}.exe {E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe File created C:\Windows\{044A73EE-44BE-4c1e-8DD6-B17C2B994FDF}.exe {62DF0364-F668-417c-A5FE-B4461C4440F7}.exe File created C:\Windows\{BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe File created C:\Windows\{3E250201-B38D-477a-9965-16D7D275DABA}.exe {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe File created C:\Windows\{591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe {3E250201-B38D-477a-9965-16D7D275DABA}.exe File created C:\Windows\{01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe File created C:\Windows\{1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe File created C:\Windows\{D8240507-8F2A-44db-B7BB-92613133854E}.exe 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe File created C:\Windows\{9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe {D8240507-8F2A-44db-B7BB-92613133854E}.exe File created C:\Windows\{93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3E250201-B38D-477a-9965-16D7D275DABA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {62DF0364-F668-417c-A5FE-B4461C4440F7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {044A73EE-44BE-4c1e-8DD6-B17C2B994FDF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D8240507-8F2A-44db-B7BB-92613133854E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3652 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe Token: SeIncBasePriorityPrivilege 1760 {D8240507-8F2A-44db-B7BB-92613133854E}.exe Token: SeIncBasePriorityPrivilege 2516 {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe Token: SeIncBasePriorityPrivilege 408 {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe Token: SeIncBasePriorityPrivilege 2596 {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe Token: SeIncBasePriorityPrivilege 1460 {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe Token: SeIncBasePriorityPrivilege 1084 {3E250201-B38D-477a-9965-16D7D275DABA}.exe Token: SeIncBasePriorityPrivilege 1088 {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe Token: SeIncBasePriorityPrivilege 4648 {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe Token: SeIncBasePriorityPrivilege 1100 {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe Token: SeIncBasePriorityPrivilege 4476 {E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe Token: SeIncBasePriorityPrivilege 2108 {62DF0364-F668-417c-A5FE-B4461C4440F7}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3652 wrote to memory of 1760 3652 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe 103 PID 3652 wrote to memory of 1760 3652 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe 103 PID 3652 wrote to memory of 1760 3652 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe 103 PID 3652 wrote to memory of 3888 3652 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe 104 PID 3652 wrote to memory of 3888 3652 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe 104 PID 3652 wrote to memory of 3888 3652 2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe 104 PID 1760 wrote to memory of 2516 1760 {D8240507-8F2A-44db-B7BB-92613133854E}.exe 105 PID 1760 wrote to memory of 2516 1760 {D8240507-8F2A-44db-B7BB-92613133854E}.exe 105 PID 1760 wrote to memory of 2516 1760 {D8240507-8F2A-44db-B7BB-92613133854E}.exe 105 PID 1760 wrote to memory of 2732 1760 {D8240507-8F2A-44db-B7BB-92613133854E}.exe 106 PID 1760 wrote to memory of 2732 1760 {D8240507-8F2A-44db-B7BB-92613133854E}.exe 106 PID 1760 wrote to memory of 2732 1760 {D8240507-8F2A-44db-B7BB-92613133854E}.exe 106 PID 2516 wrote to memory of 408 2516 {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe 110 PID 2516 wrote to memory of 408 2516 {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe 110 PID 2516 wrote to memory of 408 2516 {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe 110 PID 2516 wrote to memory of 3268 2516 {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe 111 PID 2516 wrote to memory of 3268 2516 {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe 111 PID 2516 wrote to memory of 3268 2516 {9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe 111 PID 408 wrote to memory of 2596 408 {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe 112 PID 408 wrote to memory of 2596 408 {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe 112 PID 408 wrote to memory of 2596 408 {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe 112 PID 408 wrote to memory of 4856 408 {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe 113 PID 408 wrote to memory of 4856 408 {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe 113 PID 408 wrote to memory of 4856 408 {93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe 113 PID 2596 wrote to memory of 1460 2596 {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe 114 PID 2596 wrote to memory of 1460 2596 {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe 114 PID 2596 wrote to memory of 1460 2596 {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe 114 PID 2596 wrote to memory of 2844 2596 {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe 115 PID 2596 wrote to memory of 2844 2596 {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe 115 PID 2596 wrote to memory of 2844 2596 {01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe 115 PID 1460 wrote to memory of 1084 1460 {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe 117 PID 1460 wrote to memory of 1084 1460 {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe 117 PID 1460 wrote to memory of 1084 1460 {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe 117 PID 1460 wrote to memory of 2924 1460 {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe 118 PID 1460 wrote to memory of 2924 1460 {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe 118 PID 1460 wrote to memory of 2924 1460 {BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe 118 PID 1084 wrote to memory of 1088 1084 {3E250201-B38D-477a-9965-16D7D275DABA}.exe 119 PID 1084 wrote to memory of 1088 1084 {3E250201-B38D-477a-9965-16D7D275DABA}.exe 119 PID 1084 wrote to memory of 1088 1084 {3E250201-B38D-477a-9965-16D7D275DABA}.exe 119 PID 1084 wrote to memory of 1504 1084 {3E250201-B38D-477a-9965-16D7D275DABA}.exe 120 PID 1084 wrote to memory of 1504 1084 {3E250201-B38D-477a-9965-16D7D275DABA}.exe 120 PID 1084 wrote to memory of 1504 1084 {3E250201-B38D-477a-9965-16D7D275DABA}.exe 120 PID 1088 wrote to memory of 4648 1088 {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe 123 PID 1088 wrote to memory of 4648 1088 {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe 123 PID 1088 wrote to memory of 4648 1088 {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe 123 PID 1088 wrote to memory of 2604 1088 {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe 124 PID 1088 wrote to memory of 2604 1088 {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe 124 PID 1088 wrote to memory of 2604 1088 {591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe 124 PID 4648 wrote to memory of 1100 4648 {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe 130 PID 4648 wrote to memory of 1100 4648 {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe 130 PID 4648 wrote to memory of 1100 4648 {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe 130 PID 4648 wrote to memory of 1020 4648 {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe 131 PID 4648 wrote to memory of 1020 4648 {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe 131 PID 4648 wrote to memory of 1020 4648 {1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe 131 PID 1100 wrote to memory of 4476 1100 {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe 132 PID 1100 wrote to memory of 4476 1100 {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe 132 PID 1100 wrote to memory of 4476 1100 {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe 132 PID 1100 wrote to memory of 1180 1100 {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe 133 PID 1100 wrote to memory of 1180 1100 {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe 133 PID 1100 wrote to memory of 1180 1100 {B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe 133 PID 4476 wrote to memory of 2108 4476 {E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe 135 PID 4476 wrote to memory of 2108 4476 {E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe 135 PID 4476 wrote to memory of 2108 4476 {E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe 135 PID 4476 wrote to memory of 2204 4476 {E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-29_94732171b0c3d44d3214a78e7ce6cfe5_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\{D8240507-8F2A-44db-B7BB-92613133854E}.exeC:\Windows\{D8240507-8F2A-44db-B7BB-92613133854E}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\{9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exeC:\Windows\{9493E7C3-C19B-44f0-AE49-B39FD41C2F99}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\{93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exeC:\Windows\{93AD511D-F011-45c9-AD15-7AFC4FACDC4C}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\{01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exeC:\Windows\{01DA5A6C-2615-4d84-BF5C-2E03C3D31419}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\{BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exeC:\Windows\{BB7E1290-1C38-4b9d-925C-6893CBBB6327}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\{3E250201-B38D-477a-9965-16D7D275DABA}.exeC:\Windows\{3E250201-B38D-477a-9965-16D7D275DABA}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\{591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exeC:\Windows\{591E9FC8-0C30-4a1d-B5B7-2B2D31C88018}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\{1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exeC:\Windows\{1E820763-5AC1-4b52-BD04-4947C1AB44E1}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\{B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exeC:\Windows\{B4A7110D-A993-4301-9132-DDEC9A7F1DF5}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\{E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exeC:\Windows\{E6C44BCC-FAAE-4c30-8D87-5EC1680431EF}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\{62DF0364-F668-417c-A5FE-B4461C4440F7}.exeC:\Windows\{62DF0364-F668-417c-A5FE-B4461C4440F7}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\{044A73EE-44BE-4c1e-8DD6-B17C2B994FDF}.exeC:\Windows\{044A73EE-44BE-4c1e-8DD6-B17C2B994FDF}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{62DF0~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E6C44~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B4A71~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1E820~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{591E9~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3E250~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BB7E1~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{01DA5~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{93AD5~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9493E~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D8240~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:81⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD51d1fafedb225d678c69b1ebc77d97b98
SHA1e0eb1a2a33c3ded8692ce21bca5e482a148e7ea0
SHA256a10e97bae1a25ae4956d0769085321f7f4f3a191d2d739e3e6f31b682c75219d
SHA5126cf0ffb3c7c996671bb64f08e3e25e6a5cdb77ccd65edf8575d3e19c83672f84ae181125b33263e898d280744229c168815703da2ffbc786773318a848f19130
-
Filesize
192KB
MD50785e4113a14e5e30d629f1d354b4010
SHA1947849e07bbffffcdaae681296a7188c8f322a4a
SHA256c6f7711b8342e50aee8ad96ee1e911c36a669a0a856f52f3882c339aa5ebf89a
SHA51263fdc5e8cf82cee0c606cee1cdc58ea679562d5a0196646020d7d3e49582893faaf22c025cc7c3e1a61f1eda0a8e49f6b29f7cad5f39eb31180b0564223f834a
-
Filesize
192KB
MD59b1870ee63bdbb20211dac2338a0adc5
SHA12fd88adfac1f4c1f9245c350391215af70b71afb
SHA256ec7e1871ee226464041c068a749a5c3a2667fb3f025e9777fdd900c2f7c0e19a
SHA51283cc4ad50bdf81d0721eb88f0632594b5d0c8a990bd0aa831c372ec0ffe84b74c72adf0671818fb84cc4e389a246e12e2d3de1dc3313363047ad14fa856d7727
-
Filesize
192KB
MD593bfac032bb5082cb026509c3a7ae0ab
SHA1a7b0f742b9afd84537777f730eac7d780a22c011
SHA2569d367f4b4360da63747cef98a5b91a6d5b1aa5c1ce65aa3935c8a7b9d86de8be
SHA5123a7fd1a9669cc0c3e3bb5c0652e608e90be4a326e8fafc34dd0aff5c7bcb2511978e6abc9ec02d6905c3a0eaeb4bab950235441716bd06dbc8048e899e0eb970
-
Filesize
192KB
MD515476ca96b6c1165748c34c846233231
SHA1b58bfe47348b1fc137bb56ab29ade77c6e049c1d
SHA256bcf5fb0fce3302bd83a95c93cfa6c46c7f4be29107e302bff08a03d7f46bfe6c
SHA5120f7a8bb9d77f36e936601bc050bea56bec7e57a6bfddb472baf34e87fcb6751c0f3d790b5a3f9504a9f8afde347e424b308d4c7df39dd0539c29325d0959dbc1
-
Filesize
192KB
MD54156c4ed312b63f45ee93e85d482abbf
SHA12eb3aa382c21ad1d594c57b42f22ac6fcb1513ab
SHA256af80c8b1a58f5174cd02521e285dbe9804c0a4b94bdf4733784c4d2b3a3b127c
SHA51293277f5f4c11bf7d2f1fcfa5e011a7c647399df7eb829d8144d7723c7c483d1e25459532958ea5a24833cd9e047dd2c6ae7706ac077f47dc711da74f1fac9f02
-
Filesize
192KB
MD5a6f9c01d3db496d58a9d3a242f232386
SHA1e2db13e2ab5977a3e64ccad06d0f1e59ad6c8b28
SHA2567c08be80f2e4cc7532616086e3de26882ff93c407ae389b843158aea67e73645
SHA5125eb669b54b17d90625e6b60d79e758cec0a783bd9b560f7c3b60fa1ecf9251522068897f12d19ca177b29dc3e48d4f6628de877526c20fe47633e0579f3e4435
-
Filesize
192KB
MD53a2b063db85d9a88f42f415c948c465c
SHA1f65355fb727eaa6b24e4e983459007e78ee52c96
SHA256e0c04d8bdc2f8563ddc0ec14890f7a2acabf0d36c4f638d19087b7e08b93fc21
SHA512a187c3da802f5f6af0115f408a4f6d0a6ee0ac53f1cc4c0fdb2bbf09a8fc36bbe2f5e315c857c182a1973acf7ec66cb39ce4195cbbf8dd02e3fd71f8c3b1bda6
-
Filesize
192KB
MD5186dfe96c3b08fe69ad4bd89ed66a26e
SHA184cef195465ddb0e007aba04fe5c0e733eefbcb9
SHA256abb76bce9c08fb82be6c40d9dbe8aa52818b1c1fcfb9390b3cf5921cead8a46a
SHA5121fffd58368799ed4449fd97868a94dedee25de514dae97c0a2208577b5441331e241e9b4496b32d1714ca77bb6bddb87e3993d9c7f4e3bfdeda6f3330a4cbd20
-
Filesize
192KB
MD50613246e7f312931bde944c31924d1f8
SHA17c46468fd30909f5e8b158caf1a02f39ab06b9c5
SHA256a71adbe2bcd5feeb1324f04f0fcda1e86d2ec906e0f42b9be254fecac4597170
SHA512c2a0ea0c474be32eb3821516708e075870a2071a6b202ed2567cdbb2ee5652c323feacd87f79b73249fde8fac2ddacbf73a2014eef2732cfdbc92c4c4e4e769b
-
Filesize
192KB
MD56b58acbb61fee87edee12bb1c6e541df
SHA14f2fc736533c8524478c55dc27f47165bf10b139
SHA256a32760aecbe520d303b1f4f9fd58286bc189ae547a501967996f5ad7e3e3acb9
SHA512c5ff7aa890701f690397f51e8691c534b20510727c1ab856e2f3010f369130beb004d5f6d3a3aa6fbf546255f832030751bbec5c67d7aded9f4a909f20138361
-
Filesize
192KB
MD5b4e56c78bbe4e134ea94ac95cb1f44fa
SHA1c4c0168238275aa6b62cd201096674c8d9a8b303
SHA256e9ebd2c6d202caf225e46b805d94836bccb130d606fd4d882cb56ecf4ef36574
SHA512171a66785c0009c70c88537fb76d890920d6ecb13d68798371ddf0e177d27af0f8d0154d36f87c13ca4ff99343455fd0b505a45efb3fbd980c4b7e94b2cd6b45