Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 10:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe
-
Size
408KB
-
MD5
6a5a4e995801b16fa572127029bf3030
-
SHA1
2ca35553daaca842df7b0c50f87d2ec127b39905
-
SHA256
0d6ca38949b3046297959ff92a108f31e784c8fc308ce22ff4227c82786a0bb7
-
SHA512
b19c685257989570b03b7c82f5281ab14689373f0ebd843d2d06fa20c81edf1546edc0a3564b0def9066bf0cbee89d3dfe7dc6a99afa61ffb434386e5882e56f
-
SSDEEP
3072:CEGh0orl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGtldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0993FA7-F301-423a-BFB2-BA705688282D}\stubpath = "C:\\Windows\\{D0993FA7-F301-423a-BFB2-BA705688282D}.exe" {999C3172-3204-47a8-8424-F285D5B677D2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E2EF7225-53D4-4795-A51E-FF22BA0FE501}\stubpath = "C:\\Windows\\{E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe" {D0993FA7-F301-423a-BFB2-BA705688282D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{85B08F43-DBA2-47f2-8DBE-ED96502907D4} {1141C108-691E-4f3a-9F62-30E21444477C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CEAFCDFC-1310-40bb-A474-7E0358DE5A5A}\stubpath = "C:\\Windows\\{CEAFCDFC-1310-40bb-A474-7E0358DE5A5A}.exe" {13C689A3-CBBB-4277-AB28-4E74E9EFB553}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E9553056-7BD2-4799-AB35-E4D40F312C11}\stubpath = "C:\\Windows\\{E9553056-7BD2-4799-AB35-E4D40F312C11}.exe" {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E2EF7225-53D4-4795-A51E-FF22BA0FE501} {D0993FA7-F301-423a-BFB2-BA705688282D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{13C689A3-CBBB-4277-AB28-4E74E9EFB553} {926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9C084767-38D7-4ea1-8F24-1BD73F301D93}\stubpath = "C:\\Windows\\{9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe" 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A} {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E71EE6E2-D143-4f22-93EA-C881C1B7DA0D} {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}\stubpath = "C:\\Windows\\{E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe" {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E9553056-7BD2-4799-AB35-E4D40F312C11} {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{13C689A3-CBBB-4277-AB28-4E74E9EFB553}\stubpath = "C:\\Windows\\{13C689A3-CBBB-4277-AB28-4E74E9EFB553}.exe" {926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9C084767-38D7-4ea1-8F24-1BD73F301D93} 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{999C3172-3204-47a8-8424-F285D5B677D2}\stubpath = "C:\\Windows\\{999C3172-3204-47a8-8424-F285D5B677D2}.exe" {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1141C108-691E-4f3a-9F62-30E21444477C}\stubpath = "C:\\Windows\\{1141C108-691E-4f3a-9F62-30E21444477C}.exe" {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{85B08F43-DBA2-47f2-8DBE-ED96502907D4}\stubpath = "C:\\Windows\\{85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe" {1141C108-691E-4f3a-9F62-30E21444477C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}\stubpath = "C:\\Windows\\{926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe" {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CEAFCDFC-1310-40bb-A474-7E0358DE5A5A} {13C689A3-CBBB-4277-AB28-4E74E9EFB553}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}\stubpath = "C:\\Windows\\{60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe" {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{999C3172-3204-47a8-8424-F285D5B677D2} {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0993FA7-F301-423a-BFB2-BA705688282D} {999C3172-3204-47a8-8424-F285D5B677D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1141C108-691E-4f3a-9F62-30E21444477C} {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{926C40CB-F7A0-49a2-ADA4-8CB33E9A2686} {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe -
Executes dropped EXE 12 IoCs
pid Process 4636 {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe 4588 {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe 388 {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe 4132 {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe 4508 {999C3172-3204-47a8-8424-F285D5B677D2}.exe 3228 {D0993FA7-F301-423a-BFB2-BA705688282D}.exe 1800 {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe 4408 {1141C108-691E-4f3a-9F62-30E21444477C}.exe 3808 {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe 2088 {926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe 1244 {13C689A3-CBBB-4277-AB28-4E74E9EFB553}.exe 4076 {CEAFCDFC-1310-40bb-A474-7E0358DE5A5A}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe File created C:\Windows\{60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe File created C:\Windows\{85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe {1141C108-691E-4f3a-9F62-30E21444477C}.exe File created C:\Windows\{13C689A3-CBBB-4277-AB28-4E74E9EFB553}.exe {926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe File created C:\Windows\{CEAFCDFC-1310-40bb-A474-7E0358DE5A5A}.exe {13C689A3-CBBB-4277-AB28-4E74E9EFB553}.exe File created C:\Windows\{E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe File created C:\Windows\{E9553056-7BD2-4799-AB35-E4D40F312C11}.exe {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe File created C:\Windows\{999C3172-3204-47a8-8424-F285D5B677D2}.exe {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe File created C:\Windows\{D0993FA7-F301-423a-BFB2-BA705688282D}.exe {999C3172-3204-47a8-8424-F285D5B677D2}.exe File created C:\Windows\{E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe {D0993FA7-F301-423a-BFB2-BA705688282D}.exe File created C:\Windows\{1141C108-691E-4f3a-9F62-30E21444477C}.exe {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe File created C:\Windows\{926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1141C108-691E-4f3a-9F62-30E21444477C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {999C3172-3204-47a8-8424-F285D5B677D2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D0993FA7-F301-423a-BFB2-BA705688282D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CEAFCDFC-1310-40bb-A474-7E0358DE5A5A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {13C689A3-CBBB-4277-AB28-4E74E9EFB553}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4084 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe Token: SeIncBasePriorityPrivilege 4636 {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe Token: SeIncBasePriorityPrivilege 4588 {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe Token: SeIncBasePriorityPrivilege 388 {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe Token: SeIncBasePriorityPrivilege 4132 {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe Token: SeIncBasePriorityPrivilege 4508 {999C3172-3204-47a8-8424-F285D5B677D2}.exe Token: SeIncBasePriorityPrivilege 3228 {D0993FA7-F301-423a-BFB2-BA705688282D}.exe Token: SeIncBasePriorityPrivilege 1800 {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe Token: SeIncBasePriorityPrivilege 4408 {1141C108-691E-4f3a-9F62-30E21444477C}.exe Token: SeIncBasePriorityPrivilege 3808 {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe Token: SeIncBasePriorityPrivilege 2088 {926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe Token: SeIncBasePriorityPrivilege 1244 {13C689A3-CBBB-4277-AB28-4E74E9EFB553}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4636 4084 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe 93 PID 4084 wrote to memory of 4636 4084 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe 93 PID 4084 wrote to memory of 4636 4084 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe 93 PID 4084 wrote to memory of 3380 4084 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe 94 PID 4084 wrote to memory of 3380 4084 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe 94 PID 4084 wrote to memory of 3380 4084 2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe 94 PID 4636 wrote to memory of 4588 4636 {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe 95 PID 4636 wrote to memory of 4588 4636 {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe 95 PID 4636 wrote to memory of 4588 4636 {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe 95 PID 4636 wrote to memory of 2508 4636 {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe 96 PID 4636 wrote to memory of 2508 4636 {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe 96 PID 4636 wrote to memory of 2508 4636 {9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe 96 PID 4588 wrote to memory of 388 4588 {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe 99 PID 4588 wrote to memory of 388 4588 {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe 99 PID 4588 wrote to memory of 388 4588 {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe 99 PID 4588 wrote to memory of 696 4588 {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe 100 PID 4588 wrote to memory of 696 4588 {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe 100 PID 4588 wrote to memory of 696 4588 {60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe 100 PID 388 wrote to memory of 4132 388 {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe 101 PID 388 wrote to memory of 4132 388 {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe 101 PID 388 wrote to memory of 4132 388 {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe 101 PID 388 wrote to memory of 4464 388 {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe 102 PID 388 wrote to memory of 4464 388 {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe 102 PID 388 wrote to memory of 4464 388 {E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe 102 PID 4132 wrote to memory of 4508 4132 {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe 103 PID 4132 wrote to memory of 4508 4132 {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe 103 PID 4132 wrote to memory of 4508 4132 {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe 103 PID 4132 wrote to memory of 3612 4132 {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe 104 PID 4132 wrote to memory of 3612 4132 {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe 104 PID 4132 wrote to memory of 3612 4132 {E9553056-7BD2-4799-AB35-E4D40F312C11}.exe 104 PID 4508 wrote to memory of 3228 4508 {999C3172-3204-47a8-8424-F285D5B677D2}.exe 105 PID 4508 wrote to memory of 3228 4508 {999C3172-3204-47a8-8424-F285D5B677D2}.exe 105 PID 4508 wrote to memory of 3228 4508 {999C3172-3204-47a8-8424-F285D5B677D2}.exe 105 PID 4508 wrote to memory of 4524 4508 {999C3172-3204-47a8-8424-F285D5B677D2}.exe 106 PID 4508 wrote to memory of 4524 4508 {999C3172-3204-47a8-8424-F285D5B677D2}.exe 106 PID 4508 wrote to memory of 4524 4508 {999C3172-3204-47a8-8424-F285D5B677D2}.exe 106 PID 3228 wrote to memory of 1800 3228 {D0993FA7-F301-423a-BFB2-BA705688282D}.exe 107 PID 3228 wrote to memory of 1800 3228 {D0993FA7-F301-423a-BFB2-BA705688282D}.exe 107 PID 3228 wrote to memory of 1800 3228 {D0993FA7-F301-423a-BFB2-BA705688282D}.exe 107 PID 3228 wrote to memory of 5028 3228 {D0993FA7-F301-423a-BFB2-BA705688282D}.exe 108 PID 3228 wrote to memory of 5028 3228 {D0993FA7-F301-423a-BFB2-BA705688282D}.exe 108 PID 3228 wrote to memory of 5028 3228 {D0993FA7-F301-423a-BFB2-BA705688282D}.exe 108 PID 1800 wrote to memory of 4408 1800 {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe 109 PID 1800 wrote to memory of 4408 1800 {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe 109 PID 1800 wrote to memory of 4408 1800 {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe 109 PID 1800 wrote to memory of 3880 1800 {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe 110 PID 1800 wrote to memory of 3880 1800 {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe 110 PID 1800 wrote to memory of 3880 1800 {E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe 110 PID 4408 wrote to memory of 3808 4408 {1141C108-691E-4f3a-9F62-30E21444477C}.exe 111 PID 4408 wrote to memory of 3808 4408 {1141C108-691E-4f3a-9F62-30E21444477C}.exe 111 PID 4408 wrote to memory of 3808 4408 {1141C108-691E-4f3a-9F62-30E21444477C}.exe 111 PID 4408 wrote to memory of 4984 4408 {1141C108-691E-4f3a-9F62-30E21444477C}.exe 112 PID 4408 wrote to memory of 4984 4408 {1141C108-691E-4f3a-9F62-30E21444477C}.exe 112 PID 4408 wrote to memory of 4984 4408 {1141C108-691E-4f3a-9F62-30E21444477C}.exe 112 PID 3808 wrote to memory of 2088 3808 {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe 113 PID 3808 wrote to memory of 2088 3808 {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe 113 PID 3808 wrote to memory of 2088 3808 {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe 113 PID 3808 wrote to memory of 2348 3808 {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe 114 PID 3808 wrote to memory of 2348 3808 {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe 114 PID 3808 wrote to memory of 2348 3808 {85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe 114 PID 2088 wrote to memory of 1244 2088 {926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe 115 PID 2088 wrote to memory of 1244 2088 {926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe 115 PID 2088 wrote to memory of 1244 2088 {926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe 115 PID 2088 wrote to memory of 1960 2088 {926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-06_6a5a4e995801b16fa572127029bf3030_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\{9C084767-38D7-4ea1-8F24-1BD73F301D93}.exeC:\Windows\{9C084767-38D7-4ea1-8F24-1BD73F301D93}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\{60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exeC:\Windows\{60FA926C-5BA4-4ec2-AE83-DFD8FB9D1C3A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\{E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exeC:\Windows\{E71EE6E2-D143-4f22-93EA-C881C1B7DA0D}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\{E9553056-7BD2-4799-AB35-E4D40F312C11}.exeC:\Windows\{E9553056-7BD2-4799-AB35-E4D40F312C11}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\{999C3172-3204-47a8-8424-F285D5B677D2}.exeC:\Windows\{999C3172-3204-47a8-8424-F285D5B677D2}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\{D0993FA7-F301-423a-BFB2-BA705688282D}.exeC:\Windows\{D0993FA7-F301-423a-BFB2-BA705688282D}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\{E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exeC:\Windows\{E2EF7225-53D4-4795-A51E-FF22BA0FE501}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\{1141C108-691E-4f3a-9F62-30E21444477C}.exeC:\Windows\{1141C108-691E-4f3a-9F62-30E21444477C}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\{85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exeC:\Windows\{85B08F43-DBA2-47f2-8DBE-ED96502907D4}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\{926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exeC:\Windows\{926C40CB-F7A0-49a2-ADA4-8CB33E9A2686}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\{13C689A3-CBBB-4277-AB28-4E74E9EFB553}.exeC:\Windows\{13C689A3-CBBB-4277-AB28-4E74E9EFB553}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Windows\{CEAFCDFC-1310-40bb-A474-7E0358DE5A5A}.exeC:\Windows\{CEAFCDFC-1310-40bb-A474-7E0358DE5A5A}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{13C68~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{926C4~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{85B08~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1141C~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E2EF7~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D0993~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{999C3~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E9553~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E71EE~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{60FA9~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9C084~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5e55054f7164674043c8f65b54b548b4f
SHA18d0a3e07d4262bbfb29ca267665c9290a5b02104
SHA25699a81973263d6b1ae6f8b306f55331d35c340553a8e218ab0e616edf3b2b9023
SHA512ead78c153136ca493f723e04a635c0064abc20967b753c7abed989cabbf04f34bf8a69a94b34a4d536d5520ca21d25bfe63e75e862f6b72da2e7f5d2e9c33d78
-
Filesize
408KB
MD5081903c5ff80d41cdaa42aa203322fc7
SHA18a9850f2ea135bc03435ec6cdd403ae7d4b1d9b0
SHA256ff5af084872f316b4702a0452443860547f3c0df101007383596c8db79331b3f
SHA5124021e84456dbd2cb29eecd814aa17d76c2cbead5f255cd9d01fc9c6c6093606af6adb154e47cbdb5cd1c28e545f63e3a5e595e7b580a86348a13b383e4be4c3f
-
Filesize
408KB
MD5934161fc34367666351df533eddf2e8f
SHA17c4522b9d08f111a96903734127fd7e3fe069227
SHA25641676fd753787a5babb062018773a9bb44da5f5984b6f6ea6b3dc5c54ae78da0
SHA512318a468e1609e3eaf8668dffcf1074afec7faf539377fbca25e1a6b3e26036d386b2d77eba492fa391fb5af180f9bc9ab7d93b4de306dfec88ee22341688b4ce
-
Filesize
408KB
MD5f9cc4b07499fcf6554370b9267e832d6
SHA16666b2354dd608dd7e6b1f9306a103af31ffb053
SHA256cd28403010b8851df51a32544fb90443355445551fd75f772351c0f12e9084a8
SHA512d1346212ae247f2cf3af0937fb6f4ca70b2ba60e7b64582f05fefea915979de6fcc7a3a40c5b9191d481d4d7bce3f6043fa863e9f67c5ec5794542442858d36f
-
Filesize
408KB
MD584ad2938ccb784180aace3dc60cd2adb
SHA1aecf32366589ef5d20ee3f8c4cd2089429849046
SHA25636087b5e860d5f1398b180c30b365090eb94d99f4b5671ebd889b91ebbe03784
SHA5121f2650f6bc2d76d97bab8a915641c13441adbe1c2f5a61c03afd38302e1bac2fea32f5fd6765fd62f95e868061f3b53e3fe1445fc213d2e5287feea47f1e6adc
-
Filesize
408KB
MD5a568e33ab7a093f4d3eccf186525b9a7
SHA12d209aeab2301b16860e58470a19e16b551860f5
SHA256347e836524fc608631b6276726727cbf600590713311e62df100d4bad3dde733
SHA5124aaee898c7628301dcd760f028c2264a2389889d4fa32fb2026fbc95d444ac478703fba67ab75220665ece25ea5fff501e569cba6ee66dba3ff50c0712a676a8
-
Filesize
408KB
MD52d759c8a5996438021296d0e60746271
SHA1340edb934828f84720499e872a1ecee019b9bacd
SHA256ab59239e7acaa9b437015cfaf07159180b4ac1d7dced6aa7d342d34ff5542b75
SHA51218df170e5353ffeefa6fcae3904b57e063beee28233fd3b966ac572c5bfc53cd9828ace22e0bbed86a5ff52df1c1df081d1df96da0f4c722ff0e3d459bbf3e2b
-
Filesize
408KB
MD536293cf28cbb50e67b9488c1f32fd2f5
SHA1cc4b836f0bb6175ea5074952de937f83e908b41e
SHA25689359766f0b3aa3c0d2b60810e3f4fab3f3ec94aef31960a9442f6277cfe0a72
SHA512e0b829fa20789d14ef56ac7664827a5f627b56ba75ee88fb369f7ba65f8b9ffeb91ca6be505940d604b314571f98d0d7f7efc633965ee08fc94b7b80ab023e12
-
Filesize
408KB
MD52929c7b6277edb776e2daf1ff44997a3
SHA16a8d278bc4e1bdfa6c97538288202eca47ff76f9
SHA25642e3473baa441998ca5c14c916b620b8d0054d4580d985c38fc3e5a211f4b57b
SHA5127a963fe45f4c8af0354d49d09e78bd5725a9d20570eceb9d0bff05efa7e16bd97345b7859eaada7fd0ffd34f273a9f8c56fbd6522fb7de650c62615d4a1fe89b
-
Filesize
408KB
MD592c1c514d04d82e6e44de5ed84fdb667
SHA1172ab3dadf4202a662a50619c9aed50c341b55b1
SHA256c762533a81caf9d02a4898197d69aada51c4fb243fd1a2ad0f957f5b1350d947
SHA512317da78ee5538189d134f948cd601bce39488a493425244c91e7267fdc4be13983dac1dc1a41c6d55fd0c52ffcec3acbaea83aba90fc02c1e0a03d0739333dd8
-
Filesize
408KB
MD58fd525c922e8e2b15544955ff84197b2
SHA19282532c276e47e8f3ff448ac332197d246888bb
SHA256f626e34351bebc6607ded4ec3ee49e9bca94e417536667dff663db80b58d5d55
SHA512c561bb304d6d1279f8f786ac80d61fb38bd79178ce3a49db641013c754113e4e693542d6217eea22de46e2287eb8418f756b1399d7242fa9ceca8e492c76e1ea
-
Filesize
408KB
MD5c4b01e79168e0f0bf038bb3a8c7b6729
SHA1155e83a11399455b43f845a0dbbb4dc705eafccc
SHA256701f46dfc40eff1b6eb4f409abfbf4c11967c4beb82c7ea268b69da220ed508c
SHA512ded735840255ba2488a6512db98f35212b6c02de666c7c681dc664318827122c1b00f8b75f430bfd910be4431267c3b64d3881125958725833219e29b1ab3135