Analysis
-
max time kernel
144s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe
-
Size
192KB
-
MD5
f391f59fac51f2bfc8137803465a8f28
-
SHA1
396a79754120889dbcaee58f6c33ff733171f3d5
-
SHA256
76fccb79a0e9607d18b84ebd0ee8c6d4b4e5881f6dfa989d767ddaf28f7c84a4
-
SHA512
780622e152d81540d6ac4801ca79188e989c229855a68399e45c17e948a8e0e174e7508aedd9e556962cfc7e31a35714613cb54f60ebd063b6bf52874220eef0
-
SSDEEP
1536:1EGh0oil15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oil1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4537C010-1AC5-4495-B6A3-7BFE544D83DB} {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F41DB5EA-905E-40d8-A4C1-07BA1359DE72} {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A1220BD3-BD86-4582-871A-01FCDBEE8473}\stubpath = "C:\\Windows\\{A1220BD3-BD86-4582-871A-01FCDBEE8473}.exe" {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E029C396-4B97-4617-B6D2-1C0FBEFD38E1} {A1220BD3-BD86-4582-871A-01FCDBEE8473}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EFFBDFD0-EB1A-4f44-BC12-84F9710BBE99} {2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8CE8A2FC-0C0A-487a-99B8-80CEFA80305E} 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{052173F8-9953-47fa-B6E4-831A1C283729}\stubpath = "C:\\Windows\\{052173F8-9953-47fa-B6E4-831A1C283729}.exe" {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0A21365-A145-44f4-9757-90C46DECBF79} {052173F8-9953-47fa-B6E4-831A1C283729}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{289FC58D-F55C-4de6-AE62-909A20E049F9}\stubpath = "C:\\Windows\\{289FC58D-F55C-4de6-AE62-909A20E049F9}.exe" {F0A21365-A145-44f4-9757-90C46DECBF79}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}\stubpath = "C:\\Windows\\{286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe" {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A1220BD3-BD86-4582-871A-01FCDBEE8473} {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}\stubpath = "C:\\Windows\\{8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe" 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F0A21365-A145-44f4-9757-90C46DECBF79}\stubpath = "C:\\Windows\\{F0A21365-A145-44f4-9757-90C46DECBF79}.exe" {052173F8-9953-47fa-B6E4-831A1C283729}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{289FC58D-F55C-4de6-AE62-909A20E049F9} {F0A21365-A145-44f4-9757-90C46DECBF79}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EFFBDFD0-EB1A-4f44-BC12-84F9710BBE99}\stubpath = "C:\\Windows\\{EFFBDFD0-EB1A-4f44-BC12-84F9710BBE99}.exe" {2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4537C010-1AC5-4495-B6A3-7BFE544D83DB}\stubpath = "C:\\Windows\\{4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe" {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9} {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F41DB5EA-905E-40d8-A4C1-07BA1359DE72}\stubpath = "C:\\Windows\\{F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe" {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}\stubpath = "C:\\Windows\\{2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}.exe" {E029C396-4B97-4617-B6D2-1C0FBEFD38E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{052173F8-9953-47fa-B6E4-831A1C283729} {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E029C396-4B97-4617-B6D2-1C0FBEFD38E1}\stubpath = "C:\\Windows\\{E029C396-4B97-4617-B6D2-1C0FBEFD38E1}.exe" {A1220BD3-BD86-4582-871A-01FCDBEE8473}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85} {E029C396-4B97-4617-B6D2-1C0FBEFD38E1}.exe -
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2592 {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe 2812 {052173F8-9953-47fa-B6E4-831A1C283729}.exe 2688 {F0A21365-A145-44f4-9757-90C46DECBF79}.exe 2672 {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe 2012 {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe 2372 {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe 1704 {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe 2536 {A1220BD3-BD86-4582-871A-01FCDBEE8473}.exe 1436 {E029C396-4B97-4617-B6D2-1C0FBEFD38E1}.exe 2080 {2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}.exe 556 {EFFBDFD0-EB1A-4f44-BC12-84F9710BBE99}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{289FC58D-F55C-4de6-AE62-909A20E049F9}.exe {F0A21365-A145-44f4-9757-90C46DECBF79}.exe File created C:\Windows\{286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe File created C:\Windows\{E029C396-4B97-4617-B6D2-1C0FBEFD38E1}.exe {A1220BD3-BD86-4582-871A-01FCDBEE8473}.exe File created C:\Windows\{EFFBDFD0-EB1A-4f44-BC12-84F9710BBE99}.exe {2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}.exe File created C:\Windows\{052173F8-9953-47fa-B6E4-831A1C283729}.exe {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe File created C:\Windows\{F0A21365-A145-44f4-9757-90C46DECBF79}.exe {052173F8-9953-47fa-B6E4-831A1C283729}.exe File created C:\Windows\{F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe File created C:\Windows\{A1220BD3-BD86-4582-871A-01FCDBEE8473}.exe {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe File created C:\Windows\{2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}.exe {E029C396-4B97-4617-B6D2-1C0FBEFD38E1}.exe File created C:\Windows\{8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe File created C:\Windows\{4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {052173F8-9953-47fa-B6E4-831A1C283729}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A1220BD3-BD86-4582-871A-01FCDBEE8473}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EFFBDFD0-EB1A-4f44-BC12-84F9710BBE99}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F0A21365-A145-44f4-9757-90C46DECBF79}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E029C396-4B97-4617-B6D2-1C0FBEFD38E1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2220 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe Token: SeIncBasePriorityPrivilege 2592 {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe Token: SeIncBasePriorityPrivilege 2812 {052173F8-9953-47fa-B6E4-831A1C283729}.exe Token: SeIncBasePriorityPrivilege 2688 {F0A21365-A145-44f4-9757-90C46DECBF79}.exe Token: SeIncBasePriorityPrivilege 2672 {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe Token: SeIncBasePriorityPrivilege 2012 {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe Token: SeIncBasePriorityPrivilege 2372 {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe Token: SeIncBasePriorityPrivilege 1704 {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe Token: SeIncBasePriorityPrivilege 2536 {A1220BD3-BD86-4582-871A-01FCDBEE8473}.exe Token: SeIncBasePriorityPrivilege 1436 {E029C396-4B97-4617-B6D2-1C0FBEFD38E1}.exe Token: SeIncBasePriorityPrivilege 2080 {2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2592 2220 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe 30 PID 2220 wrote to memory of 2592 2220 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe 30 PID 2220 wrote to memory of 2592 2220 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe 30 PID 2220 wrote to memory of 2592 2220 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe 30 PID 2220 wrote to memory of 2912 2220 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe 31 PID 2220 wrote to memory of 2912 2220 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe 31 PID 2220 wrote to memory of 2912 2220 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe 31 PID 2220 wrote to memory of 2912 2220 2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe 31 PID 2592 wrote to memory of 2812 2592 {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe 32 PID 2592 wrote to memory of 2812 2592 {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe 32 PID 2592 wrote to memory of 2812 2592 {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe 32 PID 2592 wrote to memory of 2812 2592 {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe 32 PID 2592 wrote to memory of 2784 2592 {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe 33 PID 2592 wrote to memory of 2784 2592 {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe 33 PID 2592 wrote to memory of 2784 2592 {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe 33 PID 2592 wrote to memory of 2784 2592 {8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe 33 PID 2812 wrote to memory of 2688 2812 {052173F8-9953-47fa-B6E4-831A1C283729}.exe 34 PID 2812 wrote to memory of 2688 2812 {052173F8-9953-47fa-B6E4-831A1C283729}.exe 34 PID 2812 wrote to memory of 2688 2812 {052173F8-9953-47fa-B6E4-831A1C283729}.exe 34 PID 2812 wrote to memory of 2688 2812 {052173F8-9953-47fa-B6E4-831A1C283729}.exe 34 PID 2812 wrote to memory of 2684 2812 {052173F8-9953-47fa-B6E4-831A1C283729}.exe 35 PID 2812 wrote to memory of 2684 2812 {052173F8-9953-47fa-B6E4-831A1C283729}.exe 35 PID 2812 wrote to memory of 2684 2812 {052173F8-9953-47fa-B6E4-831A1C283729}.exe 35 PID 2812 wrote to memory of 2684 2812 {052173F8-9953-47fa-B6E4-831A1C283729}.exe 35 PID 2688 wrote to memory of 2672 2688 {F0A21365-A145-44f4-9757-90C46DECBF79}.exe 36 PID 2688 wrote to memory of 2672 2688 {F0A21365-A145-44f4-9757-90C46DECBF79}.exe 36 PID 2688 wrote to memory of 2672 2688 {F0A21365-A145-44f4-9757-90C46DECBF79}.exe 36 PID 2688 wrote to memory of 2672 2688 {F0A21365-A145-44f4-9757-90C46DECBF79}.exe 36 PID 2688 wrote to memory of 2736 2688 {F0A21365-A145-44f4-9757-90C46DECBF79}.exe 37 PID 2688 wrote to memory of 2736 2688 {F0A21365-A145-44f4-9757-90C46DECBF79}.exe 37 PID 2688 wrote to memory of 2736 2688 {F0A21365-A145-44f4-9757-90C46DECBF79}.exe 37 PID 2688 wrote to memory of 2736 2688 {F0A21365-A145-44f4-9757-90C46DECBF79}.exe 37 PID 2672 wrote to memory of 2012 2672 {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe 38 PID 2672 wrote to memory of 2012 2672 {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe 38 PID 2672 wrote to memory of 2012 2672 {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe 38 PID 2672 wrote to memory of 2012 2672 {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe 38 PID 2672 wrote to memory of 1596 2672 {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe 39 PID 2672 wrote to memory of 1596 2672 {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe 39 PID 2672 wrote to memory of 1596 2672 {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe 39 PID 2672 wrote to memory of 1596 2672 {289FC58D-F55C-4de6-AE62-909A20E049F9}.exe 39 PID 2012 wrote to memory of 2372 2012 {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe 40 PID 2012 wrote to memory of 2372 2012 {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe 40 PID 2012 wrote to memory of 2372 2012 {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe 40 PID 2012 wrote to memory of 2372 2012 {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe 40 PID 2012 wrote to memory of 2076 2012 {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe 41 PID 2012 wrote to memory of 2076 2012 {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe 41 PID 2012 wrote to memory of 2076 2012 {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe 41 PID 2012 wrote to memory of 2076 2012 {4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe 41 PID 2372 wrote to memory of 1704 2372 {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe 42 PID 2372 wrote to memory of 1704 2372 {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe 42 PID 2372 wrote to memory of 1704 2372 {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe 42 PID 2372 wrote to memory of 1704 2372 {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe 42 PID 2372 wrote to memory of 1140 2372 {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe 43 PID 2372 wrote to memory of 1140 2372 {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe 43 PID 2372 wrote to memory of 1140 2372 {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe 43 PID 2372 wrote to memory of 1140 2372 {286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe 43 PID 1704 wrote to memory of 2536 1704 {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe 44 PID 1704 wrote to memory of 2536 1704 {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe 44 PID 1704 wrote to memory of 2536 1704 {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe 44 PID 1704 wrote to memory of 2536 1704 {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe 44 PID 1704 wrote to memory of 1608 1704 {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe 45 PID 1704 wrote to memory of 1608 1704 {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe 45 PID 1704 wrote to memory of 1608 1704 {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe 45 PID 1704 wrote to memory of 1608 1704 {F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-05_f391f59fac51f2bfc8137803465a8f28_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\{8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exeC:\Windows\{8CE8A2FC-0C0A-487a-99B8-80CEFA80305E}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\{052173F8-9953-47fa-B6E4-831A1C283729}.exeC:\Windows\{052173F8-9953-47fa-B6E4-831A1C283729}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\{F0A21365-A145-44f4-9757-90C46DECBF79}.exeC:\Windows\{F0A21365-A145-44f4-9757-90C46DECBF79}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\{289FC58D-F55C-4de6-AE62-909A20E049F9}.exeC:\Windows\{289FC58D-F55C-4de6-AE62-909A20E049F9}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\{4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exeC:\Windows\{4537C010-1AC5-4495-B6A3-7BFE544D83DB}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\{286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exeC:\Windows\{286B15B4-2FE2-4ab5-90C2-DBCB7B23CFB9}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\{F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exeC:\Windows\{F41DB5EA-905E-40d8-A4C1-07BA1359DE72}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\{A1220BD3-BD86-4582-871A-01FCDBEE8473}.exeC:\Windows\{A1220BD3-BD86-4582-871A-01FCDBEE8473}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2536 -
C:\Windows\{E029C396-4B97-4617-B6D2-1C0FBEFD38E1}.exeC:\Windows\{E029C396-4B97-4617-B6D2-1C0FBEFD38E1}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Windows\{2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}.exeC:\Windows\{2B279AAE-E45B-4d61-8C4E-19BCFF6A1B85}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Windows\{EFFBDFD0-EB1A-4f44-BC12-84F9710BBE99}.exeC:\Windows\{EFFBDFD0-EB1A-4f44-BC12-84F9710BBE99}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2B279~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E029C~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1220~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F41DB~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{286B1~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4537C~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{289FC~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F0A21~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{05217~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8CE8A~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5d4887d796bf6fe4adfa0bb45738a0753
SHA14df90bda80fdbaa0b0b71305fa1b0801a8daf9f0
SHA256e208167df546f9d0134cac1a9922e8ffe865b6397171c5a205223bf73304b736
SHA5122afe87f6e9318f2d6a15393bac6bb72d7e862a7ee4fa2d2dffdf06d3b7d845534e8c743538082633a3be15d16a77caee5a3fd8ae105cfef843c39b07b661642e
-
Filesize
192KB
MD5daf6562d950117059b40299a6deb9f6f
SHA1f085c3ab681ee55fca8ea4fe8952549903d34ff4
SHA2567a7097119f8c6d1fdfcf44aa33c8df087d4f653a1c74512c9dac26131e67b06a
SHA512e052c355214f14ff7bdc59cd8c77125e16d3526d7082215dbed6729c61f42d77ba20b7d6a561d62c8592f003c65f3fc4ba4b6bddfbb116f727dd4015da19eaed
-
Filesize
192KB
MD5890afbf30c7c9612e5f803f3236b7ab4
SHA1bcce1b4d6dd1133e7a5e46f9e016304b60bd01c0
SHA2565939a991149145657f483d13fd031e34589f9c0a7a1c01592f31fb9ea5704990
SHA512a8a243a12748ed106a81a7589a4d0d4644c18d2c16a4fdc43e77eafe0e7a8c8d0c091194178630c509a020de80d9d0f1cfece1bda024c79276571c4f85d9232c
-
Filesize
192KB
MD58239232295bc21bd0b15fca0897886c8
SHA1138ae17a9484d716bd47647d55d7ad50b7227a49
SHA256bfb291c5ca5192e71f4819f94349910c26b60fcd6eedd8a7d14b0c9bd3774764
SHA5126f289bb8b186980118349751ffcd78d3bb48237040dfe26107d0b2a162c6ceda5b29ecc46129728221aeb20b288b42a3a1623f432a6e1d0c7d58cb1c6232ff77
-
Filesize
192KB
MD58c3e60d8b25d14d2dd4662556f0eea83
SHA1f21d11655265b0ef2beb68a512fc9246c12eb81a
SHA2560fe1a305fd7a5b0391339f586a99c8cc900351940d7c3ce31ec6fd3901117206
SHA512bd06749e9603d43a79b8733a00c27ce3a597f583a64c13b5a7615e6be8e4e6250694aa3adade912519112e5f9cccffea1c47ce04767edede0ce5f271acd85f01
-
Filesize
192KB
MD50f233bde3f86c6d8bb31bef8eeb09a7f
SHA1b5e7d8f00a85c5f0d2afaf6805b29aa477346301
SHA25619a5d2aafe890b7041192fde9d1629882ff72096ee7330879d5b18784930ffaf
SHA512b6d6632498fafa9445cde0a26cd5df4ea553295ca5bdbb9be9ef4957aedfe3b1a28f740b8b163c8c272c0923b7fd254d635eedba9aac4747ef3b712a9a06f859
-
Filesize
192KB
MD5317460fd2050a8859928ed3278011d6c
SHA14929cf8f7fe83fdf036dbe4111edf8a756d298f0
SHA25644d2f42de4237b86d1a6aa43e5389c5709f3c46275a2ad25a7f7a6903f65a37e
SHA5121785b1df517837e6b7505d7c6c65cb19b183f3143e75204a162ab67ca4a682f42353889b8112d6ecaf4b75861566294b63a27a8dfc7ec34b12301272f8bab29d
-
Filesize
192KB
MD54f99f5365f23d03be500be8b37a57610
SHA1548465ead80b3a611229c8543d982e619a3ccf1d
SHA25648b5939c80f83e9a34b5279a483836f96df2f988befaa686ea0c9ae3c45211b5
SHA51235775c2cc7dd71ead59b531f1bb64d898599bd971554ba3dbaa3e4f384907933289ee0bbe8eb8688e955cafa34734424db1b5d0f814f7edacc74b2aa4f44e111
-
Filesize
192KB
MD570a7272d3615e7998808aba9e991492a
SHA13025f234b2cfca72082f8a40c92ed46b697fd104
SHA2564bb957afee8b82e000849e4d782f1286f3bf9ec490c3f800321286e9c0a7c246
SHA51230f293f8b9f748f17a7b5a3666692c676c51f867d818095000db5ece88009b4d15a626edcacdca5a656add1eb78818125ec8fb308026549c146abbc3d1709ea8
-
Filesize
192KB
MD5509bed8bfd9954dc693f2189b0575b53
SHA12330ed431ec9e4b851214715d6b3d4ba69867097
SHA256c63ae83a6f04287db0065c6f986ac8649dd53daaa0738e359e3cb0c13e7e873c
SHA512b79c73027538395e16a78e5e10eb2f38b7ea7085bb2cd493178b30d715faa05cb305c0f4c500e76246f9dab174e1bf2fc36335f7c699674109a277edb2cb2d36
-
Filesize
192KB
MD55d73d855bf17cc856fe688e1cbd6741d
SHA139617a08041c68ed91f1bd7760879c0c5f7df610
SHA256d58679451bf1171d4f974ae920ba03de705fb95b13ccc237018d4f5f79007ee9
SHA51206b97a6195d7a898d684fcd8e8b25db13da07f1a022e91c9efbfb4d0b6f7ec8cf4abd82e2400d27bde1ae8d60c45a0a092cfcbab91eaef2043c39ec30d8d9d94