Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe
-
Size
197KB
-
MD5
85dbf2af3a820608c506266b00567e84
-
SHA1
4d531e9d3134939b23b3adfc3fee364a68ba17df
-
SHA256
ee8aef9c0827580f22cce5bddd68c91daf0427ac9d071ea4addf13d217e36f04
-
SHA512
c1ce7bf0cd65a738dad56fc36781f3b0ffaa9b3710707f013435bda91c8747743e6f457ac0d197012c8bf680ad6ef61968f1b433a7ddfc2f80e937b56c9536e6
-
SSDEEP
3072:jEGh0oIl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEG2lEeKcAEca
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3629E906-6512-4143-BFCB-D98BC888F66B} {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E0055210-CF96-4609-AC28-91A6C4D307D2} {3629E906-6512-4143-BFCB-D98BC888F66B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{31578A71-BD2A-41ed-82F4-245C400093A1}\stubpath = "C:\\Windows\\{31578A71-BD2A-41ed-82F4-245C400093A1}.exe" {8E83C214-F765-4668-94A1-C89974B4F376}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF604707-609F-43a0-880D-4C64103FDEC0} {1CA81A7F-5066-40e5-9A20-927439B16580}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{920AD54F-39F0-4c9a-9470-C7102B97D562} {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{920AD54F-39F0-4c9a-9470-C7102B97D562}\stubpath = "C:\\Windows\\{920AD54F-39F0-4c9a-9470-C7102B97D562}.exe" {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}\stubpath = "C:\\Windows\\{C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe" {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E83C214-F765-4668-94A1-C89974B4F376}\stubpath = "C:\\Windows\\{8E83C214-F765-4668-94A1-C89974B4F376}.exe" {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}\stubpath = "C:\\Windows\\{1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}.exe" {31578A71-BD2A-41ed-82F4-245C400093A1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1CA81A7F-5066-40e5-9A20-927439B16580} {1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32B48F4A-3F0C-4e63-9140-5D39D24B49E9} {FF604707-609F-43a0-880D-4C64103FDEC0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A51511A5-3C37-48b0-A036-EAB913D8FA0D} 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E0055210-CF96-4609-AC28-91A6C4D307D2}\stubpath = "C:\\Windows\\{E0055210-CF96-4609-AC28-91A6C4D307D2}.exe" {3629E906-6512-4143-BFCB-D98BC888F66B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E83C214-F765-4668-94A1-C89974B4F376} {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32B48F4A-3F0C-4e63-9140-5D39D24B49E9}\stubpath = "C:\\Windows\\{32B48F4A-3F0C-4e63-9140-5D39D24B49E9}.exe" {FF604707-609F-43a0-880D-4C64103FDEC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A51511A5-3C37-48b0-A036-EAB913D8FA0D}\stubpath = "C:\\Windows\\{A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe" 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9} {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3629E906-6512-4143-BFCB-D98BC888F66B}\stubpath = "C:\\Windows\\{3629E906-6512-4143-BFCB-D98BC888F66B}.exe" {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{31578A71-BD2A-41ed-82F4-245C400093A1} {8E83C214-F765-4668-94A1-C89974B4F376}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1D6641D5-A53E-4c7e-8DCE-CE94B78B6642} {31578A71-BD2A-41ed-82F4-245C400093A1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1CA81A7F-5066-40e5-9A20-927439B16580}\stubpath = "C:\\Windows\\{1CA81A7F-5066-40e5-9A20-927439B16580}.exe" {1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FF604707-609F-43a0-880D-4C64103FDEC0}\stubpath = "C:\\Windows\\{FF604707-609F-43a0-880D-4C64103FDEC0}.exe" {1CA81A7F-5066-40e5-9A20-927439B16580}.exe -
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2716 {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe 2840 {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe 3028 {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe 2152 {3629E906-6512-4143-BFCB-D98BC888F66B}.exe 2508 {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe 2884 {8E83C214-F765-4668-94A1-C89974B4F376}.exe 1524 {31578A71-BD2A-41ed-82F4-245C400093A1}.exe 1196 {1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}.exe 1252 {1CA81A7F-5066-40e5-9A20-927439B16580}.exe 1520 {FF604707-609F-43a0-880D-4C64103FDEC0}.exe 1044 {32B48F4A-3F0C-4e63-9140-5D39D24B49E9}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe File created C:\Windows\{920AD54F-39F0-4c9a-9470-C7102B97D562}.exe {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe File created C:\Windows\{C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe File created C:\Windows\{3629E906-6512-4143-BFCB-D98BC888F66B}.exe {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe File created C:\Windows\{31578A71-BD2A-41ed-82F4-245C400093A1}.exe {8E83C214-F765-4668-94A1-C89974B4F376}.exe File created C:\Windows\{32B48F4A-3F0C-4e63-9140-5D39D24B49E9}.exe {FF604707-609F-43a0-880D-4C64103FDEC0}.exe File created C:\Windows\{E0055210-CF96-4609-AC28-91A6C4D307D2}.exe {3629E906-6512-4143-BFCB-D98BC888F66B}.exe File created C:\Windows\{8E83C214-F765-4668-94A1-C89974B4F376}.exe {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe File created C:\Windows\{1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}.exe {31578A71-BD2A-41ed-82F4-245C400093A1}.exe File created C:\Windows\{1CA81A7F-5066-40e5-9A20-927439B16580}.exe {1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}.exe File created C:\Windows\{FF604707-609F-43a0-880D-4C64103FDEC0}.exe {1CA81A7F-5066-40e5-9A20-927439B16580}.exe -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {31578A71-BD2A-41ed-82F4-245C400093A1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1CA81A7F-5066-40e5-9A20-927439B16580}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FF604707-609F-43a0-880D-4C64103FDEC0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3629E906-6512-4143-BFCB-D98BC888F66B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8E83C214-F765-4668-94A1-C89974B4F376}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {32B48F4A-3F0C-4e63-9140-5D39D24B49E9}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2776 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe Token: SeIncBasePriorityPrivilege 2716 {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe Token: SeIncBasePriorityPrivilege 2840 {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe Token: SeIncBasePriorityPrivilege 3028 {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe Token: SeIncBasePriorityPrivilege 2152 {3629E906-6512-4143-BFCB-D98BC888F66B}.exe Token: SeIncBasePriorityPrivilege 2508 {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe Token: SeIncBasePriorityPrivilege 2884 {8E83C214-F765-4668-94A1-C89974B4F376}.exe Token: SeIncBasePriorityPrivilege 1524 {31578A71-BD2A-41ed-82F4-245C400093A1}.exe Token: SeIncBasePriorityPrivilege 1196 {1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}.exe Token: SeIncBasePriorityPrivilege 1252 {1CA81A7F-5066-40e5-9A20-927439B16580}.exe Token: SeIncBasePriorityPrivilege 1520 {FF604707-609F-43a0-880D-4C64103FDEC0}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2716 2776 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe 30 PID 2776 wrote to memory of 2716 2776 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe 30 PID 2776 wrote to memory of 2716 2776 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe 30 PID 2776 wrote to memory of 2716 2776 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe 30 PID 2776 wrote to memory of 2744 2776 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe 31 PID 2776 wrote to memory of 2744 2776 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe 31 PID 2776 wrote to memory of 2744 2776 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe 31 PID 2776 wrote to memory of 2744 2776 2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe 31 PID 2716 wrote to memory of 2840 2716 {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe 32 PID 2716 wrote to memory of 2840 2716 {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe 32 PID 2716 wrote to memory of 2840 2716 {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe 32 PID 2716 wrote to memory of 2840 2716 {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe 32 PID 2716 wrote to memory of 2592 2716 {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe 33 PID 2716 wrote to memory of 2592 2716 {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe 33 PID 2716 wrote to memory of 2592 2716 {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe 33 PID 2716 wrote to memory of 2592 2716 {A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe 33 PID 2840 wrote to memory of 3028 2840 {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe 34 PID 2840 wrote to memory of 3028 2840 {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe 34 PID 2840 wrote to memory of 3028 2840 {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe 34 PID 2840 wrote to memory of 3028 2840 {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe 34 PID 2840 wrote to memory of 1960 2840 {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe 35 PID 2840 wrote to memory of 1960 2840 {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe 35 PID 2840 wrote to memory of 1960 2840 {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe 35 PID 2840 wrote to memory of 1960 2840 {920AD54F-39F0-4c9a-9470-C7102B97D562}.exe 35 PID 3028 wrote to memory of 2152 3028 {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe 36 PID 3028 wrote to memory of 2152 3028 {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe 36 PID 3028 wrote to memory of 2152 3028 {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe 36 PID 3028 wrote to memory of 2152 3028 {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe 36 PID 3028 wrote to memory of 804 3028 {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe 37 PID 3028 wrote to memory of 804 3028 {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe 37 PID 3028 wrote to memory of 804 3028 {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe 37 PID 3028 wrote to memory of 804 3028 {C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe 37 PID 2152 wrote to memory of 2508 2152 {3629E906-6512-4143-BFCB-D98BC888F66B}.exe 38 PID 2152 wrote to memory of 2508 2152 {3629E906-6512-4143-BFCB-D98BC888F66B}.exe 38 PID 2152 wrote to memory of 2508 2152 {3629E906-6512-4143-BFCB-D98BC888F66B}.exe 38 PID 2152 wrote to memory of 2508 2152 {3629E906-6512-4143-BFCB-D98BC888F66B}.exe 38 PID 2152 wrote to memory of 856 2152 {3629E906-6512-4143-BFCB-D98BC888F66B}.exe 39 PID 2152 wrote to memory of 856 2152 {3629E906-6512-4143-BFCB-D98BC888F66B}.exe 39 PID 2152 wrote to memory of 856 2152 {3629E906-6512-4143-BFCB-D98BC888F66B}.exe 39 PID 2152 wrote to memory of 856 2152 {3629E906-6512-4143-BFCB-D98BC888F66B}.exe 39 PID 2508 wrote to memory of 2884 2508 {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe 40 PID 2508 wrote to memory of 2884 2508 {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe 40 PID 2508 wrote to memory of 2884 2508 {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe 40 PID 2508 wrote to memory of 2884 2508 {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe 40 PID 2508 wrote to memory of 2140 2508 {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe 41 PID 2508 wrote to memory of 2140 2508 {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe 41 PID 2508 wrote to memory of 2140 2508 {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe 41 PID 2508 wrote to memory of 2140 2508 {E0055210-CF96-4609-AC28-91A6C4D307D2}.exe 41 PID 2884 wrote to memory of 1524 2884 {8E83C214-F765-4668-94A1-C89974B4F376}.exe 43 PID 2884 wrote to memory of 1524 2884 {8E83C214-F765-4668-94A1-C89974B4F376}.exe 43 PID 2884 wrote to memory of 1524 2884 {8E83C214-F765-4668-94A1-C89974B4F376}.exe 43 PID 2884 wrote to memory of 1524 2884 {8E83C214-F765-4668-94A1-C89974B4F376}.exe 43 PID 2884 wrote to memory of 1796 2884 {8E83C214-F765-4668-94A1-C89974B4F376}.exe 44 PID 2884 wrote to memory of 1796 2884 {8E83C214-F765-4668-94A1-C89974B4F376}.exe 44 PID 2884 wrote to memory of 1796 2884 {8E83C214-F765-4668-94A1-C89974B4F376}.exe 44 PID 2884 wrote to memory of 1796 2884 {8E83C214-F765-4668-94A1-C89974B4F376}.exe 44 PID 1524 wrote to memory of 1196 1524 {31578A71-BD2A-41ed-82F4-245C400093A1}.exe 45 PID 1524 wrote to memory of 1196 1524 {31578A71-BD2A-41ed-82F4-245C400093A1}.exe 45 PID 1524 wrote to memory of 1196 1524 {31578A71-BD2A-41ed-82F4-245C400093A1}.exe 45 PID 1524 wrote to memory of 1196 1524 {31578A71-BD2A-41ed-82F4-245C400093A1}.exe 45 PID 1524 wrote to memory of 2208 1524 {31578A71-BD2A-41ed-82F4-245C400093A1}.exe 46 PID 1524 wrote to memory of 2208 1524 {31578A71-BD2A-41ed-82F4-245C400093A1}.exe 46 PID 1524 wrote to memory of 2208 1524 {31578A71-BD2A-41ed-82F4-245C400093A1}.exe 46 PID 1524 wrote to memory of 2208 1524 {31578A71-BD2A-41ed-82F4-245C400093A1}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\{A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exeC:\Windows\{A51511A5-3C37-48b0-A036-EAB913D8FA0D}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\{920AD54F-39F0-4c9a-9470-C7102B97D562}.exeC:\Windows\{920AD54F-39F0-4c9a-9470-C7102B97D562}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\{C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exeC:\Windows\{C0D758CA-FAA7-458e-BDA4-C01C3A81D9A9}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\{3629E906-6512-4143-BFCB-D98BC888F66B}.exeC:\Windows\{3629E906-6512-4143-BFCB-D98BC888F66B}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\{E0055210-CF96-4609-AC28-91A6C4D307D2}.exeC:\Windows\{E0055210-CF96-4609-AC28-91A6C4D307D2}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\{8E83C214-F765-4668-94A1-C89974B4F376}.exeC:\Windows\{8E83C214-F765-4668-94A1-C89974B4F376}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\{31578A71-BD2A-41ed-82F4-245C400093A1}.exeC:\Windows\{31578A71-BD2A-41ed-82F4-245C400093A1}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\{1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}.exeC:\Windows\{1D6641D5-A53E-4c7e-8DCE-CE94B78B6642}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Windows\{1CA81A7F-5066-40e5-9A20-927439B16580}.exeC:\Windows\{1CA81A7F-5066-40e5-9A20-927439B16580}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1252 -
C:\Windows\{FF604707-609F-43a0-880D-4C64103FDEC0}.exeC:\Windows\{FF604707-609F-43a0-880D-4C64103FDEC0}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\{32B48F4A-3F0C-4e63-9140-5D39D24B49E9}.exeC:\Windows\{32B48F4A-3F0C-4e63-9140-5D39D24B49E9}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FF604~1.EXE > nul12⤵PID:1000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1CA81~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1D664~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{31578~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E83C~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E0055~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3629E~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0D75~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{920AD~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A5151~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5cbdbf503eb9702213042db2af14aa1f3
SHA147eb35b0add55adea637c99ce73152d2a91a25dd
SHA25696673c52462f884b0735405797591758eed5f8969cdbd6529726f9279a757e82
SHA512e1ef9ae3ff57b06a452e91c78960df95ffa6dec069db15d559e095553db7da5bd9005e018567e0f417a930ccc281a58e7336517977ae7efe11c055ee86b0db6a
-
Filesize
197KB
MD59c7a3b71f9ab33aa707e68f33f24dc76
SHA1528c568a5ae1424e541e5abde8577a1f0642b5f5
SHA2565bfcee592d330a1afd8f71011283b1519e47222901175ab8fcc3176df2ce6ce6
SHA5129debde878a658f8745082ddcbbf8e362078036faee0dc793cbfb40659b009b76c4304424ee9b655a15ad86dbee866d0d5e5a09ea3222105e3805e6fdc1d2e25a
-
Filesize
197KB
MD50f6568091653dd4ec27d6c61f6139bbc
SHA1f1d1c61233369a3b9db3aa739c153bf3e92ab9d0
SHA2562d820c7c4d7f9e3a078d61f3eccb922e01d212114645b6d883bcb58301d81184
SHA512e627d92804984c20d781fffae85806a8d87260d145d3367c79893f769d3e862538834e17a2e4ee7056cc010b3639c65322112219ba20f73649f45967a33649af
-
Filesize
197KB
MD5aa98e0a31d9da2717a4d5d5b3fb7ec15
SHA186aeb72138f189e02077e7c35afd3f683fa50d2e
SHA256a05a4061db6eeb18acc896d1965e4899b5e58dafdfcf5a3cf77427f043ec26de
SHA5127231e3dab003e62240a110b4fdf1018ca0c9ba8d7ebb7dd2fde102899d9d550c0a26a0861396202d7580e4ae0d84f09899912f4e86da4e7b8c46bb2351809139
-
Filesize
197KB
MD54cb940b31226da6c12d584527c9e67a3
SHA1084137de2fdc52bc68924d4f9262ddb3a421c3cf
SHA256f4522ac7021ef84a887800bb32129acd2d01934d411fc3062560c24395be9a32
SHA5128117791cd17bd9d5ab12de571eb253bccdd815ec505ff0c51165072944baa82dddc55610a2a6647da4900ad4f011cde4086fdf85861ac8cbc1938367bc3be71b
-
Filesize
197KB
MD5dc50abde9a33d0e03a7e12d69ffc1179
SHA12f9849fafa147773f165c61eab6a081e463ca5ab
SHA2561b67f9eac5695fc1cbef4730167f367d2f485e6560aeb339347f7eb329fd1b82
SHA5127d552ce8dd785bb420275d140917e6940445da046a708328375792b4648f5a8c7b4507c4a85617f494ed07bbec29e03b65785be2fd29c41041fd1f0bb732abf4
-
Filesize
197KB
MD5ba7bc3cfa8dd959a33875bc1bb094875
SHA19ea7b3d08391b61b777ef14048f5805fbfe856a4
SHA256414f3b6f6c6d0f70df24138e6d1e348afc5678a709080ad81c2a7d0a74589260
SHA512466d93a6f1907017373e398de187eebe7f0daffbd3605ab54c65ff633796ba2f55afe09931d17ee8813fedf0b0dbc9fbe8de73947963b0951c75cace10b42ed0
-
Filesize
197KB
MD57440276b4279efdd2075213374c05914
SHA14d41355a189fe83bccdb17c4cb5306dfd9effb97
SHA25631ac01a8a8ce16deafa42472d22023a52546f4fcd31268d3086c1a64fd2639af
SHA512e92260bc52ef70f52094fccac14ea715b2eaf68bfe41fb2a736f88b64b61cf9c847420cf74f03aa4081f87a73cb99eec12329be33e576210313ad6df356ec6d8
-
Filesize
197KB
MD55ce75cc9b06d8e1d72def9b11c7635a4
SHA161fe8d888935480e28ba326f7e7f61460b415600
SHA25693c2c10047baecf143bad6814a96cc15e3af2919128e011ae8d2ac05b5323aeb
SHA51242cc9bccbe31fc49561b5afc0f3418431eea8e448d763460f67693c02d09686d8081971fbb7e6ad5b5a0bacaf779b8b61457be5a7f50397a89fa7133f5382577
-
Filesize
197KB
MD577f207f2c0882e8ef73261f3407bc1c9
SHA1c36b2b8a027b0aab55e492b6baaba6f06e7f32fe
SHA2561bc06b3f2fa385319046dc0572d4a6833a590727bc67c51ca311759a70805913
SHA512175e18aa256ff2c61b0a300d3980b485d6e470c10b0d330bd3a81cc08219bf613357aec62f601ff521c9d433756c66842df41d9e9aab75e6c2fada0d676cc51c
-
Filesize
197KB
MD5693dc8f07d41d42a04d030b7258a3f80
SHA164b0c390e6434d45163a0d3d7538572c434d8521
SHA256b8cd06cdbfc35f522c6fe27651e4f3eb4c2757597662757c5d12a49b15906dfb
SHA512eb6b94abadc9772b1e2d5b4caf350551718191e7b19db72df221ddd02ad47927422579fc80c00275a3cd43adae2693127662bb66019192f274d90ec129afa660