Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe
-
Size
344KB
-
MD5
98482feaf9eb3d76a570fb5749b9cdec
-
SHA1
4cc36f3ea4dde25dfcb1a216ad95b39cf859c09f
-
SHA256
85215d9138ce57e501e742ad561460b9f08df73de4299bec8a6caffec743711f
-
SHA512
e9fb4e971949ab1c53eab8c846af963795bf4be1bd8dfb80566a67004805bc1c205a794b24f624cb3f5d4c6bdaf182a55c2a02957b07ccac0e42c90a612d589e
-
SSDEEP
3072:mEGh0oIlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG6lqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}\stubpath = "C:\\Windows\\{89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}.exe" {6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{785895BC-1C49-43a4-B4BD-A00FD048FD2E}\stubpath = "C:\\Windows\\{785895BC-1C49-43a4-B4BD-A00FD048FD2E}.exe" {89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{823B39F7-F1F6-47a7-B4D8-E38991EDFFC1} {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1BDFC53F-3267-4aee-8FD9-E9F537FB5C24} {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DFA57B5-5D01-456f-82BC-378FCCF0376F} {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}\stubpath = "C:\\Windows\\{6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}.exe" {26F445EB-75FB-4877-856F-2DE991EFBA5B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{89AA4D2A-4965-499a-BAAD-F4B8514FFE3F} {6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}\stubpath = "C:\\Windows\\{1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe" {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5} {26F445EB-75FB-4877-856F-2DE991EFBA5B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{785895BC-1C49-43a4-B4BD-A00FD048FD2E} {89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{87358BD7-A258-44c2-97C9-F17FF03D432C}\stubpath = "C:\\Windows\\{87358BD7-A258-44c2-97C9-F17FF03D432C}.exe" 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}\stubpath = "C:\\Windows\\{7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe" {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EC216DA2-E038-4747-8F3F-49DF1E3BD98E} {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EC216DA2-E038-4747-8F3F-49DF1E3BD98E}\stubpath = "C:\\Windows\\{EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe" {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3259A6D7-0A77-4d4b-9375-13447B04E295} {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{87358BD7-A258-44c2-97C9-F17FF03D432C} 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3259A6D7-0A77-4d4b-9375-13447B04E295}\stubpath = "C:\\Windows\\{3259A6D7-0A77-4d4b-9375-13447B04E295}.exe" {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DFA57B5-5D01-456f-82BC-378FCCF0376F}\stubpath = "C:\\Windows\\{2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe" {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26F445EB-75FB-4877-856F-2DE991EFBA5B}\stubpath = "C:\\Windows\\{26F445EB-75FB-4877-856F-2DE991EFBA5B}.exe" {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}\stubpath = "C:\\Windows\\{823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe" {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330} {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26F445EB-75FB-4877-856F-2DE991EFBA5B} {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe -
Deletes itself 1 IoCs
pid Process 1724 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2552 {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe 3028 {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe 2648 {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe 2608 {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe 1952 {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe 2856 {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe 2368 {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe 1152 {26F445EB-75FB-4877-856F-2DE991EFBA5B}.exe 876 {6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}.exe 1528 {89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}.exe 2800 {785895BC-1C49-43a4-B4BD-A00FD048FD2E}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe File created C:\Windows\{3259A6D7-0A77-4d4b-9375-13447B04E295}.exe {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe File created C:\Windows\{6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}.exe {26F445EB-75FB-4877-856F-2DE991EFBA5B}.exe File created C:\Windows\{89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}.exe {6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}.exe File created C:\Windows\{785895BC-1C49-43a4-B4BD-A00FD048FD2E}.exe {89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}.exe File created C:\Windows\{87358BD7-A258-44c2-97C9-F17FF03D432C}.exe 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe File created C:\Windows\{7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe File created C:\Windows\{EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe File created C:\Windows\{1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe File created C:\Windows\{2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe File created C:\Windows\{26F445EB-75FB-4877-856F-2DE991EFBA5B}.exe {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {26F445EB-75FB-4877-856F-2DE991EFBA5B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {785895BC-1C49-43a4-B4BD-A00FD048FD2E}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2184 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe Token: SeIncBasePriorityPrivilege 2552 {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe Token: SeIncBasePriorityPrivilege 3028 {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe Token: SeIncBasePriorityPrivilege 2648 {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe Token: SeIncBasePriorityPrivilege 2608 {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe Token: SeIncBasePriorityPrivilege 1952 {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe Token: SeIncBasePriorityPrivilege 2856 {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe Token: SeIncBasePriorityPrivilege 2368 {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe Token: SeIncBasePriorityPrivilege 1152 {26F445EB-75FB-4877-856F-2DE991EFBA5B}.exe Token: SeIncBasePriorityPrivilege 876 {6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}.exe Token: SeIncBasePriorityPrivilege 1528 {89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2552 2184 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe 30 PID 2184 wrote to memory of 2552 2184 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe 30 PID 2184 wrote to memory of 2552 2184 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe 30 PID 2184 wrote to memory of 2552 2184 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe 30 PID 2184 wrote to memory of 1724 2184 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe 31 PID 2184 wrote to memory of 1724 2184 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe 31 PID 2184 wrote to memory of 1724 2184 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe 31 PID 2184 wrote to memory of 1724 2184 2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe 31 PID 2552 wrote to memory of 3028 2552 {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe 33 PID 2552 wrote to memory of 3028 2552 {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe 33 PID 2552 wrote to memory of 3028 2552 {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe 33 PID 2552 wrote to memory of 3028 2552 {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe 33 PID 2552 wrote to memory of 2740 2552 {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe 34 PID 2552 wrote to memory of 2740 2552 {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe 34 PID 2552 wrote to memory of 2740 2552 {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe 34 PID 2552 wrote to memory of 2740 2552 {87358BD7-A258-44c2-97C9-F17FF03D432C}.exe 34 PID 3028 wrote to memory of 2648 3028 {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe 35 PID 3028 wrote to memory of 2648 3028 {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe 35 PID 3028 wrote to memory of 2648 3028 {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe 35 PID 3028 wrote to memory of 2648 3028 {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe 35 PID 3028 wrote to memory of 2968 3028 {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe 36 PID 3028 wrote to memory of 2968 3028 {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe 36 PID 3028 wrote to memory of 2968 3028 {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe 36 PID 3028 wrote to memory of 2968 3028 {823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe 36 PID 2648 wrote to memory of 2608 2648 {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe 37 PID 2648 wrote to memory of 2608 2648 {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe 37 PID 2648 wrote to memory of 2608 2648 {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe 37 PID 2648 wrote to memory of 2608 2648 {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe 37 PID 2648 wrote to memory of 2676 2648 {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe 38 PID 2648 wrote to memory of 2676 2648 {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe 38 PID 2648 wrote to memory of 2676 2648 {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe 38 PID 2648 wrote to memory of 2676 2648 {7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe 38 PID 2608 wrote to memory of 1952 2608 {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe 39 PID 2608 wrote to memory of 1952 2608 {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe 39 PID 2608 wrote to memory of 1952 2608 {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe 39 PID 2608 wrote to memory of 1952 2608 {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe 39 PID 2608 wrote to memory of 800 2608 {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe 40 PID 2608 wrote to memory of 800 2608 {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe 40 PID 2608 wrote to memory of 800 2608 {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe 40 PID 2608 wrote to memory of 800 2608 {EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe 40 PID 1952 wrote to memory of 2856 1952 {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe 41 PID 1952 wrote to memory of 2856 1952 {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe 41 PID 1952 wrote to memory of 2856 1952 {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe 41 PID 1952 wrote to memory of 2856 1952 {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe 41 PID 1952 wrote to memory of 2964 1952 {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe 42 PID 1952 wrote to memory of 2964 1952 {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe 42 PID 1952 wrote to memory of 2964 1952 {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe 42 PID 1952 wrote to memory of 2964 1952 {3259A6D7-0A77-4d4b-9375-13447B04E295}.exe 42 PID 2856 wrote to memory of 2368 2856 {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe 43 PID 2856 wrote to memory of 2368 2856 {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe 43 PID 2856 wrote to memory of 2368 2856 {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe 43 PID 2856 wrote to memory of 2368 2856 {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe 43 PID 2856 wrote to memory of 2508 2856 {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe 44 PID 2856 wrote to memory of 2508 2856 {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe 44 PID 2856 wrote to memory of 2508 2856 {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe 44 PID 2856 wrote to memory of 2508 2856 {1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe 44 PID 2368 wrote to memory of 1152 2368 {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe 45 PID 2368 wrote to memory of 1152 2368 {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe 45 PID 2368 wrote to memory of 1152 2368 {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe 45 PID 2368 wrote to memory of 1152 2368 {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe 45 PID 2368 wrote to memory of 2092 2368 {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe 46 PID 2368 wrote to memory of 2092 2368 {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe 46 PID 2368 wrote to memory of 2092 2368 {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe 46 PID 2368 wrote to memory of 2092 2368 {2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-07_98482feaf9eb3d76a570fb5749b9cdec_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\{87358BD7-A258-44c2-97C9-F17FF03D432C}.exeC:\Windows\{87358BD7-A258-44c2-97C9-F17FF03D432C}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\{823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exeC:\Windows\{823B39F7-F1F6-47a7-B4D8-E38991EDFFC1}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\{7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exeC:\Windows\{7AA4EC5E-E63C-4d02-BD06-8E3B8EE2E330}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\{EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exeC:\Windows\{EC216DA2-E038-4747-8F3F-49DF1E3BD98E}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\{3259A6D7-0A77-4d4b-9375-13447B04E295}.exeC:\Windows\{3259A6D7-0A77-4d4b-9375-13447B04E295}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\{1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exeC:\Windows\{1BDFC53F-3267-4aee-8FD9-E9F537FB5C24}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\{2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exeC:\Windows\{2DFA57B5-5D01-456f-82BC-378FCCF0376F}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\{26F445EB-75FB-4877-856F-2DE991EFBA5B}.exeC:\Windows\{26F445EB-75FB-4877-856F-2DE991EFBA5B}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1152 -
C:\Windows\{6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}.exeC:\Windows\{6E122E2B-DA73-4e8d-A4DD-0BB14FD0B1E5}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:876 -
C:\Windows\{89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}.exeC:\Windows\{89AA4D2A-4965-499a-BAAD-F4B8514FFE3F}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\{785895BC-1C49-43a4-B4BD-A00FD048FD2E}.exeC:\Windows\{785895BC-1C49-43a4-B4BD-A00FD048FD2E}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{89AA4~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E122~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26F44~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2DFA5~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1BDFC~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3259A~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EC216~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7AA4E~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{823B3~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{87358~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5f79e81216ae72977f20a1cdfd9ec0fba
SHA16d37aa3d167754eb1db80140d10d36536fa7c968
SHA25665553af7fdf1841066a2d8da20b4d2959945bc3a5c807bf6cb9babe451f5fea1
SHA5127f56bc12bb5718c3b32fad37844f120e96da400b3fa5510d29f9737e0c5e00bea021fb5b66a1afd4055af32769353166ab891e118159dfc14397f935431ba02b
-
Filesize
344KB
MD51e5f80e4417cb6387b339d14c02d082f
SHA1a0feaf5d614e6c4d6a446a2e46afcbfbb1325899
SHA2569664993b5712e84c91c94ca1bb9e83831e54d5abdfcbfd2fbe7932ddb8c4a2b7
SHA5126ea1d681de8bca3e860ba84727669b5e84700215ec003060c8f7dcd0d84ab1f9fe362b4e26891932aadc8db4b7ea6ef93ecf174fdffafd159175b8e240d13908
-
Filesize
344KB
MD5565e9fb30ccf9208e6d9f6c863889085
SHA147e0185f07a5dfe3b839af365570284207db1497
SHA2564954f51948740e9b7cbbe4212bdd0cf0ea213b75426ec7864f3aeaa27d92cb27
SHA512de1f648ba519dde50c17c4dd9740f3c65e55419ef74c1935c8bc6220523a72e9277b4002c69db690317dd3fd4d10c8ee7cda74057d7c5236bc297dbb77e2e6fa
-
Filesize
344KB
MD59f7752143f6eb3e52a074da7e896e4f4
SHA17d4792f63661f101740b817cb96e717db28ac333
SHA256797bd5d74daf7abdebfe36edc0e1a142992d97cdf103866d0d3fb1d817432fab
SHA5128c75585575e4e54066b7ec8a0be88f8fadd9a15226c7961daffddb407e972f28f5f1fd45d62f8bb8e09db9eda865406851d2623328c35cc6c62b886ff78db17a
-
Filesize
344KB
MD541a13d03cd800575796b95edf98f3dac
SHA192bde88847901ffbbb91a7a7eea55b861db8b361
SHA2561e9cf08624e033e0edc5aa94584301111d274cf9da2b3746493abc0422e836d6
SHA5128c5f138c3829760626a59dd6a44060dc457bf861d81fe1321d69936cca9e8db221ecfa4641a69f40d70f89047b8e6cde4993851467069d151382c5ba0486d9fd
-
Filesize
344KB
MD5a8f8d4f9d9a523e4680bfe032ff98173
SHA18eeb79a5fb297c8e6859d0218dbd0e444429d6d1
SHA256a47bbb3d0ccd5a2339098bdaf5925ad511b0241c3d6dbddaa07bc6eb0081b804
SHA512cb2de4e01f5c101322a0c61a5ad2c23d1ea27409c2df0cbfec506cb745f1d2cc3a30ab067b3fd1ec4eada7b7b047496254d799bc92fea1e97a0cd319e64470b7
-
Filesize
344KB
MD5d33576994069e35821538fd167e15806
SHA1e785f094747d6ab44e1869fe2eecbdc3858bed90
SHA25670caa32ed9f32a4cc85387c172210ff24596a9aadc127ee6a6c238c89785881a
SHA5123b11232071bd6fc867253da2caec7cbd651fe6725b7437c66a9783098fddebb565cdd48553c8c896307f33452317e44b1975f183040e84792f87e5a5d3df14b6
-
Filesize
344KB
MD5f25aa46d11ff6703549fb4787d387ad0
SHA188f6bc40bcb66b6ee4033b8d957b14db8287bd64
SHA256996c1aa35cbeedce058566254d916bfa01718d58a94d0d15f6e68fea3175d851
SHA51224a92f4df74ddb2924f251feb686d46ea7644e071908d7f43245a2ada3536d6d1e93c78e281e24133e356b29864fc8d3376d7ba461db3d00acffe26047e8cf90
-
Filesize
344KB
MD5e0470a6b09c89690cd0c85ca8a78eb7a
SHA16fd1936993a8a366a5340afbf33db104bdc38c0e
SHA2564cf27bdfb3335330eabce3c4b980b06ab583c3da75a94854b2f28d5335b0708f
SHA512c949499105704ed568384a6aef0b725e29afaa30cd563c24df17d208ee56a1b253d899b33416ac86b36fa53033e6bb744aac4f11077b0c06bb80a9ab335eb71f
-
Filesize
344KB
MD582560603f324b8b84b0992fdb07c8fa5
SHA1d52ef2b8028923e452b260abdf09648e1481c4ea
SHA2562049f9718c3708b8c7d402e51194ac4a76fe94a51d4a51e0c862da9b6d380e19
SHA5124734234593242cf06c56e6d97f336f581515d63acffbbf8546db79fa483009673e1db7793054dfead67f187bbd58ca5d1160db44a116d6d10d25a4d1058b43a2
-
Filesize
344KB
MD5f3d9b70fdb38c597fea4a8fc395a9230
SHA153069f3f9107e2640f9abb2fbc967822c65ccf3f
SHA256e1439faee89f4d99e32b6d1fdfa577ea4b658de74442e5882eff0a77b8e4d84e
SHA5129b9ba00b3535ebfcb802e42338d2b4339a1c4e8a1a3b27867495864502c2699a90c5f7537f1ce0ea9d4b6c9cac5936424cb093bc53c8e7eb56519a448fe8947e