Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe
-
Size
168KB
-
MD5
5c761811ce80777d2517a1adc9e860b3
-
SHA1
a7eafbf7e6fb9ed33f1af9c66a2398dfd562835e
-
SHA256
2109f3a395e920ae23089e8ca60ec74928d9daa3e0719cd60e6a6c53ad766f0a
-
SHA512
c58237fc7d747bacfa5148a14fa8fc411e4d3c75ae74d109b71802ba67077107fbb956a0c27fcf5f91d7e4374c83cceddc38be0d91b38e1ce002814353173786
-
SSDEEP
1536:1EGh0ollq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0ollqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C12E217-5CEE-4b19-9289-A3A8C1569953} {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C12E217-5CEE-4b19-9289-A3A8C1569953}\stubpath = "C:\\Windows\\{7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe" {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A35EB159-2ADA-46cd-8617-F9B806F97202} {BBE0540C-083A-412a-B404-B8362C027CE2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{76B20C08-3369-480a-BB2B-7672B8DC3DB5} 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{76B20C08-3369-480a-BB2B-7672B8DC3DB5}\stubpath = "C:\\Windows\\{76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe" 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{374F0ED9-7B8C-4553-9A84-F3014E6578A1} {B0365817-EE95-4b0a-9E61-97716F810C23}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03D4E428-95A3-4377-A1FE-B1E6F9C70072}\stubpath = "C:\\Windows\\{03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe" {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{125D6B88-8116-46eb-B6C7-63FB539119C9}\stubpath = "C:\\Windows\\{125D6B88-8116-46eb-B6C7-63FB539119C9}.exe" {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8F62FF87-D38E-4a8f-BB99-D7BE7D63F780} {A35EB159-2ADA-46cd-8617-F9B806F97202}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8F62FF87-D38E-4a8f-BB99-D7BE7D63F780}\stubpath = "C:\\Windows\\{8F62FF87-D38E-4a8f-BB99-D7BE7D63F780}.exe" {A35EB159-2ADA-46cd-8617-F9B806F97202}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B0365817-EE95-4b0a-9E61-97716F810C23} {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{374F0ED9-7B8C-4553-9A84-F3014E6578A1}\stubpath = "C:\\Windows\\{374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe" {B0365817-EE95-4b0a-9E61-97716F810C23}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE4615AA-344F-40c1-973F-C872D1D6D7B2}\stubpath = "C:\\Windows\\{CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe" {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED7A1C24-9708-49a5-BF49-FB7C6F87D609} {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}\stubpath = "C:\\Windows\\{D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe" {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03D4E428-95A3-4377-A1FE-B1E6F9C70072} {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{125D6B88-8116-46eb-B6C7-63FB539119C9} {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2} {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBE0540C-083A-412a-B404-B8362C027CE2} {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A35EB159-2ADA-46cd-8617-F9B806F97202}\stubpath = "C:\\Windows\\{A35EB159-2ADA-46cd-8617-F9B806F97202}.exe" {BBE0540C-083A-412a-B404-B8362C027CE2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B0365817-EE95-4b0a-9E61-97716F810C23}\stubpath = "C:\\Windows\\{B0365817-EE95-4b0a-9E61-97716F810C23}.exe" {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE4615AA-344F-40c1-973F-C872D1D6D7B2} {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED7A1C24-9708-49a5-BF49-FB7C6F87D609}\stubpath = "C:\\Windows\\{ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe" {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BBE0540C-083A-412a-B404-B8362C027CE2}\stubpath = "C:\\Windows\\{BBE0540C-083A-412a-B404-B8362C027CE2}.exe" {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe -
Executes dropped EXE 12 IoCs
pid Process 1964 {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe 1572 {B0365817-EE95-4b0a-9E61-97716F810C23}.exe 880 {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe 4572 {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe 2236 {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe 3728 {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe 1012 {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe 2736 {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe 4712 {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe 368 {BBE0540C-083A-412a-B404-B8362C027CE2}.exe 2868 {A35EB159-2ADA-46cd-8617-F9B806F97202}.exe 1060 {8F62FF87-D38E-4a8f-BB99-D7BE7D63F780}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe File created C:\Windows\{D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe File created C:\Windows\{BBE0540C-083A-412a-B404-B8362C027CE2}.exe {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe File created C:\Windows\{B0365817-EE95-4b0a-9E61-97716F810C23}.exe {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe File created C:\Windows\{374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe {B0365817-EE95-4b0a-9E61-97716F810C23}.exe File created C:\Windows\{03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe File created C:\Windows\{125D6B88-8116-46eb-B6C7-63FB539119C9}.exe {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe File created C:\Windows\{8F62FF87-D38E-4a8f-BB99-D7BE7D63F780}.exe {A35EB159-2ADA-46cd-8617-F9B806F97202}.exe File created C:\Windows\{76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe File created C:\Windows\{CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe File created C:\Windows\{7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe File created C:\Windows\{A35EB159-2ADA-46cd-8617-F9B806F97202}.exe {BBE0540C-083A-412a-B404-B8362C027CE2}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BBE0540C-083A-412a-B404-B8362C027CE2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8F62FF87-D38E-4a8f-BB99-D7BE7D63F780}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A35EB159-2ADA-46cd-8617-F9B806F97202}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B0365817-EE95-4b0a-9E61-97716F810C23}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 512 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe Token: SeIncBasePriorityPrivilege 1964 {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe Token: SeIncBasePriorityPrivilege 1572 {B0365817-EE95-4b0a-9E61-97716F810C23}.exe Token: SeIncBasePriorityPrivilege 880 {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe Token: SeIncBasePriorityPrivilege 4572 {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe Token: SeIncBasePriorityPrivilege 2236 {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe Token: SeIncBasePriorityPrivilege 3728 {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe Token: SeIncBasePriorityPrivilege 1012 {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe Token: SeIncBasePriorityPrivilege 2736 {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe Token: SeIncBasePriorityPrivilege 4712 {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe Token: SeIncBasePriorityPrivilege 368 {BBE0540C-083A-412a-B404-B8362C027CE2}.exe Token: SeIncBasePriorityPrivilege 2868 {A35EB159-2ADA-46cd-8617-F9B806F97202}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 512 wrote to memory of 1964 512 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe 94 PID 512 wrote to memory of 1964 512 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe 94 PID 512 wrote to memory of 1964 512 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe 94 PID 512 wrote to memory of 2984 512 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe 95 PID 512 wrote to memory of 2984 512 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe 95 PID 512 wrote to memory of 2984 512 2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe 95 PID 1964 wrote to memory of 1572 1964 {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe 96 PID 1964 wrote to memory of 1572 1964 {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe 96 PID 1964 wrote to memory of 1572 1964 {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe 96 PID 1964 wrote to memory of 2812 1964 {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe 97 PID 1964 wrote to memory of 2812 1964 {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe 97 PID 1964 wrote to memory of 2812 1964 {76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe 97 PID 1572 wrote to memory of 880 1572 {B0365817-EE95-4b0a-9E61-97716F810C23}.exe 100 PID 1572 wrote to memory of 880 1572 {B0365817-EE95-4b0a-9E61-97716F810C23}.exe 100 PID 1572 wrote to memory of 880 1572 {B0365817-EE95-4b0a-9E61-97716F810C23}.exe 100 PID 1572 wrote to memory of 1644 1572 {B0365817-EE95-4b0a-9E61-97716F810C23}.exe 101 PID 1572 wrote to memory of 1644 1572 {B0365817-EE95-4b0a-9E61-97716F810C23}.exe 101 PID 1572 wrote to memory of 1644 1572 {B0365817-EE95-4b0a-9E61-97716F810C23}.exe 101 PID 880 wrote to memory of 4572 880 {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe 102 PID 880 wrote to memory of 4572 880 {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe 102 PID 880 wrote to memory of 4572 880 {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe 102 PID 880 wrote to memory of 2056 880 {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe 103 PID 880 wrote to memory of 2056 880 {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe 103 PID 880 wrote to memory of 2056 880 {374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe 103 PID 4572 wrote to memory of 2236 4572 {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe 104 PID 4572 wrote to memory of 2236 4572 {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe 104 PID 4572 wrote to memory of 2236 4572 {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe 104 PID 4572 wrote to memory of 3116 4572 {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe 105 PID 4572 wrote to memory of 3116 4572 {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe 105 PID 4572 wrote to memory of 3116 4572 {CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe 105 PID 2236 wrote to memory of 3728 2236 {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe 106 PID 2236 wrote to memory of 3728 2236 {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe 106 PID 2236 wrote to memory of 3728 2236 {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe 106 PID 2236 wrote to memory of 4184 2236 {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe 107 PID 2236 wrote to memory of 4184 2236 {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe 107 PID 2236 wrote to memory of 4184 2236 {03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe 107 PID 3728 wrote to memory of 1012 3728 {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe 108 PID 3728 wrote to memory of 1012 3728 {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe 108 PID 3728 wrote to memory of 1012 3728 {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe 108 PID 3728 wrote to memory of 3128 3728 {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe 109 PID 3728 wrote to memory of 3128 3728 {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe 109 PID 3728 wrote to memory of 3128 3728 {125D6B88-8116-46eb-B6C7-63FB539119C9}.exe 109 PID 1012 wrote to memory of 2736 1012 {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe 110 PID 1012 wrote to memory of 2736 1012 {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe 110 PID 1012 wrote to memory of 2736 1012 {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe 110 PID 1012 wrote to memory of 4928 1012 {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe 111 PID 1012 wrote to memory of 4928 1012 {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe 111 PID 1012 wrote to memory of 4928 1012 {ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe 111 PID 2736 wrote to memory of 4712 2736 {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe 112 PID 2736 wrote to memory of 4712 2736 {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe 112 PID 2736 wrote to memory of 4712 2736 {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe 112 PID 2736 wrote to memory of 2536 2736 {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe 113 PID 2736 wrote to memory of 2536 2736 {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe 113 PID 2736 wrote to memory of 2536 2736 {D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe 113 PID 4712 wrote to memory of 368 4712 {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe 114 PID 4712 wrote to memory of 368 4712 {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe 114 PID 4712 wrote to memory of 368 4712 {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe 114 PID 4712 wrote to memory of 4628 4712 {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe 115 PID 4712 wrote to memory of 4628 4712 {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe 115 PID 4712 wrote to memory of 4628 4712 {7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe 115 PID 368 wrote to memory of 2868 368 {BBE0540C-083A-412a-B404-B8362C027CE2}.exe 116 PID 368 wrote to memory of 2868 368 {BBE0540C-083A-412a-B404-B8362C027CE2}.exe 116 PID 368 wrote to memory of 2868 368 {BBE0540C-083A-412a-B404-B8362C027CE2}.exe 116 PID 368 wrote to memory of 4596 368 {BBE0540C-083A-412a-B404-B8362C027CE2}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-13_5c761811ce80777d2517a1adc9e860b3_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\{76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exeC:\Windows\{76B20C08-3369-480a-BB2B-7672B8DC3DB5}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\{B0365817-EE95-4b0a-9E61-97716F810C23}.exeC:\Windows\{B0365817-EE95-4b0a-9E61-97716F810C23}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\{374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exeC:\Windows\{374F0ED9-7B8C-4553-9A84-F3014E6578A1}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\{CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exeC:\Windows\{CE4615AA-344F-40c1-973F-C872D1D6D7B2}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\{03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exeC:\Windows\{03D4E428-95A3-4377-A1FE-B1E6F9C70072}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\{125D6B88-8116-46eb-B6C7-63FB539119C9}.exeC:\Windows\{125D6B88-8116-46eb-B6C7-63FB539119C9}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\{ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exeC:\Windows\{ED7A1C24-9708-49a5-BF49-FB7C6F87D609}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\{D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exeC:\Windows\{D3CE93EF-BC2F-413a-BAA8-36B1B6E26FA2}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{7C12E217-5CEE-4b19-9289-A3A8C1569953}.exeC:\Windows\{7C12E217-5CEE-4b19-9289-A3A8C1569953}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\{BBE0540C-083A-412a-B404-B8362C027CE2}.exeC:\Windows\{BBE0540C-083A-412a-B404-B8362C027CE2}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\{A35EB159-2ADA-46cd-8617-F9B806F97202}.exeC:\Windows\{A35EB159-2ADA-46cd-8617-F9B806F97202}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\{8F62FF87-D38E-4a8f-BB99-D7BE7D63F780}.exeC:\Windows\{8F62FF87-D38E-4a8f-BB99-D7BE7D63F780}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A35EB~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:3304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BBE05~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C12E~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:4628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3CE9~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ED7A1~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:4928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{125D6~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03D4E~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CE461~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{374F0~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B0365~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{76B20~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD56a88ad106ff0b0ec3a0df3366c150691
SHA17b0adb4ccc906f2d4def681f66ac56da2c311371
SHA256a9bb5c28e6de9ee5b7346413e3c527b6e07465120a84b8653f2805842a722c28
SHA512d59c43cbf4920b7f1605817c8b3fd358ef8572d12a19dfaa7ee818951a7bdf828568e44bc4091635ad8c8d0dacfb9a7a01c53ea799f7a61e939365898fb60199
-
Filesize
168KB
MD5ac0363690467164789a7bd795193a20a
SHA1d1bda7bdf1948e2a9f6a273d797ce0775ab479d3
SHA256378cbec72f1c7b45aa357fd91e00e4f7eedda438dce787d29df336e14880848a
SHA512df9b7c18422fcdc97d48e8481a251e40bf53b03b8615a4706affdfd2a7e33f2101fd6fdeba45d11e744384b24d2e759f1fc42194de571b0ef1fd61b1b04883af
-
Filesize
168KB
MD58535c579349eb91f5bb93dfc526e4061
SHA1b726e04422e63211251b54503f45631f47eb39bc
SHA2567a0ba365fe7574fcd0dcca418b27ab19fb2659fce604bdee5f4f4b17ed3aa311
SHA5127a2127c81769857c552619db0ec349822f95c1b60f1c7a6715de1857e4572ecfeeb4d14b9b15df6f03f04b80b62debdad4e11608e78b1c47c519f152bf520113
-
Filesize
168KB
MD5527aba9472ce513ae7d977392d2cf5fa
SHA1fe8917bd2d118ea128ac12ab6f5bc2856b19f3cf
SHA2567c61ed552129035b6cefb3c15b2379a643c3f67048fe01a484756cc0d02c6d5b
SHA512fe698dee73b1cacbeae39b13b58f8b0fb092af8eb2c6acb1cfa8a4e51d062276a5566967b81f81695e1ce341728c7df2993b8d87a5943a8e4600b7100ce314c9
-
Filesize
168KB
MD51f0ed780e639b6c7bdcc17d80e826682
SHA168fe8511cf5f21bd14f8bc4c70a434faaf204f15
SHA256e6ed73d2937e840944b6feb1db996e573fbc918db147ccd4a8f11baceec92237
SHA51248d993a298c38f201a69960f5324bd0c869d5ef33cea1b48d5ef5de893bf1ebd1772f30184278975e96962ea652ed59e903a32841bc323446ce40ecdc7bfc3ee
-
Filesize
168KB
MD55d686a36955e25c5f59671e57fb3bab0
SHA1a50a17878b4a9613ba3a0f0f3636f82d78421e3a
SHA256c36ee2fb77e7576a8036127de6a77271f56006edc73d82edfe796d63d7022723
SHA5120ffdd79c029b301dcf69fad5b277b0089cdd0624619297761b4038dde59d0a421705d8fd286f72b15adca92dfacf432cc48f2593e497f76807f45664f69265a2
-
Filesize
168KB
MD5a4adda2201fa37e32c4db359870f6d07
SHA1e1581a22829b8eb35a3d4c30bdbfcb9daa1186a5
SHA256e634d83247284c5543a312e50e749f24905d05bc30f905a20891cd001a24c124
SHA5123784afecfcb6b2c8c2bb827b05873a080c79680c4c9c9f217b85cd6248e12cba69f6af0ca328a6974830fbfa0df32c04923838c2a5367a9f1edf95462dda1672
-
Filesize
168KB
MD5f342b7adf588180c4d0e645ce93dfe5b
SHA158cb310937e502b549d7556d7441ac66b000576d
SHA2567fb0d746190e0ec0cd99a87823ea86c1609710fbe6e5b8c3b597756658bd7dbb
SHA512c20c3726211ea9a102d814773baffe1961cfc380ce9118115061a2ebe526d8fae30d2e6152067fbb3efe55c2d97ac5b22f79c1547bc7b179438c5fcf9316b30d
-
Filesize
168KB
MD5b8fa4ce673e81f9e3b5321031cda4bf1
SHA1dbbf29c96fb3add3b34b4eed00b08a2a332458f4
SHA256d297b361e984bfcf14faa4de5fab8cee2cc83b90c2da0f51172467c548f1e65d
SHA512b9b0be389da868cc5e8f1c4bd4a6e481c3cf0f42bac7b5a26b230bca6bfc0061918009f799386960399bb4e39ea97423497a0a3613cc58515c28b3e3af0d1ec7
-
Filesize
168KB
MD530cc10ba48c56ff51ca7212b4971c681
SHA1cc312e202cd9e2eec87c901f85addcc9880f8a8d
SHA256da305f2ef0b04c8a85af2a2bac96e326a66cee275b6224eabc3acc76cf441868
SHA512e43a0e5ef3519de49190aa3fb3225aeab67818551b4e10f9c1520263dea8f29db7c6586cdf186bc8764da26fcf22161e9aa27610fcc50734b9d397a10424189b
-
Filesize
168KB
MD5fced9ccaeb62005f4751b7a0d3dcdc3a
SHA148b32ed4c69b1eae0725b1b5a97904f4c281de4f
SHA256edcaaa73919bd4f13fa6b35e8f9d5571533b46648b05c8e339e7945b86154ba7
SHA512701de409b05e71797348301700ed0bce1dae24acca6e7a06db442556f188ea98150365e2a71913a0d265a2d2b83e452da2f4625c2cb4026864d4a4bbb40fc172
-
Filesize
168KB
MD5d13054f90b5bc629198cf83e14fdab3f
SHA16b56d13939cd06ebcfecad16d6e35e96b2007fd5
SHA25628420d250b3116929fc3e8149e11ea33fbb9e84819e693eb3394ac952c3027be
SHA51250552145994f589483937fa5b52f61643003a327b715b001c2da8727bb09a098350633514de0e1305c62640a6798e6d45f3f3e5bd98bc11e9e0db0495131c317