Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe
-
Size
344KB
-
MD5
d43c664aef2f855d360b3d8f2b7e87ea
-
SHA1
05056272029d8bc065a5413621a4cd8e4b7162b4
-
SHA256
9b329279665e9a3ad98c9a9560be17b2a13ab05a14d1e8486f19fdedb60a2dff
-
SHA512
5ca4801b81981fcce70e32a7ffd3da036be8bddaa4c6dbdc9d2a44ee4f99a47e31bba9a600e64b042823b3c6101193f4a000483e0123282955e99aa13576fcb1
-
SSDEEP
3072:mEGh0o1lEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGTlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}\stubpath = "C:\\Windows\\{934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}.exe" {C46FE8E1-F9DA-47e8-A636-29DB4E82002C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}\stubpath = "C:\\Windows\\{0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe" 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{954CB69E-E17C-4a05-94BD-081837628745} {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E0FFE042-9DB5-4c6f-AF25-0ED16CE25676} {954CB69E-E17C-4a05-94BD-081837628745}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{133D4C58-0D3F-45fc-9391-0C615617CCC5} {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{133D4C58-0D3F-45fc-9391-0C615617CCC5}\stubpath = "C:\\Windows\\{133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe" {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C46FE8E1-F9DA-47e8-A636-29DB4E82002C}\stubpath = "C:\\Windows\\{C46FE8E1-F9DA-47e8-A636-29DB4E82002C}.exe" {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E7C491D-ED0E-4df1-9399-7E00D0D85FBB} 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2A500170-A476-44e9-B2B8-3960476BCAE6}\stubpath = "C:\\Windows\\{2A500170-A476-44e9-B2B8-3960476BCAE6}.exe" {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{934D7AEC-4E83-44dc-B198-D8A7DAE5FF01} {C46FE8E1-F9DA-47e8-A636-29DB4E82002C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54624637-D726-4c17-B14B-95D7C9809585}\stubpath = "C:\\Windows\\{54624637-D726-4c17-B14B-95D7C9809585}.exe" {934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{97D38BAB-61E2-48e6-A1C8-F0E5E7B72063} {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB} {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C46FE8E1-F9DA-47e8-A636-29DB4E82002C} {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54624637-D726-4c17-B14B-95D7C9809585} {934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{148AEB71-FF62-4407-B503-0668EF6F3FC2} {54624637-D726-4c17-B14B-95D7C9809585}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{954CB69E-E17C-4a05-94BD-081837628745}\stubpath = "C:\\Windows\\{954CB69E-E17C-4a05-94BD-081837628745}.exe" {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}\stubpath = "C:\\Windows\\{E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe" {954CB69E-E17C-4a05-94BD-081837628745}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}\stubpath = "C:\\Windows\\{97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe" {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2A500170-A476-44e9-B2B8-3960476BCAE6} {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}\stubpath = "C:\\Windows\\{57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe" {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{148AEB71-FF62-4407-B503-0668EF6F3FC2}\stubpath = "C:\\Windows\\{148AEB71-FF62-4407-B503-0668EF6F3FC2}.exe" {54624637-D726-4c17-B14B-95D7C9809585}.exe -
Deletes itself 1 IoCs
pid Process 2244 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2276 {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe 2836 {954CB69E-E17C-4a05-94BD-081837628745}.exe 2160 {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe 2888 {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe 1756 {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe 484 {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe 1864 {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe 1704 {C46FE8E1-F9DA-47e8-A636-29DB4E82002C}.exe 2060 {934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}.exe 1872 {54624637-D726-4c17-B14B-95D7C9809585}.exe 2720 {148AEB71-FF62-4407-B503-0668EF6F3FC2}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{2A500170-A476-44e9-B2B8-3960476BCAE6}.exe {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe File created C:\Windows\{C46FE8E1-F9DA-47e8-A636-29DB4E82002C}.exe {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe File created C:\Windows\{54624637-D726-4c17-B14B-95D7C9809585}.exe {934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}.exe File created C:\Windows\{148AEB71-FF62-4407-B503-0668EF6F3FC2}.exe {54624637-D726-4c17-B14B-95D7C9809585}.exe File created C:\Windows\{0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe File created C:\Windows\{954CB69E-E17C-4a05-94BD-081837628745}.exe {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe File created C:\Windows\{E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe {954CB69E-E17C-4a05-94BD-081837628745}.exe File created C:\Windows\{97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe File created C:\Windows\{57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe File created C:\Windows\{133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe File created C:\Windows\{934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}.exe {C46FE8E1-F9DA-47e8-A636-29DB4E82002C}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C46FE8E1-F9DA-47e8-A636-29DB4E82002C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {148AEB71-FF62-4407-B503-0668EF6F3FC2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {954CB69E-E17C-4a05-94BD-081837628745}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {54624637-D726-4c17-B14B-95D7C9809585}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1096 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe Token: SeIncBasePriorityPrivilege 2276 {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe Token: SeIncBasePriorityPrivilege 2836 {954CB69E-E17C-4a05-94BD-081837628745}.exe Token: SeIncBasePriorityPrivilege 2160 {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe Token: SeIncBasePriorityPrivilege 2888 {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe Token: SeIncBasePriorityPrivilege 1756 {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe Token: SeIncBasePriorityPrivilege 484 {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe Token: SeIncBasePriorityPrivilege 1864 {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe Token: SeIncBasePriorityPrivilege 1704 {C46FE8E1-F9DA-47e8-A636-29DB4E82002C}.exe Token: SeIncBasePriorityPrivilege 2060 {934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}.exe Token: SeIncBasePriorityPrivilege 1872 {54624637-D726-4c17-B14B-95D7C9809585}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2276 1096 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe 31 PID 1096 wrote to memory of 2276 1096 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe 31 PID 1096 wrote to memory of 2276 1096 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe 31 PID 1096 wrote to memory of 2276 1096 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe 31 PID 1096 wrote to memory of 2244 1096 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe 32 PID 1096 wrote to memory of 2244 1096 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe 32 PID 1096 wrote to memory of 2244 1096 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe 32 PID 1096 wrote to memory of 2244 1096 2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe 32 PID 2276 wrote to memory of 2836 2276 {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe 33 PID 2276 wrote to memory of 2836 2276 {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe 33 PID 2276 wrote to memory of 2836 2276 {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe 33 PID 2276 wrote to memory of 2836 2276 {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe 33 PID 2276 wrote to memory of 2820 2276 {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe 34 PID 2276 wrote to memory of 2820 2276 {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe 34 PID 2276 wrote to memory of 2820 2276 {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe 34 PID 2276 wrote to memory of 2820 2276 {0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe 34 PID 2836 wrote to memory of 2160 2836 {954CB69E-E17C-4a05-94BD-081837628745}.exe 35 PID 2836 wrote to memory of 2160 2836 {954CB69E-E17C-4a05-94BD-081837628745}.exe 35 PID 2836 wrote to memory of 2160 2836 {954CB69E-E17C-4a05-94BD-081837628745}.exe 35 PID 2836 wrote to memory of 2160 2836 {954CB69E-E17C-4a05-94BD-081837628745}.exe 35 PID 2836 wrote to memory of 2656 2836 {954CB69E-E17C-4a05-94BD-081837628745}.exe 36 PID 2836 wrote to memory of 2656 2836 {954CB69E-E17C-4a05-94BD-081837628745}.exe 36 PID 2836 wrote to memory of 2656 2836 {954CB69E-E17C-4a05-94BD-081837628745}.exe 36 PID 2836 wrote to memory of 2656 2836 {954CB69E-E17C-4a05-94BD-081837628745}.exe 36 PID 2160 wrote to memory of 2888 2160 {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe 37 PID 2160 wrote to memory of 2888 2160 {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe 37 PID 2160 wrote to memory of 2888 2160 {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe 37 PID 2160 wrote to memory of 2888 2160 {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe 37 PID 2160 wrote to memory of 2632 2160 {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe 38 PID 2160 wrote to memory of 2632 2160 {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe 38 PID 2160 wrote to memory of 2632 2160 {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe 38 PID 2160 wrote to memory of 2632 2160 {E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe 38 PID 2888 wrote to memory of 1756 2888 {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe 39 PID 2888 wrote to memory of 1756 2888 {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe 39 PID 2888 wrote to memory of 1756 2888 {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe 39 PID 2888 wrote to memory of 1756 2888 {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe 39 PID 2888 wrote to memory of 3036 2888 {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe 40 PID 2888 wrote to memory of 3036 2888 {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe 40 PID 2888 wrote to memory of 3036 2888 {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe 40 PID 2888 wrote to memory of 3036 2888 {97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe 40 PID 1756 wrote to memory of 484 1756 {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe 41 PID 1756 wrote to memory of 484 1756 {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe 41 PID 1756 wrote to memory of 484 1756 {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe 41 PID 1756 wrote to memory of 484 1756 {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe 41 PID 1756 wrote to memory of 1428 1756 {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe 42 PID 1756 wrote to memory of 1428 1756 {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe 42 PID 1756 wrote to memory of 1428 1756 {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe 42 PID 1756 wrote to memory of 1428 1756 {2A500170-A476-44e9-B2B8-3960476BCAE6}.exe 42 PID 484 wrote to memory of 1864 484 {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe 43 PID 484 wrote to memory of 1864 484 {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe 43 PID 484 wrote to memory of 1864 484 {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe 43 PID 484 wrote to memory of 1864 484 {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe 43 PID 484 wrote to memory of 1280 484 {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe 44 PID 484 wrote to memory of 1280 484 {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe 44 PID 484 wrote to memory of 1280 484 {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe 44 PID 484 wrote to memory of 1280 484 {57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe 44 PID 1864 wrote to memory of 1704 1864 {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe 45 PID 1864 wrote to memory of 1704 1864 {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe 45 PID 1864 wrote to memory of 1704 1864 {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe 45 PID 1864 wrote to memory of 1704 1864 {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe 45 PID 1864 wrote to memory of 1784 1864 {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe 46 PID 1864 wrote to memory of 1784 1864 {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe 46 PID 1864 wrote to memory of 1784 1864 {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe 46 PID 1864 wrote to memory of 1784 1864 {133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-05_d43c664aef2f855d360b3d8f2b7e87ea_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\{0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exeC:\Windows\{0E7C491D-ED0E-4df1-9399-7E00D0D85FBB}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\{954CB69E-E17C-4a05-94BD-081837628745}.exeC:\Windows\{954CB69E-E17C-4a05-94BD-081837628745}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\{E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exeC:\Windows\{E0FFE042-9DB5-4c6f-AF25-0ED16CE25676}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\{97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exeC:\Windows\{97D38BAB-61E2-48e6-A1C8-F0E5E7B72063}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\{2A500170-A476-44e9-B2B8-3960476BCAE6}.exeC:\Windows\{2A500170-A476-44e9-B2B8-3960476BCAE6}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\{57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exeC:\Windows\{57ED0E1A-ADFD-46b3-9901-C9F5AB6E6FFB}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\{133D4C58-0D3F-45fc-9391-0C615617CCC5}.exeC:\Windows\{133D4C58-0D3F-45fc-9391-0C615617CCC5}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\{C46FE8E1-F9DA-47e8-A636-29DB4E82002C}.exeC:\Windows\{C46FE8E1-F9DA-47e8-A636-29DB4E82002C}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\{934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}.exeC:\Windows\{934D7AEC-4E83-44dc-B198-D8A7DAE5FF01}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\{54624637-D726-4c17-B14B-95D7C9809585}.exeC:\Windows\{54624637-D726-4c17-B14B-95D7C9809585}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Windows\{148AEB71-FF62-4407-B503-0668EF6F3FC2}.exeC:\Windows\{148AEB71-FF62-4407-B503-0668EF6F3FC2}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{54624~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{934D7~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C46FE~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{133D4~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{57ED0~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2A500~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{97D38~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E0FFE~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{954CB~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0E7C4~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5fb6ab36b2bb4692d01d44e715e0f3900
SHA1c12ec23320814010958454fafde12d459ad19ef5
SHA2567248abafd1352ef53420b1eef424c735e85de86764cf7a0d757346091766d903
SHA5121d9e02be0314d17fd9e7ad7e53664e25da45dfbdddb87ab538d0caf54b3c0d07525d0ca08457d0b53858d93b825c8adaaa5c4922d0dc47b37044415509d1a9f2
-
Filesize
344KB
MD50979ae21e4bacbbaea4fa5105c5523a0
SHA14f2747e84e977096371401f76ead8cc52c2ce8c4
SHA2562c531ecd507de51526b538d793b71fbec96b62f4b990fe5e26ee5207efbb770c
SHA51226788a8ae720b091ed89e192ac358c00498b783bbc650a3f5359e819da122bf857329658aded6840876c4eadf6e99e91c4bd0bcdf9aabaaece712f6c4728df37
-
Filesize
344KB
MD5e668a32e0168a08816c61016e9b9cf3f
SHA18a2a6d4d932133a6d52486e68c18451ea2d206f0
SHA256b13a3fbef00dd76656dd85ebff450183c5f21735d5abc05e54c53eae425f1f35
SHA512cbc6ef6939586cf28d0ef91633bccb989c6528cb28483ceb5407a39ae3801b6fb6593d34914df4f23401d290076dcf80e6a51b0bac821b05ad97561494aa58ec
-
Filesize
344KB
MD5085a6f4d9aa974be7c6e5be822d46c92
SHA1909048231c00c653179fc795a46b9f43d042d889
SHA256a9096dbe2257f04916d262e079751e75c5e2cd315dd978753264c18e4a8ca04b
SHA5126500daf9a7f90198e856578f4db66f4a40b043d411a8536d6666011820bd17a3a65e2c8d6ac02781a75784c16698a754aa54d0f30c088bfd54bee35b4d9449b3
-
Filesize
344KB
MD5479c005399498b2adb195fd88f44e38a
SHA1c4a57b8577f2917b1b339db13a223b0d2c8485fc
SHA256d8ce10ebe39583d3539b96eaeab38b117710dceaf1567e670ded02f116fc852f
SHA512bbc0988174b1abfa02dceeeb3ac45903ad43a0485e533006dd7a483110abf799e78afbbdd92da960d2963e1fed63b03ecf1514f33b6bdf3fe342a72686df20b8
-
Filesize
344KB
MD5dd0296a2ed9dc4fad8665b41798a6d74
SHA11e9d0cb9767dbb6849e0c21ceac17ad8202f6d68
SHA2569cc47c17435c405167e0cd32896df4fe72fa53a7e1b0f41b93bc372c9a0ce983
SHA512a335dcc80545088fab64cd604f9c5c386e205159063639c22c630d7f6447a0eb9fc1a45fe99cdfc7dd12e4f3c2322b3d4b1bd5cff51efc2883052cca28a256b6
-
Filesize
344KB
MD571f500598f32726e2804dc3394f78b11
SHA1ecf5f747104225273451d629a85a26bedaddd01f
SHA256313dff582d99e078efaac1247690c465b60fc4988b8f2311985573735fb1c339
SHA51278a2a38b64371129a6de9506598628d21bd5cd313b50d3b0a7379a8d48ea376b70177850f999dbf6ac54f3407291759feb66122a8e6069883a7166f920667c05
-
Filesize
344KB
MD54a51d41b181f66946cb6400f95221fec
SHA1157924940d1784a919ddcf15b220db19bf566edb
SHA25674fda44a661d337327d99f8501f599b49df0f1e239de0445bb4be8ea4c50ca97
SHA51225f1a3264300947d75f8314fd3fc24047f11bd2deaf373a988a742d50ddd6847157e55be2cc9dd2bbef68449372ef6e303026740481774601b203d86017d3ff6
-
Filesize
344KB
MD51c8e970a8f6dd5b9e03f566fbec0bfb8
SHA17ba9f3c13f647c19861e67089d9a0a3347b9fed9
SHA256852b7be570e60a1f0783dfea4aad5dfe4e6fb517f0cbf55d0b94f20fb6a9cbd5
SHA512e84218453c08511e9c824b253aecd5e1038f769d961c671a0024fb422b251d5f5de126d9812da2e1c3ff2152a992d8251b4ab5aede4bbb541033d27fb2ac9e3d
-
Filesize
344KB
MD5b273d74983a442d52d8583de4fbee850
SHA116769ee636ea771fe0160c415a8e127157677fb3
SHA2562ef2bfce4df2ca7c858154b7d0a21daf187bbd192d1196710013cae3a3aeccb8
SHA512117aee6084e5dc327df816cba093ca195e7688f3f7cc87f724371b0ed3bb2791da4f2366df9aafa2aedef951256422950cede39a2f419c57816593512ed22b70
-
Filesize
344KB
MD5b865ff25c0fc5548630c47d76ad9e4e4
SHA1cf0d82fbf095082e92081fea29995b35b35d4b8c
SHA2563b579262550b967b68753b16554bdabe6828d6de85ba27edefd05b22b617de20
SHA512b499c639b25d6b800f11a930fe70f1a9b40de90e645c98e170353fd13dde72a4cda9591f42f913802a7752735933d93cc98dff66c9cf58b3e2736ccc54683dc9