Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe
-
Size
168KB
-
MD5
35192e89006d10c925969e6363018cd0
-
SHA1
562cff44b372c013b42e2335aa5af49dd4dd4353
-
SHA256
33775182b91005df376ed1c3f08057cc6fe3fceab7c30aecdc7070f638981a49
-
SHA512
08483284587a1332239cd36420ecc84422325a6059709dc2c108c2a8b313d4792dfb228f4e5122cc5064984e306ad018859a736ee82e507a2e1482241b077346
-
SSDEEP
1536:1EGh0onQlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oQlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4FB0BE66-EFAF-4ad7-938D-B21DC38400FE} {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{36F967A5-E952-4306-8776-A04972B430F6}\stubpath = "C:\\Windows\\{36F967A5-E952-4306-8776-A04972B430F6}.exe" {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7C76AD35-10C1-455d-99BA-30F871A15178}\stubpath = "C:\\Windows\\{7C76AD35-10C1-455d-99BA-30F871A15178}.exe" {36F967A5-E952-4306-8776-A04972B430F6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8CEAC21B-64D0-467b-A8CF-54601B2F5B40}\stubpath = "C:\\Windows\\{8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe" {7C76AD35-10C1-455d-99BA-30F871A15178}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA072352-1492-46d5-BD92-3F6C3908C487} {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4902DC17-D81D-49d0-B304-BF7D801F33BC}\stubpath = "C:\\Windows\\{4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe" {EA072352-1492-46d5-BD92-3F6C3908C487}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B93D898A-4F42-4d0f-BE18-FBAD81DFB005}\stubpath = "C:\\Windows\\{B93D898A-4F42-4d0f-BE18-FBAD81DFB005}.exe" {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{49C0D723-603C-44bd-85CE-438DAEDD566E} 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71DDDFAB-9985-4637-A709-12CEE096A043} {C4DD2B10-B090-460e-8081-C9B6B012855A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71DDDFAB-9985-4637-A709-12CEE096A043}\stubpath = "C:\\Windows\\{71DDDFAB-9985-4637-A709-12CEE096A043}.exe" {C4DD2B10-B090-460e-8081-C9B6B012855A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4DD2B10-B090-460e-8081-C9B6B012855A}\stubpath = "C:\\Windows\\{C4DD2B10-B090-460e-8081-C9B6B012855A}.exe" {55B4B985-147E-4c89-8971-4295F09DF9E6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{55B4B985-147E-4c89-8971-4295F09DF9E6} {B93D898A-4F42-4d0f-BE18-FBAD81DFB005}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{55B4B985-147E-4c89-8971-4295F09DF9E6}\stubpath = "C:\\Windows\\{55B4B985-147E-4c89-8971-4295F09DF9E6}.exe" {B93D898A-4F42-4d0f-BE18-FBAD81DFB005}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4902DC17-D81D-49d0-B304-BF7D801F33BC} {EA072352-1492-46d5-BD92-3F6C3908C487}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8CEAC21B-64D0-467b-A8CF-54601B2F5B40} {7C76AD35-10C1-455d-99BA-30F871A15178}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA072352-1492-46d5-BD92-3F6C3908C487}\stubpath = "C:\\Windows\\{EA072352-1492-46d5-BD92-3F6C3908C487}.exe" {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B93D898A-4F42-4d0f-BE18-FBAD81DFB005} {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4DD2B10-B090-460e-8081-C9B6B012855A} {55B4B985-147E-4c89-8971-4295F09DF9E6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{49C0D723-603C-44bd-85CE-438DAEDD566E}\stubpath = "C:\\Windows\\{49C0D723-603C-44bd-85CE-438DAEDD566E}.exe" 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{36F967A5-E952-4306-8776-A04972B430F6} {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7C76AD35-10C1-455d-99BA-30F871A15178} {36F967A5-E952-4306-8776-A04972B430F6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}\stubpath = "C:\\Windows\\{4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe" {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe -
Deletes itself 1 IoCs
pid Process 2232 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1736 {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe 2896 {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe 2932 {36F967A5-E952-4306-8776-A04972B430F6}.exe 2912 {7C76AD35-10C1-455d-99BA-30F871A15178}.exe 2140 {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe 2212 {EA072352-1492-46d5-BD92-3F6C3908C487}.exe 2812 {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe 2036 {B93D898A-4F42-4d0f-BE18-FBAD81DFB005}.exe 2280 {55B4B985-147E-4c89-8971-4295F09DF9E6}.exe 872 {C4DD2B10-B090-460e-8081-C9B6B012855A}.exe 1152 {71DDDFAB-9985-4637-A709-12CEE096A043}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{36F967A5-E952-4306-8776-A04972B430F6}.exe {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe File created C:\Windows\{8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe {7C76AD35-10C1-455d-99BA-30F871A15178}.exe File created C:\Windows\{EA072352-1492-46d5-BD92-3F6C3908C487}.exe {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe File created C:\Windows\{B93D898A-4F42-4d0f-BE18-FBAD81DFB005}.exe {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe File created C:\Windows\{C4DD2B10-B090-460e-8081-C9B6B012855A}.exe {55B4B985-147E-4c89-8971-4295F09DF9E6}.exe File created C:\Windows\{71DDDFAB-9985-4637-A709-12CEE096A043}.exe {C4DD2B10-B090-460e-8081-C9B6B012855A}.exe File created C:\Windows\{49C0D723-603C-44bd-85CE-438DAEDD566E}.exe 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe File created C:\Windows\{4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe File created C:\Windows\{7C76AD35-10C1-455d-99BA-30F871A15178}.exe {36F967A5-E952-4306-8776-A04972B430F6}.exe File created C:\Windows\{4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe {EA072352-1492-46d5-BD92-3F6C3908C487}.exe File created C:\Windows\{55B4B985-147E-4c89-8971-4295F09DF9E6}.exe {B93D898A-4F42-4d0f-BE18-FBAD81DFB005}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C4DD2B10-B090-460e-8081-C9B6B012855A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {71DDDFAB-9985-4637-A709-12CEE096A043}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {55B4B985-147E-4c89-8971-4295F09DF9E6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EA072352-1492-46d5-BD92-3F6C3908C487}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7C76AD35-10C1-455d-99BA-30F871A15178}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {36F967A5-E952-4306-8776-A04972B430F6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B93D898A-4F42-4d0f-BE18-FBAD81DFB005}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3052 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe Token: SeIncBasePriorityPrivilege 1736 {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe Token: SeIncBasePriorityPrivilege 2896 {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe Token: SeIncBasePriorityPrivilege 2932 {36F967A5-E952-4306-8776-A04972B430F6}.exe Token: SeIncBasePriorityPrivilege 2912 {7C76AD35-10C1-455d-99BA-30F871A15178}.exe Token: SeIncBasePriorityPrivilege 2140 {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe Token: SeIncBasePriorityPrivilege 2212 {EA072352-1492-46d5-BD92-3F6C3908C487}.exe Token: SeIncBasePriorityPrivilege 2812 {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe Token: SeIncBasePriorityPrivilege 2036 {B93D898A-4F42-4d0f-BE18-FBAD81DFB005}.exe Token: SeIncBasePriorityPrivilege 2280 {55B4B985-147E-4c89-8971-4295F09DF9E6}.exe Token: SeIncBasePriorityPrivilege 872 {C4DD2B10-B090-460e-8081-C9B6B012855A}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1736 3052 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe 30 PID 3052 wrote to memory of 1736 3052 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe 30 PID 3052 wrote to memory of 1736 3052 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe 30 PID 3052 wrote to memory of 1736 3052 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe 30 PID 3052 wrote to memory of 2232 3052 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe 31 PID 3052 wrote to memory of 2232 3052 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe 31 PID 3052 wrote to memory of 2232 3052 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe 31 PID 3052 wrote to memory of 2232 3052 2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe 31 PID 1736 wrote to memory of 2896 1736 {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe 33 PID 1736 wrote to memory of 2896 1736 {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe 33 PID 1736 wrote to memory of 2896 1736 {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe 33 PID 1736 wrote to memory of 2896 1736 {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe 33 PID 1736 wrote to memory of 2908 1736 {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe 34 PID 1736 wrote to memory of 2908 1736 {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe 34 PID 1736 wrote to memory of 2908 1736 {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe 34 PID 1736 wrote to memory of 2908 1736 {49C0D723-603C-44bd-85CE-438DAEDD566E}.exe 34 PID 2896 wrote to memory of 2932 2896 {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe 35 PID 2896 wrote to memory of 2932 2896 {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe 35 PID 2896 wrote to memory of 2932 2896 {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe 35 PID 2896 wrote to memory of 2932 2896 {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe 35 PID 2896 wrote to memory of 2668 2896 {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe 36 PID 2896 wrote to memory of 2668 2896 {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe 36 PID 2896 wrote to memory of 2668 2896 {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe 36 PID 2896 wrote to memory of 2668 2896 {4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe 36 PID 2932 wrote to memory of 2912 2932 {36F967A5-E952-4306-8776-A04972B430F6}.exe 37 PID 2932 wrote to memory of 2912 2932 {36F967A5-E952-4306-8776-A04972B430F6}.exe 37 PID 2932 wrote to memory of 2912 2932 {36F967A5-E952-4306-8776-A04972B430F6}.exe 37 PID 2932 wrote to memory of 2912 2932 {36F967A5-E952-4306-8776-A04972B430F6}.exe 37 PID 2932 wrote to memory of 2648 2932 {36F967A5-E952-4306-8776-A04972B430F6}.exe 38 PID 2932 wrote to memory of 2648 2932 {36F967A5-E952-4306-8776-A04972B430F6}.exe 38 PID 2932 wrote to memory of 2648 2932 {36F967A5-E952-4306-8776-A04972B430F6}.exe 38 PID 2932 wrote to memory of 2648 2932 {36F967A5-E952-4306-8776-A04972B430F6}.exe 38 PID 2912 wrote to memory of 2140 2912 {7C76AD35-10C1-455d-99BA-30F871A15178}.exe 39 PID 2912 wrote to memory of 2140 2912 {7C76AD35-10C1-455d-99BA-30F871A15178}.exe 39 PID 2912 wrote to memory of 2140 2912 {7C76AD35-10C1-455d-99BA-30F871A15178}.exe 39 PID 2912 wrote to memory of 2140 2912 {7C76AD35-10C1-455d-99BA-30F871A15178}.exe 39 PID 2912 wrote to memory of 2104 2912 {7C76AD35-10C1-455d-99BA-30F871A15178}.exe 40 PID 2912 wrote to memory of 2104 2912 {7C76AD35-10C1-455d-99BA-30F871A15178}.exe 40 PID 2912 wrote to memory of 2104 2912 {7C76AD35-10C1-455d-99BA-30F871A15178}.exe 40 PID 2912 wrote to memory of 2104 2912 {7C76AD35-10C1-455d-99BA-30F871A15178}.exe 40 PID 2140 wrote to memory of 2212 2140 {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe 41 PID 2140 wrote to memory of 2212 2140 {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe 41 PID 2140 wrote to memory of 2212 2140 {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe 41 PID 2140 wrote to memory of 2212 2140 {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe 41 PID 2140 wrote to memory of 2328 2140 {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe 42 PID 2140 wrote to memory of 2328 2140 {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe 42 PID 2140 wrote to memory of 2328 2140 {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe 42 PID 2140 wrote to memory of 2328 2140 {8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe 42 PID 2212 wrote to memory of 2812 2212 {EA072352-1492-46d5-BD92-3F6C3908C487}.exe 43 PID 2212 wrote to memory of 2812 2212 {EA072352-1492-46d5-BD92-3F6C3908C487}.exe 43 PID 2212 wrote to memory of 2812 2212 {EA072352-1492-46d5-BD92-3F6C3908C487}.exe 43 PID 2212 wrote to memory of 2812 2212 {EA072352-1492-46d5-BD92-3F6C3908C487}.exe 43 PID 2212 wrote to memory of 2844 2212 {EA072352-1492-46d5-BD92-3F6C3908C487}.exe 44 PID 2212 wrote to memory of 2844 2212 {EA072352-1492-46d5-BD92-3F6C3908C487}.exe 44 PID 2212 wrote to memory of 2844 2212 {EA072352-1492-46d5-BD92-3F6C3908C487}.exe 44 PID 2212 wrote to memory of 2844 2212 {EA072352-1492-46d5-BD92-3F6C3908C487}.exe 44 PID 2812 wrote to memory of 2036 2812 {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe 45 PID 2812 wrote to memory of 2036 2812 {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe 45 PID 2812 wrote to memory of 2036 2812 {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe 45 PID 2812 wrote to memory of 2036 2812 {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe 45 PID 2812 wrote to memory of 2020 2812 {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe 46 PID 2812 wrote to memory of 2020 2812 {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe 46 PID 2812 wrote to memory of 2020 2812 {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe 46 PID 2812 wrote to memory of 2020 2812 {4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-08_35192e89006d10c925969e6363018cd0_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\{49C0D723-603C-44bd-85CE-438DAEDD566E}.exeC:\Windows\{49C0D723-603C-44bd-85CE-438DAEDD566E}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\{4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exeC:\Windows\{4FB0BE66-EFAF-4ad7-938D-B21DC38400FE}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\{36F967A5-E952-4306-8776-A04972B430F6}.exeC:\Windows\{36F967A5-E952-4306-8776-A04972B430F6}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\{7C76AD35-10C1-455d-99BA-30F871A15178}.exeC:\Windows\{7C76AD35-10C1-455d-99BA-30F871A15178}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\{8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exeC:\Windows\{8CEAC21B-64D0-467b-A8CF-54601B2F5B40}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\{EA072352-1492-46d5-BD92-3F6C3908C487}.exeC:\Windows\{EA072352-1492-46d5-BD92-3F6C3908C487}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\{4902DC17-D81D-49d0-B304-BF7D801F33BC}.exeC:\Windows\{4902DC17-D81D-49d0-B304-BF7D801F33BC}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\{B93D898A-4F42-4d0f-BE18-FBAD81DFB005}.exeC:\Windows\{B93D898A-4F42-4d0f-BE18-FBAD81DFB005}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\{55B4B985-147E-4c89-8971-4295F09DF9E6}.exeC:\Windows\{55B4B985-147E-4c89-8971-4295F09DF9E6}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Windows\{C4DD2B10-B090-460e-8081-C9B6B012855A}.exeC:\Windows\{C4DD2B10-B090-460e-8081-C9B6B012855A}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:872 -
C:\Windows\{71DDDFAB-9985-4637-A709-12CEE096A043}.exeC:\Windows\{71DDDFAB-9985-4637-A709-12CEE096A043}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C4DD2~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{55B4B~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B93D8~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4902D~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA072~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8CEAC~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C76A~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{36F96~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4FB0B~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{49C0D~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c3b2de40e08f561caa7ef6a91d31820a
SHA157ac1aa1649d7dc1329a4fc96e25ea8d7ee8e9c7
SHA256536d00453738c54a7ce835e5442b96e58dd091ca0e53fa7d9fbf1dd186d21841
SHA512eb74462f2541b919a8dcdee1dfed2bf3b7efd9af7389f325f43ae3e956f165c542d3770ef7f49af0b01b0bf19a710827d2d9d956812c99d95afe71fc46cb7e0b
-
Filesize
168KB
MD50c08ff3feda1bb2e2e935451c87b74b7
SHA165878ca7c5115dce0de961e989dc3513e6bf044d
SHA2567ac8ba55b65f2a83aafd491101c1a9295f2221454cdb688b5bf949f2c8b5c3d0
SHA512acaa2037105fc92bfc21592c0af6d2afba6061f61457c462113a447b624a38e90a137e5da819f8ed230c0715df677a8a21e59d3e6f5d1b4d67b36a30e51a16b9
-
Filesize
168KB
MD5cbf1af03983f57987e0732d37e859488
SHA1068445d2448436c744f45405090cf8123e666911
SHA256a86166e225670c9ff30d5020f91946e861c490cb797bd494259def326b81cced
SHA51265b26ff5b14f8000da0afdc546630fb74163d6b35b17036ede684154863c31d94820fd94a0a0ee141a95d9449d665c4fc12720cabddbd30e04585cc72073df74
-
Filesize
168KB
MD569436ce2ca0fa7183dc5a57abf429396
SHA1c1817993448bc9298c98ee7eece38960515edccb
SHA256759b21cf1bab6b54e77d31d78e611e34f625609869f0e9e5cd5f87106cbeb998
SHA51264cba68209247c1081d46af5c957ef60768ce038861e131453fd33025e3fb4e873d31a8c44dd19a02f8239377a7338626c0138d41b8306fee9e03de1a1f7e834
-
Filesize
168KB
MD57b5eeaab75e10148580c308e1a35ef2a
SHA10d47f9df45c12727079ea684e56ecac7bde3164d
SHA256944b3a1569d266d876b188c3b3cc772e7377960cdc91343a77685e3ca4376133
SHA51216ad8a32b22354113ee80997db436f72e797b0e532e3446ff2dfae26b77d609525159fb3ab9546fae54b8978808204780540a359898c30b6bb327556d2fe03b2
-
Filesize
168KB
MD52fbd356e2dc356c5982747e8fd09d39d
SHA135fbe975e04b9864f137dde546f7b99a7f91fc8b
SHA256bc98e66ab868b5af76291516c9115f72acfc0c9d5036efcee28a7a194d6fab66
SHA512c864aa130da57db98d6033e1d4395c6561c366554bb8fd419212a19f7741ec7fe1f1aab2f3e647da3a9ce2acbb5ab28737dc9b96e8272e311d00f131873db079
-
Filesize
168KB
MD5fabad8aa7059af0ec7de9c0d4dc776a3
SHA1a446d90a57abdf63489d9cb7ea2e124ca9960811
SHA2561a12c745b5aa95f2afca31cdd9dc8259d1ea8d22177f704b49caafea6f635eca
SHA512f7e324791798346e46c43e88eace5d29aa5dc10fa83eaf761c5b232bd7f8c34db3ab6903462342d2204dea2c13fb2d70dfef48d59daf6e9b53f6235ea8506ae1
-
Filesize
168KB
MD5c61a976bfc17775fda82331576325bc3
SHA115690431bdd7144ece99447e9b929370661c27b6
SHA256a7dd2bb43c81062d7e1565efd46322cd5c696298de07fde33d65f5b3054c5ef1
SHA512d7b6ca389822d1d6fdd23db98852a63c522e29aeae59ba457685325702dd31901f0b14d5afee044a2d54021411d5fe426cad7f222f47a8ad351e9333fa58189d
-
Filesize
168KB
MD58e7fce9e0bfdb23bc7be406ec76b8a30
SHA1a2a1bd707944799749fd9d3cc98f93f6a3660902
SHA256004517ce466c7a3d8c04ec3a90abc06b3a519a9173fa15017adc0f640f527b92
SHA5125228a4836ef2dfa864d73ab00823e11ad77a4115ace72bccf3e9ff80d2c0215b9ba1aa6004251c511738f35bd5327826919b0383862fa061326da4a450d3f922
-
Filesize
168KB
MD5ee55f62ae39def9aaea57c5ee340fdde
SHA1674e9b62cccc055a9e3856dc489d6fdd2c2c6339
SHA256b20f314fb4771225ee8439764edd2330ec74c371144a134b31be2332aa3452c0
SHA512bd129fbdbc7fe32d1083410d8c87f82e697ddda45d2bc664e2b219d5380cb7e1dab64d1b982e64202534962ef0581a4f5619332ee05ac3dd674c96d3e0b750a2
-
Filesize
168KB
MD598ff7e7a3e13eb23b8dffbb3af3f4afe
SHA1e755684a9015c49229d5ea594c295127f878a8da
SHA256e08eca4f90c8ed2deeffe1a767b8a4a51fea67a0358c63e54aaa10560b0039f2
SHA5121ac7e84c3b0dac9bc2bd6c3b1536e2bbc5d763316f4ef363c554045b0d58247584236eae0b1dc4a68ec38a3abc9de80a17609b7838f47c26c89af11663cad245