Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe
-
Size
168KB
-
MD5
e7c18d74621e422be60148fd517eed27
-
SHA1
ad3e7c27d080c728ed3cb96dcd0dab499d4ea413
-
SHA256
8d984b1d51599164494fef7eb42084cbb1ad7d2b51c20276612bfce607b026bc
-
SHA512
03e4f61ffc0ade98c9a66db74fcbe3dd34f74d111497467746bfbc3bb04ce296762e73e6955e374e010cc6455d299839deaf629487812ef402a469b38ca6e72e
-
SSDEEP
1536:1EGh0oHlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oHlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}\stubpath = "C:\\Windows\\{897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe" {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1C26D90-EDEA-42f2-80AA-F3A719346E5C}\stubpath = "C:\\Windows\\{E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe" {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{71B9F29B-9B8B-4dba-8781-5B25CAF167AE}\stubpath = "C:\\Windows\\{71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe" {46E76773-C148-424d-A518-7F5B3D75C590}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5838920D-70A7-4ce2-BC8E-94811FEB60C0}\stubpath = "C:\\Windows\\{5838920D-70A7-4ce2-BC8E-94811FEB60C0}.exe" {71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9C70B513-0467-4c8a-96B0-5A8533EB3C54}\stubpath = "C:\\Windows\\{9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe" 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A5678E4-513E-42da-AAF5-4D146D2779C0}\stubpath = "C:\\Windows\\{5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe" {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{39145E55-8120-4d1d-94FE-D9A2721F47CF} {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7EE8B8EA-2C19-4a49-9D76-7448617AFB22}\stubpath = "C:\\Windows\\{7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe" {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{46E76773-C148-424d-A518-7F5B3D75C590} {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5838920D-70A7-4ce2-BC8E-94811FEB60C0} {71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{410F3D9B-9A0D-4ded-91CC-63FDEA81925C} {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{410F3D9B-9A0D-4ded-91CC-63FDEA81925C}\stubpath = "C:\\Windows\\{410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe" {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{39145E55-8120-4d1d-94FE-D9A2721F47CF}\stubpath = "C:\\Windows\\{39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe" {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4} {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E1C26D90-EDEA-42f2-80AA-F3A719346E5C} {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EE159CD9-44C6-4b15-9A43-F7E2E9D5433F} {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7EE8B8EA-2C19-4a49-9D76-7448617AFB22} {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{46E76773-C148-424d-A518-7F5B3D75C590}\stubpath = "C:\\Windows\\{46E76773-C148-424d-A518-7F5B3D75C590}.exe" {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9C70B513-0467-4c8a-96B0-5A8533EB3C54} 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5A5678E4-513E-42da-AAF5-4D146D2779C0} {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{71B9F29B-9B8B-4dba-8781-5B25CAF167AE} {46E76773-C148-424d-A518-7F5B3D75C590}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7EADA48-94DB-47d2-97C5-DD32E9F9CF8C}\stubpath = "C:\\Windows\\{D7EADA48-94DB-47d2-97C5-DD32E9F9CF8C}.exe" {5838920D-70A7-4ce2-BC8E-94811FEB60C0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}\stubpath = "C:\\Windows\\{EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe" {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7EADA48-94DB-47d2-97C5-DD32E9F9CF8C} {5838920D-70A7-4ce2-BC8E-94811FEB60C0}.exe -
Executes dropped EXE 12 IoCs
pid Process 216 {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe 716 {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe 4128 {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe 4472 {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe 3356 {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe 4344 {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe 2028 {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe 4400 {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe 2460 {46E76773-C148-424d-A518-7F5B3D75C590}.exe 3684 {71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe 3572 {5838920D-70A7-4ce2-BC8E-94811FEB60C0}.exe 4124 {D7EADA48-94DB-47d2-97C5-DD32E9F9CF8C}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe File created C:\Windows\{897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe File created C:\Windows\{E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe File created C:\Windows\{EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe File created C:\Windows\{5838920D-70A7-4ce2-BC8E-94811FEB60C0}.exe {71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe File created C:\Windows\{D7EADA48-94DB-47d2-97C5-DD32E9F9CF8C}.exe {5838920D-70A7-4ce2-BC8E-94811FEB60C0}.exe File created C:\Windows\{9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe File created C:\Windows\{5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe File created C:\Windows\{7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe File created C:\Windows\{46E76773-C148-424d-A518-7F5B3D75C590}.exe {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe File created C:\Windows\{71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe {46E76773-C148-424d-A518-7F5B3D75C590}.exe File created C:\Windows\{410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D7EADA48-94DB-47d2-97C5-DD32E9F9CF8C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5838920D-70A7-4ce2-BC8E-94811FEB60C0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {46E76773-C148-424d-A518-7F5B3D75C590}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3688 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe Token: SeIncBasePriorityPrivilege 216 {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe Token: SeIncBasePriorityPrivilege 716 {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe Token: SeIncBasePriorityPrivilege 4128 {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe Token: SeIncBasePriorityPrivilege 4472 {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe Token: SeIncBasePriorityPrivilege 3356 {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe Token: SeIncBasePriorityPrivilege 4344 {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe Token: SeIncBasePriorityPrivilege 2028 {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe Token: SeIncBasePriorityPrivilege 4400 {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe Token: SeIncBasePriorityPrivilege 2460 {46E76773-C148-424d-A518-7F5B3D75C590}.exe Token: SeIncBasePriorityPrivilege 3684 {71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe Token: SeIncBasePriorityPrivilege 3572 {5838920D-70A7-4ce2-BC8E-94811FEB60C0}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3688 wrote to memory of 216 3688 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe 93 PID 3688 wrote to memory of 216 3688 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe 93 PID 3688 wrote to memory of 216 3688 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe 93 PID 3688 wrote to memory of 2660 3688 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe 94 PID 3688 wrote to memory of 2660 3688 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe 94 PID 3688 wrote to memory of 2660 3688 2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe 94 PID 216 wrote to memory of 716 216 {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe 95 PID 216 wrote to memory of 716 216 {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe 95 PID 216 wrote to memory of 716 216 {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe 95 PID 216 wrote to memory of 1028 216 {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe 96 PID 216 wrote to memory of 1028 216 {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe 96 PID 216 wrote to memory of 1028 216 {9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe 96 PID 716 wrote to memory of 4128 716 {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe 99 PID 716 wrote to memory of 4128 716 {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe 99 PID 716 wrote to memory of 4128 716 {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe 99 PID 716 wrote to memory of 2688 716 {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe 100 PID 716 wrote to memory of 2688 716 {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe 100 PID 716 wrote to memory of 2688 716 {410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe 100 PID 4128 wrote to memory of 4472 4128 {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe 101 PID 4128 wrote to memory of 4472 4128 {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe 101 PID 4128 wrote to memory of 4472 4128 {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe 101 PID 4128 wrote to memory of 1412 4128 {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe 102 PID 4128 wrote to memory of 1412 4128 {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe 102 PID 4128 wrote to memory of 1412 4128 {5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe 102 PID 4472 wrote to memory of 3356 4472 {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe 103 PID 4472 wrote to memory of 3356 4472 {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe 103 PID 4472 wrote to memory of 3356 4472 {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe 103 PID 4472 wrote to memory of 4052 4472 {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe 104 PID 4472 wrote to memory of 4052 4472 {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe 104 PID 4472 wrote to memory of 4052 4472 {39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe 104 PID 3356 wrote to memory of 4344 3356 {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe 105 PID 3356 wrote to memory of 4344 3356 {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe 105 PID 3356 wrote to memory of 4344 3356 {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe 105 PID 3356 wrote to memory of 2348 3356 {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe 106 PID 3356 wrote to memory of 2348 3356 {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe 106 PID 3356 wrote to memory of 2348 3356 {897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe 106 PID 4344 wrote to memory of 2028 4344 {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe 107 PID 4344 wrote to memory of 2028 4344 {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe 107 PID 4344 wrote to memory of 2028 4344 {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe 107 PID 4344 wrote to memory of 844 4344 {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe 108 PID 4344 wrote to memory of 844 4344 {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe 108 PID 4344 wrote to memory of 844 4344 {E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe 108 PID 2028 wrote to memory of 4400 2028 {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe 109 PID 2028 wrote to memory of 4400 2028 {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe 109 PID 2028 wrote to memory of 4400 2028 {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe 109 PID 2028 wrote to memory of 2176 2028 {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe 110 PID 2028 wrote to memory of 2176 2028 {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe 110 PID 2028 wrote to memory of 2176 2028 {EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe 110 PID 4400 wrote to memory of 2460 4400 {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe 111 PID 4400 wrote to memory of 2460 4400 {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe 111 PID 4400 wrote to memory of 2460 4400 {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe 111 PID 4400 wrote to memory of 3412 4400 {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe 112 PID 4400 wrote to memory of 3412 4400 {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe 112 PID 4400 wrote to memory of 3412 4400 {7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe 112 PID 2460 wrote to memory of 3684 2460 {46E76773-C148-424d-A518-7F5B3D75C590}.exe 113 PID 2460 wrote to memory of 3684 2460 {46E76773-C148-424d-A518-7F5B3D75C590}.exe 113 PID 2460 wrote to memory of 3684 2460 {46E76773-C148-424d-A518-7F5B3D75C590}.exe 113 PID 2460 wrote to memory of 5020 2460 {46E76773-C148-424d-A518-7F5B3D75C590}.exe 114 PID 2460 wrote to memory of 5020 2460 {46E76773-C148-424d-A518-7F5B3D75C590}.exe 114 PID 2460 wrote to memory of 5020 2460 {46E76773-C148-424d-A518-7F5B3D75C590}.exe 114 PID 3684 wrote to memory of 3572 3684 {71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe 115 PID 3684 wrote to memory of 3572 3684 {71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe 115 PID 3684 wrote to memory of 3572 3684 {71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe 115 PID 3684 wrote to memory of 220 3684 {71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-06_e7c18d74621e422be60148fd517eed27_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\{9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exeC:\Windows\{9C70B513-0467-4c8a-96B0-5A8533EB3C54}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\{410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exeC:\Windows\{410F3D9B-9A0D-4ded-91CC-63FDEA81925C}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\{5A5678E4-513E-42da-AAF5-4D146D2779C0}.exeC:\Windows\{5A5678E4-513E-42da-AAF5-4D146D2779C0}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\{39145E55-8120-4d1d-94FE-D9A2721F47CF}.exeC:\Windows\{39145E55-8120-4d1d-94FE-D9A2721F47CF}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\{897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exeC:\Windows\{897C8A7F-B95F-45eb-B922-8DE4FE4E5AC4}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\{E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exeC:\Windows\{E1C26D90-EDEA-42f2-80AA-F3A719346E5C}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\{EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exeC:\Windows\{EE159CD9-44C6-4b15-9A43-F7E2E9D5433F}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\{7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exeC:\Windows\{7EE8B8EA-2C19-4a49-9D76-7448617AFB22}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\{46E76773-C148-424d-A518-7F5B3D75C590}.exeC:\Windows\{46E76773-C148-424d-A518-7F5B3D75C590}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\{71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exeC:\Windows\{71B9F29B-9B8B-4dba-8781-5B25CAF167AE}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\{5838920D-70A7-4ce2-BC8E-94811FEB60C0}.exeC:\Windows\{5838920D-70A7-4ce2-BC8E-94811FEB60C0}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3572 -
C:\Windows\{D7EADA48-94DB-47d2-97C5-DD32E9F9CF8C}.exeC:\Windows\{D7EADA48-94DB-47d2-97C5-DD32E9F9CF8C}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{58389~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71B9F~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{46E76~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7EE8B~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EE159~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1C26~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{897C8~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39145~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A567~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{410F3~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9C70B~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c91a2b7c2be673404ac20ba77caf35a9
SHA10735f2b509b5e69da1774a9ba02af8c517aa0859
SHA256c9d1d54d2c1d5908bc13aee4dee49e616a522b3d27a8e165979d6abc95ea437f
SHA51206ccadbd0bee9270283f84f7c80ecdd7e7f7fce893a95f25046db20eeb80989ddb85ee701cf2346bce35eef1ff55d346ce46dda8237349ca74076743c736534a
-
Filesize
168KB
MD529feceedb2b3461f189591b53f3ec9ae
SHA13d2d56b51375babd0de749c1b1780f9738d35ce9
SHA2563e63d57753d0f1816461ab4e197bea61defb377edb8ea9626b22474587eb701e
SHA512ab0e88e3cd3aed8e725145b3b4b87bffead909fe9781b9f97b547003e11781f0403ab23d0f46e83e2d57ae7aadea58af21fce203ed78d458753904a8e55a7ab4
-
Filesize
168KB
MD5e95f51b2761c064f897d73233dbae119
SHA19fde45cb2c895b38a62c3131ec8a8bfb5837de02
SHA2561063d285ab5708b7c4708bdec4cc89bd03821149efefd7d0ce92f61e73be68d1
SHA512777905a0472be49bad765d9e05d139fddc20db4af06d48e0a9dacb3669d8dea36923097653ec257f17d9cb962d9ac26ebff16a689980482aa66cd1a365aa9e5b
-
Filesize
168KB
MD50a32b9c25719326c11dea42a7caa25a0
SHA137b084029fc42f49d41bb3be4de1990e699556ea
SHA256020acd184397c49e788418c66497ef68fb37c1f4bef4289e466b8ac6bff1ecfa
SHA5123028afd28e27b0c58b50f503e4164da7a3552443d1c1a364f3946bdd572d4019c939f23ff5a798785b96467f3231d286a431de3e16659098f8bb38e20d032d43
-
Filesize
168KB
MD58ccc5c18d938c6d22b078332690ed413
SHA1b1d96d50b7bf259d09400617cbaf10e48b757ec4
SHA256adbbe52e690b9d7a524c5604a4cb371be3075c6e5117f0f47532e671dd67bdd0
SHA512c6276eb0046e9502e1c63cdd812659656da596c3520cd1d5cc97a929aa5323a022d34b0707c7c8086f57aecf990bca82c5aba2eb7eac61c8825a66a8f82e50d9
-
Filesize
168KB
MD50e5e2d67d6dfe36e9d1e821983cdc654
SHA1a4f3abf93e566a17727f617ab4f844eeb1262c44
SHA256aff430f2cade2b4f68c4a1fe77b177012072bc1770d7b050144e00badbf20380
SHA512101b1733f3b2f18469913b7e48b248428dbf7a6ac19e5b873f91cc8b276abd0cd65c723d8e43c64cf9a4440c432ceaa093f0e9cea27aee8958e99a3960cd083e
-
Filesize
168KB
MD5f3403d94d09c5468e8dbde4e89781c80
SHA10f185201230918d5099440438d42a7b21075b160
SHA256d6b64f8c47a9284d2342155cb2e5f7d50ca969bbbe1d12dbdc04f322e25b530a
SHA5122624ee0bd66f8692d0d765cda718838957ac94b167f0ec27f90429047713929f4e0278977152e983066235e68f43fca0cf747b7fd49497773f314caf33a7ecd8
-
Filesize
168KB
MD5b9bdcd0dd4a85753032ba15289886320
SHA1317e31ddf1e499f97bbceefd7ec1ead4d9c0fd93
SHA256e2e0e31e722c4be14dbe1ff4daced4720c45ede99a8d44bb9ddd4abbc2fca0f8
SHA5123fa9fd3493857ae8125917279e518e5c34e0b2ac16f3799e59a973f627e21e76400dc3153d7121465eb1705dc9a42ab660567165f787f0123dd877ccdc631df9
-
Filesize
168KB
MD52ff3041b23d2df6978d012518171bc09
SHA1516475e6e8a15e0dc3a3516fdf2734dcbc553e4e
SHA2561a4b998055457b187f1e725a868837a6cc1febf640a671fdd7bf5e8f92304fea
SHA5125e5b811d2dcee805564185dd229a5c1c06aefe2f5a80c76155099988c61315114db8c7644559f48789cf7d3b09c403a92a4b496d4f47fb62357052641a68fd3b
-
Filesize
168KB
MD5ca2a4d5bb599fc333515b84e04761761
SHA1782d85e8cdd1bbcc1a3de1cc9572f88a1ad27c7b
SHA256d2c13c22b03774e5cd778fa2c13abfbad0d9ca336ded64e2a93171389caea1dd
SHA51242a9472a06f3796560900c9aca4e6234a56c22690c816e9799d1d8b718cc6f5c7d7e174c427e279a3b222dd1a084ea866ed52cddeaa3f8e5f5021aa2d1a81724
-
Filesize
168KB
MD5bb1c8e1dc93adc395fbaf790940b94cc
SHA16ba5f384b1bb67af0d6c0a9205e30d43bb9184a7
SHA2560bf8dc78701547922d23aca2471328559062ed1fcca7db627389df69c2eac1c3
SHA512a0f47dbde6b83cd41b36cdadddc3590144300cb4e2aa55e92cd7369c99cc7e0c39680ce2c7f37562a68e72dcbfeeaa8d2136d71d47011ba9325e0583f80c1b73
-
Filesize
168KB
MD5f678e1c1afd2d00dcf909fc9a9a4414d
SHA19b8768e8914286051dd61d519d7cc77467c85b33
SHA256f868880c51f2381da8960de198c54a23a807f097c70af9f60fd6d80c21679048
SHA51200350a9d166b3870fd6a18dce6be1f03f23c1b4d2b54147f62139126a39420ebe15e1f046a353338bb95d629a90472f113f80dcbeb2300ce92c680fb44391126