Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 03:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe
-
Size
197KB
-
MD5
684f7891cf750ef3af5c130a20d488e4
-
SHA1
819b4b59d82d25c16e1a293cc3b4db59e3b2ccb9
-
SHA256
d85905b3b435782a9389e35f80cbeea9c2a574989c40ad254b7f22552a3adef0
-
SHA512
d5549dfb7c465f615064470784575da38d36d64d9daf5aeecce71b578d4375bd26c9321df04890164cd1bac70648a1f43a7f27a94207e90432bdc1409bddce3a
-
SSDEEP
3072:jEGh0oRl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGTlEeKcAEca
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D73479E2-515F-4923-8A42-39AD5A66E1BA}\stubpath = "C:\\Windows\\{D73479E2-515F-4923-8A42-39AD5A66E1BA}.exe" {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{540BAAC6-6EFF-4f0e-A313-1EB17308B4C7} {D73479E2-515F-4923-8A42-39AD5A66E1BA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14D434C1-6268-4f0d-BC13-7C2D15615908}\stubpath = "C:\\Windows\\{14D434C1-6268-4f0d-BC13-7C2D15615908}.exe" {BBCB269F-0466-44b9-BFD3-00D6F80B15A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E781F277-6967-43d4-9A96-3283AD2545B0} 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D87552D-E62A-439e-AA55-A63C10297449} {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71D9575D-4105-4c5d-8D70-2E8BA738997A} {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71D9575D-4105-4c5d-8D70-2E8BA738997A}\stubpath = "C:\\Windows\\{71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe" {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D73479E2-515F-4923-8A42-39AD5A66E1BA} {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E781F277-6967-43d4-9A96-3283AD2545B0}\stubpath = "C:\\Windows\\{E781F277-6967-43d4-9A96-3283AD2545B0}.exe" 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE020FEE-7F73-41bd-8D00-0959CE140B8C} {E781F277-6967-43d4-9A96-3283AD2545B0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{794679C9-71BF-4582-BB7A-A1EAEE61E2C2} {4D87552D-E62A-439e-AA55-A63C10297449}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14D434C1-6268-4f0d-BC13-7C2D15615908} {BBCB269F-0466-44b9-BFD3-00D6F80B15A4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D87552D-E62A-439e-AA55-A63C10297449}\stubpath = "C:\\Windows\\{4D87552D-E62A-439e-AA55-A63C10297449}.exe" {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D50600AA-AB00-4ab1-A42D-84E04A7F1757} {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D50600AA-AB00-4ab1-A42D-84E04A7F1757}\stubpath = "C:\\Windows\\{D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe" {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BBCB269F-0466-44b9-BFD3-00D6F80B15A4}\stubpath = "C:\\Windows\\{BBCB269F-0466-44b9-BFD3-00D6F80B15A4}.exe" {540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BBCB269F-0466-44b9-BFD3-00D6F80B15A4} {540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE020FEE-7F73-41bd-8D00-0959CE140B8C}\stubpath = "C:\\Windows\\{AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe" {E781F277-6967-43d4-9A96-3283AD2545B0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{794679C9-71BF-4582-BB7A-A1EAEE61E2C2}\stubpath = "C:\\Windows\\{794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe" {4D87552D-E62A-439e-AA55-A63C10297449}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FE9AD114-41C4-40a5-AB16-84575C0DC1E5} {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FE9AD114-41C4-40a5-AB16-84575C0DC1E5}\stubpath = "C:\\Windows\\{FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe" {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}\stubpath = "C:\\Windows\\{540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}.exe" {D73479E2-515F-4923-8A42-39AD5A66E1BA}.exe -
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2748 {E781F277-6967-43d4-9A96-3283AD2545B0}.exe 2944 {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe 2540 {4D87552D-E62A-439e-AA55-A63C10297449}.exe 2104 {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe 2072 {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe 2256 {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe 1332 {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe 1612 {D73479E2-515F-4923-8A42-39AD5A66E1BA}.exe 1648 {540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}.exe 3012 {BBCB269F-0466-44b9-BFD3-00D6F80B15A4}.exe 1496 {14D434C1-6268-4f0d-BC13-7C2D15615908}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe File created C:\Windows\{D73479E2-515F-4923-8A42-39AD5A66E1BA}.exe {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe File created C:\Windows\{540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}.exe {D73479E2-515F-4923-8A42-39AD5A66E1BA}.exe File created C:\Windows\{BBCB269F-0466-44b9-BFD3-00D6F80B15A4}.exe {540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}.exe File created C:\Windows\{AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe {E781F277-6967-43d4-9A96-3283AD2545B0}.exe File created C:\Windows\{4D87552D-E62A-439e-AA55-A63C10297449}.exe {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe File created C:\Windows\{71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe File created C:\Windows\{FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe File created C:\Windows\{E781F277-6967-43d4-9A96-3283AD2545B0}.exe 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe File created C:\Windows\{794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe {4D87552D-E62A-439e-AA55-A63C10297449}.exe File created C:\Windows\{14D434C1-6268-4f0d-BC13-7C2D15615908}.exe {BBCB269F-0466-44b9-BFD3-00D6F80B15A4}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E781F277-6967-43d4-9A96-3283AD2545B0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4D87552D-E62A-439e-AA55-A63C10297449}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D73479E2-515F-4923-8A42-39AD5A66E1BA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BBCB269F-0466-44b9-BFD3-00D6F80B15A4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {14D434C1-6268-4f0d-BC13-7C2D15615908}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2488 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe Token: SeIncBasePriorityPrivilege 2748 {E781F277-6967-43d4-9A96-3283AD2545B0}.exe Token: SeIncBasePriorityPrivilege 2944 {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe Token: SeIncBasePriorityPrivilege 2540 {4D87552D-E62A-439e-AA55-A63C10297449}.exe Token: SeIncBasePriorityPrivilege 2104 {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe Token: SeIncBasePriorityPrivilege 2072 {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe Token: SeIncBasePriorityPrivilege 2256 {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe Token: SeIncBasePriorityPrivilege 1332 {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe Token: SeIncBasePriorityPrivilege 1612 {D73479E2-515F-4923-8A42-39AD5A66E1BA}.exe Token: SeIncBasePriorityPrivilege 1648 {540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}.exe Token: SeIncBasePriorityPrivilege 3012 {BBCB269F-0466-44b9-BFD3-00D6F80B15A4}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2748 2488 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe 30 PID 2488 wrote to memory of 2748 2488 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe 30 PID 2488 wrote to memory of 2748 2488 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe 30 PID 2488 wrote to memory of 2748 2488 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe 30 PID 2488 wrote to memory of 2732 2488 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe 31 PID 2488 wrote to memory of 2732 2488 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe 31 PID 2488 wrote to memory of 2732 2488 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe 31 PID 2488 wrote to memory of 2732 2488 2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe 31 PID 2748 wrote to memory of 2944 2748 {E781F277-6967-43d4-9A96-3283AD2545B0}.exe 32 PID 2748 wrote to memory of 2944 2748 {E781F277-6967-43d4-9A96-3283AD2545B0}.exe 32 PID 2748 wrote to memory of 2944 2748 {E781F277-6967-43d4-9A96-3283AD2545B0}.exe 32 PID 2748 wrote to memory of 2944 2748 {E781F277-6967-43d4-9A96-3283AD2545B0}.exe 32 PID 2748 wrote to memory of 2804 2748 {E781F277-6967-43d4-9A96-3283AD2545B0}.exe 33 PID 2748 wrote to memory of 2804 2748 {E781F277-6967-43d4-9A96-3283AD2545B0}.exe 33 PID 2748 wrote to memory of 2804 2748 {E781F277-6967-43d4-9A96-3283AD2545B0}.exe 33 PID 2748 wrote to memory of 2804 2748 {E781F277-6967-43d4-9A96-3283AD2545B0}.exe 33 PID 2944 wrote to memory of 2540 2944 {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe 34 PID 2944 wrote to memory of 2540 2944 {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe 34 PID 2944 wrote to memory of 2540 2944 {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe 34 PID 2944 wrote to memory of 2540 2944 {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe 34 PID 2944 wrote to memory of 2584 2944 {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe 35 PID 2944 wrote to memory of 2584 2944 {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe 35 PID 2944 wrote to memory of 2584 2944 {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe 35 PID 2944 wrote to memory of 2584 2944 {AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe 35 PID 2540 wrote to memory of 2104 2540 {4D87552D-E62A-439e-AA55-A63C10297449}.exe 36 PID 2540 wrote to memory of 2104 2540 {4D87552D-E62A-439e-AA55-A63C10297449}.exe 36 PID 2540 wrote to memory of 2104 2540 {4D87552D-E62A-439e-AA55-A63C10297449}.exe 36 PID 2540 wrote to memory of 2104 2540 {4D87552D-E62A-439e-AA55-A63C10297449}.exe 36 PID 2540 wrote to memory of 464 2540 {4D87552D-E62A-439e-AA55-A63C10297449}.exe 37 PID 2540 wrote to memory of 464 2540 {4D87552D-E62A-439e-AA55-A63C10297449}.exe 37 PID 2540 wrote to memory of 464 2540 {4D87552D-E62A-439e-AA55-A63C10297449}.exe 37 PID 2540 wrote to memory of 464 2540 {4D87552D-E62A-439e-AA55-A63C10297449}.exe 37 PID 2104 wrote to memory of 2072 2104 {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe 38 PID 2104 wrote to memory of 2072 2104 {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe 38 PID 2104 wrote to memory of 2072 2104 {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe 38 PID 2104 wrote to memory of 2072 2104 {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe 38 PID 2104 wrote to memory of 2408 2104 {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe 39 PID 2104 wrote to memory of 2408 2104 {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe 39 PID 2104 wrote to memory of 2408 2104 {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe 39 PID 2104 wrote to memory of 2408 2104 {794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe 39 PID 2072 wrote to memory of 2256 2072 {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe 41 PID 2072 wrote to memory of 2256 2072 {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe 41 PID 2072 wrote to memory of 2256 2072 {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe 41 PID 2072 wrote to memory of 2256 2072 {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe 41 PID 2072 wrote to memory of 296 2072 {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe 42 PID 2072 wrote to memory of 296 2072 {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe 42 PID 2072 wrote to memory of 296 2072 {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe 42 PID 2072 wrote to memory of 296 2072 {71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe 42 PID 2256 wrote to memory of 1332 2256 {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe 43 PID 2256 wrote to memory of 1332 2256 {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe 43 PID 2256 wrote to memory of 1332 2256 {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe 43 PID 2256 wrote to memory of 1332 2256 {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe 43 PID 2256 wrote to memory of 2060 2256 {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe 44 PID 2256 wrote to memory of 2060 2256 {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe 44 PID 2256 wrote to memory of 2060 2256 {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe 44 PID 2256 wrote to memory of 2060 2256 {FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe 44 PID 1332 wrote to memory of 1612 1332 {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe 45 PID 1332 wrote to memory of 1612 1332 {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe 45 PID 1332 wrote to memory of 1612 1332 {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe 45 PID 1332 wrote to memory of 1612 1332 {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe 45 PID 1332 wrote to memory of 2296 1332 {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe 46 PID 1332 wrote to memory of 2296 1332 {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe 46 PID 1332 wrote to memory of 2296 1332 {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe 46 PID 1332 wrote to memory of 2296 1332 {D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-09_684f7891cf750ef3af5c130a20d488e4_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\{E781F277-6967-43d4-9A96-3283AD2545B0}.exeC:\Windows\{E781F277-6967-43d4-9A96-3283AD2545B0}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\{AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exeC:\Windows\{AE020FEE-7F73-41bd-8D00-0959CE140B8C}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\{4D87552D-E62A-439e-AA55-A63C10297449}.exeC:\Windows\{4D87552D-E62A-439e-AA55-A63C10297449}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\{794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exeC:\Windows\{794679C9-71BF-4582-BB7A-A1EAEE61E2C2}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\{71D9575D-4105-4c5d-8D70-2E8BA738997A}.exeC:\Windows\{71D9575D-4105-4c5d-8D70-2E8BA738997A}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\{FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exeC:\Windows\{FE9AD114-41C4-40a5-AB16-84575C0DC1E5}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\{D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exeC:\Windows\{D50600AA-AB00-4ab1-A42D-84E04A7F1757}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\{D73479E2-515F-4923-8A42-39AD5A66E1BA}.exeC:\Windows\{D73479E2-515F-4923-8A42-39AD5A66E1BA}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\{540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}.exeC:\Windows\{540BAAC6-6EFF-4f0e-A313-1EB17308B4C7}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\{BBCB269F-0466-44b9-BFD3-00D6F80B15A4}.exeC:\Windows\{BBCB269F-0466-44b9-BFD3-00D6F80B15A4}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Windows\{14D434C1-6268-4f0d-BC13-7C2D15615908}.exeC:\Windows\{14D434C1-6268-4f0d-BC13-7C2D15615908}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BBCB2~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{540BA~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D7347~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D5060~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FE9AD~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71D95~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79467~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4D875~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AE020~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E781F~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD55dc94ee6cf3b493a157e72c0293042f3
SHA1276d544c0d4c6957dc94d4ae98bb90ebb8ad2199
SHA256285954a313c9a2e8cb7523ab6e390c64b6641a848090fd4f224407b6ce6208b4
SHA512c06ef750fb75b646a2aac71725fecb38717a751c0ad15e38646f6fe6e10abbaadc4f719e1fd1705796ffdb9e2d1d72305d1e8f3ee0d8ff086d7ef2a17970b16e
-
Filesize
197KB
MD5fc5ba97db52f69d217d8e3a239f3824a
SHA1ad299840bf2af84ac30871b90e493606700cf581
SHA256a5f68fe59be57368910149f26f14848a35be22fba4f9ee4c7dd41630fd93ef0e
SHA5129ac43e3ad10afbb79ac3985fe6556865bfe86ff4d7d6cb2e9825fbfaf8b876e8a73e0fd8e7fad130f078d0b4e6c7f9f2623becf92094fd047c27c28d4bb504be
-
Filesize
197KB
MD500a72f9b9ce65bf65c563e215e9c8057
SHA1766503c748d6600527e6ce069b3b85247e0ce1b8
SHA256fc959155fc4d1c8997b2d4b78085f3348815225b021a7f87ba393c43155f79ab
SHA51289fb5d067fea953b339e50af50ce291d6a1a963ae067aafd3ed12f69221685a4dc9b7a14a94a0c42d14ac570ca26fa4e9af4d81282259a5889f41a9a4bd13dcc
-
Filesize
197KB
MD5720d71275b2850e1129654ea08ded5ed
SHA1ed12f5e6046815415af489925aba5595360ac866
SHA25639e950215250af0c31e1f0704a13e6d8543ec57b11ce6af1b1133696ea21a0f6
SHA5126369389b02c93ba291c732ad073d3a4c511b100082bea6e5f987d090d56565c7f4f48633186fc9dee8ee98d985514c5e79be36899f93460685124ed016ff6b7f
-
Filesize
197KB
MD589e1f0ef11515c290f211dbe381c1364
SHA13202c88ea3458b8eae048a8f4fb3dfcb1d6cf313
SHA256c69d58a666fa0b23068264ce051b88fdf4e83807bae179f44e21f500d1717703
SHA512376be4d50ddf6e86e92869d187426c5b4c60fb797e9bcbe72c052ffc1dc1b3f0c832126c4be5ea507f13ecb27f926e63b92e64dea96f6ee22b8ed6e7674a9b43
-
Filesize
197KB
MD5f6ddc2ebfe9903bdb4bce178225a2441
SHA11253af906e28f175a8d528df949034ccfc1d5c93
SHA256b1c155dc368e0e715e5cadfdf415d9eb41db2474f1d486a62d3ee704da73e9db
SHA512a7be808752ed95dece7574e35232c1f9d8ac83608e8bd9e73fd01ebaebab7e91d40ef544a9660aee7550a5602cf280aca5c0a150ecb5571340fa35dd06d020f8
-
Filesize
197KB
MD532c5a5f4e57307d3638e214607b59abc
SHA154bba0ec2156d4f551a87733ac5905dd6fdb5c68
SHA2569126a607311a126496f2e7e2d1614cb878e5520f801df1b6a1989bc0f4ff4298
SHA5126ca10e84c663aeba878c27d3a9b6fa816cb4e4a238bcd29c0aafae64105cecfd7824bdd9a930b5fbded997ed63214cd9bb129fdb2dbf1a7bb9514c58105fc495
-
Filesize
197KB
MD50c3bab3832e11993c6754f2c9488b743
SHA1d33b294556f1499f6d44dfb5074d5ccb1fb1b3cc
SHA2569721fd972b8d2786751e3a95212d15a8cd15d9f4cf18fd5daaab97d7e3377470
SHA512e642adc64bf65b76e90d0950f49c731877a60ed199f85fbbe2838eb0f0445823b8e3358041229c1d6cd2468c59ea5a601004dc05e8b6a409767acdb903cf80ce
-
Filesize
197KB
MD56d92a97ea9cd026c1b789c2052f58e3b
SHA1ee83fcb8cbf60189d1a658795eded59929f35c2a
SHA256de5ea65a6404f5e8b6fce6dddec2ee935ab34cfb923315f445783a97d983e2bc
SHA5120c7cf70846f95a3eb53b776d9c99db9bdc9f52a23fd67508a9ab0af4af79ebfd4d1bb6a9720d123562da2b61869a48e89343f3214e2c817e77577694d582cde2
-
Filesize
197KB
MD51f09f5349afe1ce9b9d06667aeb2f6a5
SHA1a6c924809ed8ac58144c5ef30c1042fc7d1a3304
SHA256c8439fbd515cd3ecaa260787e13d42bcb5dfaf107960ba7c5b6ac268d18ed86d
SHA512fb64538abd596b7c27c4a3da86724c46fdb1775ca5dd274c4019249b24888dcf0c5287f40da72f757a0e7dc3be6b30e2dd9886c76726c06b6569442e78ac12a9
-
Filesize
197KB
MD59966f560d90d1a2fe8a247091f7a1f97
SHA1415c10711807459eba86ea2b84652d8251478e3e
SHA25650c4bf2289284205b0bf99a5cb3ee712f7115f20c114b7f5aa516efe6aabb135
SHA512d6a9d1026ac354416a3df784aa6c66099edf65a782dd5400e5f34e6aaefd94bed61c79f91c6bd521a53b789d9576125ed26f4460e1a4edce03f2e62ce5e95801