Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 06:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe
-
Size
192KB
-
MD5
82e53d5d1828d46216c5656aab51da76
-
SHA1
fededef8a4dce8b086f8ceb7b6cd62f8975127e7
-
SHA256
c23499b3ff7931586e34b382c83c25c8a4ee1067bc7839d4c760fd2a0c86660a
-
SHA512
44faee01822f913a1c89a1c69541a64aab3f280e3a4da17d949a540354377ce9ed80a50688748e5049df7f34e4b26134902feb83ba5476c2d46bacd2f7abad86
-
SSDEEP
1536:1EGh0oNl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oNl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{612864B0-2D36-478f-BAA6-B68EC4440C15}\stubpath = "C:\\Windows\\{612864B0-2D36-478f-BAA6-B68EC4440C15}.exe" {17170914-9C11-494e-8C32-D549A9D79E59}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{701A3BA6-11C5-425f-878D-4361F8B3CE8C} {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{701A3BA6-11C5-425f-878D-4361F8B3CE8C}\stubpath = "C:\\Windows\\{701A3BA6-11C5-425f-878D-4361F8B3CE8C}.exe" {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0621D198-720E-4374-9BE7-956E164C1004} {7EF2897B-971D-436a-8550-D8C13CEEB0C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}\stubpath = "C:\\Windows\\{6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe" 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D69572B-9FCF-4c66-912D-BF380603C75A}\stubpath = "C:\\Windows\\{5D69572B-9FCF-4c66-912D-BF380603C75A}.exe" {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D69572B-9FCF-4c66-912D-BF380603C75A} {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EF2897B-971D-436a-8550-D8C13CEEB0C8}\stubpath = "C:\\Windows\\{7EF2897B-971D-436a-8550-D8C13CEEB0C8}.exe" {749C0783-2F4A-40d6-BE46-097FFB3E7DBD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{612864B0-2D36-478f-BAA6-B68EC4440C15} {17170914-9C11-494e-8C32-D549A9D79E59}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{749C0783-2F4A-40d6-BE46-097FFB3E7DBD} {701A3BA6-11C5-425f-878D-4361F8B3CE8C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EF2897B-971D-436a-8550-D8C13CEEB0C8} {749C0783-2F4A-40d6-BE46-097FFB3E7DBD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0621D198-720E-4374-9BE7-956E164C1004}\stubpath = "C:\\Windows\\{0621D198-720E-4374-9BE7-956E164C1004}.exe" {7EF2897B-971D-436a-8550-D8C13CEEB0C8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}\stubpath = "C:\\Windows\\{C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe" {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17170914-9C11-494e-8C32-D549A9D79E59}\stubpath = "C:\\Windows\\{17170914-9C11-494e-8C32-D549A9D79E59}.exe" {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98D38F1F-8983-447e-93CF-6A4A189833C7}\stubpath = "C:\\Windows\\{98D38F1F-8983-447e-93CF-6A4A189833C7}.exe" {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C418E571-F6EC-4f01-8B7B-E5EF3D335C0D} {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B5E1F35-6950-45be-BB35-B4EC4962982A} {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7B5E1F35-6950-45be-BB35-B4EC4962982A}\stubpath = "C:\\Windows\\{7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe" {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{17170914-9C11-494e-8C32-D549A9D79E59} {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{749C0783-2F4A-40d6-BE46-097FFB3E7DBD}\stubpath = "C:\\Windows\\{749C0783-2F4A-40d6-BE46-097FFB3E7DBD}.exe" {701A3BA6-11C5-425f-878D-4361F8B3CE8C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1} 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98D38F1F-8983-447e-93CF-6A4A189833C7} {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe -
Deletes itself 1 IoCs
pid Process 2168 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3024 {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe 3060 {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe 2708 {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe 3036 {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe 2644 {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe 2024 {17170914-9C11-494e-8C32-D549A9D79E59}.exe 1560 {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe 2368 {701A3BA6-11C5-425f-878D-4361F8B3CE8C}.exe 1320 {749C0783-2F4A-40d6-BE46-097FFB3E7DBD}.exe 2428 {7EF2897B-971D-436a-8550-D8C13CEEB0C8}.exe 1216 {0621D198-720E-4374-9BE7-956E164C1004}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{612864B0-2D36-478f-BAA6-B68EC4440C15}.exe {17170914-9C11-494e-8C32-D549A9D79E59}.exe File created C:\Windows\{701A3BA6-11C5-425f-878D-4361F8B3CE8C}.exe {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe File created C:\Windows\{749C0783-2F4A-40d6-BE46-097FFB3E7DBD}.exe {701A3BA6-11C5-425f-878D-4361F8B3CE8C}.exe File created C:\Windows\{6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe File created C:\Windows\{98D38F1F-8983-447e-93CF-6A4A189833C7}.exe {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe File created C:\Windows\{C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe File created C:\Windows\{7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe File created C:\Windows\{17170914-9C11-494e-8C32-D549A9D79E59}.exe {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe File created C:\Windows\{0621D198-720E-4374-9BE7-956E164C1004}.exe {7EF2897B-971D-436a-8550-D8C13CEEB0C8}.exe File created C:\Windows\{5D69572B-9FCF-4c66-912D-BF380603C75A}.exe {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe File created C:\Windows\{7EF2897B-971D-436a-8550-D8C13CEEB0C8}.exe {749C0783-2F4A-40d6-BE46-097FFB3E7DBD}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {701A3BA6-11C5-425f-878D-4361F8B3CE8C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7EF2897B-971D-436a-8550-D8C13CEEB0C8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0621D198-720E-4374-9BE7-956E164C1004}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {17170914-9C11-494e-8C32-D549A9D79E59}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {749C0783-2F4A-40d6-BE46-097FFB3E7DBD}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2260 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe Token: SeIncBasePriorityPrivilege 3024 {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe Token: SeIncBasePriorityPrivilege 3060 {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe Token: SeIncBasePriorityPrivilege 2708 {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe Token: SeIncBasePriorityPrivilege 3036 {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe Token: SeIncBasePriorityPrivilege 2644 {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe Token: SeIncBasePriorityPrivilege 2024 {17170914-9C11-494e-8C32-D549A9D79E59}.exe Token: SeIncBasePriorityPrivilege 1560 {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe Token: SeIncBasePriorityPrivilege 2368 {701A3BA6-11C5-425f-878D-4361F8B3CE8C}.exe Token: SeIncBasePriorityPrivilege 1320 {749C0783-2F4A-40d6-BE46-097FFB3E7DBD}.exe Token: SeIncBasePriorityPrivilege 2428 {7EF2897B-971D-436a-8550-D8C13CEEB0C8}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 3024 2260 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe 31 PID 2260 wrote to memory of 3024 2260 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe 31 PID 2260 wrote to memory of 3024 2260 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe 31 PID 2260 wrote to memory of 3024 2260 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe 31 PID 2260 wrote to memory of 2168 2260 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe 32 PID 2260 wrote to memory of 2168 2260 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe 32 PID 2260 wrote to memory of 2168 2260 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe 32 PID 2260 wrote to memory of 2168 2260 2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe 32 PID 3024 wrote to memory of 3060 3024 {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe 33 PID 3024 wrote to memory of 3060 3024 {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe 33 PID 3024 wrote to memory of 3060 3024 {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe 33 PID 3024 wrote to memory of 3060 3024 {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe 33 PID 3024 wrote to memory of 2736 3024 {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe 34 PID 3024 wrote to memory of 2736 3024 {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe 34 PID 3024 wrote to memory of 2736 3024 {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe 34 PID 3024 wrote to memory of 2736 3024 {6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe 34 PID 3060 wrote to memory of 2708 3060 {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe 35 PID 3060 wrote to memory of 2708 3060 {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe 35 PID 3060 wrote to memory of 2708 3060 {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe 35 PID 3060 wrote to memory of 2708 3060 {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe 35 PID 3060 wrote to memory of 2160 3060 {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe 36 PID 3060 wrote to memory of 2160 3060 {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe 36 PID 3060 wrote to memory of 2160 3060 {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe 36 PID 3060 wrote to memory of 2160 3060 {98D38F1F-8983-447e-93CF-6A4A189833C7}.exe 36 PID 2708 wrote to memory of 3036 2708 {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe 37 PID 2708 wrote to memory of 3036 2708 {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe 37 PID 2708 wrote to memory of 3036 2708 {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe 37 PID 2708 wrote to memory of 3036 2708 {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe 37 PID 2708 wrote to memory of 2752 2708 {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe 38 PID 2708 wrote to memory of 2752 2708 {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe 38 PID 2708 wrote to memory of 2752 2708 {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe 38 PID 2708 wrote to memory of 2752 2708 {C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe 38 PID 3036 wrote to memory of 2644 3036 {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe 39 PID 3036 wrote to memory of 2644 3036 {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe 39 PID 3036 wrote to memory of 2644 3036 {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe 39 PID 3036 wrote to memory of 2644 3036 {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe 39 PID 3036 wrote to memory of 3004 3036 {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe 40 PID 3036 wrote to memory of 3004 3036 {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe 40 PID 3036 wrote to memory of 3004 3036 {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe 40 PID 3036 wrote to memory of 3004 3036 {7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe 40 PID 2644 wrote to memory of 2024 2644 {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe 41 PID 2644 wrote to memory of 2024 2644 {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe 41 PID 2644 wrote to memory of 2024 2644 {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe 41 PID 2644 wrote to memory of 2024 2644 {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe 41 PID 2644 wrote to memory of 1160 2644 {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe 42 PID 2644 wrote to memory of 1160 2644 {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe 42 PID 2644 wrote to memory of 1160 2644 {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe 42 PID 2644 wrote to memory of 1160 2644 {5D69572B-9FCF-4c66-912D-BF380603C75A}.exe 42 PID 2024 wrote to memory of 1560 2024 {17170914-9C11-494e-8C32-D549A9D79E59}.exe 43 PID 2024 wrote to memory of 1560 2024 {17170914-9C11-494e-8C32-D549A9D79E59}.exe 43 PID 2024 wrote to memory of 1560 2024 {17170914-9C11-494e-8C32-D549A9D79E59}.exe 43 PID 2024 wrote to memory of 1560 2024 {17170914-9C11-494e-8C32-D549A9D79E59}.exe 43 PID 2024 wrote to memory of 2124 2024 {17170914-9C11-494e-8C32-D549A9D79E59}.exe 44 PID 2024 wrote to memory of 2124 2024 {17170914-9C11-494e-8C32-D549A9D79E59}.exe 44 PID 2024 wrote to memory of 2124 2024 {17170914-9C11-494e-8C32-D549A9D79E59}.exe 44 PID 2024 wrote to memory of 2124 2024 {17170914-9C11-494e-8C32-D549A9D79E59}.exe 44 PID 1560 wrote to memory of 2368 1560 {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe 45 PID 1560 wrote to memory of 2368 1560 {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe 45 PID 1560 wrote to memory of 2368 1560 {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe 45 PID 1560 wrote to memory of 2368 1560 {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe 45 PID 1560 wrote to memory of 840 1560 {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe 46 PID 1560 wrote to memory of 840 1560 {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe 46 PID 1560 wrote to memory of 840 1560 {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe 46 PID 1560 wrote to memory of 840 1560 {612864B0-2D36-478f-BAA6-B68EC4440C15}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-12_82e53d5d1828d46216c5656aab51da76_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\{6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exeC:\Windows\{6BAB5EEE-A9CA-4845-92FD-BAB386AEE0A1}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{98D38F1F-8983-447e-93CF-6A4A189833C7}.exeC:\Windows\{98D38F1F-8983-447e-93CF-6A4A189833C7}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\{C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exeC:\Windows\{C418E571-F6EC-4f01-8B7B-E5EF3D335C0D}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\{7B5E1F35-6950-45be-BB35-B4EC4962982A}.exeC:\Windows\{7B5E1F35-6950-45be-BB35-B4EC4962982A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\{5D69572B-9FCF-4c66-912D-BF380603C75A}.exeC:\Windows\{5D69572B-9FCF-4c66-912D-BF380603C75A}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\{17170914-9C11-494e-8C32-D549A9D79E59}.exeC:\Windows\{17170914-9C11-494e-8C32-D549A9D79E59}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\{612864B0-2D36-478f-BAA6-B68EC4440C15}.exeC:\Windows\{612864B0-2D36-478f-BAA6-B68EC4440C15}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\{701A3BA6-11C5-425f-878D-4361F8B3CE8C}.exeC:\Windows\{701A3BA6-11C5-425f-878D-4361F8B3CE8C}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2368 -
C:\Windows\{749C0783-2F4A-40d6-BE46-097FFB3E7DBD}.exeC:\Windows\{749C0783-2F4A-40d6-BE46-097FFB3E7DBD}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
C:\Windows\{7EF2897B-971D-436a-8550-D8C13CEEB0C8}.exeC:\Windows\{7EF2897B-971D-436a-8550-D8C13CEEB0C8}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\{0621D198-720E-4374-9BE7-956E164C1004}.exeC:\Windows\{0621D198-720E-4374-9BE7-956E164C1004}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7EF28~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{749C0~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{701A3~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{61286~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{17170~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D695~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7B5E1~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C418E~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98D38~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6BAB5~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5bc10603c7382be88dd9313741c7091d5
SHA1449d5764d674dfef3122ea6bd8bdbf9d2204f647
SHA256d366bdbf1bbf3195607c54b589aead8729a491667be2880069f07ab6d57f7be2
SHA5125bcd25c7fa2cdffb54b36d3540246d743e712d2ab67e3cb145511f2e85b2b577f66a6d7525e6376ffe7e039935bd836a106e1acc3be8fe6b1a9efb5dd471032f
-
Filesize
192KB
MD50437181bb0e5cc2fd9f1031b58a48746
SHA165fddd948114adac8b63703cc66894427c073052
SHA256de4a37b63da8bddb271f4e7f16f2d5d004a8cb2761426454390f034fa7e8f2e3
SHA5122663586a567ab5c97507c3cd8e55813b64b01e4246a5026537c8cf5eddff5c99cf77b53f3232b617f0afdcda15933f620a6cb6fed44a627f0214eebad6fc177d
-
Filesize
192KB
MD5c138b3b66b035aa653f0a151d0fa3fca
SHA18c96dbc80eeae7c017be5d9cf0fec7e2c2c1ed46
SHA2560c5cd9679a05e40b1f36f6425cacc7107d09499a1c3573acb1c19a2211282243
SHA5129b814cd72433e0654f3ed5a558229b2047aac2312ea48bf8c887ebe6251d2818f99262aa6a4e2bf690c52f8763c4bec61d4f7c46832a28557218d4ae40510fcc
-
Filesize
192KB
MD53b08ff39e409b7b9c4d36d90b34fa7f8
SHA15d46d51f4bd42d6fb8af8deb2f83c5795de0ddf6
SHA256ce7b8f92752e80d08f4b1d2b97aa4e6009e69a5d2cf8c550a59b5730b6584666
SHA512196cfd564e118be95995741e7ea178a7acaa24fce2cb5ee1c64661246d1de469b5de967596c8f6cbd0c0b7dff839d45e022686429392c569170e60ce52b5b762
-
Filesize
192KB
MD5cf3da92244723c015ebc9deba4633af7
SHA1417ddcfce51c9f706b805db8d21079ec0e4c63f8
SHA2560cf2ea56cad0191eb710f0871c383fef7d78e116724e88e00fe9e2aeb8cc12e7
SHA512d4e1278fad22cfc8cfb323017662c1262f4c7be353fe9f9a77df8cd6db1e239f0293cb33cec7aca0cb00fa4aded2eb170bd87c6154e79274c2077efecaf0d1cd
-
Filesize
192KB
MD573e77195c306c71f11e978cea80a898b
SHA1e6c96f9c34596455a0769b3ecc3c3cc409c4a373
SHA256447c661a9dd88dced8314d55dfc6b5dbd783b82be2175a59430d7d217bd2f2d3
SHA51249298cb40b0771d18d92453c1b547057539456eb7afed1a4327ee95ea63bc9b2249441d21005d8ba67278860b0074989d5c223b30afee381344efa06635fd9a5
-
Filesize
192KB
MD5c84c2dc8446a848a626d779a5e6fafc2
SHA1409a46f95424243f549cafdc2d6bce184d038b46
SHA2565c5375a58a8b467d9cef878dd358fb108bcb0e36bb0e1ab9cbcb09204809679a
SHA5124f1f4862a399d7dea3b7c7847bdfeeeaf2d2e84c17930722f929b43501edb0be3ca0385296f22247f04fbaad84267890d7cb51f7f98468a187292b0def79e181
-
Filesize
192KB
MD5dc6c2524b4f02a5ecc3995c453490a3e
SHA1e3bde8664e45fc1b313a824d438e23de5863a397
SHA256520b5cfc6cfd6a00a31da16bc2054e2bc47d83d6421f9057de751475f67396f4
SHA512bd262c5f81ff1135eafd5ebb3529d2546e83bfecf57305a114376abea20d900c52b65eb57782eb1737895411d9031aeaf18b63b687c90556c07004c982326e72
-
Filesize
192KB
MD5f1bf8bc147ade416a0050d2018762a93
SHA166849ea071a84a698eb0b9dfccda1ecf67be81ea
SHA256ea3a20bd8a9829005499b467496bf87164d06dae898a18854ab8d58eae8054dc
SHA5125bc2920126ce3e00c2c2b80ddfd666556c008fa05aaa7574fb7beb6dd33e2e1068a5b9020844fe8fa854a961be004c4f00087fce5727d90fb08702b87446df72
-
Filesize
192KB
MD557a40680e7e89c4b5923122eae15c2c6
SHA14a8f58bd6df7c0e9135c4c375fc45cb9a651def8
SHA256d7b0f6162959f526de83b977599ba60d79e6fcd13a2b12def11f1cd8202b2671
SHA5121b77c1d834e03991372edce8dbb2f8d790b99c10d00e6dcd5b3aaecc003a42aed5d924cee0755fa047c9aef47e188a89fd32cdaf94cd14c0166c179834cce8c5
-
Filesize
192KB
MD5e1caf778ea7d6fedcb33c43a50056bb3
SHA1a169b68704d40bb9a2fd4829544bf9178532691c
SHA25677ebf239603b7e606d348ef3c135744ae6fcf7995a143bbe88e076db82f89a6c
SHA5128d5d133f7ce4ebd9fc3985a16ea10944c8ab8780ee04532b31c9142d73bc2c73249a23fdd1d2efb50f83bf76b851c6a8c9ada208c8d41d6e3261b875c7264e2a