Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 08:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe
-
Size
192KB
-
MD5
5f06f55a35c44b0ba1ec576d24f6b1a8
-
SHA1
05931824bf747d5dd9b9e65c78dc0a70cd5e912b
-
SHA256
33d746a47c9b11938bd230c292dc521db27e111b8ad0ffce4ed8e941b6915d8e
-
SHA512
2a61ac1f5a4ac2bd5c643790a28639e86423ed1fbc11ddfd9d339e169b5da73ea7fff138cf8606472e4fbb5915400ea6f506eb85e57cca07680bac5292534ede
-
SSDEEP
1536:1EGh0owl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0owl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{755590C9-484F-4b76-BCE0-80307A783FA6} 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B696FD95-BEFF-4c74-BA34-7AFC30EECBD8} {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}\stubpath = "C:\\Windows\\{B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe" {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{74181DC2-A6CF-46c7-BFB3-D1B77B8A6800} {2964B1BB-FB22-45d9-BE40-D6F43B47A298}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}\stubpath = "C:\\Windows\\{89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe" {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2964B1BB-FB22-45d9-BE40-D6F43B47A298} {89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{755590C9-484F-4b76-BCE0-80307A783FA6}\stubpath = "C:\\Windows\\{755590C9-484F-4b76-BCE0-80307A783FA6}.exe" 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B3549D8D-7B35-4ddf-BDD5-B7999CA12A44} {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{528A612D-5533-43f0-85CD-F3D03FDDB88A} {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6A968BDE-9E19-4b2b-9D89-06A062294F9B} {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6A968BDE-9E19-4b2b-9D89-06A062294F9B}\stubpath = "C:\\Windows\\{6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe" {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}\stubpath = "C:\\Windows\\{36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe" {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2964B1BB-FB22-45d9-BE40-D6F43B47A298}\stubpath = "C:\\Windows\\{2964B1BB-FB22-45d9-BE40-D6F43B47A298}.exe" {89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FD9BDD0-5244-4cbc-AA04-24472CE4423B}\stubpath = "C:\\Windows\\{4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe" {755590C9-484F-4b76-BCE0-80307A783FA6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{36FB9EF3-81B0-43da-A39F-5E6A6258DDE0} {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ECDF47F4-7668-46ef-832F-A3BB492D7C73} {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{89E9B1E8-296A-43f9-9283-2DCBACE3C9FF} {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{74181DC2-A6CF-46c7-BFB3-D1B77B8A6800}\stubpath = "C:\\Windows\\{74181DC2-A6CF-46c7-BFB3-D1B77B8A6800}.exe" {2964B1BB-FB22-45d9-BE40-D6F43B47A298}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FD9BDD0-5244-4cbc-AA04-24472CE4423B} {755590C9-484F-4b76-BCE0-80307A783FA6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}\stubpath = "C:\\Windows\\{B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe" {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6699E42D-6D43-4a42-87CF-B54C2B296357} {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6699E42D-6D43-4a42-87CF-B54C2B296357}\stubpath = "C:\\Windows\\{6699E42D-6D43-4a42-87CF-B54C2B296357}.exe" {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{528A612D-5533-43f0-85CD-F3D03FDDB88A}\stubpath = "C:\\Windows\\{528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe" {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ECDF47F4-7668-46ef-832F-A3BB492D7C73}\stubpath = "C:\\Windows\\{ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe" {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe -
Executes dropped EXE 12 IoCs
pid Process 3212 {755590C9-484F-4b76-BCE0-80307A783FA6}.exe 1916 {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe 1228 {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe 3124 {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe 4100 {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe 3600 {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe 4616 {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe 1576 {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe 1932 {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe 1048 {89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe 4992 {2964B1BB-FB22-45d9-BE40-D6F43B47A298}.exe 3784 {74181DC2-A6CF-46c7-BFB3-D1B77B8A6800}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{755590C9-484F-4b76-BCE0-80307A783FA6}.exe 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe File created C:\Windows\{4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe {755590C9-484F-4b76-BCE0-80307A783FA6}.exe File created C:\Windows\{B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe File created C:\Windows\{6699E42D-6D43-4a42-87CF-B54C2B296357}.exe {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe File created C:\Windows\{36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe File created C:\Windows\{ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe File created C:\Windows\{B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe File created C:\Windows\{528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe File created C:\Windows\{6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe File created C:\Windows\{89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe File created C:\Windows\{2964B1BB-FB22-45d9-BE40-D6F43B47A298}.exe {89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe File created C:\Windows\{74181DC2-A6CF-46c7-BFB3-D1B77B8A6800}.exe {2964B1BB-FB22-45d9-BE40-D6F43B47A298}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {74181DC2-A6CF-46c7-BFB3-D1B77B8A6800}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2964B1BB-FB22-45d9-BE40-D6F43B47A298}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {755590C9-484F-4b76-BCE0-80307A783FA6}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1140 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe Token: SeIncBasePriorityPrivilege 3212 {755590C9-484F-4b76-BCE0-80307A783FA6}.exe Token: SeIncBasePriorityPrivilege 1916 {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe Token: SeIncBasePriorityPrivilege 1228 {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe Token: SeIncBasePriorityPrivilege 3124 {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe Token: SeIncBasePriorityPrivilege 4100 {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe Token: SeIncBasePriorityPrivilege 3600 {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe Token: SeIncBasePriorityPrivilege 4616 {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe Token: SeIncBasePriorityPrivilege 1576 {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe Token: SeIncBasePriorityPrivilege 1932 {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe Token: SeIncBasePriorityPrivilege 1048 {89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe Token: SeIncBasePriorityPrivilege 4992 {2964B1BB-FB22-45d9-BE40-D6F43B47A298}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 3212 1140 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe 94 PID 1140 wrote to memory of 3212 1140 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe 94 PID 1140 wrote to memory of 3212 1140 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe 94 PID 1140 wrote to memory of 3500 1140 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe 95 PID 1140 wrote to memory of 3500 1140 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe 95 PID 1140 wrote to memory of 3500 1140 2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe 95 PID 3212 wrote to memory of 1916 3212 {755590C9-484F-4b76-BCE0-80307A783FA6}.exe 96 PID 3212 wrote to memory of 1916 3212 {755590C9-484F-4b76-BCE0-80307A783FA6}.exe 96 PID 3212 wrote to memory of 1916 3212 {755590C9-484F-4b76-BCE0-80307A783FA6}.exe 96 PID 3212 wrote to memory of 4800 3212 {755590C9-484F-4b76-BCE0-80307A783FA6}.exe 97 PID 3212 wrote to memory of 4800 3212 {755590C9-484F-4b76-BCE0-80307A783FA6}.exe 97 PID 3212 wrote to memory of 4800 3212 {755590C9-484F-4b76-BCE0-80307A783FA6}.exe 97 PID 1916 wrote to memory of 1228 1916 {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe 100 PID 1916 wrote to memory of 1228 1916 {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe 100 PID 1916 wrote to memory of 1228 1916 {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe 100 PID 1916 wrote to memory of 4076 1916 {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe 101 PID 1916 wrote to memory of 4076 1916 {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe 101 PID 1916 wrote to memory of 4076 1916 {4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe 101 PID 1228 wrote to memory of 3124 1228 {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe 102 PID 1228 wrote to memory of 3124 1228 {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe 102 PID 1228 wrote to memory of 3124 1228 {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe 102 PID 1228 wrote to memory of 428 1228 {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe 103 PID 1228 wrote to memory of 428 1228 {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe 103 PID 1228 wrote to memory of 428 1228 {B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe 103 PID 3124 wrote to memory of 4100 3124 {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe 104 PID 3124 wrote to memory of 4100 3124 {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe 104 PID 3124 wrote to memory of 4100 3124 {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe 104 PID 3124 wrote to memory of 3460 3124 {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe 105 PID 3124 wrote to memory of 3460 3124 {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe 105 PID 3124 wrote to memory of 3460 3124 {6699E42D-6D43-4a42-87CF-B54C2B296357}.exe 105 PID 4100 wrote to memory of 3600 4100 {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe 106 PID 4100 wrote to memory of 3600 4100 {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe 106 PID 4100 wrote to memory of 3600 4100 {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe 106 PID 4100 wrote to memory of 4704 4100 {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe 107 PID 4100 wrote to memory of 4704 4100 {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe 107 PID 4100 wrote to memory of 4704 4100 {B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe 107 PID 3600 wrote to memory of 4616 3600 {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe 108 PID 3600 wrote to memory of 4616 3600 {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe 108 PID 3600 wrote to memory of 4616 3600 {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe 108 PID 3600 wrote to memory of 3952 3600 {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe 109 PID 3600 wrote to memory of 3952 3600 {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe 109 PID 3600 wrote to memory of 3952 3600 {528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe 109 PID 4616 wrote to memory of 1576 4616 {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe 110 PID 4616 wrote to memory of 1576 4616 {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe 110 PID 4616 wrote to memory of 1576 4616 {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe 110 PID 4616 wrote to memory of 4340 4616 {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe 111 PID 4616 wrote to memory of 4340 4616 {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe 111 PID 4616 wrote to memory of 4340 4616 {6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe 111 PID 1576 wrote to memory of 1932 1576 {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe 112 PID 1576 wrote to memory of 1932 1576 {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe 112 PID 1576 wrote to memory of 1932 1576 {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe 112 PID 1576 wrote to memory of 3200 1576 {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe 113 PID 1576 wrote to memory of 3200 1576 {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe 113 PID 1576 wrote to memory of 3200 1576 {36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe 113 PID 1932 wrote to memory of 1048 1932 {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe 114 PID 1932 wrote to memory of 1048 1932 {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe 114 PID 1932 wrote to memory of 1048 1932 {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe 114 PID 1932 wrote to memory of 5048 1932 {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe 115 PID 1932 wrote to memory of 5048 1932 {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe 115 PID 1932 wrote to memory of 5048 1932 {ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe 115 PID 1048 wrote to memory of 4992 1048 {89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe 116 PID 1048 wrote to memory of 4992 1048 {89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe 116 PID 1048 wrote to memory of 4992 1048 {89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe 116 PID 1048 wrote to memory of 4400 1048 {89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-13_5f06f55a35c44b0ba1ec576d24f6b1a8_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\{755590C9-484F-4b76-BCE0-80307A783FA6}.exeC:\Windows\{755590C9-484F-4b76-BCE0-80307A783FA6}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\{4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exeC:\Windows\{4FD9BDD0-5244-4cbc-AA04-24472CE4423B}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\{B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exeC:\Windows\{B3549D8D-7B35-4ddf-BDD5-B7999CA12A44}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\{6699E42D-6D43-4a42-87CF-B54C2B296357}.exeC:\Windows\{6699E42D-6D43-4a42-87CF-B54C2B296357}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\{B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exeC:\Windows\{B696FD95-BEFF-4c74-BA34-7AFC30EECBD8}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\{528A612D-5533-43f0-85CD-F3D03FDDB88A}.exeC:\Windows\{528A612D-5533-43f0-85CD-F3D03FDDB88A}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\{6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exeC:\Windows\{6A968BDE-9E19-4b2b-9D89-06A062294F9B}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\{36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exeC:\Windows\{36FB9EF3-81B0-43da-A39F-5E6A6258DDE0}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\{ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exeC:\Windows\{ECDF47F4-7668-46ef-832F-A3BB492D7C73}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\{89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exeC:\Windows\{89E9B1E8-296A-43f9-9283-2DCBACE3C9FF}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\{2964B1BB-FB22-45d9-BE40-D6F43B47A298}.exeC:\Windows\{2964B1BB-FB22-45d9-BE40-D6F43B47A298}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4992 -
C:\Windows\{74181DC2-A6CF-46c7-BFB3-D1B77B8A6800}.exeC:\Windows\{74181DC2-A6CF-46c7-BFB3-D1B77B8A6800}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2964B~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{89E9B~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ECDF4~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{36FB9~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6A968~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:4340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{528A6~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B696F~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6699E~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B3549~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4FD9B~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{75559~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:4800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5b341b30b827456254d638863e30b49c6
SHA15636e527c0dd6fd23773cfc5950dd30ca8cde7ee
SHA25683e1ffcae01452a997e0c35114360eef297f3ced8d3f9570a0931f924880101f
SHA5128d8f1251d33e522879688c918404808fbb75076c1d91eafafe49aa31e908868c4b8d375bbe49d9e8e6e393eaf9f2edc12274b70cfb44fa94f42731fab3e999a0
-
Filesize
192KB
MD5172467cbf0bad14e98d1276d42dca213
SHA153d1c860ad2422fad7be8572284028fad86e58bc
SHA25634497f5eeb7b4cadc8685afd321cdc6b7cde6d699a8e06f992c62be25ad1a4a3
SHA5120be35d3fba55a01f26e90ace1b5de55ca35125bb4e8592a3058ccc14d85bebbf2aaec3f423c6a54b29ffca6c90df93e7355ec75880dd3e07c61862086aef3202
-
Filesize
192KB
MD5160ad73d830a7f2b7d48e757e505c47b
SHA18fa2cfbf603448a35f3cd1cc28381639bb841ca2
SHA25695a09cf5172543b1e928107a489087a2316662d14a93fdea0ca78cdda50739de
SHA5121590f92242963c484878f756845db359f2d3c177a451f3b651f156ba2d5af8a6010fe9807ba51ff715ccecd32fd60bf2f59dd15c13ad6936863fd408630cd348
-
Filesize
192KB
MD5bf3eb25c7087711f3eb077de09e591ca
SHA10731f511d0e87eb5c11e69025b975d7004f72940
SHA2566623880c50c92c59c9af67d8d367733fda075fc46714fbff8f2357fda6e6613e
SHA51290f7f43ae76f62626c6091534523ccebfbe3282e4f88c3411b68d60e137e0e1f9783b77728ea20442b5bd29c04a4124e92b0c1bbed5c826ab36bd0263bea5ce4
-
Filesize
192KB
MD528aa4f7fd0cb0448e1cf904141089699
SHA121caeec41fc9532f244d4d04cb14da88bc7b5827
SHA25659203528dfec5f4a814300d228b5d723f7ad678c1ad476709317add13ff95919
SHA5129083b97739937fd391177c1864879546328cf5d85beb342b18f7530e4ca871787eb1dd9973b49287874e85a6b7338957f4860c4ddf0bbcff560320ac6a899292
-
Filesize
192KB
MD5be8c87ee518782b70f6f69afeecbf11a
SHA1675b5f115b6ac8cbffe54cf25e4cfc2d2c3fdf30
SHA256a14f639a58e4c2bf655785c220b948363c64dc089069cda2f2a9abdbd0a8621e
SHA512dde81d8ffb951dec67dda931cfc9ebb04d5968c998c2311a581b3ec42a27a19be9bddfe38708f474682f7adf113168ea56b977e0c5b8429500fd0df0ebaf080e
-
Filesize
192KB
MD511b4a2965c438d7919f619f0078bf960
SHA16fbfad22736d9fa96bde0dcc298c8560929dd5fa
SHA2562dc0a75c1272c2119a819a807b644ef423bc144384e8abf06a7f4d2c10f38fb7
SHA512cf8bf1c981d71db377c6a8e82cd07e11e904b07069fd243b481ab4e50547a69d092440dfae85655a123e97bb852bf993c75731b63bbeb6ac3ee0df1482a577fe
-
Filesize
192KB
MD5e4f5d73a01ccd05b3f144cb10f8aa6a6
SHA1b36af377548c9b91f2064b56962baca067d567ac
SHA256823609956c2dc9041277269cddb324546d1a940d1a3e054253693c45dfd7dc32
SHA5124ba6668a1b2daf8001bb535aee2cca66bbd8e6104a1e4c719f8fd39188aa7eeada3b73c43b3888b653b6de42fcc1e57fd0316d7743c72e3c6c6f80d3a3ed1e49
-
Filesize
192KB
MD5c2001f5ea5d3bd7afbc891f1637f2192
SHA1145c2bb5f8df7473aef59f0a6f471766576f0023
SHA256ea5dbe60e3334d76f5a3ca6a69e5ff076a3192d1581850279bda7027a171c182
SHA512d0d252a7b45739cd4d3a3d35f09b1bd7dca73bea14386235956881dbed457dd10d7e63e701bdc2b1ae8171e802b1912e7eaa0250c26ef52f1ba761dce51d4970
-
Filesize
192KB
MD5c558434d05ab5a2551580a801423fc0e
SHA1ddeccdaff2ce6d388314e2814e6df87e67bb0ceb
SHA2560e23186b0b8279207d0d4dea54b187821d6102195dcba06a38fed797e3013bc0
SHA5128ef66c53a5beb8ffd748e01e00c147ecd3320de4a6c1f77bf749e60be2a6ab98cdbfcc5fec9509bb5988f4b7237f754396ecdaf470f6347e1e76fa8dadb0c1d0
-
Filesize
192KB
MD57d5df01f88eeec773401ea2cc552076c
SHA1bd15857d2cfd415446ffb9d4e87457fb892be9ea
SHA256e15fc7e6df623dbb1fd6ced770825622705eded135800c81b3cb51a94fa90461
SHA5129081164fe5a2a56ab63b84f9e9ff4ae5a913b6c5a5fc3ece1c8068ac96a6ff4ea6afa83f8bff13f0a773488f7e446d3971aab6969a9343d1e7a56c619a7b863c
-
Filesize
192KB
MD5b0519216fcfda66e0d690e99d8f925df
SHA1224606cea8765a10d177f4ed2f83f9a3a0619072
SHA2567cafac2c0a60a0e75f1ff8b79a9408f65b30d8af63a3e88e50e76ca3cd7c12f9
SHA51270458f0c199d6e665168998a50869d75cbfec7f8dace446417befb9f46932308dc3f05110fd02c4a6b2f735992b4d16eeadcf450260f62ab6416eaab8d762322