Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe
-
Size
216KB
-
MD5
0f01042c09c6f61995357603865cf3f3
-
SHA1
2400aa24a82233fd2de7b3a1df917fd96d4d2eb0
-
SHA256
059a3ef7c250251a69c9984e37f8551bc288740c7f958da8e5c81c8560d658e1
-
SHA512
32148b6d5ef63e26040c0ba8a6fbb0cf66aebe412771e0c95b67d377a09f6b01d695c473495262d0818ef478e9533c1359ec38549234796abdc596a5770e8e63
-
SSDEEP
3072:jEGh0o1l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGjlEeKcAEcGy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8800AC84-46D4-4b05-AC1B-9C49B34980A3} {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8800AC84-46D4-4b05-AC1B-9C49B34980A3}\stubpath = "C:\\Windows\\{8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe" {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E14EED85-49D2-4733-B608-AB022FF596B8} {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4E4595A2-BF32-441c-A53D-D0A2191A85BB}\stubpath = "C:\\Windows\\{4E4595A2-BF32-441c-A53D-D0A2191A85BB}.exe" {37B684A5-3321-4e81-8C61-85B2384282B5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFF0951F-E818-4bf8-A5CE-08B45623B614} 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37C64544-7ED1-4edb-8B02-218D9BF0E5D0} {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB9F50C9-35AF-4c36-89A0-14703569058F}\stubpath = "C:\\Windows\\{CB9F50C9-35AF-4c36-89A0-14703569058F}.exe" {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8982CE63-C0C5-4d54-9B0E-8F9F811D05AE} {34412B45-D58F-4056-9830-644C8D514CE5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37C64544-7ED1-4edb-8B02-218D9BF0E5D0}\stubpath = "C:\\Windows\\{37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe" {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB9F50C9-35AF-4c36-89A0-14703569058F} {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E14EED85-49D2-4733-B608-AB022FF596B8}\stubpath = "C:\\Windows\\{E14EED85-49D2-4733-B608-AB022FF596B8}.exe" {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1B52B9C-4A0C-4362-916E-B752683D5867} {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1B52B9C-4A0C-4362-916E-B752683D5867}\stubpath = "C:\\Windows\\{B1B52B9C-4A0C-4362-916E-B752683D5867}.exe" {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0215713-14E6-4143-A5F8-050AAFCA6E5F} {B1B52B9C-4A0C-4362-916E-B752683D5867}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFF0951F-E818-4bf8-A5CE-08B45623B614}\stubpath = "C:\\Windows\\{CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe" 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34412B45-D58F-4056-9830-644C8D514CE5} {E14EED85-49D2-4733-B608-AB022FF596B8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}\stubpath = "C:\\Windows\\{8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe" {34412B45-D58F-4056-9830-644C8D514CE5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37B684A5-3321-4e81-8C61-85B2384282B5}\stubpath = "C:\\Windows\\{37B684A5-3321-4e81-8C61-85B2384282B5}.exe" {C0215713-14E6-4143-A5F8-050AAFCA6E5F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4E4595A2-BF32-441c-A53D-D0A2191A85BB} {37B684A5-3321-4e81-8C61-85B2384282B5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34412B45-D58F-4056-9830-644C8D514CE5}\stubpath = "C:\\Windows\\{34412B45-D58F-4056-9830-644C8D514CE5}.exe" {E14EED85-49D2-4733-B608-AB022FF596B8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0215713-14E6-4143-A5F8-050AAFCA6E5F}\stubpath = "C:\\Windows\\{C0215713-14E6-4143-A5F8-050AAFCA6E5F}.exe" {B1B52B9C-4A0C-4362-916E-B752683D5867}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37B684A5-3321-4e81-8C61-85B2384282B5} {C0215713-14E6-4143-A5F8-050AAFCA6E5F}.exe -
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2608 {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe 2772 {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe 2504 {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe 756 {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe 2680 {E14EED85-49D2-4733-B608-AB022FF596B8}.exe 2052 {34412B45-D58F-4056-9830-644C8D514CE5}.exe 2368 {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe 2528 {B1B52B9C-4A0C-4362-916E-B752683D5867}.exe 1864 {C0215713-14E6-4143-A5F8-050AAFCA6E5F}.exe 1288 {37B684A5-3321-4e81-8C61-85B2384282B5}.exe 2108 {4E4595A2-BF32-441c-A53D-D0A2191A85BB}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{E14EED85-49D2-4733-B608-AB022FF596B8}.exe {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe File created C:\Windows\{34412B45-D58F-4056-9830-644C8D514CE5}.exe {E14EED85-49D2-4733-B608-AB022FF596B8}.exe File created C:\Windows\{37B684A5-3321-4e81-8C61-85B2384282B5}.exe {C0215713-14E6-4143-A5F8-050AAFCA6E5F}.exe File created C:\Windows\{CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe File created C:\Windows\{37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe File created C:\Windows\{CB9F50C9-35AF-4c36-89A0-14703569058F}.exe {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe File created C:\Windows\{8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe File created C:\Windows\{8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe {34412B45-D58F-4056-9830-644C8D514CE5}.exe File created C:\Windows\{B1B52B9C-4A0C-4362-916E-B752683D5867}.exe {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe File created C:\Windows\{C0215713-14E6-4143-A5F8-050AAFCA6E5F}.exe {B1B52B9C-4A0C-4362-916E-B752683D5867}.exe File created C:\Windows\{4E4595A2-BF32-441c-A53D-D0A2191A85BB}.exe {37B684A5-3321-4e81-8C61-85B2384282B5}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E14EED85-49D2-4733-B608-AB022FF596B8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {37B684A5-3321-4e81-8C61-85B2384282B5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34412B45-D58F-4056-9830-644C8D514CE5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B1B52B9C-4A0C-4362-916E-B752683D5867}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C0215713-14E6-4143-A5F8-050AAFCA6E5F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4E4595A2-BF32-441c-A53D-D0A2191A85BB}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2792 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe Token: SeIncBasePriorityPrivilege 2608 {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe Token: SeIncBasePriorityPrivilege 2772 {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe Token: SeIncBasePriorityPrivilege 2504 {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe Token: SeIncBasePriorityPrivilege 756 {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe Token: SeIncBasePriorityPrivilege 2680 {E14EED85-49D2-4733-B608-AB022FF596B8}.exe Token: SeIncBasePriorityPrivilege 2052 {34412B45-D58F-4056-9830-644C8D514CE5}.exe Token: SeIncBasePriorityPrivilege 2368 {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe Token: SeIncBasePriorityPrivilege 2528 {B1B52B9C-4A0C-4362-916E-B752683D5867}.exe Token: SeIncBasePriorityPrivilege 1864 {C0215713-14E6-4143-A5F8-050AAFCA6E5F}.exe Token: SeIncBasePriorityPrivilege 1288 {37B684A5-3321-4e81-8C61-85B2384282B5}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2608 2792 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe 28 PID 2792 wrote to memory of 2608 2792 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe 28 PID 2792 wrote to memory of 2608 2792 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe 28 PID 2792 wrote to memory of 2608 2792 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe 28 PID 2792 wrote to memory of 2760 2792 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe 29 PID 2792 wrote to memory of 2760 2792 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe 29 PID 2792 wrote to memory of 2760 2792 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe 29 PID 2792 wrote to memory of 2760 2792 2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe 29 PID 2608 wrote to memory of 2772 2608 {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe 30 PID 2608 wrote to memory of 2772 2608 {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe 30 PID 2608 wrote to memory of 2772 2608 {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe 30 PID 2608 wrote to memory of 2772 2608 {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe 30 PID 2608 wrote to memory of 2648 2608 {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe 31 PID 2608 wrote to memory of 2648 2608 {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe 31 PID 2608 wrote to memory of 2648 2608 {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe 31 PID 2608 wrote to memory of 2648 2608 {CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe 31 PID 2772 wrote to memory of 2504 2772 {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe 34 PID 2772 wrote to memory of 2504 2772 {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe 34 PID 2772 wrote to memory of 2504 2772 {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe 34 PID 2772 wrote to memory of 2504 2772 {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe 34 PID 2772 wrote to memory of 2940 2772 {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe 35 PID 2772 wrote to memory of 2940 2772 {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe 35 PID 2772 wrote to memory of 2940 2772 {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe 35 PID 2772 wrote to memory of 2940 2772 {37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe 35 PID 2504 wrote to memory of 756 2504 {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe 36 PID 2504 wrote to memory of 756 2504 {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe 36 PID 2504 wrote to memory of 756 2504 {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe 36 PID 2504 wrote to memory of 756 2504 {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe 36 PID 2504 wrote to memory of 1428 2504 {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe 37 PID 2504 wrote to memory of 1428 2504 {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe 37 PID 2504 wrote to memory of 1428 2504 {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe 37 PID 2504 wrote to memory of 1428 2504 {CB9F50C9-35AF-4c36-89A0-14703569058F}.exe 37 PID 756 wrote to memory of 2680 756 {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe 38 PID 756 wrote to memory of 2680 756 {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe 38 PID 756 wrote to memory of 2680 756 {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe 38 PID 756 wrote to memory of 2680 756 {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe 38 PID 756 wrote to memory of 2804 756 {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe 39 PID 756 wrote to memory of 2804 756 {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe 39 PID 756 wrote to memory of 2804 756 {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe 39 PID 756 wrote to memory of 2804 756 {8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe 39 PID 2680 wrote to memory of 2052 2680 {E14EED85-49D2-4733-B608-AB022FF596B8}.exe 40 PID 2680 wrote to memory of 2052 2680 {E14EED85-49D2-4733-B608-AB022FF596B8}.exe 40 PID 2680 wrote to memory of 2052 2680 {E14EED85-49D2-4733-B608-AB022FF596B8}.exe 40 PID 2680 wrote to memory of 2052 2680 {E14EED85-49D2-4733-B608-AB022FF596B8}.exe 40 PID 2680 wrote to memory of 1644 2680 {E14EED85-49D2-4733-B608-AB022FF596B8}.exe 41 PID 2680 wrote to memory of 1644 2680 {E14EED85-49D2-4733-B608-AB022FF596B8}.exe 41 PID 2680 wrote to memory of 1644 2680 {E14EED85-49D2-4733-B608-AB022FF596B8}.exe 41 PID 2680 wrote to memory of 1644 2680 {E14EED85-49D2-4733-B608-AB022FF596B8}.exe 41 PID 2052 wrote to memory of 2368 2052 {34412B45-D58F-4056-9830-644C8D514CE5}.exe 42 PID 2052 wrote to memory of 2368 2052 {34412B45-D58F-4056-9830-644C8D514CE5}.exe 42 PID 2052 wrote to memory of 2368 2052 {34412B45-D58F-4056-9830-644C8D514CE5}.exe 42 PID 2052 wrote to memory of 2368 2052 {34412B45-D58F-4056-9830-644C8D514CE5}.exe 42 PID 2052 wrote to memory of 1720 2052 {34412B45-D58F-4056-9830-644C8D514CE5}.exe 43 PID 2052 wrote to memory of 1720 2052 {34412B45-D58F-4056-9830-644C8D514CE5}.exe 43 PID 2052 wrote to memory of 1720 2052 {34412B45-D58F-4056-9830-644C8D514CE5}.exe 43 PID 2052 wrote to memory of 1720 2052 {34412B45-D58F-4056-9830-644C8D514CE5}.exe 43 PID 2368 wrote to memory of 2528 2368 {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe 44 PID 2368 wrote to memory of 2528 2368 {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe 44 PID 2368 wrote to memory of 2528 2368 {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe 44 PID 2368 wrote to memory of 2528 2368 {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe 44 PID 2368 wrote to memory of 1632 2368 {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe 45 PID 2368 wrote to memory of 1632 2368 {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe 45 PID 2368 wrote to memory of 1632 2368 {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe 45 PID 2368 wrote to memory of 1632 2368 {8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-04_0f01042c09c6f61995357603865cf3f3_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\{CFF0951F-E818-4bf8-A5CE-08B45623B614}.exeC:\Windows\{CFF0951F-E818-4bf8-A5CE-08B45623B614}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\{37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exeC:\Windows\{37C64544-7ED1-4edb-8B02-218D9BF0E5D0}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\{CB9F50C9-35AF-4c36-89A0-14703569058F}.exeC:\Windows\{CB9F50C9-35AF-4c36-89A0-14703569058F}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\{8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exeC:\Windows\{8800AC84-46D4-4b05-AC1B-9C49B34980A3}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\{E14EED85-49D2-4733-B608-AB022FF596B8}.exeC:\Windows\{E14EED85-49D2-4733-B608-AB022FF596B8}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\{34412B45-D58F-4056-9830-644C8D514CE5}.exeC:\Windows\{34412B45-D58F-4056-9830-644C8D514CE5}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\{8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exeC:\Windows\{8982CE63-C0C5-4d54-9B0E-8F9F811D05AE}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\{B1B52B9C-4A0C-4362-916E-B752683D5867}.exeC:\Windows\{B1B52B9C-4A0C-4362-916E-B752683D5867}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2528 -
C:\Windows\{C0215713-14E6-4143-A5F8-050AAFCA6E5F}.exeC:\Windows\{C0215713-14E6-4143-A5F8-050AAFCA6E5F}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\{37B684A5-3321-4e81-8C61-85B2384282B5}.exeC:\Windows\{37B684A5-3321-4e81-8C61-85B2384282B5}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1288 -
C:\Windows\{4E4595A2-BF32-441c-A53D-D0A2191A85BB}.exeC:\Windows\{4E4595A2-BF32-441c-A53D-D0A2191A85BB}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37B68~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0215~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1B52~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8982C~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34412~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E14EE~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8800A~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB9F5~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37C64~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CFF09~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5aeedbf24277a9db109c91f1d6750c2b0
SHA18b9063f6322bbff856fc7c81d49ec1f0ba6357ab
SHA2565ef46d07ab76bfac711acc3c0448c5a498829717db2255803c2a4d6d3551fd0e
SHA512d32d8fb2840f14bfe9a6ac058bde8267055301f7fed147ef144fac7a8122eea8c2cb0008d30bed994add303f2ba409d8986a3d4c17963de01ca556a27e1fc0e4
-
Filesize
216KB
MD5493908d3eace1c88480b4d12fe5e8885
SHA1d70afd147a274c80faedc008cf0e02bfb49e98b8
SHA2562723c35e5a1091d8d038e1d1e1e8a0022190f5bf8e6756e24013398a2126ff2b
SHA512d5293ec944e206b79888e5506894f2b689cb0f5c281bc51f5a06181e4e5d5c37eb928babfd08c5430d10642fe8e41146dbea813e06fbb1e134927a3b00abc831
-
Filesize
216KB
MD55eb85d71f33f9ae4f0208311f74ebbfa
SHA177c2b855da95456e55e2153d5d81a6be3765d1c0
SHA25651336ab6bc260061a74a7e4cc2f928b993e3606f89b8be17ffa5598251d495d9
SHA512e60db0af9ffaeadc1b9b7d5d49865462ed2d55513c9e3d724cd3395df68b15fa6a7d7e5bd0d5dd25782bdfa4b4341c9b8dd951de787925711c32efeef7d64117
-
Filesize
216KB
MD57cf9a1dc713292359809d64cf85792b2
SHA1a845ff8e8c53efffdd45e4c07d82aed9136c731a
SHA256554c1cb52408cb3904eab6e37a8471612733878b16594c456ddff3503c8b2ba0
SHA512e4880f50e0c2fbe245173d4fbdb0a439fd695db2c6cf45b5d476f7429e73d26cef3306899df55fde1e90d618d72e20aa94d6ec10c97c190189b19c1880c58aaa
-
Filesize
216KB
MD5edb1c75257ddb778fe3b921acb1a7fa8
SHA1cd541753af3ee6ed66a15365110cd6291ff6f8f4
SHA2569b4a7d7005b47b20bce13a8b4be0b7f7ee70b26a87dfd494827c049b4a621306
SHA512000f2f5c836caf30137ef8ec63635dce124de176d46edfd35559fb7c5245d4c0b2e4bd82e246859f6250f858913791bd610bc262f9e79af069460f188b33cb62
-
Filesize
216KB
MD5df4e107128c99baa8b1b32e938ee3502
SHA14a84952123a91908303af29c7c364b42624575bd
SHA256f904c1ebff29011f955890b818fba81187d25629ff1720f8c476ab849d03b2f6
SHA512a0db6e163a7685d9b4af062889811aaa977ef09958e85b266a0566ca05be52c35a4e65e99df049708e53faf2532935c607d6e9f7359e5656bd011e3f0c45269e
-
Filesize
216KB
MD5d8624117aeb139d551a9cbf4a236f50a
SHA161502399b86d3d620a6d3d8dd0f449bbb584faac
SHA25633cdddf6f265dad226e567ca6e5a920a5176fa8195ec97cca491a5cd3915b922
SHA512f4dd9abbeba3100c368740ba0222133b4c0b4980ccbfd7fe4f57edd39cc3c9687684329a937ba5d91862321419707c312d8fc2c3cb3fa79d48f247f2f78eed11
-
Filesize
216KB
MD5ed53b9f4f6d7541cd946d97953441689
SHA1d88c1c3fc13e0cc08149cdffbd253093c694fa81
SHA25620a00cbb90fdbc8ed7631a6dbd1b6714da63a2724b4bd4d86fafda42b3492223
SHA512d1b66fee19aff5a851037352e46301a8e23b7cff32da86dcde678545d102c0ca4b5148594d8d83874a46372e703e07c215838bd9d1554d4f66940d01585d5b1f
-
Filesize
216KB
MD530509c805e5620c9a0d6da280fa70934
SHA1d1cc8ca481e2242fe6759bd2d2d28bf17382b9f8
SHA25637c375bfb21ee7f9bcdfc2eaeadf619825036a0ce53bb73b2f7bb0135cf092dd
SHA51291defe015fd14aacb355a684452369c05ada69e25078beba9317cd61dedf82f0439248154c5b6e34f9ff4d576a42f6577d5bb1b2d1d03f35247a3b786c1b6a23
-
Filesize
216KB
MD5c21b5d69894f665e365425e6a66a9799
SHA19d5f9f04775a4cdae424a1d4f6874a2d75040c80
SHA2566ff44550ad111a4a3447ebb2ccb28741e3cab763988181b53eddfc6641255b06
SHA5121ce260edb4f268832a7aa5d1eca5f8f692597d42d2099e050fddd4405a10cec4ec7376448410186cf5142f5b631c8e3dc0f67ff808a9fb4e9675887718a1c8ea
-
Filesize
216KB
MD59f8405be6e54044418c95b82e7f3d490
SHA1c98e6f68dc797965b4b284810d5b7688c6e867b0
SHA256fad5dac5bba3fe3e94451f6f2e12ae3fa26fa081b65d82b83af836a0e413b5e6
SHA51290b070bf4a2532e3c04f873d8919f7abb82f0d3d10e78940c1787304fc6cf6bc6f3f327834aad1d96f8ba83680f3467fe022b1b5dcba0226a0066ebb22f0a681