Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe
-
Size
168KB
-
MD5
66853db4bffd27a9c158ac89cc5e6782
-
SHA1
d79157f0edfd3f82f978710d62b8a9e7e89870a2
-
SHA256
38c45ea7d7382e3fbf9ba478f2134260550cd8195615b109dcbab739bb765a34
-
SHA512
af5d29a31083b668389473d1d62f8854247b5cd420ebdcb26f719a30dec55ee0ac4ef1d6b6756a8c9066c389c418a13bdca88fc2ab6b9a8042effb06760bbaa2
-
SSDEEP
1536:1EGh0o0li5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o0liOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}\stubpath = "C:\\Windows\\{641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe" {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{000FC6D6-E2AD-447a-9CB7-B0B3E5E69898} {56F17758-C897-4c9e-853E-C045B473A32B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1DF6A068-EC6F-4e48-9B55-92378935C4E3} {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57A145A1-C376-4467-B458-5F796D45523B} {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8} {57A145A1-C376-4467-B458-5F796D45523B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1DF6A068-EC6F-4e48-9B55-92378935C4E3}\stubpath = "C:\\Windows\\{1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe" {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{641ABBF4-E6FC-4b40-AA91-80D2C8AC1788} {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{56F17758-C897-4c9e-853E-C045B473A32B} {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}\stubpath = "C:\\Windows\\{000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}.exe" {56F17758-C897-4c9e-853E-C045B473A32B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E894C56C-8FA5-43e8-BA97-CC9AAE6BF295} {000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B062AF1B-DF45-4299-9733-A8DDA04A0BF9}\stubpath = "C:\\Windows\\{B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe" {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E894C56C-8FA5-43e8-BA97-CC9AAE6BF295}\stubpath = "C:\\Windows\\{E894C56C-8FA5-43e8-BA97-CC9AAE6BF295}.exe" {000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5D894FC6-CE07-4038-A213-4B70DEA4AD2F}\stubpath = "C:\\Windows\\{5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe" {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B062AF1B-DF45-4299-9733-A8DDA04A0BF9} {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57A145A1-C376-4467-B458-5F796D45523B}\stubpath = "C:\\Windows\\{57A145A1-C376-4467-B458-5F796D45523B}.exe" {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E30929CB-B749-4b01-B9D1-E60A5A8FEC1A} {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}\stubpath = "C:\\Windows\\{E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe" {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{448696BA-D9A6-405b-A4C4-ECE3FEC579B7} {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{348C4CF1-F19B-442b-A90D-273070CDAF85}\stubpath = "C:\\Windows\\{348C4CF1-F19B-442b-A90D-273070CDAF85}.exe" 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5D894FC6-CE07-4038-A213-4B70DEA4AD2F} {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}\stubpath = "C:\\Windows\\{589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe" {57A145A1-C376-4467-B458-5F796D45523B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{448696BA-D9A6-405b-A4C4-ECE3FEC579B7}\stubpath = "C:\\Windows\\{448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe" {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{56F17758-C897-4c9e-853E-C045B473A32B}\stubpath = "C:\\Windows\\{56F17758-C897-4c9e-853E-C045B473A32B}.exe" {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{348C4CF1-F19B-442b-A90D-273070CDAF85} 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe -
Executes dropped EXE 12 IoCs
pid Process 2216 {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe 4568 {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe 4132 {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe 4624 {57A145A1-C376-4467-B458-5F796D45523B}.exe 4500 {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe 4324 {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe 2720 {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe 1524 {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe 3368 {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe 4992 {56F17758-C897-4c9e-853E-C045B473A32B}.exe 5024 {000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}.exe 1088 {E894C56C-8FA5-43e8-BA97-CC9AAE6BF295}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe File created C:\Windows\{641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe File created C:\Windows\{E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe File created C:\Windows\{448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe File created C:\Windows\{56F17758-C897-4c9e-853E-C045B473A32B}.exe {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe File created C:\Windows\{000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}.exe {56F17758-C897-4c9e-853E-C045B473A32B}.exe File created C:\Windows\{348C4CF1-F19B-442b-A90D-273070CDAF85}.exe 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe File created C:\Windows\{B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe File created C:\Windows\{57A145A1-C376-4467-B458-5F796D45523B}.exe {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe File created C:\Windows\{589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe {57A145A1-C376-4467-B458-5F796D45523B}.exe File created C:\Windows\{1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe File created C:\Windows\{E894C56C-8FA5-43e8-BA97-CC9AAE6BF295}.exe {000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {56F17758-C897-4c9e-853E-C045B473A32B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E894C56C-8FA5-43e8-BA97-CC9AAE6BF295}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {57A145A1-C376-4467-B458-5F796D45523B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2128 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe Token: SeIncBasePriorityPrivilege 2216 {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe Token: SeIncBasePriorityPrivilege 4568 {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe Token: SeIncBasePriorityPrivilege 4132 {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe Token: SeIncBasePriorityPrivilege 4624 {57A145A1-C376-4467-B458-5F796D45523B}.exe Token: SeIncBasePriorityPrivilege 4500 {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe Token: SeIncBasePriorityPrivilege 4324 {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe Token: SeIncBasePriorityPrivilege 2720 {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe Token: SeIncBasePriorityPrivilege 1524 {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe Token: SeIncBasePriorityPrivilege 3368 {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe Token: SeIncBasePriorityPrivilege 4992 {56F17758-C897-4c9e-853E-C045B473A32B}.exe Token: SeIncBasePriorityPrivilege 5024 {000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2216 2128 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe 94 PID 2128 wrote to memory of 2216 2128 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe 94 PID 2128 wrote to memory of 2216 2128 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe 94 PID 2128 wrote to memory of 4880 2128 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe 95 PID 2128 wrote to memory of 4880 2128 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe 95 PID 2128 wrote to memory of 4880 2128 2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe 95 PID 2216 wrote to memory of 4568 2216 {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe 96 PID 2216 wrote to memory of 4568 2216 {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe 96 PID 2216 wrote to memory of 4568 2216 {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe 96 PID 2216 wrote to memory of 1536 2216 {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe 97 PID 2216 wrote to memory of 1536 2216 {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe 97 PID 2216 wrote to memory of 1536 2216 {348C4CF1-F19B-442b-A90D-273070CDAF85}.exe 97 PID 4568 wrote to memory of 4132 4568 {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe 100 PID 4568 wrote to memory of 4132 4568 {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe 100 PID 4568 wrote to memory of 4132 4568 {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe 100 PID 4568 wrote to memory of 3424 4568 {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe 101 PID 4568 wrote to memory of 3424 4568 {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe 101 PID 4568 wrote to memory of 3424 4568 {5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe 101 PID 4132 wrote to memory of 4624 4132 {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe 102 PID 4132 wrote to memory of 4624 4132 {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe 102 PID 4132 wrote to memory of 4624 4132 {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe 102 PID 4132 wrote to memory of 928 4132 {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe 103 PID 4132 wrote to memory of 928 4132 {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe 103 PID 4132 wrote to memory of 928 4132 {B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe 103 PID 4624 wrote to memory of 4500 4624 {57A145A1-C376-4467-B458-5F796D45523B}.exe 104 PID 4624 wrote to memory of 4500 4624 {57A145A1-C376-4467-B458-5F796D45523B}.exe 104 PID 4624 wrote to memory of 4500 4624 {57A145A1-C376-4467-B458-5F796D45523B}.exe 104 PID 4624 wrote to memory of 848 4624 {57A145A1-C376-4467-B458-5F796D45523B}.exe 105 PID 4624 wrote to memory of 848 4624 {57A145A1-C376-4467-B458-5F796D45523B}.exe 105 PID 4624 wrote to memory of 848 4624 {57A145A1-C376-4467-B458-5F796D45523B}.exe 105 PID 4500 wrote to memory of 4324 4500 {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe 106 PID 4500 wrote to memory of 4324 4500 {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe 106 PID 4500 wrote to memory of 4324 4500 {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe 106 PID 4500 wrote to memory of 4292 4500 {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe 107 PID 4500 wrote to memory of 4292 4500 {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe 107 PID 4500 wrote to memory of 4292 4500 {589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe 107 PID 4324 wrote to memory of 2720 4324 {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe 108 PID 4324 wrote to memory of 2720 4324 {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe 108 PID 4324 wrote to memory of 2720 4324 {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe 108 PID 4324 wrote to memory of 4616 4324 {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe 109 PID 4324 wrote to memory of 4616 4324 {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe 109 PID 4324 wrote to memory of 4616 4324 {1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe 109 PID 2720 wrote to memory of 1524 2720 {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe 110 PID 2720 wrote to memory of 1524 2720 {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe 110 PID 2720 wrote to memory of 1524 2720 {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe 110 PID 2720 wrote to memory of 1692 2720 {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe 111 PID 2720 wrote to memory of 1692 2720 {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe 111 PID 2720 wrote to memory of 1692 2720 {641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe 111 PID 1524 wrote to memory of 3368 1524 {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe 112 PID 1524 wrote to memory of 3368 1524 {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe 112 PID 1524 wrote to memory of 3368 1524 {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe 112 PID 1524 wrote to memory of 3936 1524 {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe 113 PID 1524 wrote to memory of 3936 1524 {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe 113 PID 1524 wrote to memory of 3936 1524 {E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe 113 PID 3368 wrote to memory of 4992 3368 {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe 114 PID 3368 wrote to memory of 4992 3368 {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe 114 PID 3368 wrote to memory of 4992 3368 {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe 114 PID 3368 wrote to memory of 2580 3368 {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe 115 PID 3368 wrote to memory of 2580 3368 {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe 115 PID 3368 wrote to memory of 2580 3368 {448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe 115 PID 4992 wrote to memory of 5024 4992 {56F17758-C897-4c9e-853E-C045B473A32B}.exe 116 PID 4992 wrote to memory of 5024 4992 {56F17758-C897-4c9e-853E-C045B473A32B}.exe 116 PID 4992 wrote to memory of 5024 4992 {56F17758-C897-4c9e-853E-C045B473A32B}.exe 116 PID 4992 wrote to memory of 4432 4992 {56F17758-C897-4c9e-853E-C045B473A32B}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024090666853db4bffd27a9c158ac89cc5e6782goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\{348C4CF1-F19B-442b-A90D-273070CDAF85}.exeC:\Windows\{348C4CF1-F19B-442b-A90D-273070CDAF85}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\{5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exeC:\Windows\{5D894FC6-CE07-4038-A213-4B70DEA4AD2F}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\{B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exeC:\Windows\{B062AF1B-DF45-4299-9733-A8DDA04A0BF9}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\{57A145A1-C376-4467-B458-5F796D45523B}.exeC:\Windows\{57A145A1-C376-4467-B458-5F796D45523B}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\{589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exeC:\Windows\{589D3E4E-F9E9-4e10-A381-A89C2AEE5AE8}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\{1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exeC:\Windows\{1DF6A068-EC6F-4e48-9B55-92378935C4E3}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\{641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exeC:\Windows\{641ABBF4-E6FC-4b40-AA91-80D2C8AC1788}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\{E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exeC:\Windows\{E30929CB-B749-4b01-B9D1-E60A5A8FEC1A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\{448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exeC:\Windows\{448696BA-D9A6-405b-A4C4-ECE3FEC579B7}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\{56F17758-C897-4c9e-853E-C045B473A32B}.exeC:\Windows\{56F17758-C897-4c9e-853E-C045B473A32B}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\{000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}.exeC:\Windows\{000FC6D6-E2AD-447a-9CB7-B0B3E5E69898}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5024 -
C:\Windows\{E894C56C-8FA5-43e8-BA97-CC9AAE6BF295}.exeC:\Windows\{E894C56C-8FA5-43e8-BA97-CC9AAE6BF295}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{000FC~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:3832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56F17~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{44869~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E3092~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{641AB~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1DF6A~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{589D3~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{57A14~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B062A~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D894~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{348C4~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\202409~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5955c166743a2ee9720e431e5c1fe5289
SHA1bbffefb5e324246d9c31bb0a0bd69fc0ec61d44e
SHA2561b16570889398f00d1def0428f369299ff594f7a961a0676371560827126b1b0
SHA512fa5eb616e01988b26ce7ea5d3b1c6c1db9c689027218268e3a4231df13e8c379806834324c5caff7d6d003e2d0319a8725b78537156f311c1d207e9f0d4b4e9f
-
Filesize
168KB
MD5772d683d77507ed4c11334bfc44fa482
SHA10f02dde5aefa4f84424702a2a72d0ca7bf0e7865
SHA256b5a300565a96aa656fd7ceee44e0a66791480921582aa92bb2530f369fc7eed0
SHA51223db4516d5fe80fd8ce0fbb89d099a1a6a6820a48c13ffd2c9746d064561d21e200f35e9a05328cfc6526ae2be2af03222a0a54e3368cce160ed18ebc139e5b5
-
Filesize
168KB
MD5a8ee2405d1aba5f2760f6543b6617384
SHA19fa101e2c4d81e06718487be09e50bcb93d09e46
SHA256a213e4f4bb1f5ccd3abb30914d555cf539b758c350ff611793e3d179a0b786d5
SHA5126d65869d4b56fd934c6fb2571a874786d7e56d678997e26985a9c3bff75b5f6a8157eb1547265ccacb732d1e24c73fabec58bb0c1afded15b2532335fdeebb12
-
Filesize
168KB
MD5caa5f9249fcf01e17cc2f891e68469fe
SHA17347b0dc9082d47fa6337151361d7f65d757fbf4
SHA256cc714863750ef7ade413a6758d5d6c1071218b2198880aa7e8e116ce86c05c89
SHA51295d5e07a630624eafbb1185d8c9cbd173be848fc23720efc3c6e21c03568f6e41eefa5fe64162b13db1e0fb90e1636bff5d195003af70696ac7445acba619b70
-
Filesize
168KB
MD5e213022b666d995508862734f6ad334e
SHA1b65b143bc8cc19ff48ebce651927279b9ef7713d
SHA256cf525da177acd7aafcaefb2b1cbd307a575623ceab5c1acb885bb45637e1ed29
SHA512576bc6a6f5c730dd72eb05e343743bee9557545141899105e0b95014965618f708b8ea2642b37b70155d03578d57e500fc73bd8a4ef8d770234b7ca3262bf635
-
Filesize
168KB
MD59e2103222a2e19aa804808d2b8486092
SHA13d64727b16d716412a150dfb9060050ec45aeb25
SHA256ff52a1411b9ba59036950531fbf10ce327c0d89bbc5b2e292682f87b8e42888b
SHA51265889b5b8ca52b57e005966541a575765470fccf9245097f8c40778bbbb063f3054915d24f1c1f6632146134bb3736a4eff5b71ef7cbf771ce44ea5ccd315f42
-
Filesize
168KB
MD59ae0750d2505d52264d0b9cc4676fe80
SHA186f4c1142bb764727c7b85919f301c2869065b1c
SHA2565f9eeebf3a546127c76ab95d970a0f1334ef4055dafaeb243987a745c5d97c42
SHA5125d07f8fe04bad1e64e40063b8d6e9f4986922d4b77fc331684b6f9949b787d8b8f74863881ae7a94c05587c4c50c8498ee0fc4316434413d21cb109d809f450b
-
Filesize
168KB
MD5e0cd038c24849e00a69a65b72c94f96b
SHA12a533c6ae8b107b1272c2712fd69c0daa753fcb9
SHA25619c338a59a99762b1bc7b1b81a4e7a9857c434df0c8c6dbd19772e2a7d0db867
SHA512538ae1713b90a2ddccc2a158bc475bbfef4af78385e6a10a73548c74889e23b7c727c71ccef2013de7b463ab96149aa03e8e93c64125dd9665317d6e4fd8f44c
-
Filesize
168KB
MD533bee7c0b5754ed344a813a446b65161
SHA1f575eed41dfb5b0b4a0086a09100963b83d7d49c
SHA256f88e00a17dc55b8b9ecf9f0ccc1ab94b0a67bf002e0d706c6795aaf539c73adb
SHA51202401f3f243539d6ef9d069934db2bb8123181a5be7e247df7bf7884457ff3f96b238718262654a822a01b1d4ba978819d15fffe53764a59ec6370b729bcd2f2
-
Filesize
168KB
MD5561cf80c91d6ea3da5ea11eec52726b1
SHA173e0df5a22395dbc3527e68b6e8f53d3b7155aff
SHA256305ac1db2086236b5419a0ab1c321facfdc405acf260f5994bf0d69704300c4c
SHA5124a47e4f0d65bffaed7e81dea1879dd2636ef147843c2e377a16d53025031626cb6c9a835ddec1b651af09a48dccff123bb811146f2f0cd3e32cc3db703b0d981
-
Filesize
168KB
MD5dd700a700780f6042c55a9161a2866c7
SHA1b5238441b89386d5785ae03851b729243a1254a1
SHA25648373ff78c680364c19c862a44d5697fbdc18ff9b7b50c8aa10f474ae3585598
SHA512e58a61f7509bdf75a86abfb8a5d7a6b84101d581daf599269c5e2b98c870dee90f7ad4c0ce1b342e4c9932c77b4eb2aebf0ebf6395bc692d40b7a412f0fe8fc1
-
Filesize
168KB
MD5f2989074d78ff29cec74f8cf23657f30
SHA1f38fdb0016aaec7bc07106c306fdf2acaf559a7e
SHA2562c8243225d40d5f672ac1d042ea27afa2f403bb02e08382ec62a4906a36c0482
SHA512d5220ca8e4ff17d3b857ee042ae8f65265942474c045892c8a765424949935977eef3aae6b0c0eb1520b058a4d03fa0483ed8abe485730ee6da69b2909c802d2