Analysis
-
max time kernel
149s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe
-
Size
372KB
-
MD5
62cd081bd3e7f9784db59a7d190bfa57
-
SHA1
def16a2b60a6aa463506dd16e62e2e123ee6e19a
-
SHA256
674ad5de64c23d0e0bb26d875d0ffac969bec6bdc38f76e5a135970980d3d54d
-
SHA512
f9c90f55b3cfe7ceb2185c7f55122b8793c8bcb8c627a1c05ad7ef264f4944f887772233762a5f34b5ea81a60b1867bc66ce93117ba45da0ed438836489cd42e
-
SSDEEP
3072:CEGh0o2lMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEG4lkOe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0F423D85-2A85-469d-A55C-4A9EFBC160DD} {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F259B4A-4804-4a81-BE8A-077121A774A6} {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{35F8FF24-E341-4597-99B2-2CB024ED3A22} {3E68C8E4-0875-493b-844B-37287145A6B8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{70E4E410-059F-4c52-AFDF-B7C374BBD821}\stubpath = "C:\\Windows\\{70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe" {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F90F7D89-030A-4a5a-970F-FBFEC0B7E17F} {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{24C2E8BA-4223-4a77-964E-EBC82040278D} 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{514AA36E-11A7-4fae-8F3E-27A9E945AEA3}\stubpath = "C:\\Windows\\{514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe" {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0F423D85-2A85-469d-A55C-4A9EFBC160DD}\stubpath = "C:\\Windows\\{0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe" {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F259B4A-4804-4a81-BE8A-077121A774A6}\stubpath = "C:\\Windows\\{9F259B4A-4804-4a81-BE8A-077121A774A6}.exe" {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DB763F37-6EAF-46c4-B3BE-300A044BABB4} {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DB763F37-6EAF-46c4-B3BE-300A044BABB4}\stubpath = "C:\\Windows\\{DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe" {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{07E4EFC2-61D9-4e17-9BF0-69689137A4B4} {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2A65867E-3020-4a4e-96DA-D38AA99B636F} {F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2C67784C-06BD-4197-A6F5-57FD3017F8F2}\stubpath = "C:\\Windows\\{2C67784C-06BD-4197-A6F5-57FD3017F8F2}.exe" {2A65867E-3020-4a4e-96DA-D38AA99B636F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{514AA36E-11A7-4fae-8F3E-27A9E945AEA3} {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E68C8E4-0875-493b-844B-37287145A6B8} {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E68C8E4-0875-493b-844B-37287145A6B8}\stubpath = "C:\\Windows\\{3E68C8E4-0875-493b-844B-37287145A6B8}.exe" {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{70E4E410-059F-4c52-AFDF-B7C374BBD821} {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{24C2E8BA-4223-4a77-964E-EBC82040278D}\stubpath = "C:\\Windows\\{24C2E8BA-4223-4a77-964E-EBC82040278D}.exe" 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{35F8FF24-E341-4597-99B2-2CB024ED3A22}\stubpath = "C:\\Windows\\{35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe" {3E68C8E4-0875-493b-844B-37287145A6B8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{07E4EFC2-61D9-4e17-9BF0-69689137A4B4}\stubpath = "C:\\Windows\\{07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe" {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}\stubpath = "C:\\Windows\\{F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe" {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2A65867E-3020-4a4e-96DA-D38AA99B636F}\stubpath = "C:\\Windows\\{2A65867E-3020-4a4e-96DA-D38AA99B636F}.exe" {F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2C67784C-06BD-4197-A6F5-57FD3017F8F2} {2A65867E-3020-4a4e-96DA-D38AA99B636F}.exe -
Executes dropped EXE 12 IoCs
pid Process 2912 {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe 3640 {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe 4288 {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe 5016 {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe 2208 {3E68C8E4-0875-493b-844B-37287145A6B8}.exe 4100 {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe 2300 {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe 888 {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe 4396 {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe 4620 {F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe 1032 {2A65867E-3020-4a4e-96DA-D38AA99B636F}.exe 4164 {2C67784C-06BD-4197-A6F5-57FD3017F8F2}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{24C2E8BA-4223-4a77-964E-EBC82040278D}.exe 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe File created C:\Windows\{514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe File created C:\Windows\{0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe File created C:\Windows\{9F259B4A-4804-4a81-BE8A-077121A774A6}.exe {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe File created C:\Windows\{35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe {3E68C8E4-0875-493b-844B-37287145A6B8}.exe File created C:\Windows\{07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe File created C:\Windows\{F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe File created C:\Windows\{3E68C8E4-0875-493b-844B-37287145A6B8}.exe {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe File created C:\Windows\{DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe File created C:\Windows\{70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe File created C:\Windows\{2A65867E-3020-4a4e-96DA-D38AA99B636F}.exe {F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe File created C:\Windows\{2C67784C-06BD-4197-A6F5-57FD3017F8F2}.exe {2A65867E-3020-4a4e-96DA-D38AA99B636F}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2C67784C-06BD-4197-A6F5-57FD3017F8F2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3E68C8E4-0875-493b-844B-37287145A6B8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2A65867E-3020-4a4e-96DA-D38AA99B636F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3864 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe Token: SeIncBasePriorityPrivilege 2912 {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe Token: SeIncBasePriorityPrivilege 3640 {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe Token: SeIncBasePriorityPrivilege 4288 {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe Token: SeIncBasePriorityPrivilege 5016 {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe Token: SeIncBasePriorityPrivilege 2208 {3E68C8E4-0875-493b-844B-37287145A6B8}.exe Token: SeIncBasePriorityPrivilege 4100 {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe Token: SeIncBasePriorityPrivilege 2300 {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe Token: SeIncBasePriorityPrivilege 888 {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe Token: SeIncBasePriorityPrivilege 4396 {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe Token: SeIncBasePriorityPrivilege 4620 {F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe Token: SeIncBasePriorityPrivilege 1032 {2A65867E-3020-4a4e-96DA-D38AA99B636F}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3864 wrote to memory of 2912 3864 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe 94 PID 3864 wrote to memory of 2912 3864 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe 94 PID 3864 wrote to memory of 2912 3864 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe 94 PID 3864 wrote to memory of 2892 3864 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe 95 PID 3864 wrote to memory of 2892 3864 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe 95 PID 3864 wrote to memory of 2892 3864 2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe 95 PID 2912 wrote to memory of 3640 2912 {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe 96 PID 2912 wrote to memory of 3640 2912 {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe 96 PID 2912 wrote to memory of 3640 2912 {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe 96 PID 2912 wrote to memory of 2692 2912 {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe 97 PID 2912 wrote to memory of 2692 2912 {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe 97 PID 2912 wrote to memory of 2692 2912 {24C2E8BA-4223-4a77-964E-EBC82040278D}.exe 97 PID 3640 wrote to memory of 4288 3640 {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe 100 PID 3640 wrote to memory of 4288 3640 {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe 100 PID 3640 wrote to memory of 4288 3640 {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe 100 PID 3640 wrote to memory of 1632 3640 {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe 101 PID 3640 wrote to memory of 1632 3640 {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe 101 PID 3640 wrote to memory of 1632 3640 {514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe 101 PID 4288 wrote to memory of 5016 4288 {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe 102 PID 4288 wrote to memory of 5016 4288 {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe 102 PID 4288 wrote to memory of 5016 4288 {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe 102 PID 4288 wrote to memory of 3368 4288 {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe 103 PID 4288 wrote to memory of 3368 4288 {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe 103 PID 4288 wrote to memory of 3368 4288 {0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe 103 PID 5016 wrote to memory of 2208 5016 {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe 104 PID 5016 wrote to memory of 2208 5016 {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe 104 PID 5016 wrote to memory of 2208 5016 {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe 104 PID 5016 wrote to memory of 3016 5016 {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe 105 PID 5016 wrote to memory of 3016 5016 {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe 105 PID 5016 wrote to memory of 3016 5016 {9F259B4A-4804-4a81-BE8A-077121A774A6}.exe 105 PID 2208 wrote to memory of 4100 2208 {3E68C8E4-0875-493b-844B-37287145A6B8}.exe 106 PID 2208 wrote to memory of 4100 2208 {3E68C8E4-0875-493b-844B-37287145A6B8}.exe 106 PID 2208 wrote to memory of 4100 2208 {3E68C8E4-0875-493b-844B-37287145A6B8}.exe 106 PID 2208 wrote to memory of 4300 2208 {3E68C8E4-0875-493b-844B-37287145A6B8}.exe 107 PID 2208 wrote to memory of 4300 2208 {3E68C8E4-0875-493b-844B-37287145A6B8}.exe 107 PID 2208 wrote to memory of 4300 2208 {3E68C8E4-0875-493b-844B-37287145A6B8}.exe 107 PID 4100 wrote to memory of 2300 4100 {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe 108 PID 4100 wrote to memory of 2300 4100 {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe 108 PID 4100 wrote to memory of 2300 4100 {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe 108 PID 4100 wrote to memory of 5004 4100 {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe 109 PID 4100 wrote to memory of 5004 4100 {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe 109 PID 4100 wrote to memory of 5004 4100 {35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe 109 PID 2300 wrote to memory of 888 2300 {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe 110 PID 2300 wrote to memory of 888 2300 {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe 110 PID 2300 wrote to memory of 888 2300 {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe 110 PID 2300 wrote to memory of 3144 2300 {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe 111 PID 2300 wrote to memory of 3144 2300 {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe 111 PID 2300 wrote to memory of 3144 2300 {DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe 111 PID 888 wrote to memory of 4396 888 {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe 112 PID 888 wrote to memory of 4396 888 {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe 112 PID 888 wrote to memory of 4396 888 {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe 112 PID 888 wrote to memory of 5032 888 {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe 113 PID 888 wrote to memory of 5032 888 {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe 113 PID 888 wrote to memory of 5032 888 {07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe 113 PID 4396 wrote to memory of 4620 4396 {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe 114 PID 4396 wrote to memory of 4620 4396 {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe 114 PID 4396 wrote to memory of 4620 4396 {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe 114 PID 4396 wrote to memory of 1548 4396 {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe 115 PID 4396 wrote to memory of 1548 4396 {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe 115 PID 4396 wrote to memory of 1548 4396 {70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe 115 PID 4620 wrote to memory of 1032 4620 {F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe 116 PID 4620 wrote to memory of 1032 4620 {F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe 116 PID 4620 wrote to memory of 1032 4620 {F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe 116 PID 4620 wrote to memory of 4644 4620 {F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024090562cd081bd3e7f9784db59a7d190bfa57goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\{24C2E8BA-4223-4a77-964E-EBC82040278D}.exeC:\Windows\{24C2E8BA-4223-4a77-964E-EBC82040278D}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\{514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exeC:\Windows\{514AA36E-11A7-4fae-8F3E-27A9E945AEA3}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\{0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exeC:\Windows\{0F423D85-2A85-469d-A55C-4A9EFBC160DD}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\{9F259B4A-4804-4a81-BE8A-077121A774A6}.exeC:\Windows\{9F259B4A-4804-4a81-BE8A-077121A774A6}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\{3E68C8E4-0875-493b-844B-37287145A6B8}.exeC:\Windows\{3E68C8E4-0875-493b-844B-37287145A6B8}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\{35F8FF24-E341-4597-99B2-2CB024ED3A22}.exeC:\Windows\{35F8FF24-E341-4597-99B2-2CB024ED3A22}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\{DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exeC:\Windows\{DB763F37-6EAF-46c4-B3BE-300A044BABB4}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\{07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exeC:\Windows\{07E4EFC2-61D9-4e17-9BF0-69689137A4B4}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\{70E4E410-059F-4c52-AFDF-B7C374BBD821}.exeC:\Windows\{70E4E410-059F-4c52-AFDF-B7C374BBD821}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\{F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exeC:\Windows\{F90F7D89-030A-4a5a-970F-FBFEC0B7E17F}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\{2A65867E-3020-4a4e-96DA-D38AA99B636F}.exeC:\Windows\{2A65867E-3020-4a4e-96DA-D38AA99B636F}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1032 -
C:\Windows\{2C67784C-06BD-4197-A6F5-57FD3017F8F2}.exeC:\Windows\{2C67784C-06BD-4197-A6F5-57FD3017F8F2}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2A658~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F90F7~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70E4E~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{07E4E~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:5032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DB763~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{35F8F~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3E68C~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9F259~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0F423~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{514AA~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{24C2E~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\202409~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5d908f078791623e5ad5fdd533da878bb
SHA168b67515abb77ceabe7057a217933dbf7093d849
SHA25610e5b3a8f377fc8479c6e99a55361a43bd68a1beb79ce13a2615db00cbef3c18
SHA5126dc70600819cda2bbc679b56118d0c21b74ffcf2b55e108802e127b00f39bc3d399252cc1bf1fff67f3e2eee67ec197483e4ac44e0699d9cc4a1cc4125433c55
-
Filesize
372KB
MD5b69f4899fa61a061b0ac4f91cae14b37
SHA13b3c3d8c52baf7a40b2bdb154323af2ac92706e3
SHA2566f6273417f73ed0f6854ced212f93b0c4c64b9631f23b503d771bba15781c947
SHA512f74a07792fddd67127a22c91de50dbba626f9490e0f44668e8cbfe06cc7c2c0406bf823453c63caab7dfb3ee9fbe2ee95713f1daff4fbedb3756c5acd3242dbf
-
Filesize
372KB
MD59b468096e9f7388e8e066e7543622172
SHA1193f819a39f0642d236c3925112d082d2e4528d5
SHA25694406e375ebaee65baef8e8a5f7019355623c2c29f56e1b8ba6fd7699c821422
SHA5120b552bf78304e123c34d6206296a0ca697a9ac46faa2eabed813e78c4af4cb2ed007d3bd31cbb99239f5cb6104df8b616e44deff7d348adc77108e8662dffcb7
-
Filesize
372KB
MD51b0418a6451305157b6230d184624e47
SHA124945bd53d4b80253cc663b42e8e0d324652f804
SHA256e1f45823a98871fb633083f5114ec47eb78b54a425adbda45172d7cd12067f98
SHA5125fa929651d3bc3a349545b459a0b441e883e3479b0b2c8aa97d0003addcf3d153b148b34f15c33e088039553a55cb686422d80457c04dba70272cf788149b4be
-
Filesize
372KB
MD50d6bc2dfde7c36be6ec917619cf3c9b9
SHA1c38d14ac0c3fd43c1e4d28fb1abc1c3f4d71df28
SHA25643842d9d422965a1752e9c53ee85ca09c1beb2f136b97876ba7030417e6b0835
SHA5122bd4addd32d9ca13aa851fc97f07f30419fbc1907dcd020a8949ee1166742cdfaa6a3192ee7596b4c995e73c1c1552ad77be417b02b8fcc9c7fc8d64d2d5a147
-
Filesize
372KB
MD5c36ec9d6384345935d3a524b63dc0a4e
SHA1b22f91fd9f963c46e618cd9918c418c071517f76
SHA2565f6f3f66efd438faecced31c180430b380fa50bc568cca1ef5c4a75793686444
SHA5128583a837009741608d0703ef10638cd4af400937e05955daeb36437f91ac8c0e26ef293a6cc30847c7740fd58a480167f9eac18f34cf5d7e011177f8cbc3ffb3
-
Filesize
372KB
MD51471436ce54564d8ce391f977d17d1da
SHA19d40c248074c608b7bc8bab68b545bf65d2f626b
SHA2568f43157351dd14e644b3726898e86832461421afb3ce008b1ce7d15bdd93f7c1
SHA512e65005a6ccfc65ed662db2bbd1e3afd9865954773e9bbaec6b7c8771e682ab6bab7b29f313ff70168179c672fa103b55bd34c8af38a11fade0748731a5080fd5
-
Filesize
372KB
MD5338b993d736e2270226c52c28f112272
SHA1aa85c61bd396bad5d75454b0d6f4a535b4f61c70
SHA2563f0033b5b6ed8e0c1593c5d212b90aebb5371183f6c03a61710f2e0348ac46a7
SHA51206f120656c55f21cea98ff8e307d4a373f9a13ea129a44d9e4cd511d6f7912851ad42ab67630e106fa0b5b538c59b382b57a15d510c40a96af50123319be27a1
-
Filesize
372KB
MD594f53d5542728053421df3f802297cf3
SHA18eb9dea014895511c4ae9cf93f49b92dc8d0b2ff
SHA256a3bef6ab09e7649dd1da33873a0ea0b1901d62833512d731925f28d3501b7d6b
SHA5122d1597a12e133399c9158733f7839fee813f41417360200692e004eb6da98d34e208404dda86f9a341eb1193fdf1f69c7f6f9d24ad0d39c31d1e0f43c6f6190f
-
Filesize
372KB
MD542b2dead4ca52bc3d08f901066294e40
SHA1ffbe9d2d07c956230979c19d5b8a11af3e5025f6
SHA25617dd1aa5f0d99fc712efc2d059af7b3979b526805148a4bc97a589999de86eb3
SHA5124fc801aea1f7a3bafb0bcdd9578ecadca767d59b7b8d17866605bbee8ac946ea55fa8a0a840c54455a2e20f8fdeabe56e2bd369895c2cf0e942e396d5e2aafe0
-
Filesize
372KB
MD5d1194a9b3492c36e403a799e195680f5
SHA1d5bfb838096e33c82eea23069a223f4273d45560
SHA256226e85ceebcf579fe32fd713164bb278163bedb5bf7af81b6a71d1e205ef71bb
SHA5125630ec8499c10eaed6325d51bf836fde7910a9960b49da1ec9177ad7d731c9763870827467910be757d25b3e9eaeab8c89bc2bd5b2dca4e607510ec2a0eb34f9
-
Filesize
372KB
MD581205c9040a0910783d40fa1f63ae700
SHA16f7b63db8633c535455fefa090761691d3f4806e
SHA25663245d4175ba0c7ddb7d7387f8f1e1adbe75dc552eb198ddc5311eb3426bdd1d
SHA512e18a8d64854fd81af3931048808ba3d7db6cb6b6576a02a2ce24f2baf5d0dcf01fdcd51b1d1b69a81481966d5a9ea6dd863db52fa2d4e874db8dc39b8ce946a2